| 361 | #[cfg(test)] | 
| 362 | #[allow(clippy::unwrap_used)] | 
| 363 | mod test { | 
| 43 | #[allow(clippy::option_unwrap_used)] | 
| 44 | #[async_trait] | 
| 1564 | impl std::fmt::Debug for Message { | 
| 1565 |     #[allow(clippy::unwrap_used)] | 
| 1566 |     fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { | 
| 108 |     #[tokio::test] | 
| 109 |     #[allow(clippy::unwrap_used)] | 
| 110 |     async fn flags_into_ibv_access_test() { | 
| 118 |     #[tokio::test] | 
| 119 |     #[allow(clippy::unwrap_used)] | 
| 120 |     async fn ibv_access_into_flags_test() { | 
| 369 |                 // imm was checked by `is_some()` | 
| 370 |                 #[allow(clippy::unwrap_used)] | 
| 371 |                 let _task = tokio::spawn(Arc::<Self>::clone(&self).handle_write_imm(imm.unwrap())); | 
| 146 | #[cfg(test)] | 
| 147 | #[allow(unused, clippy::unwrap_used)] | 
| 148 | mod tests { | 
| 11 |     // No time can be earlier than Unix Epoch | 
| 12 |     #[allow(clippy::unwrap_used)] | 
| 13 |     let since_the_epoch = start.duration_since(UNIX_EPOCH).unwrap(); | 
| 697 |     #[allow(clippy::as_conversions)] | 
| 698 |     #[allow(clippy::unwrap_used)] | 
| 699 |     unsafe extern "C" fn extent_alloc_hook_for_test( | 
| 736 |     #[allow(clippy::as_conversions)] | 
| 737 |     #[allow(clippy::unwrap_used)] | 
| 738 |     unsafe extern "C" fn extent_merge_hook_for_test( | 
| 779 |     #[test] | 
| 780 |     #[allow(clippy::unwrap_used)] | 
| 781 |     fn test_extent_hooks() -> io::Result<()> { | 
| 829 |     #[allow(clippy::as_conversions)] | 
| 830 |     #[allow(clippy::unwrap_used)] | 
| 831 |     fn je_malloxc_test() { | 
| 882 |     #[test] | 
| 883 |     #[allow(clippy::unwrap_used)] | 
| 884 |     fn zeroed_test() -> io::Result<()> { | 
| 51 | #[allow(clippy::unwrap_used)] | 
| 52 | #[async_trait] | 
| 3 | /// Test the correct type is returned from call and construct | 
| 4 | #[allow(clippy::unwrap_used)] | 
| 5 | #[test] | 
| 95 | #[allow(clippy::unwrap_used)] | 
| 96 | #[test] | 
| 14 | /// Checks that the given JavaScript string gives the expected expression. | 
| 15 | #[allow(clippy::unwrap_used)] | 
| 16 | #[track_caller] | 
| 3 | /// Test the correct type is returned from call and construct | 
| 4 | #[allow(clippy::unwrap_used)] | 
| 5 | #[test] | 
| 96 | #[allow(clippy::unwrap_used)] | 
| 97 | #[test] | 
| 20 | /// Checks that the given JavaScript string gives the expected expression. | 
| 21 | #[allow(clippy::unwrap_used)] | 
| 22 | #[track_caller] | 
| 288 | #[cfg(test)] | 
| 289 | #[allow(clippy::unwrap_used)] | 
| 290 | mod tests { | 
| 154 |     pub fn first(&self) -> &T { | 
| 155 |         #[allow(clippy::unwrap_used)] | 
| 156 |         self.inner.first().unwrap() | 
| 169 |     pub fn last(&self) -> &T { | 
| 170 |         #[allow(clippy::unwrap_used)] | 
| 171 |         self.inner.last().unwrap() | 
| 251 |         } | 
| 252 |         #[allow(clippy::unwrap_used)] | 
| 253 |         Ok(BoundedVec::from_vec(out).unwrap()) | 
| 283 |         } | 
| 284 |         #[allow(clippy::unwrap_used)] | 
| 285 |         Ok(BoundedVec::from_vec(out).unwrap()) | 
| 313 |     pub fn split_last(&self) -> (&T, &[T]) { | 
| 314 |         #[allow(clippy::unwrap_used)] | 
| 315 |         self.inner.split_last().unwrap() | 
| 173 |   // `E0080` does not allow `T`s larger than `isize::MAX` | 
| 174 |   clippy::unwrap_used, | 
| 175 | )] | 
| 109 | #[cfg(test)] | 
| 110 | #[allow(clippy::result_unwrap_used)] | 
| 111 | mod tests { | 
| 174 | #[cfg(test)] | 
| 175 | #[allow(clippy::result_unwrap_used, clippy::non_ascii_literal)] | 
| 176 | mod tests { | 
| 243 | #[cfg(test)] | 
| 244 | #[allow(clippy::result_unwrap_used)] | 
| 245 | mod tests { | 
| 9 | #[allow(clippy::semicolon_if_nothing_returned)] | 
| 10 | #[allow(clippy::unwrap_used)] | 
| 11 | mod bindings; | 
| 108 |     // TODO(tarcieri): better conversion or unified `Hash` type, see tendermint-rs#1221 | 
| 109 |     #[allow(clippy::unwrap_used)] | 
| 110 |     let tx_hash = tendermint::Hash::Sha256(tx_hash.as_ref().try_into().unwrap()); | 
| 16 |     let mut msg_info = crate::shell::Verbosity::Verbose.into(); | 
| 17 |     #[allow(clippy::unwrap_used)] | 
| 18 |     WORKSPACE.get_or_init(|| { | 
| 126 | #[cfg(test)] | 
| 127 | #[allow(clippy::unwrap_used)] | 
| 128 | impl Default for Module { | 
| 216 |     #[cfg(test)] | 
| 217 |     #[allow(clippy::unwrap_used)] | 
| 218 |     fn add_test_module(&mut self, input: &str) -> Result<&Module> { | 
| 368 | #[cfg(test)] | 
| 369 | #[allow(clippy::unwrap_used)] | 
| 370 | mod tests { | 
| 176 |                         //        contains this capture group. | 
| 177 |                         #[allow(clippy::unwrap_used)] | 
| 178 |                         let name = cap.get(1).unwrap().as_str(); | 
| 215 | #[cfg(test)] | 
| 216 | #[allow(clippy::unwrap_used)] | 
| 217 | mod test { | 
| 802 |             } | 
| 803 |             #[allow(clippy::unwrap_used)] | 
| 804 |             let max_level = *hops_by_level.keys().max().unwrap(); | 
| 805 |             #[allow(clippy::unwrap_used)] | 
| 806 |             let max_width = hops_by_level.values().map(|paths| paths.len()).max().unwrap(); | 
| 1288 |                 hops_by_edge.iter().map(|((vl, wl), hops)| { | 
| 1289 |                         #[allow(clippy::unwrap_used)] // an edge with no hops really should panic | 
| 1290 |                         let (lvl, (mhr, nhr)) = hops.iter().rev().next().unwrap(); | 
| 1757 |                     .map(|(vl, wl)| { | 
| 1758 |                         #[allow(clippy::unwrap_used)] | 
| 1759 |                         let (lvl, (mhr, _nhr)) = hops_by_edge[&(vl.clone(), wl.clone())].iter().next().unwrap(); | 
| 1765 |                     .map(|(vl, wl)| { | 
| 1766 |                         #[allow(clippy::unwrap_used)] | 
| 1767 |                         let (lvl, (mhr, _nhr)) = hops_by_edge[&(vl.clone(), wl.clone())].iter().rev().next().unwrap(); | 
| 117 |         // The validity of the casts are verified by the enum discriminant. | 
| 118 |         #[allow(clippy::unwrap_used)] | 
| 119 |         match Self::from_min_max(min, max)? { | 
| 23 | #[cfg(test)] | 
| 24 | #[allow(clippy::unwrap_in_result, clippy::unwrap_used, clippy::expect_used)] | 
| 25 | mod test; | 
| 170 |                     #[allow(clippy::unwrap_used)] // somehow the RE has four groups | 
| 171 |                     let unit = group | 
| 237 |     #[test] | 
| 238 |     #[allow(clippy::result_unwrap_used)] | 
| 239 |     fn test_read_pos() { | 
| 273 |     #[test] | 
| 274 |     #[allow(clippy::result_unwrap_used)] | 
| 275 |     fn test_write_pos() { | 
| 162 | /// Arbitrary | 
| 163 | #[allow(clippy::unwrap_used)] | 
| 164 | #[cfg(feature = "arbitrary")] | 
| 20 | #[allow(clippy::unwrap_used)] | 
| 21 | impl std::fmt::Debug for EcPoint { | 
| 51 |     fn from(value: EcPoint) -> String { | 
| 52 |         #[allow(clippy::unwrap_used)] | 
| 53 |         { | 
| 157 | #[allow(clippy::unwrap_used)] | 
| 158 | #[cfg(test)] | 
| 72 |         let mut n_bits_writer = vec![]; | 
| 73 |         #[allow(clippy::unwrap_used)] | 
| 74 |         n_bits_writer | 
| 113 |             let mut reader = std::io::Cursor::new(n_bits_buf); | 
| 114 |             #[allow(clippy::unwrap_used)] | 
| 115 |             { | 
| 270 | #[cfg(feature = "arbitrary")] | 
| 271 | #[allow(clippy::unwrap_used)] | 
| 272 | mod arbitrary { | 
| 382 | #[allow(clippy::unwrap_used, clippy::panic)] | 
| 383 | #[cfg(test)] | 
| 36 |             .map(|n| { | 
| 37 |                 #[allow(clippy::unwrap_used)] | 
| 38 |                 { | 
| 31 |         let s: String = "http://".to_string() + &self.0.to_string(); | 
| 32 |         #[allow(clippy::unwrap_used)] | 
| 33 |         Url::from_str(&s).unwrap() | 
| 40 | #[cfg(test)] | 
| 41 | #[allow(clippy::unwrap_used)] | 
| 42 | mod tests { | 
| 130 |         // Won't be overflowing an i64, so unwrap is safe. | 
| 131 |         #[allow(clippy::unwrap_used)] | 
| 132 |         Ok( | 
| 254 |         // Won't be overflowing an i64, so unwrap is safe. | 
| 255 |         #[allow(clippy::unwrap_used)] | 
| 256 |         let min_box_value: BoxValue = (box_size_bytes as i64 * self.min_value_per_byte as i64) | 
| 276 | #[cfg(test)] | 
| 277 | #[allow(clippy::unwrap_used)] | 
| 278 | mod tests { | 
| 42 | #[cfg(test)] | 
| 43 | #[allow(clippy::unwrap_used)] | 
| 44 | mod tests { | 
| 95 |         #[allow(clippy::unwrap_used)] | 
| 96 |         // safe since the serialization error is impossible here | 
| 124 | #[cfg(feature = "arbitrary")] | 
| 125 | #[allow(clippy::unwrap_used)] | 
| 126 | pub mod arbitrary { | 
| 150 | #[cfg(test)] | 
| 151 | #[allow(clippy::unwrap_used, clippy::panic)] | 
| 152 | pub mod tests { | 
| 179 |     ) -> Result<bool, TransactionSignatureVerificationError> { | 
| 180 |         #[allow(clippy::unwrap_used)] | 
| 181 |         // since we have a tx with tx_id at this point, serialization is safe to unwrap | 
| 230 | impl SigmaSerializable for Transaction { | 
| 231 |     #[allow(clippy::unwrap_used)] | 
| 232 |     fn sigma_serialize<W: SigmaByteWrite>(&self, w: &mut W) -> SigmaSerializeResult { | 
| 52 | ) { | 
| 53 |     #[allow(clippy::unwrap_used)] | 
| 54 |     { | 
| 70 | pub unsafe extern "C" fn ergo_lib_address_type_prefix(address: ConstAddressPtr) -> u8 { | 
| 71 |     #[allow(clippy::unwrap_used)] | 
| 72 |     (address_type_prefix(address).unwrap() as u8) | 
| 15 |     // Unwrap should be safe to use here unless the caller passes a null ptr (undefined) | 
| 16 |     #[allow(clippy::unwrap_used)] | 
| 17 |     batchmerkleproof_valid(proof, root_hash).unwrap() | 
| 34 | ) -> ErrorPtr { | 
| 35 |     #[allow(clippy::unwrap_used)] | 
| 36 |     // Unwrap is safe, CString::new only errors if the argument contains a 0 byte | 
| 31 | ) { | 
| 32 |     #[allow(clippy::unwrap_used)] | 
| 33 |     block_header_id(block_header_ptr, block_id_out).unwrap(); | 
| 27 | ) { | 
| 28 |     #[allow(clippy::unwrap_used)] | 
| 29 |     ergo_box_candidate_builder_new(value_ptr, contract_ptr, creation_height, builder_out).unwrap() | 
| 37 | ) { | 
| 38 |     #[allow(clippy::unwrap_used)] | 
| 39 |     ergo_box_candidate_builder_set_min_box_value_per_byte(builder_mut, new_min_value_per_byte) | 
| 47 | ) -> u32 { | 
| 48 |     #[allow(clippy::unwrap_used)] | 
| 49 |     ergo_box_candidate_builder_min_box_value_per_byte(builder_ptr).unwrap() | 
| 57 | ) { | 
| 58 |     #[allow(clippy::unwrap_used)] | 
| 59 |     ergo_box_candidate_builder_set_value(builder_mut, value_ptr).unwrap(); | 
| 67 | ) { | 
| 68 |     #[allow(clippy::unwrap_used)] | 
| 69 |     ergo_box_candidate_builder_value(builder_ptr, value_out).unwrap(); | 
| 160 |     } | 
| 161 |     #[allow(clippy::unwrap_used)] | 
| 162 |     let seeds_bounded_vec = bounded_vec::NonEmptyVec::from_vec(seeds_vec).unwrap(); | 
| 179 |                 for mut peer in peers { | 
| 180 |                     #[allow(clippy::unwrap_used)] | 
| 181 |                     peer.set_port(Some(9053)).unwrap(); | 
| 80 |             } | 
| 81 |             #[allow(clippy::unwrap_used)] | 
| 82 |             Ok(Constant { | 
| 172 |     let bigint_str = bigint.to_string(); | 
| 173 |     #[allow(clippy::unwrap_used)] | 
| 174 |     // since BigInt256 bounds are less the JS BigInt it should not fail | 
| 178 | fn js_bigint_to_ergo_bigint(bigint: js_sys::BigInt) -> Result<BigInt256, ConvError> { | 
| 179 |     #[allow(clippy::unwrap_used)] | 
| 180 |     // safe, because it can only return an error on invalid radix | 
| 129 |         if headers.len() == 10 { | 
| 130 |             #[allow(clippy::unwrap_used)] | 
| 131 |             Ok(headers.try_into().unwrap()) | 
| 69 |         // Following unwraps are fine since we're converting from BoundedVec to Vec. | 
| 70 |         #[allow(clippy::unwrap_used)] | 
| 71 |         UnsignedTransactionJsonEip12 { | 
| 207 | #[cfg(test)] | 
| 208 | #[allow(clippy::unwrap_used)] | 
| 209 | mod tests { | 
| 164 |     let n = u16::max(max_parallel_requests, 1); | 
| 165 |     #[allow(clippy::unwrap_used)] | 
| 166 |     let max_parallel_requests = bounded_integer::BoundedU16::new(n).unwrap(); | 
| 172 |     for mut url in res { | 
| 173 |         #[allow(clippy::unwrap_used)] | 
| 174 |         url.set_port(Some(9053)).unwrap(); | 
| 220 |     let n = u16::max(max_parallel_requests, 1); | 
| 221 |     #[allow(clippy::unwrap_used)] | 
| 222 |     let max_parallel_requests = bounded_integer::BoundedU16::new(n).unwrap(); | 
| 232 |     for mut url in res { | 
| 233 |         #[allow(clippy::unwrap_used)] | 
| 234 |         url.set_port(Some(9053)).unwrap(); | 
| 196 | #[cfg(feature = "arbitrary")] | 
| 197 | #[allow(clippy::unwrap_used, clippy::panic)] | 
| 198 | mod test { | 
| 32 | // Unwrap is safe here since the hash is guaranteed to be 32 bytes | 
| 33 | #[allow(clippy::unwrap_used)] | 
| 34 | // Generates a hash of data prefixed with `prefix` | 
| 42 | #[allow(clippy::unwrap_used)] | 
| 43 | // Generates a hash of data prefixed with `prefix`, allows for an optional second hash | 
| 125 | #[cfg(feature = "json")] | 
| 126 | #[allow(clippy::unwrap_used)] | 
| 127 | mod test { | 
