Skip to content

Commit 0289a21

Browse files
dsherretcrowlKats
andauthored
chore: fix lint and type checking errors (#1195)
Co-authored-by: Leo Kettmeir <[email protected]>
1 parent b8d753f commit 0289a21

27 files changed

+615
-558
lines changed

Cargo.lock

Lines changed: 190 additions & 216 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

api/Cargo.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -74,14 +74,14 @@ opentelemetry = { version = "0.19", features = [
7474
] }
7575
opentelemetry-otlp = "0.12"
7676
opentelemetry-gcloud-trace = "0.5.0"
77-
deno_semver = "0.8.0"
77+
deno_semver = "0.9.0"
7878
flate2 = "1"
7979
thiserror = "2"
8080
async-tar = "0.4.2"
81-
deno_graph = "0.97.0"
82-
deno_ast = { version = "0.48.0", features = ["view"] }
83-
deno_doc = { version = "=0.180.0", features = ["comrak"] }
84-
deno_error = "0.6.1"
81+
deno_graph = "=0.100.1"
82+
deno_ast = { version = "0.50.2", features = ["view"] }
83+
deno_doc = { version = "=0.183.0", features = ["comrak"] }
84+
deno_error = "0.7.0"
8585
comrak = { version = "0.29.0", default-features = false }
8686
ammonia = "4.0.0"
8787
async-trait = "0.1.73"

api/src/analysis.rs

Lines changed: 21 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,7 @@ async fn analyze_package_inner(
165165
module_info_cacher: Default::default(),
166166
unstable_bytes_imports: false,
167167
unstable_text_imports: false,
168+
jsr_metadata_store: None,
168169
},
169170
)
170171
.await;
@@ -427,26 +428,25 @@ impl deno_graph::source::Resolver for JsrResolver {
427428
referrer_range: &deno_graph::Range,
428429
_kind: deno_graph::source::ResolutionKind,
429430
) -> Result<ModuleSpecifier, deno_graph::source::ResolveError> {
430-
if let Ok(package_ref) = JsrPackageReqReference::from_str(specifier_text) {
431-
if self.member.name == package_ref.req().name
432-
&& self
433-
.member
434-
.version
435-
.as_ref()
436-
.map(|v| package_ref.req().version_req.matches(v))
437-
.unwrap_or(true)
438-
{
439-
let export_name = package_ref.sub_path().unwrap_or(".");
440-
let Some(export) = self.member.exports.get(export_name) else {
441-
return Err(deno_graph::source::ResolveError::Other(
442-
JsErrorBox::generic(format!(
443-
"export '{}' not found in jsr:{}",
444-
export_name, self.member.name
445-
)),
446-
));
447-
};
448-
return Ok(self.member.base.join(export).unwrap());
449-
}
431+
if let Ok(package_ref) = JsrPackageReqReference::from_str(specifier_text)
432+
&& self.member.name == package_ref.req().name
433+
&& self
434+
.member
435+
.version
436+
.as_ref()
437+
.map(|v| package_ref.req().version_req.matches(v))
438+
.unwrap_or(true)
439+
{
440+
let export_name = package_ref.sub_path().unwrap_or(".");
441+
let Some(export) = self.member.exports.get(export_name) else {
442+
return Err(deno_graph::source::ResolveError::Other(
443+
JsErrorBox::generic(format!(
444+
"export '{}' not found in jsr:{}",
445+
export_name, self.member.name
446+
)),
447+
));
448+
};
449+
return Ok(self.member.base.join(export).unwrap());
450450
}
451451

452452
Ok(deno_graph::resolve_import(
@@ -598,6 +598,7 @@ async fn rebuild_npm_tarball_inner(
598598
module_info_cacher: Default::default(),
599599
unstable_bytes_imports: false,
600600
unstable_text_imports: false,
601+
jsr_metadata_store: None,
601602
},
602603
)
603604
.await;

api/src/api/errors.rs

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -256,13 +256,13 @@ errors!(
256256
);
257257

258258
pub fn map_unique_violation(err: sqlx::Error, new_err: ApiError) -> ApiError {
259-
if let Some(db_err) = err.as_database_error() {
260-
if let Some(code) = db_err.code() {
261-
// Code 23505 is unique_violation.
262-
// See https://www.postgresql.org/docs/13/errcodes-appendix.html
263-
if code == "23505" {
264-
return new_err;
265-
}
259+
if let Some(db_err) = err.as_database_error()
260+
&& let Some(code) = db_err.code()
261+
{
262+
// Code 23505 is unique_violation.
263+
// See https://www.postgresql.org/docs/13/errcodes-appendix.html
264+
if code == "23505" {
265+
return new_err;
266266
}
267267
}
268268
err.into()

api/src/api/package.rs

Lines changed: 45 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -775,13 +775,13 @@ pub async fn version_publish_handler(
775775

