Skip to content

Commit 64549c9

Browse files
committed
Don't use unwrap
Enabled `+#![deny(clippy::unwrap_used, clippy::expect_used, clippy::panic)]` (but also `allow-unwrap-in-tests = true` because it's too strict for tests) This means that `unwrap`, `expect` and `panic` are not allowed in the project, unless the programmer states `#[allow(clippy::unwrap_used)]`, preferably with a comment explaining why the `unwrap`/`expect` could never panic. Removed all instances of `unwrap` which had better alternatives, but left some that were reasonable. This should stop recert from causing panics (unfortunately dependencies might still panic) Also removed references to `anyhow::Error` from return values, as this is unnecessarily verbose and can be inferred implicitly. It's constantly being added by the rust_analyzer's extract_function code action, and I forget to remove it.
1 parent f069cc4 commit 64549c9

25 files changed

+151
-97
lines changed

clippy.toml

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
allow-unwrap-in-tests = true

src/cluster_crypto/cert_key_pair.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@ fn fix_akid(
422422
akid: &mut x509_cert::ext::pkix::AuthorityKeyIdentifier,
423423
skids: &mut SkidEdits,
424424
serial_numbers: &mut SerialNumberEdits,
425-
) -> Result<(), anyhow::Error> {
425+
) -> Result<()> {
426426
if let Some(key_identifier) = &akid.key_identifier {
427427
let matching_skid = skids
428428
.get(&HashableKeyID(key_identifier.clone()))

src/cluster_crypto/cert_key_pair/cert_mutations.rs

+1-4
Original file line numberDiff line numberDiff line change
@@ -82,10 +82,7 @@ fn get_certificate_expiration(tbs_certificate: &mut TbsCertificate) -> Result<(D
8282
Ok((current_not_before, current_not_after))
8383
}
8484

85-
pub(crate) fn mutate_cert_cn_san(
86-
tbs_certificate: &mut TbsCertificate,
87-
cn_san_replace_rules: &CnSanReplaceRules,
88-
) -> Result<(), anyhow::Error> {
85+
pub(crate) fn mutate_cert_cn_san(tbs_certificate: &mut TbsCertificate, cn_san_replace_rules: &CnSanReplaceRules) -> Result<()> {
8986
mutate_cert_common_name(&mut tbs_certificate.subject, cn_san_replace_rules).context("mutating subject Common Name")?;
9087
mutate_cert_common_name(&mut tbs_certificate.issuer, cn_san_replace_rules).context("mutating issuer Common Name")?;
9188
mutate_cert_subject_alternative_name(tbs_certificate, cn_san_replace_rules).context("mutating Subject Alternative Name")?;

src/cluster_crypto/crypto_objects.rs

+4-1
Original file line numberDiff line numberDiff line change
@@ -125,12 +125,15 @@ pub(crate) fn process_jwt(value: &str, location: &Location) -> Result<Option<Dis
125125
pub(crate) fn process_pem_bundle(value: &str, location: &Location, external_certs: &HashSet<String>) -> Result<Vec<DiscoveredCryptoObect>> {
126126
let pems = pem::parse_many(value).context("parsing pem")?;
127127

128+
#[allow(clippy::unwrap_used)] // The filter ensures that unwrap will never panic. We can't use
129+
// a filter_map because we want to maintain the index of the pem in the bundle.
128130
pems.iter()
129131
.enumerate()
130132
.map(|(pem_index, pem)| {
131133
process_single_pem(pem, external_certs).with_context(|| format!("processing pem at index {} in the bundle", pem_index))
132134
})
133-
.collect::<Result<Vec<_>>>()?
135+
.collect::<Result<Vec<_>>>()
136+
.context("error processing PEM")?
134137
.into_iter()
135138
.enumerate()
136139
.filter(|(_, crypto_object)| crypto_object.is_some())

src/cluster_crypto/crypto_utils.rs

+3-2
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,13 @@ pub(crate) mod jwt;
1717

