361 |
#[cfg(test)]
|
362 |
#[allow(clippy::unwrap_used)]
|
363 |
mod test {
|
43 |
#[allow(clippy::option_unwrap_used)]
|
44 |
#[async_trait]
|
1564 |
impl std::fmt::Debug for Message {
|
1565 |
#[allow(clippy::unwrap_used)]
|
1566 |
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
108 |
#[tokio::test]
|
109 |
#[allow(clippy::unwrap_used)]
|
110 |
async fn flags_into_ibv_access_test() {
|
118 |
#[tokio::test]
|
119 |
#[allow(clippy::unwrap_used)]
|
120 |
async fn ibv_access_into_flags_test() {
|
369 |
// imm was checked by `is_some()`
|
370 |
#[allow(clippy::unwrap_used)]
|
371 |
let _task = tokio::spawn(Arc::<Self>::clone(&self).handle_write_imm(imm.unwrap()));
|
146 |
#[cfg(test)]
|
147 |
#[allow(unused, clippy::unwrap_used)]
|
148 |
mod tests {
|
11 |
// No time can be earlier than Unix Epoch
|
12 |
#[allow(clippy::unwrap_used)]
|
13 |
let since_the_epoch = start.duration_since(UNIX_EPOCH).unwrap();
|
697 |
#[allow(clippy::as_conversions)]
|
698 |
#[allow(clippy::unwrap_used)]
|
699 |
unsafe extern "C" fn extent_alloc_hook_for_test(
|
736 |
#[allow(clippy::as_conversions)]
|
737 |
#[allow(clippy::unwrap_used)]
|
738 |
unsafe extern "C" fn extent_merge_hook_for_test(
|
779 |
#[test]
|
780 |
#[allow(clippy::unwrap_used)]
|
781 |
fn test_extent_hooks() -> io::Result<()> {
|
829 |
#[allow(clippy::as_conversions)]
|
830 |
#[allow(clippy::unwrap_used)]
|
831 |
fn je_malloxc_test() {
|
882 |
#[test]
|
883 |
#[allow(clippy::unwrap_used)]
|
884 |
fn zeroed_test() -> io::Result<()> {
|
51 |
#[allow(clippy::unwrap_used)]
|
52 |
#[async_trait]
|
3 |
/// Test the correct type is returned from call and construct
|
4 |
#[allow(clippy::unwrap_used)]
|
5 |
#[test]
|
95 |
#[allow(clippy::unwrap_used)]
|
96 |
#[test]
|
14 |
/// Checks that the given JavaScript string gives the expected expression.
|
15 |
#[allow(clippy::unwrap_used)]
|
16 |
#[track_caller]
|
3 |
/// Test the correct type is returned from call and construct
|
4 |
#[allow(clippy::unwrap_used)]
|
5 |
#[test]
|
96 |
#[allow(clippy::unwrap_used)]
|
97 |
#[test]
|
20 |
/// Checks that the given JavaScript string gives the expected expression.
|
21 |
#[allow(clippy::unwrap_used)]
|
22 |
#[track_caller]
|
288 |
#[cfg(test)]
|
289 |
#[allow(clippy::unwrap_used)]
|
290 |
mod tests {
|
154 |
pub fn first(&self) -> &T {
|
155 |
#[allow(clippy::unwrap_used)]
|
156 |
self.inner.first().unwrap()
|
169 |
pub fn last(&self) -> &T {
|
170 |
#[allow(clippy::unwrap_used)]
|
171 |
self.inner.last().unwrap()
|
251 |
}
|
252 |
#[allow(clippy::unwrap_used)]
|
253 |
Ok(BoundedVec::from_vec(out).unwrap())
|
283 |
}
|
284 |
#[allow(clippy::unwrap_used)]
|
285 |
Ok(BoundedVec::from_vec(out).unwrap())
|
313 |
pub fn split_last(&self) -> (&T, &[T]) {
|
314 |
#[allow(clippy::unwrap_used)]
|
315 |
self.inner.split_last().unwrap()
|
173 |
// `E0080` does not allow `T`s larger than `isize::MAX`
|
174 |
clippy::unwrap_used,
|
175 |
)]
|
109 |
#[cfg(test)]
|
110 |
#[allow(clippy::result_unwrap_used)]
|
111 |
mod tests {
|
174 |
#[cfg(test)]
|
175 |
#[allow(clippy::result_unwrap_used, clippy::non_ascii_literal)]
|
176 |
mod tests {
|
243 |
#[cfg(test)]
|
244 |
#[allow(clippy::result_unwrap_used)]
|
245 |
mod tests {
|
9 |
#[allow(clippy::semicolon_if_nothing_returned)]
|
10 |
#[allow(clippy::unwrap_used)]
|
11 |
mod bindings;
|
108 |
// TODO(tarcieri): better conversion or unified `Hash` type, see tendermint-rs#1221
|
109 |
#[allow(clippy::unwrap_used)]
|
110 |
let tx_hash = tendermint::Hash::Sha256(tx_hash.as_ref().try_into().unwrap());
|
16 |
let mut msg_info = crate::shell::Verbosity::Verbose.into();
|
17 |
#[allow(clippy::unwrap_used)]
|
18 |
WORKSPACE.get_or_init(|| {
|
126 |
#[cfg(test)]
|
127 |
#[allow(clippy::unwrap_used)]
|
128 |
impl Default for Module {
|
216 |
#[cfg(test)]
|
217 |
#[allow(clippy::unwrap_used)]
|
218 |
fn add_test_module(&mut self, input: &str) -> Result<&Module> {
|
368 |
#[cfg(test)]
|
369 |
#[allow(clippy::unwrap_used)]
|
370 |
mod tests {
|
176 |
// contains this capture group.
|
177 |
#[allow(clippy::unwrap_used)]
|
178 |
let name = cap.get(1).unwrap().as_str();
|
215 |
#[cfg(test)]
|
216 |
#[allow(clippy::unwrap_used)]
|
217 |
mod test {
|
802 |
}
|
803 |
#[allow(clippy::unwrap_used)]
|
804 |
let max_level = *hops_by_level.keys().max().unwrap();
|
805 |
#[allow(clippy::unwrap_used)]
|
806 |
let max_width = hops_by_level.values().map(|paths| paths.len()).max().unwrap();
|
1288 |
hops_by_edge.iter().map(|((vl, wl), hops)| {
|
1289 |
#[allow(clippy::unwrap_used)] // an edge with no hops really should panic
|
1290 |
let (lvl, (mhr, nhr)) = hops.iter().rev().next().unwrap();
|
1757 |
.map(|(vl, wl)| {
|
1758 |
#[allow(clippy::unwrap_used)]
|
1759 |
let (lvl, (mhr, _nhr)) = hops_by_edge[&(vl.clone(), wl.clone())].iter().next().unwrap();
|
1765 |
.map(|(vl, wl)| {
|
1766 |
#[allow(clippy::unwrap_used)]
|
1767 |
let (lvl, (mhr, _nhr)) = hops_by_edge[&(vl.clone(), wl.clone())].iter().rev().next().unwrap();
|
117 |
// The validity of the casts are verified by the enum discriminant.
|
118 |
#[allow(clippy::unwrap_used)]
|
119 |
match Self::from_min_max(min, max)? {
|
23 |
#[cfg(test)]
|
24 |
#[allow(clippy::unwrap_in_result, clippy::unwrap_used, clippy::expect_used)]
|
25 |
mod test;
|
170 |
#[allow(clippy::unwrap_used)] // somehow the RE has four groups
|
171 |
let unit = group
|
237 |
#[test]
|
238 |
#[allow(clippy::result_unwrap_used)]
|
239 |
fn test_read_pos() {
|
273 |
#[test]
|
274 |
#[allow(clippy::result_unwrap_used)]
|
275 |
fn test_write_pos() {
|
162 |
/// Arbitrary
|
163 |
#[allow(clippy::unwrap_used)]
|
164 |
#[cfg(feature = "arbitrary")]
|
20 |
#[allow(clippy::unwrap_used)]
|
21 |
impl std::fmt::Debug for EcPoint {
|
51 |
fn from(value: EcPoint) -> String {
|
52 |
#[allow(clippy::unwrap_used)]
|
53 |
{
|
157 |
#[allow(clippy::unwrap_used)]
|
158 |
#[cfg(test)]
|
72 |
let mut n_bits_writer = vec![];
|
73 |
#[allow(clippy::unwrap_used)]
|
74 |
n_bits_writer
|
113 |
let mut reader = std::io::Cursor::new(n_bits_buf);
|
114 |
#[allow(clippy::unwrap_used)]
|
115 |
{
|
270 |
#[cfg(feature = "arbitrary")]
|
271 |
#[allow(clippy::unwrap_used)]
|
272 |
mod arbitrary {
|
382 |
#[allow(clippy::unwrap_used, clippy::panic)]
|
383 |
#[cfg(test)]
|
36 |
.map(|n| {
|
37 |
#[allow(clippy::unwrap_used)]
|
38 |
{
|
31 |
let s: String = "http://".to_string() + &self.0.to_string();
|
32 |
#[allow(clippy::unwrap_used)]
|
33 |
Url::from_str(&s).unwrap()
|
40 |
#[cfg(test)]
|
41 |
#[allow(clippy::unwrap_used)]
|
42 |
mod tests {
|
130 |
// Won't be overflowing an i64, so unwrap is safe.
|
131 |
#[allow(clippy::unwrap_used)]
|
132 |
Ok(
|
254 |
// Won't be overflowing an i64, so unwrap is safe.
|
255 |
#[allow(clippy::unwrap_used)]
|
256 |
let min_box_value: BoxValue = (box_size_bytes as i64 * self.min_value_per_byte as i64)
|
276 |
#[cfg(test)]
|
277 |
#[allow(clippy::unwrap_used)]
|
278 |
mod tests {
|
42 |
#[cfg(test)]
|
43 |
#[allow(clippy::unwrap_used)]
|
44 |
mod tests {
|
95 |
#[allow(clippy::unwrap_used)]
|
96 |
// safe since the serialization error is impossible here
|
124 |
#[cfg(feature = "arbitrary")]
|
125 |
#[allow(clippy::unwrap_used)]
|
126 |
pub mod arbitrary {
|
150 |
#[cfg(test)]
|
151 |
#[allow(clippy::unwrap_used, clippy::panic)]
|
152 |
pub mod tests {
|
179 |
) -> Result<bool, TransactionSignatureVerificationError> {
|
180 |
#[allow(clippy::unwrap_used)]
|
181 |
// since we have a tx with tx_id at this point, serialization is safe to unwrap
|
230 |
impl SigmaSerializable for Transaction {
|
231 |
#[allow(clippy::unwrap_used)]
|
232 |
fn sigma_serialize<W: SigmaByteWrite>(&self, w: &mut W) -> SigmaSerializeResult {
|
52 |
) {
|
53 |
#[allow(clippy::unwrap_used)]
|
54 |
{
|
70 |
pub unsafe extern "C" fn ergo_lib_address_type_prefix(address: ConstAddressPtr) -> u8 {
|
71 |
#[allow(clippy::unwrap_used)]
|
72 |
(address_type_prefix(address).unwrap() as u8)
|
15 |
// Unwrap should be safe to use here unless the caller passes a null ptr (undefined)
|
16 |
#[allow(clippy::unwrap_used)]
|
17 |
batchmerkleproof_valid(proof, root_hash).unwrap()
|
34 |
) -> ErrorPtr {
|
35 |
#[allow(clippy::unwrap_used)]
|
36 |
// Unwrap is safe, CString::new only errors if the argument contains a 0 byte
|
31 |
) {
|
32 |
#[allow(clippy::unwrap_used)]
|
33 |
block_header_id(block_header_ptr, block_id_out).unwrap();
|
27 |
) {
|
28 |
#[allow(clippy::unwrap_used)]
|
29 |
ergo_box_candidate_builder_new(value_ptr, contract_ptr, creation_height, builder_out).unwrap()
|
37 |
) {
|
38 |
#[allow(clippy::unwrap_used)]
|
39 |
ergo_box_candidate_builder_set_min_box_value_per_byte(builder_mut, new_min_value_per_byte)
|
47 |
) -> u32 {
|
48 |
#[allow(clippy::unwrap_used)]
|
49 |
ergo_box_candidate_builder_min_box_value_per_byte(builder_ptr).unwrap()
|
57 |
) {
|
58 |
#[allow(clippy::unwrap_used)]
|
59 |
ergo_box_candidate_builder_set_value(builder_mut, value_ptr).unwrap();
|
67 |
) {
|
68 |
#[allow(clippy::unwrap_used)]
|
69 |
ergo_box_candidate_builder_value(builder_ptr, value_out).unwrap();
|
160 |
}
|
161 |
#[allow(clippy::unwrap_used)]
|
162 |
let seeds_bounded_vec = bounded_vec::NonEmptyVec::from_vec(seeds_vec).unwrap();
|
179 |
for mut peer in peers {
|
180 |
#[allow(clippy::unwrap_used)]
|
181 |
peer.set_port(Some(9053)).unwrap();
|
80 |
}
|
81 |
#[allow(clippy::unwrap_used)]
|
82 |
Ok(Constant {
|
172 |
let bigint_str = bigint.to_string();
|
173 |
#[allow(clippy::unwrap_used)]
|
174 |
// since BigInt256 bounds are less the JS BigInt it should not fail
|
178 |
fn js_bigint_to_ergo_bigint(bigint: js_sys::BigInt) -> Result<BigInt256, ConvError> {
|
179 |
#[allow(clippy::unwrap_used)]
|
180 |
// safe, because it can only return an error on invalid radix
|
129 |
if headers.len() == 10 {
|
130 |
#[allow(clippy::unwrap_used)]
|
131 |
Ok(headers.try_into().unwrap())
|
69 |
// Following unwraps are fine since we're converting from BoundedVec to Vec.
