style(3p/nix): Add braces around single-line for-loops
These were not caught by the previous clang-tidy invocation, but were instead sorted out using amber[0] as such: ambr --regex 'for (\(.+\))\s([a-z].*;)' 'for $1 { $2 }' [0]: https://github.com/dalance/amber
This commit is contained in:
parent
867055133d
commit
1841d93ccb
45 changed files with 426 additions and 142 deletions
68
third_party/nix/src/libstore/build.cc
vendored
68
third_party/nix/src/libstore/build.cc
vendored
|
@ -1122,7 +1122,9 @@ void DerivationGoal::haveDerivation() {
|
|||
|
||||
retrySubstitution = false;
|
||||
|
||||
for (auto& i : drv->outputs) worker.store.addTempRoot(i.second.path);
|
||||
for (auto& i : drv->outputs) {
|
||||
worker.store.addTempRoot(i.second.path);
|
||||
}
|
||||
|
||||
/* Check what outputs paths are not already valid. */
|
||||
PathSet invalidOutputs = checkPathValidity(false, buildMode == bmRepair);
|
||||
|
@ -1238,7 +1240,9 @@ void DerivationGoal::repairClosure() {
|
|||
}
|
||||
|
||||
/* Filter out our own outputs (which we have already checked). */
|
||||
for (auto& i : drv->outputs) outputClosure.erase(i.second.path);
|
||||
for (auto& i : drv->outputs) {
|
||||
outputClosure.erase(i.second.path);
|
||||
}
|
||||
|
||||
/* Get all dependencies of this derivation so that we know which
|
||||
derivation is responsible for which path in the output
|
||||
|
@ -1251,7 +1255,9 @@ void DerivationGoal::repairClosure() {
|
|||
for (auto& i : inputClosure)
|
||||
if (isDerivation(i)) {
|
||||
Derivation drv = worker.store.derivationFromPath(i);
|
||||
for (auto& j : drv.outputs) outputsToDrv[j.second.path] = i;
|
||||
for (auto& j : drv.outputs) {
|
||||
outputsToDrv[j.second.path] = i;
|
||||
}
|
||||
}
|
||||
|
||||
/* Check each path (slow!). */
|
||||
|
@ -1389,7 +1395,9 @@ void DerivationGoal::tryToBuild() {
|
|||
|
||||
missingPaths = drv->outputPaths();
|
||||
if (buildMode != bmCheck)
|
||||
for (auto& i : validPaths) missingPaths.erase(i);
|
||||
for (auto& i : validPaths) {
|
||||
missingPaths.erase(i);
|
||||
}
|
||||
|
||||
/* If any of the outputs already exist but are not valid, delete
|
||||
them. */
|
||||
|
@ -1571,7 +1579,9 @@ MakeError(NotDeterministic, BuildError)
|
|||
|
||||
if (!settings.verboseBuild && !logTail.empty()) {
|
||||
msg += (format("; last %d log lines:") % logTail.size()).str();
|
||||
for (auto& line : logTail) msg += "\n " + line;
|
||||
for (auto& line : logTail) {
|
||||
msg += "\n " + line;
|
||||
}
|
||||
}
|
||||
|
||||
if (diskFull) {
|
||||
|
@ -1642,7 +1652,9 @@ MakeError(NotDeterministic, BuildError)
|
|||
}
|
||||
|
||||
/* Delete unused redirected outputs (when doing hash rewriting). */
|
||||
for (auto& i : redirectedOutputs) deletePath(i.second);
|
||||
for (auto& i : redirectedOutputs) {
|
||||
deletePath(i.second);
|
||||
}
|
||||
|
||||
/* Delete the chroot (if we were using one). */
|
||||
autoDelChroot.reset(); /* this runs the destructor */
|
||||
|
@ -1990,7 +2002,9 @@ void DerivationGoal::startBuilder() {
|
|||
} catch (Error& e) {
|
||||
throw Error(format("while processing 'sandbox-paths': %s") % e.what());
|
||||
}
|
||||
for (auto& i : closure) dirsInChroot[i] = i;
|
||||
for (auto& i : closure) {
|
||||
dirsInChroot[i] = i;
|
||||
}
|
||||
|
||||
PathSet allowedPaths = settings.allowedImpureHostPrefixes;
|
||||
|
||||
|
@ -2118,7 +2132,9 @@ void DerivationGoal::startBuilder() {
|
|||
rebuilding a path that is in settings.dirsInChroot
|
||||
(typically the dependencies of /bin/sh). Throw them
|
||||
out. */
|
||||
for (auto& i : drv->outputs) dirsInChroot.erase(i.second.path);
|
||||
for (auto& i : drv->outputs) {
|
||||
dirsInChroot.erase(i.second.path);
|
||||
}
|
||||
|
||||
#elif __APPLE__
|
||||
/* We don't really have any parent prep work to do (yet?)
