From aa375695869cbeae7b62e04b8374358ed7411e02 Mon Sep 17 00:00:00 2001 From: Noah Citron Date: Wed, 11 Dec 2024 15:16:22 -0500 Subject: [PATCH] fmt --- opstack/src/consensus.rs | 18 ++++++++++-------- 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/opstack/src/consensus.rs b/opstack/src/consensus.rs index 995f10e9..cc538c10 100644 --- a/opstack/src/consensus.rs +++ b/opstack/src/consensus.rs @@ -174,13 +174,14 @@ fn verify_unsafe_signer(config: Config, signer: Arc>) { eth_config.default_checkpoint = checkpoint; } - let mut eth_consensus = EthConsensusClient::::new( - ð_config - .consensus_rpc - .clone() - .ok_or_else(|| eyre!("missing consensus rpc"))?, - Arc::new(eth_config.into()), - )?; + let mut eth_consensus = + EthConsensusClient::::new( + ð_config + .consensus_rpc + .clone() + .ok_or_else(|| eyre!("missing consensus rpc"))?, + Arc::new(eth_config.into()), + )?; let block = eth_consensus .block_recv() @@ -235,7 +236,8 @@ fn verify_unsafe_signer(config: Config, signer: Arc>) { } // Replace unsafe signer if different - let verified_signer = Address::from_slice(&storage_proof.value.to_be_bytes::<32>()[12..32]); + let verified_signer = + Address::from_slice(&storage_proof.value.to_be_bytes::<32>()[12..32]); { let mut curr_signer = signer.lock().map_err(|_| eyre!("failed to lock signer"))?; if verified_signer != *curr_signer {