@@ -699,7 +699,7 @@ fn test_update_fee_that_funder_cannot_afford() {
699
699
// needed to sign the new commitment tx and (2) sign the new commitment tx.
700
700
let (local_revocation_basepoint, local_htlc_basepoint, local_funding) = {
701
701
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
702
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
702
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
703
703
let local_chan = chan_lock.channel_by_id.get(&chan.2).map(
704
704
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
705
705
).flatten().unwrap();
@@ -710,7 +710,7 @@ fn test_update_fee_that_funder_cannot_afford() {
710
710
};
711
711
let (remote_delayed_payment_basepoint, remote_htlc_basepoint,remote_point, remote_funding) = {
712
712
let per_peer_state = nodes[1].node.per_peer_state.read().unwrap();
713
- let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().lock ().unwrap();
713
+ let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().write ().unwrap();
714
714
let remote_chan = chan_lock.channel_by_id.get(&chan.2).map(
715
715
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
716
716
).flatten().unwrap();
@@ -727,7 +727,7 @@ fn test_update_fee_that_funder_cannot_afford() {
727
727
728
728
let res = {
729
729
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
730
- let local_chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
730
+ let local_chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
731
731
let local_chan = local_chan_lock.channel_by_id.get(&chan.2).map(
732
732
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
733
733
).flatten().unwrap();
@@ -1429,7 +1429,7 @@ fn test_fee_spike_violation_fails_htlc() {
1429
1429
// needed to sign the new commitment tx and (2) sign the new commitment tx.
1430
1430
let (local_revocation_basepoint, local_htlc_basepoint, local_secret, next_local_point, local_funding) = {
1431
1431
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
1432
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
1432
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
1433
1433
let local_chan = chan_lock.channel_by_id.get(&chan.2).map(
1434
1434
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
1435
1435
).flatten().unwrap();
@@ -1445,7 +1445,7 @@ fn test_fee_spike_violation_fails_htlc() {
1445
1445
};
1446
1446
let (remote_delayed_payment_basepoint, remote_htlc_basepoint, remote_point, remote_funding) = {
1447
1447
let per_peer_state = nodes[1].node.per_peer_state.read().unwrap();
1448
- let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().lock ().unwrap();
1448
+ let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().write ().unwrap();
1449
1449
let remote_chan = chan_lock.channel_by_id.get(&chan.2).map(
1450
1450
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
1451
1451
).flatten().unwrap();
@@ -1476,7 +1476,7 @@ fn test_fee_spike_violation_fails_htlc() {
1476
1476
1477
1477
let res = {
1478
1478
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
1479
- let local_chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
1479
+ let local_chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
1480
1480
let local_chan = local_chan_lock.channel_by_id.get(&chan.2).map(
1481
1481
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
1482
1482
).flatten().unwrap();
@@ -3236,7 +3236,7 @@ fn do_test_commitment_revoked_fail_backward_exhaustive(deliver_bs_raa: bool, use
3236
3236
// The dust limit applied to HTLC outputs considers the fee of the HTLC transaction as
3237
3237
// well, so HTLCs at exactly the dust limit will not be included in commitment txn.
3238
3238
nodes[2].node.per_peer_state.read().unwrap().get(&nodes[1].node.get_our_node_id())
3239
- .unwrap().lock ().unwrap().channel_by_id.get(&chan_2.2).unwrap().context().holder_dust_limit_satoshis * 1000
3239
+ .unwrap().write ().unwrap().channel_by_id.get(&chan_2.2).unwrap().context().holder_dust_limit_satoshis * 1000
3240
3240
} else { 3000000 };
3241
3241
3242
3242
let (_, first_payment_hash, ..) = route_payment(&nodes[0], &[&nodes[1], &nodes[2]], value);
@@ -5209,7 +5209,7 @@ fn do_test_fail_backwards_unrevoked_remote_announce(deliver_last_raa: bool, anno
5209
5209
assert_eq!(get_local_commitment_txn!(nodes[3], chan_2_3.2)[0].output.len(), 2);
5210
5210
5211
5211
let ds_dust_limit = nodes[3].node.per_peer_state.read().unwrap().get(&nodes[2].node.get_our_node_id())
5212
- .unwrap().lock ().unwrap().channel_by_id.get(&chan_2_3.2).unwrap().context().holder_dust_limit_satoshis;
5212
+ .unwrap().write ().unwrap().channel_by_id.get(&chan_2_3.2).unwrap().context().holder_dust_limit_satoshis;
5213
5213
// 0th HTLC:
5214
5214
let (_, payment_hash_1, ..) = route_payment(&nodes[0], &[&nodes[2], &nodes[3], &nodes[4]], ds_dust_limit*1000); // not added < dust limit + HTLC tx fee
5215
5215
// 1st HTLC:
@@ -6344,7 +6344,7 @@ fn test_update_add_htlc_bolt2_sender_exceed_max_htlc_num_and_htlc_id_increment()
6344
6344
let mut nodes = create_network(2, &node_cfgs, &node_chanmgrs);
6345
6345
let chan = create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 1000000, 0);
6346
6346
let max_accepted_htlcs = nodes[1].node.per_peer_state.read().unwrap().get(&nodes[0].node.get_our_node_id())
6347
- .unwrap().lock ().unwrap().channel_by_id.get(&chan.2).unwrap().context().counterparty_max_accepted_htlcs as u64;
6347
+ .unwrap().write ().unwrap().channel_by_id.get(&chan.2).unwrap().context().counterparty_max_accepted_htlcs as u64;
6348
6348
6349
6349
// Fetch a route in advance as we will be unable to once we're unable to send.
