Skip to content

Commit 2c524e0

Browse files
committed
fix VirtualizedCluster style violations and warnings
(cherry picked from commit 255e5cc)
1 parent 9c4f5d1 commit 2c524e0

File tree

4 files changed

+14
-20
lines changed

4 files changed

+14
-20
lines changed

src/Elasticsearch.Net.VirtualizedCluster/Rules/ClientCallRule.cs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@
44

55
using System;
66
#if DOTNETCORE
7-
using System.Net.Http;
87
using TheException = System.Net.Http.HttpRequestException;
98
#else
109
using TheException = System.Net.WebException;

src/Elasticsearch.Net.VirtualizedCluster/Rules/PingRule.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66

77
namespace Elasticsearch.Net.VirtualizedCluster.Rules
88
{
9-
public class PingRule : RuleBase<PingRule>, IRule
9+
public class PingRule : RuleBase<PingRule>
1010
{
1111
private IRule Self => this;
1212

src/Elasticsearch.Net.VirtualizedCluster/Rules/RuleBase.cs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
// See the LICENSE file in the project root for more information
44

55
using System;
6-
using System.Security.Cryptography;
76
using System.Threading;
87

98
namespace Elasticsearch.Net.VirtualizedCluster.Rules

src/Elasticsearch.Net.VirtualizedCluster/VirtualClusterConnection.cs

Lines changed: 13 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@
77
using System.IO;
88
using System.Linq;
99
#if DOTNETCORE
10-
using System.Net.Http;
1110
using TheException = System.Net.Http.HttpRequestException;
1211
#else
1312
using TheException = System.Net.WebException;
@@ -112,7 +111,7 @@ public override TResponse Request<TResponse>(RequestData requestData)
112111
var state = _calls[requestData.Uri.Port];
113112
if (IsSniffRequest(requestData))
114113
{
115-
var sniffed = Interlocked.Increment(ref state.Sniffed);
114+
_ = Interlocked.Increment(ref state.Sniffed);
116115
return HandleRules<TResponse, ISniffRule>(
117116
requestData,
118117
nameof(VirtualCluster.Sniff),
@@ -124,7 +123,7 @@ public override TResponse Request<TResponse>(RequestData requestData)
124123
}
125124
if (IsPingRequest(requestData))
126125
{
127-
var pinged = Interlocked.Increment(ref state.Pinged);
126+
_ = Interlocked.Increment(ref state.Pinged);
128127
return HandleRules<TResponse, IRule>(
129128
requestData,
130129
nameof(VirtualCluster.Ping),
@@ -134,7 +133,7 @@ public override TResponse Request<TResponse>(RequestData requestData)
134133
(r) => null //HEAD request
135134
);
136135
}
137-
var called = Interlocked.Increment(ref state.Called);
136+
_ = Interlocked.Increment(ref state.Called);
138137
return HandleRules<TResponse, IClientCallRule>(
139138
requestData,
140139
nameof(VirtualCluster.ClientCalls),
@@ -165,21 +164,19 @@ Func<TRule, byte[]> successResponse
165164
if (rules.Count == 0)
166165
throw new Exception($"No {origin} defined for the current VirtualCluster, so we do not know how to respond");
167166

168-
var state = _calls[requestData.Uri.Port];
169167
foreach (var rule in rules.Where(s => s.OnPort.HasValue))
170168
{
171169
var always = rule.Times.Match(t => true, t => false);
172170
var times = rule.Times.Match(t => -1, t => t);
173171

174-
if (rule.OnPort.Value == requestData.Uri.Port)
175-
{
176-
if (always)
177-
return Always<TResponse, TRule>(requestData, timeout, beforeReturn, successResponse, rule);
172+
if (rule.OnPort == null || rule.OnPort.Value != requestData.Uri.Port) continue;
178173

179-
if (rule.Executed > times) continue;
174+
if (always)
175+
return Always<TResponse, TRule>(requestData, timeout, beforeReturn, successResponse, rule);
180176

181-
return Sometimes<TResponse, TRule>(requestData, timeout, beforeReturn, successResponse, state, rule, times);
182-
}
177+
if (rule.Executed > times) continue;
178+
179+
return Sometimes<TResponse, TRule>(requestData, timeout, beforeReturn, successResponse, rule);
183180
}
184181
foreach (var rule in rules.Where(s => !s.OnPort.HasValue))
185182
{
@@ -190,7 +187,7 @@ Func<TRule, byte[]> successResponse
190187

191188
if (rule.Executed > times) continue;
192189

193-
return Sometimes<TResponse, TRule>(requestData, timeout, beforeReturn, successResponse, state, rule, times);
190+
return Sometimes<TResponse, TRule>(requestData, timeout, beforeReturn, successResponse, rule);
194191
}
195192
var count = _calls.Select(kv => kv.Value.Called).Sum();
196193
throw new Exception($@"No global or port specific {origin} rule ({requestData.Uri.Port}) matches any longer after {count} calls in to the cluster");
@@ -217,8 +214,7 @@ private TResponse Always<TResponse, TRule>(RequestData requestData, TimeSpan tim
217214
}
218215

219216
private TResponse Sometimes<TResponse, TRule>(
220-
RequestData requestData, TimeSpan timeout, Action<TRule> beforeReturn, Func<TRule, byte[]> successResponse, State state, TRule rule,
221-
int times
217+
RequestData requestData, TimeSpan timeout, Action<TRule> beforeReturn, Func<TRule, byte[]> successResponse, TRule rule
222218
)
223219
where TResponse : class, IElasticsearchResponse, new()
224220
where TRule : IRule
@@ -243,7 +239,7 @@ private TResponse Fail<TResponse, TRule>(RequestData requestData, TRule rule, Ru
243239
where TRule : IRule
244240
{
245241
var state = _calls[requestData.Uri.Port];
246-
var failed = Interlocked.Increment(ref state.Failures);
242+
_ = Interlocked.Increment(ref state.Failures);
247243
var ret = returnOverride ?? rule.Return;
248244
rule.RecordExecuted();
249245

@@ -265,7 +261,7 @@ TRule rule
265261
where TRule : IRule
266262
{
267263
var state = _calls[requestData.Uri.Port];
268-
var succeeded = Interlocked.Increment(ref state.Successes);
264+
_ = Interlocked.Increment(ref state.Successes);
269265
rule.RecordExecuted();
270266

271267
beforeReturn?.Invoke(rule);

0 commit comments

Comments
 (0)