@@ -177,8 +177,8 @@ fn run_onion_failure_test_with_fail_intercept<F1,F2,F3>(_name: &str, test_case:
177
177
panic ! ( "channel_update not found!" ) ;
178
178
}
179
179
} ,
180
- & NetworkUpdate :: ChannelClosed { ref short_channel_id, ref is_permanent } => {
181
- if let NetworkUpdate :: ChannelClosed { short_channel_id : ref expected_short_channel_id, is_permanent : ref expected_is_permanent } = expected_channel_update. unwrap ( ) {
180
+ & NetworkUpdate :: ChannelFailure { ref short_channel_id, ref is_permanent } => {
181
+ if let NetworkUpdate :: ChannelFailure { short_channel_id : ref expected_short_channel_id, is_permanent : ref expected_is_permanent } = expected_channel_update. unwrap ( ) {
182
182
assert ! ( * short_channel_id == * expected_short_channel_id) ;
183
183
assert ! ( * is_permanent == * expected_is_permanent) ;
184
184
} else {
@@ -283,7 +283,7 @@ fn test_fee_failures() {
283
283
let short_channel_id = channels[ 0 ] . 0 . contents . short_channel_id ;
284
284
run_onion_failure_test ( "fee_insufficient" , 0 , & nodes, & route, & payment_hash, & payment_secret, |msg| {
285
285
msg. amount_msat -= 1 ;
286
- } , || { } , true , Some ( UPDATE |12 ) , Some ( NetworkUpdate :: ChannelClosed { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
286
+ } , || { } , true , Some ( UPDATE |12 ) , Some ( NetworkUpdate :: ChannelFailure { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
287
287
288
288
// In an earlier version, we spuriously failed to forward payments if the expected feerate
289
289
// changed between the channel open and the payment.
@@ -343,7 +343,7 @@ fn test_onion_failure() {
343
343
// describing a length-1 TLV payload, which is obviously bogus.
344
344
new_payloads[ 0 ] . data [ 0 ] = 1 ;
345
345
msg. onion_routing_packet = onion_utils:: construct_onion_packet_bogus_hopdata ( new_payloads, onion_keys, [ 0 ; 32 ] , & payment_hash) ;
346
- } , ||{ } , true , Some ( PERM |22 ) , Some ( NetworkUpdate :: ChannelClosed { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
346
+ } , ||{ } , true , Some ( PERM |22 ) , Some ( NetworkUpdate :: ChannelFailure { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
347
347
348
348
// final node failure
349
349
let short_channel_id = channels[ 1 ] . 0 . contents . short_channel_id ;
@@ -360,7 +360,7 @@ fn test_onion_failure() {
360
360
// length-1 TLV payload, which is obviously bogus.
361
361
new_payloads[ 1 ] . data [ 0 ] = 1 ;
362
362
msg. onion_routing_packet = onion_utils:: construct_onion_packet_bogus_hopdata ( new_payloads, onion_keys, [ 0 ; 32 ] , & payment_hash) ;
363
- } , ||{ } , false , Some ( PERM |22 ) , Some ( NetworkUpdate :: ChannelClosed { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
363
+ } , ||{ } , false , Some ( PERM |22 ) , Some ( NetworkUpdate :: ChannelFailure { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
364
364
365
365
// the following three with run_onion_failure_test_with_fail_intercept() test only the origin node
366
366
// receiving simulated fail messages
@@ -471,7 +471,7 @@ fn test_onion_failure() {
471
471
let onion_keys = onion_utils:: construct_onion_keys ( & Secp256k1 :: new ( ) , & route. paths [ 0 ] , & session_priv) . unwrap ( ) ;
472
472
msg. reason = onion_utils:: build_first_hop_failure_packet ( onion_keys[ 0 ] . shared_secret . as_ref ( ) , PERM |8 , & [ 0 ; 0 ] ) ;
473
473
// short_channel_id from the processing node
474
