@@ -664,7 +664,7 @@ pub(super) struct ChannelContext<SP: Deref> where SP::Target: SignerProvider {
664
664
665
665
latest_monitor_update_id: u64,
666
666
667
- holder_signer: ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner >,
667
+ holder_signer: ChannelSignerType<SP >,
668
668
shutdown_scriptpubkey: Option<ShutdownScript>,
669
669
destination_script: Script,
670
670
@@ -3261,7 +3261,9 @@ impl<SP: Deref> Channel<SP> where
3261
3261
self.context.cur_counterparty_commitment_transaction_number + 1,
3262
3262
&secret
3263
3263
).map_err(|_| ChannelError::Close("Failed to validate revocation from peer".to_owned()))?;
3264
- }
3264
+ },
3265
+ // TODO (taproot|arik)
3266
+ _ => todo!()
3265
3267
};
3266
3268
3267
3269
self.context.commitment_secrets.provide_secret(self.context.cur_counterparty_commitment_transaction_number + 1, msg.per_commitment_secret)
@@ -4152,7 +4154,9 @@ impl<SP: Deref> Channel<SP> where
4152
4154
max_fee_satoshis: our_max_fee,
4153
4155
}),
4154
4156
}), None))
4155
- }
4157
+ },
4158
+ // TODO (taproot|arik)
4159
+ _ => todo!()
4156
4160
}
4157
4161
}
4158
4162
@@ -4392,7 +4396,9 @@ impl<SP: Deref> Channel<SP> where
4392
4396
max_fee_satoshis: our_max_fee,
4393
4397
}),
4394
4398
}), signed_tx))
4395
- }
4399
+ },
4400
+ // TODO (taproot|arik)
4401
+ _ => todo!()
4396
4402
}
4397
4403
}
4398
4404
}
@@ -4504,7 +4510,7 @@ impl<SP: Deref> Channel<SP> where
4504
4510
}
4505
4511
4506
4512
#[cfg(test)]
4507
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
4513
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
4508
4514
&self.context.holder_signer
4509
4515
}
4510
4516
@@ -5014,7 +5020,9 @@ impl<SP: Deref> Channel<SP> where
5014
5020
node_signature: our_node_sig,
5015
5021
bitcoin_signature: our_bitcoin_sig,
5016
5022
})
5017
- }
5023
+ },
5024
+ // TODO (taproot|arik)
5025
+ _ => todo!()
5018
5026
}
5019
5027
}
5020
5028
@@ -5041,7 +5049,9 @@ impl<SP: Deref> Channel<SP> where
5041
5049
bitcoin_signature_2: if were_node_one { their_bitcoin_sig } else { our_bitcoin_sig },
5042
5050
contents: announcement,
5043
5051
})
5044
- }
5052
+ },
5053
+ // TODO (taproot|arik)
5054
+ _ => todo!()
5045
5055
}
5046
5056
} else {
5047
5057
Err(ChannelError::Ignore("Attempted to sign channel announcement before we'd received announcement_signatures".to_string()))
@@ -5414,7 +5424,9 @@ impl<SP: Deref> Channel<SP> where
5414
5424
#[cfg(taproot)]
5415
5425
partial_signature_with_nonce: None,
5416
5426
}, (counterparty_commitment_txid, commitment_stats.htlcs_included)))
5417
- }
5427
+ },
5428
+ // TODO (taproot|arik)
5429
+ _ => todo!()
5418
5430
}
5419
5431
}
5420
5432
@@ -5790,7 +5802,9 @@ impl<SP: Deref> OutboundV1Channel<SP> where SP::Target: SignerProvider {
5790
5802
ChannelSignerType::Ecdsa(ecdsa) => {
5791
5803
Ok(ecdsa.sign_counterparty_commitment(&counterparty_initial_commitment_tx, Vec::new(), &self.context.secp_ctx)
5792
5804
.map_err(|_| ChannelError::Close("Failed to get signatures for new commitment_signed".to_owned()))?.0)
5793
- }
5805
+ },
5806
+ // TODO (taproot|arik)
5807
+ _ => todo!()
5794
5808
}
5795
5809
}
5796
5810
@@ -6529,6 +6543,8 @@ impl<SP: Deref> InboundV1Channel<SP> where SP::Target: SignerProvider {
6529
6543
// We sign "counterparty" commitment transaction, allowing them to broadcast the tx if they wish.
6530
6544
Ok((counterparty_initial_commitment_tx, initial_commitment_tx, counterparty_signature))
6531
6545
}
6546
+ // TODO (taproot|arik)
6547
+ _ => todo!()
6532
6548
}
6533
6549
}
6534
6550
0 commit comments