Skip to content

Commit 3c20ee4

Browse files
jplattepoljar
authored andcommitted
chore: Fix clippy lints
1 parent ed245a0 commit 3c20ee4

File tree

10 files changed

+31
-31
lines changed

10 files changed

+31
-31
lines changed

crates/matrix-sdk-base/src/event_cache/store/integration_tests.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -501,7 +501,7 @@ impl EventCacheStoreIntegrationTests for DynEventCacheStore {
501501
let previous_chunk =
502502
self.load_previous_chunk(room_id, first_chunk).await.unwrap().unwrap();
503503

504-
let _ = lazy_loader::insert_new_first_chunk(&mut linked_chunk, previous_chunk).unwrap();
504+
lazy_loader::insert_new_first_chunk(&mut linked_chunk, previous_chunk).unwrap();
505505

506506
let mut rchunks = linked_chunk.rchunks();
507507

@@ -538,7 +538,7 @@ impl EventCacheStoreIntegrationTests for DynEventCacheStore {
538538
let previous_chunk =
539539
self.load_previous_chunk(room_id, first_chunk).await.unwrap().unwrap();
540540

541-
let _ = lazy_loader::insert_new_first_chunk(&mut linked_chunk, previous_chunk).unwrap();
541+
lazy_loader::insert_new_first_chunk(&mut linked_chunk, previous_chunk).unwrap();
542542

543543
let mut rchunks = linked_chunk.rchunks();
544544

crates/matrix-sdk-common/src/deserialized_responses.rs

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ impl fmt::Display for VerificationLevel {
208208
}
209209
VerificationLevel::None(..) => "The sending device is not known",
210210
};
211-
write!(f, "{}", display)
211+
write!(f, "{display}")
212212
}
213213
}
214214

@@ -501,8 +501,7 @@ impl<'de> Deserialize<'de> for TimelineEvent {
501501
let v0: SyncTimelineEventDeserializationHelperV0 =
502502
serde_json::from_value(Value::Object(value)).map_err(|e| {
503503
serde::de::Error::custom(format!(
504-
"Unable to deserialize V0-format TimelineEvent: {}",
505-
e
504+
"Unable to deserialize V0-format TimelineEvent: {e}",
506505
))
507506
})?;
508507
Ok(v0.into())
@@ -512,8 +511,7 @@ impl<'de> Deserialize<'de> for TimelineEvent {
512511
let v1: SyncTimelineEventDeserializationHelperV1 =
513512
serde_json::from_value(Value::Object(value)).map_err(|e| {
514513
serde::de::Error::custom(format!(
515-
"Unable to deserialize V1-format TimelineEvent: {}",
516-
e
514+
"Unable to deserialize V1-format TimelineEvent: {e}",
517515
))
518516
})?;
519517
Ok(v1.into())

crates/matrix-sdk-crypto/src/gossiping/machine.rs

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1265,7 +1265,8 @@ mod tests {
12651265
second_device.set_trust_state(LocalTrust::Verified);
12661266
bob_device.set_trust_state(LocalTrust::Verified);
12671267
alice_machine.inner.store.save_device_data(&[bob_device, second_device]).await.unwrap();
1268-
bob_machine.inner.store.save_device_data(&[alice_device.clone()]).await.unwrap();
1268+
let devices = std::slice::from_ref(&alice_device);
1269+
bob_machine.inner.store.save_device_data(devices).await.unwrap();
12691270

12701271
if create_sessions {
12711272
// Create Olm sessions for our two accounts.
@@ -1486,7 +1487,8 @@ mod tests {
14861487

14871488
// We need a trusted device, otherwise we won't request keys
14881489
alice_device.set_trust_state(LocalTrust::Verified);
1489-
machine.inner.store.save_device_data(&[alice_device.clone()]).await.unwrap();
1490+
let devices = std::slice::from_ref(&alice_device);
1491+
machine.inner.store.save_device_data(devices).await.unwrap();
14901492

