@@ -80,7 +80,7 @@ use crate::onion_message::messenger::{Destination, MessageRouter, Responder, Res
80
80
use crate::onion_message::offers::{OffersMessage, OffersMessageHandler};
81
81
use crate::sign::{EntropySource, NodeSigner, Recipient, SignerProvider};
82
82
use crate::sign::ecdsa::EcdsaChannelSigner;
83
- use crate::util::config::{UserConfig, ChannelConfig, ChannelConfigUpdate};
83
+ use crate::util::config::{ChannelConfig, ChannelConfigUpdate, ChannelConfigOverrides, UserConfig };
84
84
use crate::util::wakers::{Future, Notifier};
85
85
use crate::util::scid_utils::fake_scid;
86
86
use crate::util::string::UntrustedString;
@@ -1900,7 +1900,7 @@ where
1900
1900
///
1901
1901
/// let user_channel_id = 43;
1902
1902
/// match channel_manager.accept_inbound_channel(
1903
- /// &temporary_channel_id, &counterparty_node_id, user_channel_id
1903
+ /// &temporary_channel_id, &counterparty_node_id, user_channel_id, None
1904
1904
/// ) {
1905
1905
/// Ok(()) => println!("Accepting channel {}", temporary_channel_id),
1906
1906
/// Err(e) => println!("Error accepting channel {}: {:?}", temporary_channel_id, e),
@@ -7722,8 +7722,8 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7722
7722
///
7723
7723
/// [`Event::OpenChannelRequest`]: events::Event::OpenChannelRequest
7724
7724
/// [`Event::ChannelClosed::user_channel_id`]: events::Event::ChannelClosed::user_channel_id
7725
- pub fn accept_inbound_channel(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128) -> Result<(), APIError> {
7726
- self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, false, user_channel_id)
7725
+ pub fn accept_inbound_channel(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128, config_overrides: Option<ChannelConfigOverrides> ) -> Result<(), APIError> {
7726
+ self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, false, user_channel_id, config_overrides )
7727
7727
}
7728
7728
7729
7729
/// Accepts a request to open a channel after a [`events::Event::OpenChannelRequest`], treating
@@ -7744,15 +7744,23 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7744
7744
///
7745
7745
/// [`Event::OpenChannelRequest`]: events::Event::OpenChannelRequest
7746
7746
/// [`Event::ChannelClosed::user_channel_id`]: events::Event::ChannelClosed::user_channel_id
7747
- pub fn accept_inbound_channel_from_trusted_peer_0conf(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128) -> Result<(), APIError> {
7748
- self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, true, user_channel_id)
7747
+ pub fn accept_inbound_channel_from_trusted_peer_0conf(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128, config_overrides: Option<ChannelConfigOverrides> ) -> Result<(), APIError> {
7748
+ self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, true, user_channel_id, config_overrides )
7749
7749
}
7750
7750
7751
7751
/// TODO(dual_funding): Allow contributions, pass intended amount and inputs
7752
7752
fn do_accept_inbound_channel(
7753
7753
&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, accept_0conf: bool,
7754
- user_channel_id: u128,
7754
+ user_channel_id: u128, config_overrides: Option<ChannelConfigOverrides>
7755
7755
) -> Result<(), APIError> {
7756
+
7757
+ let mut config = self.default_configuration.clone();
7758
+
7759
+ // Apply configuration overrides.
