diff --git a/sdk/core/azure_core_amqp/src/cbs.rs b/sdk/core/azure_core_amqp/src/cbs.rs index 6167f24851..0c820db5cd 100644 --- a/sdk/core/azure_core_amqp/src/cbs.rs +++ b/sdk/core/azure_core_amqp/src/cbs.rs @@ -68,7 +68,7 @@ impl<'a> AmqpClaimsBasedSecurity<'a> { } } -impl<'a> AmqpClaimsBasedSecurityApis for AmqpClaimsBasedSecurity<'a> { +impl AmqpClaimsBasedSecurityApis for AmqpClaimsBasedSecurity<'_> { async fn authorize_path( &self, path: String, diff --git a/sdk/core/azure_core_amqp/src/noop.rs b/sdk/core/azure_core_amqp/src/noop.rs index 91983278a9..77a7c39201 100644 --- a/sdk/core/azure_core_amqp/src/noop.rs +++ b/sdk/core/azure_core_amqp/src/noop.rs @@ -97,7 +97,7 @@ impl<'a> NoopAmqpClaimsBasedSecurity<'a> { } } -impl<'a> AmqpClaimsBasedSecurityApis for NoopAmqpClaimsBasedSecurity<'a> { +impl AmqpClaimsBasedSecurityApis for NoopAmqpClaimsBasedSecurity<'_> { async fn attach(&self) -> Result<()> { unimplemented!(); } diff --git a/sdk/core/azure_core_test/src/proxy.rs b/sdk/core/azure_core_test/src/proxy.rs index dddba5ce3d..26924db516 100644 --- a/sdk/core/azure_core_test/src/proxy.rs +++ b/sdk/core/azure_core_test/src/proxy.rs @@ -34,7 +34,7 @@ pub async fn start( test_data_dir: impl AsRef, options: Option, ) -> Result { - if env::var(PROXY_MANUAL_START).is_ok_and(|v| v.to_ascii_lowercase() == "true") { + if env::var(PROXY_MANUAL_START).is_ok_and(|v| v.eq_ignore_ascii_case("true")) { tracing::event!(target: crate::SPAN_TARGET, Level::WARN, "environment variable {PROXY_MANUAL_START} is 'true'; not starting test proxy"); return Ok(Proxy::default()); } diff --git a/sdk/cosmos/azure_data_cosmos/src/pipeline/authorization_policy.rs b/sdk/cosmos/azure_data_cosmos/src/pipeline/authorization_policy.rs index 502acf09f2..e42918ffd9 100644 --- a/sdk/cosmos/azure_data_cosmos/src/pipeline/authorization_policy.rs +++ b/sdk/cosmos/azure_data_cosmos/src/pipeline/authorization_policy.rs @@ -104,12 +104,12 @@ impl Policy for AuthorizationPolicy { /// In the "aad" case, the signature is the AAD token. /// /// NOTE: Resource tokens are not yet supported. -async fn generate_authorization<'a>( +async fn generate_authorization( auth_token: &Credential, url: &Url, // Unused unless feature="key_auth", but I don't want to mess with excluding it since it makes call sites more complicated - #[allow(unused_variables)] signature_target: SignatureTarget<'a>, + #[allow(unused_variables)] signature_target: SignatureTarget<'_>, ) -> azure_core::Result { let token = match auth_token { Credential::Token(token_credential) => { diff --git a/sdk/eventhubs/azure_messaging_eventhubs/src/producer/mod.rs b/sdk/eventhubs/azure_messaging_eventhubs/src/producer/mod.rs index 7c67c001d5..22c3600f87 100644 --- a/sdk/eventhubs/azure_messaging_eventhubs/src/producer/mod.rs +++ b/sdk/eventhubs/azure_messaging_eventhubs/src/producer/mod.rs @@ -227,7 +227,7 @@ impl ProducerClient { /// } /// ``` /// - pub async fn submit_batch<'a>(&self, batch: &EventDataBatch<'a>) -> Result<()> { + pub async fn submit_batch(&self, batch: &EventDataBatch<'_>) -> Result<()> { let sender = self.ensure_sender(batch.get_batch_path()).await?; let messages = batch.get_messages();