|
70 |
#[allow(clippy::unwrap_used)]
|
71 |
UnsignedTransactionJsonEip12 {
|
207 |
#[cfg(test)]
|
208 |
#[allow(clippy::unwrap_used)]
|
209 |
mod tests {
|
164 |
let n = u16::max(max_parallel_requests, 1);
|
165 |
#[allow(clippy::unwrap_used)]
|
166 |
let max_parallel_requests = bounded_integer::BoundedU16::new(n).unwrap();
|
172 |
for mut url in res {
|
173 |
#[allow(clippy::unwrap_used)]
|
174 |
url.set_port(Some(9053)).unwrap();
|
220 |
let n = u16::max(max_parallel_requests, 1);
|
221 |
#[allow(clippy::unwrap_used)]
|
222 |
let max_parallel_requests = bounded_integer::BoundedU16::new(n).unwrap();
|
232 |
for mut url in res {
|
233 |
#[allow(clippy::unwrap_used)]
|
234 |
url.set_port(Some(9053)).unwrap();
|
196 |
#[cfg(feature = "arbitrary")]
|
197 |
#[allow(clippy::unwrap_used, clippy::panic)]
|
198 |
mod test {
|
32 |
// Unwrap is safe here since the hash is guaranteed to be 32 bytes
|
33 |
#[allow(clippy::unwrap_used)]
|
34 |
// Generates a hash of data prefixed with `prefix`
|
42 |
#[allow(clippy::unwrap_used)]
|
43 |
// Generates a hash of data prefixed with `prefix`, allows for an optional second hash
|
125 |
#[cfg(feature = "json")]
|
126 |
#[allow(clippy::unwrap_used)]
|
127 |
mod test {
|
161 |
pub fn new(nodes: impl Into<Vec<MerkleNode>>) -> Self {
|
162 |
#[allow(clippy::unwrap_used)]
|
163 |
fn build_nodes(nodes: &mut [MerkleNode]) {
|
275 |
#[cfg(test)]
|
276 |
#[allow(clippy::unwrap_used, clippy::panic)]
|
277 |
mod test {
|
347 |
#[cfg(test)]
|
348 |
#[allow(clippy::unwrap_used)]
|
349 |
mod arbitrary {
|
44 |
let mut height_bytes = Vec::with_capacity(4);
|
45 |
#[allow(clippy::unwrap_used)]
|
46 |
height_bytes.write_u32::<BigEndian>(header.height).unwrap();
|
58 |
let mut concat = vec![];
|
59 |
#[allow(clippy::unwrap_used)]
|
60 |
concat.write_u32::<BigEndian>(idx).unwrap();
|
66 |
// sum as byte array is always about 32 bytes
|
67 |
#[allow(clippy::unwrap_used)]
|
68 |
let array = as_unsigned_byte_array(32, f2).unwrap();
|
78 |
let mut bytes = Vec::with_capacity(8);
|
79 |
#[allow(clippy::unwrap_used)]
|
80 |
bytes.write_u64::<BigEndian>(x).unwrap();
|
163 |
// The following paramter values are mandated by Ergo-node Autolykos implementation.
|
164 |
#[allow(clippy::unwrap_used)]
|
165 |
AutolykosPowScheme {
|
79 |
};
|
80 |
#[allow(clippy::unwrap_used)]
|
81 |
Ok(acc
|
96 |
let order = order();
|
97 |
#[allow(clippy::unwrap_used)]
|
98 |
let required_target = (order / decode_compact_bits(header.n_bits))
|
100 |
.unwrap();
|
101 |
#[allow(clippy::unwrap_used)]
|
102 |
let real_target = self.pow_scheme.pow_hit(header)?.to_f64().unwrap();
|
156 |
let suffix_tail: Vec<Header> = suffix[1..].iter().map(|p| p.header.clone()).collect();
|
157 |
#[allow(clippy::unwrap_used)]
|
158 |
let max_level: i32 = if chain.len() > (k as usize) {
|
412 |
#[allow(clippy::unwrap_used)]
|
413 |
#[cfg(test)]
|
25 |
pub async fn get_info(node: NodeConf) -> Result<NodeInfo, NodeError> {
|
26 |
#[allow(clippy::unwrap_used)]
|
27 |
let url = node.addr.as_http_url().join("info").unwrap();
|
42 |
path.push_str("/header");
|
43 |
#[allow(clippy::unwrap_used)]
|
44 |
let url = node.addr.as_http_url().join(&path).unwrap();
|
136 |
path.push_str(&header_str);
|
137 |
#[allow(clippy::unwrap_used)]
|
138 |
let url = node.addr.as_http_url().join(&path).unwrap();
|
160 |
path.push_str(&tx_id_str);
|
161 |
#[allow(clippy::unwrap_used)]
|
162 |
let url = node.addr.as_http_url().join(&path).unwrap();
|
172 |
#[allow(clippy::unwrap_used)]
|
173 |
#[cfg(test)]
|
191 |
let mut url = peer.get_url().clone();
|
192 |
#[allow(clippy::unwrap_used)]
|
193 |
url.set_port(None).unwrap();
|
237 |
Msg::AddActiveNode(mut url) => {
|
238 |
#[allow(clippy::unwrap_used)]
|
239 |
url.set_port(None).unwrap();
|
262 |
Msg::InfoRequestFailedWithoutTimeout(mut url) => {
|
263 |
#[allow(clippy::unwrap_used)]
|
264 |
url.set_port(None).unwrap();
|
276 |
Msg::InfoRequestFailedWithTimeout(mut url) => {
|
277 |
#[allow(clippy::unwrap_used)]
|
278 |
url.set_port(None).unwrap();
|
290 |
Msg::PeersAllRequestFailedWithoutTimeout(mut url) => {
|
291 |
#[allow(clippy::unwrap_used)]
|
292 |
url.set_port(None).unwrap();
|
1 |
#[allow(clippy::unwrap_used)]
|
2 |
#[cfg(test)]
|
33 |
#[cfg(test)]
|
34 |
#[allow(clippy::unwrap_used)]
|
35 |
mod tests {
|
54 |
#[allow(clippy::unwrap_used)]
|
55 |
#[allow(clippy::panic)]
|
323 |
#[cfg(test)]
|
324 |
#[allow(clippy::unwrap_used)]
|
325 |
mod tests {
|
26 |
#[allow(clippy::unwrap_used)]
|
27 |
#[cfg(test)]
|
1 |
#![allow(clippy::unwrap_used)]
|
2 |
use ergotree_ir::bigint256::BigInt256;
|
29 |
#[allow(clippy::unwrap_used)]
|
30 |
#[allow(clippy::panic)]
|
59 |
#[allow(clippy::unwrap_used)]
|
60 |
#[allow(clippy::panic)]
|
43 |
#[allow(clippy::unwrap_used)]
|
44 |
#[cfg(test)]
|
57 |
#[allow(clippy::unwrap_used)]
|
58 |
#[cfg(test)]
|
41 |
fn try_from(value: BigUint) -> Result<Self, Self::Error> {
|
42 |
#[allow(clippy::unwrap_used)]
|
43 |
if value > Self::max_value().0 .0.to_biguint().unwrap() {
|
279 |
#[allow(clippy::unwrap_used)]
|
280 |
#[cfg(test)]
|
177 |
Address::P2Pk(prove_dlog) => {
|
178 |
#[allow(clippy::unwrap_used)]
|
179 |
// Since ProveDlog is a simple IR node we can be sure no other errors besides OOM could be here
|
190 |
Address::P2Pk(prove_dlog) => {
|
191 |
#[allow(clippy::unwrap_used)]
|
192 |
// Since ProveDlog is a simple IR node we can be sure no other errors besides OOM could be here
|
419 |
.collect();
|
420 |
#[allow(clippy::unwrap_used)]
|
421 |
v.as_slice().try_into().unwrap()
|
517 |
#[cfg(feature = "arbitrary")]
|
518 |
#[allow(clippy::unwrap_used)]
|
519 |
pub(crate) mod arbitrary {
|
546 |
#[cfg(test)]
|
547 |
#[allow(clippy::unwrap_used)]
|
548 |
#[allow(clippy::panic)]
|
69 |
#[allow(clippy::unwrap_used)]
|
70 |
#[allow(clippy::panic)]
|
239 |
#[allow(clippy::panic)]
|
240 |
#[allow(clippy::unwrap_used)]
|
241 |
#[cfg(test)]
|
237 |
#[allow(clippy::unwrap_used)] // it could only fail on OOM, etc.
|
238 |
fn sigma_serialize_bytes(&self) -> Vec<u8> {
|
100 |
// this unwrap is safe since we definitely inserted a value for every update
|
101 |
#[allow(clippy::unwrap_used)]
|
102 |
for build in builds_for_update.get(update.alias.as_str()).unwrap() {
|
367 |
// this unwrap is safe since we definitely inserted a value for every update earlier
|
368 |
#[allow(clippy::unwrap_used)]
|
369 |
let builds = builds_for_update.get(update.alias.as_str()).unwrap();
|
71 |
#[cfg(test)]
|
72 |
#[allow(clippy::unwrap_used)]
|
73 |
mod tests {
|
151 |
// these unwraps are safe because the length is definitely 2
|
152 |
#[allow(clippy::unwrap_used)]
|
153 |
let source = parts.get(0).unwrap();
|
154 |
#[allow(clippy::unwrap_used)]
|
155 |
let binary = parts.get(1).unwrap();
|
193 |
// these unwraps are safe because the length is definitely 2
|
194 |
#[allow(clippy::unwrap_used)]
|
195 |
let binary = parts.get(0).unwrap();
|
196 |
#[allow(clippy::unwrap_used)]
|
197 |
let installtime = parts.get(1).unwrap();
|
134 |
#[allow(clippy::unwrap_used)]
|
135 |
#[allow(unused)]
|
208 |
#[cfg(test)]
|
209 |
#[allow(clippy::unwrap_used)]
|
210 |
mod tests {
|
665 |
#[cfg(test)]
|
666 |
#[allow(clippy::unwrap_used)]
|
667 |
mod tests {
|
133 |
for i in 1..=self.degree {
|
134 |
#[allow(clippy::unwrap_used)]
|
135 |
self.coefficients[i]
|
204 |
#[cfg(test)]
|
205 |
#[allow(clippy::unwrap_used)]
|
206 |
mod tests {
|
28 |
/// If the repository cannot be created for any reason, this function will panic.
|
29 |
#[allow(clippy::panic, clippy::unwrap_used)]
|
30 |
#[inline]
|
50 |
#[cfg(test)]
|
51 |
#[allow(clippy::unwrap_used)]
|
52 |
mod tests
|
54 |
#[allow(clippy::unwrap_used)]
|
55 |
let dummy_id = std::num::NonZeroU64::new(1).unwrap();
|
63 |
pub(crate) fn new(size: u64) -> Self {
|
64 |
#[allow(clippy::unwrap_used)]
|
65 |
let initial_chunk_id = std::num::NonZeroU64::new(1).unwrap();
|
370 |
#[inline]
|
371 |
#[allow(clippy::unwrap_used)]
|
372 |
pub fn replace_entry(self, value: V) -> (K, V) {
|
405 |
#[inline]
|
406 |
#[allow(clippy::unwrap_used)]
|
407 |
pub fn replace_key(self) -> K {
|
596 |
// `choose` only returns none on empty arrays
|
597 |
#[allow(clippy::unwrap_used)]
|
598 |
/// Generate a new name
|
58 |
#[cfg(any(feature = "gas", feature = "intel", feature = "masm", feature = "nasm"))]
|
59 |
#[allow(clippy::unwrap_used)]
|
60 |
pub(crate) fn read_ascii_str(&mut self) -> &'a str {
|
176 |
#[inline]
|
177 |
#[allow(clippy::unwrap_used)]
|
178 |
pub(super) fn new(
|
209 |
#[inline]
|
210 |
#[allow(clippy::unwrap_used)]
|
211 |
pub(super) fn new(
|
249 |
#[inline]
|
250 |
#[allow(clippy::unwrap_used)]
|
251 |
pub(super) fn new(group_handlers: Vec<(OpCodeHandlerDecodeFn, &'static OpCodeHandler)>) -> (OpCodeHandlerDecodeFn, Self) {
|
272 |
impl OpCodeHandler_AnotherTable {
|
273 |
#[allow(clippy::unwrap_used)]
|
274 |
#[inline]
|
201 |
#[must_use]
|
202 |
#[allow(clippy::unwrap_used)]
|
203 |
fn read_handler_or_null_instance(&mut self) -> (OpCodeHandlerDecodeFn, &'static OpCodeHandler) {
|
235 |
#[allow(clippy::get_unwrap)]
|
236 |
#[allow(clippy::unwrap_used)]
|
237 |
fn read_handler_reference(&mut self) -> (OpCodeHandlerDecodeFn, &'static OpCodeHandler) {
|
247 |
#[allow(clippy::get_unwrap)]
|
248 |
#[allow(clippy::unwrap_used)]
|
249 |
fn read_array_reference(&mut self, kind: u32) -> Vec<(OpCodeHandlerDecodeFn, &'static OpCodeHandler)> {
|
270 |
#[allow(clippy::get_unwrap)]
|
271 |
#[allow(clippy::unwrap_used)]
|
272 |
fn table(&mut self, index: usize) -> Vec<(OpCodeHandlerDecodeFn, &'static OpCodeHandler)> {
|
729 |
#[inline]
|
730 |
#[allow(clippy::unwrap_used)]
|
731 |
pub fn new(bitness: u32, data: &'a [u8], options: u32) -> Decoder<'a> {
|
152 |
debug_assert!(day <= C::month_days(year, month) as i32);
|
153 |
#[allow(clippy::unwrap_used)]
|
154 |
// The day is expected to be within the range of month_days of C
|
227 |
#[allow(clippy::unwrap_used)] // day and month have the correct bounds
|
228 |
*Date::try_new_coptic_date(year, month, day).unwrap().inner()
|
262 |
#[allow(clippy::unwrap_used)] // Coptic and Ethiopic have the same allowed ranges for dates
|
263 |
*Date::try_new_ethiopian_date(
|
347 |
let (time, extra_days) = types::Time::from_minute_with_remainder_days(minute);
|
348 |
#[allow(clippy::unwrap_used)] // constant date
|
349 |
let unix_epoch = DateTime::try_new_iso_datetime(1970, 1, 1, 0, 0, 0).unwrap();
|
426 |
#[allow(clippy::unwrap_used)] // month in 1..=12, day <= month_days
|
427 |
Date::try_new_iso_date(year, month, day).unwrap()
|
453 |
fn iso_new_year(year: i32) -> i32 {
|
454 |
#[allow(clippy::unwrap_used)] // valid day and month
|
455 |
Self::fixed_from_iso_integers(year, 1, 1).unwrap()
|
461 |
let prior_days = date - Self::iso_new_year(year);
|
462 |
#[allow(clippy::unwrap_used)] // valid day and month
|
463 |
let correction = if date < Self::fixed_from_iso_integers(year, 3, 1).unwrap() {
|
470 |
let month = quotient(12 * (prior_days + correction) + 373, 367) as u8; // in 1..12 < u8::MAX
|
471 |
#[allow(clippy::unwrap_used)] // valid day and month
|
472 |
let day = (date - Self::fixed_from_iso_integers(year, month, 1).unwrap() + 1) as u8; // <= days_in_month < u8::MAX
|
267 |
#[allow(clippy::unwrap_used)] // day and month have the correct bounds
|
268 |
*Date::try_new_julian_date(year, month, day).unwrap().inner()
|
484 |
let (hours, minutes) = (minute_in_day / 60, minute_in_day % 60);
|
485 |
#[allow(clippy::unwrap_used)] // values are moduloed to be in range
|
486 |
(
|
197 |
);
|
198 |
#[allow(clippy::unwrap_used)] // TODO(#1668) Clippy exceptions need docs or fixing.
