]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
dnsdist: Fix more clang-tidy warnings
authorRemi Gacogne <remi.gacogne@powerdns.com>
Tue, 23 Jan 2024 12:03:35 +0000 (13:03 +0100)
committerRemi Gacogne <remi.gacogne@powerdns.com>
Tue, 23 Jan 2024 12:03:35 +0000 (13:03 +0100)
pdns/bpf-filter.cc
pdns/dnsdist-tcp.cc
pdns/dnsdist.cc
pdns/dnsdistdist/doh.cc
pdns/dnsdistdist/doh3.cc
pdns/dnsdistdist/doq.cc

index 225432cc1c4a5a2fc0b3f727de2335258f3edb37..32f6986d97630fae720383deebf4f5594bd10099 100644 (file)
@@ -83,6 +83,7 @@ static void bpf_check_map_sizes(int descriptor, uint32_t expectedKeySize, uint32
   }
 }
 
+// NOLINTNEXTLINE(bugprone-easily-swappable-parameters)
 static int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size,
                           int max_entries, int map_flags)
 {
@@ -137,7 +138,7 @@ static int bpf_get_next_key(int descriptor, void *key, void *next_key)
 }
 
 static int bpf_prog_load(enum bpf_prog_type prog_type,
-                         const struct bpf_insn *insns, int prog_len,
+                         const struct bpf_insn *insns, size_t prog_len,
                          const char *license, int kern_version)
 {
   char log_buf[65535];
@@ -145,7 +146,7 @@ static int bpf_prog_load(enum bpf_prog_type prog_type,
   memset(&attr, 0, sizeof(attr));
   attr.prog_type = prog_type;
   attr.insns = ptr_to_u64((void *) insns);
-  attr.insn_cnt = prog_len / sizeof(struct bpf_insn);
+  attr.insn_cnt = static_cast<int>(prog_len / sizeof(struct bpf_insn));
   attr.license = ptr_to_u64((void *) license);
   attr.log_buf = ptr_to_u64(log_buf);
   attr.log_size = sizeof(log_buf);
index 9d8edaf572ff9e468019c84828c044c7dfdbed74..e3eb68e1152c4e50cb5f5db069f5b89ba590501a 100644 (file)
@@ -674,7 +674,7 @@ IncomingTCPConnectionState::QueryProcessingResult IncomingTCPConnectionState::ha
   {
     /* this pointer will be invalidated the second the buffer is resized, don't hold onto it! */
     const dnsheader_aligned dnsHeader(query.data());
-    if (!checkQueryHeaders(*dnsHeader.get(), *d_ci.cs)) {
+    if (!checkQueryHeaders(*dnsHeader, *d_ci.cs)) {
       return QueryProcessingResult::InvalidHeaders;
     }
 
index 204db07f1413e1ef33dd82f6d0b31771b2de2bbb..c78fb5a650c439e38971b2eefc0acb9da801c74e 100644 (file)
@@ -1705,9 +1705,9 @@ bool assignOutgoingUDPQueryToBackend(std::shared_ptr<DownstreamState>& downstrea
   }
 
   try {
-    int fd = downstream->pickSocketForSending();
+    int descriptor = downstream->pickSocketForSending();
     if (actuallySend) {
-      dnsQuestion.ids.backendFD = fd;
+      dnsQuestion.ids.backendFD = descriptor;
     }
     dnsQuestion.ids.origID = queryID;
     dnsQuestion.ids.forwardedOverUDP = true;
@@ -1726,7 +1726,7 @@ bool assignOutgoingUDPQueryToBackend(std::shared_ptr<DownstreamState>& downstrea
 
     /* you can't touch ids or du after this line, unless the call returned a non-negative value,
        because it might already have been freed */
-    ssize_t ret = udpClientSendRequestToBackend(downstream, fd, query);
+    ssize_t ret = udpClientSendRequestToBackend(downstream, descriptor, query);
 
     if (ret < 0) {
       failed = true;
@@ -1799,7 +1799,7 @@ static void processUDPQuery(ClientState& cs, LocalHolders& holders, const struct
       const dnsheader_aligned dnsHeader(query.data());
       queryId = ntohs(dnsHeader->id);
 
-      if (!checkQueryHeaders(*dnsHeader.get(), cs)) {
+      if (!checkQueryHeaders(*dnsHeader, cs)) {
         return;
       }
 
index f40923d385b186d38b6b6b08c69c9be69dd23973..5ecdd00f6fd648a109e0c3807db9940a5d1eed89 100644 (file)
@@ -719,7 +719,7 @@ static void processDOHQuery(DOHUnitUniquePtr&& unit, bool inMainThread = false)
       // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
       const dnsheader_aligned dnsHeader(unit->query.data());
 
-      if (!checkQueryHeaders(*dnsHeader.get(), clientState)) {
+      if (!checkQueryHeaders(*dnsHeader, clientState)) {
         unit->status_code = 400;
         handleImmediateResponse(std::move(unit), "DoH invalid headers");
         return;
index 66081eb08a6d1dbe8df915438aa0426a52293313..4c0823ab621e669b027f20ad977af477cb20bf32 100644 (file)
@@ -513,7 +513,7 @@ static void processDOH3Query(DOH3UnitUniquePtr&& doh3Unit)
       /* don't keep that pointer around, it will be invalidated if the buffer is ever resized */
       dnsheader_aligned dnsHeader(unit->query.data());
 
-      if (!checkQueryHeaders(*dnsHeader.get(), clientState)) {
+      if (!checkQueryHeaders(*dnsHeader, clientState)) {
         dnsdist::PacketMangling::editDNSHeaderFromPacket(unit->query, [](dnsheader& header) {
           header.rcode = RCode::ServFail;
           header.qr = true;
index 3f52d33dc962ec89f2eb2de93b732720f34c1f76..277a8c5985ac1f86ffe5d88dcf225b24376cbfea 100644 (file)
@@ -425,7 +425,7 @@ static void processDOQQuery(DOQUnitUniquePtr&& doqUnit)
       /* don't keep that pointer around, it will be invalidated if the buffer is ever resized */
       dnsheader_aligned dnsHeader(unit->query.data());
 
-      if (!checkQueryHeaders(*dnsHeader.get(), clientState)) {
+      if (!checkQueryHeaders(*dnsHeader, clientState)) {
         dnsdist::PacketMangling::editDNSHeaderFromPacket(unit->query, [](dnsheader& header) {
           header.rcode = RCode::ServFail;
           header.qr = true;