776776
// If there is a content-length header, check it isn't too big.
777777
// We don't rely on this, we will also check MAX_PAYLOAD_SIZE later.
778-
if let Some(size) = req.body().size_hint().upper() {
779-
if size > MAX_PUBLISH_TARBALL_SIZE {
780-
return Err(ApiError::TarballSizeLimitExceeded {
781-
size,
782-
max_size: MAX_PUBLISH_TARBALL_SIZE,
783-
});
784-
}
778+
if let Some(size) = req.body().size_hint().upper()
779+
&& size > MAX_PUBLISH_TARBALL_SIZE
780+
{
781+
return Err(ApiError::TarballSizeLimitExceeded {
782+
size,
783+
max_size: MAX_PUBLISH_TARBALL_SIZE,
784+
});
785785
}
786786

787787
// Ensure the upload is gzip encoded.
@@ -869,14 +869,14 @@ pub async fn version_publish_handler(
869869

870870
let hash = hash.lock().unwrap().take().unwrap().finalize();
871871
let hash = format!("sha256-{:02x}", hash);
872-
if let Some(tarball_hash) = access_restriction.tarball_hash {
873-
if tarball_hash != hash {
874-
error!(
875-
"Tarball hash mismatch: expected {}, got {}",
876-
tarball_hash, hash
877-
);
878-
return Err(ApiError::MissingPermission);
879-
}
872+
if let Some(tarball_hash) = access_restriction.tarball_hash
873+
&& tarball_hash != hash
874+
{
875+
error!(
876+
"Tarball hash mismatch: expected {}, got {}",
877+
tarball_hash, hash
878+
);
879+
return Err(ApiError::MissingPermission);
880880
}
881881

882882
// If the upload failed due to the size limit, we can cancel the task.
@@ -1830,23 +1830,23 @@ impl DepTreeLoader {
18301830
return Ok(None);
18311831
};
18321832

1833-
if version.is_none() {
1834-
if let Some(captures) = JSR_DEP_META_RE.captures(path.as_str()) {
1835-
let version = captures.name("version").unwrap();
1836-
let meta =
1837-
serde_json::from_slice::<VersionMetadata>(&bytes).unwrap();
1838-
1839-
let mut lock = exports.lock().await;
1840-
lock.insert(
1841-
format!(
1842-
"@{}/{}@{}",
1843-
scope.as_str(),
1844-
package.as_str(),
1845-
version.as_str()
1846-
),
1847-
meta.exports,
1848-
);
1849-
}
1833+
if version.is_none()
1834+
&& let Some(captures) = JSR_DEP_META_RE.captures(path.as_str())
1835+
{
1836+
let version = captures.name("version").unwrap();
1837+
let meta =
1838+
serde_json::from_slice::<VersionMetadata>(&bytes).unwrap();
1839+
1840+
let mut lock = exports.lock().await;
1841+
lock.insert(
1842+
format!(
1843+
"@{}/{}@{}",
1844+
scope.as_str(),
1845+
package.as_str(),
1846+
version.as_str()
1847+
),
1848+
meta.exports,
1849+
);
18501850
}
18511851

18521852
Ok(Some(deno_graph::source::LoadResponse::Module {
@@ -2005,6 +2005,7 @@ async fn analyze_deps_tree(
20052005
module_info_cacher: Default::default(),
20062006
unstable_bytes_imports: false,
20072007
unstable_text_imports: false,
2008+
jsr_metadata_store: None,
20082009
},
20092010
)
20102011
.await;
@@ -2158,22 +2159,21 @@ impl<'a> GraphDependencyCollector<'a> {
21582159
let mut children = IndexSet::new();
21592160
match module {
21602161
Module::Js(module) => {
2161-
if let Some(types_dep) = &module.maybe_types_dependency {
2162-
if let Some(child) = self.build_resolved_info(&types_dep.dependency)
2163-
{
2164-
children.insert(child);
2165-
}
2162+
if let Some(types_dep) = &module.maybe_types_dependency
2163+
&& let Some(child) = self.build_resolved_info(&types_dep.dependency)
2164+
{
2165+
children.insert(child);
21662166
}
21672167
for dep in module.dependencies.values() {
2168-
if !dep.maybe_code.is_none() {
2169-
if let Some(child) = self.build_resolved_info(&dep.maybe_code) {
2170-
children.insert(child);
2171-
}
2168+
if !dep.maybe_code.is_none()
2169+
&& let Some(child) = self.build_resolved_info(&dep.maybe_code)
2170+
{
2171+
children.insert(child);
21722172
}
2173-
if !dep.maybe_type.is_none() {
2174-
if let Some(child) = self.build_resolved_info(&dep.maybe_type) {
2175-
children.insert(child);
2176-
}
2173+
if !dep.maybe_type.is_none()
2174+
&& let Some(child) = self.build_resolved_info(&dep.maybe_type)
2175+
{
2176+
children.insert(child);
21772177
}
21782178
}
21792179
}

api/src/api/self_user.rs

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -209,12 +209,12 @@ async fn create_token(
209209
});
210210
}
211211

212-
if let Some(permissions) = permissions.as_ref() {
213-
if permissions.0.len() != 1 {
214-
return Err(ApiError::MalformedRequest {
215-
msg: "permissions must contain exactly one element".into(),
216-
});
217-
}
212+
if let Some(permissions) = permissions.as_ref()
213+
&& permissions.0.len() != 1
214+
{
215+
return Err(ApiError::MalformedRequest {
216+
msg: "permissions must contain exactly one element".into(),
217+
});
218218
}
219219

