Skip to content

Commit f1c95fc

Browse files
fixup: refactor tests to match reviewed PR #3712. Also improve readability and reduce indentation in some places
1 parent 4c19069 commit f1c95fc

File tree

2 files changed

+86
-86
lines changed

2 files changed

+86
-86
lines changed

lightning-liquidity/tests/common/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ type LockingWrapper<T> = lightning::routing::scoring::MultiThreadedLockableScore
6767
#[cfg(not(c_bindings))]
6868
type LockingWrapper<T> = std::sync::Mutex<T>;
6969

70-
pub(crate) type ChannelManager = channelmanager::ChannelManager<
70+
type ChannelManager = channelmanager::ChannelManager<
7171
Arc<ChainMonitor>,
7272
Arc<test_utils::TestBroadcaster>,
7373
Arc<KeysManager>,

lightning-liquidity/tests/lsps2_integration_tests.rs

Lines changed: 85 additions & 85 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ fn setup_test_lsps2(
5555
};
5656

5757
let (service_node, client_node) =
58-
create_service_and_client_nodes("webhook_registration_flow", service_config, client_config);
58+
create_service_and_client_nodes("default_persist_dir", service_config, client_config);
5959

6060
let secp = bitcoin::secp256k1::Secp256k1::new();
6161
let service_node_id = bitcoin::secp256k1::PublicKey::from_secret_key(&secp, &signing_key);
@@ -130,17 +130,17 @@ fn invoice_generation_flow() {
130130
service_node.liquidity_manager.handle_custom_message(get_info_request, client_node_id).unwrap();
131131

132132
let get_info_event = service_node.liquidity_manager.next_event().unwrap();
133-
match get_info_event {
134-
LiquidityEvent::LSPS2Service(LSPS2ServiceEvent::GetInfo {
135-
request_id,
136-
counterparty_node_id,
137-
token,
138-
}) => {
139-
assert_eq!(request_id, get_info_request_id);
140-
assert_eq!(counterparty_node_id, client_node_id);
141-
assert_eq!(token, None);
142-
},
143-
_ => panic!("Unexpected event"),
133+
if let LiquidityEvent::LSPS2Service(LSPS2ServiceEvent::GetInfo {
134+
request_id,
135+
counterparty_node_id,
136+
token,
137+
}) = get_info_event
138+
{
139+
assert_eq!(request_id, get_info_request_id);
140+
assert_eq!(counterparty_node_id, client_node_id);
141+
assert_eq!(token, None);
142+
} else {
143+
panic!("Unexpected event");
144144
}
145145

146146
let raw_opening_params = LSPS2RawOpeningFeeParams {
@@ -192,19 +192,19 @@ fn invoice_generation_flow() {
192192
service_node.liquidity_manager.handle_custom_message(buy_request, client_node_id).unwrap();
193193

194194
let buy_event = service_node.liquidity_manager.next_event().unwrap();
195-
match buy_event {
196-
LiquidityEvent::LSPS2Service(LSPS2ServiceEvent::BuyRequest {
197-
request_id,
198-
counterparty_node_id,
199-
opening_fee_params: ofp,
200-
payment_size_msat: psm,
201-
}) => {
202-
assert_eq!(request_id, buy_request_id);
203-
assert_eq!(counterparty_node_id, client_node_id);
204-
assert_eq!(opening_fee_params, ofp);
205-
assert_eq!(payment_size_msat, psm);
206-
},
207-
_ => panic!("Unexpected event"),
195+
if let LiquidityEvent::LSPS2Service(LSPS2ServiceEvent::BuyRequest {
196+
request_id,
197+
counterparty_node_id,
198+
opening_fee_params: ofp,
199+
payment_size_msat: psm,
200+
}) = buy_event
201+
{
202+
assert_eq!(request_id, buy_request_id);
203+
assert_eq!(counterparty_node_id, client_node_id);
204+
assert_eq!(opening_fee_params, ofp);
205+
assert_eq!(payment_size_msat, psm);
206+
} else {
207+
panic!("Unexpected event");
208208
}
209209

210210
let user_channel_id = 42;
@@ -227,22 +227,22 @@ fn invoice_generation_flow() {
227227
client_node.liquidity_manager.handle_custom_message(buy_response, service_node_id).unwrap();
228228

229229
let invoice_params_event = client_node.liquidity_manager.next_event().unwrap();
230-
match invoice_params_event {
231-
LiquidityEvent::LSPS2Client(LSPS2ClientEvent::InvoiceParametersReady {
232-
request_id,
233-
counterparty_node_id,
234-
intercept_scid: iscid,
235-
cltv_expiry_delta: ced,
236-
payment_size_msat: psm,
237-
}) => {
238-
assert_eq!(request_id, buy_request_id);
239-
assert_eq!(counterparty_node_id, service_node_id);
240-
assert_eq!(intercept_scid, iscid);
241-
assert_eq!(cltv_expiry_delta, ced);
242-
assert_eq!(payment_size_msat, psm);
243-
},
244-
_ => panic!("Unexpected event"),
245-
};
230+
if let LiquidityEvent::LSPS2Client(LSPS2ClientEvent::InvoiceParametersReady {
231+
request_id,
232+
counterparty_node_id,
233+
intercept_scid: iscid,
234+
cltv_expiry_delta: ced,
235+
payment_size_msat: psm,
236+
}) = invoice_params_event
237+
{
238+
assert_eq!(request_id, buy_request_id);
239+
assert_eq!(counterparty_node_id, service_node_id);
240+
assert_eq!(intercept_scid, iscid);
241+
assert_eq!(cltv_expiry_delta, ced);
242+
assert_eq!(payment_size_msat, psm);
243+
} else {
244+
panic!("Unexpected event");
245+
}
246246

