Skip to content

Commit 190c21d

Browse files
niclaslindtomusdrw
andauthoredFeb 5, 2022
Fix clippy warnings (#597)
* removed unneeded unit return type * borrowed a reference that immediately got dereferenced by the compiler * deleted unnecessary closure for substituting value for `Option::None` * replace match block with `matches!` macro instead * use unwrap_or_else instead to avoid potentially side effects * no need to use question mark here becuase execution of the body will end up there anyway * borrowed a reference that immediately got dereferenced by the compiler * borrowed a reference that immediately got dereferenced by the compiler * when replacing a value of type `T` with `T::default()` std::mem::take is a better option * use the map function instead of implenting it manually * use `.is_empty()` instead of checking the length is bigger then 0 * use `.is_some()` and `is_none()` instead of creating an unused variable * implementing the `From` Trait and we will get the `Into` for free * add `Default` * declare it as u64 instead of cast it to u64 * deleted unnecessary clone * use `assert!` for booleans comparisons Co-authored-by: Tomasz Drwięga <[email protected]>
1 parent b6f10b3 commit 190c21d

File tree

12 files changed

+44
-51
lines changed

12 files changed

+44
-51
lines changed
 

‎src/api/accounts.rs

+5-8
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ mod accounts_signing {
136136
let message_hash = self.hash_message(message);
137137

138138
let signature = key
139-
.sign(&message_hash.as_bytes(), None)
139+
.sign(message_hash.as_bytes(), None)
140140
.expect("hash is non-zero 32-bytes; qed");
141141
let v = signature
142142
.v
@@ -179,7 +179,7 @@ mod accounts_signing {
179179
};
180180
let (signature, recovery_id) = recovery
181181
.as_signature()
182-
.ok_or_else(|| error::Error::Recovery(signing::RecoveryError::InvalidSignature))?;
182+
.ok_or(error::Error::Recovery(signing::RecoveryError::InvalidSignature))?;
183183
let address = signing::recover(message_hash.as_bytes(), &signature, recovery_id)?;
184184
Ok(address)
185185
}
@@ -278,13 +278,13 @@ mod accounts_signing {
278278
stream
279279
}
280280

281-
fn rlp_append_signature(&self, stream: &mut RlpStream, signature: &Signature) -> () {
281+
fn rlp_append_signature(&self, stream: &mut RlpStream, signature: &Signature) {
282282
stream.append(&signature.v);
283283
stream.append(&U256::from_big_endian(signature.r.as_bytes()));
284284
stream.append(&U256::from_big_endian(signature.s.as_bytes()));
285285
}
286286

287-
fn rlp_append_access_list(&self, stream: &mut RlpStream) -> () {
287+
fn rlp_append_access_list(&self, stream: &mut RlpStream) {
288288
stream.begin_list(self.access_list.len());
289289
for access in self.access_list.iter() {
290290
stream.begin_list(2);
@@ -323,10 +323,7 @@ mod accounts_signing {
323323

324324
/// Sign and return a raw signed transaction.
325325
pub fn sign(self, sign: impl signing::Key, chain_id: u64) -> SignedTransaction {
326-
let adjust_v_value = match self.transaction_type.map(|t| t.as_u64()) {
327-
Some(LEGACY_TX_ID) | None => true,
328-
_ => false,
329-
};
326+
let adjust_v_value = matches!(self.transaction_type.map(|t| t.as_u64()), Some(LEGACY_TX_ID) | None);
330327

331328
let encoded = self.encode(chain_id, None);
332329

‎src/api/parity.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ mod tests {
138138
ParityPendingTransactionFilter::builder()
139139
.from(Address::from_low_u64_be(0x32))
140140
.gas(U64::from(100_000))
141-
.gas_price(FilterCondition::GreaterThan(U64::from(100_000_000_000 as u64)))
141+
.gas_price(FilterCondition::GreaterThan(U64::from(100_000_000_000_u64)))
142142
.build()
143143
=> "parity_pendingTransactions",
144144
vec![r#"1"#, r#"{"from":{"eq":"0x0000000000000000000000000000000000000032"},"gas":{"eq":"0x186a0"},"gas_price":{"gt":"0x174876e800"}}"#]

‎src/contract/deploy.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -130,9 +130,9 @@ impl<T: Transport> Builder<T> {
130130
let tx = TransactionParameters {
131131
nonce: tx.nonce,
132132
to: tx.to,
133-
gas: tx.gas.unwrap_or(1_000_000.into()),
133+
gas: tx.gas.unwrap_or_else(|| 1_000_000.into()),
134134
gas_price: tx.gas_price,
135-
value: tx.value.unwrap_or(0.into()),
135+
value: tx.value.unwrap_or_else(|| 0.into()),
136136
data: tx
137137
.data
138138
.expect("Tried to deploy a contract but transaction data wasn't set"),

‎src/contract/mod.rs

+1-3
Original file line numberDiff line numberDiff line change
@@ -319,9 +319,7 @@ impl<T: Transport> Contract<T> {
319319
data: l.data.0,
320320
})?;
321321

