Commit Diff


commit - 71a839341e34c7808cc90a6e5e25d269588e989c
commit + 63c080840a7567f67effa9703d7c94b488d22fc1
blob - c37afb6d824f165df9da42084765a386ec2f3ebd
blob + 54dbd7facd349f637507abe774c6791f5e5f1c91
--- src/bin/tpd.rs
+++ src/bin/tpd.rs
@@ -140,11 +140,11 @@ fn main() {
         eprintln!("error: cannot create {}: {e}", dir.display());
         std::process::exit(1);
     }
-    if let Some(parent) = sock_path.parent() {
-        if let Err(e) = std::fs::create_dir_all(parent) {
-            eprintln!("error: cannot create {}: {e}", parent.display());
-            std::process::exit(1);
-        }
+    if let Some(parent) = sock_path.parent()
+        && let Err(e) = std::fs::create_dir_all(parent)
+    {
+        eprintln!("error: cannot create {}: {e}", parent.display());
+        std::process::exit(1);
     }
 
     let store = match PasteStore::open(&dir) {
@@ -198,10 +198,10 @@ fn main() {
     // Apply unveil(2) to restrict filesystem visibility,
     // then pledge(2) to restrict syscalls.
     sandbox::do_unveil(&dir, "rwc");
-    if sock_path.parent() != Some(dir.as_ref()) {
-        if let Some(parent) = sock_path.parent() {
-            sandbox::do_unveil(parent, "rwc");
-        }
+    if sock_path.parent() != Some(dir.as_ref())
+        && let Some(parent) = sock_path.parent()
+    {
+        sandbox::do_unveil(parent, "rwc");
     }
     if !no_auto_bootstrap || !bootstrap.is_empty() {
         sandbox::do_unveil(std::path::Path::new("/etc/resolv.conf"), "r");
blob - 8300defbe7e78d2be9f831c9b34220fda1ec27a6
blob + 88e3a09bea5287ba679394b265279790a557141d
--- src/daemon.rs
+++ src/daemon.rs
@@ -304,7 +304,7 @@ fn handle_client(
             continue;
         }
         let line = line.trim();
-        let cmd = match protocol::parse_request(&line) {
+        let cmd = match protocol::parse_request(line) {
             Ok(c) => c,
             Err(e) => {
                 let resp = protocol::format_response(&Response::Err(e));