Skip to content

Commit dc2c10a

Browse files
committed
refacto: remove feature random
1 parent 7ae9a6c commit dc2c10a

File tree

12 files changed

+82
-124
lines changed

12 files changed

+82
-124
lines changed

mithril-client/Cargo.toml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,6 @@ reqwest = { version = "0.12.12", default-features = false, features = [
6969
httpmock = "0.7.0"
7070
indicatif = { version = "0.17.9", features = ["tokio"] }
7171
mithril-common = { path = "../mithril-common", version = "=0.4", default-features = false, features = [
72-
"random",
7372
"test_tools",
7473
] }
7574
mockall = "0.13.1"

mithril-common/Cargo.toml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ pallas-network = { version = "0.32.0", optional = true }
5656
pallas-primitives = { version = "0.32.0", optional = true }
5757
pallas-traverse = { version = "0.32.0", optional = true }
5858
rand_chacha = "0.3.1"
59-
rand_core = "0.6.4"
59+
rand_core = { version = "0.6.4", features = ["getrandom"] }
6060
rayon = "1.10.0"
6161
reqwest = { version = "0.12.12", optional = true }
6262
semver = "1.0.24"
@@ -81,7 +81,6 @@ wasm-bindgen = "0.2.99"
8181
criterion = { version = "0.5.1", features = ["html_reports", "async_tokio"] }
8282
mockall = "0.13.1"
8383
pallas-crypto = "0.32.0"
84-
rand_core = { version = "0.6.4", features = ["getrandom"] }
8584
reqwest = { version = "0.12.12", features = ["json"] }
8685
slog-async = "2.8.0"
8786
slog-term = "2.9.1"
@@ -94,8 +93,7 @@ mithril-build-script = { path = "../internal/mithril-build-script", version = "=
9493
default = ["rug-backend"]
9594

9695
# Full feature set
97-
full = ["random", "fs", "test_tools"]
98-
random = ["rand_core/getrandom"]
96+
full = ["fs", "test_tools"]
9997
fs = [
10098
"tokio/fs",
10199
"tokio/process",
@@ -116,7 +114,7 @@ num-integer-backend = ["mithril-stm/num-integer-backend"]
116114
# Disable signer certification, to be used only for tests
117115
allow_skip_signer_certification = []
118116
# Enable all tests tools
119-
test_tools = ["apispec", "test_http_server", "random"]
117+
test_tools = ["apispec", "test_http_server"]
120118
# Enable tools to helps validate conformity to an OpenAPI specification
121119
apispec = ["dep:glob", "dep:jsonschema", "dep:warp", "dep:reqwest"]
122120
test_http_server = ["dep:warp"]

mithril-common/src/chain_observer/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ pub use model::{
1010
ChainAddress, TxDatum, TxDatumBuilder, TxDatumError, TxDatumFieldTypeName, TxDatumFieldValue,
1111
};
1212

13-
cfg_fs_random! {
13+
cfg_fs! {
1414
mod builder;
1515
mod cli_observer;
1616
mod pallas_observer;

mithril-common/src/chain_observer/model.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ use thiserror::Error;
77

88
use crate::{StdError, StdResult};
99

10-
cfg_fs_random! {
10+
cfg_fs! {
1111
use serde::Deserialize;
1212
use anyhow::Context;
1313
use pallas_codec::minicbor::{Decode, Decoder, decode};
Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,10 @@
11
mod codec;
2+
mod cold_key;
23
mod key_certification;
34
mod opcert;
45

56
pub use codec::*;
67
pub use key_certification::*;
78
pub use opcert::*;
89

9-
cfg_random! {
10-
mod cold_key;
11-
12-
pub use cold_key::*;
13-
}
10+
pub use cold_key::*;

mithril-common/src/crypto_helper/era.rs

Lines changed: 22 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
11
use ed25519_dalek::{Signer, SigningKey};
2-
#[cfg(feature = "random")]
3-
use rand_chacha::rand_core;
42
use rand_chacha::rand_core::{CryptoRng, RngCore, SeedableRng};
53
use rand_chacha::ChaCha20Rng;
64
use serde::{Deserialize, Serialize};
@@ -49,8 +47,7 @@ impl EraMarkersSigner {
4947
Self::create_test_signer(rng)
5048
}
5149