1818
pub(crate) struct SigningKey {
1919
pub in_memory_signing_key_pair: InMemorySigningKeyPair,
20-
pub pkcs8_pem: Vec<u8>,
20+
pkcs8_pem: Vec<u8>,
2121
}
2222

2323
impl Clone for SigningKey {
2424
fn clone(&self) -> Self {
2525
Self {
26+
#[allow(clippy::unwrap_used)] // This can never panic because a SigningKey could never be created with an invalid pkcs8_pem
2627
in_memory_signing_key_pair: InMemorySigningKeyPair::from_pkcs8_pem(&self.pkcs8_pem).unwrap(),
2728
pkcs8_pem: self.pkcs8_pem.clone(),
2829
}
@@ -126,7 +127,7 @@ pub(crate) fn generate_ec_key(ec_curve: EcdsaCurve) -> Result<SigningKey> {
126127

127128
let pkcs8_pem_data = StdCommand::new("openssl")
128129
.args(["pkcs8", "-topk8", "-nocrypt", "-inform", "DER"])
129-
.stdin(gen_sec1_ec.stdout.unwrap())
130+
.stdin(gen_sec1_ec.stdout.context("no stdout")?)
130131
.output()
131132
.context("openssl pkcs8")?
132133
.stdout;

src/cluster_crypto/distributed_jwt.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ impl DistributedJwt {
107107
Ok(())
108108
}
109109

110-
async fn commit_at_location(location: &Location, jwt_regenerated: &Jwt, etcd_client: &InMemoryK8sEtcd) -> Result<(), anyhow::Error> {
110+
async fn commit_at_location(location: &Location, jwt_regenerated: &Jwt, etcd_client: &InMemoryK8sEtcd) -> Result<()> {
111111
match location {
112112
Location::K8s(k8slocation) => {
113113
Self::commit_to_etcd(jwt_regenerated, etcd_client, k8slocation)

src/config.rs

+55-28
Original file line numberDiff line numberDiff line change
@@ -183,8 +183,10 @@ impl RecertConfig {
183183
.context("force_expire must be a boolean")?;
184184
let cluster_rename = match value.remove("cluster_rename") {
185185
Some(value) => Some(
186-
ClusterNamesRename::parse(value.as_str().context("cluster_rename must be a string")?)
187-
.context(format!("cluster_rename {}", value.as_str().unwrap()))?,
186+
ClusterNamesRename::parse(value.as_str().context("cluster_rename must be a string")?).context(format!(
187+
"cluster_rename {}",
188+
value.as_str().context("cluster_rename must be a string")?
189+
))?,
188190
),
189191
None => None,
190192
};
@@ -202,7 +204,8 @@ impl RecertConfig {
202204
};
203205
let proxy = match value.remove("proxy") {
204206
Some(value) => Some(
205-
Proxy::parse(value.as_str().context("proxy must be a string")?).context(format!("proxy {}", value.as_str().unwrap()))?,
207+
Proxy::parse(value.as_str().context("proxy must be a string")?)
208+
.context(format!("proxy {}", value.as_str().context("proxy must be a string")?))?,
206209
),
207210
None => None,
208211
};
@@ -376,29 +379,33 @@ impl RecertConfig {
376379
}
377380
}
378381

379-
fn parse_summary_file_clean(value: Value) -> Result<Option<ConfigPath>, anyhow::Error> {
382+
fn parse_summary_file_clean(value: Value) -> Result<Option<ConfigPath>> {
380383
Ok(Some(
381-
ConfigPath::new(value.as_str().context("summary_file_clean must be a string")?)
382-
.context(format!("summary_file_clean {}", value.as_str().unwrap()))?,
384+
ConfigPath::new(value.as_str().context("summary_file_clean must be a string")?).context(format!(
385+
"summary_file_clean {}",
386+
value.as_str().context("summary_file_clean must be a string")?
387+
))?,
383388
))
384389
}
385390

