@@ -3179,7 +3179,7 @@ macro_rules! emit_channel_pending_event {
31793179 counterparty_node_id: $channel.context.get_counterparty_node_id(),
31803180 user_channel_id: $channel.context.get_user_id(),
31813181 funding_txo: $channel.funding.get_funding_txo().unwrap().into_bitcoin_outpoint(),
3182- channel_type: Some($channel.context .get_channel_type().clone()),
3182+ channel_type: Some($channel.funding .get_channel_type().clone()),
31833183 }, None));
31843184 $channel.context.set_channel_pending_event_emitted();
31853185 }
@@ -3194,7 +3194,7 @@ macro_rules! emit_channel_ready_event {
31943194 channel_id: $channel.context.channel_id(),
31953195 user_channel_id: $channel.context.get_user_id(),
31963196 counterparty_node_id: $channel.context.get_counterparty_node_id(),
3197- channel_type: $channel.context .get_channel_type().clone(),
3197+ channel_type: $channel.funding .get_channel_type().clone(),
31983198 }, None));
31993199 $channel.context.set_channel_ready_event_emitted();
32003200 }
@@ -4341,7 +4341,7 @@ where
43414341 return Err(("Refusing to forward to a private channel based on our config.", 0x4000 | 10));
43424342 }
43434343 if let HopConnector::ShortChannelId(outgoing_scid) = next_packet.outgoing_connector {
4344- if chan.context .get_channel_type().supports_scid_privacy() && outgoing_scid != chan.context.outbound_scid_alias() {
4344+ if chan.funding .get_channel_type().supports_scid_privacy() && outgoing_scid != chan.context.outbound_scid_alias() {
43454345 // `option_scid_alias` (referred to in LDK as `scid_privacy`) means
43464346 // "refuse to forward unless the SCID alias was used", so we pretend
43474347 // we don't have the channel here.
@@ -6587,7 +6587,7 @@ where
65876587 for (chan_id, chan) in peer_state.channel_by_id.iter_mut()
65886588 .filter_map(|(chan_id, chan)| chan.as_funded_mut().map(|chan| (chan_id, chan)))
65896589 {
6590- let new_feerate = if chan.context .get_channel_type().supports_anchors_zero_fee_htlc_tx() {
6590+ let new_feerate = if chan.funding .get_channel_type().supports_anchors_zero_fee_htlc_tx() {
65916591 anchor_feerate
65926592 } else {
65936593 non_anchor_feerate
@@ -6644,7 +6644,7 @@ where
66446644 peer_state.channel_by_id.retain(|chan_id, chan| {
66456645 match chan.as_funded_mut() {
66466646 Some(funded_chan) => {
6647- let new_feerate = if funded_chan.context .get_channel_type().supports_anchors_zero_fee_htlc_tx() {
6647+ let new_feerate = if funded_chan.funding .get_channel_type().supports_anchors_zero_fee_htlc_tx() {
66486648 anchor_feerate
66496649 } else {
66506650 non_anchor_feerate
@@ -7939,7 +7939,7 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
79397939 if accept_0conf {
79407940 // This should have been correctly configured by the call to Inbound(V1/V2)Channel::new.
79417941 debug_assert!(channel.context().minimum_depth().unwrap() == 0);
7942- } else if channel.context ().get_channel_type().requires_zero_conf() {
7942+ } else if channel.funding ().get_channel_type().requires_zero_conf() {
79437943 let send_msg_err_event = MessageSendEvent::HandleError {
79447944 node_id: channel.context().get_counterparty_node_id(),
79457945 action: msgs::ErrorAction::SendErrorMessage{
@@ -11553,7 +11553,7 @@ where
1155311553
1155411554 self.do_chain_event(Some(height), |channel| {
1155511555 let logger = WithChannelContext::from(&self.logger, &channel.context, None);
11556- if channel.context .get_channel_type().supports_anchors_zero_fee_htlc_tx() {
11556+ if channel.funding .get_channel_type().supports_anchors_zero_fee_htlc_tx() {
1155711557 if let Some(feerate) = min_anchor_feerate {
1155811558 channel.check_for_stale_feerate(&logger, feerate)?;
1155911559 }
0 commit comments