Skip to content

Commit

Permalink
Remove stutter from localsigner constructor
Browse files Browse the repository at this point in the history
  • Loading branch information
richardpringle committed Jan 28, 2025
1 parent 139f59f commit 62b26c5
Show file tree
Hide file tree
Showing 41 changed files with 91 additions and 91 deletions.
4 changes: 2 additions & 2 deletions config/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -641,7 +641,7 @@ func getStakingTLSCert(v *viper.Viper) (tls.Certificate, error) {

func getStakingSigner(v *viper.Viper) (bls.Signer, error) {
if v.GetBool(StakingEphemeralSignerEnabledKey) {
key, err := localsigner.NewSigner()
key, err := localsigner.New()
if err != nil {
return nil, fmt.Errorf("couldn't generate ephemeral signing key: %w", err)
}
Expand Down Expand Up @@ -679,7 +679,7 @@ func getStakingSigner(v *viper.Viper) (bls.Signer, error) {
return nil, errMissingStakingSigningKeyFile
}

key, err := localsigner.NewSigner()
key, err := localsigner.New()
if err != nil {
return nil, fmt.Errorf("couldn't generate new signing key: %w", err)
}
Expand Down
2 changes: 1 addition & 1 deletion network/network_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -175,7 +175,7 @@ func newTestNetwork(t *testing.T, count int) (*testDialer, []*testListener, []id
require.NoError(t, err)
nodeID := ids.NodeIDFromCert(cert)

blsKey, err := localsigner.NewSigner()
blsKey, err := localsigner.New()
require.NoError(t, err)

config := defaultConfig
Expand Down
2 changes: 1 addition & 1 deletion network/p2p/acp118/handler_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ func TestHandler(t *testing.T) {
require := require.New(t)

ctx := context.Background()
sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)
pk := sk.PublicKey()
networkID := uint32(123)
Expand Down
2 changes: 1 addition & 1 deletion network/peer/ip_signer_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ func TestIPSigner(t *testing.T) {
require.NoError(err)

tlsKey := tlsCert.PrivateKey.(crypto.Signer)
blsKey, err := localsigner.NewSigner()
blsKey, err := localsigner.New()
require.NoError(err)

s := NewIPSigner(dynIP, tlsKey, blsKey)
Expand Down
2 changes: 1 addition & 1 deletion network/peer/ip_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ func TestSignedIpVerify(t *testing.T) {
cert1, err := staking.ParseCertificate(tlsCert1.Leaf.Raw)
require.NoError(t, err)
tlsKey1 := tlsCert1.PrivateKey.(crypto.Signer)
blsKey1, err := localsigner.NewSigner()
blsKey1, err := localsigner.New()
require.NoError(t, err)

tlsCert2, err := staking.NewTLSCert()
Expand Down
6 changes: 3 additions & 3 deletions network/peer/peer_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,7 @@ func newRawTestPeer(t *testing.T, config Config) *rawTestPeer {
1,
))
tls := tlsCert.PrivateKey.(crypto.Signer)
bls, err := localsigner.NewSigner()
bls, err := localsigner.New()
require.NoError(err)

config.IPSigner = NewIPSigner(ip, tls, bls)
Expand Down Expand Up @@ -327,7 +327,7 @@ func TestInvalidBLSKeyDisconnects(t *testing.T) {
1,
))

bogusBLSKey, err := localsigner.NewSigner()
bogusBLSKey, err := localsigner.New()
require.NoError(err)
require.NoError(rawPeer1.config.Validators.AddStaker(
constants.PrimaryNetworkID,
Expand All @@ -348,7 +348,7 @@ func TestInvalidBLSKeyDisconnects(t *testing.T) {
func TestShouldDisconnect(t *testing.T) {
peerID := ids.GenerateTestNodeID()
txID := ids.GenerateTestID()
blsKey, err := localsigner.NewSigner()
blsKey, err := localsigner.New()
require.NoError(t, err)

tests := []struct {
Expand Down
2 changes: 1 addition & 1 deletion network/peer/test_peer.go
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ func StartTestPeer(
}

tlsKey := tlsCert.PrivateKey.(crypto.Signer)
blsKey, err := localsigner.NewSigner()
blsKey, err := localsigner.New()
if err != nil {
return nil, err
}
Expand Down
2 changes: 1 addition & 1 deletion network/test_network.go
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ func NewTestNetworkConfig(
return nil, err
}

blsKey, err := localsigner.NewSigner()
blsKey, err := localsigner.New()
if err != nil {
return nil, err
}
Expand Down
2 changes: 1 addition & 1 deletion snow/snowtest/context.go
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ func ConsensusContext(ctx *snow.Context) *snow.ConsensusContext {
func Context(tb testing.TB, chainID ids.ID) *snow.Context {
require := require.New(tb)

secretKey, err := localsigner.NewSigner()
secretKey, err := localsigner.New()
require.NoError(err)
publicKey := secretKey.PublicKey()