| 161 |     pub fn new(nodes: impl Into<Vec<MerkleNode>>) -> Self { | 
| 162 |         #[allow(clippy::unwrap_used)] | 
| 163 |         fn build_nodes(nodes: &mut [MerkleNode]) { | 
| 275 | #[cfg(test)] | 
| 276 | #[allow(clippy::unwrap_used, clippy::panic)] | 
| 277 | mod test { | 
| 347 | #[cfg(test)] | 
| 348 | #[allow(clippy::unwrap_used)] | 
| 349 | mod arbitrary { | 
| 44 |             let mut height_bytes = Vec::with_capacity(4); | 
| 45 |             #[allow(clippy::unwrap_used)] | 
| 46 |             height_bytes.write_u32::<BigEndian>(header.height).unwrap(); | 
| 58 |                 let mut concat = vec![]; | 
| 59 |                 #[allow(clippy::unwrap_used)] | 
| 60 |                 concat.write_u32::<BigEndian>(idx).unwrap(); | 
| 66 |             // sum as byte array is always about 32 bytes | 
| 67 |             #[allow(clippy::unwrap_used)] | 
| 68 |             let array = as_unsigned_byte_array(32, f2).unwrap(); | 
| 78 |                 let mut bytes = Vec::with_capacity(8); | 
| 79 |                 #[allow(clippy::unwrap_used)] | 
| 80 |                 bytes.write_u64::<BigEndian>(x).unwrap(); | 
| 163 |         // The following paramter values are mandated by Ergo-node Autolykos implementation. | 
| 164 |         #[allow(clippy::unwrap_used)] | 
| 165 |         AutolykosPowScheme { | 
| 79 |         }; | 
| 80 |         #[allow(clippy::unwrap_used)] | 
| 81 |         Ok(acc | 
| 96 |             let order = order(); | 
| 97 |             #[allow(clippy::unwrap_used)] | 
| 98 |             let required_target = (order / decode_compact_bits(header.n_bits)) | 
| 100 |                 .unwrap(); | 
| 101 |             #[allow(clippy::unwrap_used)] | 
| 102 |             let real_target = self.pow_scheme.pow_hit(header)?.to_f64().unwrap(); | 
| 156 |         let suffix_tail: Vec<Header> = suffix[1..].iter().map(|p| p.header.clone()).collect(); | 
| 157 |         #[allow(clippy::unwrap_used)] | 
| 158 |         let max_level: i32 = if chain.len() > (k as usize) { | 
| 412 | #[allow(clippy::unwrap_used)] | 
| 413 | #[cfg(test)] | 
| 25 | pub async fn get_info(node: NodeConf) -> Result<NodeInfo, NodeError> { | 
| 26 |     #[allow(clippy::unwrap_used)] | 
| 27 |     let url = node.addr.as_http_url().join("info").unwrap(); | 
| 42 |     path.push_str("/header"); | 
| 43 |     #[allow(clippy::unwrap_used)] | 
| 44 |     let url = node.addr.as_http_url().join(&path).unwrap(); | 
| 136 |     path.push_str(&header_str); | 
| 137 |     #[allow(clippy::unwrap_used)] | 
| 138 |     let url = node.addr.as_http_url().join(&path).unwrap(); | 
| 160 |     path.push_str(&tx_id_str); | 
| 161 |     #[allow(clippy::unwrap_used)] | 
| 162 |     let url = node.addr.as_http_url().join(&path).unwrap(); | 
| 172 | #[allow(clippy::unwrap_used)] | 
| 173 | #[cfg(test)] | 
| 191 |                     let mut url = peer.get_url().clone(); | 
| 192 |                     #[allow(clippy::unwrap_used)] | 
| 193 |                     url.set_port(None).unwrap(); | 
| 237 |                     Msg::AddActiveNode(mut url) => { | 
| 238 |                         #[allow(clippy::unwrap_used)] | 
| 239 |                         url.set_port(None).unwrap(); | 
| 262 |                     Msg::InfoRequestFailedWithoutTimeout(mut url) => { | 
| 263 |                         #[allow(clippy::unwrap_used)] | 
| 264 |                         url.set_port(None).unwrap(); | 
| 276 |                     Msg::InfoRequestFailedWithTimeout(mut url) => { | 
| 277 |                         #[allow(clippy::unwrap_used)] | 
| 278 |                         url.set_port(None).unwrap(); | 
| 290 |                     Msg::PeersAllRequestFailedWithoutTimeout(mut url) => { | 
| 291 |                         #[allow(clippy::unwrap_used)] | 
| 292 |                         url.set_port(None).unwrap(); | 
| 1 | #[allow(clippy::unwrap_used)] | 
| 2 | #[cfg(test)] | 
| 33 | #[cfg(test)] | 
| 34 | #[allow(clippy::unwrap_used)] | 
| 35 | mod tests { | 
| 54 | #[allow(clippy::unwrap_used)] | 
| 55 | #[allow(clippy::panic)] | 
| 323 | #[cfg(test)] | 
| 324 | #[allow(clippy::unwrap_used)] | 
| 325 | mod tests { | 
| 26 | #[allow(clippy::unwrap_used)] | 
| 27 | #[cfg(test)] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 2 | use ergotree_ir::bigint256::BigInt256; | 
| 29 | #[allow(clippy::unwrap_used)] | 
| 30 | #[allow(clippy::panic)] | 
| 59 | #[allow(clippy::unwrap_used)] | 
| 60 | #[allow(clippy::panic)] | 
| 43 | #[allow(clippy::unwrap_used)] | 
| 44 | #[cfg(test)] | 
| 57 | #[allow(clippy::unwrap_used)] | 
| 58 | #[cfg(test)] | 
| 41 |     fn try_from(value: BigUint) -> Result<Self, Self::Error> { | 
| 42 |         #[allow(clippy::unwrap_used)] | 
| 43 |         if value > Self::max_value().0 .0.to_biguint().unwrap() { | 
| 279 | #[allow(clippy::unwrap_used)] | 
| 280 | #[cfg(test)] | 
| 177 |             Address::P2Pk(prove_dlog) => { | 
| 178 |                 #[allow(clippy::unwrap_used)] | 
| 179 |                 // Since ProveDlog is a simple IR node we can be sure no other errors besides OOM could be here | 
| 190 |             Address::P2Pk(prove_dlog) => { | 
| 191 |                 #[allow(clippy::unwrap_used)] | 
| 192 |                 // Since ProveDlog is a simple IR node we can be sure no other errors besides OOM could be here | 
| 419 |             .collect(); | 
| 420 |         #[allow(clippy::unwrap_used)] | 
| 421 |         v.as_slice().try_into().unwrap() | 
| 517 | #[cfg(feature = "arbitrary")] | 
| 518 | #[allow(clippy::unwrap_used)] | 
| 519 | pub(crate) mod arbitrary { | 
| 546 | #[cfg(test)] | 
| 547 | #[allow(clippy::unwrap_used)] | 
| 548 | #[allow(clippy::panic)] | 
| 69 | #[allow(clippy::unwrap_used)] | 
| 70 | #[allow(clippy::panic)] | 
| 239 | #[allow(clippy::panic)] | 
| 240 | #[allow(clippy::unwrap_used)] | 
| 241 | #[cfg(test)] | 
| 237 |     #[allow(clippy::unwrap_used)] // it could only fail on OOM, etc. | 
| 238 |     fn sigma_serialize_bytes(&self) -> Vec<u8> { | 
| 100 |         // this unwrap is safe since we definitely inserted a value for every update | 
| 101 |         #[allow(clippy::unwrap_used)] | 
| 102 |         for build in builds_for_update.get(update.alias.as_str()).unwrap() { | 
| 367 |         // this unwrap is safe since we definitely inserted a value for every update earlier | 
| 368 |         #[allow(clippy::unwrap_used)] | 
| 369 |         let builds = builds_for_update.get(update.alias.as_str()).unwrap(); | 
| 71 | #[cfg(test)] | 
| 72 | #[allow(clippy::unwrap_used)] | 
| 73 | mod tests { | 
| 151 |         // these unwraps are safe because the length is definitely 2 | 
| 152 |         #[allow(clippy::unwrap_used)] | 
| 153 |         let source = parts.get(0).unwrap(); | 
| 154 |         #[allow(clippy::unwrap_used)] | 
| 155 |         let binary = parts.get(1).unwrap(); | 
| 193 |         // these unwraps are safe because the length is definitely 2 | 
| 194 |         #[allow(clippy::unwrap_used)] | 
| 195 |         let binary = parts.get(0).unwrap(); | 
| 196 |         #[allow(clippy::unwrap_used)] | 
| 197 |         let installtime = parts.get(1).unwrap(); | 
| 134 | #[allow(clippy::unwrap_used)] | 
| 135 | #[allow(unused)] | 
| 208 | #[cfg(test)] | 
| 209 | #[allow(clippy::unwrap_used)] | 
| 210 | mod tests { | 
| 665 | #[cfg(test)] | 
| 666 | #[allow(clippy::unwrap_used)] | 
| 667 | mod tests { | 
| 133 |         for i in 1..=self.degree { | 
| 134 |             #[allow(clippy::unwrap_used)] | 
| 135 |             self.coefficients[i] | 
| 204 | #[cfg(test)] | 
| 205 | #[allow(clippy::unwrap_used)] | 
| 206 | mod tests { | 
| 28 | /// If the repository cannot be created for any reason, this function will panic. | 
| 29 | #[allow(clippy::panic, clippy::unwrap_used)] | 
| 30 | #[inline] | 
| 50 | #[cfg(test)] | 
| 51 | #[allow(clippy::unwrap_used)] | 
| 52 | mod tests | 
| 54 |         #[allow(clippy::unwrap_used)] | 
| 55 |         let dummy_id = std::num::NonZeroU64::new(1).unwrap(); | 
| 63 |     pub(crate) fn new(size: u64) -> Self { | 
| 64 |         #[allow(clippy::unwrap_used)] | 
| 65 |         let initial_chunk_id = std::num::NonZeroU64::new(1).unwrap(); | 
| 370 |     #[inline] | 
| 371 |     #[allow(clippy::unwrap_used)] | 
| 372 |     pub fn replace_entry(self, value: V) -> (K, V) { | 
| 405 |     #[inline] | 
| 406 |     #[allow(clippy::unwrap_used)] | 
| 407 |     pub fn replace_key(self) -> K { | 
| 596 | // `choose` only returns none on empty arrays | 
| 597 | #[allow(clippy::unwrap_used)] | 
| 598 | /// Generate a new name | 
| 58 | 	#[cfg(any(feature = "gas", feature = "intel", feature = "masm", feature = "nasm"))] | 
| 59 | 	#[allow(clippy::unwrap_used)] | 
| 60 | 	pub(crate) fn read_ascii_str(&mut self) -> &'a str { | 
| 176 | 	#[inline] | 
| 177 | 	#[allow(clippy::unwrap_used)] | 
| 178 | 	pub(super) fn new( | 
| 209 | 	#[inline] | 
| 210 | 	#[allow(clippy::unwrap_used)] | 
| 211 | 	pub(super) fn new( | 
| 249 | 	#[inline] | 
| 250 | 	#[allow(clippy::unwrap_used)] | 
| 251 | 	pub(super) fn new(group_handlers: Vec<(OpCodeHandlerDecodeFn, &'static OpCodeHandler)>) -> (OpCodeHandlerDecodeFn, Self) { | 
| 272 | impl OpCodeHandler_AnotherTable { | 
| 273 | 	#[allow(clippy::unwrap_used)] | 
| 274 | 	#[inline] | 
| 201 | 	#[must_use] | 
| 202 | 	#[allow(clippy::unwrap_used)] | 
| 203 | 	fn read_handler_or_null_instance(&mut self) -> (OpCodeHandlerDecodeFn, &'static OpCodeHandler) { | 
| 235 | 	#[allow(clippy::get_unwrap)] | 
| 236 | 	#[allow(clippy::unwrap_used)] | 
| 237 | 	fn read_handler_reference(&mut self) -> (OpCodeHandlerDecodeFn, &'static OpCodeHandler) { | 
| 247 | 	#[allow(clippy::get_unwrap)] | 
| 248 | 	#[allow(clippy::unwrap_used)] | 
| 249 | 	fn read_array_reference(&mut self, kind: u32) -> Vec<(OpCodeHandlerDecodeFn, &'static OpCodeHandler)> { | 
| 270 | 	#[allow(clippy::get_unwrap)] | 
| 271 | 	#[allow(clippy::unwrap_used)] | 
| 272 | 	fn table(&mut self, index: usize) -> Vec<(OpCodeHandlerDecodeFn, &'static OpCodeHandler)> { | 
| 729 | 	#[inline] | 
| 730 | 	#[allow(clippy::unwrap_used)] | 
| 731 | 	pub fn new(bitness: u32, data: &'a [u8], options: u32) -> Decoder<'a> { | 
| 152 |         debug_assert!(day <= C::month_days(year, month) as i32); | 
| 153 |         #[allow(clippy::unwrap_used)] | 
| 154 |         // The day is expected to be within the range of month_days of C | 
| 227 |         #[allow(clippy::unwrap_used)] // day and month have the correct bounds | 
| 228 |         *Date::try_new_coptic_date(year, month, day).unwrap().inner() | 
| 262 |         #[allow(clippy::unwrap_used)] // Coptic and Ethiopic have the same allowed ranges for dates | 
| 263 |         *Date::try_new_ethiopian_date( | 
| 347 |         let (time, extra_days) = types::Time::from_minute_with_remainder_days(minute); | 
| 348 |         #[allow(clippy::unwrap_used)] // constant date | 
| 349 |         let unix_epoch = DateTime::try_new_iso_datetime(1970, 1, 1, 0, 0, 0).unwrap(); | 
| 426 |         #[allow(clippy::unwrap_used)] // month in 1..=12, day <= month_days | 
| 427 |         Date::try_new_iso_date(year, month, day).unwrap() | 
| 453 |     fn iso_new_year(year: i32) -> i32 { | 
| 454 |         #[allow(clippy::unwrap_used)] // valid day and month | 
| 455 |         Self::fixed_from_iso_integers(year, 1, 1).unwrap() | 
| 461 |         let prior_days = date - Self::iso_new_year(year); | 
| 462 |         #[allow(clippy::unwrap_used)] // valid day and month | 
| 463 |         let correction = if date < Self::fixed_from_iso_integers(year, 3, 1).unwrap() { | 
| 470 |         let month = quotient(12 * (prior_days + correction) + 373, 367) as u8; // in 1..12 < u8::MAX | 
| 471 |         #[allow(clippy::unwrap_used)] // valid day and month | 
| 472 |         let day = (date - Self::fixed_from_iso_integers(year, month, 1).unwrap() + 1) as u8; // <= days_in_month < u8::MAX | 
| 267 |         #[allow(clippy::unwrap_used)] // day and month have the correct bounds | 
| 268 |         *Date::try_new_julian_date(year, month, day).unwrap().inner() | 
| 484 |         let (hours, minutes) = (minute_in_day / 60, minute_in_day % 60); | 
| 485 |         #[allow(clippy::unwrap_used)] // values are moduloed to be in range | 
| 486 |         ( | 
| 197 |     ); | 
| 198 |     #[allow(clippy::unwrap_used)] // TODO(#1668) Clippy exceptions need docs or fixing. | 
| 199 |     trie_result.unwrap() | 
| 326 |         // https://github.com/rust-lang/rust/issues/15701 | 
| 327 |         #[allow(clippy::unwrap_used)] | 
| 328 |         let variable_top = if self.options.alternate_handling() == AlternateHandling::NonIgnorable { | 
| 343 |         // https://github.com/rust-lang/rust/issues/15701 | 
| 344 |         #[allow(clippy::unwrap_used)] | 
| 345 |         let numeric_primary = if self.options.numeric() { | 
| 359 |         // https://github.com/rust-lang/rust/issues/15701 | 
| 360 |         #[allow(clippy::unwrap_used)] | 
| 361 |         let mut left = CollationElements::new( | 
| 374 |         // https://github.com/rust-lang/rust/issues/15701 | 
| 375 |         #[allow(clippy::unwrap_used)] | 
| 376 |         let mut right = CollationElements::new( | 
| 1918 |                                             // digit to even start numeric processing. | 