386-
fn parse_summary_file(value: Value) -> Result<Option<ConfigPath>, anyhow::Error> {
391+
fn parse_summary_file(value: Value) -> Result<Option<ConfigPath>> {
387392
Ok(Some(
388393
ConfigPath::new(value.as_str().context("summary_file must be a string")?)
389-
.context(format!("summary_file {}", value.as_str().unwrap()))?,
394+
.context(format!("summary_file {}", value.as_str().context("summary_file must be a string")?))?,
390395
))
391396
}
392397

393-
fn parse_server_ssh_keys(value: Value) -> Result<Option<ConfigPath>, anyhow::Error> {
394-
let config_path = ConfigPath::new(value.as_str().context("regenerate_server_ssh_keys must be a string")?)
395-
.context(format!("regenerate_server_ssh_keys {}", value.as_str().unwrap()))?;
398+
fn parse_server_ssh_keys(value: Value) -> Result<Option<ConfigPath>> {
399+
let config_path = ConfigPath::new(value.as_str().context("regenerate_server_ssh_keys must be a string")?).context(format!(
400+
"regenerate_server_ssh_keys {}",
401+
value.as_str().context("regenerate_server_ssh_keys must be a string")?
402+
))?;
396403
ensure!(config_path.try_exists()?, "regenerate_server_ssh_keys must exist");
397404
ensure!(config_path.is_dir(), "regenerate_server_ssh_keys must be a directory");
398405
Ok(Some(config_path))
399406
}
400407

401-
fn parse_threads(value: Value) -> Result<Option<usize>, anyhow::Error> {
408+
fn parse_threads(value: Value) -> Result<Option<usize>> {
402409
Ok(Some(
403410
value
404411
.as_u64()
@@ -415,8 +422,10 @@ fn parse_cert_rules(value: Value) -> Result<UseCertRules> {
415422
.context("use_cert_rules must be an array")?
416423
.iter()
417424
.map(|value| {
418-
UseCert::parse(value.as_str().context("use_cert_rules must be an array of strings")?)
419-
.context(format!("use_cert_rule {}", value.as_str().unwrap()))
425+
UseCert::parse(value.as_str().context("use_cert_rules must be an array of strings")?).context(format!(
426+
"use_cert_rule {}",
427+
value.as_str().context("use_cert_rules must be an array of strings")?
428+
))
420429
})
421430
.collect::<Result<Vec<UseCert>>>()?,
422431
))
@@ -429,8 +438,10 @@ fn parse_use_key_rules(value: Value) -> Result<UseKeyRules> {
429438
.context("use_key_rules must be an array")?
430439
.iter()
431440
.map(|value| {
432-
UseKey::parse(value.as_str().context("use_key_rules must be an array of strings")?)
433-
.context(format!("use_key_rule {}", value.as_str().unwrap()))
441+
UseKey::parse(value.as_str().context("use_key_rules must be an array of strings")?).context(format!(
442+
"use_key_rule {}",
443+
value.as_str().context("use_key_rules must be an array of strings")?
444+
))
434445
})
435446
.collect::<Result<Vec<UseKey>>>()?,
436447
))
@@ -443,8 +454,10 @@ fn parse_cs_san_rules(value: Value) -> Result<CnSanReplaceRules> {
443454
.context("cn_san_replace_rules must be an array")?
444455
.iter()
445456
.map(|value| {
446-
CnSanReplace::parse(value.as_str().context("cn_san_replace_rules must be an array of strings")?)
447-
.context(format!("cn_san_replace_rule {}", value.as_str().unwrap()))
457+
CnSanReplace::parse(value.as_str().context("cn_san_replace_rules must be an array of strings")?).context(format!(
458+
"cn_san_replace_rule {}",
459+
value.as_str().context("cn_san_replace_rules must be an array of strings")?
460+
))
448461
})
449462
.collect::<Result<Vec<CnSanReplace>>>()?,
450463
))
@@ -474,8 +487,9 @@ fn parse_dir_file_config(
474487
.context("static_dirs must be an array")?
475488
.iter()
476489
.map(|value| {
477-
let config_path = ConfigPath::new(value.as_str().context("static_dirs must be an array of strings")?)
478-
.context(format!("config dir {}", value.as_str().unwrap()))?;
490+
let config_path = ConfigPath::new(value.as_str().context("static_dirs must be an array of strings")?).context(
491+
format!("config dir {}", value.as_str().context("static_dirs must be an array of strings")?),
492+
)?;
479493

