Skip to content

Commit dc95f0e

Browse files
committed
Merge branch 'remove-refs'
2 parents a62c24b + f133e22 commit dc95f0e

File tree

8 files changed

+33
-40
lines changed

8 files changed

+33
-40
lines changed

mullvad-encrypted-dns-proxy/src/config_resolver.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,8 @@ impl fmt::Display for Error {
3434
impl std::error::Error for Error {
3535
fn source(&self) -> Option<&(dyn std::error::Error + 'static)> {
3636
match self {
37-
Self::ResolutionError(ref err) => err.source(),
38-
Self::Timeout(ref err) => err.source(),
37+
Self::ResolutionError(err) => err.source(),
38+
Self::Timeout(err) => err.source(),
3939
}
4040
}
4141
}

mullvad-types/src/constraints/constraint.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ impl<T> Constraint<T> {
107107
pub const fn as_ref(&self) -> Constraint<&T> {
108108
match self {
109109
Constraint::Any => Constraint::Any,
110-
Constraint::Only(ref value) => Constraint::Only(value),
110+
Constraint::Only(value) => Constraint::Only(value),
111111
}
112112
}
113113

@@ -128,7 +128,7 @@ impl<T: PartialEq> Constraint<T> {
128128
pub fn matches_eq(&self, other: &T) -> bool {
129129
match self {
130130
Constraint::Any => true,
131-
Constraint::Only(ref value) => value == other,
131+
Constraint::Only(value) => value == other,
132132
}
133133
}
134134
}

mullvad-types/src/relay_constraints.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -210,14 +210,14 @@ impl GeographicLocationConstraint {
210210
impl Match<Relay> for GeographicLocationConstraint {
211211
fn matches(&self, relay: &Relay) -> bool {
212212
match self {
213-
GeographicLocationConstraint::Country(ref country) => {
213+
GeographicLocationConstraint::Country(country) => {
214214
relay.location.country_code == *country
215215
}
216-
GeographicLocationConstraint::City(ref country, ref city) => {
216+
GeographicLocationConstraint::City(country, city) => {
217217
let loc = &relay.location;
218218
loc.country_code == *country && loc.city_code == *city
219219
}
220-
GeographicLocationConstraint::Hostname(ref country, ref city, ref hostname) => {
220+
GeographicLocationConstraint::Hostname(country, city, hostname) => {
221221
let loc = &relay.location;
222222
loc.country_code == *country
223223
&& loc.city_code == *city

talpid-core/src/dns/linux/mod.rs

+12-15
Original file line numberDiff line numberDiff line change
@@ -151,28 +151,25 @@ impl DnsMonitorHolder {
151151
) -> Result<()> {
152152
use self::DnsMonitorHolder::*;
153153
match self {
154-
Resolvconf(ref mut resolvconf) => resolvconf.set_dns(interface, servers)?,
155-
StaticResolvConf(ref mut static_resolv_conf) => {
156-
static_resolv_conf.set_dns(servers.to_vec())?
157-
}
158-
SystemdResolved(ref mut systemd_resolved) => handle
159-
.block_on(systemd_resolved.set_dns(route_manager.clone(), interface, servers))?,
160-
NetworkManager(ref mut network_manager) => {
161-
network_manager.set_dns(interface, servers)?
162-
}
154+
Resolvconf(resolvconf) => resolvconf.set_dns(interface, servers)?,
155+
StaticResolvConf(static_resolv_conf) => static_resolv_conf.set_dns(servers.to_vec())?,
156+
SystemdResolved(systemd_resolved) => handle.block_on(systemd_resolved.set_dns(
157+
route_manager.clone(),
158+
interface,
159+
servers,
160+
))?,
161+
NetworkManager(network_manager) => network_manager.set_dns(interface, servers)?,
163162
}
164163
Ok(())
165164
}
166165

167166
fn reset(&mut self, handle: &tokio::runtime::Handle) -> Result<()> {
168167
use self::DnsMonitorHolder::*;
169168
match self {
170-
Resolvconf(ref mut resolvconf) => resolvconf.reset()?,
171-
StaticResolvConf(ref mut static_resolv_conf) => static_resolv_conf.reset()?,
172-
SystemdResolved(ref mut systemd_resolved) => {
173-
handle.block_on(systemd_resolved.reset())?
174-
}
175-
NetworkManager(ref mut network_manager) => network_manager.reset()?,
169+
Resolvconf(resolvconf) => resolvconf.reset()?,
170+
StaticResolvConf(static_resolv_conf) => static_resolv_conf.reset()?,
171+
SystemdResolved(systemd_resolved) => handle.block_on(systemd_resolved.reset())?,
172+
NetworkManager(network_manager) => network_manager.reset()?,
176173
}
177174
Ok(())
178175
}

