commit - 71a839341e34c7808cc90a6e5e25d269588e989c
commit + 63c080840a7567f67effa9703d7c94b488d22fc1
blob - c37afb6d824f165df9da42084765a386ec2f3ebd
blob + 54dbd7facd349f637507abe774c6791f5e5f1c91
--- src/bin/tpd.rs
+++ src/bin/tpd.rs
eprintln!("error: cannot create {}: {e}", dir.display());
std::process::exit(1);
}
- if let Some(parent) = sock_path.parent() {
- if let Err(e) = std::fs::create_dir_all(parent) {
- eprintln!("error: cannot create {}: {e}", parent.display());
- std::process::exit(1);
- }
+ if let Some(parent) = sock_path.parent()
+ && let Err(e) = std::fs::create_dir_all(parent)
+ {
+ eprintln!("error: cannot create {}: {e}", parent.display());
+ std::process::exit(1);
}
let store = match PasteStore::open(&dir) {
// Apply unveil(2) to restrict filesystem visibility,
// then pledge(2) to restrict syscalls.
sandbox::do_unveil(&dir, "rwc");
- if sock_path.parent() != Some(dir.as_ref()) {
- if let Some(parent) = sock_path.parent() {
- sandbox::do_unveil(parent, "rwc");
- }
+ if sock_path.parent() != Some(dir.as_ref())
+ && let Some(parent) = sock_path.parent()
+ {
+ sandbox::do_unveil(parent, "rwc");
}
if !no_auto_bootstrap || !bootstrap.is_empty() {
sandbox::do_unveil(std::path::Path::new("/etc/resolv.conf"), "r");
blob - 8300defbe7e78d2be9f831c9b34220fda1ec27a6
blob + 88e3a09bea5287ba679394b265279790a557141d
--- src/daemon.rs
+++ src/daemon.rs
continue;
}
let line = line.trim();
- let cmd = match protocol::parse_request(&line) {
+ let cmd = match protocol::parse_request(line) {
Ok(c) => c,
Err(e) => {
let resp = protocol::format_response(&Response::Err(e));