| 1919 |                                             #[allow(clippy::unwrap_used)] | 
| 1920 |                                             let mut value = u32::from(*digit_iter.next().unwrap()); | 
| 2003 |                                         // `unwrap` succeeds by construction | 
| 2004 |                                         #[allow(clippy::unwrap_used)] | 
| 2005 |                                         let mut pair = if len & 1 == 1 { | 
| 2176 |             // means the `unwrap()` must succeed. | 
| 2177 |             #[allow(clippy::unwrap_used)] | 
| 2178 |             let combining = self.next_internal().unwrap().c_and_c; | 
| 142 |         if let Some(slice) = self.contexts.get_subslice(index..self.contexts.len()) { | 
| 143 |             #[allow(clippy::unwrap_used)] | 
| 144 |             if slice.len() >= 2 { | 
| 438 | impl<'data> CollationSpecialPrimariesV1<'data> { | 
| 439 |     #[allow(clippy::unwrap_used)] | 
| 440 |     pub(crate) fn last_primary_for_group(&self, max_variable: MaxVariable) -> u32 { | 
| 29 |         let inv_list: ZeroVec<u32> = ZeroVec::alloc_from_slice(&self.intervals); | 
| 30 |         #[allow(clippy::unwrap_used)] // by invariant | 
| 31 |         CodePointInversionList::try_from_inversion_list(inv_list).unwrap() | 
| 23 |         let inv_list: ZeroVec<u32> = ZeroVec::alloc_from_slice(&set); | 
| 24 |         #[allow(clippy::unwrap_used)] // valid | 
| 25 |         Ok(CodePointInversionList::try_from_inversion_list(inv_list).unwrap()) | 
| 14 | #[allow(clippy::indexing_slicing)] // windows | 
| 15 | #[allow(clippy::unwrap_used)] // by is_empty check | 
| 16 | pub fn is_valid_zv(inv_list_zv: &ZeroVec<'_, u32>) -> bool { | 
| 172 |     ]; | 
| 173 |     #[allow(clippy::unwrap_used)] // valid bytes | 
| 174 |     let index: ZeroVec<u16> = ZeroVec::parse_byte_slice(index_array_as_bytes).unwrap(); | 
| 175 |     #[allow(clippy::unwrap_used)] // valid bytes | 
| 176 |     let data: ZeroVec<u8> = ZeroVec::parse_byte_slice(data_8_array).unwrap(); | 
| 193 |     #[allow(clippy::unwrap_used)] // valid data | 
| 194 |     CodePointTrie::try_new(trie_header, index, data).unwrap() | 
| 115 |     fn from_unaligned(unaligned: Self::ULE) -> Self { | 
| 116 |         #[allow(clippy::unwrap_used)] // OK because the ULE is pre-validated | 
| 117 |         Self::from_idx(unaligned.0).unwrap() | 
| 176 |     fn from_unaligned(unaligned: Self::ULE) -> Self { | 
| 177 |         #[allow(clippy::unwrap_used)] // OK because the ULE is pre-validated | 
| 178 |         Self::from_idx(unaligned.0).unwrap() | 
| 130 |         let value = unaligned.0; | 
| 131 |         #[allow(clippy::unwrap_used)] // validated | 
| 132 |         if PatternItemULE::determine_field_from_u8(value[0]) { | 
| 265 |         } else { | 
| 266 |             #[allow(clippy::unwrap_used)] // validated | 
| 267 |             Self::Literal( | 
| 25 |                 GenericPatternItem::Placeholder(idx) => { | 
| 26 |                     #[allow(clippy::unwrap_used)] // idx is a valid base-10 digit | 
| 27 |                     let replacement = replacements.get(idx as usize).ok_or_else(|| { | 
| 64 |                 GenericPatternItem::Placeholder(idx) => { | 
| 65 |                     #[allow(clippy::unwrap_used)] // idx is a valid base-10 digit | 
| 66 |                     return Err(PatternError::UnknownSubstitution( | 
| 156 |     /// Returns the represented [`DFA`] | 
| 157 |     #[allow(clippy::unwrap_used)] // by invariant | 
| 158 |     pub fn deref(&'data self) -> DFA<&'data [u8]> { | 
| 114 |                 match v.len() { | 
| 115 |                     #[allow(clippy::unwrap_used)] | 
| 116 |                     // we know that the vec has exactly one element left | 
| 136 |             0 => ShortVec::Empty, | 
| 137 |             #[allow(clippy::unwrap_used)] // we know that the vec is not empty | 
| 138 |             1 => ShortVec::Single(v.into_iter().next().unwrap()), | 
| 1170 |             // Now we need to check if composition with an upcoming starter is possible. | 
| 1171 |             #[allow(clippy::unwrap_used)] | 
| 1172 |             if self.decomposition.pending.is_some() { | 
| 273 |     fn supported_locales(&self) -> Result<Vec<DataLocale>, DataError> { | 
| 274 |         #[allow(clippy::unwrap_used)] // datagen | 
| 275 |         Ok(Self::DATA | 
| 177 |         if let Some(value) = self.backup_extension.take() { | 
| 178 |             #[allow(clippy::unwrap_used)] // not reachable unless extension_key is present | 
| 179 |             locale.set_unicode_ext(self.config.extension_key.unwrap(), value); | 
| 145 |     // The statically compiled data file is valid. | 
| 146 |     #[allow(clippy::unwrap_used)] | 
| 147 |     LocaleFallbackProvider::try_new_unstable(unstable_no_fallback()).unwrap() | 
| 165 |     // The baked data is valid. | 
| 166 |     #[allow(clippy::unwrap_used)] | 
| 167 |     LocaleFallbackProvider::try_new_with_any_provider(any_no_fallback()).unwrap() | 
| 182 |     // The statically compiled data file is valid. | 
| 183 |     #[allow(clippy::unwrap_used)] | 
| 184 |     LocaleFallbackProvider::try_new_with_buffer_provider(buffer_no_fallback()).unwrap() | 
| 28 |         let inv_list: ZeroVec<u32> = ZeroVec::alloc_from_slice(&self.intervals); | 
| 29 |         #[allow(clippy::unwrap_used)] // TODO(#1668) Clippy exceptions need docs or fixing. | 
| 30 |         UnicodeSet::from_inversion_list(inv_list).unwrap() | 
| 23 |         let inv_list: ZeroVec<u32> = ZeroVec::alloc_from_slice(&set); | 
| 24 |         #[allow(clippy::unwrap_used)] // TODO(#1668) Clippy exceptions need docs or fixing. | 
| 25 |         Ok(UnicodeSet::from_inversion_list(inv_list).unwrap()) | 
| 40 |     fn from_ecma_locale<L: ecma402_traits::Locale>(other: L) -> Self { | 
| 41 |         #[allow(clippy::unwrap_used)] // ecma402_traits::Locale::to_string is a valid locale | 
| 42 |         Self( | 
| 113 |         let nstr = fixed_format(n, &opts); | 
| 114 |         #[allow(clippy::unwrap_used)] // TODO(#1668) Clippy exceptions need docs or fixing. | 
| 115 |         let ret = nstr.parse().unwrap(); | 
| 33 | #[allow(clippy::unwrap_used)] | 
| 34 | pub(crate) fn sort_lex_with_map<F: Float, MAP>(list: &mut [Complex<F>], keys: &[Keys], | 
| 21 | fn main() -> ! { | 
| 22 |     #[allow(clippy::unwrap_used)] | 
| 23 |     let cp = cortex_m::Peripherals::take().unwrap(); | 
| 24 |     #[allow(clippy::unwrap_used)] | 
| 25 |     let dp = pac::Peripherals::take().unwrap(); | 
| 21 | fn main() -> ! { | 
| 22 |     #[allow(clippy::unwrap_used)] | 
| 23 |     let cp = cortex_m::Peripherals::take().unwrap(); | 
| 24 |     #[allow(clippy::unwrap_used)] | 
| 25 |     let dp = pac::Peripherals::take().unwrap(); | 
| 299 |     ) -> Value { | 
| 300 |         #[allow(clippy::option_unwrap_used)] | 
| 301 |         preserve_keys(map.as_object_mut().unwrap(), keywords_to_remove); | 
| 155 |         // We flush stdout so it'll write the buffer to screen, continuing operation. Without it, the application halts. | 
| 156 |         #[allow(clippy::unwrap_used)] | 
| 157 |         io::stdout().flush().unwrap(); | 
| 96 |         // the error by using `Result<Vec<_>, _>` with `collect`. | 
| 97 |         #[allow(clippy::unwrap_used)] | 
| 98 |         let data: Result<Vec<_>, _> = reader | 
| 30 |     #[allow(clippy::unwrap_used)] | 
| 31 |     if config_dir.join(config::CONFIG_BASENAME).exists() | 
| 39 |     #[allow(clippy::unwrap_used)] | 
| 40 |     let store_dir = matches.get_one::<PathBuf>("store-dir").unwrap().as_path(); | 
| 47 |     #[allow(clippy::unwrap_used)] | 
| 48 |     let password = if !*matches.get_one::<bool>("insecure-not-wrapped").unwrap() { | 
| 63 |         let mut agent = agent::Agent::new()?; | 
| 64 |         #[allow(clippy::unwrap_used)] | 
| 65 |         if !matches.get_one::<bool>("foreground").unwrap() { | 
| 87 |     #[allow(clippy::unwrap_used)] | 
| 88 |     if *matches.get_one::<bool>("quit").unwrap() { | 
| 64 |             // Safe unwrap: alphabet.chars() is always nonempty. | 
| 65 |             #[allow(clippy::unwrap_used)] | 
| 66 |             secret.push(alphabet.chars().choose(&mut rng).unwrap()); | 
| 80 |             // Unwrap safety: take_terse_fields checks FIELD_COUNT to ensure sufficient elements. | 
| 81 |             #[allow(clippy::unwrap_used)] | 
| 82 |             (fields.pop().unwrap(), fields.pop().unwrap()) | 
| 117 |             // Unwrap safety: take_terse_fields checks FIELD_COUNT to ensure sufficient elements. | 
| 118 |             #[allow(clippy::unwrap_used)] | 
| 119 |             (fields.pop().unwrap(), fields.pop().unwrap()) | 
| 143 |         // Unwrap safety: take_terse_fields checks FIELD_COUNT to ensure sufficient elements. | 
| 144 |         #[allow(clippy::unwrap_used)] | 
| 145 |         let contents = Self::take_terse_fields()?.pop().unwrap(); | 
| 19 |     for needle_char in &needle[1..] { | 
| 20 |         #[allow(clippy::option_unwrap_used)] | 
| 21 |         let mut distance: usize = *lsp.last().unwrap(); | 
| 375 |     #[inline] | 
| 376 |     #[allow(clippy::unwrap_used)] | 
| 377 |     pub fn get_or_insert(&self, key: K, value: V, guard: &'guard Guard) -> &'guard V { | 
| 27 |     // safety: stdin/stdout is only taken once, panic unlikely | 
| 28 |     #[allow(clippy::unwrap_used)] | 
| 29 |     pub fn new(cmd: &str) -> io::Result<Self> { | 
| 71 |     // safety: regex is known to compile fine, no panic | 
| 72 |     #[allow(clippy::unwrap_used)] | 
| 73 |     pub fn new() -> Self { | 
| 176 | // panic though. | 
| 177 | #[allow(clippy::unwrap_used)] | 
| 178 | impl CoverageData { | 
| 559 |                 // safety: guaranteed, using sorted keys as input | 
| 560 |                 #[allow(clippy::unwrap_used)] | 
| 561 |                 let cd_line = cd.lines.get(line_number).unwrap(); | 
| 18 |     #[must_use] | 
| 19 |     #[allow(clippy::unwrap_used)] | 
| 20 |     /// # Panics | 
| 62 |     #[allow(clippy::option_unwrap_used)] | 
| 63 |     #[allow(clippy::wildcard_enum_match_arm)] | 
| 66 |     #[allow(clippy::option_unwrap_used)] | 
| 67 |     #[allow(clippy::result_unwrap_used)] | 
| 68 |     fn list<N: Into<PathBuf>>(&self, prefix: N) -> Result<Vec<(DatasetKind, PathBuf)>> { | 
| 165 | impl ZfsOpen3 { | 
| 166 |     #[allow(clippy::option_unwrap_used)] | 
| 167 |     fn stdout_to_list_of_datasets(z: &mut Command) -> Result<Vec<PathBuf>, Error> { | 
| 61 |     #[allow(clippy::option_unwrap_used, clippy::wildcard_enum_match_arm)] | 
| 62 |     pub(crate) fn from_pest_pair(pair: Pair<'_, Rule>) -> Zpool { | 
| 121 | #[inline] | 
| 122 | #[allow(clippy::option_unwrap_used, clippy::result_unwrap_used, clippy::wildcard_enum_match_arm)] | 
| 123 | fn get_error_statistics_from_pair(pair: Pair<'_, Rule>) -> ErrorStatistics { | 
| 133 | #[inline] | 
| 134 | #[allow(clippy::option_unwrap_used, clippy::wildcard_enum_match_arm)] | 
| 135 | fn set_stats_and_reason_from_pool_line(pool_line: Pair<'_, Rule>, zpool: &mut ZpoolBuilder) { | 
| 191 | #[inline] | 
| 192 | #[allow(clippy::option_unwrap_used, clippy::wildcard_enum_match_arm)] | 
| 193 | fn get_stats_and_reason_from_pairs(pairs: Pairs<'_, Rule>) -> (ErrorStatistics, Option<Reason>) { | 
| 192 |     /// Try to convert stderr into internal error type. | 
| 193 |     #[allow(clippy::option_unwrap_used)] | 
| 194 |     pub fn from_stderr(stderr_raw: &[u8]) -> ZpoolError { | 
| 117 |         match self.find_index(key) { | 
| 118 |             #[allow(clippy::unwrap_used)] // find_index returns a valid index | 
| 119 |             Ok(found) => Some(self.values.lm_get(found).unwrap().1), | 
| 254 |         match self.find_index(key) { | 
| 255 |             #[allow(clippy::unwrap_used)] // find_index returns a valid index | 
| 256 |             Ok(found) => Some(self.values.lm_get_mut(found).unwrap().1), | 
| 318 |         match self.values.lm_binary_search_by(|k| k.cmp(&key)) { | 
| 319 |             #[allow(clippy::unwrap_used)] // Index came from binary_search | 
| 320 |             Ok(found) => Some(( | 
| 39 |         while i < self.values.lm_len() { | 
| 40 |             #[allow(clippy::unwrap_used)] // i is in range | 
| 41 |             let (k, v) = self.values.lm_get(i).unwrap(); | 
| 113 |         while i < self.lm_len() { | 
| 114 |             #[allow(clippy::unwrap_used)] // i is in range | 
| 115 |             let (k, v) = self.lm_get(i).unwrap(); | 
| 192 |         // `last()` cannot fail. | 
| 193 |         #[allow(clippy::unwrap_used)] | 
| 194 |         self.scopes.last().unwrap() | 
| 200 |         // `last()` cannot fail. | 
| 201 |         #[allow(clippy::unwrap_used)] | 
| 202 |         self.scopes.last_mut().unwrap() | 
| 268 |         // Unwrap safety: we check for at least one scope above, so this cannot fail. | 
| 269 |         #[allow(clippy::unwrap_used)] | 
| 270 |         let scope = self.scopes.pop().unwrap(); | 
| 4 | // Unwrap safety: None. If this fails, the build fails, and that's intended. | 
| 5 | #[allow(clippy::unwrap_used)] | 
| 6 | fn main() { | 
| 115 |             // Unwrap safety: we check for a nonempty spec above. | 
| 116 |             #[allow(clippy::unwrap_used)] | 
| 117 |             match spec.chars().next().unwrap() { | 