|
199 |
trie_result.unwrap()
|
326 |
// https://github.com/rust-lang/rust/issues/15701
|
327 |
#[allow(clippy::unwrap_used)]
|
328 |
let variable_top = if self.options.alternate_handling() == AlternateHandling::NonIgnorable {
|
343 |
// https://github.com/rust-lang/rust/issues/15701
|
344 |
#[allow(clippy::unwrap_used)]
|
345 |
let numeric_primary = if self.options.numeric() {
|
359 |
// https://github.com/rust-lang/rust/issues/15701
|
360 |
#[allow(clippy::unwrap_used)]
|
361 |
let mut left = CollationElements::new(
|
374 |
// https://github.com/rust-lang/rust/issues/15701
|
375 |
#[allow(clippy::unwrap_used)]
|
376 |
let mut right = CollationElements::new(
|
1918 |
// digit to even start numeric processing.
|
1919 |
#[allow(clippy::unwrap_used)]
|
1920 |
let mut value = u32::from(*digit_iter.next().unwrap());
|
2003 |
// `unwrap` succeeds by construction
|
2004 |
#[allow(clippy::unwrap_used)]
|
2005 |
let mut pair = if len & 1 == 1 {
|
2176 |
// means the `unwrap()` must succeed.
|
2177 |
#[allow(clippy::unwrap_used)]
|
2178 |
let combining = self.next_internal().unwrap().c_and_c;
|
142 |
if let Some(slice) = self.contexts.get_subslice(index..self.contexts.len()) {
|
143 |
#[allow(clippy::unwrap_used)]
|
144 |
if slice.len() >= 2 {
|
438 |
impl<'data> CollationSpecialPrimariesV1<'data> {
|
439 |
#[allow(clippy::unwrap_used)]
|
440 |
pub(crate) fn last_primary_for_group(&self, max_variable: MaxVariable) -> u32 {
|
29 |
let inv_list: ZeroVec<u32> = ZeroVec::alloc_from_slice(&self.intervals);
|
30 |
#[allow(clippy::unwrap_used)] // by invariant
|
31 |
CodePointInversionList::try_from_inversion_list(inv_list).unwrap()
|
23 |
let inv_list: ZeroVec<u32> = ZeroVec::alloc_from_slice(&set);
|
24 |
#[allow(clippy::unwrap_used)] // valid
|
25 |
Ok(CodePointInversionList::try_from_inversion_list(inv_list).unwrap())
|
14 |
#[allow(clippy::indexing_slicing)] // windows
|
15 |
#[allow(clippy::unwrap_used)] // by is_empty check
|
16 |
pub fn is_valid_zv(inv_list_zv: &ZeroVec<'_, u32>) -> bool {
|
172 |
];
|
173 |
#[allow(clippy::unwrap_used)] // valid bytes
|
174 |
let index: ZeroVec<u16> = ZeroVec::parse_byte_slice(index_array_as_bytes).unwrap();
|
175 |
#[allow(clippy::unwrap_used)] // valid bytes
|
176 |
let data: ZeroVec<u8> = ZeroVec::parse_byte_slice(data_8_array).unwrap();
|
193 |
#[allow(clippy::unwrap_used)] // valid data
|
194 |
CodePointTrie::try_new(trie_header, index, data).unwrap()
|
115 |
fn from_unaligned(unaligned: Self::ULE) -> Self {
|
116 |
#[allow(clippy::unwrap_used)] // OK because the ULE is pre-validated
|
117 |
Self::from_idx(unaligned.0).unwrap()
|
176 |
fn from_unaligned(unaligned: Self::ULE) -> Self {
|
177 |
#[allow(clippy::unwrap_used)] // OK because the ULE is pre-validated
|
178 |
Self::from_idx(unaligned.0).unwrap()
|
130 |
let value = unaligned.0;
|
131 |
#[allow(clippy::unwrap_used)] // validated
|
132 |
if PatternItemULE::determine_field_from_u8(value[0]) {
|
265 |
} else {
|
266 |
#[allow(clippy::unwrap_used)] // validated
|
267 |
Self::Literal(
|
25 |
GenericPatternItem::Placeholder(idx) => {
|
26 |
#[allow(clippy::unwrap_used)] // idx is a valid base-10 digit
|
27 |
let replacement = replacements.get(idx as usize).ok_or_else(|| {
|
64 |
GenericPatternItem::Placeholder(idx) => {
|
65 |
#[allow(clippy::unwrap_used)] // idx is a valid base-10 digit
|
66 |
return Err(PatternError::UnknownSubstitution(
|
156 |
/// Returns the represented [`DFA`]
|
157 |
#[allow(clippy::unwrap_used)] // by invariant
|
158 |
pub fn deref(&'data self) -> DFA<&'data [u8]> {
|
114 |
match v.len() {
|
115 |
#[allow(clippy::unwrap_used)]
|
116 |
// we know that the vec has exactly one element left
|
136 |
0 => ShortVec::Empty,
|
137 |
#[allow(clippy::unwrap_used)] // we know that the vec is not empty
|
138 |
1 => ShortVec::Single(v.into_iter().next().unwrap()),
|
1170 |
// Now we need to check if composition with an upcoming starter is possible.
|
1171 |
#[allow(clippy::unwrap_used)]
|
1172 |
if self.decomposition.pending.is_some() {
|
273 |
fn supported_locales(&self) -> Result<Vec<DataLocale>, DataError> {
|
274 |
#[allow(clippy::unwrap_used)] // datagen
|
275 |
Ok(Self::DATA
|
177 |
if let Some(value) = self.backup_extension.take() {
|
178 |
#[allow(clippy::unwrap_used)] // not reachable unless extension_key is present
|
179 |
locale.set_unicode_ext(self.config.extension_key.unwrap(), value);
|
145 |
// The statically compiled data file is valid.
|
146 |
#[allow(clippy::unwrap_used)]
|
147 |
LocaleFallbackProvider::try_new_unstable(unstable_no_fallback()).unwrap()
|
165 |
// The baked data is valid.
|
166 |
#[allow(clippy::unwrap_used)]
|
167 |
LocaleFallbackProvider::try_new_with_any_provider(any_no_fallback()).unwrap()
|
182 |
// The statically compiled data file is valid.
|
183 |
#[allow(clippy::unwrap_used)]
|
184 |
LocaleFallbackProvider::try_new_with_buffer_provider(buffer_no_fallback()).unwrap()
|
28 |
let inv_list: ZeroVec<u32> = ZeroVec::alloc_from_slice(&self.intervals);
|
29 |
#[allow(clippy::unwrap_used)] // TODO(#1668) Clippy exceptions need docs or fixing.
|
30 |
UnicodeSet::from_inversion_list(inv_list).unwrap()
|
23 |
let inv_list: ZeroVec<u32> = ZeroVec::alloc_from_slice(&set);
|
24 |
#[allow(clippy::unwrap_used)] // TODO(#1668) Clippy exceptions need docs or fixing.
|
25 |
Ok(UnicodeSet::from_inversion_list(inv_list).unwrap())
|
40 |
fn from_ecma_locale<L: ecma402_traits::Locale>(other: L) -> Self {
|
41 |
#[allow(clippy::unwrap_used)] // ecma402_traits::Locale::to_string is a valid locale
|
42 |
Self(
|
113 |
let nstr = fixed_format(n, &opts);
|
114 |
#[allow(clippy::unwrap_used)] // TODO(#1668) Clippy exceptions need docs or fixing.
|
115 |
let ret = nstr.parse().unwrap();
|
33 |
#[allow(clippy::unwrap_used)]
|
34 |
pub(crate) fn sort_lex_with_map<F: Float, MAP>(list: &mut [Complex<F>], keys: &[Keys],
|
21 |
fn main() -> ! {
|
22 |
#[allow(clippy::unwrap_used)]
|
23 |
let cp = cortex_m::Peripherals::take().unwrap();
|
24 |
#[allow(clippy::unwrap_used)]
|
25 |
let dp = pac::Peripherals::take().unwrap();
|
21 |
fn main() -> ! {
|
22 |
#[allow(clippy::unwrap_used)]
|
23 |
let cp = cortex_m::Peripherals::take().unwrap();
|
24 |
#[allow(clippy::unwrap_used)]
|
25 |
let dp = pac::Peripherals::take().unwrap();
|
299 |
) -> Value {
|
300 |
#[allow(clippy::option_unwrap_used)]
|
301 |
preserve_keys(map.as_object_mut().unwrap(), keywords_to_remove);
|
155 |
// We flush stdout so it'll write the buffer to screen, continuing operation. Without it, the application halts.
|
156 |
#[allow(clippy::unwrap_used)]
|
157 |
io::stdout().flush().unwrap();
|
96 |
// the error by using `Result<Vec<_>, _>` with `collect`.
|
97 |
#[allow(clippy::unwrap_used)]
|
98 |
let data: Result<Vec<_>, _> = reader
|
30 |
#[allow(clippy::unwrap_used)]
|
31 |
if config_dir.join(config::CONFIG_BASENAME).exists()
|
39 |
#[allow(clippy::unwrap_used)]
|
40 |
let store_dir = matches.get_one::<PathBuf>("store-dir").unwrap().as_path();
|
47 |
#[allow(clippy::unwrap_used)]
|
48 |
let password = if !*matches.get_one::<bool>("insecure-not-wrapped").unwrap() {
|
63 |
let mut agent = agent::Agent::new()?;
|
64 |
#[allow(clippy::unwrap_used)]
|
65 |
if !matches.get_one::<bool>("foreground").unwrap() {
|
87 |
#[allow(clippy::unwrap_used)]
|
88 |
if *matches.get_one::<bool>("quit").unwrap() {
|
64 |
// Safe unwrap: alphabet.chars() is always nonempty.
|
65 |
#[allow(clippy::unwrap_used)]
|
66 |
secret.push(alphabet.chars().choose(&mut rng).unwrap());
|
80 |
// Unwrap safety: take_terse_fields checks FIELD_COUNT to ensure sufficient elements.
|
81 |
#[allow(clippy::unwrap_used)]
|
82 |
(fields.pop().unwrap(), fields.pop().unwrap())
|
117 |
// Unwrap safety: take_terse_fields checks FIELD_COUNT to ensure sufficient elements.
|
118 |
#[allow(clippy::unwrap_used)]
|
119 |
(fields.pop().unwrap(), fields.pop().unwrap())
|
143 |
// Unwrap safety: take_terse_fields checks FIELD_COUNT to ensure sufficient elements.
|
144 |
#[allow(clippy::unwrap_used)]
|
145 |
let contents = Self::take_terse_fields()?.pop().unwrap();
|
19 |
for needle_char in &needle[1..] {
|
20 |
#[allow(clippy::option_unwrap_used)]
|
21 |
let mut distance: usize = *lsp.last().unwrap();
|
375 |
#[inline]
|
376 |
#[allow(clippy::unwrap_used)]
|
377 |
pub fn get_or_insert(&self, key: K, value: V, guard: &'guard Guard) -> &'guard V {
|
27 |
// safety: stdin/stdout is only taken once, panic unlikely
|
28 |
#[allow(clippy::unwrap_used)]
|
29 |
pub fn new(cmd: &str) -> io::Result<Self> {
|
71 |
// safety: regex is known to compile fine, no panic
|
72 |
#[allow(clippy::unwrap_used)]
|
73 |
pub fn new() -> Self {
|
176 |
// panic though.
|
177 |
#[allow(clippy::unwrap_used)]
|
178 |
impl CoverageData {
|
559 |
// safety: guaranteed, using sorted keys as input
|
560 |
#[allow(clippy::unwrap_used)]
|
561 |
let cd_line = cd.lines.get(line_number).unwrap();
|
18 |
#[must_use]
|
19 |
#[allow(clippy::unwrap_used)]
|
20 |
/// # Panics
|
62 |
#[allow(clippy::option_unwrap_used)]
|
63 |
#[allow(clippy::wildcard_enum_match_arm)]
|
66 |
#[allow(clippy::option_unwrap_used)]
|
67 |
#[allow(clippy::result_unwrap_used)]
|
68 |
fn list<N: Into<PathBuf>>(&self, prefix: N) -> Result<Vec<(DatasetKind, PathBuf)>> {
|
165 |
impl ZfsOpen3 {
|
166 |
#[allow(clippy::option_unwrap_used)]
|
167 |
fn stdout_to_list_of_datasets(z: &mut Command) -> Result<Vec<PathBuf>, Error> {
|
61 |
#[allow(clippy::option_unwrap_used, clippy::wildcard_enum_match_arm)]
|
62 |
pub(crate) fn from_pest_pair(pair: Pair<'_, Rule>) -> Zpool {
|
121 |
#[inline]
|
122 |
#[allow(clippy::option_unwrap_used, clippy::result_unwrap_used, clippy::wildcard_enum_match_arm)]
|
123 |
fn get_error_statistics_from_pair(pair: Pair<'_, Rule>) -> ErrorStatistics {
|
133 |
#[inline]
|
134 |
#[allow(clippy::option_unwrap_used, clippy::wildcard_enum_match_arm)]
|
135 |
fn set_stats_and_reason_from_pool_line(pool_line: Pair<'_, Rule>, zpool: &mut ZpoolBuilder) {
|
191 |
#[inline]
|
192 |
#[allow(clippy::option_unwrap_used, clippy::wildcard_enum_match_arm)]
|
193 |
fn get_stats_and_reason_from_pairs(pairs: Pairs<'_, Rule>) -> (ErrorStatistics, Option<Reason>) {
|
192 |
/// Try to convert stderr into internal error type.
|
193 |
#[allow(clippy::option_unwrap_used)]
|
194 |
pub fn from_stderr(stderr_raw: &[u8]) -> ZpoolError {
|
117 |
match self.find_index(key) {
|
118 |
#[allow(clippy::unwrap_used)] // find_index returns a valid index
|
119 |
Ok(found) => Some(self.values.lm_get(found).unwrap().1),
|
254 |
match self.find_index(key) {
|
255 |
#[allow(clippy::unwrap_used)] // find_index returns a valid index
|
256 |
Ok(found) => Some(self.values.lm_get_mut(found).unwrap().1),
|
318 |
match self.values.lm_binary_search_by(|k| k.cmp(&key)) {
|
319 |
#[allow(clippy::unwrap_used)] // Index came from binary_search
|
320 |
Ok(found) => Some((
|
39 |
while i < self.values.lm_len() {
|
40 |
#[allow(clippy::unwrap_used)] // i is in range
|
41 |
let (k, v) = self.values.lm_get(i).unwrap();
|
113 |
while i < self.lm_len() {
|
114 |
#[allow(clippy::unwrap_used)] // i is in range
|
115 |
let (k, v) = self.lm_get(i).unwrap();
|
192 |
// `last()` cannot fail.
|
193 |
#[allow(clippy::unwrap_used)]
|
194 |
self.scopes.last().unwrap()
|
200 |
// `last()` cannot fail.
|
201 |
#[allow(clippy::unwrap_used)]
|
202 |
self.scopes.last_mut().unwrap()
|
268 |
// Unwrap safety: we check for at least one scope above, so this cannot fail.
|
269 |
#[allow(clippy::unwrap_used)]
|
270 |
let scope = self.scopes.pop().unwrap();
|
4 |
// Unwrap safety: None. If this fails, the build fails, and that's intended.
