@@ -27,10 +27,6 @@ fn metadata() -> serde_json::Value {
2727 } )
2828}
2929
30- fn rule ( mutlisig : bool ) -> SignatureRule {
31- SignatureRule { mutlisig }
32- }
33-
3430#[ tokio:: test]
3531async fn single_signature_validation_test ( ) {
3632 let ( sk, kid) = create_dummy_key_pair ( RoleId :: Role0 ) ;
@@ -51,13 +47,13 @@ async fn single_signature_validation_test() {
5147 let mut provider = TestCatalystProvider :: default ( ) ;
5248 provider. add_sk ( kid. clone ( ) , sk) ;
5349 assert ! (
54- rule ( true ) . check( & signed_doc, & provider) . await . unwrap( ) ,
50+ SignatureRule . check( & signed_doc, & provider) . await . unwrap( ) ,
5551 "{:?}" ,
5652 signed_doc. problem_report( )
5753 ) ;
5854
5955 // case: empty provider
60- assert ! ( !rule ( true )
56+ assert ! ( !SignatureRule
6157 . check( & signed_doc, & TestCatalystProvider :: default ( ) )
6258 . await
6359 . unwrap( ) ) ;
@@ -71,7 +67,7 @@ async fn single_signature_validation_test() {
7167 . unwrap ( )
7268 . build ( )
7369 . unwrap ( ) ;
74- assert ! ( !rule ( true ) . check( & invalid_doc, & provider) . await . unwrap( ) ) ;
70+ assert ! ( !SignatureRule . check( & invalid_doc, & provider) . await . unwrap( ) ) ;
7571
7672 // case: missing signatures
7773 let unsigned_doc = Builder :: new ( )
@@ -86,7 +82,7 @@ async fn single_signature_validation_test() {
8682 . unwrap ( )
8783 . build ( )
8884 . unwrap ( ) ;
89- assert ! ( !rule ( true ) . check( & unsigned_doc, & provider) . await . unwrap( ) ) ;
85+ assert ! ( !SignatureRule . check( & unsigned_doc, & provider) . await . unwrap( ) ) ;
9086}
9187
9288#[ tokio:: test]
@@ -112,29 +108,26 @@ async fn multiple_signatures_validation_test() {
112108
113109 assert ! ( !signed_doc. problem_report( ) . is_problematic( ) ) ;
114110
115- // case: multi-sig rule disabled
111+ // case: all signatures valid
116112 let mut provider = TestCatalystProvider :: default ( ) ;
117113 provider. add_sk ( kid1. clone ( ) , sk1. clone ( ) ) ;
118114 provider. add_sk ( kid2. clone ( ) , sk2. clone ( ) ) ;
119115 provider. add_sk ( kid3. clone ( ) , sk3. clone ( ) ) ;
120- assert ! ( !rule( false ) . check( & signed_doc, & provider) . await . unwrap( ) ) ;
121-
122- // case: all signatures valid
123- assert ! ( rule( true ) . check( & signed_doc, & provider) . await . unwrap( ) ) ;
116+ assert ! ( SignatureRule . check( & signed_doc, & provider) . await . unwrap( ) ) ;
124117
125118 // case: partially available signatures
126119 let mut provider = TestCatalystProvider :: default ( ) ;
127120 provider. add_sk ( kid1. clone ( ) , sk1) ;
128121 provider. add_sk ( kid2. clone ( ) , sk2) ;
129- assert ! ( !rule ( true ) . check( & signed_doc, & provider) . await . unwrap( ) ) ;
122+ assert ! ( !SignatureRule . check( & signed_doc, & provider) . await . unwrap( ) ) ;
130123
131124 // case: with unrecognized provider
132125 let mut provider = TestCatalystProvider :: default ( ) ;
133126 provider. add_sk ( kid_n. clone ( ) , sk_n) ;
134- assert ! ( !rule ( true ) . check( & signed_doc, & provider) . await . unwrap( ) ) ;
127+ assert ! ( !SignatureRule . check( & signed_doc, & provider) . await . unwrap( ) ) ;
135128
136129 // case: no valid signatures available
137- assert ! ( !rule ( true )
130+ assert ! ( !SignatureRule
138131 . check( & signed_doc, & TestCatalystProvider :: default ( ) )
139132 . await
140133 . unwrap( ) ) ;
@@ -284,7 +277,7 @@ async fn special_cbor_cases() {
284277 . unwrap ( ) ;
285278
286279 assert ! (
287- rule ( true ) . check( & doc, & provider) . await . unwrap( ) ,
280+ SignatureRule . check( & doc, & provider) . await . unwrap( ) ,
288281 "[case: {}] {:?}" ,
289282 case. name,
290283 doc. problem_report( )
0 commit comments