@@ -21,29 +21,30 @@ fn test_outbound_chans_unlimited() {
2121 let nodes = create_network ( 2 , & node_cfgs, & node_chanmgrs) ;
2222
2323 // Note that create_network connects the nodes together for us
24-
24+ let node_a = nodes[ 0 ] . node . get_our_node_id ( ) ;
25+ let node_b = nodes[ 1 ] . node . get_our_node_id ( ) ;
2526 nodes[ 0 ] . node . create_channel ( nodes[ 1 ] . node . get_our_node_id ( ) , 100_000 , 0 , 42 , None , None ) . unwrap ( ) ;
26- let mut open_channel_msg = get_event_msg ! ( nodes[ 0 ] , MessageSendEvent :: SendOpenChannel , nodes [ 1 ] . node . get_our_node_id ( ) ) ;
27+ let mut open_channel_msg = get_event_msg ! ( nodes[ 0 ] , MessageSendEvent :: SendOpenChannel , node_b ) ;
2728
2829 for _ in 0 ..MAX_UNFUNDED_CHANS_PER_PEER {
2930 nodes[ 1 ] . node . handle_open_channel ( nodes[ 0 ] . node . get_our_node_id ( ) , & open_channel_msg) ;
30- get_event_msg ! ( nodes[ 1 ] , MessageSendEvent :: SendAcceptChannel , nodes [ 0 ] . node . get_our_node_id ( ) ) ;
31+ get_event_msg ! ( nodes[ 1 ] , MessageSendEvent :: SendAcceptChannel , node_a ) ;
3132 open_channel_msg. common_fields . temporary_channel_id = ChannelId :: temporary_from_entropy_source ( & nodes[ 0 ] . keys_manager ) ;
3233 }
3334
3435 // Once we have MAX_UNFUNDED_CHANS_PER_PEER unfunded channels, new inbound channels will be
3536 // rejected.
36- nodes[ 1 ] . node . handle_open_channel ( nodes [ 0 ] . node . get_our_node_id ( ) , & open_channel_msg) ;
37- assert_eq ! ( get_err_msg( & nodes[ 1 ] , & nodes [ 0 ] . node . get_our_node_id ( ) ) . channel_id,
37+ nodes[ 1 ] . node . handle_open_channel ( node_a , & open_channel_msg) ;
38+ assert_eq ! ( get_err_msg( & nodes[ 1 ] , & node_a ) . channel_id,
3839 open_channel_msg. common_fields. temporary_channel_id) ;
3940
4041 // but we can still open an outbound channel.
41- nodes[ 1 ] . node . create_channel ( nodes [ 0 ] . node . get_our_node_id ( ) , 100_000 , 0 , 42 , None , None ) . unwrap ( ) ;
42- get_event_msg ! ( nodes[ 1 ] , MessageSendEvent :: SendOpenChannel , nodes [ 0 ] . node . get_our_node_id ( ) ) ;
42+ nodes[ 1 ] . node . create_channel ( node_a , 100_000 , 0 , 42 , None , None ) . unwrap ( ) ;
43+ get_event_msg ! ( nodes[ 1 ] , MessageSendEvent :: SendOpenChannel , node_a ) ;
4344
4445 // but even with such an outbound channel, additional inbound channels will still fail.
45- nodes[ 1 ] . node . handle_open_channel ( nodes [ 0 ] . node . get_our_node_id ( ) , & open_channel_msg) ;
46- assert_eq ! ( get_err_msg( & nodes[ 1 ] , & nodes [ 0 ] . node . get_our_node_id ( ) ) . channel_id,
46+ nodes[ 1 ] . node . handle_open_channel ( node_a , & open_channel_msg) ;
47+ assert_eq ! ( get_err_msg( & nodes[ 1 ] , & node_a ) . channel_id,
4748 open_channel_msg. common_fields. temporary_channel_id) ;
4849}
4950
@@ -60,17 +61,18 @@ fn test_0conf_limiting() {
6061 let nodes = create_network ( 2 , & node_cfgs, & node_chanmgrs) ;
6162
6263 // Note that create_network connects the nodes together for us
63-
64- nodes[ 0 ] . node . create_channel ( nodes[ 1 ] . node . get_our_node_id ( ) , 100_000 , 0 , 42 , None , None ) . unwrap ( ) ;
65- let mut open_channel_msg = get_event_msg ! ( nodes[ 0 ] , MessageSendEvent :: SendOpenChannel , nodes[ 1 ] . node. get_our_node_id( ) ) ;
64+ let node_b = nodes[ 1 ] . node . get_our_node_id ( ) ;
65+ nodes[ 0 ] . node . create_channel ( node_b, 100_000 , 0 , 42 , None , None ) . unwrap ( ) ;
66+ let mut open_channel_msg = get_event_msg ! ( nodes[ 0 ] , MessageSendEvent :: SendOpenChannel , node_b) ;
67+ let init_msg = & msgs:: Init {
68+ features : nodes[ 0 ] . node . init_features ( ) , networks : None , remote_network_address : None
69+ } ;
6670
6771 // First, get us up to MAX_UNFUNDED_CHANNEL_PEERS so we can test at the edge
6872 for _ in 0 ..MAX_UNFUNDED_CHANNEL_PEERS - 1 {
6973 let random_pk = PublicKey :: from_secret_key ( & nodes[ 0 ] . node . secp_ctx ,
7074 & SecretKey :: from_slice ( & nodes[ 1 ] . keys_manager . get_secure_random_bytes ( ) ) . unwrap ( ) ) ;
71- nodes[ 1 ] . node . peer_connected ( random_pk, & msgs:: Init {
72- features : nodes[ 0 ] . node . init_features ( ) , networks : None , remote_network_address : None
73- } , true ) . unwrap ( ) ;
75+ nodes[ 1 ] . node . peer_connected ( random_pk, init_msg, true ) . unwrap ( ) ;
7476
7577 nodes[ 1 ] . node . handle_open_channel ( random_pk, & open_channel_msg) ;
7678 let events = nodes[ 1 ] . node . get_and_clear_pending_events ( ) ;
@@ -87,9 +89,7 @@ fn test_0conf_limiting() {
8789 // If we try to accept a channel from another peer non-0conf it will fail.
8890 let last_random_pk = PublicKey :: from_secret_key ( & nodes[ 0 ] . node . secp_ctx ,
8991 & SecretKey :: from_slice ( & nodes[ 1 ] . keys_manager . get_secure_random_bytes ( ) ) . unwrap ( ) ) ;
90- nodes[ 1 ] . node . peer_connected ( last_random_pk, & msgs:: Init {
91- features : nodes[ 0 ] . node . init_features ( ) , networks : None , remote_network_address : None
92- } , true ) . unwrap ( ) ;
92+ nodes[ 1 ] . node . peer_connected ( last_random_pk, init_msg, true ) . unwrap ( ) ;
9393 nodes[ 1 ] . node . handle_open_channel ( last_random_pk, & open_channel_msg) ;
9494 let events = nodes[ 1 ] . node . get_and_clear_pending_events ( ) ;
9595 match events[ 0 ] {
0 commit comments