480494
ensure!(config_path.try_exists()?, format!("static_dir must exist: {}", config_path));
481495
ensure!(config_path.is_dir(), format!("static_dir must be a directory: {}", config_path));
@@ -506,8 +520,11 @@ fn parse_dir_file_config(
506520
.context("static_files must be an array")?
507521
.iter()
508522
.map(|value| {
509-
let config_path = ConfigPath::new(value.as_str().context("static_files must be an array of strings")?)
510-
.context(format!("config file {}", value.as_str().unwrap()))?;
523+
let config_path =
524+
ConfigPath::new(value.as_str().context("static_files must be an array of strings")?).context(format!(
525+
"config file {}",
526+
value.as_str().context("static_files must be an array of strings")?
527+
))?;
511528

512529
ensure!(config_path.try_exists()?, format!("static_file must exist: {}", config_path));
513530
ensure!(config_path.is_file(), format!("static_file must be a file: {}", config_path));
@@ -525,8 +542,9 @@ fn parse_dir_file_config(
525542
.context("crypto_dirs must be an array")?
526543
.iter()
527544
.map(|value| {
528-
let config_path = ConfigPath::new(value.as_str().context("crypto_dirs must be an array of strings")?)
529-
.context(format!("crypto dir {}", value.as_str().unwrap()))?;
545+
let config_path = ConfigPath::new(value.as_str().context("crypto_dirs must be an array of strings")?).context(
546+
format!("crypto dir {}", value.as_str().context("crypto_dirs must be an array of strings")?),
547+
)?;
530548

531549
ensure!(config_path.try_exists()?, format!("crypto_dir must exist: {}", config_path));
532550
ensure!(config_path.is_dir(), format!("crypto_dir must be a directory: {}", config_path));
@@ -546,8 +564,11 @@ fn parse_dir_file_config(
546564
.context("crypto_files must be an array")?
547565
.iter()
548566
.map(|value| {
549-
let config_path = ConfigPath::new(value.as_str().context("crypto_files must be an array of strings")?)
550-
.context(format!("crypto file {}", value.as_str().unwrap()))?;
567+
let config_path =
568+
ConfigPath::new(value.as_str().context("crypto_files must be an array of strings")?).context(format!(
569+
"crypto file {}",
570+
value.as_str().context("crypto_files must be an array of strings")?
571+
))?;
551572

552573
ensure!(config_path.try_exists()?, format!("crypto_file must exist: {}", config_path));
553574
ensure!(config_path.is_file(), format!("crypto_file must be a file: {}", config_path));
@@ -569,7 +590,10 @@ fn parse_dir_file_config(
569590
.iter()
570591
.map(|value| {
571592
let config_path = ConfigPath::new(value.as_str().context("cluster_customization_dirs must be an array of strings")?)
572-
.context(format!("cluster_customization dir {}", value.as_str().unwrap()))?;
593+
.context(format!(
594+
"cluster_customization dir {}",
595+
value.as_str().context("cluster_customization_dirs must be an array of strings")?
596+
))?;
573597