| 329 |                 // bitstream here, but it's difficult to represent that at the type level during unrolling. | 
| 330 |                 #[allow(clippy::unwrap_used)] | 
| 331 |                 let block = entry.unwrap()?.as_block().ok_or_else(|| { | 
| 485 |         #[allow(clippy::unwrap_used)] | 
| 486 |         Ok(BitcodeModule { | 
| 4 | // Unwrap safety: None. If this fails, the build fails, and that's intended. | 
| 5 | #[allow(clippy::unwrap_used)] | 
| 6 | fn main() { | 
| 341 |         // Unwrap safety: we check for a nonempty string above. | 
| 342 |         #[allow(clippy::unwrap_used)] | 
| 343 |         let id = value.chars().next().unwrap(); | 
| 469 |         // into an infallible constant. | 
| 470 |         #[allow(clippy::unwrap_used)] | 
| 471 |         Self(vec![ | 
| 499 |                     // Unwrap safety: `pos` is a valid index returned above. | 
| 500 |                     #[allow(clippy::unwrap_used)] | 
| 501 |                     let mut other = self.0.get_mut(pos).unwrap(); | 
| 727 |                     // Unwrap safety: `pos` is a valid index returned above. | 
| 728 |                     #[allow(clippy::unwrap_used)] | 
| 729 |                     let mut other = self.0.get_mut(pos).unwrap(); | 
| 44 | #[cfg(test)] | 
| 45 | #[allow(clippy::integer_arithmetic, clippy::unwrap_used)] | 
| 46 | mod tests { | 
| 137 | #[cfg(test)] | 
| 138 | #[allow(clippy::unwrap_used)] | 
| 139 | mod tests { | 
| 369 |     #[inline] | 
| 370 |     #[allow(clippy::unwrap_used)] | 
| 371 |     pub fn get_or_insert(&self, key: K, value: V, guard: &'guard Guard) -> &'guard V { | 
| 523 |     /// `load_inner` atomically loads the `MapInner` of hashmap. | 
| 524 |     #[allow(clippy::unwrap_used)] | 
| 525 |     fn load_inner(&self, guard: &'guard Guard) -> &'guard map_inner::MapInner<K, V> { | 
| 21 |     // u16::MAX is greater than 0 | 
| 22 |     allow(clippy::missing_panics_doc, clippy::unwrap_used) | 
| 23 |   ] | 
| 56 |       // Option will always exist | 
| 57 |       clippy::unwrap_used | 
| 58 |     )] | 
| 9 | #[test] | 
| 10 | #[allow(clippy::result_unwrap_used)] | 
| 11 | fn mangling() { | 
| 43 | #[test] | 
| 44 | #[allow(clippy::result_unwrap_used)] | 
| 45 | fn demangling() { | 
| 1348 |     #[allow(clippy::unwrap_used)] | 
| 1349 |     static TMP_DIR: Lazy<TempDir> = Lazy::new(|| tempdir().unwrap()); | 
| 619 | #[allow(clippy::unwrap_used)] | 
| 620 | #[cfg(test)] | 
| 49 |     { | 
| 50 |         #[allow(clippy::unwrap_used)] | 
| 51 |         self.random_forward_neighbour(rng, NonZeroUsize::new(1).unwrap()) | 
| 63 |     { | 
| 64 |         #[allow(clippy::unwrap_used)] | 
| 65 |         self.random_backward_neighbour(rng, NonZeroUsize::new(1).unwrap()) | 
| 84 | #[allow(clippy::result_unwrap_used, clippy::option_unwrap_used)] | 
| 85 | #[cfg(test)] | 
| 317 | #[allow(clippy::unwrap_used)] | 
| 318 | fn sort_partial_by<F, T>(slice: &mut [T], f: F) | 
| 53 | static GITHUB_HTTPS_URL: Lazy<Regex> = Lazy::new(|| { | 
| 54 |     #[allow(clippy::unwrap_used)] | 
| 55 |     Regex::new("^https?://(?P<domain>github\\.com)/(?P<owner>.*?)/(?P<repo>.*?)(/?|(?:\\.git))$") | 
| 59 | static GITHUB_GIT_URL: Lazy<Regex> = Lazy::new(|| { | 
| 60 |     #[allow(clippy::unwrap_used)] | 
| 61 |     Regex::new("^git@(?P<domain>github\\.com):(?P<owner>.*?)/(?P<repo>.*?)(?:\\.git)?$").unwrap() | 
| 64 | static GITHUB_SSH_URL: Lazy<Regex> = Lazy::new(|| { | 
| 65 |     #[allow(clippy::unwrap_used)] | 
| 66 |     Regex::new( | 
| 15 | #[cfg(test)] | 
| 16 | #[allow(clippy::expect_used, clippy::unwrap_used)] | 
| 17 | impl Fixture { | 
| 145 |     // self.curr_dim_idx always points to a valid reference | 
| 146 |     clippy::unwrap_used | 
| 147 |   )] | 
| 154 |     // Constructor doesn't contain empty dimensions | 
| 155 |     clippy::unwrap_used | 
| 156 |   )] | 
| 145 |     // self.curr_dim_idx always points to a valid reference | 
| 146 |     clippy::unwrap_used | 
| 147 |   )] | 
| 154 |     // Constructor doesn't contain empty dimensions | 
| 155 |     clippy::unwrap_used | 
| 156 |   )] | 
| 142 |     let progress_println = |msg: &dyn AsRef<str>| { | 
| 143 |         #[allow(clippy::unwrap_used)] | 
| 144 |         progress.as_ref().unwrap().println(msg); | 
| 71 |             let mut parser = Parser::new_from(lexer); | 
| 72 |             #[allow(clippy::unwrap_used)] | 
| 73 |             let module = parser | 
| 74 |             let content = read_to_string(test_file)?; | 
| 75 |             #[allow(clippy::unwrap_used)] | 
| 76 |             let file = parse_file(&content).with_context(|| { | 
| 441 |     #[allow(clippy::unwrap_used)] | 
| 442 |     fn readme_contains_code_bulleted_list(items: &[&str]) -> bool { | 
| 23 | pub trait Interface: std::fmt::Debug { | 
| 24 |     #[allow(clippy::unwrap_used)] | 
| 25 |     fn name(&self) -> String { | 
| 64 |     #[allow(clippy::expect_used)] | 
| 65 |     #[allow(clippy::unwrap_used)] | 
| 66 |     fn rewrite(&mut self, start: usize, end: usize, replacement: &str) -> String { | 
| 22 |     #[allow(clippy::unwrap_used)] | 
| 23 |     fn relative_path(&self) -> &Path { | 
| 167 |     #[allow(clippy::unwrap_used)] | 
| 168 |     let path = remote | 
| 81 |     #[allow(clippy::unwrap_used)] | 
| 82 |     let mut warning_state_map = WARNING_STATE_MAP.lock().unwrap(); | 
| 112 | #[test] | 
| 113 | #[allow(clippy::unwrap_used)] | 
| 114 | fn try_from() { | 
| 150 | #[test] | 
| 151 | #[allow(clippy::unwrap_used)] | 
| 152 | fn serialize() { | 
| 159 | #[test] | 
| 160 | #[allow(clippy::unwrap_used)] | 
| 161 | fn deserialize() { | 
| 170 | #[should_panic] | 
| 171 | #[allow(clippy::unwrap_used)] | 
| 172 | fn deserialize_name_contains_slash() { | 
| 159 | #[test] | 
| 160 | #[allow(clippy::unwrap_used)] | 
| 161 | fn serialize() { | 
| 168 | #[test] | 
| 169 | #[allow(clippy::unwrap_used)] | 
| 170 | fn deserialize() { | 
| 65 | #[allow(clippy::unwrap_used)] | 
| 66 | impl fmt::Display for Permission { | 
| 167 | #[cfg(test)] | 
| 168 | #[allow(clippy::unwrap_used)] | 
| 169 | mod test { | 
| 161 | impl ToString for Manifest { | 
| 162 |     #[allow(clippy::unwrap_used)] | 
| 163 |     fn to_string(&self) -> String { | 
| 171 | #[cfg(test)] | 
| 172 | #[allow(clippy::unwrap_used)] | 
| 173 | mod tests { | 
| 412 | // it always or never fails | 
| 413 | #[allow(clippy::unwrap_used)] | 
| 414 | fn http_client() -> reqwest::blocking::Client { | 
| 434 | // it always or never fails | 
| 435 | #[allow(clippy::unwrap_used)] | 
| 436 | fn http_client(allow_insecure: bool) -> reqwest::blocking::Client { | 
| 61 |         // If anyone ever find this to be a performance bottleneck in a real application, this can be fixed with some smarter implementation. | 
| 62 |         #[allow(clippy::unwrap_used)] | 
| 63 |         if let Some(index) = self.data.iter().position(|maybe_activity| { | 
| 65 |     /// Returns a reference to a value of the specified type, if such a value has previously been stored to the domain. | 
| 66 |     #[allow(clippy::unwrap_used)] | 
| 67 |     pub fn try_get<T: Any>(&self) -> Option<&T> { | 
| 72 |     /// Same as [`try_get`](#try_get) but grants mutable access to the object. | 
| 73 |     #[allow(clippy::unwrap_used)] | 
| 74 |     pub fn try_get_mut<T: Any>(&mut self) -> Option<&mut T> { | 
| 81 |     /// Return two mutable references to domain objects | 
| 82 |     #[allow(clippy::unwrap_used)] | 
| 83 |     pub fn try_get_2_mut<T1: Any, T2: Any>(&mut self) -> (Option<&mut T1>, Option<&mut T2>) { | 
| 115 |     /// [`try_get()`](#try_get) is usually recommended instead. | 
| 116 |     #[allow(clippy::unwrap_used)] | 
| 117 |     pub fn get<T: Any>(&self) -> &T { | 
| 123 |     /// [`try_get_mut()`](#try_get_mut) is usually recommended instead. | 
| 124 |     #[allow(clippy::unwrap_used)] | 
| 125 |     pub fn get_mut<T: Any>(&mut self) -> &mut T { | 
| 96 |         match good { | 
| 97 |             #[allow(clippy::unwrap_used)] // Supplier::produce() cannot fail. | 
| 98 |             Self::Good::Read { path } => self | 
| 100 |     /// Creates a new context to highlight a certain position | 
| 101 |     #[allow(clippy::unwrap_used)] | 
| 102 |     pub fn position(pos: &Position<'_>) -> Context { | 
| 133 |                             } | 
| 134 |                             #[allow(clippy::unwrap_used)] | 
| 135 |                             parse_matrix(s, get_f64(&single.content, &context),pdb.scale.as_mut().unwrap(), &context) | 
| 140 |                             } | 
| 141 |                             #[allow(clippy::unwrap_used)] | 
| 142 |                             parse_matrix(s, get_f64(&single.content, &context),pdb.origx.as_mut().unwrap(), &context) | 
| 365 |     // The previous lines make sure that there is no error in the vector. | 
| 366 |     #[allow(clippy::unwrap_used)] | 
| 367 |     let positions: Vec<Option<usize>> = positions_.iter().map(|i| *i.as_ref().unwrap()).collect(); | 
| 436 |         { | 
| 437 |             #[allow(clippy::unwrap_used)] | 
| 438 |             Some([ | 
| 482 |                 (*pdb_pointer).add_model(Model::new(model_number)); | 
| 483 |                 #[allow(clippy::unwrap_used)] | 
| 484 |                 (*pdb_pointer).models_mut().rev().next().unwrap() | 
| 383 |     let mut charge = 0; | 
| 384 |     #[allow(clippy::unwrap_used)] | 
| 385 |     if chars.len() >= 80 && !(chars[78] == ' ' && chars[79] == ' ') { | 
| 610 | /// Adds all bonds to the PDB, has to be done after all Atoms are already in place | 
| 611 | #[allow(clippy::unwrap_used)] | 
| 612 | fn add_bonds(pdb: &mut PDB, bonds: Vec<(Context, LexItem)>) -> Vec<PDBError> { | 
| 46 | /// It does change the output format based on the StrictnessLevel given. | 
| 47 | #[allow(clippy::unwrap_used)] | 
| 48 | pub fn save_mmcif_raw<T: Write>(pdb: &PDB, mut sink: BufWriter<T>) { | 
| 106 | // in the upcoming architectural changes soon. | 
| 107 | #[allow(clippy::unwrap_used)] | 
| 108 | #[allow(clippy::fallible_impl_from)] | 
| 140 | // Although there are plans to expand support for custom registries in the future. | 
| 141 | #[allow(clippy::unwrap_used)] | 
| 142 | #[allow(clippy::missing_panics_doc)] | 
| 233 |     #[allow(clippy::missing_panics_doc)] | 
| 234 |     #[allow(clippy::unwrap_used)] | 
| 235 |     #[allow(clippy::unwrap_in_result)] | 
| 186 |     #[allow(clippy::unwrap_used)] | 
| 187 |     #[allow(clippy::missing_panics_doc)] | 
| 18 | #[allow(clippy::missing_panics_doc)] | 
| 19 | #[allow(clippy::unwrap_used)] | 
| 20 | #[allow(clippy::too_many_lines)] | 
| 39 |     #[allow(clippy::unwrap_used)] | 
| 40 |     // We run this one after linting. | 
| 135 |     #[allow(clippy::unwrap_in_result)] | 
| 136 |     #[allow(clippy::unwrap_used)] | 
| 137 |     pub fn fill_from_backup(root: &Utf8Path) -> Result<Self, CliError> { | 
| 167 |     #[allow(clippy::unwrap_used)] | 
| 168 |     pub fn extend_from_root_excluding_fields_dir_and_plow_backup( | 
| 243 |     #[allow(clippy::indexing_slicing)] | 
| 244 |     #[allow(clippy::unwrap_used)] | 
| 245 |     pub fn write_with_children(&mut self) -> Result<(), CliError> { | 
| 112 |             #[allow(clippy::unwrap_used)] | 
| 113 |             let root_field_name = root_field_manifest.field_namespace_and_name().unwrap(); | 
| 157 |     // Filter underscores and '@' since they are the only allowed chars other than alphanumeric ones. | 
| 158 |     #[allow(clippy::unwrap_used)] | 
| 159 |     let name = namespace_and_name.pop().unwrap().replace('_', ""); | 
| 161 |     #[allow(clippy::unwrap_used)] | 
| 162 |     let namespace = namespace_and_name | 
| 44 |             // We explicitly pass valid data, unwrap is safe here. | 
| 45 |             #[allow(clippy::unwrap_used)] | 
| 46 |             let annotations = graph | 
| 43 |             // We explicitly pass valid data, unwrap is safe here. | 
| 44 |             #[allow(clippy::unwrap_used)] | 
| 45 |             let annotations = graph | 
| 29 |     // TODO: Refactor and finish this function later | 
| 30 |     #[allow(clippy::unwrap_used)] | 
| 31 |     fn run(&self, linter: &Linter) -> LintResult { | 
| 37 |             // We explicitly pass valid data, unwrap is safe here. | 
| 38 |             #[allow(clippy::unwrap_used)] | 
| 39 |             let annotations = rdf_graph_borrow | 
| 58 |             // We know that `annotations` has at least one member here. | 
| 59 |             #[allow(clippy::unwrap_used)] | 
| 60 |             let annotation = annotations.iter().next().unwrap(); | 
| 16 | // TODO: Refactor unwraps | 
| 17 | #[allow(clippy::unwrap_used)] | 
| 18 | impl Lint for HasOntologyDeclaration { | 
| 32 |             // We explicitly pass valid data, unwrap is safe here. | 
| 33 |             #[allow(clippy::unwrap_used)] | 
| 34 |             let graph_borrow = linter.graph.inner.borrow(); | 
| 50 |             // We explicitly pass valid data, unwrap is safe here. | 
| 51 |             #[allow(clippy::unwrap_used)] | 
| 52 |             if !has_exact_ontology_declaration { | 
| 60 |         // We explicitly pass valid data, unwrap is safe here. | 
| 61 |         #[allow(clippy::unwrap_used)] | 
| 62 |         let annotations = rdf_graph_borrow | 
