@@ -93,14 +93,14 @@ enum OutboundHTLCState {
9393 /// Added by us and included in a commitment_signed (if we were AwaitingRemoteRevoke when we
9494 /// created it we would have put it in the holding cell instead). When they next revoke_and_ack
9595 /// we will promote to Committed (note that they may not accept it until the next time we
96- /// revoke, but we dont really care about that:
96+ /// revoke, but we don't really care about that:
9797 /// * they've revoked, so worst case we can announce an old state and get our (option on)
98- /// money back (though we wont ), and,
98+ /// money back (though we won't ), and,
9999 /// * we'll send them a revoke when they send a commitment_signed, and since only they're
100100 /// allowed to remove it, the "can only be removed once committed on both sides" requirement
101- /// doesn't matter to us and its up to them to enforce it, worst-case they jump ahead but
101+ /// doesn't matter to us and it's up to them to enforce it, worst-case they jump ahead but
102102 /// we'll never get out of sync).
103- /// Note that we Box the OnionPacket as its rather large and we don't want to blow up
103+ /// Note that we Box the OnionPacket as it's rather large and we don't want to blow up
104104 /// OutboundHTLCOutput's size just for a temporary bit
105105 LocalAnnounced ( Box < msgs:: OnionPacket > ) ,
106106 Committed ,
@@ -292,7 +292,7 @@ pub(super) struct Channel {
292292 last_sent_closing_fee : Option < ( u64 , u64 ) > , // (feerate, fee)
293293
294294 /// The hash of the block in which the funding transaction reached our CONF_TARGET. We use this
295- /// to detect unconfirmation after a serialize-unserialize roudtrip where we may not see a full
295+ /// to detect unconfirmation after a serialize-unserialize roundtrip where we may not see a full
296296 /// series of block_connected/block_disconnected calls. Obviously this is not a guarantee as we
297297 /// could miss the funding_tx_confirmed_in block as well, but it serves as a useful fallback.
298298 funding_tx_confirmed_in : Option < Sha256dHash > ,
@@ -551,7 +551,7 @@ impl Channel {
551551 return Err ( ChannelError :: Close ( "Bogus; channel reserve is less than dust limit" ) ) ;
552552 }
553553 if msg. htlc_minimum_msat >= ( msg. funding_satoshis - msg. channel_reserve_satoshis ) * 1000 {
554- return Err ( ChannelError :: Close ( "Miminum htlc value is full channel value" ) ) ;
554+ return Err ( ChannelError :: Close ( "Minimum htlc value is full channel value" ) ) ;
555555 }
556556 Channel :: check_remote_fee ( fee_estimator, msg. feerate_per_kw ) ?;
557557
@@ -1113,7 +1113,7 @@ impl Channel {
11131113 }
11141114
11151115 /// Signs a transaction created by build_htlc_transaction. If the transaction is an
1116- /// HTLC-Success transaction (ie htlc.offered is false), preimate must be set!
1116+ /// HTLC-Success transaction (ie htlc.offered is false), preimage must be set!
11171117 fn sign_htlc_transaction ( & self , tx : & mut Transaction , their_sig : & Signature , preimage : & Option < PaymentPreimage > , htlc : & HTLCOutputInCommitment , keys : & TxCreationKeys ) -> Result < Signature , ChannelError > {
11181118 if tx. input . len ( ) != 1 {
11191119 panic ! ( "Tried to sign HTLC transaction that had input count != 1!" ) ;
@@ -1151,7 +1151,7 @@ impl Channel {
11511151 /// In such cases we debug_assert!(false) and return an IgnoreError. Thus, will always return
11521152 /// Ok(_) if debug assertions are turned on and preconditions are met.
11531153 fn get_update_fulfill_htlc ( & mut self , htlc_id_arg : u64 , payment_preimage_arg : PaymentPreimage ) -> Result < ( Option < msgs:: UpdateFulfillHTLC > , Option < ChannelMonitor > ) , ChannelError > {
1154- // Either ChannelFunded got set (which means it wont bet unset) or there is no way any
1154+ // Either ChannelFunded got set (which means it won't be unset) or there is no way any
11551155 // caller thought we could have something claimed (cause we wouldn't have accepted in an
11561156 // incoming HTLC anyway). If we got to ShutdownComplete, callers aren't allowed to call us,
11571157 // either.
@@ -1274,7 +1274,7 @@ impl Channel {
12741274 } ,
12751275 _ => {
12761276 debug_assert ! ( false , "Have an inbound HTLC we tried to claim before it was fully committed to" ) ;
1277- return Err ( ChannelError :: Ignore ( "Unable to find a pending HTLC which matchd the given HTLC ID" ) ) ;
1277+ return Err ( ChannelError :: Ignore ( "Unable to find a pending HTLC which matched the given HTLC ID" ) ) ;
12781278 }
12791279 }
12801280 pending_idx = idx;
@@ -1352,10 +1352,10 @@ impl Channel {
13521352 return Err ( ChannelError :: Close ( "They wanted our payments to be delayed by a needlessly long period" ) ) ;
13531353 }
13541354 if msg. max_accepted_htlcs < 1 {
1355- return Err ( ChannelError :: Close ( "0 max_accpted_htlcs makes for a useless channel" ) ) ;
1355+ return Err ( ChannelError :: Close ( "0 max_accepted_htlcs makes for a useless channel" ) ) ;
13561356 }
13571357 if msg. max_accepted_htlcs > 483 {
1358- return Err ( ChannelError :: Close ( "max_accpted_htlcs > 483" ) ) ;
1358+ return Err ( ChannelError :: Close ( "max_accepted_htlcs > 483" ) ) ;
13591359 }
13601360
13611361 // Now check against optional parameters as set by config...
@@ -1433,7 +1433,7 @@ impl Channel {
14331433 }
14341434 if self . channel_state != ( ChannelState :: OurInitSent as u32 | ChannelState :: TheirInitSent as u32 ) {
14351435 // BOLT 2 says that if we disconnect before we send funding_signed we SHOULD NOT
1436- // remember the channel, so its safe to just send an error_message here and drop the
1436+ // remember the channel, so it's safe to just send an error_message here and drop the
14371437 // channel.
14381438 return Err ( ChannelError :: Close ( "Received funding_created after we got the channel!" ) ) ;
14391439 }
@@ -1826,8 +1826,8 @@ impl Channel {
18261826 for htlc_update in htlc_updates. drain ( ..) {
18271827 // Note that this *can* fail, though it should be due to rather-rare conditions on
18281828 // fee races with adding too many outputs which push our total payments just over
1829- // the limit. In case its less rare than I anticipate, we may want to revisit
1830- // handling this case better and maybe fufilling some of the HTLCs while attempting
1829+ // the limit. In case it's less rare than I anticipate, we may want to revisit
1830+ // handling this case better and maybe fulfilling some of the HTLCs while attempting
18311831 // to rebalance channels.
18321832 if err. is_some ( ) { // We're back to AwaitingRemoteRevoke (or are about to fail the channel)
18331833 self . holding_cell_htlc_updates . push ( htlc_update) ;
@@ -1869,8 +1869,8 @@ impl Channel {
18691869 }
18701870 }
18711871 }
1872- //TODO: Need to examine the type of err - if its a fee issue or similar we may want to
1873- //fail it back the route, if its a temporary issue we can ignore it...
1872+ //TODO: Need to examine the type of err - if it's a fee issue or similar we may want to
1873+ //fail it back the route, if it's a temporary issue we can ignore it...
18741874 match err {
18751875 None => {
18761876 if update_add_htlcs. is_empty ( ) && update_fulfill_htlcs. is_empty ( ) && update_fail_htlcs. is_empty ( ) && self . holding_cell_update_fee . is_none ( ) {
@@ -2022,7 +2022,7 @@ impl Channel {
20222022 }
20232023 } else {
20242024 if let Some ( feerate) = self . pending_update_fee {
2025- // Because a node cannot send two commitment_signed's in a row without getting a
2025+ // Because a node cannot send two commitment_signeds in a row without getting a
20262026 // revoke_and_ack from us (as it would otherwise not know the per_commitment_point
20272027 // it should use to create keys with) and because a node can't send a
20282028 // commitment_signed without changes, checking if the feerate is equal to the
@@ -2479,7 +2479,7 @@ impl Channel {
24792479 assert_eq ! ( self . channel_state & ChannelState :: ShutdownComplete as u32 , 0 ) ;
24802480
24812481 // BOLT 2 says we must only send a scriptpubkey of certain standard forms, which are up to
2482- // 34 bytes in length, so dont let the remote peer feed us some super fee-heavy script.
2482+ // 34 bytes in length, so don't let the remote peer feed us some super fee-heavy script.
24832483 if self . channel_outbound && msg. scriptpubkey . len ( ) > 34 {
24842484 return Err ( ChannelError :: Close ( "Got shutdown_scriptpubkey of absurd length from remote peer" ) ) ;
24852485 }
@@ -3119,7 +3119,7 @@ impl Channel {
31193119 /// waiting on the remote peer to send us a revoke_and_ack during which time we cannot add new
31203120 /// HTLCs on the wire or we wouldn't be able to determine what they actually ACK'ed.
31213121 /// You MUST call send_commitment prior to any other calls on this Channel
3122- /// If an Err is returned, its a ChannelError::Ignore!
3122+ /// If an Err is returned, it's a ChannelError::Ignore!
31233123 pub fn send_htlc ( & mut self , amount_msat : u64 , payment_hash : PaymentHash , cltv_expiry : u32 , source : HTLCSource , onion_routing_packet : msgs:: OnionPacket ) -> Result < Option < msgs:: UpdateAddHTLC > , ChannelError > {
31243124 if ( self . channel_state & ( ChannelState :: ChannelFunded as u32 | BOTH_SIDES_SHUTDOWN_MASK ) ) != ( ChannelState :: ChannelFunded as u32 ) {
31253125 return Err ( ChannelError :: Ignore ( "Cannot send HTLC until channel is fully established and we haven't started shutting down" ) ) ;
@@ -3376,7 +3376,7 @@ impl Channel {
33763376 } , dropped_outbound_htlcs) )
33773377 }
33783378
3379- /// Gets the latest commitment transaction and any dependant transactions for relay (forcing
3379+ /// Gets the latest commitment transaction and any dependent transactions for relay (forcing
33803380 /// shutdown of this channel - no more calls into this Channel may be made afterwards except
33813381 /// those explicitly stated to be allowed after shutdown completes, eg some simple getters).
33823382 /// Also returns the list of payment_hashes for channels which we can safely fail backwards
@@ -3930,7 +3930,7 @@ mod tests {
39303930 #[ test]
39313931 fn test_max_funding_satoshis ( ) {
39323932 assert ! ( MAX_FUNDING_SATOSHIS <= 21_000_000 * 100_000_000 ,
3933- "MAX_FUNDING_SATOSHIS is greater than all satoshis on existence" ) ;
3933+ "MAX_FUNDING_SATOSHIS is greater than all satoshis in existence" ) ;
39343934 }
39353935
39363936 struct Keys {
0 commit comments