|
5 |
#[allow(clippy::unwrap_used)]
|
6 |
fn main() {
|
115 |
// Unwrap safety: we check for a nonempty spec above.
|
116 |
#[allow(clippy::unwrap_used)]
|
117 |
match spec.chars().next().unwrap() {
|
329 |
// bitstream here, but it's difficult to represent that at the type level during unrolling.
|
330 |
#[allow(clippy::unwrap_used)]
|
331 |
let block = entry.unwrap()?.as_block().ok_or_else(|| {
|
485 |
#[allow(clippy::unwrap_used)]
|
486 |
Ok(BitcodeModule {
|
4 |
// Unwrap safety: None. If this fails, the build fails, and that's intended.
|
5 |
#[allow(clippy::unwrap_used)]
|
6 |
fn main() {
|
341 |
// Unwrap safety: we check for a nonempty string above.
|
342 |
#[allow(clippy::unwrap_used)]
|
343 |
let id = value.chars().next().unwrap();
|
469 |
// into an infallible constant.
|
470 |
#[allow(clippy::unwrap_used)]
|
471 |
Self(vec![
|
499 |
// Unwrap safety: `pos` is a valid index returned above.
|
500 |
#[allow(clippy::unwrap_used)]
|
501 |
let mut other = self.0.get_mut(pos).unwrap();
|
727 |
// Unwrap safety: `pos` is a valid index returned above.
|
728 |
#[allow(clippy::unwrap_used)]
|
729 |
let mut other = self.0.get_mut(pos).unwrap();
|
44 |
#[cfg(test)]
|
45 |
#[allow(clippy::integer_arithmetic, clippy::unwrap_used)]
|
46 |
mod tests {
|
137 |
#[cfg(test)]
|
138 |
#[allow(clippy::unwrap_used)]
|
139 |
mod tests {
|
369 |
#[inline]
|
370 |
#[allow(clippy::unwrap_used)]
|
371 |
pub fn get_or_insert(&self, key: K, value: V, guard: &'guard Guard) -> &'guard V {
|
523 |
/// `load_inner` atomically loads the `MapInner` of hashmap.
|
524 |
#[allow(clippy::unwrap_used)]
|
525 |
fn load_inner(&self, guard: &'guard Guard) -> &'guard map_inner::MapInner<K, V> {
|
21 |
// u16::MAX is greater than 0
|
22 |
allow(clippy::missing_panics_doc, clippy::unwrap_used)
|
23 |
]
|
56 |
// Option will always exist
|
57 |
clippy::unwrap_used
|
58 |
)]
|
9 |
#[test]
|
10 |
#[allow(clippy::result_unwrap_used)]
|
11 |
fn mangling() {
|
43 |
#[test]
|
44 |
#[allow(clippy::result_unwrap_used)]
|
45 |
fn demangling() {
|
1348 |
#[allow(clippy::unwrap_used)]
|
1349 |
static TMP_DIR: Lazy<TempDir> = Lazy::new(|| tempdir().unwrap());
|
619 |
#[allow(clippy::unwrap_used)]
|
620 |
#[cfg(test)]
|
49 |
{
|
50 |
#[allow(clippy::unwrap_used)]
|
51 |
self.random_forward_neighbour(rng, NonZeroUsize::new(1).unwrap())
|
63 |
{
|
64 |
#[allow(clippy::unwrap_used)]
|
65 |
self.random_backward_neighbour(rng, NonZeroUsize::new(1).unwrap())
|
84 |
#[allow(clippy::result_unwrap_used, clippy::option_unwrap_used)]
|
85 |
#[cfg(test)]
|
317 |
#[allow(clippy::unwrap_used)]
|
318 |
fn sort_partial_by<F, T>(slice: &mut [T], f: F)
|
53 |
static GITHUB_HTTPS_URL: Lazy<Regex> = Lazy::new(|| {
|
54 |
#[allow(clippy::unwrap_used)]
|
55 |
Regex::new("^https?://(?P<domain>github\\.com)/(?P<owner>.*?)/(?P<repo>.*?)(/?|(?:\\.git))$")
|
59 |
static GITHUB_GIT_URL: Lazy<Regex> = Lazy::new(|| {
|
60 |
#[allow(clippy::unwrap_used)]
|
61 |
Regex::new("^git@(?P<domain>github\\.com):(?P<owner>.*?)/(?P<repo>.*?)(?:\\.git)?$").unwrap()
|
64 |
static GITHUB_SSH_URL: Lazy<Regex> = Lazy::new(|| {
|
65 |
#[allow(clippy::unwrap_used)]
|
66 |
Regex::new(
|
15 |
#[cfg(test)]
|
16 |
#[allow(clippy::expect_used, clippy::unwrap_used)]
|
17 |
impl Fixture {
|
145 |
// self.curr_dim_idx always points to a valid reference
|
146 |
clippy::unwrap_used
|
147 |
)]
|
154 |
// Constructor doesn't contain empty dimensions
|
155 |
clippy::unwrap_used
|
156 |
)]
|
145 |
// self.curr_dim_idx always points to a valid reference
|
146 |
clippy::unwrap_used
|
147 |
)]
|
154 |
// Constructor doesn't contain empty dimensions
|
155 |
clippy::unwrap_used
|
156 |
)]
|
142 |
let progress_println = |msg: &dyn AsRef<str>| {
|
143 |
#[allow(clippy::unwrap_used)]
|
144 |
progress.as_ref().unwrap().println(msg);
|
71 |
let mut parser = Parser::new_from(lexer);
|
72 |
#[allow(clippy::unwrap_used)]
|
73 |
let module = parser
|
74 |
let content = read_to_string(test_file)?;
|
75 |
#[allow(clippy::unwrap_used)]
|
76 |
let file = parse_file(&content).with_context(|| {
|
441 |
#[allow(clippy::unwrap_used)]
|
442 |
fn readme_contains_code_bulleted_list(items: &[&str]) -> bool {
|
23 |
pub trait Interface: std::fmt::Debug {
|
24 |
#[allow(clippy::unwrap_used)]
|
25 |
fn name(&self) -> String {
|
64 |
#[allow(clippy::expect_used)]
|
65 |
#[allow(clippy::unwrap_used)]
|
66 |
fn rewrite(&mut self, start: usize, end: usize, replacement: &str) -> String {
|
22 |
#[allow(clippy::unwrap_used)]
|
23 |
fn relative_path(&self) -> &Path {
|
167 |
#[allow(clippy::unwrap_used)]
|
168 |
let path = remote
|
81 |
#[allow(clippy::unwrap_used)]
|
82 |
let mut warning_state_map = WARNING_STATE_MAP.lock().unwrap();
|
112 |
#[test]
|
113 |
#[allow(clippy::unwrap_used)]
|
114 |
fn try_from() {
|
150 |
#[test]
|
151 |
#[allow(clippy::unwrap_used)]
|
152 |
fn serialize() {
|
159 |
#[test]
|
160 |
#[allow(clippy::unwrap_used)]
|
161 |
fn deserialize() {
|
170 |
#[should_panic]
|
171 |
#[allow(clippy::unwrap_used)]
|
172 |
fn deserialize_name_contains_slash() {
|
159 |
#[test]
|
160 |
#[allow(clippy::unwrap_used)]
|
161 |
fn serialize() {
|
168 |
#[test]
|
169 |
#[allow(clippy::unwrap_used)]
|
170 |
fn deserialize() {
|
65 |
#[allow(clippy::unwrap_used)]
|
66 |
impl fmt::Display for Permission {
|
167 |
#[cfg(test)]
|
168 |
#[allow(clippy::unwrap_used)]
|
169 |
mod test {
|
161 |
impl ToString for Manifest {
|
162 |
#[allow(clippy::unwrap_used)]
|
163 |
fn to_string(&self) -> String {
|
171 |
#[cfg(test)]
|
172 |
#[allow(clippy::unwrap_used)]
|
173 |
mod tests {
|
412 |
// it always or never fails
|
413 |
#[allow(clippy::unwrap_used)]
|
414 |
fn http_client() -> reqwest::blocking::Client {
|
434 |
// it always or never fails
|
435 |
#[allow(clippy::unwrap_used)]
|
436 |
fn http_client(allow_insecure: bool) -> reqwest::blocking::Client {
|
61 |
// If anyone ever find this to be a performance bottleneck in a real application, this can be fixed with some smarter implementation.
|
62 |
#[allow(clippy::unwrap_used)]
|
63 |
if let Some(index) = self.data.iter().position(|maybe_activity| {
|
65 |
/// Returns a reference to a value of the specified type, if such a value has previously been stored to the domain.
|
66 |
#[allow(clippy::unwrap_used)]
|
67 |
pub fn try_get<T: Any>(&self) -> Option<&T> {
|
72 |
/// Same as [`try_get`](#try_get) but grants mutable access to the object.
|
73 |
#[allow(clippy::unwrap_used)]
|
74 |
pub fn try_get_mut<T: Any>(&mut self) -> Option<&mut T> {
|
81 |
/// Return two mutable references to domain objects
|
82 |
#[allow(clippy::unwrap_used)]
|
83 |
pub fn try_get_2_mut<T1: Any, T2: Any>(&mut self) -> (Option<&mut T1>, Option<&mut T2>) {
|
115 |
/// [`try_get()`](#try_get) is usually recommended instead.
|
116 |
#[allow(clippy::unwrap_used)]
|
117 |
pub fn get<T: Any>(&self) -> &T {
|
123 |
/// [`try_get_mut()`](#try_get_mut) is usually recommended instead.
|
124 |
#[allow(clippy::unwrap_used)]
|
125 |
pub fn get_mut<T: Any>(&mut self) -> &mut T {
|
96 |
match good {
|
97 |
#[allow(clippy::unwrap_used)] // Supplier::produce() cannot fail.
|
98 |
Self::Good::Read { path } => self
|
100 |
/// Creates a new context to highlight a certain position
|
101 |
#[allow(clippy::unwrap_used)]
|
102 |
pub fn position(pos: &Position<'_>) -> Context {
|
133 |
}
|
134 |
#[allow(clippy::unwrap_used)]
|
135 |
parse_matrix(s, get_f64(&single.content, &context),pdb.scale.as_mut().unwrap(), &context)
|
140 |
}
|
141 |
#[allow(clippy::unwrap_used)]
|
142 |
parse_matrix(s, get_f64(&single.content, &context),pdb.origx.as_mut().unwrap(), &context)
|
365 |
// The previous lines make sure that there is no error in the vector.
|
366 |
#[allow(clippy::unwrap_used)]
|
367 |
let positions: Vec<Option<usize>> = positions_.iter().map(|i| *i.as_ref().unwrap()).collect();
|
436 |
{
|
437 |
#[allow(clippy::unwrap_used)]
|
438 |
Some([
|
482 |
(*pdb_pointer).add_model(Model::new(model_number));
|
483 |
#[allow(clippy::unwrap_used)]
|
484 |
(*pdb_pointer).models_mut().rev().next().unwrap()
|
383 |
let mut charge = 0;
|
384 |
#[allow(clippy::unwrap_used)]
|
385 |
if chars.len() >= 80 && !(chars[78] == ' ' && chars[79] == ' ') {
|
610 |
/// Adds all bonds to the PDB, has to be done after all Atoms are already in place
|
611 |
#[allow(clippy::unwrap_used)]
|
612 |
fn add_bonds(pdb: &mut PDB, bonds: Vec<(Context, LexItem)>) -> Vec<PDBError> {
|
46 |
/// It does change the output format based on the StrictnessLevel given.
|
47 |
#[allow(clippy::unwrap_used)]
|
48 |
pub fn save_mmcif_raw<T: Write>(pdb: &PDB, mut sink: BufWriter<T>) {
|
106 |
// in the upcoming architectural changes soon.
|
107 |
#[allow(clippy::unwrap_used)]
|
108 |
#[allow(clippy::fallible_impl_from)]
|
140 |
// Although there are plans to expand support for custom registries in the future.
|
141 |
#[allow(clippy::unwrap_used)]
|
142 |
#[allow(clippy::missing_panics_doc)]
|
233 |
#[allow(clippy::missing_panics_doc)]
|
234 |
#[allow(clippy::unwrap_used)]
|
235 |
#[allow(clippy::unwrap_in_result)]
|
186 |
#[allow(clippy::unwrap_used)]
|
187 |
#[allow(clippy::missing_panics_doc)]
|
18 |
#[allow(clippy::missing_panics_doc)]
|
19 |
#[allow(clippy::unwrap_used)]
|
20 |
#[allow(clippy::too_many_lines)]
|
39 |
#[allow(clippy::unwrap_used)]
|
40 |
// We run this one after linting.
|
135 |
#[allow(clippy::unwrap_in_result)]
|
136 |
#[allow(clippy::unwrap_used)]
|
137 |
pub fn fill_from_backup(root: &Utf8Path) -> Result<Self, CliError> {
|
167 |
#[allow(clippy::unwrap_used)]
|
168 |
pub fn extend_from_root_excluding_fields_dir_and_plow_backup(
|
243 |
#[allow(clippy::indexing_slicing)]
|
244 |
#[allow(clippy::unwrap_used)]
|
245 |
pub fn write_with_children(&mut self) -> Result<(), CliError> {
|
112 |
#[allow(clippy::unwrap_used)]
|
113 |
let root_field_name = root_field_manifest.field_namespace_and_name().unwrap();
|
157 |
// Filter underscores and '@' since they are the only allowed chars other than alphanumeric ones.
|
158 |
#[allow(clippy::unwrap_used)]
|
159 |
let name = namespace_and_name.pop().unwrap().replace('_', "");
|
161 |
#[allow(clippy::unwrap_used)]
|
162 |
let namespace = namespace_and_name
|
44 |
// We explicitly pass valid data, unwrap is safe here.
|
45 |
#[allow(clippy::unwrap_used)]
|
46 |
let annotations = graph
|
43 |
// We explicitly pass valid data, unwrap is safe here.
|
44 |
#[allow(clippy::unwrap_used)]
|
45 |
let annotations = graph
|
29 |
// TODO: Refactor and finish this function later
|
30 |
#[allow(clippy::unwrap_used)]
|
31 |
fn run(&self, linter: &Linter) -> LintResult {
|
37 |
// We explicitly pass valid data, unwrap is safe here.
|
38 |
#[allow(clippy::unwrap_used)]
|
39 |
let annotations = rdf_graph_borrow
|
58 |
// We know that `annotations` has at least one member here.
|
59 |
#[allow(clippy::unwrap_used)]
|
60 |
let annotation = annotations.iter().next().unwrap();
|
16 |
// TODO: Refactor unwraps
|
17 |
#[allow(clippy::unwrap_used)]
|
18 |
impl Lint for HasOntologyDeclaration {
|
32 |
// We explicitly pass valid data, unwrap is safe here.
|
33 |
#[allow(clippy::unwrap_used)]
|
34 |
let graph_borrow = linter.graph.inner.borrow();
|
50 |
// We explicitly pass valid data, unwrap is safe here.