6350
6350
let (route, our_payment_hash, _, our_payment_secret) = get_route_and_payment_hash!(nodes[0], nodes[1], 100000);
@@ -6415,7 +6415,7 @@ fn test_update_add_htlc_bolt2_receiver_check_amount_received_more_than_min() {
6415
6415
let htlc_minimum_msat: u64;
6416
6416
{
6417
6417
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
6418
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
6418
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
6419
6419
let channel = chan_lock.channel_by_id.get(&chan.2).unwrap();
6420
6420
htlc_minimum_msat = channel.context().get_holder_htlc_minimum_msat();
6421
6421
}
@@ -7021,7 +7021,7 @@ fn do_test_failure_delay_dust_htlc_local_commitment(announce_latest: bool) {
7021
7021
let chan =create_announced_chan_between_nodes(&nodes, 0, 1);
7022
7022
7023
7023
let bs_dust_limit = nodes[1].node.per_peer_state.read().unwrap().get(&nodes[0].node.get_our_node_id())
7024
- .unwrap().lock ().unwrap().channel_by_id.get(&chan.2).unwrap().context().holder_dust_limit_satoshis;
7024
+ .unwrap().write ().unwrap().channel_by_id.get(&chan.2).unwrap().context().holder_dust_limit_satoshis;
7025
7025
7026
7026
// We route 2 dust-HTLCs between A and B
7027
7027
let (_, payment_hash_1, ..) = route_payment(&nodes[0], &[&nodes[1]], bs_dust_limit*1000);
@@ -7114,7 +7114,7 @@ fn do_test_sweep_outbound_htlc_failure_update(revoked: bool, local: bool) {
7114
7114
let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
7115
7115
7116
7116
let bs_dust_limit = nodes[1].node.per_peer_state.read().unwrap().get(&nodes[0].node.get_our_node_id())
7117
- .unwrap().lock ().unwrap().channel_by_id.get(&chan.2).unwrap().context().holder_dust_limit_satoshis;
7117
+ .unwrap().write ().unwrap().channel_by_id.get(&chan.2).unwrap().context().holder_dust_limit_satoshis;
7118
7118
7119
7119
let (_payment_preimage_1, dust_hash, ..) = route_payment(&nodes[0], &[&nodes[1]], bs_dust_limit*1000);
7120
7120
let (_payment_preimage_2, non_dust_hash, ..) = route_payment(&nodes[0], &[&nodes[1]], 1000000);
@@ -7796,7 +7796,7 @@ fn test_counterparty_raa_skip_no_crash() {
7796
7796
let next_per_commitment_point;
7797
7797
{
7798
7798
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
7799
- let mut guard = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
7799
+ let mut guard = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
7800
7800
let keys = guard.channel_by_id.get_mut(&channel_id).map(
7801
7801
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
7802
7802
).flatten().unwrap().get_signer();
@@ -9227,7 +9227,7 @@ fn test_duplicate_chan_id() {
9227
9227
9228
9228
let funding_created = {
9229
9229
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
9230
- let mut a_peer_state = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
9230
+ let mut a_peer_state = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
9231
9231
// Once we call `get_funding_created` the channel has a duplicate channel_id as
9232
9232
// another channel in the ChannelManager - an invalid state. Thus, we'd panic later when we
9233
9233
// try to create another channel. Instead, we drop the channel entirely here (leaving the
@@ -9942,7 +9942,7 @@ fn do_test_max_dust_htlc_exposure(dust_outbound_balance: bool, exposure_breach_e
9942
9942
9943
9943
let (dust_buffer_feerate, max_dust_htlc_exposure_msat) = {
9944
9944
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
9945
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
9945
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
9946
9946
let chan = chan_lock.channel_by_id.get(&channel_id).unwrap();
9947
9947
(chan.context().get_dust_buffer_feerate(None) as u64,
9948
9948
chan.context().get_max_dust_htlc_exposure_msat(&LowerBoundedFeeEstimator(nodes[0].fee_estimator)))
@@ -10440,7 +10440,7 @@ fn test_remove_expired_outbound_unfunded_channels() {
10440
10440
// Asserts the outbound channel has been removed from a nodes[0]'s peer state map.
10441
10441
let check_outbound_channel_existence = |should_exist: bool| {
10442
10442
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
10443
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
10443
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
10444
10444
assert_eq!(chan_lock.channel_by_id.contains_key(&temp_channel_id), should_exist);
10445
10445
};
10446
10446
@@ -10491,7 +10491,7 @@ fn test_remove_expired_inbound_unfunded_channels() {
10491
10491
// Asserts the inbound channel has been removed from a nodes[1]'s peer state map.
10492
10492
let check_inbound_channel_existence = |should_exist: bool| {
10493
10493
let per_peer_state = nodes[1].node.per_peer_state.read().unwrap();
10494
- let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().lock ().unwrap();
10494
+ let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().write ().unwrap();
10495
10495
assert_eq!(chan_lock.channel_by_id.contains_key(&temp_channel_id), should_exist);
10496
10496
};
10497
10497
0 commit comments