- } , ||{ } , true , Some ( PERM |8 ) , Some ( NetworkUpdate :: ChannelClosed { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
474
+ } , ||{ } , true , Some ( PERM |8 ) , Some ( NetworkUpdate :: ChannelFailure { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
475
475
476
476
let short_channel_id = channels[ 1 ] . 0 . contents . short_channel_id ;
477
477
run_onion_failure_test_with_fail_intercept ( "required_channel_feature_missing" , 100 , & nodes, & route, & payment_hash, & payment_secret, |msg| {
@@ -481,13 +481,13 @@ fn test_onion_failure() {
481
481
let onion_keys = onion_utils:: construct_onion_keys ( & Secp256k1 :: new ( ) , & route. paths [ 0 ] , & session_priv) . unwrap ( ) ;
482
482
msg. reason = onion_utils:: build_first_hop_failure_packet ( onion_keys[ 0 ] . shared_secret . as_ref ( ) , PERM |9 , & [ 0 ; 0 ] ) ;
483
483
// short_channel_id from the processing node
484
- } , ||{ } , true , Some ( PERM |9 ) , Some ( NetworkUpdate :: ChannelClosed { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
484
+ } , ||{ } , true , Some ( PERM |9 ) , Some ( NetworkUpdate :: ChannelFailure { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
485
485
486
486
let mut bogus_route = route. clone ( ) ;
487
487
bogus_route. paths [ 0 ] [ 1 ] . short_channel_id -= 1 ;
488
488
let short_channel_id = bogus_route. paths [ 0 ] [ 1 ] . short_channel_id ;
489
489
run_onion_failure_test ( "unknown_next_peer" , 0 , & nodes, & bogus_route, & payment_hash, & payment_secret, |_| { } , ||{ } , true , Some ( PERM |10 ) ,
490
- Some ( NetworkUpdate :: ChannelClosed { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
490
+ Some ( NetworkUpdate :: ChannelFailure { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
491
491
492
492
let short_channel_id = channels[ 1 ] . 0 . contents . short_channel_id ;
493
493
let amt_to_forward = nodes[ 1 ] . node . channel_state . lock ( ) . unwrap ( ) . by_id . get ( & channels[ 1 ] . 2 ) . unwrap ( ) . get_counterparty_htlc_minimum_msat ( ) - 1 ;
@@ -511,13 +511,13 @@ fn test_onion_failure() {
511
511
let short_channel_id = channels[ 0 ] . 0 . contents . short_channel_id ;
512
512
run_onion_failure_test ( "fee_insufficient" , 0 , & nodes, & route, & payment_hash, & payment_secret, |msg| {
513
513
msg. amount_msat -= 1 ;
514
- } , || { } , true , Some ( UPDATE |12 ) , Some ( NetworkUpdate :: ChannelClosed { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
514
+ } , || { } , true , Some ( UPDATE |12 ) , Some ( NetworkUpdate :: ChannelFailure { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
515
515
516
516
let short_channel_id = channels[ 0 ] . 0 . contents . short_channel_id ;
517
517
run_onion_failure_test ( "incorrect_cltv_expiry" , 0 , & nodes, & route, & payment_hash, & payment_secret, |msg| {
518
518
// need to violate: cltv_expiry - cltv_expiry_delta >= outgoing_cltv_value
519
519
msg. cltv_expiry -= 1 ;
520
- } , || { } , true , Some ( UPDATE |13 ) , Some ( NetworkUpdate :: ChannelClosed { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
520
+ } , || { } , true , Some ( UPDATE |13 ) , Some ( NetworkUpdate :: ChannelFailure { short_channel_id, is_permanent : true } ) , Some ( short_channel_id) ) ;
521
521
522
522
let short_channel_id = channels[ 1 ] . 0 . contents . short_channel_id ;
523
523
run_onion_failure_test ( "expiry_too_soon" , 0 , & nodes, & route, & payment_hash, & payment_secret, |msg| {
0 commit comments