| 93 |         // We explicitly pass valid data, unwrap is safe here. | 
| 94 |         #[allow(clippy::unwrap_used)] | 
| 95 |         let annotations = rdf_graph_borrow | 
| 87 |         if let Some(ssh_priv_key) = ssh_priv_key_to_callback { | 
| 88 |             #[allow(clippy::unwrap_used)] | 
| 89 |             callbacks.credentials(move |_url, username_from_url, _allowed_types| { | 
| 420 |                     #[allow(clippy::unwrap_used)] | 
| 421 |                     // This is fine, we have just inserted it. | 
| 439 |         #[allow(clippy::unwrap_used)] | 
| 440 |         let mut valid_versions_for_package = self | 
| 250 |     #[test] | 
| 251 |     #[allow(clippy::unwrap_used)] | 
| 252 |     fn test_get_tile_some() -> Result<()> { | 
| 105 | #[cfg(test)] | 
| 106 | #[allow(clippy::unwrap_used)] | 
| 107 | mod test { | 
| 98 |             // point framework_cell has been initialized | 
| 99 |             #[allow(clippy::unwrap_used)] | 
| 100 |             let framework = framework_cell_2.get().unwrap().clone(); | 
| 169 |     #[test] | 
| 170 |     #[allow(clippy::unwrap_used)] | 
| 171 |     fn test_unmarshal_with_dataset() { | 
| 75 |         #[cfg(feature = "panic-on-error")] | 
| 76 |         #[allow(clippy::unwrap_used)] | 
| 77 |         if let Some(error) = res.error() { | 
| 623 |             //UNWRAP: Checked at beginning of loop, functions must contain at least one value | 
| 624 |             #[allow(clippy::unwrap_used)] | 
| 625 |             let last_function = functions.last().unwrap(); | 
| 749 |                         // If we encountered INLINED functions (all `StackFrames`s in this Vec, except for the last one, which is the containing NON-INLINED function), these are simply added to the list of stack_frames we return. | 
| 750 |                         #[allow(clippy::unwrap_used)] | 
| 751 |                         let inlined_frame = cached_stack_frames.pop().unwrap(); // unwrap is safe while .len() > 1 | 
| 760 |                         // If there is only one stack frame, then it is a NON-INLINED function, and we will attempt to unwind further. | 
| 761 |                         #[allow(clippy::unwrap_used)] | 
| 762 |                         cached_stack_frames.pop().unwrap() // unwrap is safe for .len==1 | 
| 218 | #[allow(clippy::unwrap_used, clippy::expect_used)] | 
| 219 | pub(crate) fn _print_all_attributes( | 
| 919 |                                             { | 
| 920 |                                                 #[allow(clippy::unwrap_used)] | 
| 921 |                                                 // Use of `unwrap` below is safe because we first check for `is_none()`. | 
| 402 | #[cfg(test)] | 
| 403 | #[allow(clippy::unwrap_used)] | 
| 404 | mod test { | 
| 257 |                                 { | 
| 258 |                                     #[allow(clippy::unwrap_used)] | 
| 259 |                                     match target_core.attach_to_rtt( | 
| 90 | #[cfg(test)] | 
| 91 | #[allow(clippy::unwrap_used)] | 
| 92 | mod tests { | 
| 45 | #[cfg(test)] | 
| 46 | #[allow(clippy::unwrap_used)] | 
| 47 | mod tests { | 
| 90 | #[cfg(test)] | 
| 91 | #[allow(clippy::unwrap_used)] | 
| 92 | mod tests { | 
| 45 | #[cfg(test)] | 
| 46 | #[allow(clippy::unwrap_used)] | 
| 47 | mod tests { | 
| 68 |     pub async fn from_env(client_name: &str) -> Result<Self, RedditError> { | 
| 69 |         #[allow(clippy::unwrap_used)] | 
| 70 |         Self::try_from_env(client_name).await.unwrap() | 
| 170 | 		let (sender, receiver) = oneshot::channel(); | 
| 171 | 		#[allow(clippy::unwrap_used)] // We don't handle poisoning | 
| 172 | 		self.response_sender.lock().unwrap().insert(uuid, sender); | 
| 203 | 		let (sender, receiver) = oneshot::channel(); | 
| 204 | 		#[allow(clippy::unwrap_used)] // We don't handle poisoning | 
| 205 | 		self.response_sender.lock().unwrap().insert(uuid, sender); | 
| 86 | 		#[allow(clippy::unwrap_used)] // We don't handle poisoning | 
| 87 | 		let sender = sender.0.lock().unwrap().remove(&job.id()).ok_or(JobError::MissingSender)?; | 
| 302 |         #[cfg(debug_assertions)] | 
| 303 |         #[allow(clippy::unwrap_used)] | 
| 304 |         if let Some(export_path) = export_path { | 
| 202 | #[test] | 
| 203 | #[allow(clippy::result_unwrap_used)] | 
| 204 | fn test_wait_when_protected() { | 
| 177 |         cipher.seek(<ChaCha20LegacyCore as BlockSizeUser>::BlockSize::to_usize()); | 
| 178 |         #[allow(clippy::indexing_slicing, clippy::unwrap_used)] | 
| 179 |         cipher.apply_keystream(&mut plaintext_in_ciphertext_out[PACKET_LENGTH_LEN..]); | 
| 196 |         #[allow(clippy::indexing_slicing, clippy::unwrap_used)] | 
| 197 |         let tag_out = self | 
| 33 |             PublicKey::RSA { ref key, .. } => { | 
| 34 |                 #[allow(clippy::unwrap_used)] // type known | 
| 35 |                 let rsa = key.0.rsa().unwrap(); | 
| 45 |     fn compute(&self, sequence_number: u32, payload: &[u8], output: &mut [u8]) { | 
| 46 |         #[allow(clippy::unwrap_used)] | 
| 47 |         let mut hmac = <M as digest::Mac>::new_from_slice(&self.key).unwrap(); | 
| 48 |         #[allow(clippy::unwrap_used)] | 
| 49 |         let mut enc = self.common.encrypted.as_mut().unwrap(); | 
| 144 |         #[allow(clippy::unwrap_used)] | 
| 145 |         let mut enc = self.common.encrypted.as_mut().unwrap(); | 
| 116 |     #[allow(clippy::unwrap_used)] | 
| 117 |     pub async fn read_ssh_id(&mut self) -> Result<&[u8], Error> { | 
| 110 |             #[cfg(feature = "openssl")] | 
| 111 |             #[allow(clippy::unwrap_used)] // key is known to be private | 
| 112 |             key::KeyPair::RSA { ref key, .. } => { | 
| 297 |             #[allow(clippy::indexing_slicing, clippy::unwrap_used)] | 
| 298 |             // length is checked, hash already checked | 
| 56 | impl Encoding for Vec<u8> { | 
| 57 |     #[allow(clippy::unwrap_used)] // writing into Vec<> can't panic | 
| 58 |     fn extend_ssh_string(&mut self, s: &[u8]) { | 
| 63 |     #[allow(clippy::unwrap_used)] // writing into Vec<> can't panic | 
| 64 |     fn extend_ssh_string_blank(&mut self, len: usize) -> &mut [u8] { | 
| 72 |     #[allow(clippy::unwrap_used)] // writing into Vec<> can't panic | 
| 73 |     #[allow(clippy::indexing_slicing)] // length is known | 
| 120 |                 let rounds = kdfopts.read_u32()?; | 
| 121 |                 #[allow(clippy::unwrap_used)] // parameters are static | 
| 122 |                 #[allow(clippy::indexing_slicing)] // output length is static | 
| 134 |             b"aes128-cbc" => { | 
| 135 |                 #[allow(clippy::unwrap_used)] // parameters are static | 
| 136 |                 let cipher = cbc::Decryptor::<Aes128>::new_from_slices(key, iv).unwrap(); | 
| 140 |             b"aes256-cbc" => { | 
| 141 |                 #[allow(clippy::unwrap_used)] // parameters are static | 
| 142 |                 let cipher = cbc::Decryptor::<Aes256>::new_from_slices(key, iv).unwrap(); | 
| 146 |             b"aes128-ctr" => { | 
| 147 |                 #[allow(clippy::unwrap_used)] // parameters are static | 
| 148 |                 let mut cipher = Ctr64LE::<Aes128>::new_from_slices(key, iv).unwrap(); | 
| 152 |             b"aes256-ctr" => { | 
| 153 |                 #[allow(clippy::unwrap_used)] // parameters are static | 
| 154 |                 let mut cipher = Ctr64LE::<Aes256>::new_from_slices(key, iv).unwrap(); | 
| 11 | #[allow(clippy::unwrap_used)] | 
| 12 | static DEFAULT_API_SERVERS: Lazy<Vec<Url>> = Lazy::new(|| { | 
| 25 | #[allow(clippy::unwrap_used)] | 
| 26 | static DEFAULT_DOWNLOAD_SERVERS: Lazy<Vec<Url>> = Lazy::new(|| { | 
| 39 | #[allow(clippy::unwrap_used)] | 
| 40 | static DEFAULT_UPLOAD_SERVERS: Lazy<Vec<Url>> = Lazy::new(|| { | 
| 17 | #[allow(clippy::unwrap_used)] | 
| 18 | #[cfg(feature = "async")] | 
| 22 | #[allow(clippy::unwrap_used)] | 
| 23 | #[cfg(feature = "async")] | 
| 38 | #[allow(clippy::unwrap_used)] | 
| 39 | pub fn init_server() -> (MockServer, FilenSettings) { | 
| 96 |         #[allow(clippy::unwrap_used)] | 
| 97 |         let multipart = ctx.multipart.as_ref().unwrap(); | 
| 82 |     #[allow(clippy::unwrap_used)] | 
| 83 |     let s = from_ascii(buf.as_ref()).unwrap(); | 
| 49 | /// on-stack formatting | 
| 50 | #[allow(clippy::unwrap_used)] | 
| 51 | pub fn fmt_timestamp<T>(val: &Timestamp, fmt: TimestampFormat, f: impl FnOnce(&[u8]) -> T) -> T { | 
| 129 |     /// Peeks the next event | 
| 130 |     #[allow(clippy::unwrap_used, clippy::unwrap_in_result)] | 
| 131 |     fn peek_event(&mut self) -> DeResult<DeEvent<'xml>> { | 
| 219 |     /// Set the reference message this message is a reply to. | 
| 220 |     #[allow(clippy::unwrap_used)] // allowing unwrap here because serializing MessageReference should never error | 
| 221 |     pub fn reference_message(&mut self, reference: impl Into<MessageReference>) -> &mut Self { | 
| 354 |     #[allow(clippy::unwrap_used)] // Allowing unwrap because all should be Some() by this point | 
| 355 |     #[instrument(skip(self))] | 
| 214 |     /// Use the given configuration to build the [`ComponentInteractionCollector`]. | 
| 215 |     #[allow(clippy::unwrap_used)] | 
| 216 |     #[must_use] | 
| 251 |     type Output = Option<Arc<MessageComponentInteraction>>; | 
| 252 |     #[allow(clippy::unwrap_used)] | 
| 253 |     fn poll(mut self: Pin<&mut Self>, ctx: &mut FutContext<'_>) -> Poll<Self::Output> { | 
| 170 |     /// Only events with types passed to [`Self::add_event_type`] as counted towards this limit. | 
| 171 |     #[allow(clippy::unwrap_used)] | 
| 172 |     pub fn filter_limit(mut self, limit: u32) -> Self { | 
| 181 |     /// passes all the requirements. | 
| 182 |     #[allow(clippy::unwrap_used)] | 
| 183 |     pub fn collect_limit(mut self, limit: u32) -> Self { | 
| 192 |     /// This is the last step to pass for a event to count as *collected*. | 
| 193 |     #[allow(clippy::unwrap_used)] | 
| 194 |     pub fn filter<F: Fn(&Arc<Event>) -> bool + 'static + Send + Sync>( | 
| 204 |     /// If an event does not have one of these types, it won't be received. | 
| 205 |     #[allow(clippy::unwrap_used)] | 
| 206 |     pub fn add_event_type(mut self, event_type: EventType) -> Self { | 
| 213 |     /// If an event does not have this ID, it won't be received. | 
| 214 |     #[allow(clippy::unwrap_used)] | 
| 215 |     pub fn add_user_id(mut self, user_id: impl Into<UserId>) -> Self { | 
| 186 |     /// passes all the requirements. | 
| 187 |     #[allow(clippy::unwrap_used)] | 
| 188 |     #[must_use] | 
| 17 |     #[cfg_attr(feature = "cargo-clippy", allow(result_unwrap_used))] | 
| 18 |     fn to_socket_addrs_ext(&self) -> io::Result<Self::Iter> { | 
| 128 | #[allow(clippy::missing_panics_doc, clippy::unwrap_used)] | 
| 129 | #[must_use] | 
| 305 | /// Scan a single file for `unsafe` usage. | 
| 306 | #[allow(clippy::unwrap_used)] | 
| 307 | pub fn find_unsafe_in_file( | 
| 125 | #[allow(clippy::expect_used, clippy::unwrap_used)] | 
| 126 | fn find_rs_files_in_package(pack: &Package) -> Vec<RsFile> { | 
| 182 | /// downloads fail | 
| 183 | #[allow(clippy::unwrap_used)] | 
| 184 | fn get_many<'a>( | 
| 20 | #[allow(clippy::missing_panics_doc, clippy::unwrap_used)] | 
| 21 | #[must_use] | 
| 86 | #[allow(clippy::missing_panics_doc, clippy::expect_used, clippy::unwrap_used)] | 
| 87 | pub fn configure_rustup_toolchain() { | 
| 189 | #[allow(clippy::unwrap_used)] | 
| 190 | #[cfg(test)] | 
| 56 |     fn put_usize_as_u16_unwrapped(&mut self, v: usize) -> io::Result<()> { | 
| 57 |         #[allow(clippy::unwrap_used)] | 
| 58 |         Self::put_u16(self, u16::try_from(v).unwrap()) | 
| 62 |     fn put_usize_as_u32_unwrapped(&mut self, v: usize) -> io::Result<()> { | 
| 63 |         #[allow(clippy::unwrap_used)] | 
| 64 |         Self::put_u32(self, u32::try_from(v).unwrap()) | 
| 261 | #[allow(clippy::unwrap_used)] | 
| 262 | #[cfg(test)] | 
| 391 |     unsafe fn median_unchecked(&mut self) -> T { | 
| 392 |         #[allow(clippy::unwrap_used)] | 
| 393 |         self.median().unwrap() | 
| 84 |     #[allow(clippy::unwrap_used)] | 
| 85 |     pub fn image(&self) -> oci_distribution::Reference { | 
| 175 |     #[allow(clippy::unwrap_used)] | 
| 176 |     pub fn image(&self) -> oci_distribution::Reference { | 
| 28 |         for _ in 0..count { | 
| 29 |             #[allow(clippy::unwrap_used)] | 
| 30 |             res.write_all(x).unwrap(); | 
| 48 |     #[allow(clippy::unwrap_in_result)] | 
| 49 |     #[allow(clippy::unwrap_used)] | 
| 50 |     pub fn cool(&self, k: usize, t: F, t_0: F) -> Result<F> { | 
| 736 |         #[allow(clippy::unwrap_used)] | 
| 737 |         let player = get_first_dwz( | 
| 823 |         #[allow(clippy::unwrap_used)] | 
| 824 |         let bad_player = get_first_dwz( | 
| 851 |         #[allow(clippy::unwrap_used)] | 
| 852 |         let really_bad_player = get_first_dwz( | 
| 20 |     fn input(&self, prompt: &str) -> String { | 
| 21 |         #[allow(clippy::unwrap_used)] | 
| 22 |         Input::new() | 
| 29 |     fn input_letter(&self, prompt: &str, choices: &str) -> String { | 
| 30 |         #[allow(clippy::unwrap_used)] | 
