You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
let outbound_msg = msgs::OutboundPayload::Forward{
2772
+
short_channel_id:0xdeadbeef1bad1dea,
2777
2773
amt_to_forward:0x0badf00d01020304,
2778
2774
outgoing_cltv_value:0xffffffff,
2779
2775
};
2780
-
let encoded_value = msg.encode();
2776
+
let encoded_value = outbound_msg.encode();
2781
2777
let target_value = hex::decode("1a02080badf00d010203040404ffffffff0608deadbeef1bad1dea").unwrap();
2782
2778
assert_eq!(encoded_value, target_value);
2783
2779
@@ -2791,15 +2787,13 @@ mod tests {
2791
2787
2792
2788
#[test]
2793
2789
fnencoding_final_onion_hop_data(){
2794
-
let msg = msgs::OnionHopData{
2795
-
format:OnionHopDataFormat::FinalNode{
2796
-
payment_data:None,
2797
-
keysend_preimage:None,
2798
-
},
2799
-
amt_to_forward:0x0badf00d01020304,
2790
+
let outbound_msg = msgs::OutboundPayload::Receive{
2791
+
payment_data:None,
2792
+
keysend_preimage:None,
2793
+
amt_msat:0x0badf00d01020304,
2800
2794
outgoing_cltv_value:0xffffffff,
2801
2795
};
2802
-
let encoded_value = msg.encode();
2796
+
let encoded_value = outbound_msg.encode();
2803
2797
let target_value = hex::decode("1002080badf00d010203040404ffffffff").unwrap();
2804
2798
assert_eq!(encoded_value, target_value);
2805
2799
@@ -2813,18 +2807,16 @@ mod tests {
2813
2807
#[test]
2814
2808
fnencoding_final_onion_hop_data_with_secret(){
2815
2809
let expected_payment_secret = PaymentSecret([0x42u8;32]);
2816
-
let msg = msgs::OnionHopData{
2817
-
format:OnionHopDataFormat::FinalNode{
2818
-
payment_data:Some(FinalOnionHopData{
2819
-
payment_secret: expected_payment_secret,
2820
-
total_msat:0x1badca1f
2821
-
}),
2822
-
keysend_preimage:None,
2823
-
},
2824
-
amt_to_forward:0x0badf00d01020304,
2810
+
let outbound_msg = msgs::OutboundPayload::Receive{
2811
+
payment_data:Some(FinalOnionHopData{
2812
+
payment_secret: expected_payment_secret,
2813
+
total_msat:0x1badca1f
2814
+
}),
2815
+
keysend_preimage:None,
2816
+
amt_msat:0x0badf00d01020304,
2825
2817
outgoing_cltv_value:0xffffffff,
2826
2818
};
2827
-
let encoded_value = msg.encode();
2819
+
let encoded_value = outbound_msg.encode();
2828
2820
let target_value = hex::decode("3602080badf00d010203040404ffffffff082442424242424242424242424242424242424242424242424242424242424242421badca1f").unwrap();
2829
2821
assert_eq!(encoded_value, target_value);
2830
2822
@@ -2994,20 +2986,18 @@ mod tests {
2994
2986
// see above test, needs to be a separate method for use of the serialization macros.
0 commit comments