7760
+ if let Some(overrides) = config_overrides {
7761
+ config.apply(&overrides);
7762
+ };
7763
+
7756
7764
let logger = WithContext::from(&self.logger, Some(*counterparty_node_id), Some(*temporary_channel_id), None);
7757
7765
let _persistence_guard = PersistenceNotifierGuard::notify_on_drop(self);
7758
7766
@@ -7782,7 +7790,7 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7782
7790
InboundV1Channel::new(
7783
7791
&self.fee_estimator, &self.entropy_source, &self.signer_provider, *counterparty_node_id,
7784
7792
&self.channel_type_features(), &peer_state.latest_features, &open_channel_msg,
7785
- user_channel_id, &self.default_configuration , best_block_height, &self.logger, accept_0conf
7793
+ user_channel_id, &config , best_block_height, &self.logger, accept_0conf
7786
7794
).map_err(|err| MsgHandleErrInternal::from_chan_no_close(err, *temporary_channel_id)
7787
7795
).map(|mut channel| {
7788
7796
let logger = WithChannelContext::from(&self.logger, &channel.context, None);
@@ -7802,7 +7810,7 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7802
7810
self.get_our_node_id(), *counterparty_node_id,
7803
7811
&self.channel_type_features(), &peer_state.latest_features,
7804
7812
&open_channel_msg,
7805
- user_channel_id, &self.default_configuration , best_block_height,
7813
+ user_channel_id, &config , best_block_height,
7806
7814
&self.logger,
7807
7815
).map_err(|_| MsgHandleErrInternal::from_chan_no_close(
7808
7816
ChannelError::Close(
@@ -14540,17 +14548,17 @@ mod tests {
14540
14548
use crate::events::{Event, HTLCDestination, MessageSendEvent, MessageSendEventsProvider, ClosureReason};
14541
14549
use crate::ln::types::ChannelId;
14542
14550
use crate::types::payment::{PaymentPreimage, PaymentHash, PaymentSecret};
14543
- use crate::ln::channelmanager::{create_recv_pending_htlc_info, HTLCForwardInfo, inbound_payment , PaymentId, RecipientOnionFields, InterceptId };
14551
+ use crate::ln::channelmanager::{create_recv_pending_htlc_info, inbound_payment, ChannelConfigOverrides, HTLCForwardInfo, InterceptId , PaymentId, RecipientOnionFields};
14544
14552
use crate::ln::functional_test_utils::*;
14545
- use crate::ln::msgs::{self, ErrorAction};
14553
+ use crate::ln::msgs::{self, AcceptChannel, ErrorAction};
14546
14554
use crate::ln::msgs::ChannelMessageHandler;
14547
14555
use crate::ln::outbound_payment::Retry;
14548
14556
use crate::prelude::*;
14549
14557
use crate::routing::router::{PaymentParameters, RouteParameters, find_route};
14550
14558
use crate::util::errors::APIError;
14551
14559
use crate::util::ser::Writeable;
14552
14560
use crate::util::test_utils;
14553
- use crate::util::config::{ChannelConfig, ChannelConfigUpdate};
14561
+ use crate::util::config::{ChannelConfig, ChannelConfigUpdate, ChannelHandshakeConfigUpdate };
14554
14562
use crate::sign::EntropySource;
14555
14563
14556
14564
#[test]
@@ -15299,7 +15307,7 @@ mod tests {
15299
15307
// Test the API functions.
15300
15308
check_not_connected_to_peer_error(nodes[0].node.create_channel(unkown_public_key, 1_000_000, 500_000_000, 42, None, None), unkown_public_key);
15301
15309
15302
- check_unkown_peer_error(nodes[0].node.accept_inbound_channel(&channel_id, &unkown_public_key, 42), unkown_public_key);
15310
+ check_unkown_peer_error(nodes[0].node.accept_inbound_channel(&channel_id, &unkown_public_key, 42, None ), unkown_public_key);
15303
15311
15304
15312
check_unkown_peer_error(nodes[0].node.close_channel(&channel_id, &unkown_public_key), unkown_public_key);
15305
15313
@@ -15330,7 +15338,7 @@ mod tests {
15330
15338
let error_message = "Channel force-closed";
15331
15339
15332
15340
// Test the API functions.