|
51 |
#[allow(clippy::unwrap_used)]
|
52 |
if !has_exact_ontology_declaration {
|
60 |
// We explicitly pass valid data, unwrap is safe here.
|
61 |
#[allow(clippy::unwrap_used)]
|
62 |
let annotations = rdf_graph_borrow
|
93 |
// We explicitly pass valid data, unwrap is safe here.
|
94 |
#[allow(clippy::unwrap_used)]
|
95 |
let annotations = rdf_graph_borrow
|
87 |
if let Some(ssh_priv_key) = ssh_priv_key_to_callback {
|
88 |
#[allow(clippy::unwrap_used)]
|
89 |
callbacks.credentials(move |_url, username_from_url, _allowed_types| {
|
420 |
#[allow(clippy::unwrap_used)]
|
421 |
// This is fine, we have just inserted it.
|
439 |
#[allow(clippy::unwrap_used)]
|
440 |
let mut valid_versions_for_package = self
|
250 |
#[test]
|
251 |
#[allow(clippy::unwrap_used)]
|
252 |
fn test_get_tile_some() -> Result<()> {
|
105 |
#[cfg(test)]
|
106 |
#[allow(clippy::unwrap_used)]
|
107 |
mod test {
|
98 |
// point framework_cell has been initialized
|
99 |
#[allow(clippy::unwrap_used)]
|
100 |
let framework = framework_cell_2.get().unwrap().clone();
|
169 |
#[test]
|
170 |
#[allow(clippy::unwrap_used)]
|
171 |
fn test_unmarshal_with_dataset() {
|
75 |
#[cfg(feature = "panic-on-error")]
|
76 |
#[allow(clippy::unwrap_used)]
|
77 |
if let Some(error) = res.error() {
|
623 |
//UNWRAP: Checked at beginning of loop, functions must contain at least one value
|
624 |
#[allow(clippy::unwrap_used)]
|
625 |
let last_function = functions.last().unwrap();
|
749 |
// If we encountered INLINED functions (all `StackFrames`s in this Vec, except for the last one, which is the containing NON-INLINED function), these are simply added to the list of stack_frames we return.
|
750 |
#[allow(clippy::unwrap_used)]
|
751 |
let inlined_frame = cached_stack_frames.pop().unwrap(); // unwrap is safe while .len() > 1
|
760 |
// If there is only one stack frame, then it is a NON-INLINED function, and we will attempt to unwind further.
|
761 |
#[allow(clippy::unwrap_used)]
|
762 |
cached_stack_frames.pop().unwrap() // unwrap is safe for .len==1
|
218 |
#[allow(clippy::unwrap_used, clippy::expect_used)]
|
219 |
pub(crate) fn _print_all_attributes(
|
919 |
{
|
920 |
#[allow(clippy::unwrap_used)]
|
921 |
// Use of `unwrap` below is safe because we first check for `is_none()`.
|
402 |
#[cfg(test)]
|
403 |
#[allow(clippy::unwrap_used)]
|
404 |
mod test {
|
257 |
{
|
258 |
#[allow(clippy::unwrap_used)]
|
259 |
match target_core.attach_to_rtt(
|
90 |
#[cfg(test)]
|
91 |
#[allow(clippy::unwrap_used)]
|
92 |
mod tests {
|
45 |
#[cfg(test)]
|
46 |
#[allow(clippy::unwrap_used)]
|
47 |
mod tests {
|
90 |
#[cfg(test)]
|
91 |
#[allow(clippy::unwrap_used)]
|
92 |
mod tests {
|
45 |
#[cfg(test)]
|
46 |
#[allow(clippy::unwrap_used)]
|
47 |
mod tests {
|
68 |
pub async fn from_env(client_name: &str) -> Result<Self, RedditError> {
|
69 |
#[allow(clippy::unwrap_used)]
|
70 |
Self::try_from_env(client_name).await.unwrap()
|
170 |
let (sender, receiver) = oneshot::channel();
|
171 |
#[allow(clippy::unwrap_used)] // We don't handle poisoning
|
172 |
self.response_sender.lock().unwrap().insert(uuid, sender);
|
203 |
let (sender, receiver) = oneshot::channel();
|
204 |
#[allow(clippy::unwrap_used)] // We don't handle poisoning
|
205 |
self.response_sender.lock().unwrap().insert(uuid, sender);
|
86 |
#[allow(clippy::unwrap_used)] // We don't handle poisoning
|
87 |
let sender = sender.0.lock().unwrap().remove(&job.id()).ok_or(JobError::MissingSender)?;
|
302 |
#[cfg(debug_assertions)]
|
303 |
#[allow(clippy::unwrap_used)]
|
304 |
if let Some(export_path) = export_path {
|
202 |
#[test]
|
203 |
#[allow(clippy::result_unwrap_used)]
|
204 |
fn test_wait_when_protected() {
|
177 |
cipher.seek(<ChaCha20LegacyCore as BlockSizeUser>::BlockSize::to_usize());
|
178 |
#[allow(clippy::indexing_slicing, clippy::unwrap_used)]
|
179 |
cipher.apply_keystream(&mut plaintext_in_ciphertext_out[PACKET_LENGTH_LEN..]);
|
196 |
#[allow(clippy::indexing_slicing, clippy::unwrap_used)]
|
197 |
let tag_out = self
|
33 |
PublicKey::RSA { ref key, .. } => {
|
34 |
#[allow(clippy::unwrap_used)] // type known
|
35 |
let rsa = key.0.rsa().unwrap();
|
45 |
fn compute(&self, sequence_number: u32, payload: &[u8], output: &mut [u8]) {
|
46 |
#[allow(clippy::unwrap_used)]
|
47 |
let mut hmac = <M as digest::Mac>::new_from_slice(&self.key).unwrap();
|
48 |
#[allow(clippy::unwrap_used)]
|
49 |
let mut enc = self.common.encrypted.as_mut().unwrap();
|
144 |
#[allow(clippy::unwrap_used)]
|
145 |
let mut enc = self.common.encrypted.as_mut().unwrap();
|
116 |
#[allow(clippy::unwrap_used)]
|
117 |
pub async fn read_ssh_id(&mut self) -> Result<&[u8], Error> {
|
110 |
#[cfg(feature = "openssl")]
|
111 |
#[allow(clippy::unwrap_used)] // key is known to be private
|
112 |
key::KeyPair::RSA { ref key, .. } => {
|
297 |
#[allow(clippy::indexing_slicing, clippy::unwrap_used)]
|
298 |
// length is checked, hash already checked
|
56 |
impl Encoding for Vec<u8> {
|
57 |
#[allow(clippy::unwrap_used)] // writing into Vec<> can't panic
|
58 |
fn extend_ssh_string(&mut self, s: &[u8]) {
|
63 |
#[allow(clippy::unwrap_used)] // writing into Vec<> can't panic
|
64 |
fn extend_ssh_string_blank(&mut self, len: usize) -> &mut [u8] {
|
72 |
#[allow(clippy::unwrap_used)] // writing into Vec<> can't panic
|
73 |
#[allow(clippy::indexing_slicing)] // length is known
|
120 |
let rounds = kdfopts.read_u32()?;
|
121 |
#[allow(clippy::unwrap_used)] // parameters are static
|
122 |
#[allow(clippy::indexing_slicing)] // output length is static
|
134 |
b"aes128-cbc" => {
|
135 |
#[allow(clippy::unwrap_used)] // parameters are static
|
136 |
let cipher = cbc::Decryptor::<Aes128>::new_from_slices(key, iv).unwrap();
|
140 |
b"aes256-cbc" => {
|
141 |
#[allow(clippy::unwrap_used)] // parameters are static
|
142 |
let cipher = cbc::Decryptor::<Aes256>::new_from_slices(key, iv).unwrap();
|
146 |
b"aes128-ctr" => {
|
147 |
#[allow(clippy::unwrap_used)] // parameters are static
|
148 |
let mut cipher = Ctr64LE::<Aes128>::new_from_slices(key, iv).unwrap();
|
152 |
b"aes256-ctr" => {
|
153 |
#[allow(clippy::unwrap_used)] // parameters are static
|
154 |
let mut cipher = Ctr64LE::<Aes256>::new_from_slices(key, iv).unwrap();
|
11 |
#[allow(clippy::unwrap_used)]
|
12 |
static DEFAULT_API_SERVERS: Lazy<Vec<Url>> = Lazy::new(|| {
|
25 |
#[allow(clippy::unwrap_used)]
|
26 |
static DEFAULT_DOWNLOAD_SERVERS: Lazy<Vec<Url>> = Lazy::new(|| {
|
39 |
#[allow(clippy::unwrap_used)]
|
40 |
static DEFAULT_UPLOAD_SERVERS: Lazy<Vec<Url>> = Lazy::new(|| {
|
17 |
#[allow(clippy::unwrap_used)]
|
18 |
#[cfg(feature = "async")]
|
22 |
#[allow(clippy::unwrap_used)]
|
23 |
#[cfg(feature = "async")]
|
38 |
#[allow(clippy::unwrap_used)]
|
39 |
pub fn init_server() -> (MockServer, FilenSettings) {
|
96 |
#[allow(clippy::unwrap_used)]
|
97 |
let multipart = ctx.multipart.as_ref().unwrap();
|
82 |
#[allow(clippy::unwrap_used)]
|
83 |
let s = from_ascii(buf.as_ref()).unwrap();
|
49 |
/// on-stack formatting
|
50 |
#[allow(clippy::unwrap_used)]
|
51 |
pub fn fmt_timestamp<T>(val: &Timestamp, fmt: TimestampFormat, f: impl FnOnce(&[u8]) -> T) -> T {
|
129 |
/// Peeks the next event
|
130 |
#[allow(clippy::unwrap_used, clippy::unwrap_in_result)]
|
131 |
fn peek_event(&mut self) -> DeResult<DeEvent<'xml>> {
|
219 |
/// Set the reference message this message is a reply to.
|
220 |
#[allow(clippy::unwrap_used)] // allowing unwrap here because serializing MessageReference should never error
|
221 |
pub fn reference_message(&mut self, reference: impl Into<MessageReference>) -> &mut Self {
|
354 |
#[allow(clippy::unwrap_used)] // Allowing unwrap because all should be Some() by this point
|
355 |
#[instrument(skip(self))]
|
214 |
/// Use the given configuration to build the [`ComponentInteractionCollector`].
|
215 |
#[allow(clippy::unwrap_used)]
|
216 |
#[must_use]
|
251 |
type Output = Option<Arc<MessageComponentInteraction>>;
|
252 |
#[allow(clippy::unwrap_used)]
|
253 |
fn poll(mut self: Pin<&mut Self>, ctx: &mut FutContext<'_>) -> Poll<Self::Output> {
|
170 |
/// Only events with types passed to [`Self::add_event_type`] as counted towards this limit.
|
171 |
#[allow(clippy::unwrap_used)]
|
172 |
pub fn filter_limit(mut self, limit: u32) -> Self {
|
181 |
/// passes all the requirements.
|
182 |
#[allow(clippy::unwrap_used)]
|
183 |
pub fn collect_limit(mut self, limit: u32) -> Self {
|
192 |
/// This is the last step to pass for a event to count as *collected*.
|
193 |
#[allow(clippy::unwrap_used)]
|
194 |
pub fn filter<F: Fn(&Arc<Event>) -> bool + 'static + Send + Sync>(
|
204 |
/// If an event does not have one of these types, it won't be received.
|
205 |
#[allow(clippy::unwrap_used)]
|
206 |
pub fn add_event_type(mut self, event_type: EventType) -> Self {
|
213 |
/// If an event does not have this ID, it won't be received.
|
214 |
#[allow(clippy::unwrap_used)]
|
215 |
pub fn add_user_id(mut self, user_id: impl Into<UserId>) -> Self {
|
186 |
/// passes all the requirements.
|
187 |
#[allow(clippy::unwrap_used)]
|
188 |
#[must_use]
|
17 |
#[cfg_attr(feature = "cargo-clippy", allow(result_unwrap_used))]
|
18 |
fn to_socket_addrs_ext(&self) -> io::Result<Self::Iter> {
|
128 |
#[allow(clippy::missing_panics_doc, clippy::unwrap_used)]
|
129 |
#[must_use]
|
305 |
/// Scan a single file for `unsafe` usage.
|
306 |
#[allow(clippy::unwrap_used)]
|
307 |
pub fn find_unsafe_in_file(
|
125 |
#[allow(clippy::expect_used, clippy::unwrap_used)]
|
126 |
fn find_rs_files_in_package(pack: &Package) -> Vec<RsFile> {
|
182 |
/// downloads fail
|
183 |
#[allow(clippy::unwrap_used)]
|
184 |
fn get_many<'a>(
|
20 |
#[allow(clippy::missing_panics_doc, clippy::unwrap_used)]
|
21 |
#[must_use]
|
86 |
#[allow(clippy::missing_panics_doc, clippy::expect_used, clippy::unwrap_used)]
|
87 |
pub fn configure_rustup_toolchain() {
|
189 |
#[allow(clippy::unwrap_used)]
|
190 |
#[cfg(test)]
|
56 |
fn put_usize_as_u16_unwrapped(&mut self, v: usize) -> io::Result<()> {
|
57 |
#[allow(clippy::unwrap_used)]
|
58 |
Self::put_u16(self, u16::try_from(v).unwrap())
|
62 |
fn put_usize_as_u32_unwrapped(&mut self, v: usize) -> io::Result<()> {
|
63 |
#[allow(clippy::unwrap_used)]
|
64 |
Self::put_u32(self, u32::try_from(v).unwrap())
|
261 |
#[allow(clippy::unwrap_used)]
|
262 |
#[cfg(test)]
|
391 |
unsafe fn median_unchecked(&mut self) -> T {
|
392 |
#[allow(clippy::unwrap_used)]
|
393 |
self.median().unwrap()
|
84 |
#[allow(clippy::unwrap_used)]
|
85 |
pub fn image(&self) -> oci_distribution::Reference {
|
175 |
#[allow(clippy::unwrap_used)]
|
176 |
pub fn image(&self) -> oci_distribution::Reference {
|
28 |
for _ in 0..count {
|
29 |
#[allow(clippy::unwrap_used)]
|
30 |
res.write_all(x).unwrap();
|
48 |
#[allow(clippy::unwrap_in_result)]
|
49 |
#[allow(clippy::unwrap_used)]
|
50 |
pub fn cool(&self, k: usize, t: F, t_0: F) -> Result<F> {
|
736 |
#[allow(clippy::unwrap_used)]
|
737 |
let player = get_first_dwz(
|
823 |
#[allow(clippy::unwrap_used)]
|
824 |
let bad_player = get_first_dwz(
|
851 |
#[allow(clippy::unwrap_used)]
|
852 |
let really_bad_player = get_first_dwz(
|
20 |
fn input(&self, prompt: &str) -> String {
|
21 |
#[allow(clippy::unwrap_used)]
|
22 |
Input::new()
|
29 |
fn input_letter(&self, prompt: &str, choices: &str) -> String {
|
30 |
#[allow(clippy::unwrap_used)]
|
31 |
Input::new()
|
44 |
fn select(&self, prompt: &str, choices: &[&str]) -> Option<usize> {
|
45 |
#[allow(clippy::unwrap_used)]
|
46 |
Select::new()
|
57 |
fn confirm(&self, prompt: &str) -> bool {
|
58 |
#[allow(clippy::unwrap_used)]
|
59 |
Confirm::new().with_prompt(prompt).interact().unwrap()
|
2303 |
#[cfg(feature = "unstable")]
|
2304 |
#[allow(clippy::option_unwrap_used)]
|
2305 |
#[inline]
|
2303 |
#[cfg(feature = "unstable")]
|
2304 |
#[allow(clippy::option_unwrap_used)]
|
2305 |
#[inline]
|
1135 |
// inserted, providing no new information. Useful in `SectionTree` proptest where we want new_information_only.
