@@ -723,7 +723,7 @@ pub(super) struct ChannelContext<SP: Deref> where SP::Target: SignerProvider {
723
723
724
724
latest_monitor_update_id: u64,
725
725
726
- holder_signer: ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner >,
726
+ holder_signer: ChannelSignerType<SP >,
727
727
shutdown_scriptpubkey: Option<ShutdownScript>,
728
728
destination_script: ScriptBuf,
729
729
@@ -1093,7 +1093,7 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
1093
1093
1094
1094
/// Returns the holder signer for this channel.
1095
1095
#[cfg(test)]
1096
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
1096
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
1097
1097
return &self.holder_signer
1098
1098
}
1099
1099
@@ -2130,7 +2130,9 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
2130
2130
ChannelSignerType::Ecdsa(ecdsa) => {
2131
2131
ecdsa.sign_counterparty_commitment(&counterparty_initial_commitment_tx, Vec::new(), &self.secp_ctx)
2132
2132
.map(|(sig, _)| sig).ok()?
2133
- }
2133
+ },
2134
+ // TODO (taproot|arik)
2135
+ _ => todo!()
2134
2136
};
2135
2137
2136
2138
if self.signer_pending_funding {
@@ -2182,7 +2184,9 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
2182
2184
2183
2185
// We sign "counterparty" commitment transaction, allowing them to broadcast the tx if they wish.
2184
2186
(counterparty_initial_commitment_tx, funding_signed)
2185
- }
2187
+ },
2188
+ // TODO (taproot|arik)
2189
+ _ => todo!()
2186
2190
}
2187
2191
}
2188
2192
}
@@ -3473,7 +3477,9 @@ impl<SP: Deref> Channel<SP> where
3473
3477
self.context.cur_counterparty_commitment_transaction_number + 1,
3474
3478
&secret
3475
3479
).map_err(|_| ChannelError::Close("Failed to validate revocation from peer".to_owned()))?;
3476
- }
3480
+ },
3481
+ // TODO (taproot|arik)
3482
+ _ => todo!()
3477
3483
};
3478
3484
3479
3485
self.context.commitment_secrets.provide_secret(self.context.cur_counterparty_commitment_transaction_number + 1, msg.per_commitment_secret)
@@ -4426,7 +4432,9 @@ impl<SP: Deref> Channel<SP> where
4426
4432
max_fee_satoshis: our_max_fee,
4427
4433
}),
4428
4434
}), None, None))
4429
- }
4435
+ },
4436
+ // TODO (taproot|arik)
4437
+ _ => todo!()
4430
4438
}
4431
4439
}
4432
4440
@@ -4677,7 +4685,9 @@ impl<SP: Deref> Channel<SP> where
4677
4685
max_fee_satoshis: our_max_fee,
4678
4686
}),
4679
4687
}), signed_tx, shutdown_result))
4680
- }
4688
+ },
4689
+ // TODO (taproot|arik)
4690
+ _ => todo!()
4681
4691
}
4682
4692
}
4683
4693
}
@@ -4789,7 +4799,7 @@ impl<SP: Deref> Channel<SP> where
4789
4799
}
4790
4800
4791
4801
#[cfg(test)]
4792
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
4802
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
4793
4803
&self.context.holder_signer
4794
4804
}
4795
4805
@@ -5308,7 +5318,9 @@ impl<SP: Deref> Channel<SP> where
5308
5318
node_signature: our_node_sig,
5309
5319
bitcoin_signature: our_bitcoin_sig,
5310
5320
})
5311
- }
5321
+ },
5322
+ // TODO (taproot|arik)
5323
+ _ => todo!()
5312
5324
}
5313
5325
}
5314
5326
@@ -5335,7 +5347,9 @@ impl<SP: Deref> Channel<SP> where
5335
5347
bitcoin_signature_2: if were_node_one { their_bitcoin_sig } else { our_bitcoin_sig },
5336
5348
contents: announcement,
5337
5349
})
5338
- }
5350
+ },
5351
+ // TODO (taproot|arik)
5352
+ _ => todo!()
5339
5353
}
5340
5354
} else {
5341
5355
Err(ChannelError::Ignore("Attempted to sign channel announcement before we'd received announcement_signatures".to_string()))
@@ -5708,7 +5722,9 @@ impl<SP: Deref> Channel<SP> where
5708
5722
#[cfg(taproot)]
5709
5723
partial_signature_with_nonce: None,
5710
5724
}, (counterparty_commitment_txid, commitment_stats.htlcs_included)))
5711
- }
5725
+ },
5726
+ // TODO (taproot|arik)
5727
+ _ => todo!()
5712
5728
}
5713
5729
}
5714
5730
0 commit comments