diff --git a/axum-core/src/extract/rejection.rs b/axum-core/src/extract/rejection.rs index 5ec92a0ae72..97228810b06 100644 --- a/axum-core/src/extract/rejection.rs +++ b/axum-core/src/extract/rejection.rs @@ -39,10 +39,10 @@ pub struct FailedToBufferBody(FailedToBufferBodyInner); impl FailedToBufferBody { /// Check if the body failed to be buffered because a length limit was hit. /// - /// This can _only_ happen when you're using [`tower_http::limit::RequestBodyLimitLayer`] or + /// This can _only_ happen when you're using [`tower_http::limit::RequestBodyLimitLayer`] or /// otherwise wrapping request bodies in [`http_body::Limited`]. /// - /// [`tower_http::limit::RequestBodyLimitLayer`]: https://docs.rs/tower-http/latest/tower_http/limit/struct.RequestBodyLimitLayer.html + /// [`tower_http::limit::RequestBodyLimitLayer`]: https://docs.rs/tower-http/0.3/tower_http/limit/struct.RequestBodyLimitLayer.html pub fn is_length_limit_error(&self) -> bool { matches!(self.0, FailedToBufferBodyInner::LengthLimitError(_)) } @@ -72,12 +72,12 @@ impl crate::response::IntoResponse for FailedToBufferBody { match self.0 { FailedToBufferBodyInner::Unknown(err) => ( http::StatusCode::BAD_REQUEST, - format!(concat!("Failed to buffer the request body", ": {}"), err), + format!("Failed to buffer the request body: {}", err), ) .into_response(), FailedToBufferBodyInner::LengthLimitError(err) => ( StatusCode::PAYLOAD_TOO_LARGE, - format!(concat!("Failed to buffer the request body", ": {}"), err), + format!("Failed to buffer the request body: {}", err), ) .into_response(), }