52-
#[cfg(any(test, feature = "random"))]
53-
#[cfg_attr(docsrs, doc(cfg(feature = "random")))]
50+
#[cfg(test)]
5451
/// [EraMarkersSigner] non deterministic
5552
pub fn create_non_deterministic_signer() -> Self {
5653
let rng = rand_core::OsRng;
@@ -118,29 +115,28 @@ mod tests {
118115
.expect("Decoding golden secret key should not fail");
119116
}
120117

121-
cfg_random! {
122-
#[test]
123-
fn test_generate_test_deterministic_keypair() {
124-
let signer = EraMarkersSigner::create_deterministic_signer();
125-
let verifier = signer.create_verifier();
126-
let signer_2 = EraMarkersSigner::create_deterministic_signer();
127-
let verifier_2 = signer.create_verifier();
128-
assert_eq!(signer.secret_key.to_bytes(), signer_2.secret_key.to_bytes());
129-
assert_eq!(
130-
verifier.verification_key.as_bytes(),
131-
verifier_2.verification_key.as_bytes()
132-
);
133-
134-
println!(
135-
"Deterministic Verification Key={}",
136-
verifier.verification_key.to_json_hex().unwrap()
137-
);
138-
println!(
139-
"Deterministic Secret Key=={}",
140-
signer.secret_key.to_json_hex().unwrap()
141-
);
142-
}
118+
#[test]
119+
fn test_generate_test_deterministic_keypair() {
120+
let signer = EraMarkersSigner::create_deterministic_signer();
121+
let verifier = signer.create_verifier();
122+
let signer_2 = EraMarkersSigner::create_deterministic_signer();
123+
let verifier_2 = signer.create_verifier();
124+
assert_eq!(signer.secret_key.to_bytes(), signer_2.secret_key.to_bytes());
125+
assert_eq!(
126+
verifier.verification_key.as_bytes(),
127+
verifier_2.verification_key.as_bytes()
128+
);
129+
130+
println!(
131+
"Deterministic Verification Key={}",
132+
verifier.verification_key.to_json_hex().unwrap()
133+
);
134+
println!(
135+
"Deterministic Secret Key=={}",
136+
signer.secret_key.to_json_hex().unwrap()
137+
);
143138
}
139+
144140
#[test]
145141
fn test_generate_test_non_deterministic_keypair() {
146142
let signer = EraMarkersSigner::create_non_deterministic_signer();

mithril-common/src/crypto_helper/genesis.rs

Lines changed: 17 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
use crate::{StdError, StdResult};
22
use anyhow::anyhow;
33
use ed25519_dalek::{Signer, SigningKey};
4-
#[cfg(feature = "random")]
5-
use rand_chacha::rand_core;
64
use rand_chacha::rand_core::{CryptoRng, RngCore, SeedableRng};
75
use rand_chacha::ChaCha20Rng;
86
use serde::{Deserialize, Serialize};
@@ -39,12 +37,10 @@ impl ProtocolGenesisSigner {
3937
Self::create_test_genesis_signer(rng)
4038
}
4139

42-
cfg_random! {
43-
/// [ProtocolGenesisSigner] non deterministic
44-
pub fn create_non_deterministic_genesis_signer() -> Self {
45-
let rng = rand_core::OsRng;
46-
Self::create_test_genesis_signer(rng)
47-
}
40+
/// [ProtocolGenesisSigner] non deterministic
41+
pub fn create_non_deterministic_genesis_signer() -> Self {
42+
let rng = rand_core::OsRng;
43+
Self::create_test_genesis_signer(rng)
4844
}
4945

5046
/// Get the [ProtocolGenesisSecretKey]
@@ -135,21 +131,19 @@ mod tests {
135131
);
136132
}
137133