| 31 |         Input::new() | 
| 44 |     fn select(&self, prompt: &str, choices: &[&str]) -> Option<usize> { | 
| 45 |         #[allow(clippy::unwrap_used)] | 
| 46 |         Select::new() | 
| 57 |     fn confirm(&self, prompt: &str) -> bool { | 
| 58 |         #[allow(clippy::unwrap_used)] | 
| 59 |         Confirm::new().with_prompt(prompt).interact().unwrap() | 
| 2303 |     #[cfg(feature = "unstable")] | 
| 2304 |     #[allow(clippy::option_unwrap_used)] | 
| 2305 |     #[inline] | 
| 2303 |     #[cfg(feature = "unstable")] | 
| 2304 |     #[allow(clippy::option_unwrap_used)] | 
| 2305 |     #[inline] | 
| 1135 |     // inserted, providing no new information. Useful in `SectionTree` proptest where we want new_information_only. | 
| 1136 |     #[allow(clippy::unwrap_used)] | 
| 1137 |     pub(crate) fn arb_sections_dag_and_proof_chains( | 
| 78 | #[cfg(feature = "proptest")] | 
| 79 | #[allow(clippy::unwrap_used)] | 
| 80 | pub mod proptesting { | 
| 160 | #[cfg(test)] | 
| 161 | #[allow(clippy::unwrap_used)] | 
| 162 | mod test { | 
| 76 | #[cfg(test)] | 
| 77 | #[allow(clippy::unwrap_used, clippy::integer_arithmetic)] | 
| 78 | mod tests { | 
| 54 | #[cfg(test)] | 
| 55 | #[allow(clippy::unwrap_used)] | 
| 56 | mod tests { | 
| 32 | #[should_panic(expected = "test")] | 
| 33 | #[allow(unreachable_code, clippy::unwrap_used)] | 
| 34 | async fn test_own_transaction_panic() { | 
| 263 | #[cfg(test)] | 
| 264 | #[allow(clippy::unwrap_used, clippy::integer_arithmetic)] | 
| 265 | mod tests { | 
| 13 | #[cfg(test)] | 
| 14 | #[allow(clippy::unwrap_used)] | 
| 15 | mod test_utils; | 
| 37 | #[cfg(test)] | 
| 38 | #[allow(clippy::unwrap_used)] | 
| 39 | mod tests { | 
| 840 | #[cfg(test)] | 
| 841 | #[allow(clippy::unwrap_used)] | 
| 842 | mod tests { | 
| 83 | #[cfg(test)] | 
| 84 | #[allow(clippy::unwrap_used)] | 
| 85 | mod tests { | 
| 794 | #[cfg(test)] | 
| 795 | #[allow(clippy::unwrap_used)] | 
| 796 | mod tests { | 
| 183 | #[cfg(test)] | 
| 184 | #[allow(clippy::unwrap_used)] | 
| 185 | mod tests { | 
| 402 | #[allow( | 
| 403 |     clippy::unwrap_used, | 
| 404 |     clippy::integer_arithmetic, | 
| 108 | #[cfg(test)] | 
| 109 | #[allow(clippy::unwrap_used)] | 
| 110 | mod tests { | 
| 63 | #[cfg(test)] | 
| 64 | #[allow(clippy::unwrap_used, clippy::integer_arithmetic)] | 
| 65 | mod tests { | 
| 114 | #[cfg(test)] | 
| 115 | #[allow(clippy::unwrap_used)] | 
| 116 | mod tests { | 
| 174 |     clippy::missing_const_for_fn, | 
| 175 |     clippy::unwrap_used, | 
| 176 |     clippy::wildcard_imports | 
| 166 |         // Unwrap safety: BASE_URL is a correct URL and our parameters cannot cause an error. | 
| 167 |         #[allow(clippy::unwrap_used)] | 
| 168 |         let url = Url::parse_with_params( | 
| 211 |         // we know there is at least one value | 
| 212 |         #[allow(clippy::unwrap_used)] | 
| 213 |         let face_idx = IntoIterator::into_iter(faces) | 
| 63 |     #[allow(unused, clippy::unwrap_used)] | 
| 64 |     pub fn width(&self) -> u64 { | 
| 68 |     #[allow(unused, clippy::unwrap_used)] | 
| 69 |     pub fn height(&self) -> u64 { | 
| 73 |     #[allow(unused, clippy::unwrap_used)] | 
| 74 |     pub fn length(&self) -> u64 { | 
| 78 |     #[allow(unused, clippy::unwrap_used, clippy::indexing_slicing)] | 
| 79 |     pub fn blocks(&self) -> impl Iterator<Item = (BlockLocation, BlockState)> + '_ { | 
| 16 |         let user = evaluate_xpath_node(repo_a, "./span/text()")?.into_string(); | 
| 17 |         #[allow(clippy::unwrap_used)] | 
| 18 |         let name = repo_a | 
| 156 | #[cfg(test)] | 
| 157 | #[allow(clippy::unwrap_used)] | 
| 158 | mod test { | 
| 180 | #[cfg(test)] | 
| 181 | #[allow(clippy::unwrap_used)] | 
| 182 | mod tests { | 
| 159 | #[cfg(test)] | 
| 160 | #[allow(clippy::unwrap_used)] | 
| 161 | mod test { | 
| 397 | #[cfg(test)] | 
| 398 | #[allow(clippy::unwrap_used, clippy::cognitive_complexity)] | 
| 399 | mod test { | 
| 695 |         // These try_into() calls can't fail, so unwrap() can't panic. | 
| 696 |         #[allow(clippy::unwrap_used)] | 
| 697 |         UnusedTimings { | 
| 1510 | mod test { | 
| 1511 |     #![allow(clippy::unwrap_used)] | 
| 1512 |     use super::*; | 
| 422 | #[cfg(test)] | 
| 423 | #[allow(clippy::unwrap_used)] // why is this not the default in tests | 
| 424 | mod test { | 
| 654 | #[allow(unreachable_pub)] // impl_standard_builder wants to make pub fns | 
| 655 | #[allow(clippy::unwrap_used)] // OK in tests | 
| 656 | mod test { | 
| 250 | #[cfg(test)] | 
| 251 | #[allow(clippy::unwrap_used, clippy::print_stderr)] | 
| 252 | mod test { | 
| 629 |                 // Unwrap should be safe due to parent `.is_some()` check | 
| 630 |                 #[allow(clippy::unwrap_used)] | 
| 631 |                 let _ = on_usable.take().unwrap().send(()); | 
| 676 | mod test { | 
| 677 |     #![allow(clippy::unwrap_used)] | 
| 678 |     use super::*; | 
| 817 | #[allow(clippy::unwrap_used)] | 
| 818 | #[cfg(test)] | 
| 119 |         // so this conversion will succeed, so this unwrap can't panic. | 
| 120 |         #[allow(clippy::unwrap_used)] | 
| 121 |         let nz: NonZeroU32 = OldError::CUSTOM_START.try_into().unwrap(); | 
| 127 | mod test { | 
| 128 |     #![allow(clippy::unwrap_used)] | 
| 129 |     use super::*; | 
| 380 | #[allow(clippy::many_single_char_names)] | 
| 381 | #[allow(clippy::unwrap_used)] | 
| 382 | #[allow(clippy::cognitive_complexity)] | 
| 140 |     // The unwrap() is safe because array is nonempty. | 
| 141 |     #[allow(clippy::unwrap_used)] | 
| 142 |     fn max_weight(&self) -> u32 { | 
| 318 |         // The unwrap() is safe because `w` is nonempty. | 
| 319 |         #[allow(clippy::unwrap_used)] | 
| 320 |         let w_max = w.iter().map(RelayWeight::max_weight).max().unwrap(); | 
| 401 | mod test { | 
| 402 |     #![allow(clippy::unwrap_used)] | 
| 403 |     use super::*; | 
| 211 |             // returned an Error | 
| 212 |             #[allow(clippy::unwrap_used)] | 
| 213 |             let first_item = body.first_item().unwrap(); | 
| 223 |             // returned an Error | 
| 224 |             #[allow(clippy::unwrap_used)] | 
| 225 |             let last_item = body.last_item().unwrap(); | 
| 286 |             // have already returned an Error | 
| 287 |             #[allow(clippy::unwrap_used)] | 
| 288 |             let mut tag = crosscert.obj_tag().unwrap(); | 
| 309 |             // returned an Error | 
| 310 |             #[allow(clippy::unwrap_used)] | 
| 311 |             let start_offset = body.first_item().unwrap().offset_in(s).unwrap(); | 
| 416 | mod test { | 
| 417 |     #![allow(clippy::unwrap_used)] | 
| 418 |     use super::*; | 
| 262 |             // had there not been at least one item. | 
| 263 |             #[allow(clippy::unwrap_used)] | 
| 264 |             let first = body.first_item().unwrap(); | 
| 270 |             // Unwrap is safe here because we are parsing these strings from s | 
| 271 |             #[allow(clippy::unwrap_used)] | 
| 272 |             util::str::str_offset(s, first.kwd_str()).unwrap() | 
| 456 | mod test { | 
| 457 |     #![allow(clippy::unwrap_used)] | 
| 458 |     use super::*; | 
| 279 |     #[test] | 
| 280 |     #[allow(clippy::unwrap_used)] | 
| 281 |     fn it_dies_if_dropped() { | 
| 8 | #[allow(clippy::unwrap_used)] // ok since its a lit and tests hit this. | 
| 9 | static RE: once_cell::sync::Lazy<regex::Regex> = | 
| 126 |             // unwrap ok since idxs coming from same vec | 
| 127 |             #[allow(clippy::unwrap_used)] | 
| 128 |             let field = self.field_from_id(i).unwrap(); | 
| 188 |         let ptr = heap as *mut BinaryHeap<T>; | 
| 189 |         #[allow(clippy::unwrap_used)] | 
| 190 |         let mut data = (0..heap.len()) | 
| 414 |         } | 
| 415 |         #[allow(clippy::unwrap_used)] | 
| 416 |         (0..index).fold(self.head, |node, _| unsafe { node.unwrap().as_ref().prev }) | 
| 699 |         } | 
| 700 |         #[allow(clippy::unwrap_used)] // Index is valid | 
| 701 |         if index <= self.len / 2 { | 
| 162 |         } | 
| 163 |         #[allow(clippy::unwrap_used)] // We already the index is valid | 
| 164 |         (0..index).fold(self.top, |node, _| unsafe { node.unwrap().as_ref() }.prev) | 
| 105 |     #[inline(always)] | 
| 106 |     #[allow(clippy::unwrap_used, clippy::uninit_vec)] | 
| 107 |     fn parse_array(&mut self, len: usize) -> Value<'input> { | 
| 122 |     #[inline(always)] | 
| 123 |     #[allow(clippy::unwrap_used)] | 
| 124 |     fn parse_map(&mut self, len: usize) -> Value<'input> { | 
| 153 | mod test { | 
| 154 |     #![allow(clippy::unwrap_used)] | 
| 155 |     use super::*; | 
| 52 | #[cfg(test)] | 
| 53 | #[allow(clippy::unwrap_used)] | 
| 54 | mod test { | 
| 45 | #[cfg(test)] | 
| 46 | #[allow(clippy::unwrap_used)] | 
| 47 | mod test { | 
| 175 |     /// If the `id` is 0 or when the usage count is over [`u16::MAX`] | 
| 176 |     #[allow(clippy::unwrap_used, clippy::integer_arithmetic)] | 
| 177 |     pub fn register(&self, id: u64) { | 
| 215 |     #[must_use] | 
| 216 |     #[allow(clippy::unwrap_in_result, clippy::unwrap_used)] | 
| 217 |     pub fn limit_duration(&self, id: u64) -> Option<Duration> { | 
| 233 |     #[allow(clippy::unwrap_used)] | 
| 234 |     #[tokio::test] | 
| 250 |     #[allow(clippy::unwrap_used)] | 
| 251 |     #[tokio::test] | 
| 91 |     /// If the fallback message or webhook content is somehow invalid | 
| 92 |     #[allow(clippy::unwrap_used, unused_must_use, clippy::print_stderr)] | 
| 93 |     pub async fn handle(&self, http: &Client, error: impl Display + Send) { | 
| 117 |     /// message | 
| 118 |     #[allow(unused_must_use, clippy::unwrap_used)] | 
| 119 |     async fn maybe_create_message(&self, http: &Client, error_message: &mut String) { | 
| 141 |     /// message | 
| 142 |     #[allow(unused_must_use, clippy::unwrap_used)] | 
| 143 |     async fn maybe_execute_webhook(&self, http: &Client, error_message: &mut String) { | 
| 109 |     /// If the webhook that was just inserted to the cache somehow doesn't exist | 
| 110 |     #[allow(clippy::unwrap_used)] | 
| 111 |     pub async fn get_infallible( | 
| 257 |     #[allow(clippy::unwrap_used)] | 
| 258 |     async fn mock_update(cache: &WebhooksCache, event: &Event) { | 
| 54 |             for _ in 0..1000 { | 
| 55 |                 #[allow(clippy::unwrap_used)] | 
| 56 |                 black_box(black_box(result).unwrap()); | 
| 194 | #[cfg(test)] | 
| 195 | #[allow(clippy::unwrap_used)] | 
| 196 | mod yaml_paths_tests { | 
| 86 | #[cfg(test)] | 
| 87 | #[allow(clippy::unwrap_used)] | 
| 88 | mod tests { | 
| 39 |     clippy::indexing_slicing, | 
| 40 |     clippy::unwrap_used, | 
| 41 |     clippy::unwrap_in_result, | 
| 58 | pub extern "C" fn module_entrypoint() -> Shared<Module> { | 
| 59 |     #[allow(clippy::unwrap_used)] | 
| 60 |     set_ahash_seed(Some([1, 2, 3, 4])).unwrap(); | 
| 313 | 				// UNWRAP: checked by first if branch | 
| 314 | 				#[allow(clippy::unwrap_used)] | 
| 315 | 				let (shprog, shopts) = sh.split_first().unwrap(); | 
| 631 |     #[allow(clippy::iter_nth_zero)] | 
| 632 |     #[allow(clippy::unwrap_used)] | 
| 633 |     fn nth_and_next_give_same_results() { | 
| 73 | impl CXmpError { | 
| 74 |     #[allow(dead_code, clippy::unwrap_used)] // only used in test code | 
| 75 |     pub(crate) fn new(had_error: bool, id: i32, debug_message: Option<&str>) -> Self { | 
| 90 | 	} | 
| 91 | 	#[allow(clippy::unwrap_used)] | 
| 92 | 	String::from_utf8(v).unwrap() | 
| 99 | #[cfg(test)] | 
| 100 | #[allow(clippy::unwrap_used, clippy::integer_arithmetic)] | 
| 101 | mod tests { | 
| 546 |         let new_count = 1 + (self.data.len() / old_width); | 
| 547 |         #[allow(clippy::unwrap_used)] // panic is documented in function contract | 
| 548 |         let new_bytes_len = new_count | 
| 230 |     pub fn iter_keys<'b>(&'b self) -> impl Iterator<Item = &'a <K as ZeroMapKV<'a>>::GetType> + 'b { | 
| 231 |         #[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len() | 
| 232 |         (0..self.keys.zvl_len()).map(move |idx| self.keys.zvl_get(idx).unwrap()) | 
| 238 |     ) -> impl Iterator<Item = &'a <V as ZeroMapKV<'a>>::GetType> + 'b { | 
| 239 |         #[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len() == values.zvl_len() | 
| 240 |         (0..self.values.zvl_len()).map(move |idx| self.values.zvl_get(idx).unwrap()) | 
| 261 |             ( | 
| 262 |                 #[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len() | 
| 263 |                 self.keys.zvl_get(idx).unwrap(), | 
| 264 |                 #[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len() = values.zvl_len() | 
| 265 |                 self.values.get(idx).unwrap(), | 
| 284 |             ( | 
| 285 |                 #[allow(clippy::unwrap_used)] // idx in 0..keys.zvl_len() | 
| 286 |                 ZeroSlice::get(keys, idx).unwrap(), | 
| 298 |             ( | 
| 299 |                 #[allow(clippy::unwrap_used)] // idx is in-range | 
| 300 |                 self.keys.zvl_get(idx).unwrap(), | 
| 301 |                 #[allow(clippy::unwrap_used)] // idx is in-range | 
