diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2019-07-15 13:04:51 +0200 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2019-07-15 13:04:51 +0200 |
commit | 198991b8621b96d592373c1a5bc2fb193c63fac7 (patch) | |
tree | 259a35a7c96a6a42100ffb2a2ebc5ad324e81f60 /tool | |
parent | 84884193178bb68c8057648d0ec02f79d5f083e4 (diff) |
Make more variables immutable.
- With the MIR-based borrow-checker being more precise than the
AST-based one, we can make more variables immutable.
Diffstat (limited to 'tool')
-rw-r--r-- | tool/src/commands/mod.rs | 2 | ||||
-rw-r--r-- | tool/src/commands/sign.rs | 2 | ||||
-rw-r--r-- | tool/src/sq.rs | 4 |
3 files changed, 4 insertions, 4 deletions
diff --git a/tool/src/commands/mod.rs b/tool/src/commands/mod.rs index c0e8ad68..30a833a1 100644 --- a/tool/src/commands/mod.rs +++ b/tool/src/commands/mod.rs @@ -49,7 +49,7 @@ fn get_signing_keys(tpks: &[openpgp::TPK]) -> Result<Vec<crypto::KeyPair>> { .signing_capable() .map(|k| k.2) { - if let Some(mut secret) = key.secret() { + if let Some(secret) = key.secret() { let unencrypted = match secret { SecretKey::Encrypted(ref e) => { let password = rpassword::read_password_from_tty(Some( diff --git a/tool/src/commands/sign.rs b/tool/src/commands/sign.rs index 3bf56daa..749781dc 100644 --- a/tool/src/commands/sign.rs +++ b/tool/src/commands/sign.rs @@ -45,7 +45,7 @@ fn sign_data(input: &mut io::Read, output_path: Option<&str>, let mut ppr = openpgp::parse::PacketParser::from_file(output_path.unwrap())?; - while let PacketParserResult::Some(mut pp) = ppr { + while let PacketParserResult::Some(pp) = ppr { let (packet, ppr_tmp) = pp.recurse()?; ppr = ppr_tmp; diff --git a/tool/src/sq.rs b/tool/src/sq.rs index 408a320f..ec2fe2f8 100644 --- a/tool/src/sq.rs +++ b/tool/src/sq.rs @@ -219,7 +219,7 @@ fn real_main() -> Result<(), failure::Error> { ("autocrypt", Some(m)) => { match m.subcommand() { ("decode", Some(m)) => { - let mut input = open_or_stdin(m.value_of("input"))?; + let input = open_or_stdin(m.value_of("input"))?; let mut output = create_or_stdout(m.value_of("output"), force)?; let ac = autocrypt::AutocryptHeaders::from_reader(input)?; for h in &ac.headers { @@ -231,7 +231,7 @@ fn real_main() -> Result<(), failure::Error> { } }, ("encode-sender", Some(m)) => { - let mut input = open_or_stdin(m.value_of("input"))?; + let input = open_or_stdin(m.value_of("input"))?; let mut output = create_or_stdout(m.value_of("output"), force)?; let tpk = TPK::from_reader(input)?; |