@@ -57,7 +57,7 @@ use crate::types::features::Bolt11InvoiceFeatures;
57
57
#[cfg(trampoline)]
58
58
use crate::routing::gossip::NodeId;
59
59
use crate::routing::router::{BlindedTail, InFlightHtlcs, Path, Payee, PaymentParameters, RouteParameters, RouteParametersConfig, Router, FixedRouter, Route};
60
- use crate::ln::onion_payment::{check_incoming_htlc_cltv, create_recv_pending_htlc_info, create_fwd_pending_htlc_info, decode_incoming_update_add_htlc_onion, InboundHTLCErr, NextPacketDetails};
60
+ use crate::ln::onion_payment::{check_incoming_htlc_cltv, create_recv_pending_htlc_info, create_fwd_pending_htlc_info, decode_incoming_update_add_htlc_onion, HopConnector, InboundHTLCErr, NextPacketDetails};
61
61
use crate::ln::msgs;
62
62
use crate::ln::onion_utils;
63
63
use crate::ln::onion_utils::{HTLCFailReason, INVALID_ONION_BLINDING};
@@ -4303,11 +4303,15 @@ where
4303
4303
// we don't allow forwards outbound over them.
4304
4304
return Err(("Refusing to forward to a private channel based on our config.", 0x4000 | 10));
4305
4305
}
4306
- if chan.context.get_channel_type().supports_scid_privacy() && next_packet.outgoing_scid != chan.context.outbound_scid_alias() {
4307
- // `option_scid_alias` (referred to in LDK as `scid_privacy`) means
4308
- // "refuse to forward unless the SCID alias was used", so we pretend
4309
- // we don't have the channel here.
4310
- return Err(("Refusing to forward over real channel SCID as our counterparty requested.", 0x4000 | 10));
4306
+ if let HopConnector::ShortChannelId(outgoing_scid) = next_packet.outgoing_connector {
4307
+ if chan.context.get_channel_type().supports_scid_privacy() && outgoing_scid != chan.context.outbound_scid_alias() {
4308
+ // `option_scid_alias` (referred to in LDK as `scid_privacy`) means
4309
+ // "refuse to forward unless the SCID alias was used", so we pretend
4310
+ // we don't have the channel here.
4311
+ return Err(("Refusing to forward over real channel SCID as our counterparty requested.", 0x4000 | 10));
4312
+ }
4313
+ } else {
4314
+ return Err(("Cannot forward by Node ID without SCID.", 0x4000 | 10));
4311
4315
}
4312
4316
4313
4317
// Note that we could technically not return an error yet here and just hope
@@ -4359,7 +4363,13 @@ where
4359
4363
fn can_forward_htlc(
4360
4364
&self, msg: &msgs::UpdateAddHTLC, next_packet_details: &NextPacketDetails
4361
4365
) -> Result<(), (&'static str, u16)> {
4362
- match self.do_funded_channel_callback(next_packet_details.outgoing_scid, |chan: &mut FundedChannel<SP>| {
4366
+ let outgoing_scid = match next_packet_details.outgoing_connector {
4367
+ HopConnector::ShortChannelId(scid) => scid,
4368
+ HopConnector::Trampoline(_) => {
4369
+ return Err(("Cannot forward by Node ID without SCID.", 0x4000 | 10));
4370
+ }
4371
+ };
4372
+ match self.do_funded_channel_callback(outgoing_scid, |chan: &mut FundedChannel<SP>| {
4363
4373
self.can_forward_htlc_to_outgoing_channel(chan, msg, next_packet_details)
4364
4374
}) {
4365
4375
Some(Ok(())) => {},
@@ -4368,8 +4378,8 @@ where
4368
4378
// If we couldn't find the channel info for the scid, it may be a phantom or
4369
4379
// intercept forward.
4370
4380
if (self.default_configuration.accept_intercept_htlcs &&
4371
- fake_scid::is_valid_intercept(&self.fake_scid_rand_bytes, next_packet_details. outgoing_scid, &self.chain_hash)) ||
4372
- fake_scid::is_valid_phantom(&self.fake_scid_rand_bytes, next_packet_details. outgoing_scid, &self.chain_hash)
4381
+ fake_scid::is_valid_intercept(&self.fake_scid_rand_bytes, outgoing_scid, &self.chain_hash)) ||
4382
+ fake_scid::is_valid_phantom(&self.fake_scid_rand_bytes, outgoing_scid, &self.chain_hash)
4373
4383
{} else {
4374
4384
return Err(("Don't have available channel for forwarding as requested.", 0x4000 | 10));
4375
4385
}
@@ -5720,7 +5730,12 @@ where
5720
5730
};
5721
5731
5722
5732
let is_intro_node_blinded_forward = next_hop.is_intro_node_blinded_forward();
5723
- let outgoing_scid_opt = next_packet_details_opt.as_ref().map(|d| d.outgoing_scid);
5733
+ let outgoing_scid_opt = next_packet_details_opt.as_ref().and_then(|d| {
5734
+ match d.outgoing_connector {
5735
+ HopConnector::ShortChannelId(scid) => { Some(scid) }
5736
+ HopConnector::Trampoline(_) => { None }
5737
+ }
5738
+ });
5724
5739
let shared_secret = next_hop.shared_secret().secret_bytes();
5725
5740
5726
5741
// Process the HTLC on the incoming channel.
0 commit comments