@@ -661,7 +661,7 @@ pub(super) struct ChannelContext<SP: Deref> where SP::Target: SignerProvider {
661
661
662
662
latest_monitor_update_id: u64,
663
663
664
- holder_signer: ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner >,
664
+ holder_signer: ChannelSignerType<SP >,
665
665
shutdown_scriptpubkey: Option<ShutdownScript>,
666
666
destination_script: Script,
667
667
@@ -3258,7 +3258,9 @@ impl<SP: Deref> Channel<SP> where
3258
3258
self.context.cur_counterparty_commitment_transaction_number + 1,
3259
3259
&secret
3260
3260
).map_err(|_| ChannelError::Close("Failed to validate revocation from peer".to_owned()))?;
3261
- }
3261
+ },
3262
+ // TODO (taproot|arik)
3263
+ _ => todo!()
3262
3264
};
3263
3265
3264
3266
self.context.commitment_secrets.provide_secret(self.context.cur_counterparty_commitment_transaction_number + 1, msg.per_commitment_secret)
@@ -4149,7 +4151,9 @@ impl<SP: Deref> Channel<SP> where
4149
4151
max_fee_satoshis: our_max_fee,
4150
4152
}),
4151
4153
}), None))
4152
- }
4154
+ },
4155
+ // TODO (taproot|arik)
4156
+ _ => todo!()
4153
4157
}
4154
4158
}
4155
4159
@@ -4389,7 +4393,9 @@ impl<SP: Deref> Channel<SP> where
4389
4393
max_fee_satoshis: our_max_fee,
4390
4394
}),
4391
4395
}), signed_tx))
4392
- }
4396
+ },
4397
+ // TODO (taproot|arik)
4398
+ _ => todo!()
4393
4399
}
4394
4400
}
4395
4401
}
@@ -4501,7 +4507,7 @@ impl<SP: Deref> Channel<SP> where
4501
4507
}
4502
4508
4503
4509
#[cfg(test)]
4504
- pub fn get_signer(&self) -> &ChannelSignerType<<SP::Target as SignerProvider>::EcdsaSigner > {
4510
+ pub fn get_signer(&self) -> &ChannelSignerType<SP > {
4505
4511
&self.context.holder_signer
4506
4512
}
4507
4513
@@ -5002,7 +5008,9 @@ impl<SP: Deref> Channel<SP> where
5002
5008
node_signature: our_node_sig,
5003
5009
bitcoin_signature: our_bitcoin_sig,
5004
5010
})
5005
- }
5011
+ },
5012
+ // TODO (taproot|arik)
5013
+ _ => todo!()
5006
5014
}
5007
5015
}
5008
5016
@@ -5029,7 +5037,9 @@ impl<SP: Deref> Channel<SP> where
5029
5037
bitcoin_signature_2: if were_node_one { their_bitcoin_sig } else { our_bitcoin_sig },
5030
5038
contents: announcement,
5031
5039
})
5032
- }
5040
+ },
5041
+ // TODO (taproot|arik)
5042
+ _ => todo!()
5033
5043
}
5034
5044
} else {
5035
5045
Err(ChannelError::Ignore("Attempted to sign channel announcement before we'd received announcement_signatures".to_string()))
@@ -5402,7 +5412,9 @@ impl<SP: Deref> Channel<SP> where
5402
5412
#[cfg(taproot)]
5403
5413
partial_signature_with_nonce: None,
5404
5414
}, (counterparty_commitment_txid, commitment_stats.htlcs_included)))
5405
- }
5415
+ },
5416
+ // TODO (taproot|arik)
5417
+ _ => todo!()
5406
5418
}
5407
5419
}
5408
5420
@@ -5778,7 +5790,9 @@ impl<SP: Deref> OutboundV1Channel<SP> where SP::Target: SignerProvider {
5778
5790
ChannelSignerType::Ecdsa(ecdsa) => {
5779
5791
Ok(ecdsa.sign_counterparty_commitment(&counterparty_initial_commitment_tx, Vec::new(), &self.context.secp_ctx)
5780
5792
.map_err(|_| ChannelError::Close("Failed to get signatures for new commitment_signed".to_owned()))?.0)
5781
- }
5793
+ },
5794
+ // TODO (taproot|arik)
5795
+ _ => todo!()
5782
5796
}
5783
5797
}
5784
5798
@@ -6508,6 +6522,8 @@ impl<SP: Deref> InboundV1Channel<SP> where SP::Target: SignerProvider {
6508
6522
// We sign "counterparty" commitment transaction, allowing them to broadcast the tx if they wish.
6509
6523
Ok((counterparty_initial_commitment_tx, initial_commitment_tx, counterparty_signature))
6510
6524
}
6525
+ // TODO (taproot|arik)
6526
+ _ => todo!()
6511
6527
}
6512
6528
}
6513
6529
0 commit comments