@@ -693,7 +693,7 @@ pub(super) struct ChannelContext<SP: Deref> where SP::Target: SignerProvider {
693
693
694
694
latest_monitor_update_id: u64,
695
695
696
- holder_signer: ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner >,
696
+ holder_signer: ChannelSignerType<SP >,
697
697
shutdown_scriptpubkey: Option<ShutdownScript>,
698
698
destination_script: Script,
699
699
@@ -3285,7 +3285,9 @@ impl<SP: Deref> Channel<SP> where
3285
3285
self.context.cur_counterparty_commitment_transaction_number + 1,
3286
3286
&secret
3287
3287
).map_err(|_| ChannelError::Close("Failed to validate revocation from peer".to_owned()))?;
3288
- }
3288
+ },
3289
+ // TODO (taproot|arik)
3290
+ _ => todo!()
3289
3291
};
3290
3292
3291
3293
self.context.commitment_secrets.provide_secret(self.context.cur_counterparty_commitment_transaction_number + 1, msg.per_commitment_secret)
@@ -4176,7 +4178,9 @@ impl<SP: Deref> Channel<SP> where
4176
4178
max_fee_satoshis: our_max_fee,
4177
4179
}),
4178
4180
}), None))
4179
- }
4181
+ },
4182
+ // TODO (taproot|arik)
4183
+ _ => todo!()
4180
4184
}
4181
4185
}
4182
4186
@@ -4416,7 +4420,9 @@ impl<SP: Deref> Channel<SP> where
4416
4420
max_fee_satoshis: our_max_fee,
4417
4421
}),
4418
4422
}), signed_tx))
4419
- }
4423
+ },
4424
+ // TODO (taproot|arik)
4425
+ _ => todo!()
4420
4426
}
4421
4427
}
4422
4428
}
@@ -4528,7 +4534,7 @@ impl<SP: Deref> Channel<SP> where
4528
4534
}
4529
4535
4530
4536
#[cfg(test)]
4531
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
4537
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
4532
4538
&self.context.holder_signer
4533
4539
}
4534
4540
@@ -5038,7 +5044,9 @@ impl<SP: Deref> Channel<SP> where
5038
5044
node_signature: our_node_sig,
5039
5045
bitcoin_signature: our_bitcoin_sig,
5040
5046
})
5041
- }
5047
+ },
5048
+ // TODO (taproot|arik)
5049
+ _ => todo!()
5042
5050
}
5043
5051
}
5044
5052
@@ -5065,7 +5073,9 @@ impl<SP: Deref> Channel<SP> where
5065
5073
bitcoin_signature_2: if were_node_one { their_bitcoin_sig } else { our_bitcoin_sig },
5066
5074
contents: announcement,
5067
5075
})
5068
- }
5076
+ },
5077
+ // TODO (taproot|arik)
5078
+ _ => todo!()
5069
5079
}
5070
5080
} else {
5071
5081
Err(ChannelError::Ignore("Attempted to sign channel announcement before we'd received announcement_signatures".to_string()))
@@ -5438,7 +5448,9 @@ impl<SP: Deref> Channel<SP> where
5438
5448
#[cfg(taproot)]
5439
5449
partial_signature_with_nonce: None,
5440
5450
}, (counterparty_commitment_txid, commitment_stats.htlcs_included)))
5441
- }
5451
+ },
5452
+ // TODO (taproot|arik)
5453
+ _ => todo!()
5442
5454
}
5443
5455
}
5444
5456
@@ -5814,7 +5826,9 @@ impl<SP: Deref> OutboundV1Channel<SP> where SP::Target: SignerProvider {
5814
5826
ChannelSignerType::Ecdsa(ecdsa) => {
5815
5827
Ok(ecdsa.sign_counterparty_commitment(&counterparty_initial_commitment_tx, Vec::new(), &self.context.secp_ctx)
5816
5828
.map_err(|_| ChannelError::Close("Failed to get signatures for new commitment_signed".to_owned()))?.0)
5817
- }
5829
+ },
5830
+ // TODO (taproot|arik)
5831
+ _ => todo!()
5818
5832
}
5819
5833
}
5820
5834
@@ -6553,6 +6567,8 @@ impl<SP: Deref> InboundV1Channel<SP> where SP::Target: SignerProvider {
6553
6567
// We sign "counterparty" commitment transaction, allowing them to broadcast the tx if they wish.
6554
6568
Ok((counterparty_initial_commitment_tx, initial_commitment_tx, counterparty_signature))
6555
6569
}
6570
+ // TODO (taproot|arik)
6571
+ _ => todo!()
6556
6572
}
6557
6573
}
6558
6574
0 commit comments