|
1136 |
#[allow(clippy::unwrap_used)]
|
1137 |
pub(crate) fn arb_sections_dag_and_proof_chains(
|
78 |
#[cfg(feature = "proptest")]
|
79 |
#[allow(clippy::unwrap_used)]
|
80 |
pub mod proptesting {
|
160 |
#[cfg(test)]
|
161 |
#[allow(clippy::unwrap_used)]
|
162 |
mod test {
|
76 |
#[cfg(test)]
|
77 |
#[allow(clippy::unwrap_used, clippy::integer_arithmetic)]
|
78 |
mod tests {
|
54 |
#[cfg(test)]
|
55 |
#[allow(clippy::unwrap_used)]
|
56 |
mod tests {
|
32 |
#[should_panic(expected = "test")]
|
33 |
#[allow(unreachable_code, clippy::unwrap_used)]
|
34 |
async fn test_own_transaction_panic() {
|
263 |
#[cfg(test)]
|
264 |
#[allow(clippy::unwrap_used, clippy::integer_arithmetic)]
|
265 |
mod tests {
|
13 |
#[cfg(test)]
|
14 |
#[allow(clippy::unwrap_used)]
|
15 |
mod test_utils;
|
37 |
#[cfg(test)]
|
38 |
#[allow(clippy::unwrap_used)]
|
39 |
mod tests {
|
840 |
#[cfg(test)]
|
841 |
#[allow(clippy::unwrap_used)]
|
842 |
mod tests {
|
83 |
#[cfg(test)]
|
84 |
#[allow(clippy::unwrap_used)]
|
85 |
mod tests {
|
794 |
#[cfg(test)]
|
795 |
#[allow(clippy::unwrap_used)]
|
796 |
mod tests {
|
183 |
#[cfg(test)]
|
184 |
#[allow(clippy::unwrap_used)]
|
185 |
mod tests {
|
402 |
#[allow(
|
403 |
clippy::unwrap_used,
|
404 |
clippy::integer_arithmetic,
|
108 |
#[cfg(test)]
|
109 |
#[allow(clippy::unwrap_used)]
|
110 |
mod tests {
|
63 |
#[cfg(test)]
|
64 |
#[allow(clippy::unwrap_used, clippy::integer_arithmetic)]
|
65 |
mod tests {
|
114 |
#[cfg(test)]
|
115 |
#[allow(clippy::unwrap_used)]
|
116 |
mod tests {
|
174 |
clippy::missing_const_for_fn,
|
175 |
clippy::unwrap_used,
|
176 |
clippy::wildcard_imports
|
166 |
// Unwrap safety: BASE_URL is a correct URL and our parameters cannot cause an error.
|
167 |
#[allow(clippy::unwrap_used)]
|
168 |
let url = Url::parse_with_params(
|
211 |
// we know there is at least one value
|
212 |
#[allow(clippy::unwrap_used)]
|
213 |
let face_idx = IntoIterator::into_iter(faces)
|
63 |
#[allow(unused, clippy::unwrap_used)]
|
64 |
pub fn width(&self) -> u64 {
|
68 |
#[allow(unused, clippy::unwrap_used)]
|
69 |
pub fn height(&self) -> u64 {
|
73 |
#[allow(unused, clippy::unwrap_used)]
|
74 |
pub fn length(&self) -> u64 {
|
78 |
#[allow(unused, clippy::unwrap_used, clippy::indexing_slicing)]
|
79 |
pub fn blocks(&self) -> impl Iterator<Item = (BlockLocation, BlockState)> + '_ {
|
16 |
let user = evaluate_xpath_node(repo_a, "./span/text()")?.into_string();
|
17 |
#[allow(clippy::unwrap_used)]
|
18 |
let name = repo_a
|
156 |
#[cfg(test)]
|
157 |
#[allow(clippy::unwrap_used)]
|
158 |
mod test {
|
180 |
#[cfg(test)]
|
181 |
#[allow(clippy::unwrap_used)]
|
182 |
mod tests {
|
159 |
#[cfg(test)]
|
160 |
#[allow(clippy::unwrap_used)]
|
161 |
mod test {
|
397 |
#[cfg(test)]
|
398 |
#[allow(clippy::unwrap_used, clippy::cognitive_complexity)]
|
399 |
mod test {
|
695 |
// These try_into() calls can't fail, so unwrap() can't panic.
|
696 |
#[allow(clippy::unwrap_used)]
|
697 |
UnusedTimings {
|
1510 |
mod test {
|
1511 |
#![allow(clippy::unwrap_used)]
|
1512 |
use super::*;
|
422 |
#[cfg(test)]
|
423 |
#[allow(clippy::unwrap_used)] // why is this not the default in tests
|
424 |
mod test {
|
654 |
#[allow(unreachable_pub)] // impl_standard_builder wants to make pub fns
|
655 |
#[allow(clippy::unwrap_used)] // OK in tests
|
656 |
mod test {
|
250 |
#[cfg(test)]
|
251 |
#[allow(clippy::unwrap_used, clippy::print_stderr)]
|
252 |
mod test {
|
629 |
// Unwrap should be safe due to parent `.is_some()` check
|
630 |
#[allow(clippy::unwrap_used)]
|
631 |
let _ = on_usable.take().unwrap().send(());
|
676 |
mod test {
|
677 |
#![allow(clippy::unwrap_used)]
|
678 |
use super::*;
|
817 |
#[allow(clippy::unwrap_used)]
|
818 |
#[cfg(test)]
|
119 |
// so this conversion will succeed, so this unwrap can't panic.
|
120 |
#[allow(clippy::unwrap_used)]
|
121 |
let nz: NonZeroU32 = OldError::CUSTOM_START.try_into().unwrap();
|
127 |
mod test {
|
128 |
#![allow(clippy::unwrap_used)]
|
129 |
use super::*;
|
380 |
#[allow(clippy::many_single_char_names)]
|
381 |
#[allow(clippy::unwrap_used)]
|
382 |
#[allow(clippy::cognitive_complexity)]
|
140 |
// The unwrap() is safe because array is nonempty.
|
141 |
#[allow(clippy::unwrap_used)]
|
142 |
fn max_weight(&self) -> u32 {
|
318 |
// The unwrap() is safe because `w` is nonempty.
|
319 |
#[allow(clippy::unwrap_used)]
|
320 |
let w_max = w.iter().map(RelayWeight::max_weight).max().unwrap();
|
401 |
mod test {
|
402 |
#![allow(clippy::unwrap_used)]
|
403 |
use super::*;
|
211 |
// returned an Error
|
212 |
#[allow(clippy::unwrap_used)]
|
213 |
let first_item = body.first_item().unwrap();
|
223 |
// returned an Error
|
224 |
#[allow(clippy::unwrap_used)]
|
225 |
let last_item = body.last_item().unwrap();
|
286 |
// have already returned an Error
|
287 |
#[allow(clippy::unwrap_used)]
|
288 |
let mut tag = crosscert.obj_tag().unwrap();
|
309 |
// returned an Error
|
310 |
#[allow(clippy::unwrap_used)]
|
311 |
let start_offset = body.first_item().unwrap().offset_in(s).unwrap();
|
416 |
mod test {
|
417 |
#![allow(clippy::unwrap_used)]
|
418 |
use super::*;
|
262 |
// had there not been at least one item.
|
263 |
#[allow(clippy::unwrap_used)]
|
264 |
let first = body.first_item().unwrap();
|
270 |
// Unwrap is safe here because we are parsing these strings from s
|
271 |
#[allow(clippy::unwrap_used)]
|
272 |
util::str::str_offset(s, first.kwd_str()).unwrap()
|
456 |
mod test {
|
457 |
#![allow(clippy::unwrap_used)]
|
458 |
use super::*;
|
279 |
#[test]
|
280 |
#[allow(clippy::unwrap_used)]
|
281 |
fn it_dies_if_dropped() {
|
8 |
#[allow(clippy::unwrap_used)] // ok since its a lit and tests hit this.
|
9 |
static RE: once_cell::sync::Lazy<regex::Regex> =
|
126 |
// unwrap ok since idxs coming from same vec
|
127 |
#[allow(clippy::unwrap_used)]
|
128 |
let field = self.field_from_id(i).unwrap();
|
188 |
let ptr = heap as *mut BinaryHeap<T>;
|
189 |
#[allow(clippy::unwrap_used)]
|
190 |
let mut data = (0..heap.len())
|
414 |
}
|
415 |
#[allow(clippy::unwrap_used)]
|
416 |
(0..index).fold(self.head, |node, _| unsafe { node.unwrap().as_ref().prev })
|
699 |
}
|
700 |
#[allow(clippy::unwrap_used)] // Index is valid
|
701 |
if index <= self.len / 2 {
|
162 |
}
|
163 |
#[allow(clippy::unwrap_used)] // We already the index is valid
|
164 |
(0..index).fold(self.top, |node, _| unsafe { node.unwrap().as_ref() }.prev)
|
105 |
#[inline(always)]
|
106 |
#[allow(clippy::unwrap_used, clippy::uninit_vec)]
|
107 |
fn parse_array(&mut self, len: usize) -> Value<'input> {
|
122 |
#[inline(always)]
|
123 |
#[allow(clippy::unwrap_used)]
|
124 |
fn parse_map(&mut self, len: usize) -> Value<'input> {
|
153 |
mod test {
|
154 |
#![allow(clippy::unwrap_used)]
|
155 |
use super::*;
|
52 |
#[cfg(test)]
|
53 |
#[allow(clippy::unwrap_used)]
|
54 |
mod test {
|
45 |
#[cfg(test)]
|
46 |
#[allow(clippy::unwrap_used)]
|
47 |
mod test {
|
175 |
/// If the `id` is 0 or when the usage count is over [`u16::MAX`]
|
176 |
#[allow(clippy::unwrap_used, clippy::integer_arithmetic)]
|
177 |
pub fn register(&self, id: u64) {
|
215 |
#[must_use]
|
216 |
#[allow(clippy::unwrap_in_result, clippy::unwrap_used)]
|
217 |
pub fn limit_duration(&self, id: u64) -> Option<Duration> {
|
233 |
#[allow(clippy::unwrap_used)]
|
234 |
#[tokio::test]
|
250 |
#[allow(clippy::unwrap_used)]
|
251 |
#[tokio::test]
|
91 |
/// If the fallback message or webhook content is somehow invalid
|
92 |
#[allow(clippy::unwrap_used, unused_must_use, clippy::print_stderr)]
|
93 |
pub async fn handle(&self, http: &Client, error: impl Display + Send) {
|
117 |
/// message
|
118 |
#[allow(unused_must_use, clippy::unwrap_used)]
|
119 |
async fn maybe_create_message(&self, http: &Client, error_message: &mut String) {
|
141 |
/// message
|
142 |
#[allow(unused_must_use, clippy::unwrap_used)]
|
143 |
async fn maybe_execute_webhook(&self, http: &Client, error_message: &mut String) {
|
109 |
/// If the webhook that was just inserted to the cache somehow doesn't exist
|
110 |
#[allow(clippy::unwrap_used)]
|
111 |
pub async fn get_infallible(
|
257 |
#[allow(clippy::unwrap_used)]
|
258 |
async fn mock_update(cache: &WebhooksCache, event: &Event) {
|
54 |
for _ in 0..1000 {
|
55 |
#[allow(clippy::unwrap_used)]
|
56 |
black_box(black_box(result).unwrap());
|
194 |
#[cfg(test)]
|
195 |
#[allow(clippy::unwrap_used)]
|
196 |
mod yaml_paths_tests {
|
86 |
#[cfg(test)]
|
87 |
#[allow(clippy::unwrap_used)]
|
88 |
mod tests {
|
39 |
clippy::indexing_slicing,
|
40 |
clippy::unwrap_used,
|
41 |
clippy::unwrap_in_result,
|
58 |
pub extern "C" fn module_entrypoint() -> Shared<Module> {
|
59 |
#[allow(clippy::unwrap_used)]
|
60 |
set_ahash_seed(Some([1, 2, 3, 4])).unwrap();
|
313 |
// UNWRAP: checked by first if branch
|
314 |
#[allow(clippy::unwrap_used)]
|
315 |
let (shprog, shopts) = sh.split_first().unwrap();
|
631 |
#[allow(clippy::iter_nth_zero)]
|
632 |
#[allow(clippy::unwrap_used)]
|
633 |
fn nth_and_next_give_same_results() {
|
73 |
impl CXmpError {
|
74 |
#[allow(dead_code, clippy::unwrap_used)] // only used in test code
|
75 |
pub(crate) fn new(had_error: bool, id: i32, debug_message: Option<&str>) -> Self {
|
90 |
}
|
91 |
#[allow(clippy::unwrap_used)]
|
92 |
String::from_utf8(v).unwrap()
|
99 |
#[cfg(test)]
|
100 |
#[allow(clippy::unwrap_used, clippy::integer_arithmetic)]
|
101 |
mod tests {
|
546 |
let new_count = 1 + (self.data.len() / old_width);
|
547 |
#[allow(clippy::unwrap_used)] // panic is documented in function contract
|
548 |
let new_bytes_len = new_count
|
230 |
pub fn iter_keys<'b>(&'b self) -> impl Iterator<Item = &'a <K as ZeroMapKV<'a>>::GetType> + 'b {
|
231 |
#[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len()
|
232 |
(0..self.keys.zvl_len()).map(move |idx| self.keys.zvl_get(idx).unwrap())
|
238 |
) -> impl Iterator<Item = &'a <V as ZeroMapKV<'a>>::GetType> + 'b {
|
239 |
#[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len() == values.zvl_len()
|
240 |
(0..self.values.zvl_len()).map(move |idx| self.values.zvl_get(idx).unwrap())
|
261 |
(
|
262 |
#[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len()
|
263 |
self.keys.zvl_get(idx).unwrap(),
|
264 |
#[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len() = values.zvl_len()
|
265 |
self.values.get(idx).unwrap(),
|
284 |
(
|
285 |
#[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len()
|
286 |
ZeroSlice::get(keys, idx).unwrap(),
|
298 |
(
|
299 |
#[allow(clippy::unwrap_used)] // idx is in-range
|
300 |
self.keys.zvl_get(idx).unwrap(),
|
301 |
#[allow(clippy::unwrap_used)] // idx is in-range
|
302 |
self.values.zvl_get(idx).unwrap(),
|
310 |
) -> impl ExactSizeIterator<Item = &'b <K as ZeroMapKV<'a>>::GetType> {
|
311 |
#[allow(clippy::unwrap_used)] // idx is in-range
|
312 |
(0..self.keys.zvl_len()).map(move |idx| self.keys.zvl_get(idx).unwrap())
|
318 |
) -> impl ExactSizeIterator<Item = &'b <V as ZeroMapKV<'a>>::GetType> {
|
319 |
#[allow(clippy::unwrap_used)] // idx is in-range
|
320 |
(0..self.values.zvl_len()).map(move |idx| self.values.zvl_get(idx).unwrap())
|
268 |
clippy::cast_sign_loss,
|
269 |
clippy::unwrap_used
|
270 |
)]
|
140 |
clippy::needless_pass_by_value,
|
141 |
clippy::unwrap_used
|
142 |
)]
|
5 |
pub fn criterion_benchmark(c: &mut Criterion) {
|
6 |
#![allow(clippy::unwrap_used)]
|
7 |
for year in 2015..=2022 {
|
4 |
fn problem_2015_1_1() {
|
5 |
#![allow(clippy::unwrap_used)]
|
6 |
let input = read_to_string("src/year2015/day01_input.txt").unwrap();
|
10 |
fn problem_2015_1_2() {
|
11 |
#![allow(clippy::unwrap_used)]
|
12 |
let input = read_to_string("src/year2015/day01_input.txt").unwrap();
|
16 |
fn problem_2015_2_1() {
|
17 |
#![allow(clippy::unwrap_used)]
|
18 |
let input = read_to_string("src/year2015/day02_input.txt").unwrap();
|
22 |
fn problem_2015_2_2() {
|
23 |
#![allow(clippy::unwrap_used)]
|
24 |
let input = read_to_string("src/year2015/day02_input.txt").unwrap();
|
28 |
fn problem_2015_3_1() {
|
29 |
#![allow(clippy::unwrap_used)]
|
30 |
let input = read_to_string("src/year2015/day03_input.txt").unwrap();
|
22 |
) -> Winner {
|
23 |
#![allow(clippy::unwrap_used)]
|
24 |
let mut seen_1 = HashSet::new();
|
26 |
fn decimal_to_snafu(mut decimal: i64) -> String {
|
27 |
#![allow(clippy::unwrap_used)]
|
28 |
if decimal == 0 {
|
34 |
clippy::unreachable,
|
35 |
clippy::unwrap_used
|
36 |
)]
|
1 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::equatable_if_let, clippy::unwrap_used, unused_imports)]
|
1 |
#![allow(clippy::equatable_if_let, clippy::unwrap_used, unused_imports)]
|
1 |
#![allow(clippy::equatable_if_let, clippy::unwrap_used)]
|
237 |
#![allow(clippy::single_char_pattern)]
|
238 |
#![allow(clippy::unwrap_used)]
|
239 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
43 |
// because it's OK if tests and benchmarks simply crash if things go wrong.
