@@ -93,14 +93,14 @@ enum OutboundHTLCState {
93
93
/// Added by us and included in a commitment_signed (if we were AwaitingRemoteRevoke when we
94
94
/// created it we would have put it in the holding cell instead). When they next revoke_and_ack
95
95
/// we will promote to Committed (note that they may not accept it until the next time we
96
- /// revoke, but we dont really care about that:
96
+ /// revoke, but we don't really care about that:
97
97
/// * they've revoked, so worst case we can announce an old state and get our (option on)
98
- /// money back (though we wont ), and,
98
+ /// money back (though we won't ), and,
99
99
/// * we'll send them a revoke when they send a commitment_signed, and since only they're
100
100
/// allowed to remove it, the "can only be removed once committed on both sides" requirement
101
- /// doesn't matter to us and its up to them to enforce it, worst-case they jump ahead but
101
+ /// doesn't matter to us and it's up to them to enforce it, worst-case they jump ahead but
102
102
/// we'll never get out of sync).
103
- /// Note that we Box the OnionPacket as its rather large and we don't want to blow up
103
+ /// Note that we Box the OnionPacket as it's rather large and we don't want to blow up
104
104
/// OutboundHTLCOutput's size just for a temporary bit
105
105
LocalAnnounced ( Box < msgs:: OnionPacket > ) ,
106
106
Committed ,
@@ -292,7 +292,7 @@ pub(super) struct Channel {
292
292
last_sent_closing_fee : Option < ( u64 , u64 ) > , // (feerate, fee)
293
293
294
294
/// The hash of the block in which the funding transaction reached our CONF_TARGET. We use this
295
- /// to detect unconfirmation after a serialize-unserialize roudtrip where we may not see a full
295
+ /// to detect unconfirmation after a serialize-unserialize roundtrip where we may not see a full
296
296
/// series of block_connected/block_disconnected calls. Obviously this is not a guarantee as we
297
297
/// could miss the funding_tx_confirmed_in block as well, but it serves as a useful fallback.
298
298
funding_tx_confirmed_in : Option < Sha256dHash > ,
@@ -551,7 +551,7 @@ impl Channel {
551
551
return Err ( ChannelError :: Close ( "Bogus; channel reserve is less than dust limit" ) ) ;
552
552
}
553
553
if msg. htlc_minimum_msat >= ( msg. funding_satoshis - msg. channel_reserve_satoshis ) * 1000 {
554
- return Err ( ChannelError :: Close ( "Miminum htlc value is full channel value" ) ) ;
554
+ return Err ( ChannelError :: Close ( "Minimum htlc value is full channel value" ) ) ;
555
555
}
556
556
Channel :: check_remote_fee ( fee_estimator, msg. feerate_per_kw ) ?;
557
557
@@ -1113,7 +1113,7 @@ impl Channel {
1113
1113
}
1114
1114
1115
1115
/// Signs a transaction created by build_htlc_transaction. If the transaction is an
1116
- /// HTLC-Success transaction (ie htlc.offered is false), preimate must be set!
1116
+ /// HTLC-Success transaction (ie htlc.offered is false), preimage must be set!
1117
1117
fn sign_htlc_transaction ( & self , tx : & mut Transaction , their_sig : & Signature , preimage : & Option < PaymentPreimage > , htlc : & HTLCOutputInCommitment , keys : & TxCreationKeys ) -> Result < Signature , ChannelError > {
1118
1118
if tx. input . len ( ) != 1 {
1119
1119
panic ! ( "Tried to sign HTLC transaction that had input count != 1!" ) ;
@@ -1151,7 +1151,7 @@ impl Channel {
1151
1151
/// In such cases we debug_assert!(false) and return an IgnoreError. Thus, will always return
1152
1152
/// Ok(_) if debug assertions are turned on and preconditions are met.
1153
1153
fn get_update_fulfill_htlc ( & mut self , htlc_id_arg : u64 , payment_preimage_arg : PaymentPreimage ) -> Result < ( Option < msgs:: UpdateFulfillHTLC > , Option < ChannelMonitor > ) , ChannelError > {
1154
- // Either ChannelFunded got set (which means it wont bet unset) or there is no way any
1154
+ // Either ChannelFunded got set (which means it won't be unset) or there is no way any
1155
1155
// caller thought we could have something claimed (cause we wouldn't have accepted in an
1156
1156
// incoming HTLC anyway). If we got to ShutdownComplete, callers aren't allowed to call us,
1157
1157
// either.
@@ -1274,7 +1274,7 @@ impl Channel {
1274
1274
} ,
1275
1275
_ => {
1276
1276
debug_assert ! ( false , "Have an inbound HTLC we tried to claim before it was fully committed to" ) ;
1277
- return Err ( ChannelError :: Ignore ( "Unable to find a pending HTLC which matchd the given HTLC ID" ) ) ;
1277
+ return Err ( ChannelError :: Ignore ( "Unable to find a pending HTLC which matched the given HTLC ID" ) ) ;
1278
1278
}
1279
1279
}
1280
1280
pending_idx = idx;
@@ -1352,10 +1352,10 @@ impl Channel {
1352
1352
return Err ( ChannelError :: Close ( "They wanted our payments to be delayed by a needlessly long period" ) ) ;
1353
1353
}
1354
1354
if msg. max_accepted_htlcs < 1 {
1355
- return Err ( ChannelError :: Close ( "0 max_accpted_htlcs makes for a useless channel" ) ) ;
1355
+ return Err ( ChannelError :: Close ( "0 max_accepted_htlcs makes for a useless channel" ) ) ;
1356
1356
}
1357
1357
if msg. max_accepted_htlcs > 483 {
1358
- return Err ( ChannelError :: Close ( "max_accpted_htlcs > 483" ) ) ;
1358
+ return Err ( ChannelError :: Close ( "max_accepted_htlcs > 483" ) ) ;
1359
1359
}
1360
1360
1361
1361
// Now check against optional parameters as set by config...
@@ -1433,7 +1433,7 @@ impl Channel {
1433
1433
}
1434
1434
if self . channel_state != ( ChannelState :: OurInitSent as u32 | ChannelState :: TheirInitSent as u32 ) {
1435
1435
// BOLT 2 says that if we disconnect before we send funding_signed we SHOULD NOT
1436
- // remember the channel, so its safe to just send an error_message here and drop the
1436
+ // remember the channel, so it's safe to just send an error_message here and drop the
1437
1437
// channel.
1438
1438
return Err ( ChannelError :: Close ( "Received funding_created after we got the channel!" ) ) ;
1439
1439
}
@@ -1826,8 +1826,8 @@ impl Channel {
1826
1826
for htlc_update in htlc_updates. drain ( ..) {
1827
1827
// Note that this *can* fail, though it should be due to rather-rare conditions on
1828
1828
// fee races with adding too many outputs which push our total payments just over
1829
- // the limit. In case its less rare than I anticipate, we may want to revisit
1830
- // handling this case better and maybe fufilling some of the HTLCs while attempting
1829
+ // the limit. In case it's less rare than I anticipate, we may want to revisit
1830
+ // handling this case better and maybe fulfilling some of the HTLCs while attempting
1831
1831
// to rebalance channels.
1832
1832
if err. is_some ( ) { // We're back to AwaitingRemoteRevoke (or are about to fail the channel)
1833
1833
self . holding_cell_htlc_updates . push ( htlc_update) ;
@@ -1869,8 +1869,8 @@ impl Channel {
1869
1869
}
1870
1870
}
1871
1871
}
1872
- //TODO: Need to examine the type of err - if its a fee issue or similar we may want to
1873
- //fail it back the route, if its a temporary issue we can ignore it...
1872
+ //TODO: Need to examine the type of err - if it's a fee issue or similar we may want to
1873
+ //fail it back the route, if it's a temporary issue we can ignore it...
1874
1874
match err {
1875
1875
None => {
1876
1876
if update_add_htlcs. is_empty ( ) && update_fulfill_htlcs. is_empty ( ) && update_fail_htlcs. is_empty ( ) && self . holding_cell_update_fee . is_none ( ) {
@@ -2022,7 +2022,7 @@ impl Channel {
2022
2022
}
2023
2023
} else {
2024
2024
if let Some ( feerate) = self . pending_update_fee {
2025
- // Because a node cannot send two commitment_signed's in a row without getting a
2025
+ // Because a node cannot send two commitment_signeds in a row without getting a
2026
2026
// revoke_and_ack from us (as it would otherwise not know the per_commitment_point
2027
2027
// it should use to create keys with) and because a node can't send a
2028
2028
// commitment_signed without changes, checking if the feerate is equal to the
@@ -2479,7 +2479,7 @@ impl Channel {
2479
2479
assert_eq ! ( self . channel_state & ChannelState :: ShutdownComplete as u32 , 0 ) ;
2480
2480
2481
2481
// BOLT 2 says we must only send a scriptpubkey of certain standard forms, which are up to
2482
- // 34 bytes in length, so dont let the remote peer feed us some super fee-heavy script.
2482
+ // 34 bytes in length, so don't let the remote peer feed us some super fee-heavy script.
2483
2483
if self . channel_outbound && msg. scriptpubkey . len ( ) > 34 {
2484
2484
return Err ( ChannelError :: Close ( "Got shutdown_scriptpubkey of absurd length from remote peer" ) ) ;
2485
2485
}
@@ -3119,7 +3119,7 @@ impl Channel {
3119
3119
/// waiting on the remote peer to send us a revoke_and_ack during which time we cannot add new
3120
3120
/// HTLCs on the wire or we wouldn't be able to determine what they actually ACK'ed.
3121
3121
/// You MUST call send_commitment prior to any other calls on this Channel
3122
- /// If an Err is returned, its a ChannelError::Ignore!
3122
+ /// If an Err is returned, it's a ChannelError::Ignore!
3123
3123
pub fn send_htlc ( & mut self , amount_msat : u64 , payment_hash : PaymentHash , cltv_expiry : u32 , source : HTLCSource , onion_routing_packet : msgs:: OnionPacket ) -> Result < Option < msgs:: UpdateAddHTLC > , ChannelError > {
3124
3124
if ( self . channel_state & ( ChannelState :: ChannelFunded as u32 | BOTH_SIDES_SHUTDOWN_MASK ) ) != ( ChannelState :: ChannelFunded as u32 ) {
3125
3125
return Err ( ChannelError :: Ignore ( "Cannot send HTLC until channel is fully established and we haven't started shutting down" ) ) ;
@@ -3376,7 +3376,7 @@ impl Channel {
3376
3376
} , dropped_outbound_htlcs) )
3377
3377
}
3378
3378
3379
- /// Gets the latest commitment transaction and any dependant transactions for relay (forcing
3379
+ /// Gets the latest commitment transaction and any dependent transactions for relay (forcing
3380
3380
/// shutdown of this channel - no more calls into this Channel may be made afterwards except
3381
3381
/// those explicitly stated to be allowed after shutdown completes, eg some simple getters).
3382
3382
/// Also returns the list of payment_hashes for channels which we can safely fail backwards
@@ -3930,7 +3930,7 @@ mod tests {
3930
3930
#[ test]
3931
3931
fn test_max_funding_satoshis ( ) {
3932
3932
assert ! ( MAX_FUNDING_SATOSHIS <= 21_000_000 * 100_000_000 ,
3933
- "MAX_FUNDING_SATOSHIS is greater than all satoshis on existence" ) ;
3933
+ "MAX_FUNDING_SATOSHIS is greater than all satoshis in existence" ) ;
3934
3934
}
3935
3935
3936
3936
struct Keys {
0 commit comments