@@ -173,7 +173,7 @@ async fn run_listener<T: Signer + 'static>(
173173}
174174
175175async fn run ( run_options : config:: RunOptions ) {
176- let signer = signer:: Local :: try_new ( run_options. clone ( ) ) . expect ( "Failed to create signer" ) ;
176+ let signer = signer:: FileSigner :: try_new ( run_options. clone ( ) ) . expect ( "Failed to create signer" ) ;
177177 let client = PubsubClient :: new ( & run_options. pythnet_url )
178178 . await
179179 . expect ( "Invalid WebSocket URL" ) ;
@@ -238,7 +238,7 @@ async fn main() {
238238
239239 // Generate keypair (secret + public key)
240240 let ( secret_key, _) = secp. generate_keypair ( & mut rng) ;
241- let signer = signer:: Local { secret_key } ;
241+ let signer = signer:: FileSigner { secret_key } ;
242242 let ( pubkey, pubkey_evm) = signer. get_public_key ( ) . expect ( "Failed to get public key" ) ;
243243
244244 let guardian_key = GuardianKey {
@@ -471,15 +471,15 @@ mod tests {
471471 -----END WORMHOLE GUARDIAN PRIVATE KEY-----
472472 "
473473 . to_string ( ) ;
474- let guardian_key = crate :: signer:: Local :: parse_and_verify_proto_guardian_key (
474+ let guardian_key = crate :: signer:: FileSigner :: parse_and_verify_proto_guardian_key (
475475 content,
476476 config:: Mode :: Production ,
477477 )
478478 . expect ( "Failed to parse and verify guardian key" ) ;
479479 assert ! ( !guardian_key. unsafe_deterministic_key) ;
480480 let secret_key = SecretKey :: from_slice ( & guardian_key. data )
481481 . expect ( "Failed to create SecretKey from bytes" ) ;
482- let signer = signer:: Local { secret_key } ;
482+ let signer = signer:: FileSigner { secret_key } ;
483483 assert_eq ! (
484484 hex:: encode( secret_key. secret_bytes( ) ) ,
485485 "f2f3127bff540c8441f99763f586858ef340c9962ad62b6181cd77203e81808f" ,
0 commit comments