|
||||
|
@ -2142,7 +2158,9 @@ void DerivationGoal::startBuilder() {
|
|||
contents of the new outputs to replace the dummy strings
|
||||
with the actual hashes. */
|
||||
if (validPaths.size() > 0)
|
||||
for (auto& i : validPaths) addHashRewrite(i);
|
||||
for (auto& i : validPaths) {
|
||||
addHashRewrite(i);
|
||||
}
|
||||
|
||||
/* If we're repairing, then we don't want to delete the
|
||||
corrupt outputs in advance. So rewrite them as well. */
|
||||
|
@ -2537,7 +2555,9 @@ void DerivationGoal::writeStructuredAttrs() {
|
|||
{
|
||||
JSONPlaceholder jsonRoot(str, true);
|
||||
PathSet storePaths;
|
||||
for (auto& p : *i) storePaths.insert(p.get<std::string>());
|
||||
for (auto& p : *i) {
|
||||
storePaths.insert(p.get<std::string>());
|
||||
}
|
||||
worker.store.pathInfoToJSON(jsonRoot, exportReferences(storePaths),
|
||||
false, true);
|
||||
}
|
||||
|
@ -2828,7 +2848,9 @@ void DerivationGoal::runChild() {
|
|||
ss.push_back("/var/run/nscd/socket");
|
||||
}
|
||||
|
||||
for (auto& i : ss) dirsInChroot.emplace(i, i);
|
||||
for (auto& i : ss) {
|
||||
dirsInChroot.emplace(i, i);
|
||||
}
|
||||
|
||||
/* Bind-mount all the directories from the "host"
|
||||
filesystem that we want in the chroot
|
||||
|
@ -3046,7 +3068,9 @@ void DerivationGoal::runChild() {
|
|||
}
|
||||
|
||||
/* Add all our input paths to the chroot */
|
||||
for (auto& i : inputPaths) dirsInChroot[i] = i;
|
||||
for (auto& i : inputPaths) {
|
||||
dirsInChroot[i] = i;
|
||||
}
|
||||
|
||||
/* Violations will go to the syslog if you set this. Unfortunately the
|
||||
* destination does not appear to be configurable */
|
||||
|
@ -3155,7 +3179,9 @@ void DerivationGoal::runChild() {
|
|||
args.push_back(builderBasename);
|
||||
}
|
||||
|
||||
for (auto& i : drv->args) args.push_back(rewriteStrings(i, inputRewrites));
|
||||
for (auto& i : drv->args) {
|
||||
args.push_back(rewriteStrings(i, inputRewrites));
|
||||
}
|
||||
|
||||
/* Indicate that we managed to set up the build environment. */
|
||||
writeFull(STDERR_FILENO, string("\1\n"));
|
||||
|
@ -3532,7 +3558,9 @@ void DerivationGoal::registerOutputs() {
|
|||
outputs, this will fail. */
|
||||
{
|
||||
ValidPathInfos infos2;
|
||||
for (auto& i : infos) infos2.push_back(i.second);
|
||||
for (auto& i : infos) {
|
||||
infos2.push_back(i.second);
|
||||
}
|
||||
worker.store.registerValidPaths(infos2);
|
||||
}
|
||||
|
||||
|
@ -3579,11 +3607,15 @@ void DerivationGoal::checkOutputs(
|
|||
auto i = outputsByPath.find(path);
|
||||
if (i != outputsByPath.end()) {
|
||||
closureSize += i->second.narSize;
|
||||
for (auto& ref : i->second.references) pathsLeft.push(ref);
|
||||
for (auto& ref : i->second.references) {
|
||||
pathsLeft.push(ref);
|
||||
}
|
||||
} else {
|
||||
auto info = worker.store.queryPathInfo(path);
|
||||
closureSize += info->narSize;
|
||||
for (auto& ref : info->references) pathsLeft.push(ref);
|
||||
