@@ -78,7 +78,7 @@ use crate::onion_message::messenger::{Destination, MessageRouter, Responder, Res
78
78
use crate::onion_message::offers::{OffersMessage, OffersMessageHandler};
79
79
use crate::sign::{EntropySource, NodeSigner, Recipient, SignerProvider};
80
80
use crate::sign::ecdsa::EcdsaChannelSigner;
81
- use crate::util::config::{UserConfig, ChannelConfig, ChannelConfigUpdate};
81
+ use crate::util::config::{ChannelConfig, ChannelConfigUpdate, InboundChannelConfigOverrides, UserConfig };
82
82
use crate::util::wakers::{Future, Notifier};
83
83
use crate::util::scid_utils::fake_scid;
84
84
use crate::util::string::UntrustedString;
@@ -132,6 +132,8 @@ pub use crate::ln::outbound_payment::{Bolt12PaymentError, ProbeSendFailure, Retr
132
132
pub(crate) use crate::ln::outbound_payment::PaymentSendFailure;
133
133
use crate::ln::script::ShutdownScript;
134
134
135
+
136
+
135
137
// We hold various information about HTLC relay in the HTLC objects in Channel itself:
136
138
//
137
139
// Upon receipt of an HTLC from a peer, we'll give it a PendingHTLCStatus indicating if it should
@@ -1851,7 +1853,7 @@ where
1851
1853
///
1852
1854
/// ```
1853
1855
/// # use bitcoin::secp256k1::PublicKey;
1854
- /// # use lightning::ln::channelmanager::AChannelManager;
1856
+ /// # use lightning::ln::channelmanager::{ AChannelManager, InboundChannelConfigOverrides} ;
1855
1857
/// # use lightning::events::{Event, EventsProvider};
1856
1858
/// #
1857
1859
/// # fn is_trusted(counterparty_node_id: PublicKey) -> bool {
@@ -1877,7 +1879,7 @@ where
1877
1879
///
1878
1880
/// let user_channel_id = 43;
1879
1881
/// match channel_manager.accept_inbound_channel(
1880
- /// &temporary_channel_id, &counterparty_node_id, user_channel_id
1882
+ /// &temporary_channel_id, &counterparty_node_id, user_channel_id, InboundChannelConfigOverrides::default()
1881
1883
/// ) {
1882
1884
/// Ok(()) => println!("Accepting channel {}", temporary_channel_id),
1883
1885
/// Err(e) => println!("Error accepting channel {}: {:?}", temporary_channel_id, e),
@@ -7699,8 +7701,8 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7699
7701
///
7700
7702
/// [`Event::OpenChannelRequest`]: events::Event::OpenChannelRequest
7701
7703
/// [`Event::ChannelClosed::user_channel_id`]: events::Event::ChannelClosed::user_channel_id
7702
- pub fn accept_inbound_channel(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128) -> Result<(), APIError> {
7703
- self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, false, user_channel_id, vec![], Weight::from_wu(0))
7704
+ pub fn accept_inbound_channel(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128, config_overrides: InboundChannelConfigOverrides ) -> Result<(), APIError> {
7705
+ self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, false, user_channel_id, vec![], Weight::from_wu(0), config_overrides )
7704
7706
}
7705
7707
7706
7708
/// Accepts a request to open a channel after a [`events::Event::OpenChannelRequest`], treating
@@ -7721,15 +7723,19 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7721
7723
///
7722
7724
/// [`Event::OpenChannelRequest`]: events::Event::OpenChannelRequest
7723
7725
/// [`Event::ChannelClosed::user_channel_id`]: events::Event::ChannelClosed::user_channel_id
7724
- pub fn accept_inbound_channel_from_trusted_peer_0conf(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128) -> Result<(), APIError> {
7725
- self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, true, user_channel_id, vec![], Weight::from_wu(0))
7726
+ pub fn accept_inbound_channel_from_trusted_peer_0conf(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128, config_overrides: InboundChannelConfigOverrides ) -> Result<(), APIError> {
7727
+ self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, true, user_channel_id, vec![], Weight::from_wu(0), config_overrides )
7726
7728
}
7727
7729
7728
7730
fn do_accept_inbound_channel(
7729
7731
&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, accept_0conf: bool,
7730
7732
user_channel_id: u128, _funding_inputs: Vec<(TxIn, TransactionU16LenLimited)>,
7731
- _total_witness_weight: Weight,
7733
+ _total_witness_weight: Weight, config_overrides: InboundChannelConfigOverrides
7732
7734
) -> Result<(), APIError> {
7735
+
7736
+ // Apply configuration overrides.
