hibari

Code pulled with git from git://github.com/hibari/hibari.git with the last commit being edc0528

These are Intersection warnings for hibari.

(Only new warnings by Intersection-enabled analysis are listed. Warnings by current public version of Dialyzer are listed here.)

dialyzer -n -q -Wno_improper_lists -r hibari/lib
brick_admin.erl:2515: Guard test is_record(H::'eof' | {'error',_,_},'hunk_summ',11) can never succeed
brick_admin.erl:2557: Function send_log_replay/9 will never be called
gdss_s3_httpd_request_handler.erl:381: The call gdss_s3_httpd_response:send_status(ModData::#mod{data::[],method::[any()],request_line::nonempty_maybe_improper_list(),parsed_header::[any()],connection::boolean()},501,[1..255,...]) will never return since it differs in the 2nd and/or 3rd argument from the success typing arguments: (#mod{socket_type::'ip_comm' | {'essl',_} | {'ssl',_},socket::port() | {'sslsocket',_,pid()}},100 | 304 | 408 | 500,any()) or (#mod{socket_type::'ip_comm' | {'essl',_} | {'ssl',_},socket::port() | {'sslsocket',_,pid()}},301 | 400 | 403 | 404 | 413 | 414 | 416 | 503,[any()]) or (#mod{socket_type::'ip_comm' | {'essl',_} | {'ssl',_},socket::port() | {'sslsocket',_,pid()}},400 | 401 | 412,'none') or (#mod{socket_type::'ip_comm' | {'essl',_} | {'ssl',_},socket::port() | {'sslsocket',_,pid()}},501,{atom() | [any()],[any()],[any()]})
gdss_s3_httpd_request_handler.erl:425: The call gdss_s3_httpd_response:send_status(ModData::#mod{data::[],method::[any()],request_line::nonempty_maybe_improper_list(),parsed_header::[any()],connection::boolean()},417,[32 | 85 | 97 | 99 | 100 | 101 | 108 | 110 | 112 | 116 | 117 | 118 | 120,...]) will never return since it differs in the 2nd and/or 3rd argument from the success typing arguments: (#mod{socket_type::'ip_comm' | {'essl',_} | {'ssl',_},socket::port() | {'sslsocket',_,pid()}},100 | 304 | 408 | 500,any()) or (#mod{socket_type::'ip_comm' | {'essl',_} | {'ssl',_},socket::port() | {'sslsocket',_,pid()}},301 | 400 | 403 | 404 | 413 | 414 | 416 | 503,[any()]) or (#mod{socket_type::'ip_comm' | {'essl',_} | {'ssl',_},socket::port() | {'sslsocket',_,pid()}},400 | 401 | 412,'none') or (#mod{socket_type::'ip_comm' | {'essl',_} | {'ssl',_},socket::port() | {'sslsocket',_,pid()}},501,{atom() | [any()],[any()],[any()]})