g_log << Logger::Warning << msg << " ignored" << endl;
return;
}
- else
- throw PDNSException(msg);
+ throw PDNSException(std::move(msg));
}
// bdr.qname.swap(bdr.qname);
}
ifs.close();
kd.content = content.str();
- keys.push_back(kd);
+ keys.emplace_back(std::move(kd));
}
}
}
g_log << Logger::Warning << "Query " << ((long)(void*)this) << ": " << d_dtime.udiffNoReset() << " us to execute" << endl;
}
- d_lookupdomain = hunt;
+ d_lookupdomain = std::move(hunt);
// Make sure we start with fresh data
d_currentrrset.clear();
for (auto id : ids) {
if (txn.get(id, key)) {
KeyData kd{key.content, id, key.flags, key.active, key.published};
- keys.push_back(kd);
+ keys.emplace_back(std::move(kd));
}
}
g_log << Logger::Warning << "[" << getPrefix() << "] Unsupported key '" << item.first << "' in keydata result" << endl;
}
logResult("id=" << key.id << ",flags=" << key.flags << ",active=" << (key.active ? "true" : "false") << ",published=" << (key.published ? "true" : "false"));
- keys.push_back(key);
+ keys.emplace_back(std::move(key));
}
return true;
key.active = asBool(jsonKey["active"]);
key.published = boolFromJson(jsonKey, "published", true);
key.content = stringFromJson(jsonKey, "content");
- keys.push_back(key);
+ keys.emplace_back(std::move(key));
}
return true;
return;
}
TSIGRecordContent trc;
- if (tsigalgorithm.toStringNoDot() == "hmac-md5")
+ if (tsigalgorithm.toStringNoDot() == "hmac-md5") {
trc.d_algoName = DNSName(tsigalgorithm.toStringNoDot() + ".sig-alg.reg.int.");
- else
- trc.d_algoName = tsigalgorithm;
+ }
+ else {
+ trc.d_algoName = std::move(tsigalgorithm);
+ }
trc.d_time = time(nullptr);
trc.d_fudge = 300;
trc.d_origID = ntohs(notificationId);
status.soa_serial = sr->d_st.serial;
}
- replacement.push_back(rr);
+ replacement.emplace_back(std::move(rr));
}
di.backend->replaceRRSet(di.id, g.first.first.operator const DNSName&() + domain.operator const DNSName&(), QType(g.first.second), replacement);
auto sd = getRR<SOARecordContent>(dr);
zs.soa_serial = sd->d_st.serial;
}
- rrs.push_back(rr);
+ rrs.emplace_back(std::move(rr));
}
}
else {
nr.id = dns_random_uint16();
nr.next = time(nullptr) + delay;
- d_nqueue.push_back(nr);
+ d_nqueue.push_back(std::move(nr));
}
bool removeIf(const ComboAddress& remote, uint16_t id, const ZoneName& domain)
string descr = ns3p.getZoneRepresentation();
vector<string> meta;
- meta.push_back(descr);
+ meta.emplace_back(std::move(descr));
if (d_keymetadb->setDomainMetadata(zname, "NSEC3PARAM", meta)) {
meta.clear();
ZoneName sname(name);
do {
if(authSet.find(sname) != authSet.end()) {
- signer = sname;
+ signer = std::move(sname);
return true;
}
}
typedef map<DNSName, NSECXEntry, CanonDNSNameCompare> nsecxrepo_t;
nsecxrepo_t nsecxrepo;
- ChunkedSigningPipe csp(targetZone, (securedZone && !presignedZone), ::arg().asNum("signing-threads", 1), ::arg().mustDo("workaround-11804") ? 1 : 100);
+ // std::move(targetZone) below is ok as it is no longer used afterwards
+ ChunkedSigningPipe csp(std::move(targetZone), (securedZone && !presignedZone), ::arg().asNum("signing-threads", 1), ::arg().mustDo("workaround-11804") ? 1 : 100);
DNSName keyname;
unsigned int udiff;