]> git.bitcoin.ninja Git - rust-lightning/commitdiff
Merge pull request #231 from philipr-za/philip-204-check-commitment-transaction-fee
authorMatt Corallo <649246+TheBlueMatt@users.noreply.github.com>
Tue, 20 Nov 2018 21:29:21 +0000 (16:29 -0500)
committerGitHub <noreply@github.com>
Tue, 20 Nov 2018 21:29:21 +0000 (16:29 -0500)
Check funder can afford commitment transaction fee when receiving update_fee

1  2 
src/ln/channel.rs
src/ln/channelmanager.rs

diff --combined src/ln/channel.rs
index 6e8038da281ee5551c317ea55f47a1978446059d,57070e41d5fe27aa2085a4155952a9618a218a34..d0a4644abdfa7164a25275ca2738f4a3e535b093
@@@ -2,9 -2,11 +2,9 @@@ use bitcoin::blockdata::block::BlockHea
  use bitcoin::blockdata::script::{Script,Builder};
  use bitcoin::blockdata::transaction::{TxIn, TxOut, Transaction, SigHashType};
  use bitcoin::blockdata::opcodes;
 -use bitcoin::util::hash::{Sha256dHash, Hash160};
 +use bitcoin::util::hash::{BitcoinHash, Sha256dHash, Hash160};
  use bitcoin::util::bip143;
 -use bitcoin::network;
 -use bitcoin::network::serialize::{BitcoinHash, RawDecoder, RawEncoder};
 -use bitcoin::network::encodable::{ConsensusEncodable, ConsensusDecodable};
 +use bitcoin::consensus::encode::{self, Encodable, Decodable};
  
  use secp256k1::key::{PublicKey,SecretKey};
  use secp256k1::{Secp256k1,Message,Signature};
@@@ -355,8 -357,9 +355,9 @@@ const UNCONF_THRESHOLD: u32 = 6
  const BREAKDOWN_TIMEOUT: u16 = 6 * 24 * 7; //TODO?
  /// The amount of time we're willing to wait to claim money back to us
  const MAX_LOCAL_BREAKDOWN_TIMEOUT: u16 = 6 * 24 * 14;
- const COMMITMENT_TX_BASE_WEIGHT: u64 = 724;
- const COMMITMENT_TX_WEIGHT_PER_HTLC: u64 = 172;
+ /// Exposing these two constants for use in test in ChannelMonitor
+ pub const COMMITMENT_TX_BASE_WEIGHT: u64 = 724;
+ pub const COMMITMENT_TX_WEIGHT_PER_HTLC: u64 = 172;
  const SPENDING_INPUT_FOR_A_OUTPUT_WEIGHT: u64 = 79; // prevout: 36, nSequence: 4, script len: 1, witness lengths: (3+1)/4, sig: 73/4, if-selector: 1, redeemScript: (6 ops + 2*33 pubkeys + 1*2 delay)/4
  const B_OUTPUT_PLUS_SPENDING_INPUT_WEIGHT: u64 = 104; // prevout: 40, nSequence: 4, script len: 1, witness lengths: 3/4, sig: 73/4, pubkey: 33/4, output: 31 (TODO: Wrong? Useless?)
  /// Maximmum `funding_satoshis` value, according to the BOLT #2 specification
@@@ -436,7 -439,7 +437,7 @@@ impl Channel 
  
                let secp_ctx = Secp256k1::new();
                let channel_monitor = ChannelMonitor::new(&chan_keys.revocation_base_key, &chan_keys.delayed_payment_base_key,
 -                                                        &chan_keys.htlc_base_key, BREAKDOWN_TIMEOUT,
 +                                                        &chan_keys.htlc_base_key, &chan_keys.payment_base_key, &keys_provider.get_shutdown_pubkey(), BREAKDOWN_TIMEOUT,
                                                          keys_provider.get_destination_script(), logger.clone());
  
