Port try macro to new ? operator. (#3962)
* initial untry sweep * restore try in ipc codegen, fix inference * change a few missed try instances
This commit is contained in:
committed by
Arkadiy Paronyan
parent
b1ef52a6d7
commit
8125b5690c
@@ -17,8 +17,8 @@ impl Deserialize for Bytes {
|
||||
fn deserialize<D>(deserializer: &mut D) -> Result<Self, D::Error>
|
||||
where D: Deserializer
|
||||
{
|
||||
let s = try!(String::deserialize(deserializer));
|
||||
let data = try!(s.from_hex().map_err(|e| Error::custom(format!("Invalid hex value {}", e))));
|
||||
let s = String::deserialize(deserializer)?;
|
||||
let data = s.from_hex().map_err(|e| Error::custom(format!("Invalid hex value {}", e)))?;
|
||||
Ok(Bytes(data))
|
||||
}
|
||||
}
|
||||
|
||||
@@ -90,13 +90,13 @@ impl Visitor for CryptoVisitor {
|
||||
let mut mac = None;
|
||||
|
||||
loop {
|
||||
match try!(visitor.visit_key()) {
|
||||
Some(CryptoField::Cipher) => { cipher = Some(try!(visitor.visit_value())); }
|
||||
Some(CryptoField::CipherParams) => { cipherparams = Some(try!(visitor.visit_value())); }
|
||||
Some(CryptoField::CipherText) => { ciphertext = Some(try!(visitor.visit_value())); }
|
||||
Some(CryptoField::Kdf) => { kdf = Some(try!(visitor.visit_value())); }
|
||||
Some(CryptoField::KdfParams) => { kdfparams = Some(try!(visitor.visit_value())); }
|
||||
Some(CryptoField::Mac) => { mac = Some(try!(visitor.visit_value())); }
|
||||
match visitor.visit_key()? {
|
||||
Some(CryptoField::Cipher) => { cipher = Some(visitor.visit_value()?); }
|
||||
Some(CryptoField::CipherParams) => { cipherparams = Some(visitor.visit_value()?); }
|
||||
Some(CryptoField::CipherText) => { ciphertext = Some(visitor.visit_value()?); }
|
||||
Some(CryptoField::Kdf) => { kdf = Some(visitor.visit_value()?); }
|
||||
Some(CryptoField::KdfParams) => { kdfparams = Some(visitor.visit_value()?); }
|
||||
Some(CryptoField::Mac) => { mac = Some(visitor.visit_value()?); }
|
||||
None => { break; }
|
||||
}
|
||||
}
|
||||
@@ -109,7 +109,7 @@ impl Visitor for CryptoVisitor {
|
||||
|
||||
let ciphertext = match ciphertext {
|
||||
Some(ciphertext) => ciphertext,
|
||||
None => try!(visitor.missing_field("ciphertext")),
|
||||
None => visitor.missing_field("ciphertext")?,
|
||||
};
|
||||
|
||||
let kdf = match (kdf, kdfparams) {
|
||||
@@ -122,10 +122,10 @@ impl Visitor for CryptoVisitor {
|
||||
|
||||
let mac = match mac {
|
||||
Some(mac) => mac,
|
||||
None => try!(visitor.missing_field("mac")),
|
||||
None => visitor.missing_field("mac")?,
|
||||
};
|
||||
|
||||
try!(visitor.end());
|
||||
visitor.end()?;
|
||||
|
||||
let result = Crypto {
|
||||
cipher: cipher,
|
||||
@@ -142,26 +142,26 @@ impl Serialize for Crypto {
|
||||
fn serialize<S>(&self, serializer: &mut S) -> Result<(), S::Error>
|
||||
where S: Serializer
|
||||
{
|
||||
let mut state = try!(serializer.serialize_struct("Crypto", 6));
|
||||
let mut state = serializer.serialize_struct("Crypto", 6)?;
|
||||
match self.cipher {
|
||||
Cipher::Aes128Ctr(ref params) => {
|
||||
try!(serializer.serialize_struct_elt(&mut state, "cipher", &CipherSer::Aes128Ctr));
|
||||
try!(serializer.serialize_struct_elt(&mut state, "cipherparams", params));
|
||||
serializer.serialize_struct_elt(&mut state, "cipher", &CipherSer::Aes128Ctr)?;
|
||||
serializer.serialize_struct_elt(&mut state, "cipherparams", params)?;
|
||||
},
|
||||
}
|
||||
try!(serializer.serialize_struct_elt(&mut state, "ciphertext", &self.ciphertext));
|
||||
serializer.serialize_struct_elt(&mut state, "ciphertext", &self.ciphertext)?;
|
||||
match self.kdf {
|
||||
Kdf::Pbkdf2(ref params) => {
|
||||
try!(serializer.serialize_struct_elt(&mut state, "kdf", &KdfSer::Pbkdf2));
|
||||
try!(serializer.serialize_struct_elt(&mut state, "kdfparams", params));
|
||||
serializer.serialize_struct_elt(&mut state, "kdf", &KdfSer::Pbkdf2)?;
|
||||
serializer.serialize_struct_elt(&mut state, "kdfparams", params)?;
|
||||
},
|
||||
Kdf::Scrypt(ref params) => {
|
||||
try!(serializer.serialize_struct_elt(&mut state, "kdf", &KdfSer::Scrypt));
|
||||
