style: Migrate to stable-only rustfmt configuration

- Remove nightly-only features from .rustfmt.toml and vendor/ss58-registry/rustfmt.toml
- Removed features: imports_granularity, wrap_comments, comment_width,
  reorder_impl_items, spaces_around_ranges, binop_separator,
  match_arm_blocks, trailing_semicolon, trailing_comma
- Format all 898 affected files with stable rustfmt
- Ensures long-term reliability without nightly toolchain dependency
This commit is contained in:
2025-12-22 17:12:58 +03:00
parent 65b7f5e640
commit 4c8f281051
898 changed files with 8671 additions and 6432 deletions
@@ -586,12 +586,12 @@ impl RequiredRouting {
match (self, other) {
(RequiredRouting::All, _) | (_, RequiredRouting::All) => RequiredRouting::All,
(RequiredRouting::GridXY, _) | (_, RequiredRouting::GridXY) => RequiredRouting::GridXY,
(RequiredRouting::GridX, RequiredRouting::GridY) |
(RequiredRouting::GridY, RequiredRouting::GridX) => RequiredRouting::GridXY,
(RequiredRouting::GridX, RequiredRouting::GridY)
| (RequiredRouting::GridY, RequiredRouting::GridX) => RequiredRouting::GridXY,
(RequiredRouting::GridX, RequiredRouting::GridX) => RequiredRouting::GridX,
(RequiredRouting::GridY, RequiredRouting::GridY) => RequiredRouting::GridY,
(RequiredRouting::None, RequiredRouting::PendingTopology) |
(RequiredRouting::PendingTopology, RequiredRouting::None) => RequiredRouting::PendingTopology,
(RequiredRouting::None, RequiredRouting::PendingTopology)
| (RequiredRouting::PendingTopology, RequiredRouting::None) => RequiredRouting::PendingTopology,
(RequiredRouting::None, _) | (RequiredRouting::PendingTopology, _) => other,
(_, RequiredRouting::None) | (_, RequiredRouting::PendingTopology) => self,
}
+3 -2
View File
@@ -346,8 +346,9 @@ macro_rules! impl_versioned_validation_try_from {
fn try_from(x: &'a $from) -> Result<$out, Self::Error> {
#[allow(unreachable_patterns)] // when there is only one variant
match x {
ValidationProtocols::V3($v3_pat) =>
Ok(ValidationProtocols::V3($v3_out.clone())),
ValidationProtocols::V3($v3_pat) => {
Ok(ValidationProtocols::V3($v3_out.clone()))
},
_ => Err(crate::WrongVariant),
}
}
+21 -14
View File
@@ -168,20 +168,22 @@ impl PeerSet {
// Unfortunately, labels must be static strings, so we must manually cover them
// for all protocol versions here.
match self {
PeerSet::Validation =>
PeerSet::Validation => {
if version == ValidationVersion::V3.into() {
Some("validation/3")
} else {
None
},
PeerSet::Collation =>
}
},
PeerSet::Collation => {
if version == CollationVersion::V1.into() {
Some("collation/1")
} else if version == CollationVersion::V2.into() {
Some("collation/2")
} else {
None
},
}
},
}
}
}
@@ -320,7 +322,7 @@ impl PeerSetProtocolNames {
let mut names = HashMap::new();
for protocol in PeerSet::iter() {
match protocol {
PeerSet::Validation =>
PeerSet::Validation => {
for version in ValidationVersion::iter() {
Self::register_main_protocol(
&mut protocols,
@@ -330,7 +332,8 @@ impl PeerSetProtocolNames {
&genesis_hash,
fork_id,
);
},
}
},
PeerSet::Collation => {
for version in CollationVersion::iter() {
Self::register_main_protocol(
@@ -566,7 +569,7 @@ mod tests {
for protocol in PeerSet::iter() {
match protocol {
PeerSet::Validation =>
PeerSet::Validation => {
for version in ValidationVersion::iter() {
assert_eq!(
protocol_names.get_name(protocol, version.into()),
@@ -577,8 +580,9 @@ mod tests {
version.into(),
),
);
},
PeerSet::Collation =>
}
},
PeerSet::Collation => {
for version in CollationVersion::iter() {
assert_eq!(
protocol_names.get_name(protocol, version.into()),
@@ -589,7 +593,8 @@ mod tests {
version.into(),
),
);
},
}
},
}
}
}
@@ -598,18 +603,20 @@ mod tests {
fn all_protocol_versions_have_labels() {
for protocol in PeerSet::iter() {
match protocol {
PeerSet::Validation =>
PeerSet::Validation => {
for version in ValidationVersion::iter() {
protocol
.get_protocol_label(version.into())
.expect("All validation protocol versions must have a label.");
},
PeerSet::Collation =>
}
},
PeerSet::Collation => {
for version in CollationVersion::iter() {
protocol
.get_protocol_label(version.into())
.expect("All collation protocol versions must have a label.");
},
}
},
}
}
}
@@ -74,10 +74,10 @@ impl UnifiedReputationChange {
/// Whether the reputation change is for good behavior.
pub const fn is_benefit(&self) -> bool {
match self {
Self::BenefitMajorFirst(_) |
Self::BenefitMajor(_) |
Self::BenefitMinorFirst(_) |
Self::BenefitMinor(_) => true,
Self::BenefitMajorFirst(_)
| Self::BenefitMajor(_)
| Self::BenefitMinorFirst(_)
| Self::BenefitMinor(_) => true,
_ => false,
}
}
@@ -281,8 +281,8 @@ impl Protocol {
// wasting precious time.
let available_bandwidth = 7 * MIN_BANDWIDTH_BYTES / 10;
let size = u64::saturating_sub(
ATTESTED_CANDIDATE_TIMEOUT.as_millis() as u64 * available_bandwidth /
(1000 * MAX_CODE_SIZE as u64),
ATTESTED_CANDIDATE_TIMEOUT.as_millis() as u64 * available_bandwidth
/ (1000 * MAX_CODE_SIZE as u64),
MAX_PARALLEL_ATTESTED_CANDIDATE_REQUESTS as u64,
);
debug_assert!(
@@ -91,9 +91,9 @@ impl RequestError {
/// Whether the error represents some kind of timeout condition.
pub fn is_timed_out(&self) -> bool {
match self {
Self::Canceled(_) |
Self::NetworkError(network::RequestFailure::Obsolete) |
Self::NetworkError(network::RequestFailure::Network(
Self::Canceled(_)
| Self::NetworkError(network::RequestFailure::Obsolete)
| Self::NetworkError(network::RequestFailure::Network(
network::OutboundFailure::Timeout,
)) => true,
_ => false,