                Ok(Channel {
  
                let secp_ctx = Secp256k1::new();
                let mut channel_monitor = ChannelMonitor::new(&chan_keys.revocation_base_key, &chan_keys.delayed_payment_base_key,
 -                                                            &chan_keys.htlc_base_key, BREAKDOWN_TIMEOUT,
 +                                                            &chan_keys.htlc_base_key, &chan_keys.payment_base_key, &keys_provider.get_shutdown_pubkey(), BREAKDOWN_TIMEOUT,
                                                              keys_provider.get_destination_script(), logger.clone());
                channel_monitor.set_their_base_keys(&msg.htlc_basepoint, &msg.delayed_payment_basepoint);
 +              channel_monitor.provide_their_next_revocation_point(Some((INITIAL_COMMITMENT_NUMBER, msg.first_per_commitment_point)));
                channel_monitor.set_their_to_self_delay(msg.to_self_delay);
  
                let mut chan = Channel {
                Ok(our_sig)
        }
  
 -      /// May return an IgnoreError, but should not, and will always return Ok(_) when
 -      /// debug_assertions are turned on
 +      /// Per HTLC, only one get_update_fail_htlc or get_update_fulfill_htlc call may be made.
 +      /// In such cases we debug_assert!(false) and return an IgnoreError. Thus, will always return
 +      /// Ok(_) if debug assertions are turned on and preconditions are met.
        fn get_update_fulfill_htlc(&mut self, htlc_id_arg: u64, payment_preimage_arg: [u8; 32]) -> Result<(Option<msgs::UpdateFulfillHTLC>, Option<ChannelMonitor>), HandleError> {
                // Either ChannelFunded got set (which means it wont bet unset) or there is no way any
                // caller thought we could have something claimed (cause we wouldn't have accepted in an
                                        &HTLCUpdateAwaitingACK::FailHTLC { htlc_id, .. } => {
                                                if htlc_id_arg == htlc_id {
                                                        debug_assert!(false, "Tried to fulfill an HTLC we already had a holding-cell failure on");
 -                                                      return Err(HandleError{err: "Unable to find a pending HTLC which matched the given HTLC ID", action: Some(msgs::ErrorAction::IgnoreError)});
 +                                                      // Return the new channel monitor in a last-ditch effort to hit the
 +                                                      // chain and claim the funds
 +                                                      return Ok((None, Some(self.channel_monitor.clone())));
                                                }
                                        },
                                        _ => {}
                }
        }
  
 -      /// May return an IgnoreError, but should not, and will always return Ok(_) when
 -      /// debug_assertions are turned on
 +      /// Per HTLC, only one get_update_fail_htlc or get_update_fulfill_htlc call may be made.
 +      /// In such cases we debug_assert!(false) and return an IgnoreError. Thus, will always return
 +      /// Ok(_) if debug assertions are turned on and preconditions are met.
        pub fn get_update_fail_htlc(&mut self, htlc_id_arg: u64, err_packet: msgs::OnionErrorPacket) -> Result<Option<msgs::UpdateFailHTLC>, HandleError> {
                if (self.channel_state & (ChannelState::ChannelFunded as u32)) != (ChannelState::ChannelFunded as u32) {
                        panic!("Was asked to fail an HTLC when channel was not in an operational state");
                }
  
                self.channel_monitor.set_their_base_keys(&msg.htlc_basepoint, &msg.delayed_payment_basepoint);
 +              self.channel_monitor.provide_their_next_revocation_point(Some((INITIAL_COMMITMENT_NUMBER, msg.first_per_commitment_point)));
  
                self.their_dust_limit_satoshis = msg.dust_limit_satoshis;
                self.their_max_htlc_value_in_flight_msat = cmp::min(msg.max_htlc_value_in_flight_msat, self.channel_value_satoshis * 1000);
                Ok(())
        }
  
 -      fn funding_created_signature(&mut self, sig: &Signature) -> Result<(Transaction, Signature), HandleError> {
 +      fn funding_created_signature(&mut self, sig: &Signature) -> Result<(Transaction, Transaction, Signature, TxCreationKeys), HandleError> {
                let funding_script = self.get_funding_redeemscript();
  
                let local_keys = self.build_local_transaction_keys(self.cur_local_commitment_transaction_number)?;
 -              let local_initial_commitment_tx = self.build_commitment_transaction(self.cur_local_commitment_transaction_number, &local_keys, true, false, self.feerate_per_kw).0;
 +              let mut local_initial_commitment_tx = self.build_commitment_transaction(self.cur_local_commitment_transaction_number, &local_keys, true, false, self.feerate_per_kw).0;
                let local_sighash = Message::from_slice(&bip143::SighashComponents::new(&local_initial_commitment_tx).sighash_all(&local_initial_commitment_tx.input[0], &funding_script, self.channel_value_satoshis)[..]).unwrap();
  
