Skip to content

Commit 8107b60

Browse files
committed
Updated to v0.8.1
1 parent 70f1209 commit 8107b60

File tree

6 files changed

+23
-39
lines changed

6 files changed

+23
-39
lines changed

.github/workflows/lint.yml

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -21,13 +21,6 @@ jobs:
2121
with:
2222
go-version: 1.23
2323

24-
- name: Caching
25-
uses: actions/cache@v4
26-
with:
27-
path: ~/go/pkg/mod
28-
key: go-${{ hashFiles('**/go.sum') }}
29-
restore-keys: go-
30-
3124
- name: Dependencies
3225
run: go mod vendor
3326

@@ -36,6 +29,8 @@ jobs:
3629

3730
- name: Codestyle
3831
uses: golangci/golangci-lint-action@v8
32+
with:
33+
version: v2.1.6
3934

4035
- name: Golang Vulncheck
4136
uses: Templum/govulncheck-action@v1.0.2

.github/workflows/test.yml

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,6 @@ jobs:
2020
with:
2121
go-version: 1.23
2222

23-
- name: Caching
24-
uses: actions/cache@v4
25-
with:
26-
path: ~/go/pkg/mod
27-
key: go-${{ hashFiles('**/go.sum') }}
28-
restore-keys: go-
29-
3023
- name: Dependencies
3124
run: go mod vendor
3225

internal/bip322/verify_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ func (s *VerifyTestSuite) TestVerifyIncorrect() {
113113

114114
valid, err := bip322.Verify(address, tt.signedMessage.Message, signatureDecoded)
115115
s.Require().EqualError(err, tt.expectedError)
116-
s.False(valid)
116+
s.Require().False(valid)
117117
})
118118
}
119119
}
@@ -183,7 +183,7 @@ func (s *VerifyTestSuite) TestVerify() {
183183

184184
valid, err := bip322.Verify(address, tt.Message, signatureDecoded)
185185
s.Require().NoError(err)
186-
s.True(valid)
186+
s.Require().True(valid)
187187
})
188188
}
189189
}

internal/generic/flags/recovery_flags_test.go

Lines changed: 12 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -20,19 +20,19 @@ func TestRecoveryFlagTestSuite(t *testing.T) {
2020
}
2121

2222
func (s *RecoveryFlagTestSuite) TestAll() {
23-
s.Equal([]int{27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42}, flags.All())
23+
s.Require().Equal([]int{27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42}, flags.All())
2424
}
2525

2626
func (s *RecoveryFlagTestSuite) TestCompressed() {
27-
s.Equal([]int{31, 32, 33, 34}, flags.Compressed())
27+
s.Require().Equal([]int{31, 32, 33, 34}, flags.Compressed())
2828
}
2929

3030
func (s *RecoveryFlagTestSuite) TestElectrumP2WPKH() {
31-
s.Equal([]int{31, 32, 33, 34}, flags.ElectrumP2WPKH())
31+
s.Require().Equal([]int{31, 32, 33, 34}, flags.ElectrumP2WPKH())
3232
}
3333

3434
func (s *RecoveryFlagTestSuite) TestElectrumP2SHAndP2WPKH() {
35-
s.Equal([]int{31, 32, 33, 34}, flags.ElectrumP2SHAndP2WPKH())
35+
s.Require().Equal([]int{31, 32, 33, 34}, flags.ElectrumP2SHAndP2WPKH())
3636
}
3737

3838
func (s *RecoveryFlagTestSuite) TestGetKeyID() {
@@ -50,10 +50,8 @@ func (s *RecoveryFlagTestSuite) TestGetKeyID() {
5050
}
5151

5252
for _, tt := range tests {
53-
s.T().Run(tt.name, func(t *testing.T) {
54-
if got := flags.GetKeyID(tt.recoveryFlag); got != tt.expectedKeyID {
55-
t.Errorf("GetKeyID() = %v, want %v", got, tt.expectedKeyID)
56-
}
53+
s.Run(tt.name, func() {
54+
s.Require().Equal(tt.expectedKeyID, flags.GetKeyID(tt.recoveryFlag))
5755
})
5856
}
5957
}
@@ -70,26 +68,24 @@ func (s *RecoveryFlagTestSuite) TestShouldBeCompressed() {
7068
}
7169

7270
for _, tt := range tests {
73-
s.T().Run(tt.name, func(t *testing.T) {
74-
if got := flags.ShouldBeCompressed(tt.recoveryFlag); got != tt.expected {
75-
t.Errorf("ShouldBeCompressed() = %v, want %v", got, tt.expected)
76-
}
71+
s.Run(tt.name, func() {
72+
s.Require().Equal(tt.expected, flags.ShouldBeCompressed(tt.recoveryFlag))
7773
})
7874
}
7975
}
8076