for (auto& ref : info->references) {
|
||||
pathsLeft.push(ref);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -4373,7 +4405,9 @@ void Worker::waitForAWhile(GoalPtr goal) {
|
|||
}
|
||||
|
||||
void Worker::run(const Goals& _topGoals) {
|
||||
for (auto& i : _topGoals) topGoals.insert(i);
|
||||
for (auto& i : _topGoals) {
|
||||
topGoals.insert(i);
|
||||
}
|
||||
|
||||
DLOG(INFO) << "entered goal loop";
|
||||
|
||||
|
|
|
@ -210,7 +210,9 @@ void builtinBuildenv(const BasicDerivation& drv) {
|
|||
while (!postponed.empty()) {
|
||||
auto pkgDirs = postponed;
|
||||
postponed = FileProp{};
|
||||
for (const auto& pkgDir : pkgDirs) addPkg(pkgDir, priorityCounter++);
|
||||
for (const auto& pkgDir : pkgDirs) {
|
||||
addPkg(pkgDir, priorityCounter++);
|
||||
}
|
||||
}
|
||||
|
||||
LOG(INFO) << "created " << symlinks << " symlinks in user environment";
|
||||
|
|
12
third_party/nix/src/libstore/derivations.cc
vendored
12
third_party/nix/src/libstore/derivations.cc
vendored
|
@ -40,7 +40,9 @@ Path writeDerivation(ref<Store> store, const Derivation& drv,
|
|||
const string& name, RepairFlag repair) {
|
||||
PathSet references;
|
||||
references.insert(drv.inputSrcs.begin(), drv.inputSrcs.end());
|
||||
for (auto& i : drv.inputDrvs) references.insert(i.first);
|
||||
for (auto& i : drv.inputDrvs) {
|
||||
references.insert(i.first);
|
||||
}
|
||||
/* Note that the outputs of a derivation are *not* references
|
||||
(that can be missing (of course) and should not necessarily be
|
||||
held during a garbage collection). */
|
||||
|
@ -359,7 +361,9 @@ bool wantOutput(const string& output, const std::set<string>& wanted) {
|
|||
|
||||
PathSet BasicDerivation::outputPaths() const {
|
||||
PathSet paths;
|
||||
for (auto& i : outputs) paths.insert(i.second.path);
|
||||
for (auto& i : outputs) {
|
||||
paths.insert(i.second.path);
|
||||
}
|
||||
return paths;
|
||||
}
|
||||
|
||||
|
@ -394,7 +398,9 @@ Sink& operator<<(Sink& out, const BasicDerivation& drv) {
|
|||
out << i.first << i.second.path << i.second.hashAlgo << i.second.hash;
|
||||
out << drv.inputSrcs << drv.platform << drv.builder << drv.args;
|
||||
out << drv.env.size();
|
||||
for (auto& i : drv.env) out << i.first << i.second;
|
||||
for (auto& i : drv.env) {
|
||||
out << i.first << i.second;
|
||||
}
|
||||
return out;
|
||||
}
|
||||
|
||||
|
|
12
third_party/nix/src/libstore/gc.cc
vendored
12
third_party/nix/src/libstore/gc.cc
vendored
|
@ -615,7 +615,9 @@ bool LocalStore::canReachRoot(GCState& state, PathSet& visited,
|
|||
are derivers of this path that are not garbage. */
|
||||
if (state.gcKeepOutputs) {
|
||||
PathSet derivers = queryValidDerivers(path);
|
||||
for (auto& i : derivers) incoming.insert(i);
|
||||
for (auto& i : derivers) {
|
||||
incoming.insert(i);
|
||||
}
|
||||
}
|
||||
|
||||
for (auto& i : incoming)
|
||||
|
@ -775,7 +777,9 @@ void LocalStore::collectGarbage(const GCOptions& options, GCResults& results) {