 -              // They sign the "local" commitment transaction, allowing us to broadcast the tx if we wish.
 +              // They sign the "local" commitment transaction...
                secp_call!(self.secp_ctx.verify(&local_sighash, &sig, &self.their_funding_pubkey.unwrap()), "Invalid funding_created signature from peer", self.channel_id());
  
 +              // ...and we sign it, allowing us to broadcast the tx if we wish
 +              self.sign_commitment_transaction(&mut local_initial_commitment_tx, sig);
 +
                let remote_keys = self.build_remote_transaction_keys()?;
                let remote_initial_commitment_tx = self.build_commitment_transaction(self.cur_remote_commitment_transaction_number, &remote_keys, false, false, self.feerate_per_kw).0;
                let remote_sighash = Message::from_slice(&bip143::SighashComponents::new(&remote_initial_commitment_tx).sighash_all(&remote_initial_commitment_tx.input[0], &funding_script, self.channel_value_satoshis)[..]).unwrap();
  
                // We sign the "remote" commitment transaction, allowing them to broadcast the tx if they wish.
 -              Ok((remote_initial_commitment_tx, self.secp_ctx.sign(&remote_sighash, &self.local_keys.funding_key)))
 +              Ok((remote_initial_commitment_tx, local_initial_commitment_tx, self.secp_ctx.sign(&remote_sighash, &self.local_keys.funding_key), local_keys))
        }
  
        pub fn funding_created(&mut self, msg: &msgs::FundingCreated) -> Result<(msgs::FundingSigned, ChannelMonitor), HandleError> {
                let funding_txo_script = self.get_funding_redeemscript().to_v0_p2wsh();
                self.channel_monitor.set_funding_info((funding_txo, funding_txo_script));
  
 -              let (remote_initial_commitment_tx, our_signature) = match self.funding_created_signature(&msg.signature) {
 +              let (remote_initial_commitment_tx, local_initial_commitment_tx, our_signature, local_keys) = match self.funding_created_signature(&msg.signature) {
                        Ok(res) => res,
                        Err(e) => {
                                self.channel_monitor.unset_funding_info();
                // Now that we're past error-generating stuff, update our local state:
  
                self.channel_monitor.provide_latest_remote_commitment_tx_info(&remote_initial_commitment_tx, Vec::new(), self.cur_remote_commitment_transaction_number);
 +              self.last_local_commitment_txn = vec![local_initial_commitment_tx.clone()];
 +              self.channel_monitor.provide_latest_local_commitment_tx_info(local_initial_commitment_tx, local_keys, self.feerate_per_kw, Vec::new());
                self.channel_state = ChannelState::FundingSent as u32;
                self.channel_id = funding_txo.to_channel_id();
                self.cur_remote_commitment_transaction_number -= 1;
                        return Err(ChannelError::Close("Peer sent a funding_locked at a strange time"));
                }
  
 +              self.channel_monitor.provide_their_next_revocation_point(Some((INITIAL_COMMITMENT_NUMBER - 1 , msg.next_per_commitment_point)));
                self.their_prev_commitment_point = self.their_cur_commitment_point;
                self.their_cur_commitment_point = Some(msg.next_per_commitment_point);
                Ok(())
  
                let local_keys = self.build_local_transaction_keys(self.cur_local_commitment_transaction_number)?;
  
+               let mut update_fee = false;
                let feerate_per_kw = if !self.channel_outbound && self.pending_update_fee.is_some() {
+                       update_fee = true;
                        self.pending_update_fee.unwrap()
                } else {
                        self.feerate_per_kw
                let local_sighash = Message::from_slice(&bip143::SighashComponents::new(&local_commitment_tx.0).sighash_all(&local_commitment_tx.0.input[0], &funding_script, self.channel_value_satoshis)[..]).unwrap();
                secp_call!(self.secp_ctx.verify(&local_sighash, &msg.signature, &self.their_funding_pubkey.unwrap()), "Invalid commitment tx signature from peer", self.channel_id());
  
