@@ -78,7 +78,7 @@ use crate::onion_message::messenger::{Destination, MessageRouter, Responder, Res
78
78
use crate::onion_message::offers::{OffersMessage, OffersMessageHandler};
79
79
use crate::sign::{EntropySource, NodeSigner, Recipient, SignerProvider};
80
80
use crate::sign::ecdsa::EcdsaChannelSigner;
81
- use crate::util::config::{UserConfig, ChannelConfig, ChannelConfigUpdate};
81
+ use crate::util::config::{ChannelConfig, ChannelConfigUpdate, InboundChannelConfigOverrides, UserConfig };
82
82
use crate::util::wakers::{Future, Notifier};
83
83
use crate::util::scid_utils::fake_scid;
84
84
use crate::util::string::UntrustedString;
@@ -1851,7 +1851,7 @@ where
1851
1851
///
1852
1852
/// ```
1853
1853
/// # use bitcoin::secp256k1::PublicKey;
1854
- /// # use lightning::ln::channelmanager::AChannelManager;
1854
+ /// # use lightning::ln::channelmanager::{ AChannelManager, InboundChannelConfigOverrides} ;
1855
1855
/// # use lightning::events::{Event, EventsProvider};
1856
1856
/// #
1857
1857
/// # fn is_trusted(counterparty_node_id: PublicKey) -> bool {
@@ -1877,7 +1877,7 @@ where
1877
1877
///
1878
1878
/// let user_channel_id = 43;
1879
1879
/// match channel_manager.accept_inbound_channel(
1880
- /// &temporary_channel_id, &counterparty_node_id, user_channel_id
1880
+ /// &temporary_channel_id, &counterparty_node_id, user_channel_id, InboundChannelConfigOverrides::default()
1881
1881
/// ) {
1882
1882
/// Ok(()) => println!("Accepting channel {}", temporary_channel_id),
1883
1883
/// Err(e) => println!("Error accepting channel {}: {:?}", temporary_channel_id, e),
@@ -7699,8 +7699,8 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7699
7699
///
7700
7700
/// [`Event::OpenChannelRequest`]: events::Event::OpenChannelRequest
7701
7701
/// [`Event::ChannelClosed::user_channel_id`]: events::Event::ChannelClosed::user_channel_id
7702
- pub fn accept_inbound_channel(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128) -> Result<(), APIError> {
7703
- self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, false, user_channel_id, vec![], Weight::from_wu(0))
7702
+ pub fn accept_inbound_channel(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128, config_overrides: InboundChannelConfigOverrides ) -> Result<(), APIError> {
7703
+ self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, false, user_channel_id, vec![], Weight::from_wu(0), config_overrides )
7704
7704
}
7705
7705
7706
7706
/// Accepts a request to open a channel after a [`events::Event::OpenChannelRequest`], treating
@@ -7721,15 +7721,19 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7721
7721
///
7722
7722
/// [`Event::OpenChannelRequest`]: events::Event::OpenChannelRequest
7723
7723
/// [`Event::ChannelClosed::user_channel_id`]: events::Event::ChannelClosed::user_channel_id
7724
- pub fn accept_inbound_channel_from_trusted_peer_0conf(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128) -> Result<(), APIError> {
7725
- self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, true, user_channel_id, vec![], Weight::from_wu(0))
7724
+ pub fn accept_inbound_channel_from_trusted_peer_0conf(&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, user_channel_id: u128, config_overrides: InboundChannelConfigOverrides ) -> Result<(), APIError> {
7725
+ self.do_accept_inbound_channel(temporary_channel_id, counterparty_node_id, true, user_channel_id, vec![], Weight::from_wu(0), config_overrides )
7726
7726
}
7727
7727
7728
7728
fn do_accept_inbound_channel(
7729
7729
&self, temporary_channel_id: &ChannelId, counterparty_node_id: &PublicKey, accept_0conf: bool,
7730
7730
user_channel_id: u128, _funding_inputs: Vec<(TxIn, TransactionU16LenLimited)>,
7731
- _total_witness_weight: Weight,
7731
+ _total_witness_weight: Weight, config_overrides: InboundChannelConfigOverrides
7732
7732
) -> Result<(), APIError> {
7733
+
7734
+ // Apply configuration overrides.
7735
+ let config: UserConfig = config_overrides.apply(&self.default_configuration);
7736
+
7733
7737
let logger = WithContext::from(&self.logger, Some(*counterparty_node_id), Some(*temporary_channel_id), None);
7734
7738
let _persistence_guard = PersistenceNotifierGuard::notify_on_drop(self);
7735
7739
@@ -7759,7 +7763,7 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
7759
7763
InboundV1Channel::new(
7760
7764
&self.fee_estimator, &self.entropy_source, &self.signer_provider, *counterparty_node_id,
7761
7765
&self.channel_type_features(), &peer_state.latest_features, &open_channel_msg,
7762
- user_channel_id, &self.default_configuration , best_block_height, &self.logger, accept_0conf
7766
+ user_channel_id, &config , best_block_height, &self.logger, accept_0conf
7763
7767
).map_err(|err| MsgHandleErrInternal::from_chan_no_close(err, *temporary_channel_id)
7764
7768
).map(|mut channel| {
7765
7769
let logger = WithChannelContext::from(&self.logger, &channel.context, None);
@@ -14478,9 +14482,9 @@ mod tests {
14478
14482
use crate::events::{Event, HTLCDestination, MessageSendEvent, MessageSendEventsProvider, ClosureReason};
14479
14483
use crate::ln::types::ChannelId;
14480
14484
use crate::types::payment::{PaymentPreimage, PaymentHash, PaymentSecret};
14481
- use crate::ln::channelmanager::{create_recv_pending_htlc_info, HTLCForwardInfo, inbound_payment , PaymentId, RecipientOnionFields, InterceptId };
14485
+ use crate::ln::channelmanager::{create_recv_pending_htlc_info, inbound_payment, InboundChannelConfigOverrides, HTLCForwardInfo, InterceptId , PaymentId, RecipientOnionFields};
14482
14486
use crate::ln::functional_test_utils::*;
14483
- use crate::ln::msgs::{self, ErrorAction};
14487
+ use crate::ln::msgs::{self, AcceptChannel, ErrorAction};
14484
14488
use crate::ln::msgs::ChannelMessageHandler;
14485
14489
use crate::ln::outbound_payment::Retry;
14486
14490
use crate::prelude::*;
@@ -15237,7 +15241,7 @@ mod tests {
15237
15241
// Test the API functions.
15238
15242
check_not_connected_to_peer_error(nodes[0].node.create_channel(unkown_public_key, 1_000_000, 500_000_000, 42, None, None), unkown_public_key);
15239
15243
15240
- check_unkown_peer_error(nodes[0].node.accept_inbound_channel(&channel_id, &unkown_public_key, 42), unkown_public_key);
15244
+ check_unkown_peer_error(nodes[0].node.accept_inbound_channel(&channel_id, &unkown_public_key, 42, InboundChannelConfigOverrides::default() ), unkown_public_key);
15241
15245
15242
15246
check_unkown_peer_error(nodes[0].node.close_channel(&channel_id, &unkown_public_key), unkown_public_key);
15243
15247
@@ -15268,7 +15272,7 @@ mod tests {
15268
15272
let error_message = "Channel force-closed";
15269
15273
15270
15274
// Test the API functions.
15271
- check_api_misuse_error(nodes[0].node.accept_inbound_channel(&channel_id, &counterparty_node_id, 42));
15275
+ check_api_misuse_error(nodes[0].node.accept_inbound_channel(&channel_id, &counterparty_node_id, 42, InboundChannelConfigOverrides::default() ));
15272
15276
15273
15277
check_channel_unavailable_error(nodes[0].node.close_channel(&channel_id, &counterparty_node_id), channel_id, counterparty_node_id);
15274
15278
@@ -15459,7 +15463,7 @@ mod tests {
15459
15463
let events = nodes[1].node.get_and_clear_pending_events();
15460
15464
match events[0] {
15461
15465
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15462
- nodes[1].node.accept_inbound_channel(&temporary_channel_id, &random_pk, 23).unwrap();
15466
+ nodes[1].node.accept_inbound_channel(&temporary_channel_id, &random_pk, 23, InboundChannelConfigOverrides::default() ).unwrap();
15463
15467
}
15464
15468
_ => panic!("Unexpected event"),
15465
15469
}
@@ -15477,7 +15481,7 @@ mod tests {
15477
15481
let events = nodes[1].node.get_and_clear_pending_events();
15478
15482
match events[0] {
15479
15483
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15480
- match nodes[1].node.accept_inbound_channel(&temporary_channel_id, &last_random_pk, 23) {
15484
+ match nodes[1].node.accept_inbound_channel(&temporary_channel_id, &last_random_pk, 23, InboundChannelConfigOverrides::default() ) {
15481
15485
Err(APIError::APIMisuseError { err }) =>
15482
15486
assert_eq!(err, "Too many peers with unfunded channels, refusing to accept new ones"),
15483
15487
_ => panic!(),
@@ -15493,7 +15497,7 @@ mod tests {
15493
15497
let events = nodes[1].node.get_and_clear_pending_events();
15494
15498
match events[0] {
15495
15499
Event::OpenChannelRequest { temporary_channel_id, .. } => {
15496
- nodes[1].node.accept_inbound_channel_from_trusted_peer_0conf(&temporary_channel_id, &last_random_pk, 23).unwrap();
15500
+ nodes[1].node.accept_inbound_channel_from_trusted_peer_0conf(&temporary_channel_id, &last_random_pk, 23, InboundChannelConfigOverrides::default() ).unwrap();
15497
15501
}
15498
15502
_ => panic!("Unexpected event"),
15499
15503
}
@@ -15573,6 +15577,30 @@ mod tests {
15573
15577
15574
15578
#[test]
15575
15579
fn test_inbound_anchors_manual_acceptance() {
15580
+ test_inbound_anchors_manual_acceptance_with_override(InboundChannelConfigOverrides::default());
15581
+ }
15582
+
15583
+ #[test]
15584
+ fn test_inbound_anchors_manual_acceptance_overridden() {
15585
+ let overrides = InboundChannelConfigOverrides {
15586
+ max_inbound_htlc_value_in_flight_percent_of_channel: Some(5),
15587
+ htlc_minimum_msat: Some(1000),
15588
+ minimum_depth: Some(2),
15589
+ to_self_delay: Some(200),
15590
+ max_accepted_htlcs: Some(5),
15591
+ channel_reserve_proportional_millionths: Some(20000),
15592
+ };
15593
+
15594
+ let accept_message = test_inbound_anchors_manual_acceptance_with_override(overrides);
15595
+ assert_eq!(accept_message.common_fields.max_htlc_value_in_flight_msat, 5_000_000);
15596
+ assert_eq!(accept_message.common_fields.htlc_minimum_msat, 1_000);
15597
+ assert_eq!(accept_message.common_fields.minimum_depth, 2);
15598
+ assert_eq!(accept_message.common_fields.to_self_delay, 200);
15599
+ assert_eq!(accept_message.common_fields.max_accepted_htlcs, 5);
15600
+ assert_eq!(accept_message.channel_reserve_satoshis, 2_000);
15601
+ }
15602
+
15603
+ fn test_inbound_anchors_manual_acceptance_with_override(config_overrides: InboundChannelConfigOverrides) -> AcceptChannel {
15576
15604
// Tests that we properly limit inbound channels when we have the manual-channel-acceptance
15577
15605
// flag set and (sometimes) accept channels as 0conf.
15578
15606
let mut anchors_cfg = test_default_channel_config();
@@ -15609,10 +15637,10 @@ mod tests {
15609
15637
let events = nodes[2].node.get_and_clear_pending_events();
15610
15638
match events[0] {
15611
15639
Event::OpenChannelRequest { temporary_channel_id, .. } =>
15612
- nodes[2].node.accept_inbound_channel(&temporary_channel_id, &nodes[0].node.get_our_node_id(), 23).unwrap(),
15640
+ nodes[2].node.accept_inbound_channel(&temporary_channel_id, &nodes[0].node.get_our_node_id(), 23, config_overrides ).unwrap(),
15613
15641
_ => panic!("Unexpected event"),
15614
15642
}
15615
- get_event_msg!(nodes[2], MessageSendEvent::SendAcceptChannel, nodes[0].node.get_our_node_id());
15643
+ get_event_msg!(nodes[2], MessageSendEvent::SendAcceptChannel, nodes[0].node.get_our_node_id())
15616
15644
}
15617
15645
15618
15646
#[test]
0 commit comments