14911493
let (outbound, session) = account.create_group_session_pair_with_defaults(room_id()).await;
14921494
let content = outbound.encrypt("m.dummy", &message_like_event_content!({})).await;
@@ -1528,7 +1530,8 @@ mod tests {
15281530

15291531
assert_eq!(first_session.first_known_index(), 10);
15301532

1531-
machine.inner.store.save_inbound_group_sessions(&[first_session.clone()]).await.unwrap();
1533+
let sessions = std::slice::from_ref(&first_session);
1534+
machine.inner.store.save_inbound_group_sessions(sessions).await.unwrap();
15321535

15331536
// Get the cancel request.
15341537
let id = machine
@@ -1871,7 +1874,8 @@ mod tests {
18711874
let bob_account = bob_account();
18721875
let bob_device = DeviceData::from_account(&bob_account);
18731876

1874-
alice_machine.inner.store.save_device_data(&[alice_device.clone()]).await.unwrap();
1877+
let devices = std::slice::from_ref(&alice_device);
1878+
alice_machine.inner.store.save_device_data(devices).await.unwrap();
18751879

18761880
// Create Olm sessions for our two accounts.
18771881
let alice_session = alice_machine
@@ -1945,7 +1949,8 @@ mod tests {
19451949

19461950
// We need a trusted device, otherwise we won't serve secrets
19471951
alice_device.set_trust_state(LocalTrust::Verified);
1948-
alice_machine.inner.store.save_device_data(&[alice_device.clone()]).await.unwrap();
1952+
let devices = std::slice::from_ref(&alice_device);
1953+
alice_machine.inner.store.save_device_data(devices).await.unwrap();
19491954

19501955
alice_machine.receive_incoming_secret_request(&event);
19511956
{

crates/matrix-sdk-crypto/src/machine/tests/decryption_verification_state.rs

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -557,7 +557,8 @@ async fn encrypt_message(
557557
.unwrap()
558558
.inbound_group_session
559559
.unwrap();
560-
recipient.store().save_inbound_group_sessions(&[group_session.clone()]).await.unwrap();
560+
let sessions = std::slice::from_ref(&group_session);
561+
recipient.store().save_inbound_group_sessions(sessions).await.unwrap();
561562

562563
let content = RoomMessageEventContent::text_plain(plaintext);
563564

@@ -596,14 +597,12 @@ async fn check_decryption_trust_requirement(
596597
if *is_ok {
597598
assert!(
598599
bob.decrypt_room_event(event, room_id, &decryption_settings).await.is_ok(),
599-
"Decryption did not succeed with {:?}",
600-
trust_requirement,
600+
"Decryption did not succeed with {trust_requirement:?}",
601601
);
602602
} else {
603603
assert!(
604604
bob.decrypt_room_event(event, room_id, &decryption_settings).await.is_err(),
605-
"Decryption succeeded with {:?}",
606-
trust_requirement,
605+
"Decryption succeeded with {trust_requirement:?}",
607606
);
608607
}
609608
}

crates/matrix-sdk-crypto/src/machine/tests/mod.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -637,7 +637,8 @@ async fn test_megolm_encryption() {
637637
.unwrap()
638638
.inbound_group_session
639639
.unwrap();
640-
bob.store().save_inbound_group_sessions(&[group_session.clone()]).await.unwrap();
640+
let sessions = std::slice::from_ref(&group_session);
641+
bob.store().save_inbound_group_sessions(sessions).await.unwrap();
641642

642643
// when we decrypt the room key, the
643644
// inbound_group_session_streamroom_keys_received_stream should tell us

crates/matrix-sdk-crypto/src/session_manager/group_sessions/share_strategy.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1688,7 +1688,7 @@ mod tests {
16881688
) {
16891689
// The share list should be empty
16901690
for (user, device_list) in recips.devices {
1691-
assert_eq!(device_list.len(), 0, "session unexpectedly shared with {}", user);
1691+
assert_eq!(device_list.len(), 0, "session unexpectedly shared with {user}");
16921692
}
16931693