+               //If channel fee was updated by funder confirm funder can afford the new fee rate when applied to the current local commitment transaction
+               if update_fee {
+                       let num_htlcs = local_commitment_tx.1.len();
+                       let total_fee: u64 = feerate_per_kw as u64 * (COMMITMENT_TX_BASE_WEIGHT + (num_htlcs as u64) * COMMITMENT_TX_WEIGHT_PER_HTLC) / 1000;
+                       if self.channel_value_satoshis - self.value_to_self_msat / 1000 < total_fee + self.their_channel_reserve_satoshis {
+                               return Err(HandleError { err: "Funding remote cannot afford proposed new fee", action: Some(ErrorAction::DisconnectPeer { msg: None }) });
+                       }
+               }
                if msg.htlc_signatures.len() != local_commitment_tx.1.len() {
                        return Err(HandleError{err: "Got wrong number of HTLC signatures from remote", action: None});
                }
                        let mut htlc_tx = self.build_htlc_transaction(&local_commitment_txid, htlc, true, &local_keys, feerate_per_kw);
                        let htlc_redeemscript = chan_utils::get_htlc_redeemscript(&htlc, &local_keys);
                        let htlc_sighash = Message::from_slice(&bip143::SighashComponents::new(&htlc_tx).sighash_all(&htlc_tx.input[0], &htlc_redeemscript, htlc.amount_msat / 1000)[..]).unwrap();
-                       secp_call!(self.secp_ctx.verify(&htlc_sighash, &msg.htlc_signatures[idx], &local_keys.b_htlc_key), "Invalid HTLC tx siganture from peer", self.channel_id());
+                       secp_call!(self.secp_ctx.verify(&htlc_sighash, &msg.htlc_signatures[idx], &local_keys.b_htlc_key), "Invalid HTLC tx signature from peer", self.channel_id());
                        let htlc_sig = if htlc.offered {
                                let htlc_sig = self.sign_htlc_transaction(&mut htlc_tx, &msg.htlc_signatures[idx], &None, htlc, &local_keys)?;
                                new_local_commitment_txn.push(htlc_tx);
                                }
                        }
                }
                if self.channel_state & (ChannelState::MonitorUpdateFailed as u32) == 0 {
                        // This is a response to our post-monitor-failed unfreeze messages, so we can clear the
                        // monitor_pending_order requirement as we won't re-send the monitor_pending messages.
                                return Err(HandleError{err: "Got a revoke commitment secret which didn't correspond to their current pubkey", action: None});
                        }
                }
 -              self.channel_monitor.provide_secret(self.cur_remote_commitment_transaction_number + 1, msg.per_commitment_secret, Some((self.cur_remote_commitment_transaction_number - 1, msg.next_per_commitment_point)))?;
 +              self.channel_monitor.provide_secret(self.cur_remote_commitment_transaction_number + 1, msg.per_commitment_secret)?;
 +              self.channel_monitor.provide_their_next_revocation_point(Some((self.cur_remote_commitment_transaction_number - 1, msg.next_per_commitment_point)));
  
                // Update state now that we've passed all the can-fail calls...
                // (note that we may still fail to generate the new commitment_signed message, but that's
                        return Err(ChannelError::Close("Peer sent update_fee when we needed a channel_reestablish"));
                }
                Channel::check_remote_fee(fee_estimator, msg.feerate_per_kw)?;
                self.pending_update_fee = Some(msg.feerate_per_kw as u64);
                self.channel_update_count += 1;
                Ok(())
                                                self.channel_update_count += 1;
                                                return Err(HandleError{err: "funding tx had wrong script/value", action: Some(ErrorAction::DisconnectPeer{msg: None})});
                                        } else {
 +                                              if self.channel_outbound {
 +                                                      for input in tx.input.iter() {
 +                                                              if input.witness.is_empty() {
 +                                                                      // We generated a malleable funding transaction, implying we've
 +                                                                      // just exposed ourselves to funds loss to our counterparty.
 +                                                                      #[cfg(not(feature = "fuzztarget"))]
 +                                                                      panic!("Client called ChannelManager::funding_transaction_generated with bogus transaction!");
 +                                                              }
 +                                                      }
 +                                              }
                                                self.funding_tx_confirmations = 1;
                                                self.short_channel_id = Some(((height as u64)          << (5*8)) |
                                                                             ((*index_in_block as u64) << (2*8)) |
@@@ -3532,9 -3524,9 +3545,9 @@@ impl Writeable for Channel 
  