| 302 |                 self.values.zvl_get(idx).unwrap(), | 
| 310 |     ) -> impl ExactSizeIterator<Item = &'b <K as ZeroMapKV<'a>>::GetType> { | 
| 311 |         #[allow(clippy::unwrap_used)] // idx is in-range | 
| 312 |         (0..self.keys.zvl_len()).map(move |idx| self.keys.zvl_get(idx).unwrap()) | 
| 318 |     ) -> impl ExactSizeIterator<Item = &'b <V as ZeroMapKV<'a>>::GetType> { | 
| 319 |         #[allow(clippy::unwrap_used)] // idx is in-range | 
| 320 |         (0..self.values.zvl_len()).map(move |idx| self.values.zvl_get(idx).unwrap()) | 
| 268 |         clippy::cast_sign_loss, | 
| 269 |         clippy::unwrap_used | 
| 270 |     )] | 
| 140 |     clippy::needless_pass_by_value, | 
| 141 |     clippy::unwrap_used | 
| 142 | )] | 
| 5 | pub fn criterion_benchmark(c: &mut Criterion) { | 
| 6 |     #![allow(clippy::unwrap_used)] | 
| 7 |     for year in 2015..=2022 { | 
| 4 | fn problem_2015_1_1() { | 
| 5 |     #![allow(clippy::unwrap_used)] | 
| 6 |     let input = read_to_string("src/year2015/day01_input.txt").unwrap(); | 
| 10 | fn problem_2015_1_2() { | 
| 11 |     #![allow(clippy::unwrap_used)] | 
| 12 |     let input = read_to_string("src/year2015/day01_input.txt").unwrap(); | 
| 16 | fn problem_2015_2_1() { | 
| 17 |     #![allow(clippy::unwrap_used)] | 
| 18 |     let input = read_to_string("src/year2015/day02_input.txt").unwrap(); | 
| 22 | fn problem_2015_2_2() { | 
| 23 |     #![allow(clippy::unwrap_used)] | 
| 24 |     let input = read_to_string("src/year2015/day02_input.txt").unwrap(); | 
| 28 | fn problem_2015_3_1() { | 
| 29 |     #![allow(clippy::unwrap_used)] | 
| 30 |     let input = read_to_string("src/year2015/day03_input.txt").unwrap(); | 
| 22 | ) -> Winner { | 
| 23 |     #![allow(clippy::unwrap_used)] | 
| 24 |     let mut seen_1 = HashSet::new(); | 
| 26 | fn decimal_to_snafu(mut decimal: i64) -> String { | 
| 27 |     #![allow(clippy::unwrap_used)] | 
| 28 |     if decimal == 0 { | 
| 34 |     clippy::unreachable, | 
| 35 |     clippy::unwrap_used | 
| 36 | )] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::equatable_if_let, clippy::unwrap_used, unused_imports)] | 
| 1 | #![allow(clippy::equatable_if_let, clippy::unwrap_used, unused_imports)] | 
| 1 | #![allow(clippy::equatable_if_let, clippy::unwrap_used)] | 
| 237 |     #![allow(clippy::single_char_pattern)] | 
| 238 |     #![allow(clippy::unwrap_used)] | 
| 239 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 43 | // because it's OK if tests and benchmarks simply crash if things go wrong. | 
| 44 | #![allow(clippy::unwrap_used)] | 
| 7 | #![allow(clippy::single_char_pattern)] | 
| 8 | #![allow(clippy::unwrap_used)] | 
| 9 | //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 7 | #![allow(clippy::single_char_pattern)] | 
| 8 | #![allow(clippy::unwrap_used)] | 
| 9 | //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 7 | #![allow(clippy::single_char_pattern)] | 
| 8 | #![allow(clippy::unwrap_used)] | 
| 9 | //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 7 | #![allow(clippy::single_char_pattern)] | 
| 8 | #![allow(clippy::unwrap_used)] | 
| 9 | //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 371 | mod test { | 
| 372 |     #![allow(clippy::unwrap_used)] | 
| 373 |     use super::*; | 
| 1133 | mod test { | 
| 1134 |     #![allow(clippy::unwrap_used)] | 
| 551 | mod test { | 
| 552 |     #![allow(clippy::unwrap_used)] | 
| 553 |     use super::*; | 
| 7 | #![allow(clippy::single_char_pattern)] | 
| 8 | #![allow(clippy::unwrap_used)] | 
| 9 | //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 2 | #![allow(clippy::pedantic)] | 
| 3 | #![allow(clippy::unwrap_used)] | 
| 4 | #![allow(clippy::nursery)] | 
| 97 | mod tests { | 
| 98 |     #![allow(clippy::unwrap_used)] | 
| 26 | mod tests { | 
| 27 |     #![allow(clippy::unwrap_used)] | 
| 371 | mod tests { | 
| 372 |     #![allow(clippy::unwrap_used)] | 
| 28 |     clippy::unreachable, | 
| 29 |     clippy::unwrap_used | 
| 30 | )] | 
| 56 | mod tests { | 
| 57 |     #![cfg_attr(feature = "cargo-clippy", allow(result_unwrap_used))] | 
| 54 | mod tests { | 
| 55 |     #![cfg_attr(feature = "cargo-clippy", allow(result_unwrap_used))] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 610 | pub mod tests { | 
| 611 |     #![allow(clippy::unwrap_used)] | 
| 307 |     #![allow(clippy::panic)] | 
| 308 |     #![allow(clippy::unwrap_used)] | 
| 106 |     #![allow(clippy::expect_used)] | 
| 107 |     #![allow(clippy::unwrap_used)] | 
| 246 |     #![allow(clippy::panic)] | 
| 247 |     #![allow(clippy::unwrap_used)] | 
| 143 |     #![allow(clippy::panic)] | 
| 144 |     #![allow(clippy::unwrap_used)] | 
| 263 |     #![allow(clippy::expect_used)] | 
| 264 |     #![allow(clippy::unwrap_used)] | 
| 207 |     #![allow(clippy::expect_used)] | 
| 208 |     #![allow(clippy::unwrap_used)] | 
| 87 |     #![allow(clippy::expect_used)] | 
| 88 |     #![allow(clippy::unwrap_used)] | 
| 74 |     #![allow(clippy::expect_used)] | 
| 75 |     #![allow(clippy::unwrap_used)] | 
| 74 |     #![allow(clippy::expect_used)] | 
| 75 |     #![allow(clippy::unwrap_used)] | 
| 237 | pub mod tests { | 
| 238 |     #![allow(clippy::unwrap_used)] | 
| 5 |     allow( | 
| 6 |         missing_docs_in_private_items, option_unwrap_used, result_unwrap_used | 
| 7 |     ) | 
| 1039 |     #![allow(deprecated)] | 
| 1040 |     #![allow(clippy::unwrap_used)] | 
| 28 |     clippy::unreachable, | 
| 29 |     clippy::unwrap_used | 
| 30 | )] | 
| 33 | #![allow(clippy::panic_in_result_fn)] | 
| 34 | #![allow(clippy::unwrap_used)] | 
| 2 | #![cfg_attr(stdsimd_strict, deny(warnings))] | 
| 3 | #![allow(clippy::option_unwrap_used, clippy::print_stdout, clippy::use_debug)] | 
| 4 |     feature = "cargo-clippy", | 
| 5 |     allow(option_unwrap_used, print_stdout, use_debug) | 
| 6 | )] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 2 | // Runs the BonCoder/BestCoder test (BC_test). It requires SUPER-CHIP quirks compatibility, and | 
| 378 | mod test { | 
| 379 |     #![allow(clippy::unwrap_used)] | 
| 380 |     use crate::parser::link_url::{parse_url, punycode_encode, UrlInfo}; | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 28 |     clippy::unreachable, | 
| 29 |     clippy::unwrap_used | 
| 30 | )] | 
| 1 | #![allow(unused_imports)] | 
| 2 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 225 | mod test { | 
| 226 |     #![allow(clippy::unwrap_used)] | 
| 525 | mod test { | 
| 526 |     #![allow(clippy::unwrap_used)] | 
| 130 | mod test { | 
| 131 |     #![allow(clippy::unwrap_used)] | 
| 312 | mod test { | 
| 313 |     #![allow(clippy::unwrap_used)] | 
| 275 | mod test { | 
| 276 |     #![allow(clippy::unwrap_used)] | 
| 3 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used)] // GitHub API wrapper `Option`s every damn thing for some reason | 
| 74 | mod tests { | 
| 75 | 	#![allow(clippy::unwrap_used)] | 
| 76 | 	use super::*; | 
| 29 | #![allow(clippy::print_stdout)] | 
| 30 | #![allow(clippy::unwrap_used)] | 
| 31 | #![allow(clippy::use_debug)] | 
| 250 | mod test { | 
| 251 |     #![allow(clippy::unwrap_used)] | 
| 252 |     use super::*; | 
| 580 | mod test { | 
| 581 |     #![allow(clippy::unwrap_used)] | 
| 582 |     use super::*; | 
| 146 | mod test { | 
| 147 |     #![allow(clippy::unwrap_used)] | 
| 148 |     use super::*; | 
| 261 | mod test { | 
| 262 |     #![allow(clippy::unwrap_used)] | 
| 263 |     use super::*; | 
| 389 | mod test { | 
| 390 |     #![allow(clippy::unwrap_used)] | 
| 391 |     use super::*; | 
| 6 | // `#![...]` it onto the entire module. | 
| 7 | #![allow(clippy::result_unwrap_used)] | 
| 8 | use log::{info, trace}; | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 72 |     clippy::indexing_slicing, | 
| 73 |     clippy::unwrap_used, | 
| 74 |     clippy::expect_used, | 
| 6 |   fn invariant_unwrap<D: Display>(self, invariant: D) -> T { | 
| 7 |     #![allow(clippy::unwrap_used)] | 
| 8 |     self.invariant(invariant).unwrap() | 
| 12 |     clippy::indexing_slicing, | 
| 13 |     clippy::unwrap_used, | 
| 14 |     clippy::needless_borrow, | 
| 1 | // safety: if tests panic we see it on CI | 
| 2 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 138 |         // PANIC: `RwLock` usage is fully panic-safe here. | 
| 139 |         #![allow(clippy::unwrap_used)] | 
| 119 |             clippy::unwrap_in_result, | 
| 120 |             clippy::unwrap_used | 
| 121 |         )] | 
| 174 |             clippy::unwrap_in_result, | 
| 175 |             clippy::unwrap_used | 
| 176 |         )] | 
| 246 |             clippy::unwrap_in_result, | 
| 247 |             clippy::unwrap_used | 
| 248 |         )] | 
| 4 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 1 | //! CIFAR10 example. | 
| 2 | #![allow(clippy::missing_docs_in_private_items, clippy::print_stdout, clippy::unwrap_used)] | 
| 1 | //! Simple categorical example. | 
| 2 | #![allow(clippy::missing_docs_in_private_items, clippy::print_stdout, clippy::unwrap_used)] | 
| 1 | //! Simple example. | 
| 2 | #![allow(clippy::missing_docs_in_private_items, clippy::print_stdout, clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 2 | use super::lexitem::*; | 
| 27 | #![allow(clippy::unwrap_used)] | 
| 1 | #![allow(clippy::unwrap_used, clippy::wildcard_imports, non_snake_case)] | 
| 2 | use super::*; | 
| 8 |     clippy::expect_used, | 
| 9 |     clippy::unwrap_used, | 
| 10 |     clippy::wildcard_imports, | 
| 1 | #![allow(clippy::unwrap_used)] | 
| 2 | use git2::{Error, IndexAddOption, Object, ObjectType, Oid, Repository, Signature}; | 
| 191 | mod tests { | 
| 192 | 	#![allow(clippy::unwrap_used)] | 
| 193 | 	use reqwest::{ | 
| 3 | #![allow(clippy::unwrap_used, clippy::expect_used)] | 
| 720 | mod tests { | 
| 721 |     #![allow(clippy::unwrap_used)] | 
| 722 |     use super::*; | 
| 1 | #![allow(unused_results, clippy::unwrap_used, clippy::string_add)] | 
| 182 | mod test { | 
| 183 |     #![allow(clippy::unwrap_used)] | 
| 184 |     use super::*; | 
| 304 | mod test { | 
| 305 |     #![allow(clippy::unwrap_used)] | 
| 306 |     use super::*; | 
| 1 | #![allow(clippy::as_conversions, clippy::unwrap_used)] | 
| 402 | mod test { | 
| 403 |     #![allow(clippy::unwrap_used)] | 
| 404 |     use crate::{ | 
| 1 | #![allow(clippy::unwrap_used)] // this is test code, it's ok to unwrap | 
| 2 | use tempfile::TempDir; | 
| 1 | #![feature(test)] | 
| 2 | #![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))] | 
| 1 | #![feature(test)] | 
| 2 | #![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))] | 
| 1 | #![feature(test)] | 
| 2 | #![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))] | 
| 1 | #![feature(test)] | 
| 2 | #![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))] | 
| 1 | #![feature(test)] | 
| 2 | #![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))] | 
| 1 | #![feature(test)] | 
| 2 | #![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))] | 
| 1 | #![feature(test)] | 
| 2 | #![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))] | 
| 1 | #![feature(test)] | 
| 2 | #![cfg_attr(feature = "cargo-clippy", allow(option_unwrap_used))] | 
| 52 |     clippy::implicit_return, | 
| 53 |     clippy::unwrap_used, | 
| 54 |     clippy::multiple_inherent_impl, | 
| 53 |     clippy::implicit_return, | 
| 54 |     clippy::unwrap_used, | 
| 55 |     clippy::multiple_inherent_impl, | 
| 4 | clippy::implicit_return, | 
| 5 | clippy::result_unwrap_used, | 
| 6 | clippy::option_unwrap_used, | 
| 7 | clippy::print_stdout, | 
| 2 | #![cfg_attr(stdsimd_strict, deny(warnings))] | 
| 3 | #![allow(clippy::option_unwrap_used, clippy::use_debug, clippy::print_stdout)] | 
| 2 | #![cfg_attr(stdsimd_strict, deny(warnings))] | 
| 3 | #![allow(clippy::option_unwrap_used, clippy::use_debug, clippy::print_stdout)] | 
| 4 |     feature = "cargo-clippy", | 
| 5 |     allow(option_unwrap_used, use_debug, print_stdout) | 
| 6 | )] | 
| 210 |     clippy::expect_used, | 
| 211 |     clippy::unwrap_used, | 
| 212 |     clippy::implicit_return, | 
| 18 |     pub(crate) fn write<W: Write>(&self, id: Option<SvgId>, writer: &mut W) { | 
| 19 |         #![allow(clippy::unwrap_used)] | 
| 20 |         writer | 
| 30 |         #![allow(clippy::panic)] | 
| 31 |         #![allow(clippy::unwrap_used)] | 
| 32 |         match self { | 
| 29 |     pub(crate) fn write<W: Write>(&self, writer: &mut W) { | 
| 30 |         #![allow(clippy::unwrap_used)] | 
| 31 |         if let Some(style) = &self.style { | 
| 39 |     pub(crate) fn write<W: Write>(&self, id: Option<SvgId>, writer: &mut W) { | 
| 40 |         #![allow(clippy::unwrap_used)] | 
| 41 |         writer.write_all(b"<g").unwrap(); | 
| 10 |     pub(crate) fn write<W: Write>(self, writer: &mut W) { | 
| 11 |         #![allow(clippy::unwrap_used)] | 
| 12 |         writer | 
| 110 |     pub fn to_svg_string(&self) -> String { | 
| 111 |         #![allow(clippy::unwrap_used)] | 
| 112 |         let mut buffer = Vec::new(); | 
| 64 |     pub(crate) fn write<W: Write>(&self, id: Option<SvgId>, writer: &mut W) { | 
| 65 |         #![allow(clippy::unwrap_used)] | 
| 66 |         writer.write_all(b"<path").unwrap(); | 
| 176 |     pub fn data_string(&self) -> String { | 
| 177 |         #![allow(clippy::unwrap_used)] | 