|
44 |
#![allow(clippy::unwrap_used)]
|
7 |
#![allow(clippy::single_char_pattern)]
|
8 |
#![allow(clippy::unwrap_used)]
|
9 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
7 |
#![allow(clippy::single_char_pattern)]
|
8 |
#![allow(clippy::unwrap_used)]
|
9 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
7 |
#![allow(clippy::single_char_pattern)]
|
8 |
#![allow(clippy::unwrap_used)]
|
9 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
7 |
#![allow(clippy::single_char_pattern)]
|
8 |
#![allow(clippy::unwrap_used)]
|
9 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
371 |
mod test {
|
372 |
#![allow(clippy::unwrap_used)]
|
373 |
use super::*;
|
1133 |
mod test {
|
1134 |
#![allow(clippy::unwrap_used)]
|
551 |
mod test {
|
552 |
#![allow(clippy::unwrap_used)]
|
553 |
use super::*;
|
7 |
#![allow(clippy::single_char_pattern)]
|
8 |
#![allow(clippy::unwrap_used)]
|
9 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
2 |
#![allow(clippy::pedantic)]
|
3 |
#![allow(clippy::unwrap_used)]
|
4 |
#![allow(clippy::nursery)]
|
97 |
mod tests {
|
98 |
#![allow(clippy::unwrap_used)]
|
26 |
mod tests {
|
27 |
#![allow(clippy::unwrap_used)]
|
371 |
mod tests {
|
372 |
#![allow(clippy::unwrap_used)]
|
28 |
clippy::unreachable,
|
29 |
clippy::unwrap_used
|
30 |
)]
|
56 |
mod tests {
|
57 |
#![cfg_attr(feature = "cargo-clippy", allow(result_unwrap_used))]
|
54 |
mod tests {
|
55 |
#![cfg_attr(feature = "cargo-clippy", allow(result_unwrap_used))]
|
1 |
#![allow(clippy::unwrap_used)]
|
610 |
pub mod tests {
|
611 |
#![allow(clippy::unwrap_used)]
|
307 |
#![allow(clippy::panic)]
|
308 |
#![allow(clippy::unwrap_used)]
|
106 |
#![allow(clippy::expect_used)]
|
107 |
#![allow(clippy::unwrap_used)]
|
246 |
#![allow(clippy::panic)]
|
247 |
#![allow(clippy::unwrap_used)]
|
143 |
#![allow(clippy::panic)]
|
144 |
#![allow(clippy::unwrap_used)]
|
263 |
#![allow(clippy::expect_used)]
|
264 |
#![allow(clippy::unwrap_used)]
|
207 |
#![allow(clippy::expect_used)]
|
208 |
#![allow(clippy::unwrap_used)]
|
87 |
#![allow(clippy::expect_used)]
|
88 |
#![allow(clippy::unwrap_used)]
|
74 |
#![allow(clippy::expect_used)]
|
75 |
#![allow(clippy::unwrap_used)]
|
74 |
#![allow(clippy::expect_used)]
|
75 |
#![allow(clippy::unwrap_used)]
|
237 |
pub mod tests {
|
238 |
#![allow(clippy::unwrap_used)]
|
5 |
allow(
|
6 |
missing_docs_in_private_items, option_unwrap_used, result_unwrap_used
|
7 |
)
|
1039 |
#![allow(deprecated)]
|
1040 |
#![allow(clippy::unwrap_used)]
|
28 |
clippy::unreachable,
|
29 |
clippy::unwrap_used
|
30 |
)]
|
33 |
#![allow(clippy::panic_in_result_fn)]
|
34 |
#![allow(clippy::unwrap_used)]
|
2 |
#![cfg_attr(stdsimd_strict, deny(warnings))]
|
3 |
#![allow(clippy::option_unwrap_used, clippy::print_stdout, clippy::use_debug)]
|
4 |
feature = "cargo-clippy",
|
5 |
allow(option_unwrap_used, print_stdout, use_debug)
|
6 |
)]
|
1 |
#![allow(clippy::unwrap_used)]
|
2 |
// Runs the BonCoder/BestCoder test (BC_test). It requires SUPER-CHIP quirks compatibility, and
|
378 |
mod test {
|
379 |
#![allow(clippy::unwrap_used)]
|
380 |
use crate::parser::link_url::{parse_url, punycode_encode, UrlInfo};
|
1 |
#![allow(clippy::unwrap_used)]
|
28 |
clippy::unreachable,
|
29 |
clippy::unwrap_used
|
30 |
)]
|
1 |
#![allow(unused_imports)]
|
2 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used)]
|
225 |
mod test {
|
226 |
#![allow(clippy::unwrap_used)]
|
525 |
mod test {
|
526 |
#![allow(clippy::unwrap_used)]
|
130 |
mod test {
|
131 |
#![allow(clippy::unwrap_used)]
|
312 |
mod test {
|
313 |
#![allow(clippy::unwrap_used)]
|
275 |
mod test {
|
276 |
#![allow(clippy::unwrap_used)]
|
3 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used)] // GitHub API wrapper `Option`s every damn thing for some reason
|
74 |
mod tests {
|
75 |
#![allow(clippy::unwrap_used)]
|
76 |
use super::*;
|
29 |
#![allow(clippy::print_stdout)]
|
30 |
#![allow(clippy::unwrap_used)]
|
31 |
#![allow(clippy::use_debug)]
|
250 |
mod test {
|
251 |
#![allow(clippy::unwrap_used)]
|
252 |
use super::*;
|
580 |
mod test {
|
581 |
#![allow(clippy::unwrap_used)]
|
582 |
use super::*;
|
146 |
mod test {
|
147 |
#![allow(clippy::unwrap_used)]
|
148 |
use super::*;
|
261 |
mod test {
|
262 |
#![allow(clippy::unwrap_used)]
|
263 |
use super::*;
|
389 |
mod test {
|
390 |
#![allow(clippy::unwrap_used)]
|
391 |
use super::*;
|
6 |
// `#![...]` it onto the entire module.
|
7 |
#![allow(clippy::result_unwrap_used)]
|
8 |
use log::{info, trace};
|
1 |
#![allow(clippy::unwrap_used)]
|
72 |
clippy::indexing_slicing,
|
73 |
clippy::unwrap_used,
|
74 |
clippy::expect_used,
|
6 |
fn invariant_unwrap<D: Display>(self, invariant: D) -> T {
|
7 |
#![allow(clippy::unwrap_used)]
|
8 |
self.invariant(invariant).unwrap()
|
12 |
clippy::indexing_slicing,
|
13 |
clippy::unwrap_used,
|
14 |
clippy::needless_borrow,
|
1 |
// safety: if tests panic we see it on CI
|
2 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used)]
|
138 |
// PANIC: `RwLock` usage is fully panic-safe here.
|
139 |
#![allow(clippy::unwrap_used)]
|
119 |
clippy::unwrap_in_result,
|
120 |
clippy::unwrap_used
|
121 |
)]
|
174 |
clippy::unwrap_in_result,
|
175 |
clippy::unwrap_used
|
176 |
)]
|
246 |
clippy::unwrap_in_result,
|
247 |
clippy::unwrap_used
|
248 |
)]
|
4 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used)]
|
1 |
//! CIFAR10 example.
|
2 |
#![allow(clippy::missing_docs_in_private_items, clippy::print_stdout, clippy::unwrap_used)]
|
1 |
//! Simple categorical example.
|
2 |
#![allow(clippy::missing_docs_in_private_items, clippy::print_stdout, clippy::unwrap_used)]
|
1 |
//! Simple example.
