@@ -5,7 +5,7 @@ use strata_asm_common::{
55} ;
66use strata_asm_txs_admin:: {
77 actions:: { MultisigAction , UpdateAction , updates:: predicate:: ProofType } ,
8- parser :: SignedPayload ,
8+ signed_action :: SignedAction ,
99} ;
1010use strata_identifiers:: { Buf32 , L1Height } ;
1111use strata_predicate:: { PredicateKey , PredicateTypeId } ;
@@ -99,7 +99,7 @@ pub(crate) fn handle_pending_updates(
9999/// * `Err(AdministrationError)` if validation failed or the action could not be processed
100100pub ( crate ) fn handle_action (
101101 state : & mut AdministrationSubprotoState ,
102- payload : SignedPayload ,
102+ payload : SignedAction ,
103103 current_height : L1Height ,
104104 relayer : & mut impl MsgRelayer ,
105105) -> Result < ( ) , AdministrationError > {
@@ -192,7 +192,7 @@ mod tests {
192192 seq:: SequencerUpdate ,
193193 } ,
194194 } ,
195- parser :: SignedPayload ,
195+ signed_action :: SignedAction ,
196196 test_utils:: create_signature_set,
197197 } ;
198198 use strata_crypto:: {
@@ -318,7 +318,7 @@ mod tests {
318318 let action = MultisigAction :: Update ( update. clone ( ) ) ;
319319 let sighash = action. compute_sighash ( seqno) ;
320320 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
321- let payload = SignedPayload :: new ( seqno, action, sig_set) ;
321+ let payload = SignedAction :: new ( seqno, action, sig_set) ;
322322 handle_action ( & mut state, payload, current_height, & mut relayer) . unwrap ( ) ;
323323
324324 // Verify state changes after processing
@@ -371,7 +371,7 @@ mod tests {
371371 let action = MultisigAction :: Update ( update. clone ( ) ) ;
372372 let sighash = action. compute_sighash ( valid_seqno) ;
373373 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
374- let payload = SignedPayload :: new ( valid_seqno, action, sig_set) ;
374+ let payload = SignedAction :: new ( valid_seqno, action, sig_set) ;
375375 let res = handle_action ( & mut state, payload, current_height, & mut relayer) ;
376376 assert ! ( res. is_ok( ) ) ;
377377
@@ -380,7 +380,7 @@ mod tests {
380380 let sighash = action. compute_sighash ( 1 ) ;
381381 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
382382
383- let payload = SignedPayload :: new ( 1 , action, sig_set) ;
383+ let payload = SignedAction :: new ( 1 , action, sig_set) ;
384384 let res = handle_action ( & mut state, payload, current_height, & mut relayer) ;
385385
386386 assert ! ( res. is_err( ) ) ;
@@ -397,7 +397,7 @@ mod tests {
397397 let action = MultisigAction :: Update ( update. clone ( ) ) ;
398398 let sighash = action. compute_sighash ( 0 ) ;
399399 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
400- let payload = SignedPayload :: new ( 0 , action, sig_set) ;
400+ let payload = SignedAction :: new ( 0 , action, sig_set) ;
401401 let res = handle_action ( & mut state, payload, current_height, & mut relayer) ;
402402 assert ! ( matches!( res, Err ( AdministrationError :: InvalidSeqno { .. } ) ) ) ;
403403 }
@@ -438,7 +438,7 @@ mod tests {
438438 let sighash = action. compute_sighash ( payload_seqno) ;
439439 let sig_set = create_signature_set ( & seq_manager_sks, & signer_indices, sighash) ;
440440
441- let payload = SignedPayload :: new ( payload_seqno, action, sig_set) ;
441+ let payload = SignedAction :: new ( payload_seqno, action, sig_set) ;
442442 handle_action ( & mut state, payload, current_height, & mut relayer) . unwrap ( ) ;
443443
444444 // Verify state changes after processing
@@ -531,7 +531,7 @@ mod tests {
531531 let sighash = update_action. compute_sighash ( payload_seqno) ;
532532 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
533533
534- let payload = SignedPayload :: new ( payload_seqno, update_action, sig_set) ;
534+ let payload = SignedAction :: new ( payload_seqno, update_action, sig_set) ;
535535 handle_action ( & mut state, payload, current_height, & mut relayer) . unwrap ( ) ;
536536 }
537537
@@ -552,7 +552,7 @@ mod tests {
552552 let sighash = cancel_action. compute_sighash ( payload_seqno) ;