|
|||
FDs fds;
|
||||
Roots tempRoots;
|
||||
findTempRoots(fds, tempRoots, true);
|
||||
for (auto& root : tempRoots) state.tempRoots.insert(root.first);
|
||||
for (auto& root : tempRoots) {
|
||||
state.tempRoots.insert(root.first);
|
||||
}
|
||||
state.roots.insert(state.tempRoots.begin(), state.tempRoots.end());
|
||||
|
||||
/* After this point the set of roots or temporary roots cannot
|
||||
|
@ -852,7 +856,9 @@ void LocalStore::collectGarbage(const GCOptions& options, GCResults& results) {
|
|||
std::mt19937 gen(1);
|
||||
std::shuffle(entries_.begin(), entries_.end(), gen);
|
||||
|
||||
for (auto& i : entries_) tryToDelete(state, i);
|
||||
for (auto& i : entries_) {
|
||||
tryToDelete(state, i);
|
||||
}
|
||||
|
||||
} catch (GCLimitReached& e) {
|
||||
}
|
||||
|
|
4
third_party/nix/src/libstore/globals.cc
vendored
4
third_party/nix/src/libstore/globals.cc
vendored
|
@ -60,7 +60,9 @@ Settings::Settings()
|
|||
auto s = getEnv("NIX_REMOTE_SYSTEMS");
|
||||
if (s != "") {
|
||||
Strings ss;
|
||||
for (auto& p : tokenizeString<Strings>(s, ":")) ss.push_back("@" + p);
|
||||
for (auto& p : tokenizeString<Strings>(s, ":")) {
|
||||
ss.push_back("@" + p);
|
||||
}
|
||||
builders = concatStringsSep(" ", ss);
|
||||
}
|
||||
|
||||
|
|
|
@ -48,7 +48,9 @@ struct LocalStoreAccessor : public FSAccessor {
|
|||
auto entries = nix::readDirectory(realPath);
|
||||
|
||||
StringSet res;
|
||||
for (auto& entry : entries) res.insert(entry.name);
|
||||
for (auto& entry : entries) {
|
||||
res.insert(entry.name);
|
||||
}
|
||||
|
||||
return res;
|
||||
}
|
||||
|
|
8
third_party/nix/src/libstore/local-store.cc
vendored
8
third_party/nix/src/libstore/local-store.cc
vendored
|
@ -1227,7 +1227,9 @@ bool LocalStore::verifyStore(bool checkContents, RepairFlag repair) {
|
|||
AutoCloseFD fdGCLock = openGCLock(ltWrite);
|
||||
|
||||
PathSet store;
|
||||
for (auto& i : readDirectory(realStoreDir)) store.insert(i.name);
|
||||
for (auto& i : readDirectory(realStoreDir)) {
|
||||
store.insert(i.name);
|
||||
}
|
||||
|
||||
/* Check whether all valid paths actually exist. */
|
||||
LOG(INFO) << "checking path existence...";
|
||||
|
@ -1375,7 +1377,9 @@ static void makeMutable(const Path& path) {
|
|||
}
|
||||
|
||||
if (S_ISDIR(st.st_mode)) {
|
||||
for (auto& i : readDirectory(path)) makeMutable(path + "/" + i.name);
|
||||
for (auto& i : readDirectory(path)) {
|
||||
makeMutable(path + "/" + i.name);
|
||||
}
|
||||
}
|
||||
|
||||
/* The O_NOFOLLOW is important to prevent us from changing the
|
||||
|
|
16
third_party/nix/src/libstore/misc.cc
vendored
16
third_party/nix/src/libstore/misc.cc
vendored
|
@ -53,7 +53,9 @@ void Store::computeFSClosure(const PathSet& startPaths, PathSet& paths_,
|
|||
}
|
||||
|
||||
if (includeOutputs)
|
||||
for (auto& i : queryValidDerivers(path)) enqueue(i);
|
||||
for (auto& i : queryValidDerivers(path)) {
