Refactor signer implementation to use p8k package
- Replaced all instances of p256k1signer with the new p8k.Signer across various modules, including event creation, policy handling, and database interactions. - Updated related test cases and benchmarks to ensure compatibility with the new signer interface. - Bumped version to v0.25.0 to reflect these significant changes and improvements in cryptographic operations.
This commit is contained in:
@@ -9,14 +9,14 @@ import (
|
||||
"time"
|
||||
|
||||
"lol.mleku.dev/chk"
|
||||
p256k1signer "p256k1.mleku.dev/signer"
|
||||
"next.orly.dev/pkg/encoders/event"
|
||||
"next.orly.dev/pkg/encoders/hex"
|
||||
"next.orly.dev/pkg/encoders/tag"
|
||||
"next.orly.dev/pkg/interfaces/signer/p8k"
|
||||
)
|
||||
|
||||
// Helper function to create test event for benchmarks (reuses signer)
|
||||
func createTestEventBench(b *testing.B, signer *p256k1signer.P256K1Signer, content string, kind uint16) *event.E {
|
||||
func createTestEventBench(b *testing.B, signer *p8k.Signer, content string, kind uint16) *event.E {
|
||||
ev := event.New()
|
||||
ev.CreatedAt = time.Now().Unix()
|
||||
ev.Kind = kind
|
||||
@@ -202,7 +202,7 @@ func BenchmarkCheckPolicyMultipleKinds(b *testing.B) {
|
||||
|
||||
// Generate keypair once for all events
|
||||
signer, pubkey := generateTestKeypairB(b)
|
||||
|
||||
|
||||
// Create test events with different kinds
|
||||
events := make([]*event.E, 100)
|
||||
for i := 0; i < 100; i++ {
|
||||
|
||||
@@ -9,7 +9,7 @@ import (
|
||||
"time"
|
||||
|
||||
"lol.mleku.dev/chk"
|
||||
p256k1signer "p256k1.mleku.dev/signer"
|
||||
"next.orly.dev/pkg/interfaces/signer/p8k"
|
||||
"next.orly.dev/pkg/encoders/event"
|
||||
"next.orly.dev/pkg/encoders/hex"
|
||||
"next.orly.dev/pkg/encoders/kind"
|
||||
@@ -23,13 +23,13 @@ func TestPolicyIntegration(t *testing.T) {
|
||||
}
|
||||
|
||||
// Generate test keys
|
||||
allowedSigner := p256k1signer.NewP256K1Signer()
|
||||
allowedSigner := p8k.New()
|
||||
if err := allowedSigner.Generate(); chk.E(err) {
|
||||
t.Fatalf("Failed to generate allowed signer: %v", err)
|
||||
}
|
||||
allowedPubkeyHex := hex.Enc(allowedSigner.Pub())
|
||||
|
||||
unauthorizedSigner := p256k1signer.NewP256K1Signer()
|
||||
unauthorizedSigner := p8k.New()
|
||||
if err := unauthorizedSigner.Generate(); chk.E(err) {
|
||||
t.Fatalf("Failed to generate unauthorized signer: %v", err)
|
||||
}
|
||||
@@ -367,13 +367,13 @@ func TestPolicyWithRelay(t *testing.T) {
|
||||
}
|
||||
|
||||
// Generate keys
|
||||
allowedSigner := p256k1signer.NewP256K1Signer()
|
||||
allowedSigner := p8k.New()
|
||||
if err := allowedSigner.Generate(); chk.E(err) {
|
||||
t.Fatalf("Failed to generate allowed signer: %v", err)
|
||||
}
|
||||
allowedPubkeyHex := hex.Enc(allowedSigner.Pub())
|
||||
|
||||
unauthorizedSigner := p256k1signer.NewP256K1Signer()
|
||||
unauthorizedSigner := p8k.New()
|
||||
if err := unauthorizedSigner.Generate(); chk.E(err) {
|
||||
t.Fatalf("Failed to generate unauthorized signer: %v", err)
|
||||
}
|
||||
|
||||
@@ -10,7 +10,7 @@ import (
|
||||
"time"
|
||||
|
||||
"lol.mleku.dev/chk"
|
||||
p256k1signer "p256k1.mleku.dev/signer"
|
||||
"next.orly.dev/pkg/interfaces/signer/p8k"
|
||||
"next.orly.dev/pkg/encoders/event"
|
||||
"next.orly.dev/pkg/encoders/hex"
|
||||
"next.orly.dev/pkg/encoders/tag"
|
||||
@@ -22,8 +22,8 @@ func int64Ptr(i int64) *int64 {
|
||||
}
|
||||
|
||||
// Helper function to generate a keypair for testing
|
||||
func generateTestKeypair(t *testing.T) (signer *p256k1signer.P256K1Signer, pubkey []byte) {
|
||||
signer = p256k1signer.NewP256K1Signer()
|
||||
func generateTestKeypair(t *testing.T) (signer *p8k.Signer, pubkey []byte) {
|
||||
signer = p8k.New()
|
||||
if err := signer.Generate(); chk.E(err) {
|
||||
t.Fatalf("Failed to generate test keypair: %v", err)
|
||||
}
|
||||
@@ -32,8 +32,8 @@ func generateTestKeypair(t *testing.T) (signer *p256k1signer.P256K1Signer, pubke
|
||||
}
|
||||
|
||||
// Helper function to generate a keypair for benchmarks
|
||||
func generateTestKeypairB(b *testing.B) (signer *p256k1signer.P256K1Signer, pubkey []byte) {
|
||||
signer = p256k1signer.NewP256K1Signer()
|
||||
func generateTestKeypairB(b *testing.B) (signer *p8k.Signer, pubkey []byte) {
|
||||
signer = p8k.New()
|
||||
if err := signer.Generate(); chk.E(err) {
|
||||
b.Fatalf("Failed to generate test keypair: %v", err)
|
||||
}
|
||||
@@ -42,7 +42,7 @@ func generateTestKeypairB(b *testing.B) (signer *p256k1signer.P256K1Signer, pubk
|
||||
}
|
||||
|
||||
// Helper function to create a real test event with proper signing
|
||||
func createTestEvent(t *testing.T, signer *p256k1signer.P256K1Signer, content string, kind uint16) *event.E {
|
||||
func createTestEvent(t *testing.T, signer *p8k.Signer, content string, kind uint16) *event.E {
|
||||
ev := event.New()
|
||||
ev.CreatedAt = time.Now().Unix()
|
||||
ev.Kind = kind
|
||||
@@ -58,7 +58,7 @@ func createTestEvent(t *testing.T, signer *p256k1signer.P256K1Signer, content st
|
||||
}
|
||||
|
||||
// Helper function to create a test event with a specific pubkey (for unauthorized tests)
|
||||
func createTestEventWithPubkey(t *testing.T, signer *p256k1signer.P256K1Signer, content string, kind uint16) *event.E {
|
||||
func createTestEventWithPubkey(t *testing.T, signer *p8k.Signer, content string, kind uint16) *event.E {
|
||||
ev := event.New()
|
||||
ev.CreatedAt = time.Now().Unix()
|
||||
ev.Kind = kind
|
||||
|
||||
Reference in New Issue
Block a user