553553 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
554554
555- let payload = SignedPayload :: new ( payload_seqno, cancel_action, sig_set) ;
555+ let payload = SignedAction :: new ( payload_seqno, cancel_action, sig_set) ;
556556 handle_action ( & mut state, payload, current_height, & mut relayer) . unwrap ( ) ;
557557
558558 // Verify state changes after cancellation
@@ -587,7 +587,7 @@ mod tests {
587587 let cancel_action: CancelAction = arb. generate ( ) ;
588588 let cancel_action = MultisigAction :: Cancel ( cancel_action) ;
589589
590- let payload = SignedPayload :: new ( arb. generate ( ) , cancel_action, sig_set) ;
590+ let payload = SignedAction :: new ( arb. generate ( ) , cancel_action, sig_set) ;
591591 let res = handle_action ( & mut state, payload, current_height, & mut relayer) ;
592592
593593 assert ! ( matches!( res, Err ( AdministrationError :: UnknownAction ( _) ) ) ) ;
@@ -621,7 +621,7 @@ mod tests {
621621 let sighash = update_action. compute_sighash ( update_seqno) ;
622622 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
623623
624- let payload = SignedPayload :: new ( update_seqno, update_action, sig_set) ;
624+ let payload = SignedAction :: new ( update_seqno, update_action, sig_set) ;
625625 handle_action ( & mut state, payload, current_height, & mut relayer) . unwrap ( ) ;
626626
627627 // Cancel the update action (authority seqno is now 1, use seqno 2)
@@ -630,7 +630,7 @@ mod tests {
630630 let sighash = cancel_action. compute_sighash ( cancel_seqno) ;
631631 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
632632
633- let payload = SignedPayload :: new ( cancel_seqno, cancel_action, sig_set) ;
633+ let payload = SignedAction :: new ( cancel_seqno, cancel_action, sig_set) ;
634634 let res = handle_action ( & mut state, payload, current_height, & mut relayer) ;
635635
636636 assert ! ( res. is_ok( ) ) ;
@@ -640,7 +640,7 @@ mod tests {
640640 let retry_seqno = last_seqno + 3 ;
641641 let sighash = cancel_action. compute_sighash ( retry_seqno) ;
642642 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
643- let payload = SignedPayload :: new ( retry_seqno, cancel_action, sig_set) ;
643+ let payload = SignedAction :: new ( retry_seqno, cancel_action, sig_set) ;
644644 let res = handle_action ( & mut state, payload, current_height, & mut relayer) ;
645645 assert ! ( res. is_err( ) ) ;
646646 assert ! ( matches!( res, Err ( AdministrationError :: UnknownAction ( _) ) ) ) ;
@@ -662,15 +662,15 @@ mod tests {
662662 let action = MultisigAction :: Update ( updates[ 0 ] . clone ( ) ) ;
663663 let sighash = action. compute_sighash ( 1 ) ;
664664 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
665- let payload = SignedPayload :: new ( 1 , action, sig_set) ;
665+ let payload = SignedAction :: new ( 1 , action, sig_set) ;
666666 handle_action ( & mut state, payload, current_height, & mut relayer) . unwrap ( ) ;
667667
668668 // Second action at seqno 11 (last_seqno is 1, gap = 10 = max_seqno_gap)
669669 let gap_seqno = 1 + state. max_seqno_gap ( ) . get ( ) as u64 ;
670670 let action = MultisigAction :: Update ( updates[ 1 ] . clone ( ) ) ;
671671 let sighash = action. compute_sighash ( gap_seqno) ;
672672 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
673- let payload = SignedPayload :: new ( gap_seqno, action, sig_set) ;
673+ let payload = SignedAction :: new ( gap_seqno, action, sig_set) ;
674674 let res = handle_action ( & mut state, payload, current_height, & mut relayer) ;
675675
676676 assert ! (
@@ -695,7 +695,7 @@ mod tests {
695695 let action = MultisigAction :: Update ( update) ;
696696 let sighash = action. compute_sighash ( too_far_seqno) ;
697697 let sig_set = create_signature_set ( & admin_sks, & signer_indices, sighash) ;
698- let payload = SignedPayload :: new ( too_far_seqno, action, sig_set) ;
698+ let payload = SignedAction :: new ( too_far_seqno, action, sig_set) ;
699699 let res = handle_action ( & mut state, payload, current_height, & mut relayer) ;
700700
701701 assert ! ( res. is_err( ) ) ;
0 commit comments