15333
- check_api_misuse_error(nodes[0].node.accept_inbound_channel(&channel_id, &counterparty_node_id, 42));
15341
+ check_api_misuse_error(nodes[0].node.accept_inbound_channel(&channel_id, &counterparty_node_id, 42, None ));
15334
15342
15335
15343
check_channel_unavailable_error(nodes[0].node.close_channel(&channel_id, &counterparty_node_id), channel_id, counterparty_node_id);
15336
15344
@@ -15521,7 +15529,7 @@ mod tests {
15521
15529
let events = nodes[1].node.get_and_clear_pending_events();
15522
15530
match events[0] {
15523
15531
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15524
- nodes[1].node.accept_inbound_channel(&temporary_channel_id, &random_pk, 23).unwrap();
15532
+ nodes[1].node.accept_inbound_channel(&temporary_channel_id, &random_pk, 23, None ).unwrap();
15525
15533
}
15526
15534
_ => panic!("Unexpected event"),
15527
15535
}
@@ -15539,7 +15547,7 @@ mod tests {
15539
15547
let events = nodes[1].node.get_and_clear_pending_events();
15540
15548
match events[0] {
15541
15549
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15542
- match nodes[1].node.accept_inbound_channel(&temporary_channel_id, &last_random_pk, 23) {
15550
+ match nodes[1].node.accept_inbound_channel(&temporary_channel_id, &last_random_pk, 23, None ) {
15543
15551
Err(APIError::APIMisuseError { err }) =>
15544
15552
assert_eq!(err, "Too many peers with unfunded channels, refusing to accept new ones"),
15545
15553
_ => panic!(),
@@ -15555,7 +15563,7 @@ mod tests {
15555
15563
let events = nodes[1].node.get_and_clear_pending_events();
15556
15564
match events[0] {
15557
15565
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15558
- nodes[1].node.accept_inbound_channel_from_trusted_peer_0conf(&temporary_channel_id, &last_random_pk, 23).unwrap();
15566
+ nodes[1].node.accept_inbound_channel_from_trusted_peer_0conf(&temporary_channel_id, &last_random_pk, 23, None ).unwrap();
15559
15567
}
15560
15568
_ => panic!("Unexpected event"),
15561
15569
}
@@ -15635,6 +15643,33 @@ mod tests {
15635
15643
15636
15644
#[test]
15637
15645
fn test_inbound_anchors_manual_acceptance() {
15646
+ test_inbound_anchors_manual_acceptance_with_override(None);
15647
+ }
15648
+
15649
+ #[test]
15650
+ fn test_inbound_anchors_manual_acceptance_overridden() {
15651
+ let overrides = ChannelConfigOverrides {
15652
+ handshake_overrides: Some(ChannelHandshakeConfigUpdate {
15653
+ max_inbound_htlc_value_in_flight_percent_of_channel: Some(5),
15654
+ htlc_minimum_msat: Some(1000),
15655
+ minimum_depth: Some(2),
15656
+ to_self_delay: Some(200),
15657
+ max_accepted_htlcs: Some(5),
15658
+ channel_reserve_proportional_millionths: Some(20000),
15659
+ }),
15660
+ update_overrides: None,
15661
+ };
15662
+
15663
+ let accept_message = test_inbound_anchors_manual_acceptance_with_override(Some(overrides));
15664
+ assert_eq!(accept_message.common_fields.max_htlc_value_in_flight_msat, 5_000_000);
15665
+ assert_eq!(accept_message.common_fields.htlc_minimum_msat, 1_000);
15666
+ assert_eq!(accept_message.common_fields.minimum_depth, 2);
15667
+ assert_eq!(accept_message.common_fields.to_self_delay, 200);
15668
+ assert_eq!(accept_message.common_fields.max_accepted_htlcs, 5);
15669
+ assert_eq!(accept_message.channel_reserve_satoshis, 2_000);
15670
+ }
15671
+
15672
+ fn test_inbound_anchors_manual_acceptance_with_override(config_overrides: Option<ChannelConfigOverrides>) -> AcceptChannel {
15638
15673
// Tests that we properly limit inbound channels when we have the manual-channel-acceptance
15639
15674
// flag set and (sometimes) accept channels as 0conf.
15640
15675
let mut anchors_cfg = test_default_channel_config();
@@ -15671,10 +15706,10 @@ mod tests {
15671
15706
let events = nodes[2].node.get_and_clear_pending_events();
15672
15707
match events[0] {
15673
15708
Event::OpenChannelRequest { temporary_channel_id, .. } =>
15674
- nodes[2].node.accept_inbound_channel(&temporary_channel_id, &nodes[0].node.get_our_node_id(), 23).unwrap(),
15709
+ nodes[2].node.accept_inbound_channel(&temporary_channel_id, &nodes[0].node.get_our_node_id(), 23, config_overrides ).unwrap(),
15675
15710
_ => panic!("Unexpected event"),
15676
15711
}
15677
- get_event_msg!(nodes[2], MessageSendEvent::SendAcceptChannel, nodes[0].node.get_our_node_id());
15712
+ get_event_msg!(nodes[2], MessageSendEvent::SendAcceptChannel, nodes[0].node.get_our_node_id())
15678
15713
}
15679
15714
15680
15715
#[test]
0 commit comments