574598
ensure!(
575599
config_path.try_exists()?,
@@ -597,7 +621,10 @@ fn parse_dir_file_config(
597621
.iter()
598622
.map(|value| {
599623
let config_path = ConfigPath::new(value.as_str().context("cluster_customization_files must be an array of strings")?)
600-
.context(format!("cluster_customization file {}", value.as_str().unwrap()))?;
624+
.context(format!(
625+
"cluster_customization file {}",
626+
value.as_str().context("cluster_customization_files must be an array of strings")?
627+
))?;
601628

602629
ensure!(
603630
config_path.try_exists()?,

src/etcd_encoding.rs

+9-1
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,15 @@ pub(crate) async fn decode(data: &[u8]) -> Result<Vec<u8>> {
6868

6969
let data = &data[4..];
7070
let unknown = Unknown::decode(data)?;
71-
let kind = unknown.type_meta.as_ref().unwrap().kind.as_ref().unwrap().as_str();
71+
let kind = unknown
72+
.type_meta
73+
.as_ref()
74+
.context("missing meta")?
75+
.kind
76+
.as_ref()
77+
.context("missing kind")?
78+
.as_str();
79+
7280
Ok(match kind {
7381
"Route" => serde_json::to_vec(&RouteWithMeta::try_from(unknown)?)?,
7482
"Deployment" => serde_json::to_vec(&DeploymentWithMeta::try_from(unknown)?)?,

src/main.rs

+2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
#![deny(clippy::unwrap_used, clippy::expect_used, clippy::panic)]
2+
13
use anyhow::{Context, Result};
24
use cluster_crypto::ClusterCryptoObjects;
35
use config::RecertConfig;

src/ocp_postprocess.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ pub(crate) async fn ocp_postprocess(
6969
async fn run_cluster_customizations(
7070
cluster_customizations: &ClusterCustomizations,
7171
in_memory_etcd_client: &Arc<InMemoryK8sEtcd>,
72-
) -> Result<(), anyhow::Error> {
72+
) -> Result<()> {
7373
let dirs = &cluster_customizations.dirs;
7474
let files = &cluster_customizations.files;
7575

@@ -253,7 +253,7 @@ async fn fix_dep_annotations(
253253
annotations: &mut serde_json::Map<String, serde_json::Value>,
254254
k8s_resource_location: &K8sResourceLocation,
255255
etcd_client: &Arc<InMemoryK8sEtcd>,
256-
) -> Result<(), anyhow::Error> {
256+
) -> Result<()> {
257257
for annotation_key in annotations.keys().cloned().collect::<Vec<_>>() {
258258
if !annotation_key.starts_with("operator.openshift.io/dep-") {
259259
continue;
@@ -348,7 +348,7 @@ pub(crate) async fn sync_webhook_authenticators(in_memory_etcd_client: &Arc<InMe
348348
.iter()
349349
.filter_map(|file_pathbuf| {
350350
let file_path = file_pathbuf.to_str()?;
351-
Some((regex.captures(file_path)?[1].parse::<u32>().unwrap(), file_pathbuf))
351+
Some((regex.captures(file_path)?[1].parse::<u32>().ok()?, file_pathbuf))
352352
})
353353
.collect::<HashSet<_>>();
354354
let (latest_revision, latest_kubeconfig) = captures

src/ocp_postprocess/cluster_domain_rename.rs

+5-5
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ pub(crate) async fn rename_all(
1313
cluster_rename: &ClusterNamesRename,
1414
static_dirs: &Vec<ConfigPath>,
1515
static_files: &Vec<ConfigPath>,
16-
) -> Result<(), anyhow::Error> {
16+
) -> Result<()> {
1717
let cluster_domain = cluster_rename.cluster_domain();
1818
let cluster_name = cluster_rename.cluster_name.clone();
1919

@@ -45,7 +45,7 @@ async fn fix_filesystem_resources(
4545
static_dirs: &Vec<ConfigPath>,
4646
static_files: &Vec<ConfigPath>,
4747
generated_infra_id: String,
48-
) -> Result<(), anyhow::Error> {
48+
) -> Result<()> {
4949
for dir in static_dirs {
5050
fix_dir_resources(cluster_name, cluster_domain, dir, &generated_infra_id).await?;
5151
}
@@ -57,7 +57,7 @@ async fn fix_filesystem_resources(
5757
Ok(())
5858
}
5959

