From 74923b4575deb8bf5b02ec2e9e644bbdb4005b89 Mon Sep 17 00:00:00 2001 From: Alexander Krotov Date: Sat, 14 Dec 2019 20:09:09 +0100 Subject: [PATCH] Enable clippy::type_complexity error --- src/lib.rs | 6 +----- src/pgp.rs | 18 ++++++++---------- 2 files changed, 9 insertions(+), 15 deletions(-) diff --git a/src/lib.rs b/src/lib.rs index 56fe79109..dc1e22f1b 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -1,10 +1,6 @@ #![deny(clippy::correctness, missing_debug_implementations, clippy::all)] // for now we hide warnings to not clutter/hide errors during "cargo clippy" -#![allow( - clippy::type_complexity, - clippy::cognitive_complexity, - clippy::too_many_arguments -)] +#![allow(clippy::cognitive_complexity, clippy::too_many_arguments)] #![allow(clippy::unreadable_literal, clippy::match_bool)] #![feature(ptr_wrapping_offset_from)] #![feature(drain_filter)] diff --git a/src/pgp.rs b/src/pgp.rs index 0d7014772..3886f2724 100644 --- a/src/pgp.rs +++ b/src/pgp.rs @@ -16,7 +16,7 @@ use pgp::types::{ }; use rand::{thread_rng, CryptoRng, Rng}; -use crate::error::Error; +use crate::error::Result; use crate::key::*; use crate::keyring::*; @@ -88,9 +88,7 @@ impl<'a> PublicKeyTrait for SignedPublicKeyOrSubkey<'a> { /// Split data from PGP Armored Data as defined in https://tools.ietf.org/html/rfc4880#section-6.2. /// /// Returns (type, headers, base64 encoded body). -pub fn split_armored_data( - buf: &[u8], -) -> Result<(BlockType, BTreeMap, Vec), Error> { +pub fn split_armored_data(buf: &[u8]) -> Result<(BlockType, BTreeMap, Vec)> { use std::io::Read; let cursor = Cursor::new(buf); @@ -194,7 +192,7 @@ pub fn pk_encrypt( plain: &[u8], public_keys_for_encryption: &Keyring, private_key_for_signing: Option<&Key>, -) -> Result { +) -> Result { let lit_msg = Message::new_literal_bytes("", plain); let pkeys: Vec = public_keys_for_encryption .keys() @@ -236,7 +234,7 @@ pub fn pk_decrypt( private_keys_for_decryption: &Keyring, public_keys_for_validation: &Keyring, ret_signature_fingerprints: Option<&mut HashSet>, -) -> Result, Error> { +) -> Result> { let (msg, _) = Message::from_armor_single(Cursor::new(ctext))?; let skeys: Vec<&SignedSecretKey> = private_keys_for_decryption .keys() @@ -248,7 +246,7 @@ pub fn pk_decrypt( .collect(); let (decryptor, _) = msg.decrypt(|| "".into(), || "".into(), &skeys[..])?; - let msgs = decryptor.collect::, _>>()?; + let msgs = decryptor.collect::>>()?; ensure!(!msgs.is_empty(), "No valid messages found"); let dec_msg = &msgs[0]; @@ -280,7 +278,7 @@ pub fn pk_decrypt( } /// Symmetric encryption. -pub fn symm_encrypt(passphrase: &str, plain: &[u8]) -> Result { +pub fn symm_encrypt(passphrase: &str, plain: &[u8]) -> Result { let mut rng = thread_rng(); let lit_msg = Message::new_literal_bytes("", plain); @@ -297,11 +295,11 @@ pub fn symm_encrypt(passphrase: &str, plain: &[u8]) -> Result { pub fn symm_decrypt( passphrase: &str, ctext: T, -) -> Result, Error> { +) -> Result> { let (enc_msg, _) = Message::from_armor_single(ctext)?; let decryptor = enc_msg.decrypt_with_password(|| passphrase.into())?; - let msgs = decryptor.collect::, _>>()?; + let msgs = decryptor.collect::>>()?; ensure!(!msgs.is_empty(), "No valid messages found"); match msgs[0].get_content()? {