                (self.last_local_commitment_txn.len() as u64).write(writer)?;
                for tx in self.last_local_commitment_txn.iter() {
 -                      if let Err(e) = tx.consensus_encode(&mut RawEncoder::new(WriterWriteAdaptor(writer))) {
 +                      if let Err(e) = tx.consensus_encode(&mut WriterWriteAdaptor(writer)) {
                                match e {
 -                                      network::serialize::Error::Io(e) => return Err(e),
 +                                      encode::Error::Io(e) => return Err(e),
                                        _ => panic!("last_local_commitment_txn must have been well-formed!"),
                                }
                        }
@@@ -3711,7 -3703,7 +3724,7 @@@ impl<R : ::std::io::Read> ReadableArgs<
                let last_local_commitment_txn_count: u64 = Readable::read(reader)?;
                let mut last_local_commitment_txn = Vec::with_capacity(cmp::min(last_local_commitment_txn_count as usize, OUR_MAX_HTLCS as usize*2 + 1));
                for _ in 0..last_local_commitment_txn_count {
 -                      last_local_commitment_txn.push(match Transaction::consensus_decode(&mut RawDecoder::new(reader.by_ref())) {
 +                      last_local_commitment_txn.push(match Transaction::consensus_decode(reader.by_ref()) {
                                Ok(tx) => tx,
                                Err(_) => return Err(DecodeError::InvalidValue),
                        });
  mod tests {
        use bitcoin::util::hash::{Sha256dHash, Hash160};
        use bitcoin::util::bip143;
 -      use bitcoin::network::serialize::serialize;
 +      use bitcoin::consensus::encode::serialize;
        use bitcoin::blockdata::script::{Script, Builder};
        use bitcoin::blockdata::transaction::Transaction;
        use bitcoin::blockdata::opcodes;
  
                                chan.sign_commitment_transaction(&mut unsigned_tx.0, &their_signature);
  
 -                              assert_eq!(serialize(&unsigned_tx.0).unwrap()[..],
 +                              assert_eq!(serialize(&unsigned_tx.0)[..],
                                                hex::decode($tx_hex).unwrap()[..]);
                        };
                }
                                }
  
                                chan.sign_htlc_transaction(&mut htlc_tx, &remote_signature, &preimage, &htlc, &keys).unwrap();
 -                              assert_eq!(serialize(&htlc_tx).unwrap()[..],
 +                              assert_eq!(serialize(&htlc_tx)[..],
                                                hex::decode($tx_hex).unwrap()[..]);
                        };
                }
diff --combined src/ln/channelmanager.rs
index c5bf8b337ecf207bfa7d9c74cd4eb7b18f2f4574,0600c4e703cd82bdd3bb98a83f963f2e95817054..20a3779899a620b185723bdf78d7513017321ee4
@@@ -12,7 -12,8 +12,7 @@@ use bitcoin::blockdata::block::BlockHea
  use bitcoin::blockdata::transaction::Transaction;
  use bitcoin::blockdata::constants::genesis_block;
  use bitcoin::network::constants::Network;
 -use bitcoin::network::serialize::BitcoinHash;
 -use bitcoin::util::hash::Sha256dHash;
 +use bitcoin::util::hash::{BitcoinHash, Sha256dHash};
  
  use secp256k1::key::{SecretKey,PublicKey};
  use secp256k1::{Secp256k1,Message};
@@@ -3209,8 -3210,9 +3209,9 @@@ mod tests 
        use chain::chaininterface;
        use chain::transaction::OutPoint;
        use chain::chaininterface::{ChainListener, ChainWatchInterface};
 -      use chain::keysinterface::KeysInterface;
 +      use chain::keysinterface::{KeysInterface, SpendableOutputDescriptor};
        use chain::keysinterface;
+       use ln::channel::{COMMITMENT_TX_BASE_WEIGHT, COMMITMENT_TX_WEIGHT_PER_HTLC};
        use ln::channelmanager::{ChannelManager,ChannelManagerReadArgs,OnionKeys,PaymentFailReason,RAACommitmentOrder};
        use ln::channelmonitor::{ChannelMonitor, ChannelMonitorUpdateErr, CLTV_CLAIM_BUFFER, HTLC_FAIL_TIMEOUT_BLOCKS, ManyChannelMonitor};
        use ln::router::{Route, RouteHop, Router};
        use util::ser::{Writeable, Writer, ReadableArgs};
        use util::config::UserConfig;
  
