@@ -722,7 +722,7 @@ pub(super) struct ChannelContext<SP: Deref> where SP::Target: SignerProvider {
722
722
723
723
latest_monitor_update_id: u64,
724
724
725
- holder_signer: ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner >,
725
+ holder_signer: ChannelSignerType<SP >,
726
726
shutdown_scriptpubkey: Option<ShutdownScript>,
727
727
destination_script: Script,
728
728
@@ -1079,7 +1079,7 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
1079
1079
1080
1080
/// Returns the holder signer for this channel.
1081
1081
#[cfg(test)]
1082
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
1082
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
1083
1083
return &self.holder_signer
1084
1084
}
1085
1085
@@ -2116,7 +2116,9 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
2116
2116
ChannelSignerType::Ecdsa(ecdsa) => {
2117
2117
ecdsa.sign_counterparty_commitment(&counterparty_initial_commitment_tx, Vec::new(), &self.secp_ctx)
2118
2118
.map(|(sig, _)| sig).ok()?
2119
- }
2119
+ },
2120
+ // TODO (taproot|arik)
2121
+ _ => todo!()
2120
2122
};
2121
2123
2122
2124
if self.signer_pending_funding {
@@ -2168,7 +2170,9 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
2168
2170
2169
2171
// We sign "counterparty" commitment transaction, allowing them to broadcast the tx if they wish.
2170
2172
(counterparty_initial_commitment_tx, funding_signed)
2171
- }
2173
+ },
2174
+ // TODO (taproot|arik)
2175
+ _ => todo!()
2172
2176
}
2173
2177
}
2174
2178
}
@@ -3472,7 +3476,9 @@ impl<SP: Deref> Channel<SP> where
3472
3476
self.context.cur_counterparty_commitment_transaction_number + 1,
3473
3477
&secret
3474
3478
).map_err(|_| ChannelError::Close("Failed to validate revocation from peer".to_owned()))?;
3475
- }
3479
+ },
3480
+ // TODO (taproot|arik)
3481
+ _ => todo!()
3476
3482
};
3477
3483
3478
3484
self.context.commitment_secrets.provide_secret(self.context.cur_counterparty_commitment_transaction_number + 1, msg.per_commitment_secret)
@@ -4414,7 +4420,9 @@ impl<SP: Deref> Channel<SP> where
4414
4420
max_fee_satoshis: our_max_fee,
4415
4421
}),
4416
4422
}), None, None))
4417
- }
4423
+ },
4424
+ // TODO (taproot|arik)
4425
+ _ => todo!()
4418
4426
}
4419
4427
}
4420
4428
@@ -4665,7 +4673,9 @@ impl<SP: Deref> Channel<SP> where
4665
4673
max_fee_satoshis: our_max_fee,
4666
4674
}),
4667
4675
}), signed_tx, shutdown_result))
4668
- }
4676
+ },
4677
+ // TODO (taproot|arik)
4678
+ _ => todo!()
4669
4679
}
4670
4680
}
4671
4681
}
@@ -4777,7 +4787,7 @@ impl<SP: Deref> Channel<SP> where
4777
4787
}
4778
4788
4779
4789
#[cfg(test)]
4780
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
4790
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
4781
4791
&self.context.holder_signer
4782
4792
}
4783
4793
@@ -5296,7 +5306,9 @@ impl<SP: Deref> Channel<SP> where
5296
5306
node_signature: our_node_sig,
5297
5307
bitcoin_signature: our_bitcoin_sig,
5298
5308
})
5299
- }
5309
+ },
5310
+ // TODO (taproot|arik)
5311
+ _ => todo!()
5300
5312
}
5301
5313
}
5302
5314
@@ -5323,7 +5335,9 @@ impl<SP: Deref> Channel<SP> where
5323
5335
bitcoin_signature_2: if were_node_one { their_bitcoin_sig } else { our_bitcoin_sig },
5324
5336
contents: announcement,
5325
5337
})
5326
- }
5338
+ },
5339
+ // TODO (taproot|arik)
5340
+ _ => todo!()
5327
5341
}
5328
5342
} else {
5329
5343
Err(ChannelError::Ignore("Attempted to sign channel announcement before we'd received announcement_signatures".to_string()))
@@ -5696,7 +5710,9 @@ impl<SP: Deref> Channel<SP> where
5696
5710
#[cfg(taproot)]
5697
5711
partial_signature_with_nonce: None,
5698
5712
}, (counterparty_commitment_txid, commitment_stats.htlcs_included)))
5699
- }
5713
+ },
5714
+ // TODO (taproot|arik)
5715
+ _ => todo!()
5700
5716
}
5701
5717
}
5702
5718
0 commit comments