diff --git a/attic/build.rs b/attic/build.rs index 00e0672..3da0fed 100644 --- a/attic/build.rs +++ b/attic/build.rs @@ -11,10 +11,8 @@ fn main() { fn build_bridge() { // Temporary workaround for issue in let hacky_include = { - let dir = tempfile::tempdir() - .expect("Failed to create temporary directory for workaround"); - std::fs::write(dir.path().join("uds-remote-store.md"), "\"\"") - .unwrap(); + let dir = tempfile::tempdir().expect("Failed to create temporary directory for workaround"); + std::fs::write(dir.path().join("uds-remote-store.md"), "\"\"").unwrap(); dir }; diff --git a/attic/src/nix_store/nix_store.rs b/attic/src/nix_store/nix_store.rs index 79a3fc7..3b754f9 100644 --- a/attic/src/nix_store/nix_store.rs +++ b/attic/src/nix_store/nix_store.rs @@ -9,8 +9,8 @@ use tokio::task::spawn_blocking; use super::bindings::{open_nix_store, AsyncWriteAdapter, FfiNixStore}; use super::{to_base_name, StorePath, ValidPathInfo}; -use crate::hash::Hash; use crate::error::AtticResult; +use crate::hash::Hash; /// High-level wrapper for the Unix Domain Socket Nix Store. pub struct NixStore { @@ -201,7 +201,8 @@ impl NixStore { // FIXME: Make this more ergonomic and efficient let nar_size = c_path_info.pin_mut().nar_size(); - let nar_sha256_hash: [u8; 32] = c_path_info.pin_mut().nar_sha256_hash().try_into().unwrap(); + let nar_sha256_hash: [u8; 32] = + c_path_info.pin_mut().nar_sha256_hash().try_into().unwrap(); let references = c_path_info .pin_mut() .references() diff --git a/server/src/storage/s3.rs b/server/src/storage/s3.rs index 3e5739d..448e0a1 100644 --- a/server/src/storage/s3.rs +++ b/server/src/storage/s3.rs @@ -5,11 +5,11 @@ use std::time::Duration; use async_trait::async_trait; use aws_sdk_s3::{ - operation::get_object::builders::GetObjectFluentBuilder, config::Builder as S3ConfigBuilder, - types::{CompletedMultipartUpload, CompletedPart}, - presigning::PresigningConfig, config::{Credentials, Region}, + operation::get_object::builders::GetObjectFluentBuilder, + presigning::PresigningConfig, + types::{CompletedMultipartUpload, CompletedPart}, Client, }; use bytes::BytesMut; @@ -141,7 +141,11 @@ impl S3Backend { Ok((client, file)) } - async fn get_download(&self, req: GetObjectFluentBuilder, prefer_stream: bool) -> ServerResult { + async fn get_download( + &self, + req: GetObjectFluentBuilder, + prefer_stream: bool, + ) -> ServerResult { if prefer_stream { let output = req.send().await.map_err(ServerError::storage_error)?;