Expand Down
8 changes: 4 additions & 4 deletions snow/validators/gvalidators/validator_state_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -136,15 +136,15 @@ func TestGetValidatorSet(t *testing.T) {
state := setupState(t, ctrl)

// Happy path
sk0, err := localsigner.NewSigner()
sk0, err := localsigner.New()
require.NoError(err)
vdr0 := &validators.GetValidatorOutput{
NodeID: ids.GenerateTestNodeID(),
PublicKey: sk0.PublicKey(),
Weight: 1,
}

sk1, err := localsigner.NewSigner()
sk1, err := localsigner.New()
require.NoError(err)
vdr1 := &validators.GetValidatorOutput{
NodeID: ids.GenerateTestNodeID(),
Expand Down Expand Up @@ -182,7 +182,7 @@ func TestGetValidatorSet(t *testing.T) {
func TestPublicKeyDeserialize(t *testing.T) {
require := require.New(t)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)
pk := sk.PublicKey()

Expand Down Expand Up @@ -223,7 +223,7 @@ func setupValidatorSet(b *testing.B, size int) map[ids.NodeID]*validators.GetVal
b.Helper()

set := make(map[ids.NodeID]*validators.GetValidatorOutput, size)
sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(b, err)
pk := sk.PublicKey()
for i := 0; i < size; i++ {
Expand Down
14 changes: 7 additions & 7 deletions snow/validators/manager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -215,7 +215,7 @@ func TestGet(t *testing.T) {
_, ok := m.GetValidator(subnetID, nodeID)
require.False(ok)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

pk := sk.PublicKey()
Expand Down Expand Up @@ -305,7 +305,7 @@ func TestGetMap(t *testing.T) {
mp := m.GetMap(subnetID)
require.Empty(mp)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

pk := sk.PublicKey()
Expand Down Expand Up @@ -405,7 +405,7 @@ func TestSample(t *testing.T) {
require.NoError(err)
require.Empty(sampled)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

nodeID0 := ids.GenerateTestNodeID()
Expand Down Expand Up @@ -465,7 +465,7 @@ func TestString(t *testing.T) {
func TestAddCallback(t *testing.T) {
require := require.New(t)

expectedSK, err := localsigner.NewSigner()
expectedSK, err := localsigner.New()
require.NoError(err)

var (
Expand Down Expand Up @@ -513,7 +513,7 @@ func TestAddCallback(t *testing.T) {
func TestAddWeightCallback(t *testing.T) {
require := require.New(t)

expectedSK, err := localsigner.NewSigner()
expectedSK, err := localsigner.New()
require.NoError(err)

var (
Expand Down Expand Up @@ -596,7 +596,7 @@ func TestAddWeightCallback(t *testing.T) {
func TestRemoveWeightCallback(t *testing.T) {
require := require.New(t)

expectedSK, err := localsigner.NewSigner()
expectedSK, err := localsigner.New()
require.NoError(err)

var (
Expand Down Expand Up @@ -679,7 +679,7 @@ func TestRemoveWeightCallback(t *testing.T) {
func TestRemoveCallback(t *testing.T) {
require := require.New(t)

expectedSK, err := localsigner.NewSigner()
expectedSK, err := localsigner.New()
require.NoError(err)

var (
Expand Down
8 changes: 4 additions & 4 deletions snow/validators/set_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -166,7 +166,7 @@ func TestSetGet(t *testing.T) {
_, ok := s.Get(nodeID)
require.False(ok)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

pk := sk.PublicKey()
Expand Down Expand Up @@ -233,7 +233,7 @@ func TestSetMap(t *testing.T) {
m := s.Map()
require.Empty(m)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

pk := sk.PublicKey()
Expand Down Expand Up @@ -331,7 +331,7 @@ func TestSetSample(t *testing.T) {
require.NoError(err)
require.Empty(sampled)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

nodeID0 := ids.GenerateTestNodeID()
Expand Down Expand Up @@ -386,7 +386,7 @@ func TestSetAddCallback(t *testing.T) {
require := require.New(t)

nodeID0 := ids.BuildTestNodeID([]byte{1})
sk0, err := localsigner.NewSigner()
sk0, err := localsigner.New()
require.NoError(err)
pk0 := sk0.PublicKey()
txID0 := ids.GenerateTestID()
Expand Down
2 changes: 1 addition & 1 deletion tests/e2e/p/workflow.go
Original file line number Diff line number Diff line change
Expand Up @@ -115,7 +115,7 @@ var _ = e2e.DescribePChain("[Workflow]", func() {
}

tc.By("issuing an AddPermissionlessValidatorTx", func() {
sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)
pop := signer.NewProofOfPossession(sk)

