@@ -173,7 +173,7 @@ async fn run_listener<T: Signer + 'static>(
173
173
}
174
174
175
175
async fn run ( run_options : config:: RunOptions ) {
176
- let signer = signer:: Local :: try_new ( run_options. clone ( ) ) . expect ( "Failed to create signer" ) ;
176
+ let signer = signer:: FileSigner :: try_new ( run_options. clone ( ) ) . expect ( "Failed to create signer" ) ;
177
177
let client = PubsubClient :: new ( & run_options. pythnet_url )
178
178
. await
179
179
. expect ( "Invalid WebSocket URL" ) ;
@@ -238,7 +238,7 @@ async fn main() {
238
238
239
239
// Generate keypair (secret + public key)
240
240
let ( secret_key, _) = secp. generate_keypair ( & mut rng) ;
241
- let signer = signer:: Local { secret_key } ;
241
+ let signer = signer:: FileSigner { secret_key } ;
242
242
let ( pubkey, pubkey_evm) = signer. get_public_key ( ) . expect ( "Failed to get public key" ) ;
243
243
244
244
let guardian_key = GuardianKey {
@@ -471,15 +471,15 @@ mod tests {
471
471
-----END WORMHOLE GUARDIAN PRIVATE KEY-----
472
472
"
473
473
. to_string ( ) ;
474
- let guardian_key = crate :: signer:: Local :: parse_and_verify_proto_guardian_key (
474
+ let guardian_key = crate :: signer:: FileSigner :: parse_and_verify_proto_guardian_key (
475
475
content,
476
476
config:: Mode :: Production ,
477
477
)
478
478
. expect ( "Failed to parse and verify guardian key" ) ;
479
479
assert ! ( !guardian_key. unsafe_deterministic_key) ;
480
480
let secret_key = SecretKey :: from_slice ( & guardian_key. data )
481
481
. expect ( "Failed to create SecretKey from bytes" ) ;
482
- let signer = signer:: Local { secret_key } ;
482
+ let signer = signer:: FileSigner { secret_key } ;
483
483
assert_eq ! (
484
484
hex:: encode( secret_key. secret_bytes( ) ) ,
485
485
"f2f3127bff540c8441f99763f586858ef340c9962ad62b6181cd77203e81808f" ,
0 commit comments