key = opt.substr(0, pos);
val = opt.substr(pos + 1);
}
- options[key] = val;
+ options[key] = std::move(val);
}
// connectors know what they are doing
vector<string> parts;
stringtok(parts, d_params["ignore-unknown-settings"], " ,\t\n\r");
if (find(parts.begin(), parts.end(), var) != parts.end()) {
- d_unknownParams[var] = val;
+ d_unknownParams[var] = std::move(val);
SLOG(g_log << Logger::Warning << "Ignoring unknown setting '" << var << "' as requested" << endl,
d_log->info(Logr::Warning, "Ignoring unknown setting as requested", "name", Logging::Loggable(var)));
return;
}
return false;
}
- mac = tmp_mac;
+ mac = std::move(tmp_mac);
return true;
}
const char* strptr=d_string.c_str();
string::size_type begin_pos = d_pos;
- while(d_pos < d_end) {
- if(strptr[d_pos]!='\r' && dns_isspace(strptr[d_pos]))
+ while (d_pos < d_end) {
+ if (strptr[d_pos]!='\r' && dns_isspace(strptr[d_pos])) {
break;
+ }
d_pos++;
}
sval = DNSName(std::string(strptr+begin_pos, strptr+d_pos));
- if(sval.empty())
- sval=d_zone;
- else if(!d_zone.empty())
- sval+=d_zone;
- val = sval;
+ if (sval.empty()) {
+ sval = d_zone;
+ }
+ else if (!d_zone.empty()) {
+ sval += d_zone;
+ }
+ val = std::move(sval);
}
static bool isbase64(char c, bool acceptspace)
Socket sock(dest.sin4.sin_family, SOCK_STREAM);
sock.setNonBlocking();
setTCPNoDelay(sock.getHandle()); // disable NAGLE, which does not play nicely with delayed ACKs
- TCPIOHandler handler(subjectName, false, sock.releaseHandle(), timeout, tlsCtx);
+ TCPIOHandler handler(subjectName, false, sock.releaseHandle(), timeout, std::move(tlsCtx));
handler.connect(fastOpen, dest, timeout);
// we are writing the proxyheader inside the TLS connection. Is that right?
if (proxyheader.size() > 0 && handler.write(proxyheader.data(), proxyheader.size(), timeout) != proxyheader.size()) {
}
// Reset and store some values for the next chunks.
- d_prevMac = theirMac;
+ d_prevMac = std::move(theirMac);
d_nonSignedMessages = 0;
d_signData.clear();
d_tsigPos = 0;
}
- else
+ else {
d_nonSignedMessages++;
+ }
return true;
}
zoneRecord.dr.d_ttl = soaData.ttl;
zoneRecord.domain_id = soaData.domain_id;
- addCache(d_question, {zoneRecord});
+ addCache(d_question, {std::move(zoneRecord)});
}
return true;
}
resp.body = "<!html><title>" + what + "</title><h1>" + what + "</h1>";
} else {
resp.headers["Content-Type"] = "text/plain; charset=utf-8";
- resp.body = what;
+ resp.body = std::move(what);
}
}
#ifdef RECURSOR
if (!g_slogStructured) {
#endif
- auto logprefix = req.logprefix;
+ const auto& logprefix = req.logprefix;
g_log<<Logger::Notice<<logprefix<<"Request details:"<<endl;
bool first = true;
updateDomainSettingsFromDocument(B, di, zonename, document, !new_records.empty());
if (!catalog && kind == DomainInfo::Primary) {
- auto defaultCatalog = ::arg()["default-catalog-zone"];
+ const auto& defaultCatalog = ::arg()["default-catalog-zone"];
if (!defaultCatalog.empty()) {
di.backend->setCatalog(zonename, DNSName(defaultCatalog));
}
d_templatecounter += d_templatestep;
}
- d_line = retline;
+ d_line = std::move(retline);
return true;
}