 -      use bitcoin::util::hash::Sha256dHash;
 +      use bitcoin::util::hash::{BitcoinHash, Sha256dHash};
 +      use bitcoin::util::bip143;
 +      use bitcoin::util::address::Address;
 +      use bitcoin::util::bip32::{ChildNumber, ExtendedPubKey, ExtendedPrivKey};
        use bitcoin::blockdata::block::{Block, BlockHeader};
 -      use bitcoin::blockdata::transaction::{Transaction, TxOut};
 +      use bitcoin::blockdata::transaction::{Transaction, TxOut, TxIn, SigHashType};
 +      use bitcoin::blockdata::script::{Builder, Script};
 +      use bitcoin::blockdata::opcodes;
        use bitcoin::blockdata::constants::genesis_block;
        use bitcoin::network::constants::Network;
 -      use bitcoin::network::serialize::serialize;
 -      use bitcoin::network::serialize::BitcoinHash;
  
        use hex;
  
                }
        }
  
+       macro_rules! get_feerate {
+               ($node: expr, $channel_id: expr) => {
+                       {
+                               let chan_lock = $node.node.channel_state.lock().unwrap();
+                               let chan = chan_lock.by_id.get(&$channel_id).unwrap();
+                               chan.get_feerate()
+                       }
+               }
+       }
        fn create_chan_between_nodes_with_value_init(node_a: &Node, node_b: &Node, channel_value: u64, push_msat: u64) -> Transaction {
                node_a.node.create_channel(node_b.node.get_our_node_id(), channel_value, push_msat, 42).unwrap();
                node_b.node.handle_open_channel(&node_a.node.get_our_node_id(), &get_event_msg!(node_a, MessageSendEvent::SendOpenChannel, node_b.node.get_our_node_id())).unwrap();
                                tx = Transaction { version: chan_id as u32, lock_time: 0, input: Vec::new(), output: vec![TxOut {
                                        value: *channel_value_satoshis, script_pubkey: output_script.clone(),
                                }]};
 -                              funding_output = OutPoint::new(Sha256dHash::from_data(&serialize(&tx).unwrap()[..]), 0);
 +                              funding_output = OutPoint::new(tx.txid(), 0);
  
                                node_a.node.funding_transaction_generated(&temporary_channel_id, funding_output);
                                let mut added_monitors = node_a.chan_monitor.added_monitors.lock().unwrap();
                }
        }
  
 -      fn close_channel(outbound_node: &Node, inbound_node: &Node, channel_id: &[u8; 32], funding_tx: Transaction, close_inbound_first: bool) -> (msgs::ChannelUpdate, msgs::ChannelUpdate) {
 +      fn close_channel(outbound_node: &Node, inbound_node: &Node, channel_id: &[u8; 32], funding_tx: Transaction, close_inbound_first: bool) -> (msgs::ChannelUpdate, msgs::ChannelUpdate, Transaction) {
                let (node_a, broadcaster_a, struct_a) = if close_inbound_first { (&inbound_node.node, &inbound_node.tx_broadcaster, inbound_node) } else { (&outbound_node.node, &outbound_node.tx_broadcaster, outbound_node) };
                let (node_b, broadcaster_b) = if close_inbound_first { (&outbound_node.node, &outbound_node.tx_broadcaster) } else { (&inbound_node.node, &inbound_node.tx_broadcaster) };
                let (tx_a, tx_b);
                assert_eq!(tx_a, tx_b);
                check_spends!(tx_a, funding_tx);
  
 -              (as_update, bs_update)
 +              (as_update, bs_update, tx_a)
        }
  
        struct SendEvent {
                let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
                let channel_id = chan.2;
  
-               macro_rules! get_feerate {
-                       ($node: expr) => {{
-                               let chan_lock = $node.node.channel_state.lock().unwrap();
-                               let chan = chan_lock.by_id.get(&channel_id).unwrap();
-                               chan.get_feerate()
-                       }}
-               }
                // balancing
                send_payment(&nodes[0], &vec!(&nodes[1])[..], 8000000);
  
                // (6) RAA is delivered                  ->
  
                // First nodes[0] generates an update_fee
-               nodes[0].node.update_fee(channel_id, get_feerate!(nodes[0]) + 20).unwrap();
+               nodes[0].node.update_fee(channel_id, get_feerate!(nodes[0], channel_id) + 20).unwrap();
                check_added_monitors!(nodes[0], 1);
  
                let events_0 = nodes[0].node.get_and_clear_pending_msg_events();
                let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
                let channel_id = chan.2;
  