322-
Ok(R::from_tokens(
323-
log.params.into_iter().map(|x| x.value).collect::<Vec<_>>(),
324-
)?)
322+
R::from_tokens(log.params.into_iter().map(|x| x.value).collect::<Vec<_>>())
325323
})
326324
.collect::<Result<Vec<R>>>()
327325
}

‎src/signing.rs

+4-4
Original file line numberDiff line numberDiff line change
@@ -94,13 +94,13 @@ mod feature_gated {
9494
type Target = SecretKey;
9595

9696
fn deref(&self) -> &Self::Target {
97-
&self.key
97+
self.key
9898
}
9999
}
100100

101101
impl<T: Deref<Target = SecretKey>> Key for T {
102102
fn sign(&self, message: &[u8], chain_id: Option<u64>) -> Result<Signature, SigningError> {
103-
let message = Message::from_slice(&message).map_err(|_| SigningError::InvalidMessage)?;
103+
let message = Message::from_slice(message).map_err(|_| SigningError::InvalidMessage)?;
104104
let (recovery_id, signature) = CONTEXT.sign_ecdsa_recoverable(&message, self).serialize_compact();
105105

106106
let standard_v = recovery_id.to_i32() as u64;
@@ -118,7 +118,7 @@ mod feature_gated {
118118
}
119119

120120
fn sign_message(&self, message: &[u8]) -> Result<Signature, SigningError> {
121-
let message = Message::from_slice(&message).map_err(|_| SigningError::InvalidMessage)?;
121+
let message = Message::from_slice(message).map_err(|_| SigningError::InvalidMessage)?;
122122
let (recovery_id, signature) = CONTEXT.sign_ecdsa_recoverable(&message, self).serialize_compact();
123123

124124
let v = recovery_id.to_i32() as u64;
@@ -140,7 +140,7 @@ mod feature_gated {
140140
let message = Message::from_slice(message).map_err(|_| RecoveryError::InvalidMessage)?;
141141
let recovery_id = RecoveryId::from_i32(recovery_id).map_err(|_| RecoveryError::InvalidSignature)?;
142142
let signature =
143-
RecoverableSignature::from_compact(&signature, recovery_id).map_err(|_| RecoveryError::InvalidSignature)?;
143+
RecoverableSignature::from_compact(signature, recovery_id).map_err(|_| RecoveryError::InvalidSignature)?;
144144
let public_key = CONTEXT
145145
.recover_ecdsa(&message, &signature)
146146
.map_err(|_| RecoveryError::InvalidSignature)?;

‎src/transports/batch.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ use futures::{
1010
Future, FutureExt,
1111
};
1212
use parking_lot::Mutex;
13-
use std::{collections::BTreeMap, mem, pin::Pin, sync::Arc};
13+
use std::{collections::BTreeMap, pin::Pin, sync::Arc};
1414

1515
type Pending = oneshot::Sender<error::Result<rpc::Value>>;
1616
type PendingRequests = Arc<Mutex<BTreeMap<RequestId, Pending>>>;
@@ -38,7 +38,7 @@ where
3838

3939
/// Sends all requests as a batch.
4040
pub fn submit_batch(&self) -> impl Future<Output = error::Result<Vec<error::Result<rpc::Value>>>> {
41-
let batch = mem::replace(&mut *self.batch.lock(), vec![]);
41+
let batch = std::mem::take(&mut *self.batch.lock());
4242
let ids = batch.iter().map(|&(id, _)| id).collect::<Vec<_>>();
4343

4444
let batch = self.transport.send_batch(batch);

‎src/transports/ipc.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -173,17 +173,17 @@ async fn run_server(unix_stream: UnixStream, messages_rx: UnboundedReceiverStrea
173173
let mut read_buffer = vec![];
174174
let mut closed = false;
175175

176-
while !closed || pending_response_txs.len() > 0 {
176+
while !closed || !pending_response_txs.is_empty() {
177177
tokio::select! {
178178
message = messages_rx.next() => match message {
179179
None => closed = true,
180180
Some(TransportMessage::Subscribe(id, tx)) => {
181-
if let Some(_) = subscription_txs.insert(id.clone(), tx) {
181+
if subscription_txs.insert(id.clone(), tx).is_some() {
182182
log::warn!("Replacing a subscription with id {:?}", id);
183183
}
184184
},
185185
Some(TransportMessage::Unsubscribe(id)) => {
186-
if let None = subscription_txs.remove(&id) {
186+
if subscription_txs.remove(&id).is_none() {
187187
log::warn!("Unsubscribing not subscribed id {:?}", id);
188188
}
189189
},

‎src/transports/ws.rs

+5-7
Original file line numberDiff line numberDiff line change
@@ -161,14 +161,12 @@ impl WsServerTask {
161161
.to_vec()
162162
});
163163