| 178 |         let mut buffer = Vec::new(); | 
| 183 |     pub(crate) fn write<W: Write>(&self, writer: &mut W) { | 
| 184 |         #![allow(clippy::unwrap_used)] | 
| 185 |         for element in &self.elements { | 
| 43 |     pub(crate) fn write<W: Write>(&self, id: Option<SvgId>, buffer: &mut W) { | 
| 44 |         #![allow(clippy::unwrap_used)] | 
| 45 |         buffer | 
| 1 | #![allow(clippy::indexing_slicing)] | 
| 2 | #![allow(clippy::unwrap_used)] | 
| 3 | #![allow(clippy::panic)] | 
| 61 |     clippy::module_name_repetitions, | 
| 62 |     clippy::unwrap_used, | 
| 63 |     clippy::indexing_slicing, | 
| 1 | #![allow(clippy::unwrap_used, clippy::cast_possible_wrap)] | 
| 551 | mod tests { | 
| 552 |     #![allow(clippy::unwrap_used, clippy::too_many_lines, clippy::similar_names)] | 
| 553 |     use super::*; | 
| 540 |     #![allow(clippy::single_char_pattern)] | 
| 541 |     #![allow(clippy::unwrap_used)] | 
| 542 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 594 |     #![allow(clippy::single_char_pattern)] | 
| 595 |     #![allow(clippy::unwrap_used)] | 
| 596 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 232 | mod test { | 
| 233 |     #![allow(clippy::unwrap_used)] | 
| 234 |     use std::env::VarError; | 
| 302 | mod tests { | 
| 303 |     #![allow(clippy::unwrap_used)] | 
| 304 |     use crate::{Reader, Writer}; | 
| 338 | mod tests { | 
| 339 |     #![allow(clippy::unwrap_used)] | 
| 340 |     #![allow(clippy::cognitive_complexity)] | 
| 525 | mod test { | 
| 526 |     #![allow(clippy::unwrap_used)] | 
| 527 |     use super::*; | 
| 226 | mod test { | 
| 227 |     #![allow(clippy::unwrap_used)] | 
| 228 |     use super::*; | 
| 43 |     #![allow(clippy::single_char_pattern)] | 
| 44 |     #![allow(clippy::unwrap_used)] | 
| 45 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 9 | #![allow(clippy::single_char_pattern)] | 
| 10 | #![allow(clippy::unwrap_used)] | 
| 11 | //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 535 |     #![allow(clippy::single_char_pattern)] | 
| 536 |     #![allow(clippy::unwrap_used)] | 
| 537 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 520 | mod test { | 
| 521 |     #![allow(clippy::unwrap_used)] | 
| 522 |     use super::*; | 
| 137 |     #![allow(clippy::single_char_pattern)] | 
| 138 |     #![allow(clippy::unwrap_used)] | 
| 139 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 414 | mod test { | 
| 415 |     #![allow(clippy::unwrap_used)] | 
| 416 |     #[allow(unused_imports)] | 
| 39 | mod test { | 
| 40 |     #![allow(clippy::unwrap_used)] | 
| 41 |     use super::*; | 
| 504 | mod test { | 
| 505 |     #![allow(clippy::unwrap_used)] | 
| 506 |     use super::*; | 
| 296 | mod test { | 
| 297 |     #![allow(clippy::unwrap_used)] | 
| 298 |     use super::*; | 
| 400 | pub(crate) mod test { | 
| 401 |     #![allow(clippy::unwrap_used)] | 
| 402 |     use super::*; | 
| 783 | mod test { | 
| 784 |     #![allow(clippy::unwrap_used)] | 
| 785 |     use super::*; | 
| 118 | mod test { | 
| 119 |     #![allow(clippy::unwrap_used)] | 
| 120 |     use super::*; | 
| 87 |     #![allow(clippy::single_char_pattern)] | 
| 88 |     #![allow(clippy::unwrap_used)] | 
| 89 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 293 | mod test { | 
| 294 |     #![allow(clippy::unwrap_used)] | 
| 295 |     #![allow(clippy::clone_on_copy)] | 
| 215 | fn assert_same_path_when_owned(path: &TorPath<'_>) { | 
| 216 |     #![allow(clippy::unwrap_used)] | 
| 217 |     let owned: OwnedPath = path.try_into().unwrap(); | 
| 132 | mod test { | 
| 133 |     #![allow(clippy::unwrap_used)] | 
| 134 |     use super::*; | 
| 168 | mod test { | 
| 169 |     #![allow(clippy::unwrap_used)] | 
| 170 |     use super::*; | 
| 746 |     #![allow(clippy::single_char_pattern)] | 
| 747 |     #![allow(clippy::unwrap_used)] | 
| 748 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 394 |     #![allow(clippy::single_char_pattern)] | 
| 395 |     #![allow(clippy::unwrap_used)] | 
| 396 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 246 | mod test { | 
| 247 |     #![allow(clippy::unwrap_used)] | 
| 248 |     use super::*; | 
| 341 |     #![allow(clippy::single_char_pattern)] | 
| 342 |     #![allow(clippy::unwrap_used)] | 
| 343 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 409 |     #![allow(clippy::single_char_pattern)] | 
| 410 |     #![allow(clippy::unwrap_used)] | 
| 411 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 557 | mod test { | 
| 558 |     #![allow(clippy::unwrap_used)] | 
| 559 |     use super::*; | 
| 455 | mod test { | 
| 456 |     #![allow(clippy::unwrap_used)] | 
| 457 |     use super::*; | 
| 512 | mod test { | 
| 513 |     #![allow(clippy::unwrap_used)] | 
| 514 |     use super::*; | 
| 178 |     #![allow(clippy::single_char_pattern)] | 
| 179 |     #![allow(clippy::unwrap_used)] | 
| 180 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 24 | mod test { | 
| 25 |     #![allow(clippy::unwrap_used)] | 
| 26 |     use super::*; | 
| 80 | mod test { | 
| 81 |     #![allow(clippy::unwrap_used)] | 
| 82 |     use super::*; | 
| 9 | #![allow(clippy::single_char_pattern)] | 
| 10 | #![allow(clippy::unwrap_used)] | 
| 11 | //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 326 | mod test { | 
| 327 |     #![allow(clippy::unwrap_used)] | 
| 328 |     #![allow(clippy::unnecessary_wraps)] | 
| 285 | mod test { | 
| 286 |     #![allow(clippy::unwrap_used)] | 
| 287 |     use super::*; | 
| 1116 | mod test { | 
| 1117 |     #![allow(clippy::unwrap_used)] | 
| 1118 |     use super::*; | 
| 96 | mod test { | 
| 97 |     #![allow(clippy::unwrap_used)] | 
| 98 |     use super::*; | 
| 1237 | mod test { | 
| 1238 |     #![allow(clippy::unwrap_used)] | 
| 1239 |     #![allow(clippy::cognitive_complexity)] | 
| 256 |     #![allow(clippy::single_char_pattern)] | 
| 257 |     #![allow(clippy::unwrap_used)] | 
| 258 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 287 | mod test { | 
| 288 |     #![allow(clippy::unwrap_used)] | 
| 289 |     use crate::{ | 
| 612 |     #![allow(clippy::single_char_pattern)] | 
| 613 |     #![allow(clippy::unwrap_used)] | 
| 614 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 42 |     #![allow(clippy::single_char_pattern)] | 
| 43 |     #![allow(clippy::unwrap_used)] | 
| 44 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 66 | mod test { | 
| 67 |     #![allow(clippy::unwrap_used)] | 
| 68 |     use super::*; | 
| 239 |     #![allow(clippy::single_char_pattern)] | 
| 240 |     #![allow(clippy::unwrap_used)] | 
| 241 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 156 | mod test { | 
| 157 |     #![allow(clippy::unwrap_used)] | 
| 158 |     use super::*; | 
| 942 | mod test { | 
| 943 |     #![allow(clippy::unwrap_used)] | 
| 944 |     use super::*; | 
| 1830 | mod test { | 
| 1831 |     #![allow(clippy::unwrap_used)] | 
| 1832 |     use super::*; | 
| 1019 | mod test { | 
| 1020 |     #![allow(clippy::unwrap_used)] | 
| 1021 |     use tor_linkspec::{HasRelayIds, RelayIdType}; | 
| 232 | mod test { | 
| 233 |     #![allow(clippy::unwrap_used)] | 
| 234 |     use super::*; | 
| 63 | mod test { | 
| 64 |     #![allow(clippy::unwrap_used)] | 
| 65 |     use super::*; | 
| 163 | mod test { | 
| 164 |     #![allow(clippy::unwrap_used)] | 
| 145 |     #![allow(clippy::single_char_pattern)] | 
| 146 |     #![allow(clippy::unwrap_used)] | 
| 147 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 354 | mod test { | 
| 355 |     #![allow(clippy::unwrap_used)] | 
| 356 |     use hex_literal::hex; | 
| 167 | mod test { | 
| 168 |     #![allow(clippy::unwrap_used)] | 
| 169 |     use super::*; | 
| 271 | mod test { | 
| 272 |     #![allow(clippy::unwrap_used)] | 
| 273 |     use super::*; | 
| 296 | mod test { | 
| 297 |     #![allow(clippy::unwrap_used)] | 
| 298 |     use super::*; | 
| 744 | mod test { | 
| 745 |     #![allow(clippy::unwrap_used)] | 
| 746 |     use super::*; | 
| 168 | mod tests { | 
| 169 |     #![allow(clippy::unwrap_used)] | 
| 170 |     use super::*; | 
| 69 | mod test { | 
| 70 |     #![allow(clippy::unwrap_used)] | 
| 71 |     #[test] | 
| 80 | mod tests { | 
| 81 |     #![allow(clippy::unwrap_used)] | 
| 82 |     // A cert generated by chutney | 
| 1214 | mod test { | 
| 1215 |     #![allow(clippy::unwrap_used)] | 
| 1216 |     #![allow(clippy::cognitive_complexity)] | 
| 13 | #![allow(clippy::missing_panics_doc)] | 
| 14 | #![allow(clippy::unwrap_used)] | 
| 132 | mod test { | 
| 133 |     #![allow(clippy::unwrap_used)] | 
| 134 |     use super::*; | 
| 149 | mod test { | 
| 150 |     #![allow(clippy::unwrap_used)] | 
| 151 |     use super::*; | 
| 100 | mod test { | 
| 101 |     #![allow(clippy::unwrap_used)] | 
| 102 |     use super::*; | 
| 257 | mod test { | 
| 258 |     #![allow(clippy::unwrap_used)] | 
| 259 |     use super::*; | 
| 176 | mod test { | 
| 177 |     #![allow(clippy::unwrap_used)] | 
| 178 |     use super::*; | 
| 241 | mod test { | 
| 242 |     #![allow(clippy::unwrap_used)] | 
| 243 |     use super::*; | 
| 65 | pub(crate) mod test { | 
| 66 |     #![allow(clippy::unwrap_used)] | 
| 67 |     use futures::io::{AsyncRead, AsyncWrite, Cursor, Result}; | 
| 620 | pub(super) mod test { | 
| 621 |     #![allow(clippy::unwrap_used)] | 
| 622 |     use hex_literal::hex; | 
| 412 |     #![allow(clippy::single_char_pattern)] | 
| 413 |     #![allow(clippy::unwrap_used)] | 
| 414 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 467 | pub(crate) mod test { | 
| 468 |     #![allow(clippy::unwrap_used)] | 
| 469 |     use super::*; | 
| 701 |     // reactor code; there are just a few more cases to examine here. | 
| 702 |     #![allow(clippy::unwrap_used)] | 
| 703 |     use super::*; | 
| 70 | mod test { | 
| 71 |     #![allow(clippy::unwrap_used)] | 
| 72 |     use super::*; | 
| 82 | mod test { | 
| 83 |     #![allow(clippy::unwrap_used)] | 
| 84 |     use super::*; | 
| 281 | mod test { | 
| 282 |     #![allow(clippy::unwrap_used)] | 
| 283 |     use super::*; | 
| 220 | mod test { | 
| 221 |     #![allow(clippy::unwrap_used)] | 
| 222 |     use super::*; | 
| 465 | mod test { | 
| 466 |     #![allow(clippy::unwrap_used)] | 
| 467 |     use super::*; | 
| 785 |     #![allow(clippy::single_char_pattern)] | 
| 786 |     #![allow(clippy::unwrap_used)] | 
| 787 |     //! <!-- @@ end test lint list maintained by maint/add_warning @@ --> | 
| 151 | mod test { | 
| 152 |     #![allow(clippy::unwrap_used)] | 
| 153 |     use super::*; | 
| 331 | mod test { | 
| 332 |     #![allow(clippy::unwrap_used, clippy::unnecessary_wraps)] | 
| 333 |     use crate::Runtime; | 
| 221 | mod test { | 
| 222 |     #![allow(clippy::unwrap_used)] | 
| 223 |     use super::*; | 
| 184 | mod test { | 
| 185 |     #![allow(clippy::unwrap_used)] | 
| 186 |     use super::*; | 
| 515 | mod test { | 
| 516 |     #![allow(clippy::unwrap_used)] | 
| 517 |     use super::*; | 
| 443 | mod test { | 
| 444 |     #![allow(clippy::unwrap_used)] | 
| 445 |     use super::*; | 
| 313 |     #![allow(clippy::single_char_pattern)] | 
| 314 |     #![allow(clippy::unwrap_used)] | 
| 315 |     //! <!-- @@ end test lint list | 
| 301 | mod test { | 
| 302 |     #![allow(clippy::unwrap_used)] | 
| 303 |     use super::*; | 
| 93 |     #![allow(clippy::single_char_pattern)] | 
| 94 |     #![allow(clippy::unwrap_used)] | 
| 95 |     //! <!-- @@ end test lint list | 
| 395 | mod test { | 
| 396 |     #![allow(clippy::unwrap_used)] | 
| 397 |     use super::*; | 
| 493 | mod tests { | 
| 494 |     #![allow(clippy::unwrap_used)] | 
| 495 |     use float_cmp::assert_approx_eq; | 
| 86 | mod test { | 
| 87 |     #![allow(clippy::unwrap_used)] | 
| 88 |     use crate::errors::Error; | 
| 84 | mod test { | 
| 85 |     #![allow(clippy::unwrap_used)] | 
| 86 |     use crate::errors::Error; | 
| 40 | mod test { | 
| 41 |     #![allow(clippy::unwrap_used)] | 
| 55 | mod tests { | 
| 56 |     #![allow(clippy::unwrap_used)] | 
| 13 | // limitations under the License. | 
| 14 | #![allow(clippy::unwrap_used)] | 
| 15 | use super::*; | 
| 37 | mod tests { | 
| 38 |     #![allow(clippy::unwrap_used)] | 
| 39 |     use super::*; | 
| 404 |         clippy::non_ascii_literal, | 
| 405 |         clippy::unwrap_used | 
| 406 |     )] | 
| 632 | mod tests { | 
| 633 |     #![allow(clippy::unwrap_used)] | 
| 634 |     use super::*; | 
| 29 | mod test { | 
| 30 |     #![allow(clippy::unwrap_used)] | 
| 31 |     use crate::Value; | 
| 52 |     clippy::implicit_return, | 
| 53 |     clippy::unwrap_used, | 
| 54 |     clippy::multiple_inherent_impl, | 
| 1 | // TODO(gib): Use https://lib.rs/crates/indicatif for progress bars and remove this. | 
| 2 | #![allow(clippy::print_stdout, clippy::unwrap_used)] | 
| 3 | use std::{ | 
| 152 | mod tests { | 
| 153 |     #![allow(clippy::unwrap_used)] | 
| 154 |     #![allow(clippy::panic)] | 
| 43 |     clippy::indexing_slicing, // TODO | 
| 44 |     clippy::unwrap_used, // TODO | 
| 45 | )] | 
| 2451 |     ) -> Result<(CreationChallengeResponse, RegistrationState), WebauthnError> { | 
| 2452 |         #![allow(clippy::unwrap_used)] | 
| 18 | #![allow(clippy::panic)] | 
| 19 | #![allow(clippy::unwrap_used)] |