60-
async fn fix_dir_resources(cluster_name: &str, cluster_domain: &str, dir: &Path, generated_infra_id: &str) -> Result<(), anyhow::Error> {
60+
async fn fix_dir_resources(cluster_name: &str, cluster_domain: &str, dir: &Path, generated_infra_id: &str) -> Result<()> {
6161
filesystem_rename::fix_filesystem_kubeconfigs(cluster_name, cluster_domain, dir)
6262
.await
6363
.context("renaming kubeconfigs")?;
@@ -82,7 +82,7 @@ async fn fix_dir_resources(cluster_name: &str, cluster_domain: &str, dir: &Path,
8282
Ok(())
8383
}
8484

85-
async fn fix_file_resources(cluster_domain: &str, file: &Path) -> Result<(), anyhow::Error> {
85+
async fn fix_file_resources(cluster_domain: &str, file: &Path) -> Result<()> {
8686
filesystem_rename::fix_filesystem_mcs_machine_config_content(cluster_domain, file)
8787
.await
8888
.context("fix filesystem mcs machine config content")?;
@@ -94,7 +94,7 @@ async fn fix_etcd_resources(
9494
cluster_domain: &str,
9595
generated_infra_id: String,
9696
cluster_rename: &ClusterNamesRename,
97-
) -> Result<(), anyhow::Error> {
97+
) -> Result<()> {
9898
etcd_rename::fix_router_certs(
9999
etcd_client,
100100
cluster_domain,

src/ocp_postprocess/cluster_domain_rename/etcd_rename.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -734,7 +734,7 @@ pub(crate) async fn fix_dns_cluster_config(etcd_client: &Arc<InMemoryK8sEtcd>, c
734734
Ok(())
735735
}
736736

737-
fn fix_dns(config: &mut Value, cluster_domain: &str) -> Result<(), anyhow::Error> {
737+
fn fix_dns(config: &mut Value, cluster_domain: &str) -> Result<()> {
738738
let spec = &mut config
739739
.pointer_mut("/spec")
740740
.context("no /spec")?
@@ -849,7 +849,7 @@ pub(crate) async fn fix_infrastructure_cluster_config(
849849
Ok(())
850850
}
851851

852-
fn fix_infra(config: &mut Value, infra_id: &str, cluster_domain: &str) -> Result<(), anyhow::Error> {
852+
fn fix_infra(config: &mut Value, infra_id: &str, cluster_domain: &str) -> Result<()> {
853853
let status = &mut config
854854
.pointer_mut("/status")
855855
.context("no /status")?

src/ocp_postprocess/cluster_domain_rename/rename_utils.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -366,7 +366,7 @@ pub(crate) fn fix_kcm_pod(pod: &mut Value, generated_infra_id: &str) -> Result<(
366366

367367
*arg = serde_json::Value::String(
368368
regex::Regex::new(r"--cluster-name=[^ ]+")
369-
.unwrap()
369+
.context("compiling regex")?
370370
.replace_all(
371371
arg.as_str().context("arg not string")?,
372372
format!("--cluster-name={}", generated_infra_id).as_str(),

src/ocp_postprocess/go_base32.rs

+3
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,9 @@ pub(crate) fn base32_encode(mut num: u64) -> String {
1818
output_index -= 1;
1919
output_array[output_index] = BASE32_DIGITS[num as usize];
2020

21+
// Unwrap can't panic because the array the above loop outputs is guaranteed to be valid UTF-8,
22+
// we don't want this function to return a Result
23+
#[allow(clippy::unwrap_used)]
2124
String::from_utf8(output_array[output_index..].to_vec()).unwrap()
2225
}
2326

0 commit comments

Comments
 (0)