7737
+ let config: UserConfig = config_overrides.apply(&self.default_configuration);
7738
+
7733
7739
let logger = WithContext::from(&self.logger, Some(*counterparty_node_id), Some(*temporary_channel_id), None);
7734
7740
let _persistence_guard = PersistenceNotifierGuard::notify_on_drop(self);
7735
7741
@@ -7759,7 +7765,7 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7759
7765
InboundV1Channel::new(
7760
7766
&self.fee_estimator, &self.entropy_source, &self.signer_provider, *counterparty_node_id,
7761
7767
&self.channel_type_features(), &peer_state.latest_features, &open_channel_msg,
7762
- user_channel_id, &self.default_configuration , best_block_height, &self.logger, accept_0conf
7768
+ user_channel_id, &config , best_block_height, &self.logger, accept_0conf
7763
7769
).map_err(|err| MsgHandleErrInternal::from_chan_no_close(err, *temporary_channel_id)
7764
7770
).map(|mut channel| {
7765
7771
let logger = WithChannelContext::from(&self.logger, &channel.context, None);
@@ -14478,9 +14484,9 @@ mod tests {
14478
14484
use crate::events::{Event, HTLCDestination, MessageSendEvent, MessageSendEventsProvider, ClosureReason};
14479
14485
use crate::ln::types::ChannelId;
14480
14486
use crate::types::payment::{PaymentPreimage, PaymentHash, PaymentSecret};
14481
- use crate::ln::channelmanager::{create_recv_pending_htlc_info, HTLCForwardInfo, inbound_payment , PaymentId, RecipientOnionFields, InterceptId };
14487
+ use crate::ln::channelmanager::{create_recv_pending_htlc_info, inbound_payment, InboundChannelConfigOverrides, HTLCForwardInfo, InterceptId , PaymentId, RecipientOnionFields};
14482
14488
use crate::ln::functional_test_utils::*;
14483
- use crate::ln::msgs::{self, ErrorAction};
14489
+ use crate::ln::msgs::{self, AcceptChannel, ErrorAction};
14484
14490
use crate::ln::msgs::ChannelMessageHandler;
14485
14491
use crate::ln::outbound_payment::Retry;
14486
14492
use crate::prelude::*;
@@ -15237,7 +15243,7 @@ mod tests {
15237
15243
// Test the API functions.
15238
15244
check_not_connected_to_peer_error(nodes[0].node.create_channel(unkown_public_key, 1_000_000, 500_000_000, 42, None, None), unkown_public_key);
15239
15245
15240
- check_unkown_peer_error(nodes[0].node.accept_inbound_channel(&channel_id, &unkown_public_key, 42), unkown_public_key);
15246
+ check_unkown_peer_error(nodes[0].node.accept_inbound_channel(&channel_id, &unkown_public_key, 42, InboundChannelConfigOverrides::default() ), unkown_public_key);
15241
15247
15242
15248
check_unkown_peer_error(nodes[0].node.close_channel(&channel_id, &unkown_public_key), unkown_public_key);
15243
15249
@@ -15268,7 +15274,7 @@ mod tests {
15268
15274
let error_message = "Channel force-closed";
15269
15275
15270
15276
// Test the API functions.