try!(serializer.serialize_struct_elt(&mut state, "kdfparams", params));
|
||||
serializer.serialize_struct_elt(&mut state, "kdf", &KdfSer::Scrypt)?;
|
||||
serializer.serialize_struct_elt(&mut state, "kdfparams", params)?;
|
||||
},
|
||||
}
|
||||
|
||||
try!(serializer.serialize_struct_elt(&mut state, "mac", &self.mac));
|
||||
serializer.serialize_struct_elt(&mut state, "mac", &self.mac)?;
|
||||
serializer.serialize_struct_end(state)
|
||||
}
|
||||
}
|
||||
|
||||
@@ -62,7 +62,7 @@ impl fmt::Display for Uuid {
|
||||
}
|
||||
|
||||
fn copy_into(from: &str, into: &mut [u8]) -> Result<(), Error> {
|
||||
let from = try!(from.from_hex().map_err(|_| Error::InvalidUuid));
|
||||
let from = from.from_hex().map_err(|_| Error::InvalidUuid)?;
|
||||
|
||||
if from.len() != into.len() {
|
||||
return Err(Error::InvalidUuid);
|
||||
@@ -84,11 +84,11 @@ impl str::FromStr for Uuid {
|
||||
|
||||
let mut uuid = [0u8; 16];
|
||||
|
||||
try!(copy_into(parts[0], &mut uuid[0..4]));
|
||||
try!(copy_into(parts[1], &mut uuid[4..6]));
|
||||
try!(copy_into(parts[2], &mut uuid[6..8]));
|
||||
try!(copy_into(parts[3], &mut uuid[8..10]));
|
||||
try!(copy_into(parts[4], &mut uuid[10..16]));
|
||||
copy_into(parts[0], &mut uuid[0..4])?;
|
||||
copy_into(parts[1], &mut uuid[4..6])?;
|
||||
copy_into(parts[2], &mut uuid[6..8])?;
|
||||
copy_into(parts[3], &mut uuid[8..10])?;
|
||||
copy_into(parts[4], &mut uuid[10..16])?;
|
||||
|
||||
Ok(Uuid(uuid))
|
||||
}
|
||||
|
||||
@@ -134,7 +134,7 @@ impl Serialize for KdfSerParams {
|
||||
impl Deserialize for KdfSerParams {
|
||||
fn deserialize<D>(deserializer: &mut D) -> Result<Self, D::Error>
|
||||
where D: Deserializer {
|
||||
let v = try!(Value::deserialize(deserializer));
|
||||
let v = Value::deserialize(deserializer)?;
|
||||
|
||||
Deserialize::deserialize(&mut value::Deserializer::new(v.clone())).map(KdfSerParams::Pbkdf2)
|
||||
.or_else(|_| Deserialize::deserialize(&mut value::Deserializer::new(v)).map(KdfSerParams::Scrypt))
|
||||
|
||||
@@ -93,11 +93,11 @@ impl Visitor for KeyFileVisitor {
|
||||
let mut meta = None;
|
||||
|
||||
loop {
|
||||
match try!(visitor.visit_key()) {
|
||||
Some(KeyFileField::Id) => { id = Some(try!(visitor.visit_value())); }
|
||||
Some(KeyFileField::Version) => { version = Some(try!(visitor.visit_value())); }
|
||||
Some(KeyFileField::Crypto) => { crypto = Some(try!(visitor.visit_value())); }
|
||||
Some(KeyFileField::Address) => { address = Some(try!(visitor.visit_value())); }
|
||||
match visitor.visit_key()? {
|
||||
Some(KeyFileField::Id) => { id = Some(visitor.visit_value()?); }
|
||||
Some(KeyFileField::Version) => { version = Some(visitor.visit_value()?); }
|
||||
Some(KeyFileField::Crypto) => { crypto = Some(visitor.visit_value()?); }
|
||||
Some(KeyFileField::Address) => { address = Some(visitor.visit_value()?); }
|
||||
Some(KeyFileField::Name) => { name = visitor.visit_value().ok(); } // ignore anyhing that is not a string to be permissive.
|
||||
Some(KeyFileField::Meta) => { meta = visitor.visit_value().ok(); } // ignore anyhing that is not a string to be permissive.
|
||||
None => { break; }
|
||||
@@ -106,25 +106,25 @@ impl Visitor for KeyFileVisitor {
|
||||
|
||||
let id = match id {
|
||||
Some(id) => id,
|
||||
None => try!(visitor.missing_field("id")),
|
||||
None => visitor.missing_field("id")?,
|
||||
};
|
||||
|
||||
let version = match version {
|
||||
Some(version) => version,
|
||||
None => try!(visitor.missing_field("version")),
|
||||
None => visitor.missing_field("version")?,
|
||||
};
|
||||
|
||||
let crypto = match crypto {
|
||||
Some(crypto) => crypto,
|
||||
None => try!(visitor.missing_field("crypto")),
|
||||
None => visitor.missing_field("crypto")?,
|
||||
};
|
||||
|
||||
let address = match address {
|
||||
Some(address) => address,
|
||||
None => try!(visitor.missing_field("address")),
|
||||
None => visitor.missing_field("address")?,
|
||||
};
|
||||
|
||||
try!(visitor.end());
|
||||
visitor.end()?;
|
||||
|
||||
let result = KeyFile {
|
||||
id: id,
|
||||
|
||||
Reference in New Issue
Block a user