@@ -658,7 +658,7 @@ pub(super) struct ChannelContext<SP: Deref> where SP::Target: SignerProvider {
658
658
659
659
latest_monitor_update_id: u64,
660
660
661
- holder_signer: ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner >,
661
+ holder_signer: ChannelSignerType<SP >,
662
662
shutdown_scriptpubkey: Option<ShutdownScript>,
663
663
destination_script: Script,
664
664
@@ -3249,7 +3249,9 @@ impl<SP: Deref> Channel<SP> where
3249
3249
self.context.cur_counterparty_commitment_transaction_number + 1,
3250
3250
&secret
3251
3251
).map_err(|_| ChannelError::Close("Failed to validate revocation from peer".to_owned()))?;
3252
- }
3252
+ },
3253
+ // TODO (taproot|arik)
3254
+ _ => todo!()
3253
3255
};
3254
3256
3255
3257
self.context.commitment_secrets.provide_secret(self.context.cur_counterparty_commitment_transaction_number + 1, msg.per_commitment_secret)
@@ -4140,7 +4142,9 @@ impl<SP: Deref> Channel<SP> where
4140
4142
max_fee_satoshis: our_max_fee,
4141
4143
}),
4142
4144
}), None))
4143
- }
4145
+ },
4146
+ // TODO (taproot|arik)
4147
+ _ => todo!()
4144
4148
}
4145
4149
}
4146
4150
@@ -4380,7 +4384,9 @@ impl<SP: Deref> Channel<SP> where
4380
4384
max_fee_satoshis: our_max_fee,
4381
4385
}),
4382
4386
}), signed_tx))
4383
- }
4387
+ },
4388
+ // TODO (taproot|arik)
4389
+ _ => todo!()
4384
4390
}
4385
4391
}
4386
4392
}
@@ -4492,7 +4498,7 @@ impl<SP: Deref> Channel<SP> where
4492
4498
}
4493
4499
4494
4500
#[cfg(test)]
4495
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
4501
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
4496
4502
&self.context.holder_signer
4497
4503
}
4498
4504
@@ -4993,7 +4999,9 @@ impl<SP: Deref> Channel<SP> where
4993
4999
node_signature: our_node_sig,
4994
5000
bitcoin_signature: our_bitcoin_sig,
4995
5001
})
4996
- }
5002
+ },
5003
+ // TODO (taproot|arik)
5004
+ _ => todo!()
4997
5005
}
4998
5006
}
4999
5007
@@ -5020,7 +5028,9 @@ impl<SP: Deref> Channel<SP> where
5020
5028
bitcoin_signature_2: if were_node_one { their_bitcoin_sig } else { our_bitcoin_sig },
5021
5029
contents: announcement,
5022
5030
})
5023
- }
5031
+ },
5032
+ // TODO (taproot|arik)
5033
+ _ => todo!()
5024
5034
}
5025
5035
} else {
5026
5036
Err(ChannelError::Ignore("Attempted to sign channel announcement before we'd received announcement_signatures".to_string()))
@@ -5384,7 +5394,9 @@ impl<SP: Deref> Channel<SP> where
5384
5394
#[cfg(taproot)]
5385
5395
partial_signature_with_nonce: None,
5386
5396
}, (counterparty_commitment_txid, commitment_stats.htlcs_included)))
5387
- }
5397
+ },
5398
+ // TODO (taproot|arik)
5399
+ _ => todo!()
5388
5400
}
5389
5401
}
5390
5402
@@ -5760,7 +5772,9 @@ impl<SP: Deref> OutboundV1Channel<SP> where SP::Target: SignerProvider {
5760
5772
ChannelSignerType::Ecdsa(ecdsa) => {
5761
5773
Ok(ecdsa.sign_counterparty_commitment(&counterparty_initial_commitment_tx, Vec::new(), &self.context.secp_ctx)
5762
5774
.map_err(|_| ChannelError::Close("Failed to get signatures for new commitment_signed".to_owned()))?.0)
5763
- }
5775
+ },
5776
+ // TODO (taproot|arik)
5777
+ _ => todo!()
5764
5778
}
5765
5779
}
5766
5780
@@ -6490,6 +6504,8 @@ impl<SP: Deref> InboundV1Channel<SP> where SP::Target: SignerProvider {
6490
6504
// We sign "counterparty" commitment transaction, allowing them to broadcast the tx if they wish.
6491
6505
Ok((counterparty_initial_bitcoin_tx.txid, initial_commitment_tx, counterparty_signature))
6492
6506
}
6507
+ // TODO (taproot|arik)
6508
+ _ => todo!()
6493
6509
}
6494
6510
}
6495
6511
0 commit comments