|
||||
enqueue(i);
|
||||
}
|
||||
|
||||
if (includeDerivers && isDerivation(path))
|
||||
for (auto& i : queryDerivationOutputs(path))
|
||||
|
@ -97,7 +99,9 @@ void Store::computeFSClosure(const PathSet& startPaths, PathSet& paths_,
|
|||
}});
|
||||
};
|
||||
|
||||
for (auto& startPath : startPaths) enqueue(startPath);
|
||||
for (auto& startPath : startPaths) {
|
||||
enqueue(startPath);
|
||||
}
|
||||
|
||||
{
|
||||
auto state(state_.lock());
|
||||
|
@ -251,7 +255,9 @@ void Store::queryMissing(const PathSet& targets, PathSet& willBuild_,
|
|||
}
|
||||
};
|
||||
|
||||
for (auto& path : targets) pool.enqueue(std::bind(doPath, path));
|
||||
for (auto& path : targets) {
|
||||
pool.enqueue(std::bind(doPath, path));
|
||||
}
|
||||
|
||||
pool.process();
|
||||
}
|
||||
|
@ -291,7 +297,9 @@ Paths Store::topoSortPaths(const PathSet& paths) {
|
|||
parents.erase(path);
|
||||
};
|
||||
|
||||
for (auto& i : paths) dfsVisit(i, nullptr);
|
||||
for (auto& i : paths) {
|
||||
dfsVisit(i, nullptr);
|
||||
}
|
||||
|
||||
return sorted;
|
||||
}
|
||||
|
|
4
third_party/nix/src/libstore/nar-accessor.cc
vendored
4
third_party/nix/src/libstore/nar-accessor.cc
vendored
|
@ -178,7 +178,9 @@ struct NarAccessor : public FSAccessor {
|
|||
path);
|
||||
|
||||
StringSet res;
|
||||
for (auto& child : i.children) res.insert(child.first);
|
||||
for (auto& child : i.children) {
|
||||
res.insert(child.first);
|
||||
}
|
||||
|
||||
return res;
|
||||
}
|
||||
|
|
4
third_party/nix/src/libstore/nar-info.cc
vendored
4
third_party/nix/src/libstore/nar-info.cc
vendored
|
@ -122,7 +122,9 @@ std::string NarInfo::to_string() const {
|
|||
res += "System: " + system + "\n";
|
||||
}
|
||||
|
||||
for (auto sig : sigs) res += "Sig: " + sig + "\n";
|
||||
for (auto sig : sigs) {
|
||||
res += "Sig: " + sig + "\n";
|
||||
}
|
||||
|
||||
if (!ca.empty()) {
|
||||
res += "CA: " + ca + "\n";
|
||||
|
|
|
@ -115,7 +115,9 @@ void LocalStore::optimisePath_(OptimiseStats& stats, const Path& path,
|
|||
|
||||
if (S_ISDIR(st.st_mode)) {
|
||||
Strings names = readDirectoryIgnoringInodes(path, inodeHash);
|
||||
for (auto& i : names) optimisePath_(stats, path + "/" + i, inodeHash);
|
||||
for (auto& i : names) {
|
||||
optimisePath_(stats, path + "/" + i, inodeHash);
|
||||
}
|
||||
return;
|
||||
}
|
||||
|
||||
|
|
8
third_party/nix/src/libstore/remote-store.cc
vendored
8
third_party/nix/src/libstore/remote-store.cc
vendored
|
@ -189,7 +189,9 @@ void RemoteStore::setOptions(Connection& conn) {
|
|||
overrides.erase(settings.useSubstitutes.name);
|
||||
overrides.erase(settings.showTrace.name);
|
||||
conn.to << overrides.size();
|
||||
for (auto& i : overrides) conn.to << i.first << i.second.value;
|
||||
for (auto& i : overrides) {
|
||||
conn.to << i.first << i.second.value;
|
||||
}
|
||||
}
|
||||
|
||||
auto ex = conn.processStderr();
|
||||
|
