]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
dnsdist: Fix several unused parameter warnings without DoH support 15166/head
authorRemi Gacogne <remi.gacogne@powerdns.com>
Fri, 14 Feb 2025 15:42:37 +0000 (16:42 +0100)
committerRemi Gacogne <remi.gacogne@powerdns.com>
Fri, 14 Feb 2025 15:42:37 +0000 (16:42 +0100)
pdns/dnsdistdist/dnsdist-actions-factory.cc
pdns/dnsdistdist/dnsdist-configuration-yaml.cc
pdns/dnsdistdist/dnsdist-lua-ffi.cc
pdns/dnsdistdist/dnsdist-lua.cc
pdns/dnsdistdist/dnsdist-rules.cc

index 21e6dd3ab89a2788b7b7253c4824762f7d1c7664..db5831887411708b950001dae1b1b661aa6246ff 100644 (file)
@@ -2417,7 +2417,7 @@ std::shared_ptr<DNSAction> getKeyValueStoreRangeLookupAction(std::shared_ptr<Key
 }
 #endif /* defined(HAVE_LMDB) || defined(HAVE_CDB) */
 
-std::shared_ptr<DNSAction> getHTTPStatusAction(uint16_t status, PacketBuffer&& body, const std::string& contentType, const dnsdist::ResponseConfig& responseConfig)
+std::shared_ptr<DNSAction> getHTTPStatusAction([[maybe_unused]] uint16_t status, [[maybe_unused]] PacketBuffer&& body, [[maybe_unused]] const std::string& contentType, [[maybe_unused]] const dnsdist::ResponseConfig& responseConfig)
 {
 #if defined(HAVE_DNS_OVER_HTTPS)
   return std::shared_ptr<DNSAction>(new HTTPStatusAction(status, std::move(body), contentType, responseConfig));
index d07009f9b6a29675d123b6b395c8cabed725568e..4780679c0f7260f966a3beec6642fdd676743d74 100644 (file)
@@ -883,7 +883,7 @@ static void handleLoggingConfiguration(const dnsdist::rust::settings::LoggingCon
 
 #endif /* defined(HAVE_YAML_CONFIGURATION) */
 
-bool loadConfigurationFromFile(const std::string& fileName, bool isClient, bool configCheck)
+bool loadConfigurationFromFile(const std::string& fileName, [[maybe_unused]] bool isClient, [[maybe_unused]] bool configCheck)
 {
 #if defined(HAVE_YAML_CONFIGURATION)
   // this is not very elegant but passing a context to the functions called by the
index 43198f5c66897261fde713395f24cafd3e37d0ef..42269716b26b45be5a4258c069c1968d3348e3ff 100644 (file)
@@ -419,7 +419,7 @@ size_t dnsdist_ffi_dnsquestion_get_edns_options(dnsdist_ffi_dnsquestion_t* dq, c
   return totalCount;
 }
 
-size_t dnsdist_ffi_dnsquestion_get_http_headers(dnsdist_ffi_dnsquestion_t* ref, [[maybe_unused]] const dnsdist_ffi_http_header_t** out)
+size_t dnsdist_ffi_dnsquestion_get_http_headers([[maybe_unused]] dnsdist_ffi_dnsquestion_t* ref, [[maybe_unused]] const dnsdist_ffi_http_header_t** out)
 {
 #if defined(HAVE_DNS_OVER_HTTPS) || defined(HAVE_DNS_OVER_HTTP3)
   const auto processHeaders = [&ref](const std::unordered_map<std::string, std::string>& headers) {
@@ -498,7 +498,7 @@ void dnsdist_ffi_dnsquestion_set_result(dnsdist_ffi_dnsquestion_t* dq, const cha
   dq->result = std::string(str, strSize);
 }
 
-void dnsdist_ffi_dnsquestion_set_http_response(dnsdist_ffi_dnsquestion_t* ref, [[maybe_unused]] uint16_t statusCode, [[maybe_unused]] const char* body, [[maybe_unused]] size_t bodyLen, [[maybe_unused]] const char* contentType)
+void dnsdist_ffi_dnsquestion_set_http_response([[maybe_unused]] dnsdist_ffi_dnsquestion_t* ref, [[maybe_unused]] uint16_t statusCode, [[maybe_unused]] const char* body, [[maybe_unused]] size_t bodyLen, [[maybe_unused]] const char* contentType)
 {
 #if defined(HAVE_DNS_OVER_HTTPS)
   if (ref->dq->ids.du) {
index 29e0d19491e8823693d2adf66643769f28264cc0..162161072c19df57b768b69b8430bea2eaefca16 100644 (file)
@@ -2697,7 +2697,7 @@ static void setupLuaConfig(LuaContext& luaCtx, bool client, bool configCheck)
       frontend->loadTicketsKey(key);
     }
   });
-  luaCtx.writeFunction("loadTicketsKey", [](const std::string& key) {
+  luaCtx.writeFunction("loadTicketsKey", []([[maybe_unused]] const std::string& key) {
     for (const auto& frontend : dnsdist::getFrontends()) {
       if (!frontend) {
         continue;
index 3d90c5b3a778e4d4f3b42348549dea0ee0a7fab7..f4b661c917ff1cf4c260960217b0742983b41b08 100644 (file)
@@ -32,7 +32,7 @@ HTTPHeaderRule::HTTPHeaderRule(const std::string& header, const std::string& reg
 #endif /* HAVE_DNS_OVER_HTTPS || HAVE_DNS_OVER_HTTP3 */
 }
 
-bool HTTPHeaderRule::matches(const DNSQuestion* dnsQuestion) const
+bool HTTPHeaderRule::matches([[maybe_unused]] const DNSQuestion* dnsQuestion) const
 {
 #if defined(HAVE_DNS_OVER_HTTPS)
   if (dnsQuestion->ids.du) {
@@ -72,7 +72,7 @@ HTTPPathRule::HTTPPathRule(std::string path) :
 #endif /* HAVE_DNS_OVER_HTTPS || HAVE_DNS_OVER_HTTP3 */
 }
 
-bool HTTPPathRule::matches(const DNSQuestion* dnsQuestion) const
+bool HTTPPathRule::matches([[maybe_unused]] const DNSQuestion* dnsQuestion) const
 {
 #if defined(HAVE_DNS_OVER_HTTPS)
   if (dnsQuestion->ids.du) {
@@ -101,7 +101,7 @@ HTTPPathRegexRule::HTTPPathRegexRule(const std::string& regex) :
 #endif /* HAVE_DNS_OVER_HTTPS || HAVE_DNS_OVER_HTTP3 */
 }
 
-bool HTTPPathRegexRule::matches(const DNSQuestion* dnsQuestion) const
+bool HTTPPathRegexRule::matches([[maybe_unused]] const DNSQuestion* dnsQuestion) const
 {
 #if defined(HAVE_DNS_OVER_HTTPS)
   if (dnsQuestion->ids.du) {