16941694
// ... and there should be one withheld message

crates/matrix-sdk-crypto/src/session_manager/sessions.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -840,7 +840,8 @@ mod tests {
840840
let time = SystemTime::now() - Duration::from_secs(3601);
841841
session.creation_time = SecondsSinceUnixEpoch::from_system_time(time).unwrap();
842842

843-
manager.store.save_device_data(&[bob_device.clone()]).await.unwrap();
843+
let devices = std::slice::from_ref(&bob_device);
844+
manager.store.save_device_data(devices).await.unwrap();
844845
manager.store.save_sessions(&[session]).await.unwrap();
845846

846847
assert!(manager.get_missing_sessions(iter::once(bob.user_id())).await.unwrap().is_none());

crates/matrix-sdk-crypto/src/verification/machine.rs

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -155,11 +155,7 @@ impl VerificationMachine {
155155
}
156156

157157
pub fn get_requests(&self, user_id: &UserId) -> Vec<VerificationRequest> {
158-
self.requests
159-
.read()
160-
.get(user_id)
161-
.map(|v| v.iter().map(|(_, value)| value.clone()).collect())
162-
.unwrap_or_default()
158+
self.requests.read().get(user_id).map(|v| v.values().cloned().collect()).unwrap_or_default()
163159
}
164160

165161
/// Add a new `VerificationRequest` object to the cache.

crates/matrix-sdk-store-encryption/src/lib.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -653,7 +653,7 @@ impl std::fmt::Display for EncryptedValueBase64DecodeError {
653653
let msg = match self {
654654
EncryptedValueBase64DecodeError::DecodeError(e) => e.to_string(),
655655
EncryptedValueBase64DecodeError::IncorrectNonceLength(length) => {
656-
format!("Incorrect nonce length {}. Expected length: {}.", length, XNONCE_SIZE)
656+
format!("Incorrect nonce length {length}. Expected length: {XNONCE_SIZE}.")
657657
}
658658
};
659659

testing/matrix-sdk-test/src/test_json/keys_query.rs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -118,11 +118,11 @@ pub fn self_signing_keys(user: &KeysQueryUser) -> serde_json::Value {
118118
json!({
119119
user.user_id: {
120120
"keys": {
121-
&format!("ed25519:{}", self_signing_key_name): self_signing_key_name
121+
&format!("ed25519:{self_signing_key_name}"): self_signing_key_name
122122
},
123123
"signatures": {
124124
"@bob:localhost": {
125-
&format!("ed25519:{}", master_key_name): self_signing_key_signature,
125+
&format!("ed25519:{master_key_name}"): self_signing_key_signature,
126126
}
127127
},
128128
"usage": [ "self_signing" ],
@@ -140,10 +140,10 @@ pub fn master_keys(user: &KeysQueryUser) -> serde_json::Value {
140140
{
141141
json!({
142142
user.user_id: {
143-
"keys": { &format!("ed25519:{}", master_key_name): master_key_name },
143+
"keys": { &format!("ed25519:{master_key_name}"): master_key_name },
144144
"signatures": {
145145
user.user_id: {
146-
&format!("ed25519:{}", master_key_name): master_key_signature,
146+
&format!("ed25519:{master_key_name}"): master_key_signature,
147147
&format!("ed25519:{}", user.device_id): master_key_device_signature
148148
}
149149
},
@@ -164,7 +164,7 @@ pub fn device_keys_payload(user: &KeysQueryUser) -> serde_json::Value {
164164
(user.device_signature_2_name, user.device_signature_2_signature)
165165
{
166166
signatures
167-
.insert(format!("ed25519:{}", device_signature_2_name), device_signature_2_signature);
167+
.insert(format!("ed25519:{device_signature_2_name}"), device_signature_2_signature);
168168
}
169169

170170
json!({

0 commit comments

Comments
 (0)