15271
- check_api_misuse_error(nodes[0].node.accept_inbound_channel(&channel_id, &counterparty_node_id, 42));
15277
+ check_api_misuse_error(nodes[0].node.accept_inbound_channel(&channel_id, &counterparty_node_id, 42, InboundChannelConfigOverrides::default() ));
15272
15278
15273
15279
check_channel_unavailable_error(nodes[0].node.close_channel(&channel_id, &counterparty_node_id), channel_id, counterparty_node_id);
15274
15280
@@ -15459,7 +15465,7 @@ mod tests {
15459
15465
let events = nodes[1].node.get_and_clear_pending_events();
15460
15466
match events[0] {
15461
15467
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15462
- nodes[1].node.accept_inbound_channel(&temporary_channel_id, &random_pk, 23).unwrap();
15468
+ nodes[1].node.accept_inbound_channel(&temporary_channel_id, &random_pk, 23, InboundChannelConfigOverrides::default() ).unwrap();
15463
15469
}
15464
15470
_ => panic!("Unexpected event"),
15465
15471
}
@@ -15477,7 +15483,7 @@ mod tests {
15477
15483
let events = nodes[1].node.get_and_clear_pending_events();
15478
15484
match events[0] {
15479
15485
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15480
- match nodes[1].node.accept_inbound_channel(&temporary_channel_id, &last_random_pk, 23) {
15486
+ match nodes[1].node.accept_inbound_channel(&temporary_channel_id, &last_random_pk, 23, InboundChannelConfigOverrides::default() ) {
15481
15487
Err(APIError::APIMisuseError { err }) =>
15482
15488
assert_eq!(err, "Too many peers with unfunded channels, refusing to accept new ones"),
15483
15489
_ => panic!(),
@@ -15493,7 +15499,7 @@ mod tests {
15493
15499
let events = nodes[1].node.get_and_clear_pending_events();
15494
15500
match events[0] {
15495
15501
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15496
- nodes[1].node.accept_inbound_channel_from_trusted_peer_0conf(&temporary_channel_id, &last_random_pk, 23).unwrap();
15502
+ nodes[1].node.accept_inbound_channel_from_trusted_peer_0conf(&temporary_channel_id, &last_random_pk, 23, InboundChannelConfigOverrides::default() ).unwrap();
15497
15503
}
15498
15504
_ => panic!("Unexpected event"),
15499
15505
}
@@ -15573,6 +15579,30 @@ mod tests {
15573
15579
15574
15580
#[test]
15575
15581
fn test_inbound_anchors_manual_acceptance() {
15582
+ test_inbound_anchors_manual_acceptance_with_override(InboundChannelConfigOverrides::default());
15583
+ }
15584
+
15585
+ #[test]
15586
+ fn test_inbound_anchors_manual_acceptance_overridden() {
15587
+ let overrides = InboundChannelConfigOverrides {
15588
+ max_inbound_htlc_value_in_flight_percent_of_channel: Some(5),
15589
+ htlc_minimum_msat: Some(1000),
15590
+ minimum_depth: Some(2),
15591
+ to_self_delay: Some(200),
15592
+ max_accepted_htlcs: Some(5),
15593
+ channel_reserve_proportional_millionths: Some(20000),
15594
+ };
15595
+
15596
+ let accept_message = test_inbound_anchors_manual_acceptance_with_override(overrides);
15597
+ assert_eq!(accept_message.common_fields.max_htlc_value_in_flight_msat, 5_000_000);
15598
+ assert_eq!(accept_message.common_fields.htlc_minimum_msat, 1_000);
15599
+ assert_eq!(accept_message.common_fields.minimum_depth, 2);
15600
+ assert_eq!(accept_message.common_fields.to_self_delay, 200);
15601
+ assert_eq!(accept_message.common_fields.max_accepted_htlcs, 5);
15602
+ assert_eq!(accept_message.channel_reserve_satoshis, 2_000);
15603
+ }
15604
+
15605
+ fn test_inbound_anchors_manual_acceptance_with_override(config_overrides: InboundChannelConfigOverrides) -> AcceptChannel {
15576
15606
// Tests that we properly limit inbound channels when we have the manual-channel-acceptance
15577
15607
// flag set and (sometimes) accept channels as 0conf.
15578
15608
let mut anchors_cfg = test_default_channel_config();
@@ -15609,10 +15639,10 @@ mod tests {
15609
15639
let events = nodes[2].node.get_and_clear_pending_events();
15610
15640
match events[0] {
15611
15641
Event::OpenChannelRequest { temporary_channel_id, .. } =>
15612
- nodes[2].node.accept_inbound_channel(&temporary_channel_id, &nodes[0].node.get_our_node_id(), 23).unwrap(),
15642
+ nodes[2].node.accept_inbound_channel(&temporary_channel_id, &nodes[0].node.get_our_node_id(), 23, config_overrides ).unwrap(),
15613
15643
_ => panic!("Unexpected event"),
15614
15644
}
15615
- get_event_msg!(nodes[2], MessageSendEvent::SendAcceptChannel, nodes[0].node.get_our_node_id());
15645
+ get_event_msg!(nodes[2], MessageSendEvent::SendAcceptChannel, nodes[0].node.get_our_node_id())
15616
15646
}
15617
15647
15618
15648
#[test]
0 commit comments