164-
let headers = if let Some(ref head) = maybe_encoded {
165-
Some([soketto::handshake::client::Header {
164+
let headers = maybe_encoded.as_ref().map(|head| {
165+
[soketto::handshake::client::Header {
166166
name: "Authorization",
167-
value: &head,
168-
}])
169-
} else {
170-
None
171-
};
167+
value: head,
168+
}]
169+
});
172170

173171
if let Some(ref head) = headers {
174172
client.set_headers(head);

‎src/types/block.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -306,7 +306,7 @@ mod tests {
306306
}
307307
);
308308

309-
let block: Block<()> = serde_json::from_value(json.clone()).unwrap();
309+
let block: Block<()> = serde_json::from_value(json).unwrap();
310310
assert_eq!(block.base_fee_per_gas, Some(U256::from(7)));
311311
}
312312

‎src/types/log.rs

+5-5
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ mod tests {
210210
log_type: None,
211211
removed: Some(true),
212212
};
213-
assert_eq!(true, log.is_removed());
213+
assert!(log.is_removed());
214214
}
215215

216216
#[test]
@@ -228,7 +228,7 @@ mod tests {
228228
log_type: None,
229229
removed: Some(false),
230230
};
231-
assert_eq!(false, log.is_removed());
231+
assert!(!log.is_removed());
232232
}
233233

234234
#[test]
@@ -246,7 +246,7 @@ mod tests {
246246
log_type: Some("removed".into()),
247247
removed: None,
248248
};
249-
assert_eq!(true, log.is_removed());
249+
assert!(log.is_removed());
250250
}
251251

252252
#[test]
@@ -264,7 +264,7 @@ mod tests {
264264
log_type: Some("mined".into()),
265265
removed: None,
266266
};
267-
assert_eq!(false, log.is_removed());
267+
assert!(!log.is_removed());
268268
}
269269

270270
#[test]
@@ -282,7 +282,7 @@ mod tests {
282282
log_type: None,
283283
removed: None,
284284
};
285-
assert_eq!(false, log.is_removed());
285+
assert!(!log.is_removed());
286286
}
287287

288288
#[test]

‎src/types/signed.rs

+11-11
Original file line numberDiff line numberDiff line change
@@ -107,19 +107,19 @@ impl From<CallRequest> for TransactionParameters {
107107
}
108108
}
109109

110-
impl Into<CallRequest> for TransactionParameters {
111-
fn into(self) -> CallRequest {
110+
impl From<TransactionParameters> for CallRequest {
111+
fn from(val: TransactionParameters) -> Self {
112112
CallRequest {
113113
from: None,
114-
to: self.to,
115-
gas: Some(self.gas),
116-
gas_price: self.gas_price,
117-
value: Some(self.value),
118-
data: Some(self.data),
119-
transaction_type: self.transaction_type,
120-
access_list: self.access_list,
121-
max_fee_per_gas: self.max_fee_per_gas,
122-
max_priority_fee_per_gas: self.max_priority_fee_per_gas,
114+
to: val.to,
115+
gas: Some(val.gas),
116+
gas_price: val.gas_price,
117+
value: Some(val.value),
118+
data: Some(val.data),
119+
transaction_type: val.transaction_type,
120+
access_list: val.access_list,
121+
max_fee_per_gas: val.max_fee_per_gas,
122+
max_priority_fee_per_gas: val.max_priority_fee_per_gas,
123123
}
124124
}
125125
}

‎src/types/transaction_request.rs

+4-4
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ impl CallRequest {
4949
}
5050

5151
/// Call Request Builder
52-
#[derive(Clone, Debug)]
52+
#[derive(Clone, Debug, Default)]
5353
pub struct CallRequestBuilder {
5454
call_request: CallRequest,
5555
}
@@ -165,7 +165,7 @@ impl TransactionRequest {
165165
}
166166

167167
/// Transaction Request Builder
168-
#[derive(Clone, Debug)]
168+
#[derive(Clone, Debug, Default)]
169169
pub struct TransactionRequestBuilder {
170170
transaction_request: TransactionRequest,
171171
}
@@ -296,7 +296,7 @@ mod tests {
296296
"value": "0x4c4b40",
297297
"data": "0x010203"
298298
}"#;
299-
let deserialized: CallRequest = serde_json::from_str(&serialized).unwrap();
299+
let deserialized: CallRequest = serde_json::from_str(serialized).unwrap();
300300

301301
assert_eq!(deserialized.from, None);
302302
assert_eq!(deserialized.to, Some(Address::from_low_u64_be(5)));
@@ -353,7 +353,7 @@ mod tests {
353353
"block": 5
354354
}
355355
}"#;
356-
let deserialized: TransactionRequest = serde_json::from_str(&serialized).unwrap();
356+
let deserialized: TransactionRequest = serde_json::from_str(serialized).unwrap();
357357

358358
assert_eq!(deserialized.from, Address::from_low_u64_be(5));
359359
assert_eq!(deserialized.to, None);

0 commit comments

Comments
 (0)
Please sign in to comment.