|
2 |
#![allow(clippy::missing_docs_in_private_items, clippy::print_stdout, clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used)]
|
2 |
use super::lexitem::*;
|
27 |
#![allow(clippy::unwrap_used)]
|
1 |
#![allow(clippy::unwrap_used, clippy::wildcard_imports, non_snake_case)]
|
2 |
use super::*;
|
8 |
clippy::expect_used,
|
9 |
clippy::unwrap_used,
|
10 |
clippy::wildcard_imports,
|
1 |
#![allow(clippy::unwrap_used)]
|
2 |
use git2::{Error, IndexAddOption, Object, ObjectType, Oid, Repository, Signature};
|
191 |
mod tests {
|
192 |
#![allow(clippy::unwrap_used)]
|
193 |
use reqwest::{
|
3 |
#![allow(clippy::unwrap_used, clippy::expect_used)]
|
720 |
mod tests {
|
721 |
#![allow(clippy::unwrap_used)]
|
722 |
use super::*;
|
1 |
#![allow(unused_results, clippy::unwrap_used, clippy::string_add)]
|
182 |
mod test {
|
183 |
#![allow(clippy::unwrap_used)]
|
184 |
use super::*;
|
304 |
mod test {
|
305 |
#![allow(clippy::unwrap_used)]
|
306 |
use super::*;
|
1 |
#![allow(clippy::as_conversions, clippy::unwrap_used)]
|
402 |
mod test {
|
403 |
#![allow(clippy::unwrap_used)]
|
404 |
use crate::{
|
1 |
#![allow(clippy::unwrap_used)] // this is test code, it's ok to unwrap
|
2 |
use tempfile::TempDir;
|
1 |
#![feature(test)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))]
|
1 |
#![feature(test)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))]
|
1 |
#![feature(test)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))]
|
1 |
#![feature(test)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))]
|
1 |
#![feature(test)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))]
|
1 |
#![feature(test)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))]
|
1 |
#![feature(test)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))]
|
1 |
#![feature(test)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))]
|
52 |
clippy::implicit_return,
|
53 |
clippy::unwrap_used,
|
54 |
clippy::multiple_inherent_impl,
|
53 |
clippy::implicit_return,
|
54 |
clippy::unwrap_used,
|
55 |
clippy::multiple_inherent_impl,
|
4 |
clippy::implicit_return,
|
5 |
clippy::result_unwrap_used,
|
6 |
clippy::option_unwrap_used,
|
7 |
clippy::print_stdout,
|
2 |
#![cfg_attr(stdsimd_strict, deny(warnings))]
|
3 |
#![allow(clippy::option_unwrap_used, clippy::use_debug, clippy::print_stdout)]
|
2 |
#![cfg_attr(stdsimd_strict, deny(warnings))]
|
3 |
#![allow(clippy::option_unwrap_used, clippy::use_debug, clippy::print_stdout)]
|
4 |
feature = "cargo-clippy",
|
5 |
allow(option_unwrap_used, use_debug, print_stdout)
|
6 |
)]
|
210 |
clippy::expect_used,
|
211 |
clippy::unwrap_used,
|
212 |
clippy::implicit_return,
|
18 |
pub(crate) fn write<W: Write>(&self, id: Option<SvgId>, writer: &mut W) {
|
19 |
#![allow(clippy::unwrap_used)]
|
20 |
writer
|
30 |
#![allow(clippy::panic)]
|
31 |
#![allow(clippy::unwrap_used)]
|
32 |
match self {
|
29 |
pub(crate) fn write<W: Write>(&self, writer: &mut W) {
|
30 |
#![allow(clippy::unwrap_used)]
|
31 |
if let Some(style) = &self.style {
|
39 |
pub(crate) fn write<W: Write>(&self, id: Option<SvgId>, writer: &mut W) {
|
40 |
#![allow(clippy::unwrap_used)]
|
41 |
writer.write_all(b"<g").unwrap();
|
10 |
pub(crate) fn write<W: Write>(self, writer: &mut W) {
|
11 |
#![allow(clippy::unwrap_used)]
|
12 |
writer
|
110 |
pub fn to_svg_string(&self) -> String {
|
111 |
#![allow(clippy::unwrap_used)]
|
112 |
let mut buffer = Vec::new();
|
64 |
pub(crate) fn write<W: Write>(&self, id: Option<SvgId>, writer: &mut W) {
|
65 |
#![allow(clippy::unwrap_used)]
|
66 |
writer.write_all(b"<path").unwrap();
|
176 |
pub fn data_string(&self) -> String {
|
177 |
#![allow(clippy::unwrap_used)]
|
178 |
let mut buffer = Vec::new();
|
183 |
pub(crate) fn write<W: Write>(&self, writer: &mut W) {
|
184 |
#![allow(clippy::unwrap_used)]
|
185 |
for element in &self.elements {
|
43 |
pub(crate) fn write<W: Write>(&self, id: Option<SvgId>, buffer: &mut W) {
|
44 |
#![allow(clippy::unwrap_used)]
|
45 |
buffer
|
1 |
#![allow(clippy::indexing_slicing)]
|
2 |
#![allow(clippy::unwrap_used)]
|
3 |
#![allow(clippy::panic)]
|
61 |
clippy::module_name_repetitions,
|
62 |
clippy::unwrap_used,
|
63 |
clippy::indexing_slicing,
|
1 |
#![allow(clippy::unwrap_used, clippy::cast_possible_wrap)]
|
551 |
mod tests {
|
552 |
#![allow(clippy::unwrap_used, clippy::too_many_lines, clippy::similar_names)]
|
553 |
use super::*;
|
540 |
#![allow(clippy::single_char_pattern)]
|
541 |
#![allow(clippy::unwrap_used)]
|
542 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
594 |
#![allow(clippy::single_char_pattern)]
|
595 |
#![allow(clippy::unwrap_used)]
|
596 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
232 |
mod test {
|
233 |
#![allow(clippy::unwrap_used)]
|
234 |
use std::env::VarError;
|
302 |
mod tests {
|
303 |
#![allow(clippy::unwrap_used)]
|
304 |
use crate::{Reader, Writer};
|
338 |
mod tests {
|
339 |
#![allow(clippy::unwrap_used)]
|
340 |
#![allow(clippy::cognitive_complexity)]
|
525 |
mod test {
|
526 |
#![allow(clippy::unwrap_used)]
|
527 |
use super::*;
|
226 |
mod test {
|
227 |
#![allow(clippy::unwrap_used)]
|
228 |
use super::*;
|
43 |
#![allow(clippy::single_char_pattern)]
|
44 |
#![allow(clippy::unwrap_used)]
|
45 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
9 |
#![allow(clippy::single_char_pattern)]
|
10 |
#![allow(clippy::unwrap_used)]
|
11 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
535 |
#![allow(clippy::single_char_pattern)]
|
536 |
#![allow(clippy::unwrap_used)]
|
537 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
520 |
mod test {
|
521 |
#![allow(clippy::unwrap_used)]
|
522 |
use super::*;
|
137 |
#![allow(clippy::single_char_pattern)]
|
138 |
#![allow(clippy::unwrap_used)]
|
139 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
414 |
mod test {
|
415 |
#![allow(clippy::unwrap_used)]
|
416 |
#[allow(unused_imports)]
|
39 |
mod test {
|
40 |
#![allow(clippy::unwrap_used)]
|
41 |
use super::*;
|
504 |
mod test {
|
505 |
#![allow(clippy::unwrap_used)]
|
506 |
use super::*;
|
296 |
mod test {
|
297 |
#![allow(clippy::unwrap_used)]
|
298 |
use super::*;
|
400 |
pub(crate) mod test {
|
401 |
#![allow(clippy::unwrap_used)]
|
402 |
use super::*;
|
783 |
mod test {
|
784 |
#![allow(clippy::unwrap_used)]
|
785 |
use super::*;
|
118 |
mod test {
|
119 |
#![allow(clippy::unwrap_used)]
|
120 |
use super::*;
|
87 |
#![allow(clippy::single_char_pattern)]
|
88 |
#![allow(clippy::unwrap_used)]
|
89 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
293 |
mod test {
|
294 |
#![allow(clippy::unwrap_used)]
|
295 |
#![allow(clippy::clone_on_copy)]
|
215 |
fn assert_same_path_when_owned(path: &TorPath<'_>) {
|
216 |
#![allow(clippy::unwrap_used)]
|
217 |
let owned: OwnedPath = path.try_into().unwrap();
|
132 |
mod test {
|
133 |
#![allow(clippy::unwrap_used)]
|
134 |
use super::*;
|
168 |
mod test {
|
169 |
#![allow(clippy::unwrap_used)]
|
170 |
use super::*;
|
746 |
#![allow(clippy::single_char_pattern)]
|
747 |
#![allow(clippy::unwrap_used)]
|
748 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
394 |
#![allow(clippy::single_char_pattern)]
|
395 |
#![allow(clippy::unwrap_used)]
|
396 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
246 |
mod test {
|
247 |
#![allow(clippy::unwrap_used)]
|
248 |
use super::*;
|
341 |
#![allow(clippy::single_char_pattern)]
|
342 |
#![allow(clippy::unwrap_used)]
|
343 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
409 |
#![allow(clippy::single_char_pattern)]
|
410 |
#![allow(clippy::unwrap_used)]
|
411 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
557 |
mod test {
|
558 |
#![allow(clippy::unwrap_used)]
|
559 |
use super::*;
|
455 |
mod test {
|
456 |
#![allow(clippy::unwrap_used)]
|
457 |
use super::*;
|
512 |
mod test {
|
513 |
#![allow(clippy::unwrap_used)]
|
514 |
use super::*;
|
178 |
#![allow(clippy::single_char_pattern)]
|
179 |
#![allow(clippy::unwrap_used)]
|
180 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
24 |
mod test {
|
25 |
#![allow(clippy::unwrap_used)]
|
26 |
use super::*;
|
80 |
mod test {
|
81 |
#![allow(clippy::unwrap_used)]
|
82 |
use super::*;
|
9 |
#![allow(clippy::single_char_pattern)]
|
10 |
#![allow(clippy::unwrap_used)]
|
11 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
326 |
mod test {
|
327 |
#![allow(clippy::unwrap_used)]
|
328 |
#![allow(clippy::unnecessary_wraps)]
|
285 |
mod test {
|
286 |
#![allow(clippy::unwrap_used)]
|
287 |
use super::*;
|
1116 |
mod test {
|
1117 |
#![allow(clippy::unwrap_used)]
|
1118 |
use super::*;
|
96 |
mod test {
|
97 |
#![allow(clippy::unwrap_used)]
|
98 |
use super::*;
|
1237 |
mod test {
|
1238 |
#![allow(clippy::unwrap_used)]
|
1239 |
#![allow(clippy::cognitive_complexity)]
|
256 |
#![allow(clippy::single_char_pattern)]
|
257 |
#![allow(clippy::unwrap_used)]
|
258 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
287 |
mod test {
|
288 |
#![allow(clippy::unwrap_used)]
|
289 |
use crate::{
|
612 |
#![allow(clippy::single_char_pattern)]
|
613 |
#![allow(clippy::unwrap_used)]
|
614 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
42 |
#![allow(clippy::single_char_pattern)]
|
43 |
#![allow(clippy::unwrap_used)]
|
44 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
66 |
mod test {
|
67 |
#![allow(clippy::unwrap_used)]
|
68 |
use super::*;
|
239 |
#![allow(clippy::single_char_pattern)]
|
240 |
#![allow(clippy::unwrap_used)]
|
241 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
156 |
mod test {
|
157 |
#![allow(clippy::unwrap_used)]
|
158 |
use super::*;
|
942 |
mod test {
|
943 |
#![allow(clippy::unwrap_used)]
|
944 |
use super::*;
|
1830 |
mod test {
|
1831 |
#![allow(clippy::unwrap_used)]
|
1832 |
use super::*;
|
1019 |
mod test {
|
1020 |
#![allow(clippy::unwrap_used)]
|
1021 |
use tor_linkspec::{HasRelayIds, RelayIdType};
|
232 |
mod test {
|
233 |
#![allow(clippy::unwrap_used)]
|
234 |
use super::*;
|
63 |
mod test {
|
64 |
#![allow(clippy::unwrap_used)]
|
65 |
use super::*;
|
163 |
mod test {
|
164 |
#![allow(clippy::unwrap_used)]
|
145 |
#![allow(clippy::single_char_pattern)]
|
146 |
#![allow(clippy::unwrap_used)]
|
147 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
354 |
mod test {
|
355 |
#![allow(clippy::unwrap_used)]
|
356 |
use hex_literal::hex;
|
167 |
mod test {
|
168 |
#![allow(clippy::unwrap_used)]
|
169 |
use super::*;
|
271 |
mod test {
|
272 |
#![allow(clippy::unwrap_used)]
|
273 |
use super::*;
|
296 |
mod test {
|
297 |
#![allow(clippy::unwrap_used)]
|
298 |
use super::*;
|
744 |
mod test {
|
745 |
#![allow(clippy::unwrap_used)]
|
746 |
use super::*;
|
168 |
mod tests {
|
169 |
#![allow(clippy::unwrap_used)]
|
170 |
use super::*;
|
69 |
mod test {
|
70 |
#![allow(clippy::unwrap_used)]
|
71 |
#[test]
|
80 |
mod tests {
|
81 |
#![allow(clippy::unwrap_used)]
|
82 |
// A cert generated by chutney
|
1214 |
mod test {
|
1215 |
#![allow(clippy::unwrap_used)]
|
1216 |
#![allow(clippy::cognitive_complexity)]
|
13 |
#![allow(clippy::missing_panics_doc)]
|
14 |
#![allow(clippy::unwrap_used)]
|
132 |
mod test {
|
133 |
#![allow(clippy::unwrap_used)]
|
134 |
use super::*;
|
149 |
mod test {
|
150 |
#![allow(clippy::unwrap_used)]
|
151 |
use super::*;
|
100 |
mod test {
|
101 |
#![allow(clippy::unwrap_used)]
|
102 |
use super::*;
|
257 |
mod test {
|
258 |
#![allow(clippy::unwrap_used)]
|
259 |
use super::*;
|
176 |
mod test {
|
177 |
#![allow(clippy::unwrap_used)]
|
178 |
use super::*;
|
241 |
mod test {
|
242 |
#![allow(clippy::unwrap_used)]
|
243 |
use super::*;
|
65 |
pub(crate) mod test {
|
66 |
#![allow(clippy::unwrap_used)]
|
67 |
use futures::io::{AsyncRead, AsyncWrite, Cursor, Result};
|
620 |
pub(super) mod test {
|
621 |
#![allow(clippy::unwrap_used)]
|
622 |
use hex_literal::hex;
|
412 |
#![allow(clippy::single_char_pattern)]
|
413 |
#![allow(clippy::unwrap_used)]
|
414 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
467 |
pub(crate) mod test {
|
468 |
#![allow(clippy::unwrap_used)]
|
469 |
use super::*;
|
701 |
// reactor code; there are just a few more cases to examine here.
|
702 |
#![allow(clippy::unwrap_used)]
|
703 |
use super::*;
|
70 |
mod test {
|
71 |
#![allow(clippy::unwrap_used)]
|
72 |
use super::*;
|
82 |
mod test {
|
83 |
#![allow(clippy::unwrap_used)]
|
84 |
use super::*;
|
281 |
mod test {
|
282 |
#![allow(clippy::unwrap_used)]
|
283 |
use super::*;
|
220 |
mod test {
|
221 |
#![allow(clippy::unwrap_used)]
|
222 |
use super::*;
|
465 |
mod test {
|
466 |
#![allow(clippy::unwrap_used)]
|
467 |
use super::*;
|
785 |
#![allow(clippy::single_char_pattern)]
|
786 |
#![allow(clippy::unwrap_used)]
|
787 |
//! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
|
151 |
mod test {
|
152 |
#![allow(clippy::unwrap_used)]
|
153 |
use super::*;
|
331 |
mod test {
|
332 |
#![allow(clippy::unwrap_used, clippy::unnecessary_wraps)]
|
333 |
use crate::Runtime;
|
221 |
mod test {
|
222 |
#![allow(clippy::unwrap_used)]
|
223 |
use super::*;
|
184 |
mod test {
|
185 |
#![allow(clippy::unwrap_used)]
|
186 |
use super::*;
|
515 |
mod test {
|
516 |
#![allow(clippy::unwrap_used)]
|
517 |
use super::*;
|
443 |
mod test {
|
444 |
#![allow(clippy::unwrap_used)]
|
445 |
use super::*;
|
313 |
#![allow(clippy::single_char_pattern)]
|
314 |
#![allow(clippy::unwrap_used)]
|
315 |
//! <!-- @@ end test lint list
|
301 |
mod test {
|
302 |
#![allow(clippy::unwrap_used)]
|
303 |
use super::*;
|
93 |
#![allow(clippy::single_char_pattern)]
|
94 |
#![allow(clippy::unwrap_used)]
|
95 |
//! <!-- @@ end test lint list
|
395 |
mod test {
|
396 |
#![allow(clippy::unwrap_used)]
|
397 |
use super::*;
|
493 |
mod tests {
|
494 |
#![allow(clippy::unwrap_used)]
|
495 |
use float_cmp::assert_approx_eq;
|
86 |
mod test {
|
87 |
#![allow(clippy::unwrap_used)]
|
88 |
use crate::errors::Error;
|
84 |
mod test {
|
85 |
#![allow(clippy::unwrap_used)]
|
86 |
use crate::errors::Error;
|
40 |
mod test {
|
41 |
#![allow(clippy::unwrap_used)]
|
55 |
mod tests {
|
56 |
#![allow(clippy::unwrap_used)]
|
13 |
// limitations under the License.
|
14 |
#![allow(clippy::unwrap_used)]
|
15 |
use super::*;
|
37 |
mod tests {
|
38 |
#![allow(clippy::unwrap_used)]
|
39 |
use super::*;
|
404 |
clippy::non_ascii_literal,
|
405 |
clippy::unwrap_used
|
406 |
)]
|
632 |
mod tests {
|
633 |
#![allow(clippy::unwrap_used)]
|
634 |
use super::*;
|
29 |
mod test {
|
30 |
#![allow(clippy::unwrap_used)]
|
31 |
use crate::Value;
|
52 |
clippy::implicit_return,
|
53 |
clippy::unwrap_used,
|
54 |
clippy::multiple_inherent_impl,
|
1 |
// TODO(gib): Use https://lib.rs/crates/indicatif for progress bars and remove this.
|
2 |
#![allow(clippy::print_stdout, clippy::unwrap_used)]
|
3 |
use std::{
|
152 |
mod tests {
|
153 |
#![allow(clippy::unwrap_used)]
|
154 |
#![allow(clippy::panic)]
|
43 |
clippy::indexing_slicing, // TODO
|
44 |
clippy::unwrap_used, // TODO
|
45 |
)]
|
2451 |
) -> Result<(CreationChallengeResponse, RegistrationState), WebauthnError> {
|
2452 |
#![allow(clippy::unwrap_used)]
|
18 |
#![allow(clippy::panic)]
|
19 |
#![allow(clippy::unwrap_used)]
|