fix cleanliness for 1.76

This commit is contained in:
Benjamin Fry 2024-02-10 14:44:00 -08:00
parent 3ad83ddee6
commit 8154de2b89
5 changed files with 8 additions and 7 deletions

View File

@ -866,7 +866,7 @@ mod test {
#[test]
#[cfg(feature = "dnssec")] // This tests RFC 6975, a DNSSEC-specific feature.
#[allow(clippy::blocks_in_if_conditions)]
#[allow(clippy::blocks_in_conditions)]
fn test_get_filter() {
use crate::rr::dnssec::rdata::DNSSECRData;
use crate::rr::dnssec::rdata::RRSIG;

View File

@ -638,7 +638,7 @@ fn test_preserve() {
/// Invalid RRSIGs will be ignored. RRSIGs will only be validated against DNSKEYs which can
/// be validated through a chain back to the `trust_anchor`. As long as one RRSIG is valid,
/// then the RRSET will be valid.
#[allow(clippy::blocks_in_if_conditions)]
#[allow(clippy::blocks_in_conditions)]
async fn verify_default_rrset<H>(
handle: &DnssecDnsHandle<H>,
rrset: Rrset,
@ -854,7 +854,7 @@ fn verify_rrset_with_dnskey(_: &DNSKEY, _: &RRSIG, _: &Rrset) -> ProtoResult<()>
/// corresponding RRSIG RR, a validator MUST ignore the settings of the
/// NSEC and RRSIG bits in an NSEC RR.
/// ```
#[allow(clippy::blocks_in_if_conditions)]
#[allow(clippy::blocks_in_conditions)]
#[doc(hidden)]
pub fn verify_nsec(query: &Query, soa_name: &Name, nsecs: &[&Record]) -> bool {
// TODO: consider converting this to Result, and giving explicit reason for the failure

View File

@ -175,10 +175,11 @@ impl DnsHandle for BufDnsRequestStreamHandle {
let (request, oneshot) = OneshotDnsRequest::oneshot(request);
let mut sender = self.sender.clone();
try_oneshot!(sender.try_send(request).map_err(|_| {
let try_send = sender.try_send(request).map_err(|_| {
debug!("unable to enqueue message");
ProtoError::from(ProtoErrorKind::Busy)
}));
});
try_oneshot!(try_send);
DnsResponseReceiver::Receiver(oneshot)
}

View File

@ -450,7 +450,7 @@ impl SqliteAuthority {
///
#[cfg(feature = "dnssec")]
#[cfg_attr(docsrs, doc(cfg(feature = "dnssec")))]
#[allow(clippy::blocks_in_if_conditions)]
#[allow(clippy::blocks_in_conditions)]
pub async fn authorize(&self, update_message: &MessageRequest) -> UpdateResult<()> {
use tracing::debug;

View File

@ -1073,7 +1073,7 @@ async fn test_journal() {
}
#[tokio::test]
#[allow(clippy::blocks_in_if_conditions)]
#[allow(clippy::blocks_in_conditions)]
async fn test_recovery() {
// test that this message can be inserted
let conn = Connection::open_in_memory().expect("could not create in memory DB");