Expand Down
2 changes: 1 addition & 1 deletion tests/fixture/tmpnet/node.go
Original file line number Diff line number Diff line change
Expand Up @@ -266,7 +266,7 @@ func (n *Node) EnsureBLSSigningKey() error {
}

// Generate a new signing key
newKey, err := localsigner.NewSigner()
newKey, err := localsigner.New()
if err != nil {
return fmt.Errorf("failed to generate staking signer key: %w", err)
}
Expand Down
2 changes: 1 addition & 1 deletion utils/crypto/bls/signer/localsigner/bls_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ func AggregateAndVerify(publicKeys []*bls.PublicKey, signatures []*bls.Signature
}

func NewKeyPair(require *require.Assertions) (*LocalSigner, *bls.PublicKey) {
sk, err := NewSigner()
sk, err := New()
require.NoError(err)
pk := sk.PublicKey()
return sk, pk
Expand Down
2 changes: 1 addition & 1 deletion utils/crypto/bls/signer/localsigner/localsigner.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ type LocalSigner struct {

// NewSecretKey generates a new secret key from the local source of
// cryptographically secure randomness.
func NewSigner() (*LocalSigner, error) {
func New() (*LocalSigner, error) {
var ikm [32]byte
_, err := rand.Read(ikm[:])
if err != nil {
Expand Down
2 changes: 1 addition & 1 deletion utils/crypto/bls/signer/localsigner/serialization_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ func TestSecretKeyBytes(t *testing.T) {

msg := utils.RandomBytes(1234)

sk, err := NewSigner()
sk, err := New()
require.NoError(err)
sig := sk.Sign(msg)
skBytes := sk.ToBytes()
Expand Down
6 changes: 3 additions & 3 deletions vms/platformvm/block/builder/builder_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ func TestBuildBlockShouldReward(t *testing.T) {
validatorEndTime = validatorStartTime.Add(360 * 24 * time.Hour)
)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

rewardOwners := &secp256k1fx.OutputOwners{
Expand Down Expand Up @@ -320,7 +320,7 @@ func TestBuildBlockInvalidStakingDurations(t *testing.T) {
validatorEndTime = now.Add(env.config.MaxStakeDuration)
)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

rewardsOwner := &secp256k1fx.OutputOwners{
Expand Down Expand Up @@ -353,7 +353,7 @@ func TestBuildBlockInvalidStakingDurations(t *testing.T) {
// Add a validator ending past [MaxStakeDuration]
validator2EndTime := now.Add(env.config.MaxStakeDuration + time.Second)

sk, err = localsigner.NewSigner()
sk, err = localsigner.New()
require.NoError(err)

tx2, err := wallet.IssueAddPermissionlessValidatorTx(
Expand Down
4 changes: 2 additions & 2 deletions vms/platformvm/block/executor/proposal_block_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1329,7 +1329,7 @@ func TestAddValidatorProposalBlock(t *testing.T) {
nodeID = ids.GenerateTestNodeID()
)

sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(err)

rewardsOwner := &secp256k1fx.OutputOwners{
Expand Down Expand Up @@ -1414,7 +1414,7 @@ func TestAddValidatorProposalBlock(t *testing.T) {
validatorEndTime = validatorStartTime.Add(env.config.MinStakeDuration)
nodeID = ids.GenerateTestNodeID()

sk, err = localsigner.NewSigner()
sk, err = localsigner.New()
require.NoError(err)

addValidatorTx2, err := wallet.IssueAddPermissionlessValidatorTx(
Expand Down
2 changes: 1 addition & 1 deletion vms/platformvm/block/executor/verifier_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1217,7 +1217,7 @@ func TestBlockExecutionWithComplexity(t *testing.T) {
}

func TestDeactivateLowBalanceL1Validators(t *testing.T) {
sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(t, err)

var (
Expand Down
4 changes: 2 additions & 2 deletions vms/platformvm/network/warp_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -178,7 +178,7 @@ func TestSignatureRequestVerifySubnetToL1Conversion(t *testing.T) {
}

func TestSignatureRequestVerifyL1ValidatorRegistrationRegistered(t *testing.T) {
sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(t, err)

var (
Expand Down Expand Up @@ -545,7 +545,7 @@ func TestSignatureRequestVerifyL1ValidatorRegistrationNotRegistered(t *testing.T
}

func TestSignatureRequestVerifyL1ValidatorWeight(t *testing.T) {
sk, err := localsigner.NewSigner()
sk, err := localsigner.New()
require.NoError(t, err)

const (
Expand Down
Loading

0 comments on commit 62b26c5

Please sign in to comment.