talpid-core/src/tunnel/mod.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ impl TunnelMonitor {
236236
parameters: &TunnelParameters,
237237
log_dir: &Option<path::PathBuf>,
238238
) -> Result<Option<path::PathBuf>> {
239-
if let Some(ref log_dir) = log_dir {
239+
if let Some(log_dir) = log_dir {
240240
match parameters {
241241
TunnelParameters::OpenVpn(_) => {
242242
let tunnel_log = log_dir.join(OPENVPN_LOG_FILENAME);
@@ -255,7 +255,7 @@ impl TunnelMonitor {
255255
parameters: &TunnelParameters,
256256
log_dir: &Option<path::PathBuf>,
257257
) -> Result<Option<path::PathBuf>> {
258-
if let Some(ref log_dir) = log_dir {
258+
if let Some(log_dir) = log_dir {
259259
let filename = match parameters {
260260
TunnelParameters::OpenVpn(_) => OPENVPN_LOG_FILENAME,
261261
TunnelParameters::Wireguard(_) => WIREGUARD_LOG_FILENAME,

talpid-openvpn/src/lib.rs

+4-4
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ impl Error {
141141
#[cfg(target_os = "windows")]
142142
pub fn get_tunnel_device_error(&self) -> Option<&io::Error> {
143143
match self {
144-
Error::WintunCreateAdapterError(ref error) => Some(error),
144+
Error::WintunCreateAdapterError(error) => Some(error),
145145
_ => None,
146146
}
147147
}
@@ -542,7 +542,7 @@ impl<C: OpenVpnBuilder + Send + 'static> OpenVpnMonitor<C> {
542542
fn create_proxy_auth_file(
543543
proxy_settings: &Option<CustomProxy>,
544544
) -> std::result::Result<Option<mktemp::TempFile>, io::Error> {
545-
if let Some(CustomProxy::Socks5Remote(ref remote_proxy)) = proxy_settings {
545+
if let Some(CustomProxy::Socks5Remote(remote_proxy)) = proxy_settings {
546546
if let Some(ref proxy_auth) = remote_proxy.auth {
547547
return Ok(Some(Self::create_credentials_file(
548548
proxy_auth.username(),
@@ -558,7 +558,7 @@ impl<C: OpenVpnBuilder + Send + 'static> OpenVpnMonitor<C> {
558558
proxy_settings: &Option<CustomProxy>,
559559
#[cfg(target_os = "linux")] fwmark: u32,
560560
) -> Result<Option<Box<dyn ProxyMonitor>>> {
561-
if let Some(ref settings) = proxy_settings {
561+
if let Some(settings) = proxy_settings {
562562
let proxy_monitor = proxy::start_proxy(
563563
settings,
564564
#[cfg(target_os = "linux")]
@@ -837,7 +837,7 @@ mod event_server {
837837
let env = request.into_inner().env;
838838

839839
let _ = tokio::fs::remove_file(&self.user_pass_file_path).await;
840-
if let Some(ref file_path) = &self.proxy_auth_file_path {
840+
if let Some(file_path) = &self.proxy_auth_file_path {
841841
let _ = tokio::fs::remove_file(file_path).await;
842842
}
843843

talpid-types/src/tunnel.rs

+7-7
Original file line numberDiff line numberDiff line change
@@ -160,19 +160,19 @@ pub enum FirewallPolicyError {
160160
impl fmt::Display for ErrorStateCause {
161161
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
162162
use self::ErrorStateCause::*;
163-
let description = match *self {
164-
AuthFailed(ref reason) => {
163+
let description = match self {
164+
AuthFailed(reason) => {
165165
return write!(
166166
f,
167167
"Authentication with remote server failed: {}",
168168
match reason {
169-
Some(ref reason) => reason.as_str(),
169+
Some(reason) => reason.as_str(),
170170
None => "No reason provided",
171171
}
172172
);
173173
}
174174
Ipv6Unavailable => "Failed to configure IPv6 because it's disabled in the platform",
175-
SetFirewallPolicyError(ref err) => {
175+
SetFirewallPolicyError(err) => {
176176
return match err {
177177
#[cfg(windows)]
178178
FirewallPolicyError::Locked(Some(value)) => {
@@ -183,7 +183,7 @@ impl fmt::Display for ErrorStateCause {
183183
}
184184
SetDnsError => "Failed to set system DNS server",
185185
#[cfg(target_os = "android")]
186-
InvalidDnsServers(ref addresses) => {
186+
InvalidDnsServers(addresses) => {
187187
return write!(
188188
f,
189189
"Invalid DNS server addresses used in tunnel configuration: {}",
@@ -201,9 +201,9 @@ impl fmt::Display for ErrorStateCause {
201201
} => return write!(f, "Failed to create tunnel device: {error}"),
202202
#[cfg(target_os = "windows")]
203203
CreateTunnelDevice { os_error: None } => {
204-
return write!(f, "Failed to create tunnel device")
204+
return write!(f, "Failed to create tunnel device");
205205
}
206-
TunnelParameterError(ref err) => {
206+
TunnelParameterError(err) => {
207207
return write!(f, "Failure to generate tunnel parameters: {err}");
208208
}
209209
IsOffline => "This device is offline, no tunnels can be established",

talpid-wireguard/src/connectivity/check.rs

+1-5
Original file line numberDiff line numberDiff line change
@@ -376,11 +376,7 @@ impl ConnState {
376376
}
377377

378378
pub fn reset_after_suspension(&mut self, now: Instant) {
379-
if let ConnState::Connected {
380-
ref mut rx_timestamp,
381-
..
382-
} = self
383-
{
379+
if let ConnState::Connected { rx_timestamp, .. } = self {
384380
*rx_timestamp = now;
385381
}
386382
}

0 commit comments

Comments
 (0)