220220
let iam = req.iam();

api/src/api/tickets.rs

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -126,27 +126,27 @@ pub async fn post_message_handler(
126126
.await?;
127127

128128
// only send email to ticket creator if the message was not sent by ticket creator
129-
if creator.id != message_author.id {
130-
if let Some(email) = &creator.email {
131-
let email_sender = req.data::<Option<EmailSender>>().unwrap();
132-
let registry_url = req.data::<RegistryUrl>().unwrap();
133-
if let Some(email_sender) = email_sender {
134-
let email_args = EmailArgs::SupportTicketMessage {
135-
ticket_id: Cow::Owned(ticket.id.to_string()),
136-
name: Cow::Owned(creator.name),
137-
content: Cow::Borrowed(&message.message),
138-
registry_url: Cow::Borrowed(registry_url.0.as_str()),
139-
registry_name: Cow::Borrowed(&email_sender.from_name),
140-
support_email: Cow::Borrowed(&email_sender.from),
141-
};
142-
email_sender
143-
.send(email.clone(), email_args)
144-
.await
145-
.map_err(|e| {
146-
tracing::error!("failed to send email: {:?}", e);
147-
ApiError::InternalServerError
148-
})?;
149-
}
129+
if creator.id != message_author.id
130+
&& let Some(email) = &creator.email
131+
{
132+
let email_sender = req.data::<Option<EmailSender>>().unwrap();
133+
let registry_url = req.data::<RegistryUrl>().unwrap();
134+
if let Some(email_sender) = email_sender {
135+
let email_args = EmailArgs::SupportTicketMessage {
136+
ticket_id: Cow::Owned(ticket.id.to_string()),
137+
name: Cow::Owned(creator.name),
138+
content: Cow::Borrowed(&message.message),
139+
registry_url: Cow::Borrowed(registry_url.0.as_str()),
140+
registry_name: Cow::Borrowed(&email_sender.from_name),
141+
support_email: Cow::Borrowed(&email_sender.from),
142+
};
143+
email_sender
144+
.send(email.clone(), email_args)
145+
.await
146+
.map_err(|e| {
147+
tracing::error!("failed to send email: {:?}", e);
148+
ApiError::InternalServerError
149+
})?;
150150
}
151151
}
152152

api/src/db/database.rs

Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -556,10 +556,10 @@ impl Database {
556556
let package = match res {
557557
Ok(package) => package,
558558
Err(err) => {
559-
if let Some(dberr) = err.as_database_error() {
560-
if dberr.is_unique_violation() {
561-
return Ok(CreatePackageResult::AlreadyExists);
562-
}
559+
if let Some(dberr) = err.as_database_error()
560+
&& dberr.is_unique_violation()
561+
{
562+
return Ok(CreatePackageResult::AlreadyExists);
563563
}
564564
return Err(err);
565565
}
@@ -2722,10 +2722,10 @@ impl Database {
27222722
Ok(success)
27232723
}
27242724
Err(err) => {
2725-
if let Some(dberr) = err.as_database_error() {
2726-
if dberr.is_foreign_key_violation() {
2727-
return Ok(false);
2728-
}
2725+
if let Some(dberr) = err.as_database_error()
2726+
&& dberr.is_foreign_key_violation()
2727+
{
2728+
return Ok(false);
27292729
}
27302730
Err(err)
27312731
}
@@ -2773,10 +2773,10 @@ impl Database {
27732773
Ok(success)
27742774
}
27752775
Err(err) => {
2776-
if let Some(dberr) = err.as_database_error() {
2777-
if dberr.is_foreign_key_violation() {
2778-
return Ok(false);
2779-
}
2776+
if let Some(dberr) = err.as_database_error()
2777+
&& dberr.is_foreign_key_violation()
2778+
{
2779+
return Ok(false);
27802780
}
27812781
Err(err)
27822782
}
@@ -2887,12 +2887,11 @@ impl Database {
28872887
return Ok(ScopeMemberUpdateResult::TargetNotMember);
28882888
};
28892889

2890-
if !scope_member.is_admin {
2891-
if let Some(result) =
2890+
if !scope_member.is_admin
2891+
&& let Some(result) =
28922892
self.transfer_scope(scope, is_creator, &mut tx).await?
2893-
{
2894-
return Ok(result);
2895-
}
2893+
{
2894+
return Ok(result);
28962895
}
28972896

28982897
tx.commit().await?;
@@ -3592,10 +3591,10 @@ impl Database {
35923591
.fetch_optional(&mut *tx)
35933592
.await?;
35943593

3595-
if let Some(authorization) = &maybe_authorization {
3596-
if authorization.user_id.is_some() {
3597-
tx.commit().await?;
3598-
}
3594+
if let Some(authorization) = &maybe_authorization
3595+
&& authorization.user_id.is_some()
3596+
{
3597+
tx.commit().await?;
35993598
}
36003599

36013600
Ok(maybe_authorization)

0 commit comments

Comments
 (0)