8177
func (s *RecoveryFlagTestSuite) TestTrezor() {
82-
s.Equal([]int{35, 36, 37, 38, 39, 40, 41, 42}, flags.Trezor())
78+
s.Require().Equal([]int{35, 36, 37, 38, 39, 40, 41, 42}, flags.Trezor())
8379
}
8480

8581
func (s *RecoveryFlagTestSuite) TestTrezorP2WPKH() {
86-
s.Equal([]int{39, 40, 41, 42}, flags.TrezorP2WPKH())
82+
s.Require().Equal([]int{39, 40, 41, 42}, flags.TrezorP2WPKH())
8783
}
8884

8985
func (s *RecoveryFlagTestSuite) TestTrezorP2SHAndP2WPKH() {
90-
s.Equal([]int{35, 36, 37, 38}, flags.TrezorP2SHAndP2WPKH())
86+
s.Require().Equal([]int{35, 36, 37, 38}, flags.TrezorP2SHAndP2WPKH())
9187
}
9288

9389
func (s *RecoveryFlagTestSuite) TestUncompressed() {
94-
s.Equal([]int{27, 28, 29, 30}, flags.Uncompressed())
90+
s.Require().Equal([]int{27, 28, 29, 30}, flags.Uncompressed())
9591
}

internal/generic/signature/signature_test.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func TestServiceTestSuite(t *testing.T) {
4747
func (s *SignatureTestSuite) TestParseCompactInvalid() {
4848
compactedSignature, err := signature.ParseCompact([]byte{})
4949
s.Require().EqualError(err, "invalid compact signature size")
50-
s.Nil(compactedSignature)
50+
s.Require().Nil(compactedSignature)
5151
}
5252

5353
func (s *SignatureTestSuite) TestParseCompactInvalidRecoveryCode() {
@@ -63,7 +63,7 @@ func (s *SignatureTestSuite) TestParseCompactInvalidRecoveryCode() {
6363
0xc9,
6464
})
6565
s.Require().EqualError(err, "invalid compact signature recovery code")
66-
s.Nil(compactedSignature)
66+
s.Require().Nil(compactedSignature)
6767
}
6868

6969
func (s *SignatureTestSuite) TestParseCompact() {
@@ -75,8 +75,8 @@ func (s *SignatureTestSuite) TestParseCompact() {
7575
S := s.getFieldFromSignature(compactedSignature, "s")
7676

7777
// Ensure they match what we defined
78-
s.Equal("112454100686917088716763005039207074580155840372180209748670933598947425987108", R.String())
79-
s.Equal("23603267825273168310009216611640910854054822424267934178492474518750065713966", S.String())
78+
s.Require().Equal("112454100686917088716763005039207074580155840372180209748670933598947425987108", R.String())
79+
s.Require().Equal("23603267825273168310009216611640910854054822424267934178492474518750065713966", S.String())
8080
}
8181

8282
func (s *SignatureTestSuite) TestVerifyInvalidPublicKey() {
@@ -130,7 +130,7 @@ func (s *SignatureTestSuite) getFieldFromSignature(compactedSignature *ecdsa.Sig
130130
// Grab the unexported field
131131
rReflected := elem.FieldByName(field)
132132
m, ok := reflect.NewAt(rReflected.Type(), unsafe.Pointer(rReflected.UnsafeAddr())).Elem().Interface().(btcec.ModNScalar)
133-
s.True(ok)
133+
s.Require().True(ok)
134134

135135
// Grab ModNScalar bytes
136136
bytes := m.Bytes()

internal/generic/verify_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ func (s *VerifyTestSuite) TestVerifyIncorrect() {
115115

116116
valid, err := generic.Verify(address, tt.signedMessage.Message, signatureDecoded, &chaincfg.MainNetParams)
117117
s.Require().EqualError(err, tt.expectedError)
118-
s.False(valid)
118+
s.Require().False(valid)
119119
})
120120
}
121121
}
@@ -305,7 +305,7 @@ func (s *VerifyTestSuite) TestVerify() {
305305

306306
valid, err := generic.Verify(address, tt.Message, signatureDecoded, &chaincfg.MainNetParams)
307307
s.Require().NoError(err)
308-
s.True(valid)
308+
s.Require().True(valid)
309309
})
310310
}
311311
}

0 commit comments

Comments
 (0)