138-
cfg_random! {
139-
#[test]
140-
fn test_generate_test_non_deterministic_genesis_keypair() {
141-
let genesis_signer = ProtocolGenesisSigner::create_non_deterministic_genesis_signer();
142-
let genesis_verifier = genesis_signer.create_genesis_verifier();
143-
144-
println!(
145-
"Non Deterministic Genesis Verification Key={}",
146-
genesis_verifier.verification_key.to_json_hex().unwrap()
147-
);
148-
println!(
149-
"Non Deterministic Genesis Secret Key=={}",
150-
genesis_signer.secret_key.to_json_hex().unwrap()
151-
);
152-
}
134+
#[test]
135+
fn test_generate_test_non_deterministic_genesis_keypair() {
136+
let genesis_signer = ProtocolGenesisSigner::create_non_deterministic_genesis_signer();
137+
let genesis_verifier = genesis_signer.create_genesis_verifier();
138+
139+
println!(
140+
"Non Deterministic Genesis Verification Key={}",
141+
genesis_verifier.verification_key.to_json_hex().unwrap()
142+
);
143+
println!(
144+
"Non Deterministic Genesis Secret Key=={}",
145+
genesis_signer.secret_key.to_json_hex().unwrap()
146+
);
153147
}
154148

155149
#[test]

mithril-common/src/crypto_helper/mod.rs

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,7 @@ cfg_test_tools! {
1313
pub mod tests_setup;
1414
}
1515

16-
cfg_random! {
17-
pub use cardano::ColdKeyGenerator;
18-
}
16+
pub use cardano::ColdKeyGenerator;
1917

2018
pub use cardano::{
2119
KESPeriod, OpCert, ProtocolInitializerErrorWrapper, ProtocolRegistrationErrorWrapper,

mithril-common/src/lib.rs

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -20,26 +20,6 @@ macro_rules! cfg_fs {
2020
}
2121
}
2222

23-
macro_rules! cfg_random {
24-
($($item:item)*) => {
25-
$(
26-
#[cfg(any(test, feature = "random"))]
27-
#[cfg_attr(docsrs, doc(cfg(feature = "random")))]
28-
$item
29-
)*
30-
}
31-
}
32-
33-
macro_rules! cfg_fs_random {
34-
($($item:item)*) => {
35-
$(
36-
#[cfg(all(feature = "fs", feature = "random"))]
37-
#[cfg_attr(docsrs, doc(all(feature = "fs", feature = "random")))]
38-
$item
39-
)*
40-
}
41-
}
42-
4323
macro_rules! cfg_test_tools {
4424
($($item:item)*) => {
4525
$(

mithril-common/src/protocol/signer_builder.rs

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -123,19 +123,17 @@ impl SignerBuilder {
123123
))
124124
}
125125

126-
cfg_random! {
127-
/// Build non deterministic [SingleSigner] and [ProtocolInitializer] based on the registered parties.
128-
pub fn build_single_signer(
129-
&self,
130-
signer_with_stake: SignerWithStake,
131-
kes_secret_key_path: Option<&Path>,
132-
) -> StdResult<(SingleSigner, ProtocolInitializer)> {
133-
self.build_single_signer_with_rng(
134-
signer_with_stake,
135-
kes_secret_key_path,
136-
&mut rand_core::OsRng,
137-
)
138-
}
126+
/// Build non deterministic [SingleSigner] and [ProtocolInitializer] based on the registered parties.
127+
pub fn build_single_signer(
128+
&self,
129+
signer_with_stake: SignerWithStake,
130+
kes_secret_key_path: Option<&Path>,
131+
) -> StdResult<(SingleSigner, ProtocolInitializer)> {
132+
self.build_single_signer_with_rng(
133+
signer_with_stake,
134+
kes_secret_key_path,
135+
&mut rand_core::OsRng,
136+
)
139137
}
140138

141139
/// Build deterministic [SingleSigner] and [ProtocolInitializer] based on the registered parties.

0 commit comments

Comments
 (0)