@@ -725,7 +725,7 @@ pub(super) struct ChannelContext<SP: Deref> where SP::Target: SignerProvider {
725
725
726
726
latest_monitor_update_id: u64,
727
727
728
- holder_signer: ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner >,
728
+ holder_signer: ChannelSignerType<SP >,
729
729
shutdown_scriptpubkey: Option<ShutdownScript>,
730
730
destination_script: ScriptBuf,
731
731
@@ -1095,7 +1095,7 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
1095
1095
1096
1096
/// Returns the holder signer for this channel.
1097
1097
#[cfg(test)]
1098
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
1098
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
1099
1099
return &self.holder_signer
1100
1100
}
1101
1101
@@ -2142,7 +2142,9 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
2142
2142
ChannelSignerType::Ecdsa(ecdsa) => {
2143
2143
ecdsa.sign_counterparty_commitment(&counterparty_initial_commitment_tx, Vec::new(), &self.secp_ctx)
2144
2144
.map(|(sig, _)| sig).ok()?
2145
- }
2145
+ },
2146
+ // TODO (taproot|arik)
2147
+ _ => todo!()
2146
2148
};
2147
2149
2148
2150
if self.signer_pending_funding {
@@ -2194,7 +2196,9 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
2194
2196
2195
2197
// We sign "counterparty" commitment transaction, allowing them to broadcast the tx if they wish.
2196
2198
(counterparty_initial_commitment_tx, funding_signed)
2197
- }
2199
+ },
2200
+ // TODO (taproot|arik)
2201
+ _ => todo!()
2198
2202
}
2199
2203
}
2200
2204
}
@@ -3485,7 +3489,9 @@ impl<SP: Deref> Channel<SP> where
3485
3489
self.context.cur_counterparty_commitment_transaction_number + 1,
3486
3490
&secret
3487
3491
).map_err(|_| ChannelError::Close("Failed to validate revocation from peer".to_owned()))?;
3488
- }
3492
+ },
3493
+ // TODO (taproot|arik)
3494
+ _ => todo!()
3489
3495
};
3490
3496
3491
3497
self.context.commitment_secrets.provide_secret(self.context.cur_counterparty_commitment_transaction_number + 1, msg.per_commitment_secret)
@@ -4438,7 +4444,9 @@ impl<SP: Deref> Channel<SP> where
4438
4444
max_fee_satoshis: our_max_fee,
4439
4445
}),
4440
4446
}), None, None))
4441
- }
4447
+ },
4448
+ // TODO (taproot|arik)
4449
+ _ => todo!()
4442
4450
}
4443
4451
}
4444
4452
@@ -4689,7 +4697,9 @@ impl<SP: Deref> Channel<SP> where
4689
4697
max_fee_satoshis: our_max_fee,
4690
4698
}),
4691
4699
}), signed_tx, shutdown_result))
4692
- }
4700
+ },
4701
+ // TODO (taproot|arik)
4702
+ _ => todo!()
4693
4703
}
4694
4704
}
4695
4705
}
@@ -4801,7 +4811,7 @@ impl<SP: Deref> Channel<SP> where
4801
4811
}
4802
4812
4803
4813
#[cfg(test)]
4804
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
4814
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
4805
4815
&self.context.holder_signer
4806
4816
}
4807
4817
@@ -5320,7 +5330,9 @@ impl<SP: Deref> Channel<SP> where
5320
5330
node_signature: our_node_sig,
5321
5331
bitcoin_signature: our_bitcoin_sig,
5322
5332
})
5323
- }
5333
+ },
5334
+ // TODO (taproot|arik)
5335
+ _ => todo!()
5324
5336
}
5325
5337
}
5326
5338
@@ -5347,7 +5359,9 @@ impl<SP: Deref> Channel<SP> where
5347
5359
bitcoin_signature_2: if were_node_one { their_bitcoin_sig } else { our_bitcoin_sig },
5348
5360
contents: announcement,
5349
5361
})
5350
- }
5362
+ },
5363
+ // TODO (taproot|arik)
5364
+ _ => todo!()
5351
5365
}
5352
5366
} else {
5353
5367
Err(ChannelError::Ignore("Attempted to sign channel announcement before we'd received announcement_signatures".to_string()))
@@ -5720,7 +5734,9 @@ impl<SP: Deref> Channel<SP> where
5720
5734
#[cfg(taproot)]
5721
5735
partial_signature_with_nonce: None,
5722
5736
}, (counterparty_commitment_txid, commitment_stats.htlcs_included)))
5723
- }
5737
+ },
5738
+ // TODO (taproot|arik)
5739
+ _ => todo!()
5724
5740
}
5725
5741
}
5726
5742
0 commit comments