From 390f01988c7ec3a59e507bc43e9184132ecc8f73 Mon Sep 17 00:00:00 2001 From: Honza <115138297+Supremesource@users.noreply.github.com> Date: Wed, 4 Dec 2024 21:24:52 -0300 Subject: [PATCH] fix: clippy errors --- pallets/subnet_emission/src/decryption.rs | 2 +- xtask/src/mainnet_spec.rs | 6 +++--- xtask/src/run.rs | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/pallets/subnet_emission/src/decryption.rs b/pallets/subnet_emission/src/decryption.rs index f4e88ab2..5388e0f2 100644 --- a/pallets/subnet_emission/src/decryption.rs +++ b/pallets/subnet_emission/src/decryption.rs @@ -557,7 +557,7 @@ impl Pallet { let (_, hanging_subnets) = Self::get_valid_subnets(None); for subnet_id in hanging_subnets.clone() { - let _ = Self::cleanup_subnet_wc_state(subnet_id, true); + Self::cleanup_subnet_wc_state(subnet_id, true); Self::cleanup_weight_encryption_data(subnet_id); } diff --git a/xtask/src/mainnet_spec.rs b/xtask/src/mainnet_spec.rs index 726190ba..73137a83 100644 --- a/xtask/src/mainnet_spec.rs +++ b/xtask/src/mainnet_spec.rs @@ -47,13 +47,13 @@ fn sudo(genesis: &mut Value, sudo: Option<&String>) { let sudo = sudo .map(|sudo| { - sp_core::ed25519::Public::from_ss58check(&sudo) + sp_core::ed25519::Public::from_ss58check(sudo) .expect("invalid SS58 sudo address") .0 }) .unwrap_or(KEYS[0]); - genesis[&key] = Value::String(format!("0x{}", hex::encode(&sudo))); + genesis[&key] = Value::String(format!("0x{}", hex::encode(sudo))); } const KEYS: &[[u8; 32]] = &[ @@ -141,7 +141,7 @@ fn key_name(pallet: &[u8], key: &[u8]) -> String { type OpaqueBlock = Block, OpaqueExtrinsic>; -const IS_NEW_LOGIC: u128 = 0x80000000_00000000_00000000_00000000u128; +// const IS_NEW_LOGIC: u128 = 0x80000000_00000000_00000000_00000000u128; async fn create_mainnet_spec() -> Box { let mut chain_spec = sc_service::GenericChainSpec::::from_json_bytes( diff --git a/xtask/src/run.rs b/xtask/src/run.rs index 5a49afbe..17de432b 100644 --- a/xtask/src/run.rs +++ b/xtask/src/run.rs @@ -60,7 +60,7 @@ pub(super) fn run(mut r: flags::Run) { (chain_path, true) } flags::RunCmd::Replica(replica) => { - (crate::mainnet_spec::mainnet_spec(&replica, &path), false) + (crate::mainnet_spec::mainnet_spec(replica, &path), false) } };