Skip to content

Commit d118415

Browse files
committed
Fix CI
Currently CI is broken because we use the latest version of `rustfmt` and `clippy` in CI. We can resolve the `rustfmt` issue permanently by removing the `required_version` config option. We also need to fix the latest clippy warnings. Done as a single patch so that all patches pass CI.
1 parent 92c4923 commit d118415

File tree

2 files changed

+6
-9
lines changed

2 files changed

+6
-9
lines changed

rustfmt.toml

-1
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,6 @@ use_field_init_shorthand = false
7171
force_explicit_abi = true
7272
condense_wildcard_suffixes = false
7373
color = "Auto"
74-
required_version = "1.5.1"
7574
unstable_features = false
7675
disable_all_formatting = false
7776
skip_children = false

src/key.rs

+6-8
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ impl AsRef<[u8; constants::SECRET_KEY_SIZE]> for SecretKey {
8989
/// please consider using it to do comparisons of secret keys.
9090
#[inline]
9191
fn as_ref(&self) -> &[u8; constants::SECRET_KEY_SIZE] {
92-
let &SecretKey(ref dat) = self;
92+
let SecretKey(dat) = self;
9393
dat
9494
}
9595
}
@@ -108,7 +108,7 @@ impl ffi::CPtr for SecretKey {
108108
type Target = u8;
109109

110110
fn as_c_ptr(&self) -> *const Self::Target {
111-
let &SecretKey(ref dat) = self;
111+
let SecretKey(dat) = self;
112112
dat.as_ptr()
113113
}
114114

@@ -2200,7 +2200,7 @@ mod test {
22002200
];
22012201
static SK_STR: &str = "01010101010101010001020304050607ffff0000ffff00006363636363636363";
22022202

2203-
let sk = KeyPair::from_seckey_slice(&SECP256K1, &SK_BYTES).unwrap();
2203+
let sk = KeyPair::from_seckey_slice(SECP256K1, &SK_BYTES).unwrap();
22042204
#[rustfmt::skip]
22052205
assert_tokens(&sk.compact(), &[
22062206
Token::Tuple{ len: 32 },
@@ -2378,11 +2378,9 @@ mod test {
23782378
99, 99, 99, 99, 99, 99, 99, 99
23792379
];
23802380

2381-
static PK_STR: &'static str = "\
2382-
18845781f631c48f1c9709e23092067d06837f30aa0cd0544ac887fe91ddd166\
2383-
";
2381+
static PK_STR: &str = "18845781f631c48f1c9709e23092067d06837f30aa0cd0544ac887fe91ddd166";
23842382

2385-
let kp = KeyPair::from_seckey_slice(&crate::SECP256K1, &SK_BYTES).unwrap();
2383+
let kp = KeyPair::from_seckey_slice(crate::SECP256K1, &SK_BYTES).unwrap();
23862384
let (pk, _parity) = XOnlyPublicKey::from_keypair(&kp);
23872385

23882386
#[rustfmt::skip]
@@ -2418,7 +2416,7 @@ mod test {
24182416
let sec_key_str = "4242424242424242424242424242424242424242424242424242424242424242";
24192417
let keypair = KeyPair::from_seckey_str(&ctx, sec_key_str).unwrap();
24202418

2421-
serde_test::assert_tokens(&keypair.readable(), &[Token::String(&sec_key_str)]);
2419+
serde_test::assert_tokens(&keypair.readable(), &[Token::String(sec_key_str)]);
24222420

24232421
let sec_key_bytes = keypair.secret_key().secret_bytes();
24242422
let tokens = std::iter::once(Token::Tuple { len: 32 })

0 commit comments

Comments
 (0)