Merge pull request #258 from TheBlueMatt/2018-11-close-locked
authorMatt Corallo <649246+TheBlueMatt@users.noreply.github.com>
Mon, 26 Nov 2018 15:56:18 +0000 (10:56 -0500)
committerGitHub <noreply@github.com>
Mon, 26 Nov 2018 15:56:18 +0000 (10:56 -0500)
Simplify + document the ChannelManager Err flow, fix close-outside-lock race, finish ChannelError conversion

1  2 
src/ln/channelmanager.rs

diff --combined src/ln/channelmanager.rs
index 6933198c608e0e56f59ffe510d2b2b6583fb3dde,16980b3a00ed6610ab168d3373f1fb5e9e9c3340..9f1489e70438f4c8fd6bfc714df002f61eaa2f7c
@@@ -133,9 -133,16 +133,16 @@@ mod channel_held_info 
  }
  pub(super) use self::channel_held_info::*;
  
+ type ShutdownResult = (Vec<Transaction>, Vec<(HTLCSource, [u8; 32])>);
+ /// Error type returned across the channel_state mutex boundary. When an Err is generated for a
+ /// Channel, we generally end up with a ChannelError::Close for which we have to close the channel
+ /// immediately (ie with no further calls on it made). Thus, this step happens inside a
+ /// channel_state lock. We then return the set of things that need to be done outside the lock in
+ /// this struct and call handle_error!() on it.
  struct MsgHandleErrInternal {
        err: msgs::HandleError,
-       needs_channel_force_close: bool,
+       shutdown_finish: Option<(ShutdownResult, Option<msgs::ChannelUpdate>)>,
  }
  impl MsgHandleErrInternal {
        #[inline]
                                        },
                                }),
                        },
-                       needs_channel_force_close: false,
+                       shutdown_finish: None,
                }
        }
        #[inline]
-       fn send_err_msg_close_chan(err: &'static str, channel_id: [u8; 32]) -> Self {
+       fn from_no_close(err: msgs::HandleError) -> Self {
+               Self { err, shutdown_finish: None }
+       }
+       #[inline]
+       fn from_finish_shutdown(err: &'static str, channel_id: [u8; 32], shutdown_res: ShutdownResult, channel_update: Option<msgs::ChannelUpdate>) -> Self {
                Self {
                        err: HandleError {
                                err,
                                        },
                                }),
                        },
-                       needs_channel_force_close: true,
+                       shutdown_finish: Some((shutdown_res, channel_update)),
                }
        }
        #[inline]
-       fn from_maybe_close(err: msgs::HandleError) -> Self {
-               Self { err, needs_channel_force_close: true }
-       }
-       #[inline]
-       fn from_no_close(err: msgs::HandleError) -> Self {
-               Self { err, needs_channel_force_close: false }
-       }
-       #[inline]
        fn from_chan_no_close(err: ChannelError, channel_id: [u8; 32]) -> Self {
                Self {
                        err: match err {
                                        }),
                                },
                        },
-                       needs_channel_force_close: false,
-               }
-       }
-       #[inline]
-       fn from_chan_maybe_close(err: ChannelError, channel_id: [u8; 32]) -> Self {
-               Self {
-                       err: match err {
-                               ChannelError::Ignore(msg) => HandleError {
-                                       err: msg,
-                                       action: Some(msgs::ErrorAction::IgnoreError),
-                               },
-                               ChannelError::Close(msg) => HandleError {
-                                       err: msg,
-                                       action: Some(msgs::ErrorAction::SendErrorMessage {
-                                               msg: msgs::ErrorMessage {
-                                                       channel_id,
-                                                       data: msg.to_string()
-                                               },
-                                       }),
-                               },
-                       },
-                       needs_channel_force_close: true,
+                       shutdown_finish: None,
                }
        }
  }
@@@ -408,26 -390,14 +390,14 @@@ macro_rules! handle_error 
        ($self: ident, $internal: expr, $their_node_id: expr) => {
                match $internal {
                        Ok(msg) => Ok(msg),
-                       Err(MsgHandleErrInternal { err, needs_channel_force_close }) => {
-                               if needs_channel_force_close {
-                                       match &err.action {
-                                               &Some(msgs::ErrorAction::DisconnectPeer { msg: Some(ref msg) }) => {
-                                                       if msg.channel_id == [0; 32] {
-                                                               $self.peer_disconnected(&$their_node_id, true);
-                                                       } else {
-                                                               $self.force_close_channel(&msg.channel_id);
-                                                       }
-                                               },
-                                               &Some(msgs::ErrorAction::DisconnectPeer { msg: None }) => {},
-                                               &Some(msgs::ErrorAction::IgnoreError) => {},
-                                               &Some(msgs::ErrorAction::SendErrorMessage { ref msg }) => {
-                                                       if msg.channel_id == [0; 32] {
-                                                               $self.peer_disconnected(&$their_node_id, true);
-                                                       } else {
-                                                               $self.force_close_channel(&msg.channel_id);
-                                                       }
-                                               },
-                                               &None => {},
+                       Err(MsgHandleErrInternal { err, shutdown_finish }) => {
+                               if let Some((shutdown_res, update_option)) = shutdown_finish {
+                                       $self.finish_force_close_channel(shutdown_res);
+                                       if let Some(update) = update_option {
+                                               let mut channel_state = $self.channel_state.lock().unwrap();
+                                               channel_state.pending_msg_events.push(events::MessageSendEvent::BroadcastChannelUpdate {
+                                                       msg: update
+                                               });
                                        }
                                }
                                Err(err)
        }
  }
  
+ macro_rules! break_chan_entry {
+       ($self: ident, $res: expr, $channel_state: expr, $entry: expr) => {
+               match $res {
+                       Ok(res) => res,
+                       Err(ChannelError::Ignore(msg)) => {
+                               break Err(MsgHandleErrInternal::from_chan_no_close(ChannelError::Ignore(msg), $entry.key().clone()))
+                       },
+                       Err(ChannelError::Close(msg)) => {
+                               let (channel_id, mut chan) = $entry.remove_entry();
+                               if let Some(short_id) = chan.get_short_channel_id() {
+                                       $channel_state.short_to_id.remove(&short_id);
+                               }
+                               break Err(MsgHandleErrInternal::from_finish_shutdown(msg, channel_id, chan.force_shutdown(), $self.get_channel_update(&chan).ok()))
+                       },
+               }
+       }
+ }
+ macro_rules! try_chan_entry {
+       ($self: ident, $res: expr, $channel_state: expr, $entry: expr) => {
+               match $res {
+                       Ok(res) => res,
+                       Err(ChannelError::Ignore(msg)) => {
+                               return Err(MsgHandleErrInternal::from_chan_no_close(ChannelError::Ignore(msg), $entry.key().clone()))
+                       },
+                       Err(ChannelError::Close(msg)) => {
+                               let (channel_id, mut chan) = $entry.remove_entry();
+                               if let Some(short_id) = chan.get_short_channel_id() {
+                                       $channel_state.short_to_id.remove(&short_id);
+                               }
+                               return Err(MsgHandleErrInternal::from_finish_shutdown(msg, channel_id, chan.force_shutdown(), $self.get_channel_update(&chan).ok()))
+                       },
+               }
+       }
+ }
  impl ChannelManager {
        /// Constructs a new ChannelManager to hold several channels and route between them.
        ///
        }
  
        #[inline]
-       fn finish_force_close_channel(&self, shutdown_res: (Vec<Transaction>, Vec<(HTLCSource, [u8; 32])>)) {
+       fn finish_force_close_channel(&self, shutdown_res: ShutdownResult) {
                let (local_txn, mut failed_htlcs) = shutdown_res;
                for htlc_source in failed_htlcs.drain(..) {
                        // unknown_next_peer...I dunno who that is anymore....
                let onion_packet = ChannelManager::construct_onion_packet(onion_payloads, onion_keys, &payment_hash);
  
                let _ = self.total_consistency_lock.read().unwrap();
-               let mut channel_state = self.channel_state.lock().unwrap();
  
-               let id = match channel_state.short_to_id.get(&route.hops.first().unwrap().short_channel_id) {
-                       None => return Err(APIError::ChannelUnavailable{err: "No channel available with first hop!"}),
-                       Some(id) => id.clone(),
-               };
+               let err: Result<(), _> = loop {
+                       let mut channel_lock = self.channel_state.lock().unwrap();
  
-               let res = {
-                       let chan = channel_state.by_id.get_mut(&id).unwrap();
-                       if chan.get_their_node_id() != route.hops.first().unwrap().pubkey {
-                               return Err(APIError::RouteError{err: "Node ID mismatch on first hop!"});
-                       }
-                       if chan.is_awaiting_monitor_update() {
-                               return Err(APIError::MonitorUpdateFailed);
-                       }
-                       if !chan.is_live() {
-                               return Err(APIError::ChannelUnavailable{err: "Peer for first hop currently disconnected!"});
+                       let id = match channel_lock.short_to_id.get(&route.hops.first().unwrap().short_channel_id) {
+                               None => return Err(APIError::ChannelUnavailable{err: "No channel available with first hop!"}),
+                               Some(id) => id.clone(),
+                       };
+                       match {
+                               let channel_state = channel_lock.borrow_parts();
+                               if let hash_map::Entry::Occupied(mut chan) = channel_state.by_id.entry(id) {
+                                       if chan.get().get_their_node_id() != route.hops.first().unwrap().pubkey {
+                                               return Err(APIError::RouteError{err: "Node ID mismatch on first hop!"});
+                                       }
+                                       if chan.get().is_awaiting_monitor_update() {
+                                               return Err(APIError::MonitorUpdateFailed);
+                                       }
+                                       if !chan.get().is_live() {
+                                               return Err(APIError::ChannelUnavailable{err: "Peer for first hop currently disconnected!"});
+                                       }
+                                       break_chan_entry!(self, chan.get_mut().send_htlc_and_commit(htlc_msat, payment_hash.clone(), htlc_cltv, HTLCSource::OutboundRoute {
+                                               route: route.clone(),
+                                               session_priv: session_priv.clone(),
+                                               first_hop_htlc_msat: htlc_msat,
+                                       }, onion_packet), channel_state, chan)
+                               } else { unreachable!(); }
+                       } {
+                               Some((update_add, commitment_signed, chan_monitor)) => {
+                                       if let Err(e) = self.monitor.add_update_monitor(chan_monitor.get_funding_txo().unwrap(), chan_monitor) {
+                                               self.handle_monitor_update_fail(channel_lock, &id, e, RAACommitmentOrder::CommitmentFirst);
+                                               return Err(APIError::MonitorUpdateFailed);
+                                       }
+                                       channel_lock.pending_msg_events.push(events::MessageSendEvent::UpdateHTLCs {
+                                               node_id: route.hops.first().unwrap().pubkey,
+                                               updates: msgs::CommitmentUpdate {
+                                                       update_add_htlcs: vec![update_add],
+                                                       update_fulfill_htlcs: Vec::new(),
+                                                       update_fail_htlcs: Vec::new(),
+                                                       update_fail_malformed_htlcs: Vec::new(),
+                                                       update_fee: None,
+                                                       commitment_signed,
+                                               },
+                                       });
+                               },
+                               None => {},
                        }
-                       chan.send_htlc_and_commit(htlc_msat, payment_hash.clone(), htlc_cltv, HTLCSource::OutboundRoute {
-                               route: route.clone(),
-                               session_priv: session_priv.clone(),
-                               first_hop_htlc_msat: htlc_msat,
-                       }, onion_packet).map_err(|he|
-                               match he {
-                                       ChannelError::Close(err) => {
-                                               // TODO: We need to close the channel here, but for that to be safe we have
-                                               // to do all channel closure inside the channel_state lock which is a
-                                               // somewhat-larger refactor, so we leave that for later.
-                                               APIError::ChannelUnavailable { err }
-                                       },
-                                       ChannelError::Ignore(err) => APIError::ChannelUnavailable { err },
-                               }
-                       )?
+                       return Ok(());
                };
-               match res {
-                       Some((update_add, commitment_signed, chan_monitor)) => {
-                               if let Err(e) = self.monitor.add_update_monitor(chan_monitor.get_funding_txo().unwrap(), chan_monitor) {
-                                       self.handle_monitor_update_fail(channel_state, &id, e, RAACommitmentOrder::CommitmentFirst);
-                                       return Err(APIError::MonitorUpdateFailed);
-                               }
  
-                               channel_state.pending_msg_events.push(events::MessageSendEvent::UpdateHTLCs {
-                                       node_id: route.hops.first().unwrap().pubkey,
-                                       updates: msgs::CommitmentUpdate {
-                                               update_add_htlcs: vec![update_add],
-                                               update_fulfill_htlcs: Vec::new(),
-                                               update_fail_htlcs: Vec::new(),
-                                               update_fail_malformed_htlcs: Vec::new(),
-                                               update_fee: None,
-                                               commitment_signed,
-                                       },
-                               });
+               match handle_error!(self, err, route.hops.first().unwrap().pubkey) {
+                       Ok(_) => unreachable!(),
+                       Err(e) => {
+                               if let Some(msgs::ErrorAction::IgnoreError) = e.action {
+                               } else {
+                                       log_error!(self, "Got bad keys: {}!", e.err);
+                                       let mut channel_state = self.channel_state.lock().unwrap();
+                                       channel_state.pending_msg_events.push(events::MessageSendEvent::HandleError {
+                                               node_id: route.hops.first().unwrap().pubkey,
+                                               action: e.action,
+                                       });
+                               }
+                               Err(APIError::ChannelUnavailable { err: e.err })
                        },
-                       None => {},
                }
-               Ok(())
        }
  
        /// Call this upon creation of a funding transaction for the given channel.
                                match channel_state.by_id.remove(temporary_channel_id) {
                                        Some(mut chan) => {
                                                (chan.get_outbound_funding_created(funding_txo)
-                                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, chan.channel_id()))
+                                                       .map_err(|e| if let ChannelError::Close(msg) = e {
+                                                               MsgHandleErrInternal::from_finish_shutdown(msg, chan.channel_id(), chan.force_shutdown(), None)
+                                                       } else { unreachable!(); })
                                                , chan)
                                        },
                                        None => return
  
        fn internal_accept_channel(&self, their_node_id: &PublicKey, msg: &msgs::AcceptChannel) -> Result<(), MsgHandleErrInternal> {
                let (value, output_script, user_id) = {
-                       let mut channel_state = self.channel_state.lock().unwrap();
-                       match channel_state.by_id.get_mut(&msg.temporary_channel_id) {
-                               Some(chan) => {
-                                       if chan.get_their_node_id() != *their_node_id {
+                       let mut channel_lock = self.channel_state.lock().unwrap();
+                       let channel_state = channel_lock.borrow_parts();
+                       match channel_state.by_id.entry(msg.temporary_channel_id) {
+                               hash_map::Entry::Occupied(mut chan) => {
+                                       if chan.get().get_their_node_id() != *their_node_id {
                                                //TODO: see issue #153, need a consistent behavior on obnoxious behavior from random node
                                                return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.temporary_channel_id));
                                        }
-                                       chan.accept_channel(&msg, &self.default_configuration)
-                                               .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.temporary_channel_id))?;
-                                       (chan.get_value_satoshis(), chan.get_funding_redeemscript().to_v0_p2wsh(), chan.get_user_id())
+                                       try_chan_entry!(self, chan.get_mut().accept_channel(&msg, &self.default_configuration), channel_state, chan);
+                                       (chan.get().get_value_satoshis(), chan.get().get_funding_redeemscript().to_v0_p2wsh(), chan.get().get_user_id())
                                },
                                //TODO: same as above
-                               None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.temporary_channel_id))
+                               hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.temporary_channel_id))
                        }
                };
                let mut pending_events = self.pending_events.lock().unwrap();
        }
  
        fn internal_funding_created(&self, their_node_id: &PublicKey, msg: &msgs::FundingCreated) -> Result<(), MsgHandleErrInternal> {
-               let (chan, funding_msg, monitor_update) = {
-                       let mut channel_state = self.channel_state.lock().unwrap();
+               let ((funding_msg, monitor_update), chan) = {
+                       let mut channel_lock = self.channel_state.lock().unwrap();
+                       let channel_state = channel_lock.borrow_parts();
                        match channel_state.by_id.entry(msg.temporary_channel_id.clone()) {
                                hash_map::Entry::Occupied(mut chan) => {
                                        if chan.get().get_their_node_id() != *their_node_id {
                                                //TODO: here and below MsgHandleErrInternal, #153 case
                                                return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.temporary_channel_id));
                                        }
-                                       match chan.get_mut().funding_created(msg) {
-                                               Ok((funding_msg, monitor_update)) => {
-                                                       (chan.remove(), funding_msg, monitor_update)
-                                               },
-                                               Err(e) => {
-                                                       return Err(e).map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.temporary_channel_id))
-                                               }
-                                       }
+                                       (try_chan_entry!(self, chan.get_mut().funding_created(msg), channel_state, chan), chan.remove())
                                },
                                hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.temporary_channel_id))
                        }
  
        fn internal_funding_signed(&self, their_node_id: &PublicKey, msg: &msgs::FundingSigned) -> Result<(), MsgHandleErrInternal> {
                let (funding_txo, user_id) = {
-                       let mut channel_state = self.channel_state.lock().unwrap();
-                       match channel_state.by_id.get_mut(&msg.channel_id) {
-                               Some(chan) => {
-                                       if chan.get_their_node_id() != *their_node_id {
+                       let mut channel_lock = self.channel_state.lock().unwrap();
+                       let channel_state = channel_lock.borrow_parts();
+                       match channel_state.by_id.entry(msg.channel_id) {
+                               hash_map::Entry::Occupied(mut chan) => {
+                                       if chan.get().get_their_node_id() != *their_node_id {
                                                //TODO: here and below MsgHandleErrInternal, #153 case
                                                return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                        }
-                                       let chan_monitor = chan.funding_signed(&msg).map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?;
+                                       let chan_monitor = try_chan_entry!(self, chan.get_mut().funding_signed(&msg), channel_state, chan);
                                        if let Err(_e) = self.monitor.add_update_monitor(chan_monitor.get_funding_txo().unwrap(), chan_monitor) {
                                                unimplemented!();
                                        }
-                                       (chan.get_funding_txo().unwrap(), chan.get_user_id())
+                                       (chan.get().get_funding_txo().unwrap(), chan.get().get_user_id())
                                },
-                               None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                               hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                        }
                };
                let mut pending_events = self.pending_events.lock().unwrap();
        fn internal_funding_locked(&self, their_node_id: &PublicKey, msg: &msgs::FundingLocked) -> Result<(), MsgHandleErrInternal> {
                let mut channel_state_lock = self.channel_state.lock().unwrap();
                let channel_state = channel_state_lock.borrow_parts();
-               match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
+               match channel_state.by_id.entry(msg.channel_id) {
+                       hash_map::Entry::Occupied(mut chan) => {
+                               if chan.get().get_their_node_id() != *their_node_id {
                                        //TODO: here and below MsgHandleErrInternal, #153 case
                                        return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                }
-                               chan.funding_locked(&msg)
-                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?;
-                               if let Some(announcement_sigs) = self.get_announcement_sigs(chan) {
+                               try_chan_entry!(self, chan.get_mut().funding_locked(&msg), channel_state, chan);
+                               if let Some(announcement_sigs) = self.get_announcement_sigs(chan.get()) {
                                        channel_state.pending_msg_events.push(events::MessageSendEvent::SendAnnouncementSignatures {
                                                node_id: their_node_id.clone(),
                                                msg: announcement_sigs,
                                }
                                Ok(())
                        },
-                       None => Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                       hash_map::Entry::Vacant(_) => Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                }
        }
  
                                                //TODO: here and below MsgHandleErrInternal, #153 case
                                                return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                        }
-                                       let (shutdown, closing_signed, dropped_htlcs) = chan_entry.get_mut().shutdown(&*self.fee_estimator, &msg).map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?;
+                                       let (shutdown, closing_signed, dropped_htlcs) = try_chan_entry!(self, chan_entry.get_mut().shutdown(&*self.fee_estimator, &msg), channel_state, chan_entry);
                                        if let Some(msg) = shutdown {
                                                channel_state.pending_msg_events.push(events::MessageSendEvent::SendShutdown {
                                                        node_id: their_node_id.clone(),
                                                //TODO: here and below MsgHandleErrInternal, #153 case
                                                return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                        }
-                                       let (closing_signed, tx) = chan_entry.get_mut().closing_signed(&*self.fee_estimator, &msg).map_err(|e| MsgHandleErrInternal::from_maybe_close(e))?;
+                                       let (closing_signed, tx) = try_chan_entry!(self, chan_entry.get_mut().closing_signed(&*self.fee_estimator, &msg), channel_state, chan_entry);
                                        if let Some(msg) = closing_signed {
                                                channel_state.pending_msg_events.push(events::MessageSendEvent::SendClosingSigned {
                                                        node_id: their_node_id.clone(),
                let (mut pending_forward_info, mut channel_state_lock) = self.decode_update_add_htlc_onion(msg);
                let channel_state = channel_state_lock.borrow_parts();
  
-               match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
+               match channel_state.by_id.entry(msg.channel_id) {
+                       hash_map::Entry::Occupied(mut chan) => {
+                               if chan.get().get_their_node_id() != *their_node_id {
                                        //TODO: here MsgHandleErrInternal, #153 case
                                        return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                }
-                               if !chan.is_usable() {
+                               if !chan.get().is_usable() {
                                        // If the update_add is completely bogus, the call will Err and we will close,
                                        // but if we've sent a shutdown and they haven't acknowledged it yet, we just
                                        // want to reject the new HTLC and fail it backwards instead of forwarding.
                                        if let PendingHTLCStatus::Forward(PendingForwardHTLCInfo { incoming_shared_secret, .. }) = pending_forward_info {
-                                               let chan_update = self.get_channel_update(chan);
+                                               let chan_update = self.get_channel_update(chan.get());
                                                pending_forward_info = PendingHTLCStatus::Fail(HTLCFailureMsg::Relay(msgs::UpdateFailHTLC {
                                                        channel_id: msg.channel_id,
                                                        htlc_id: msg.htlc_id,
                                                }));
                                        }
                                }
-                               chan.update_add_htlc(&msg, pending_forward_info).map_err(|e| MsgHandleErrInternal::from_maybe_close(e))
+                               try_chan_entry!(self, chan.get_mut().update_add_htlc(&msg, pending_forward_info), channel_state, chan);
                        },
-                       None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                       hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                }
+               Ok(())
        }
  
        fn internal_update_fulfill_htlc(&self, their_node_id: &PublicKey, msg: &msgs::UpdateFulfillHTLC) -> Result<(), MsgHandleErrInternal> {
-               let mut channel_state = self.channel_state.lock().unwrap();
-               let htlc_source = match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
-                                       //TODO: here and below MsgHandleErrInternal, #153 case
-                                       return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
-                               }
-                               chan.update_fulfill_htlc(&msg)
-                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?.clone()
-                       },
-                       None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+               let mut channel_lock = self.channel_state.lock().unwrap();
+               let htlc_source = {
+                       let channel_state = channel_lock.borrow_parts();
+                       match channel_state.by_id.entry(msg.channel_id) {
+                               hash_map::Entry::Occupied(mut chan) => {
+                                       if chan.get().get_their_node_id() != *their_node_id {
+                                               //TODO: here and below MsgHandleErrInternal, #153 case
+                                               return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
+                                       }
+                                       try_chan_entry!(self, chan.get_mut().update_fulfill_htlc(&msg), channel_state, chan)
+                               },
+                               hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                       }
                };
-               self.claim_funds_internal(channel_state, htlc_source, msg.payment_preimage.clone());
+               self.claim_funds_internal(channel_lock, htlc_source, msg.payment_preimage.clone());
                Ok(())
        }
  
        }
  
        fn internal_update_fail_htlc(&self, their_node_id: &PublicKey, msg: &msgs::UpdateFailHTLC) -> Result<(), MsgHandleErrInternal> {
-               let mut channel_state = self.channel_state.lock().unwrap();
-               match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
+               let mut channel_lock = self.channel_state.lock().unwrap();
+               let channel_state = channel_lock.borrow_parts();
+               match channel_state.by_id.entry(msg.channel_id) {
+                       hash_map::Entry::Occupied(mut chan) => {
+                               if chan.get().get_their_node_id() != *their_node_id {
                                        //TODO: here and below MsgHandleErrInternal, #153 case
                                        return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                }
-                               chan.update_fail_htlc(&msg, HTLCFailReason::ErrorPacket { err: msg.reason.clone() })
-                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))
+                               try_chan_entry!(self, chan.get_mut().update_fail_htlc(&msg, HTLCFailReason::ErrorPacket { err: msg.reason.clone() }), channel_state, chan);
                        },
-                       None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
-               }?;
+                       hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+               }
                Ok(())
        }
  
        fn internal_update_fail_malformed_htlc(&self, their_node_id: &PublicKey, msg: &msgs::UpdateFailMalformedHTLC) -> Result<(), MsgHandleErrInternal> {
-               let mut channel_state = self.channel_state.lock().unwrap();
-               match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
+               let mut channel_lock = self.channel_state.lock().unwrap();
+               let channel_state = channel_lock.borrow_parts();
+               match channel_state.by_id.entry(msg.channel_id) {
+                       hash_map::Entry::Occupied(mut chan) => {
+                               if chan.get().get_their_node_id() != *their_node_id {
                                        //TODO: here and below MsgHandleErrInternal, #153 case
                                        return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                }
                                if (msg.failure_code & 0x8000) == 0 {
-                                       return Err(MsgHandleErrInternal::send_err_msg_close_chan("Got update_fail_malformed_htlc with BADONION not set", msg.channel_id));
+                                       try_chan_entry!(self, Err(ChannelError::Close("Got update_fail_malformed_htlc with BADONION not set")), channel_state, chan);
                                }
-                               chan.update_fail_malformed_htlc(&msg, HTLCFailReason::Reason { failure_code: msg.failure_code, data: Vec::new() })
-                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?;
+                               try_chan_entry!(self, chan.get_mut().update_fail_malformed_htlc(&msg, HTLCFailReason::Reason { failure_code: msg.failure_code, data: Vec::new() }), channel_state, chan);
                                Ok(())
                        },
-                       None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                       hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                }
        }
  
        fn internal_commitment_signed(&self, their_node_id: &PublicKey, msg: &msgs::CommitmentSigned) -> Result<(), MsgHandleErrInternal> {
                let mut channel_state_lock = self.channel_state.lock().unwrap();
                let channel_state = channel_state_lock.borrow_parts();
-               match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
+               match channel_state.by_id.entry(msg.channel_id) {
+                       hash_map::Entry::Occupied(mut chan) => {
+                               if chan.get().get_their_node_id() != *their_node_id {
                                        //TODO: here and below MsgHandleErrInternal, #153 case
                                        return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                }
-                               let (revoke_and_ack, commitment_signed, closing_signed, chan_monitor) = chan.commitment_signed(&msg, &*self.fee_estimator)
-                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?;
+                               let (revoke_and_ack, commitment_signed, closing_signed, chan_monitor) =
+                                       try_chan_entry!(self, chan.get_mut().commitment_signed(&msg, &*self.fee_estimator), channel_state, chan);
                                if let Err(_e) = self.monitor.add_update_monitor(chan_monitor.get_funding_txo().unwrap(), chan_monitor) {
                                        unimplemented!();
                                }
                                }
                                Ok(())
                        },
-                       None => Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                       hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                }
        }
  
                let (pending_forwards, mut pending_failures, short_channel_id) = {
                        let mut channel_state_lock = self.channel_state.lock().unwrap();
                        let channel_state = channel_state_lock.borrow_parts();
-                       match channel_state.by_id.get_mut(&msg.channel_id) {
-                               Some(chan) => {
-                                       if chan.get_their_node_id() != *their_node_id {
+                       match channel_state.by_id.entry(msg.channel_id) {
+                               hash_map::Entry::Occupied(mut chan) => {
+                                       if chan.get().get_their_node_id() != *their_node_id {
                                                //TODO: here and below MsgHandleErrInternal, #153 case
                                                return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                        }
-                                       let (commitment_update, pending_forwards, pending_failures, closing_signed, chan_monitor) = chan.revoke_and_ack(&msg, &*self.fee_estimator)
-                                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?;
+                                       let (commitment_update, pending_forwards, pending_failures, closing_signed, chan_monitor) =
+                                               try_chan_entry!(self, chan.get_mut().revoke_and_ack(&msg, &*self.fee_estimator), channel_state, chan);
                                        if let Err(_e) = self.monitor.add_update_monitor(chan_monitor.get_funding_txo().unwrap(), chan_monitor) {
                                                unimplemented!();
                                        }
                                                        msg,
                                                });
                                        }
-                                       (pending_forwards, pending_failures, chan.get_short_channel_id().expect("RAA should only work on a short-id-available channel"))
+                                       (pending_forwards, pending_failures, chan.get().get_short_channel_id().expect("RAA should only work on a short-id-available channel"))
                                },
-                               None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                               hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                        }
                };
                for failure in pending_failures.drain(..) {
        }
  
        fn internal_update_fee(&self, their_node_id: &PublicKey, msg: &msgs::UpdateFee) -> Result<(), MsgHandleErrInternal> {
-               let mut channel_state = self.channel_state.lock().unwrap();
-               match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
+               let mut channel_lock = self.channel_state.lock().unwrap();
+               let channel_state = channel_lock.borrow_parts();
+               match channel_state.by_id.entry(msg.channel_id) {
+                       hash_map::Entry::Occupied(mut chan) => {
+                               if chan.get().get_their_node_id() != *their_node_id {
                                        //TODO: here and below MsgHandleErrInternal, #153 case
                                        return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                }
-                               chan.update_fee(&*self.fee_estimator, &msg).map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))
+                               try_chan_entry!(self, chan.get_mut().update_fee(&*self.fee_estimator, &msg), channel_state, chan);
                        },
-                       None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                       hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                }
+               Ok(())
        }
  
        fn internal_announcement_signatures(&self, their_node_id: &PublicKey, msg: &msgs::AnnouncementSignatures) -> Result<(), MsgHandleErrInternal> {
                let mut channel_state_lock = self.channel_state.lock().unwrap();
                let channel_state = channel_state_lock.borrow_parts();
  
-               match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
+               match channel_state.by_id.entry(msg.channel_id) {
+                       hash_map::Entry::Occupied(mut chan) => {
+                               if chan.get().get_their_node_id() != *their_node_id {
                                        return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                }
-                               if !chan.is_usable() {
+                               if !chan.get().is_usable() {
                                        return Err(MsgHandleErrInternal::from_no_close(HandleError{err: "Got an announcement_signatures before we were ready for it", action: Some(msgs::ErrorAction::IgnoreError)}));
                                }
  
                                let our_node_id = self.get_our_node_id();
-                               let (announcement, our_bitcoin_sig) = chan.get_channel_announcement(our_node_id.clone(), self.genesis_hash.clone())
-                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?;
+                               let (announcement, our_bitcoin_sig) =
+                                       try_chan_entry!(self, chan.get_mut().get_channel_announcement(our_node_id.clone(), self.genesis_hash.clone()), channel_state, chan);
  
                                let were_node_one = announcement.node_id_1 == our_node_id;
                                let msghash = Message::from_slice(&Sha256dHash::from_data(&announcement.encode()[..])[..]).unwrap();
-                               let bad_sig_action = MsgHandleErrInternal::send_err_msg_close_chan("Bad announcement_signatures node_signature", msg.channel_id);
-                               secp_call!(self.secp_ctx.verify(&msghash, &msg.node_signature, if were_node_one { &announcement.node_id_2 } else { &announcement.node_id_1 }), bad_sig_action);
-                               secp_call!(self.secp_ctx.verify(&msghash, &msg.bitcoin_signature, if were_node_one { &announcement.bitcoin_key_2 } else { &announcement.bitcoin_key_1 }), bad_sig_action);
+                               if self.secp_ctx.verify(&msghash, &msg.node_signature, if were_node_one { &announcement.node_id_2 } else { &announcement.node_id_1 }).is_err() ||
+                                               self.secp_ctx.verify(&msghash, &msg.bitcoin_signature, if were_node_one { &announcement.bitcoin_key_2 } else { &announcement.bitcoin_key_1 }).is_err() {
+                                       try_chan_entry!(self, Err(ChannelError::Close("Bad announcement_signatures node_signature")), channel_state, chan);
+                               }
  
                                let our_node_sig = self.secp_ctx.sign(&msghash, &self.our_network_key);
  
                                                bitcoin_signature_2: if were_node_one { msg.bitcoin_signature } else { our_bitcoin_sig },
                                                contents: announcement,
                                        },
-                                       update_msg: self.get_channel_update(chan).unwrap(), // can only fail if we're not in a ready state
+                                       update_msg: self.get_channel_update(chan.get()).unwrap(), // can only fail if we're not in a ready state
                                });
                        },
-                       None => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                       hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                }
                Ok(())
        }
                let mut channel_state_lock = self.channel_state.lock().unwrap();
                let channel_state = channel_state_lock.borrow_parts();
  
-               match channel_state.by_id.get_mut(&msg.channel_id) {
-                       Some(chan) => {
-                               if chan.get_their_node_id() != *their_node_id {
+               match channel_state.by_id.entry(msg.channel_id) {
+                       hash_map::Entry::Occupied(mut chan) => {
+                               if chan.get().get_their_node_id() != *their_node_id {
                                        return Err(MsgHandleErrInternal::send_err_msg_no_close("Got a message for a channel from the wrong node!", msg.channel_id));
                                }
-                               let (funding_locked, revoke_and_ack, commitment_update, channel_monitor, order, shutdown) = chan.channel_reestablish(msg)
-                                       .map_err(|e| MsgHandleErrInternal::from_chan_maybe_close(e, msg.channel_id))?;
+                               let (funding_locked, revoke_and_ack, commitment_update, channel_monitor, order, shutdown) =
+                                       try_chan_entry!(self, chan.get_mut().channel_reestablish(msg), channel_state, chan);
                                if let Some(monitor) = channel_monitor {
                                        if let Err(_e) = self.monitor.add_update_monitor(monitor.get_funding_txo().unwrap(), monitor) {
                                                unimplemented!();
                                }
                                Ok(())
                        },
-                       None => Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
+                       hash_map::Entry::Vacant(_) => return Err(MsgHandleErrInternal::send_err_msg_no_close("Failed to find corresponding channel", msg.channel_id))
                }
        }
  
        #[doc(hidden)]
        pub fn update_fee(&self, channel_id: [u8;32], feerate_per_kw: u64) -> Result<(), APIError> {
                let _ = self.total_consistency_lock.read().unwrap();
-               let mut channel_state_lock = self.channel_state.lock().unwrap();
-               let channel_state = channel_state_lock.borrow_parts();
+               let their_node_id;
+               let err: Result<(), _> = loop {
+                       let mut channel_state_lock = self.channel_state.lock().unwrap();
+                       let channel_state = channel_state_lock.borrow_parts();
  
-               match channel_state.by_id.get_mut(&channel_id) {
-                       None => return Err(APIError::APIMisuseError{err: "Failed to find corresponding channel"}),
-                       Some(chan) => {
-                               if !chan.is_outbound() {
-                                       return Err(APIError::APIMisuseError{err: "update_fee cannot be sent for an inbound channel"});
-                               }
-                               if chan.is_awaiting_monitor_update() {
-                                       return Err(APIError::MonitorUpdateFailed);
-                               }
-                               if !chan.is_live() {
-                                       return Err(APIError::ChannelUnavailable{err: "Channel is either not yet fully established or peer is currently disconnected"});
-                               }
-                               if let Some((update_fee, commitment_signed, chan_monitor)) = chan.send_update_fee_and_commit(feerate_per_kw)
-                                               .map_err(|e| match e {
-                                                       ChannelError::Ignore(err) => APIError::APIMisuseError{err},
-                                                       ChannelError::Close(err) => {
-                                                               // TODO: We need to close the channel here, but for that to be safe we have
-                                                               // to do all channel closure inside the channel_state lock which is a
-                                                               // somewhat-larger refactor, so we leave that for later.
-                                                               APIError::APIMisuseError{err}
+                       match channel_state.by_id.entry(channel_id) {
+                               hash_map::Entry::Vacant(_) => return Err(APIError::APIMisuseError{err: "Failed to find corresponding channel"}),
+                               hash_map::Entry::Occupied(mut chan) => {
+                                       if !chan.get().is_outbound() {
+                                               return Err(APIError::APIMisuseError{err: "update_fee cannot be sent for an inbound channel"});
+                                       }
+                                       if chan.get().is_awaiting_monitor_update() {
+                                               return Err(APIError::MonitorUpdateFailed);
+                                       }
+                                       if !chan.get().is_live() {
+                                               return Err(APIError::ChannelUnavailable{err: "Channel is either not yet fully established or peer is currently disconnected"});
+                                       }
+                                       their_node_id = chan.get().get_their_node_id();
+                                       if let Some((update_fee, commitment_signed, chan_monitor)) =
+                                                       break_chan_entry!(self, chan.get_mut().send_update_fee_and_commit(feerate_per_kw), channel_state, chan)
+                                       {
+                                               if let Err(_e) = self.monitor.add_update_monitor(chan_monitor.get_funding_txo().unwrap(), chan_monitor) {
+                                                       unimplemented!();
+                                               }
+                                               channel_state.pending_msg_events.push(events::MessageSendEvent::UpdateHTLCs {
+                                                       node_id: chan.get().get_their_node_id(),
+                                                       updates: msgs::CommitmentUpdate {
+                                                               update_add_htlcs: Vec::new(),
+                                                               update_fulfill_htlcs: Vec::new(),
+                                                               update_fail_htlcs: Vec::new(),
+                                                               update_fail_malformed_htlcs: Vec::new(),
+                                                               update_fee: Some(update_fee),
+                                                               commitment_signed,
                                                        },
-                                               })? {
-                                       if let Err(_e) = self.monitor.add_update_monitor(chan_monitor.get_funding_txo().unwrap(), chan_monitor) {
-                                               unimplemented!();
+                                               });
                                        }
-                                       channel_state.pending_msg_events.push(events::MessageSendEvent::UpdateHTLCs {
-                                               node_id: chan.get_their_node_id(),
-                                               updates: msgs::CommitmentUpdate {
-                                                       update_add_htlcs: Vec::new(),
-                                                       update_fulfill_htlcs: Vec::new(),
-                                                       update_fail_htlcs: Vec::new(),
-                                                       update_fail_malformed_htlcs: Vec::new(),
-                                                       update_fee: Some(update_fee),
-                                                       commitment_signed,
-                                               },
+                               },
+                       }
+                       return Ok(())
+               };
+               match handle_error!(self, err, their_node_id) {
+                       Ok(_) => unreachable!(),
+                       Err(e) => {
+                               if let Some(msgs::ErrorAction::IgnoreError) = e.action {
+                               } else {
+                                       log_error!(self, "Got bad keys: {}!", e.err);
+                                       let mut channel_state = self.channel_state.lock().unwrap();
+                                       channel_state.pending_msg_events.push(events::MessageSendEvent::HandleError {
+                                               node_id: their_node_id,
+                                               action: e.action,
                                        });
                                }
+                               Err(APIError::APIMisuseError { err: e.err })
                        },
                }
-               Ok(())
        }
  }
  
@@@ -2588,11 -2618,9 +2618,9 @@@ impl ChainListener for ChannelManager 
                                } else if let Err(e) = chan_res {
                                        pending_msg_events.push(events::MessageSendEvent::HandleError {
                                                node_id: channel.get_their_node_id(),
-                                               action: e.action,
+                                               action: Some(msgs::ErrorAction::SendErrorMessage { msg: e }),
                                        });
-                                       if channel.is_shutdown() {
-                                               return false;
-                                       }
+                                       return false;
                                }
                                if let Some(funding_txo) = channel.get_funding_txo() {
                                        for tx in txn_matched {
@@@ -5369,8 -5397,7 +5397,7 @@@ mod tests 
                }}
        }
  
-       #[test]
-       fn channel_reserve_test() {
+       fn do_channel_reserve_test(test_recv: bool) {
                use util::rng;
                use std::sync::atomic::Ordering;
                use ln::msgs::HandleError;
                                onion_routing_packet: onion_packet,
                        };
  
-                       let err = nodes[1].node.handle_update_add_htlc(&nodes[0].node.get_our_node_id(), &msg).err().unwrap();
-                       match err {
-                               HandleError{err, .. } => assert_eq!(err, "Remote HTLC add would put them over their reserve value"),
+                       if test_recv {
+                               let err = nodes[1].node.handle_update_add_htlc(&nodes[0].node.get_our_node_id(), &msg).err().unwrap();
+                               match err {
+                                       HandleError{err, .. } => assert_eq!(err, "Remote HTLC add would put them over their reserve value"),
+                               }
+                               // If we send a garbage message, the channel should get closed, making the rest of this test case fail.
+                               assert_eq!(nodes[1].node.list_channels().len(), 1);
+                               assert_eq!(nodes[1].node.list_channels().len(), 1);
+                               let channel_close_broadcast = nodes[1].node.get_and_clear_pending_msg_events();
+                               assert_eq!(channel_close_broadcast.len(), 1);
+                               match channel_close_broadcast[0] {
+                                       MessageSendEvent::BroadcastChannelUpdate { ref msg } => {
+                                               assert_eq!(msg.contents.flags & 2, 2);
+                                       },
+                                       _ => panic!("Unexpected event"),
+                               }
+                               return;
                        }
                }
  
                assert_eq!(stat2.value_to_self_msat, stat22.value_to_self_msat + recv_value_1 + recv_value_21 + recv_value_22);
        }
  
+       #[test]
+       fn channel_reserve_test() {
+               do_channel_reserve_test(false);
+               do_channel_reserve_test(true);
+       }
        #[test]
        fn channel_monitor_network_test() {
                // Simple test which builds a network of ChannelManagers, connects them to each other, and
                } else { panic!("Unexpected result"); }
        }
  
 -      macro_rules! check_dynamic_output_p2wsh {
 -              ($node: expr) => {
 +      macro_rules! check_spendable_outputs {
 +              ($node: expr, $der_idx: expr) => {
                        {
                                let events = $node.chan_monitor.simple_monitor.get_and_clear_pending_events();
                                let mut txn = Vec::new();
                                                Event::SpendableOutputs { ref outputs } => {
                                                        for outp in outputs {
                                                                match *outp {
 +                                                                      SpendableOutputDescriptor::DynamicOutputP2WPKH { ref outpoint, ref key, ref output } => {
 +                                                                              let input = TxIn {
 +                                                                                      previous_output: outpoint.clone(),
 +                                                                                      script_sig: Script::new(),
 +                                                                                      sequence: 0,
 +                                                                                      witness: Vec::new(),
 +                                                                              };
 +                                                                              let outp = TxOut {
 +                                                                                      script_pubkey: Builder::new().push_opcode(opcodes::All::OP_RETURN).into_script(),
 +                                                                                      value: output.value,
 +                                                                              };
 +                                                                              let mut spend_tx = Transaction {
 +                                                                                      version: 2,
 +                                                                                      lock_time: 0,
 +                                                                                      input: vec![input],
 +                                                                                      output: vec![outp],
 +                                                                              };
 +                                                                              let secp_ctx = Secp256k1::new();
 +                                                                              let remotepubkey = PublicKey::from_secret_key(&secp_ctx, &key);
 +                                                                              let witness_script = Address::p2pkh(&remotepubkey, Network::Testnet).script_pubkey();
 +                                                                              let sighash = Message::from_slice(&bip143::SighashComponents::new(&spend_tx).sighash_all(&spend_tx.input[0], &witness_script, output.value)[..]).unwrap();
 +                                                                              let remotesig = secp_ctx.sign(&sighash, key);
 +                                                                              spend_tx.input[0].witness.push(remotesig.serialize_der(&secp_ctx).to_vec());
 +                                                                              spend_tx.input[0].witness[0].push(SigHashType::All as u8);
 +                                                                              spend_tx.input[0].witness.push(remotepubkey.serialize().to_vec());
 +                                                                              txn.push(spend_tx);
 +                                                                      },
                                                                        SpendableOutputDescriptor::DynamicOutputP2WSH { ref outpoint, ref key, ref witness_script, ref to_self_delay, ref output } => {
                                                                                let input = TxIn {
                                                                                        previous_output: outpoint.clone(),
                                                                                spend_tx.input[0].witness.push(witness_script.clone().into_bytes());
                                                                                txn.push(spend_tx);
                                                                        },
 -                                                                      _ => panic!("Unexpected event"),
 -                                                              }
 -                                                      }
 -                                              },
 -                                              _ => panic!("Unexpected event"),
 -                                      };
 -                              }
 -                              txn
 -                      }
 -              }
 -      }
 -
 -      macro_rules! check_dynamic_output_p2wpkh {
 -              ($node: expr) => {
 -                      {
 -                              let events = $node.chan_monitor.simple_monitor.get_and_clear_pending_events();
 -                              let mut txn = Vec::new();
 -                              for event in events {
 -                                      match event {
 -                                              Event::SpendableOutputs { ref outputs } => {
 -                                                      for outp in outputs {
 -                                                              match *outp {
 -                                                                      SpendableOutputDescriptor::DynamicOutputP2WPKH { ref outpoint, ref key, ref output } => {
 +                                                                      SpendableOutputDescriptor::StaticOutput { ref outpoint, ref output } => {
 +                                                                              let secp_ctx = Secp256k1::new();
                                                                                let input = TxIn {
                                                                                        previous_output: outpoint.clone(),
                                                                                        script_sig: Script::new(),
                                                                                        version: 2,
                                                                                        lock_time: 0,
                                                                                        input: vec![input],
 -                                                                                      output: vec![outp],
 +                                                                                      output: vec![outp.clone()],
                                                                                };
 -                                                                              let secp_ctx = Secp256k1::new();
 -                                                                              let remotepubkey = PublicKey::from_secret_key(&secp_ctx, &key);
 -                                                                              let witness_script = Address::p2pkh(&remotepubkey, Network::Testnet).script_pubkey();
 +                                                                              let secret = {
 +                                                                                      match ExtendedPrivKey::new_master(&secp_ctx, Network::Testnet, &$node.node_seed) {
 +                                                                                              Ok(master_key) => {
 +                                                                                                      match master_key.ckd_priv(&secp_ctx, ChildNumber::from_hardened_idx($der_idx)) {
 +                                                                                                              Ok(key) => key,
 +                                                                                                              Err(_) => panic!("Your RNG is busted"),
 +                                                                                                      }
 +                                                                                              }
 +                                                                                              Err(_) => panic!("Your rng is busted"),
 +                                                                                      }
 +                                                                              };
 +                                                                              let pubkey = ExtendedPubKey::from_private(&secp_ctx, &secret).public_key;
 +                                                                              let witness_script = Address::p2pkh(&pubkey, Network::Testnet).script_pubkey();
                                                                                let sighash = Message::from_slice(&bip143::SighashComponents::new(&spend_tx).sighash_all(&spend_tx.input[0], &witness_script, output.value)[..]).unwrap();
 -                                                                              let remotesig = secp_ctx.sign(&sighash, key);
 -                                                                              spend_tx.input[0].witness.push(remotesig.serialize_der(&secp_ctx).to_vec());
 +                                                                              let sig = secp_ctx.sign(&sighash, &secret.secret_key);
 +                                                                              spend_tx.input[0].witness.push(sig.serialize_der(&secp_ctx).to_vec());
                                                                                spend_tx.input[0].witness[0].push(SigHashType::All as u8);
 -                                                                              spend_tx.input[0].witness.push(remotepubkey.serialize().to_vec());
 +                                                                              spend_tx.input[0].witness.push(pubkey.serialize().to_vec());
                                                                                txn.push(spend_tx);
                                                                        },
 -                                                                      _ => panic!("Unexpected event"),
                                                                }
                                                        }
                                                },
                }
        }
  
 -      macro_rules! check_static_output {
 -              ($event: expr, $node: expr, $event_idx: expr, $output_idx: expr, $der_idx: expr, $idx_node: expr) => {
 -                      match $event[$event_idx] {
 -                              Event::SpendableOutputs { ref outputs } => {
 -                                      match outputs[$output_idx] {
 -                                              SpendableOutputDescriptor::StaticOutput { ref outpoint, ref output } => {
 -                                                      let secp_ctx = Secp256k1::new();
 -                                                      let input = TxIn {
 -                                                              previous_output: outpoint.clone(),
 -                                                              script_sig: Script::new(),
 -                                                              sequence: 0,
 -                                                              witness: Vec::new(),
 -                                                      };
 -                                                      let outp = TxOut {
 -                                                              script_pubkey: Builder::new().push_opcode(opcodes::All::OP_RETURN).into_script(),
 -                                                              value: output.value,
 -                                                      };
 -                                                      let mut spend_tx = Transaction {
 -                                                              version: 2,
 -                                                              lock_time: 0,
 -                                                              input: vec![input],
 -                                                              output: vec![outp.clone()],
 -                                                      };
 -                                                      let secret = {
 -                                                              match ExtendedPrivKey::new_master(&secp_ctx, Network::Testnet, &$node[$idx_node].node_seed) {
 -                                                                      Ok(master_key) => {
 -                                                                              match master_key.ckd_priv(&secp_ctx, ChildNumber::from_hardened_idx($der_idx)) {
 -                                                                                      Ok(key) => key,
 -                                                                                      Err(_) => panic!("Your RNG is busted"),
 -                                                                              }
 -                                                                      }
 -                                                                      Err(_) => panic!("Your rng is busted"),
 -                                                              }
 -                                                      };
 -                                                      let pubkey = ExtendedPubKey::from_private(&secp_ctx, &secret).public_key;
 -                                                      let witness_script = Address::p2pkh(&pubkey, Network::Testnet).script_pubkey();
 -                                                      let sighash = Message::from_slice(&bip143::SighashComponents::new(&spend_tx).sighash_all(&spend_tx.input[0], &witness_script, output.value)[..]).unwrap();
 -                                                      let sig = secp_ctx.sign(&sighash, &secret.secret_key);
 -                                                      spend_tx.input[0].witness.push(sig.serialize_der(&secp_ctx).to_vec());
 -                                                      spend_tx.input[0].witness[0].push(SigHashType::All as u8);
 -                                                      spend_tx.input[0].witness.push(pubkey.serialize().to_vec());
 -                                                      spend_tx
 -                                              },
 -                                              _ => panic!("Unexpected event !"),
 -                                      }
 -                              },
 -                              _ => panic!("Unexpected event !"),
 -                      };
 -              }
 -      }
 -
        #[test]
        fn test_claim_sizeable_push_msat() {
                // Incidentally test SpendableOutput event generation due to detection of to_local output on commitment tx
  
                let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
                nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![node_txn[0].clone()] }, 0);
 -              let spend_txn = check_dynamic_output_p2wsh!(nodes[1]);
 +              let spend_txn = check_spendable_outputs!(nodes[1], 1);
                assert_eq!(spend_txn.len(), 1);
                check_spends!(spend_txn[0], node_txn[0].clone());
        }
  
        #[test]
        fn test_claim_on_remote_sizeable_push_msat() {
 -              // Same test as precedent, just test on remote commitment tx, as per_commitment_point registration changes following you're funder/fundee and
 +              // Same test as previous, just test on remote commitment tx, as per_commitment_point registration changes following you're funder/fundee and
                // to_remote output is encumbered by a P2WPKH
  
                let nodes = create_network(2);
                        MessageSendEvent::BroadcastChannelUpdate { .. } => {},
                        _ => panic!("Unexpected event"),
                }
 -              let spend_txn = check_dynamic_output_p2wpkh!(nodes[1]);
 +              let spend_txn = check_spendable_outputs!(nodes[1], 1);
                assert_eq!(spend_txn.len(), 2);
                assert_eq!(spend_txn[0], spend_txn[1]);
                check_spends!(spend_txn[0], node_txn[0].clone());
        }
  
 +      #[test]
 +      fn test_claim_on_remote_revoked_sizeable_push_msat() {
 +              // Same test as previous, just test on remote revoked commitment tx, as per_commitment_point registration changes following you're funder/fundee and
 +              // to_remote output is encumbered by a P2WPKH
 +
 +              let nodes = create_network(2);
 +
 +              let chan = create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 100000, 59000000);
 +              let payment_preimage = route_payment(&nodes[0], &vec!(&nodes[1])[..], 3000000).0;
 +              let revoked_local_txn = nodes[0].node.channel_state.lock().unwrap().by_id.get(&chan.2).unwrap().last_local_commitment_txn.clone();
 +              assert_eq!(revoked_local_txn[0].input.len(), 1);
 +              assert_eq!(revoked_local_txn[0].input[0].previous_output.txid, chan.3.txid());
 +
 +              claim_payment(&nodes[0], &vec!(&nodes[1])[..], payment_preimage);
 +              let  header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![revoked_local_txn[0].clone()] }, 1);
 +              let events = nodes[1].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              let node_txn = nodes[1].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              let spend_txn = check_spendable_outputs!(nodes[1], 1);
 +              assert_eq!(spend_txn.len(), 4);
 +              assert_eq!(spend_txn[0], spend_txn[2]); // to_remote output on revoked remote commitment_tx
 +              check_spends!(spend_txn[0], revoked_local_txn[0].clone());
 +              assert_eq!(spend_txn[1], spend_txn[3]); // to_local output on local commitment tx
 +              check_spends!(spend_txn[1], node_txn[0].clone());
 +      }
 +
        #[test]
        fn test_static_spendable_outputs_preimage_tx() {
                let nodes = create_network(2);
                assert_eq!(node_txn[0].input[0].witness.last().unwrap().len(), 133);
                check_spends!(node_txn[1], chan_1.3.clone());
  
 -              let events = nodes[1].chan_monitor.simple_monitor.get_and_clear_pending_events();
 -              let spend_tx = check_static_output!(events, nodes, 0, 0, 1, 1);
 -              check_spends!(spend_tx, node_txn[0].clone());
 +              let spend_txn = check_spendable_outputs!(nodes[1], 1); // , 0, 0, 1, 1);
 +              assert_eq!(spend_txn.len(), 2);
 +              assert_eq!(spend_txn[0], spend_txn[1]);
 +              check_spends!(spend_txn[0], node_txn[0].clone());
        }
  
        #[test]
                assert_eq!(node_txn[0].input.len(), 2);
                check_spends!(node_txn[0], revoked_local_txn[0].clone());
  
 -              let events = nodes[1].chan_monitor.simple_monitor.get_and_clear_pending_events();
 -              let spend_tx = check_static_output!(events, nodes, 0, 0, 1, 1);
 -              check_spends!(spend_tx, node_txn[0].clone());
 +              let spend_txn = check_spendable_outputs!(nodes[1], 1);
 +              assert_eq!(spend_txn.len(), 2);
 +              assert_eq!(spend_txn[0], spend_txn[1]);
 +              check_spends!(spend_txn[0], node_txn[0].clone());
        }
  
        #[test]
                assert_eq!(node_txn[3].input.len(), 1);
                check_spends!(node_txn[3], revoked_htlc_txn[0].clone());
  
 -              let events = nodes[1].chan_monitor.simple_monitor.get_and_clear_pending_events();
                // Check B's ChannelMonitor was able to generate the right spendable output descriptor
 -              let spend_tx = check_static_output!(events, nodes, 1, 1, 1, 1);
 -              check_spends!(spend_tx, node_txn[3].clone());
 +              let spend_txn = check_spendable_outputs!(nodes[1], 1);
 +              assert_eq!(spend_txn.len(), 3);
 +              assert_eq!(spend_txn[0], spend_txn[1]);
 +              check_spends!(spend_txn[0], node_txn[0].clone());
 +              check_spends!(spend_txn[2], node_txn[3].clone());
        }
  
        #[test]
                assert_eq!(node_txn[3].input.len(), 1);
                check_spends!(node_txn[3], revoked_htlc_txn[0].clone());
  
 -              let events = nodes[0].chan_monitor.simple_monitor.get_and_clear_pending_events();
                // Check A's ChannelMonitor was able to generate the right spendable output descriptor
 -              let spend_tx = check_static_output!(events, nodes, 1, 2, 1, 0);
 -              check_spends!(spend_tx, node_txn[3].clone());
 +              let spend_txn = check_spendable_outputs!(nodes[0], 1);
 +              assert_eq!(spend_txn.len(), 5);
 +              assert_eq!(spend_txn[0], spend_txn[2]);
 +              assert_eq!(spend_txn[1], spend_txn[3]);
 +              check_spends!(spend_txn[0], revoked_local_txn[0].clone()); // spending to_remote output from revoked local tx
 +              check_spends!(spend_txn[1], node_txn[2].clone()); // spending justice tx output from revoked local tx htlc received output
 +              check_spends!(spend_txn[4], node_txn[3].clone()); // spending justice tx output on htlc success tx
        }
  
        #[test]
                check_spends!(node_txn[0], local_txn[0].clone());
  
                // Verify that B is able to spend its own HTLC-Success tx thanks to spendable output event given back by its ChannelMonitor
 -              let spend_txn = check_dynamic_output_p2wsh!(nodes[1]);
 +              let spend_txn = check_spendable_outputs!(nodes[1], 1);
                assert_eq!(spend_txn.len(), 1);
                check_spends!(spend_txn[0], node_txn[0].clone());
        }
                check_spends!(node_txn[0], local_txn[0].clone());
  
                // Verify that A is able to spend its own HTLC-Timeout tx thanks to spendable output event given back by its ChannelMonitor
 -              let spend_txn = check_dynamic_output_p2wsh!(nodes[0]);
 +              let spend_txn = check_spendable_outputs!(nodes[0], 1);
                assert_eq!(spend_txn.len(), 4);
                assert_eq!(spend_txn[0], spend_txn[2]);
                assert_eq!(spend_txn[1], spend_txn[3]);
  
                let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
                nodes[0].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![closing_tx.clone()] }, 1);
 -              let events = nodes[0].chan_monitor.simple_monitor.get_and_clear_pending_events();
 -              let spend_tx = check_static_output!(events, nodes, 0, 0, 2, 0);
 -              check_spends!(spend_tx, closing_tx.clone());
 +              let spend_txn = check_spendable_outputs!(nodes[0], 2);
 +              assert_eq!(spend_txn.len(), 1);
 +              check_spends!(spend_txn[0], closing_tx.clone());
  
                nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![closing_tx.clone()] }, 1);
 -              let events = nodes[1].chan_monitor.simple_monitor.get_and_clear_pending_events();
 -              let spend_tx = check_static_output!(events, nodes, 0, 0, 2, 1);
 -              check_spends!(spend_tx, closing_tx);
 +              let spend_txn = check_spendable_outputs!(nodes[1], 2);
 +              assert_eq!(spend_txn.len(), 1);
 +              check_spends!(spend_txn[0], closing_tx);
        }
  }