247247
let description = "asdf";
248248
let expiry_secs = 3600;
@@ -685,40 +685,40 @@ fn invalid_token_flow() {
685685
service_node.liquidity_manager.handle_custom_message(get_info_request, client_node_id).unwrap();
686686

687687
let get_info_event = service_node.liquidity_manager.next_event().unwrap();
688-
match get_info_event {
689-
LiquidityEvent::LSPS2Service(LSPS2ServiceEvent::GetInfo {
690-
request_id,
691-
counterparty_node_id,
692-
token,
693-
}) => {
694-
assert_eq!(request_id, get_info_request_id);
695-
assert_eq!(counterparty_node_id, client_node_id);
696-
assert_eq!(token, Some("invalid_token".to_string()));
697-
698-
// Service rejects the token as invalid
699-
service_handler.invalid_token_provided(&client_node_id, request_id.clone()).unwrap();
700-
701-
// Attempt to respond to the same request again which should fail
702-
// because the request has been removed from pending_requests
703-
let raw_opening_params = LSPS2RawOpeningFeeParams {
704-
min_fee_msat: 100,
705-
proportional: 21,
706-
valid_until: LSPSDateTime::from_str("2035-05-20T08:30:45Z").unwrap(),
707-
min_lifetime: 144,
708-
max_client_to_self_delay: 128,
709-
min_payment_size_msat: 1,
710-
max_payment_size_msat: 100_000_000,
711-
};
712-
713-
let result = service_handler.opening_fee_params_generated(
714-
&client_node_id,
715-
request_id.clone(),
716-
vec![raw_opening_params],
717-
);
688+
if let LiquidityEvent::LSPS2Service(LSPS2ServiceEvent::GetInfo {
689+
request_id,
690+
counterparty_node_id,
691+
token,
692+
}) = get_info_event
693+
{
694+
assert_eq!(request_id, get_info_request_id);
695+
assert_eq!(counterparty_node_id, client_node_id);
696+
assert_eq!(token, Some("invalid_token".to_string()));
697+
698+
// Service rejects the token as invalid
699+
service_handler.invalid_token_provided(&client_node_id, request_id.clone()).unwrap();
700+
701+
// Attempt to respond to the same request again which should fail
702+
// because the request has been removed from pending_requests
703+
let raw_opening_params = LSPS2RawOpeningFeeParams {
704+
min_fee_msat: 100,
705+
proportional: 21,
706+
valid_until: LSPSDateTime::from_str("2035-05-20T08:30:45Z").unwrap(),
707+
min_lifetime: 144,
708+
max_client_to_self_delay: 128,
709+
min_payment_size_msat: 1,
710+
max_payment_size_msat: 100_000_000,
711+
};
712+
713+
let result = service_handler.opening_fee_params_generated(
714+
&client_node_id,
715+
request_id.clone(),
716+
vec![raw_opening_params],
717+
);
718718

719-
assert!(result.is_err(), "Request should have been removed from pending_requests");
720-
},
721-
_ => panic!("Unexpected event"),
719+
assert!(result.is_err(), "Request should have been removed from pending_requests");
720+
} else {
721+
panic!("Unexpected event");
722722
}
723723

724724
let get_info_error_response = get_lsps_message!(service_node, client_node_id);
@@ -729,16 +729,16 @@ fn invalid_token_flow() {
729729
.unwrap_err();
730730

731731
let error_event = client_node.liquidity_manager.next_event().unwrap();
732-
match error_event {
733-
LiquidityEvent::LSPS2Client(LSPS2ClientEvent::GetInfoFailed {
734-
request_id,
735-
counterparty_node_id,
736-
error,
737-
}) => {
738-
assert_eq!(request_id, get_info_request_id);
739-
assert_eq!(counterparty_node_id, service_node_id);
740-
assert_eq!(error.code, 200); // LSPS2_GET_INFO_REQUEST_UNRECOGNIZED_OR_STALE_TOKEN_ERROR_CODE
741-
},
742-
_ => panic!("Expected LSPS2ClientEvent::GetInfoFailed event"),
732+
if let LiquidityEvent::LSPS2Client(LSPS2ClientEvent::GetInfoFailed {
733+
request_id,
734+
counterparty_node_id,
735+
error,
736+
}) = error_event
737+
{
738+
assert_eq!(request_id, get_info_request_id);
739+
assert_eq!(counterparty_node_id, service_node_id);
740+
assert_eq!(error.code, 200); // LSPS2_GET_INFO_REQUEST_UNRECOGNIZED_OR_STALE_TOKEN_ERROR_CODE
741+
} else {
742+
panic!("Expected LSPS2ClientEvent::GetInfoFailed event");
743743
}
744744
}

0 commit comments

Comments
 (0)