@ -522,7 +524,9 @@ void RemoteStore::buildPaths(const PathSet& drvPaths, BuildMode buildMode) {
|
|||
/* For backwards compatibility with old daemons, strip output
|
||||
identifiers. */
|
||||
PathSet drvPaths2;
|
||||
for (auto& i : drvPaths) drvPaths2.insert(string(i, 0, i.find('!')));
|
||||
for (auto& i : drvPaths) {
|
||||
drvPaths2.insert(string(i, 0, i.find('!')));
|
||||
}
|
||||
conn->to << drvPaths2;
|
||||
}
|
||||
conn.processStderr();
|
||||
|
|
28
third_party/nix/src/libstore/store-api.cc
vendored
28
third_party/nix/src/libstore/store-api.cc
vendored
|
@ -396,7 +396,9 @@ PathSet Store::queryValidPaths(const PathSet& paths,
|
|||
}});
|
||||
};
|
||||
|
||||
for (auto& path : paths) pool.enqueue(std::bind(doQuery, path));
|
||||
for (auto& path : paths) {
|
||||
pool.enqueue(std::bind(doQuery, path));
|
||||
}
|
||||
|
||||
pool.process();
|
||||
|
||||
|
@ -434,7 +436,9 @@ string Store::makeValidityRegistration(const PathSet& paths, bool showDerivers,
|
|||
|
||||
s += (format("%1%\n") % info->references.size()).str();
|
||||
|
||||
for (auto& j : info->references) s += j + "\n";
|
||||
for (auto& j : info->references) {
|
||||
s += j + "\n";
|
||||
}
|
||||
}
|
||||
|
||||
return s;
|
||||
|
@ -458,7 +462,9 @@ void Store::pathInfoToJSON(JSONPlaceholder& jsonOut, const PathSet& storePaths,
|
|||
|
||||
{
|
||||
auto jsonRefs = jsonPath.list("references");
|
||||
for (auto& ref : info->references) jsonRefs.elem(ref);
|
||||
for (auto& ref : info->references) {
|
||||
jsonRefs.elem(ref);
|
||||
}
|
||||
}
|
||||
|
||||
if (info->ca != "") {
|
||||
|
@ -486,7 +492,9 @@ void Store::pathInfoToJSON(JSONPlaceholder& jsonOut, const PathSet& storePaths,
|
|||
|
||||
if (!info->sigs.empty()) {
|
||||
auto jsonSigs = jsonPath.list("signatures");
|
||||
for (auto& sig : info->sigs) jsonSigs.elem(sig);
|
||||
for (auto& sig : info->sigs) {
|
||||
jsonSigs.elem(sig);
|
||||
}
|
||||
}
|
||||
|
||||
auto narInfo = std::dynamic_pointer_cast<const NarInfo>(
|
||||
|
@ -782,7 +790,9 @@ bool ValidPathInfo::checkSignature(const PublicKeys& publicKeys,
|
|||
|
||||
Strings ValidPathInfo::shortRefs() const {
|
||||
Strings refs;
|
||||
for (auto& r : references) refs.push_back(baseNameOf(r));
|
||||
for (auto& r : references) {
|
||||
refs.push_back(baseNameOf(r));
|
||||
}
|
||||
return refs;
|
||||
}
|
||||
|
||||
|
@ -918,9 +928,13 @@ std::list<ref<Store>> getDefaultSubstituters() {
|
|||
}
|
||||
};
|
||||
|
||||
for (auto uri : settings.substituters.get()) addStore(uri);
|
||||
for (auto uri : settings.substituters.get()) {
|
||||
addStore(uri);
|
||||
}
|
||||
|
||||
for (auto uri : settings.extraSubstituters.get()) addStore(uri);
|
||||
for (auto uri : settings.extraSubstituters.get()) {
|
||||
addStore(uri);
|
||||
}
|
||||
|
||||
stores.sort([](ref<Store>& a, ref<Store>& b) {
|
||||
return a->getPriority() < b->getPriority();
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue