@@ -702,7 +702,7 @@ fn test_update_fee_that_funder_cannot_afford() {
702
702
// needed to sign the new commitment tx and (2) sign the new commitment tx.
703
703
let (local_revocation_basepoint, local_htlc_basepoint, local_funding) = {
704
704
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
705
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
705
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
706
706
let local_chan = chan_lock.channel_by_id.get(&chan.2).map(
707
707
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
708
708
).flatten().unwrap();
@@ -713,7 +713,7 @@ fn test_update_fee_that_funder_cannot_afford() {
713
713
};
714
714
let (remote_delayed_payment_basepoint, remote_htlc_basepoint,remote_point, remote_funding) = {
715
715
let per_peer_state = nodes[1].node.per_peer_state.read().unwrap();
716
- let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().lock ().unwrap();
716
+ let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().write ().unwrap();
717
717
let remote_chan = chan_lock.channel_by_id.get(&chan.2).map(
718
718
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
719
719
).flatten().unwrap();
@@ -730,7 +730,7 @@ fn test_update_fee_that_funder_cannot_afford() {
730
730
731
731
let res = {
732
732
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
733
- let local_chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
733
+ let local_chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
734
734
let local_chan = local_chan_lock.channel_by_id.get(&chan.2).map(
735
735
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
736
736
).flatten().unwrap();
@@ -1432,7 +1432,7 @@ fn test_fee_spike_violation_fails_htlc() {
1432
1432
// needed to sign the new commitment tx and (2) sign the new commitment tx.
1433
1433
let (local_revocation_basepoint, local_htlc_basepoint, local_secret, next_local_point, local_funding) = {
1434
1434
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
1435
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
1435
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
1436
1436
let local_chan = chan_lock.channel_by_id.get(&chan.2).map(
1437
1437
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
1438
1438
).flatten().unwrap();
@@ -1448,7 +1448,7 @@ fn test_fee_spike_violation_fails_htlc() {
1448
1448
};
1449
1449
let (remote_delayed_payment_basepoint, remote_htlc_basepoint, remote_point, remote_funding) = {
1450
1450
let per_peer_state = nodes[1].node.per_peer_state.read().unwrap();
1451
- let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().lock ().unwrap();
1451
+ let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().write ().unwrap();
1452
1452
let remote_chan = chan_lock.channel_by_id.get(&chan.2).map(
1453
1453
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
1454
1454
).flatten().unwrap();
@@ -1479,7 +1479,7 @@ fn test_fee_spike_violation_fails_htlc() {
1479
1479
1480
1480
let res = {
1481
1481
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
1482
- let local_chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
1482
+ let local_chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
1483
1483
let local_chan = local_chan_lock.channel_by_id.get(&chan.2).map(
1484
1484
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
1485
1485
).flatten().unwrap();
@@ -3239,7 +3239,7 @@ fn do_test_commitment_revoked_fail_backward_exhaustive(deliver_bs_raa: bool, use
3239
3239
// The dust limit applied to HTLC outputs considers the fee of the HTLC transaction as
3240
3240
// well, so HTLCs at exactly the dust limit will not be included in commitment txn.
3241
3241
nodes[2].node.per_peer_state.read().unwrap().get(&nodes[1].node.get_our_node_id())
3242
- .unwrap().lock ().unwrap().channel_by_id.get(&chan_2.2).unwrap().context().holder_dust_limit_satoshis * 1000
3242
+ .unwrap().write ().unwrap().channel_by_id.get(&chan_2.2).unwrap().context().holder_dust_limit_satoshis * 1000
3243
3243
} else { 3000000 };
3244
3244
3245
3245
let (_, first_payment_hash, ..) = route_payment(&nodes[0], &[&nodes[1], &nodes[2]], value);
@@ -5212,7 +5212,7 @@ fn do_test_fail_backwards_unrevoked_remote_announce(deliver_last_raa: bool, anno
5212
5212
assert_eq!(get_local_commitment_txn!(nodes[3], chan_2_3.2)[0].output.len(), 2);
5213
5213
5214
5214
let ds_dust_limit = nodes[3].node.per_peer_state.read().unwrap().get(&nodes[2].node.get_our_node_id())
5215
- .unwrap().lock ().unwrap().channel_by_id.get(&chan_2_3.2).unwrap().context().holder_dust_limit_satoshis;
5215
+ .unwrap().write ().unwrap().channel_by_id.get(&chan_2_3.2).unwrap().context().holder_dust_limit_satoshis;
5216
5216
// 0th HTLC:
5217
5217
let (_, payment_hash_1, ..) = route_payment(&nodes[0], &[&nodes[2], &nodes[3], &nodes[4]], ds_dust_limit*1000); // not added < dust limit + HTLC tx fee
5218
5218
// 1st HTLC:
@@ -6347,7 +6347,7 @@ fn test_update_add_htlc_bolt2_sender_exceed_max_htlc_num_and_htlc_id_increment()
6347
6347
let mut nodes = create_network(2, &node_cfgs, &node_chanmgrs);
6348
6348
let chan = create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 1000000, 0);
6349
6349
let max_accepted_htlcs = nodes[1].node.per_peer_state.read().unwrap().get(&nodes[0].node.get_our_node_id())
6350
- .unwrap().lock ().unwrap().channel_by_id.get(&chan.2).unwrap().context().counterparty_max_accepted_htlcs as u64;
6350
+ .unwrap().write ().unwrap().channel_by_id.get(&chan.2).unwrap().context().counterparty_max_accepted_htlcs as u64;
6351
6351
6352
6352
// Fetch a route in advance as we will be unable to once we're unable to send.
6353
6353
let (route, our_payment_hash, _, our_payment_secret) = get_route_and_payment_hash!(nodes[0], nodes[1], 100000);
@@ -6418,7 +6418,7 @@ fn test_update_add_htlc_bolt2_receiver_check_amount_received_more_than_min() {
6418
6418
let htlc_minimum_msat: u64;
6419
6419
{
6420
6420
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
6421
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
6421
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
6422
6422
let channel = chan_lock.channel_by_id.get(&chan.2).unwrap();
6423
6423
htlc_minimum_msat = channel.context().get_holder_htlc_minimum_msat();
6424
6424
}
@@ -7024,7 +7024,7 @@ fn do_test_failure_delay_dust_htlc_local_commitment(announce_latest: bool) {
7024
7024
let chan =create_announced_chan_between_nodes(&nodes, 0, 1);
7025
7025
7026
7026
let bs_dust_limit = nodes[1].node.per_peer_state.read().unwrap().get(&nodes[0].node.get_our_node_id())
7027
- .unwrap().lock ().unwrap().channel_by_id.get(&chan.2).unwrap().context().holder_dust_limit_satoshis;
7027
+ .unwrap().write ().unwrap().channel_by_id.get(&chan.2).unwrap().context().holder_dust_limit_satoshis;
7028
7028
7029
7029
// We route 2 dust-HTLCs between A and B
7030
7030
let (_, payment_hash_1, ..) = route_payment(&nodes[0], &[&nodes[1]], bs_dust_limit*1000);
@@ -7117,7 +7117,7 @@ fn do_test_sweep_outbound_htlc_failure_update(revoked: bool, local: bool) {
7117
7117
let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
7118
7118
7119
7119
let bs_dust_limit = nodes[1].node.per_peer_state.read().unwrap().get(&nodes[0].node.get_our_node_id())
7120
- .unwrap().lock ().unwrap().channel_by_id.get(&chan.2).unwrap().context().holder_dust_limit_satoshis;
7120
+ .unwrap().write ().unwrap().channel_by_id.get(&chan.2).unwrap().context().holder_dust_limit_satoshis;
7121
7121
7122
7122
let (_payment_preimage_1, dust_hash, ..) = route_payment(&nodes[0], &[&nodes[1]], bs_dust_limit*1000);
7123
7123
let (_payment_preimage_2, non_dust_hash, ..) = route_payment(&nodes[0], &[&nodes[1]], 1000000);
@@ -7796,7 +7796,7 @@ fn test_counterparty_raa_skip_no_crash() {
7796
7796
let next_per_commitment_point;
7797
7797
{
7798
7798
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
7799
- let mut guard = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
7799
+ let mut guard = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
7800
7800
let keys = guard.channel_by_id.get_mut(&channel_id).map(
7801
7801
|phase| if let ChannelPhase::Funded(chan) = phase { Some(chan) } else { None }
7802
7802
).flatten().unwrap().get_signer();
@@ -9227,7 +9227,7 @@ fn test_duplicate_chan_id() {
9227
9227
9228
9228
let funding_created = {
9229
9229
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
9230
- let mut a_peer_state = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
9230
+ let mut a_peer_state = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
9231
9231
// Once we call `get_funding_created` the channel has a duplicate channel_id as
9232
9232
// another channel in the ChannelManager - an invalid state. Thus, we'd panic later when we
9233
9233
// try to create another channel. Instead, we drop the channel entirely here (leaving the
@@ -9942,7 +9942,7 @@ fn do_test_max_dust_htlc_exposure(dust_outbound_balance: bool, exposure_breach_e
9942
9942
9943
9943
let (dust_buffer_feerate, max_dust_htlc_exposure_msat) = {
9944
9944
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
9945
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
9945
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
9946
9946
let chan = chan_lock.channel_by_id.get(&channel_id).unwrap();
9947
9947
(chan.context().get_dust_buffer_feerate(None) as u64,
9948
9948
chan.context().get_max_dust_htlc_exposure_msat(&LowerBoundedFeeEstimator(nodes[0].fee_estimator)))
@@ -10440,7 +10440,7 @@ fn test_remove_expired_outbound_unfunded_channels() {
10440
10440
// Asserts the outbound channel has been removed from a nodes[0]'s peer state map.
10441
10441
let check_outbound_channel_existence = |should_exist: bool| {
10442
10442
let per_peer_state = nodes[0].node.per_peer_state.read().unwrap();
10443
- let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().lock ().unwrap();
10443
+ let chan_lock = per_peer_state.get(&nodes[1].node.get_our_node_id()).unwrap().write ().unwrap();
10444
10444
assert_eq!(chan_lock.channel_by_id.contains_key(&temp_channel_id), should_exist);
10445
10445
};
10446
10446
@@ -10491,7 +10491,7 @@ fn test_remove_expired_inbound_unfunded_channels() {
10491
10491
// Asserts the inbound channel has been removed from a nodes[1]'s peer state map.
10492
10492
let check_inbound_channel_existence = |should_exist: bool| {
10493
10493
let per_peer_state = nodes[1].node.per_peer_state.read().unwrap();
10494
- let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().lock ().unwrap();
10494
+ let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().write ().unwrap();
10495
10495
assert_eq!(chan_lock.channel_by_id.contains_key(&temp_channel_id), should_exist);
10496
10496
};
10497
10497
0 commit comments