diff --git a/rs/src/contracts/tunnel.rs b/rs/src/contracts/tunnel.rs index 16a78133..3e71632f 100644 --- a/rs/src/contracts/tunnel.rs +++ b/rs/src/contracts/tunnel.rs @@ -2,12 +2,12 @@ // Licensed under the MIT license. // Generated from ../../../cs/src/Contracts/Tunnel.cs -use chrono::{DateTime, Utc}; use crate::contracts::TunnelAccessControl; use crate::contracts::TunnelEndpoint; use crate::contracts::TunnelOptions; use crate::contracts::TunnelPort; use crate::contracts::TunnelStatus; +use chrono::{DateTime, Utc}; use serde::{Deserialize, Serialize}; use std::collections::HashMap; diff --git a/rs/src/contracts/tunnel_access_control_entry.rs b/rs/src/contracts/tunnel_access_control_entry.rs index b36863a9..fa7f985a 100644 --- a/rs/src/contracts/tunnel_access_control_entry.rs +++ b/rs/src/contracts/tunnel_access_control_entry.rs @@ -2,8 +2,8 @@ // Licensed under the MIT license. // Generated from ../../../cs/src/Contracts/TunnelAccessControlEntry.cs -use chrono::{DateTime, Utc}; use crate::contracts::TunnelAccessControlEntryType; +use chrono::{DateTime, Utc}; use serde::{Deserialize, Serialize}; // Data contract for an access control entry on a `Tunnel` or `TunnelPort`. diff --git a/rs/src/contracts/tunnel_port.rs b/rs/src/contracts/tunnel_port.rs index 1fd3e41a..89611508 100644 --- a/rs/src/contracts/tunnel_port.rs +++ b/rs/src/contracts/tunnel_port.rs @@ -43,7 +43,7 @@ pub struct TunnelPort { // A client that connects to a tunnel (by ID or name) without specifying a port number // will connect to the default port for the tunnel, if a default is configured. Or if // the tunnel has only one port then the single port is the implicit default. - // + // // Selection of a default port for a connection also depends on matching the // connection to the port `TunnelPort.Protocol`, so it is possible to configure // separate defaults for distinct protocols like `TunnelProtocol.Http` and diff --git a/rs/src/management/http_client.rs b/rs/src/management/http_client.rs index 20986bf7..18c78a2b 100644 --- a/rs/src/management/http_client.rs +++ b/rs/src/management/http_client.rs @@ -162,7 +162,11 @@ impl TunnelManagementClient { ) -> HttpResult { let mut url = self.build_tunnel_uri( locator, - Some(&format!("{}/{}", ENDPOINTS_API_SUB_PATH, endpoint.id.as_deref().unwrap())), + Some(&format!( + "{}/{}", + ENDPOINTS_API_SUB_PATH, + endpoint.id.as_deref().unwrap() + )), ); url.query_pairs_mut() .append_pair("connectionMode", &endpoint.connection_mode.to_string()); @@ -180,7 +184,11 @@ impl TunnelManagementClient { ) -> HttpResult { let mut url = self.build_tunnel_uri( locator, - Some(&format!("{}/{}", ENDPOINTS_API_SUB_PATH, endpoint.base.id.as_deref().unwrap())), + Some(&format!( + "{}/{}", + ENDPOINTS_API_SUB_PATH, + endpoint.base.id.as_deref().unwrap() + )), ); url.query_pairs_mut() .append_pair("connectionMode", &endpoint.base.connection_mode.to_string()); @@ -458,7 +466,16 @@ impl TunnelManagementClient { match get_policy_header_value() { Ok(Some(policy_header_value)) => { if let Ok(header_value) = HeaderValue::from_maybe_shared(policy_header_value) { - headers.insert("User-Agent-Policies", header_value); + let header_value_str = header_value + .to_str() + .unwrap() + .replace("%22", "") + .replace("%3B", ";"); + headers.insert( + "User-Agent-Policies", + HeaderValue::from_str(&header_value_str).unwrap(), + ); + log::info!("Headers: {:?}", headers); } else { log::error!("Invalid header value"); }