-               macro_rules! get_feerate {
-                       ($node: expr) => {{
-                               let chan_lock = $node.node.channel_state.lock().unwrap();
-                               let chan = chan_lock.by_id.get(&channel_id).unwrap();
-                               chan.get_feerate()
-                       }}
-               }
                // balancing
                send_payment(&nodes[0], &vec!(&nodes[1])[..], 8000000);
  
                // First nodes[0] generates an update_fee
-               nodes[0].node.update_fee(channel_id, get_feerate!(nodes[0]) + 20).unwrap();
+               nodes[0].node.update_fee(channel_id, get_feerate!(nodes[0], channel_id) + 20).unwrap();
                check_added_monitors!(nodes[0], 1);
  
                let events_0 = nodes[0].node.get_and_clear_pending_msg_events();
                let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
                let channel_id = chan.2;
  
-               macro_rules! get_feerate {
-                       ($node: expr) => {{
-                               let chan_lock = $node.node.channel_state.lock().unwrap();
-                               let chan = chan_lock.by_id.get(&channel_id).unwrap();
-                               chan.get_feerate()
-                       }}
-               }
                // A                                        B
                // update_fee/commitment_signed          ->
                //                                       .- send (1) RAA and (2) commitment_signed
                // revoke_and_ack                        ->
  
                // First nodes[0] generates an update_fee
-               let initial_feerate = get_feerate!(nodes[0]);
+               let initial_feerate = get_feerate!(nodes[0], channel_id);
                nodes[0].node.update_fee(channel_id, initial_feerate + 20).unwrap();
                check_added_monitors!(nodes[0], 1);
  
                let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
                let channel_id = chan.2;
  
-               macro_rules! get_feerate {
-                       ($node: expr) => {{
-                               let chan_lock = $node.node.channel_state.lock().unwrap();
-                               let chan = chan_lock.by_id.get(&channel_id).unwrap();
-                               chan.get_feerate()
-                       }}
-               }
-               let feerate = get_feerate!(nodes[0]);
-               nodes[0].node.update_fee(channel_id, feerate+20).unwrap();
+               let feerate = get_feerate!(nodes[0], channel_id);
+               nodes[0].node.update_fee(channel_id, feerate+25).unwrap();
                check_added_monitors!(nodes[0], 1);
  
                let events_0 = nodes[0].node.get_and_clear_pending_msg_events();
                check_added_monitors!(nodes[1], 1);
        }
  
+       #[test]
+       fn test_update_fee_that_funder_cannot_afford() {
+               let mut nodes = create_network(2);
+               let channel_value = 1888;
+               let chan = create_announced_chan_between_nodes_with_value(&nodes, 0, 1, channel_value, 700000);
+               let channel_id = chan.2;
+               let feerate = 260;
+               nodes[0].node.update_fee(channel_id, feerate).unwrap();
+               check_added_monitors!(nodes[0], 1);
+               let update_msg = get_htlc_update_msgs!(nodes[0], nodes[1].node.get_our_node_id());
+               nodes[1].node.handle_update_fee(&nodes[0].node.get_our_node_id(), &update_msg.update_fee.unwrap()).unwrap();
+               commitment_signed_dance!(nodes[1], nodes[0], update_msg.commitment_signed, false);
+               //Confirm that the new fee based on the last local commitment txn is what we expected based on the feerate of 260 set above.
+               //This value results in a fee that is exactly what the funder can afford (277 sat + 1000 sat channel reserve)
+               {
+                       let chan_lock = nodes[1].node.channel_state.lock().unwrap();
+                       let chan = chan_lock.by_id.get(&channel_id).unwrap();
+                       //We made sure neither party's funds are below the dust limit so -2 non-HTLC txns from number of outputs
+                       let num_htlcs = chan.last_local_commitment_txn[0].output.len() - 2;
+                       let total_fee: u64 = feerate * (COMMITMENT_TX_BASE_WEIGHT + (num_htlcs as u64) * COMMITMENT_TX_WEIGHT_PER_HTLC) / 1000;
+                       let mut actual_fee = chan.last_local_commitment_txn[0].output.iter().fold(0, |acc, output| acc + output.value);
+                       actual_fee = channel_value - actual_fee;
+                       assert_eq!(total_fee, actual_fee);
+               } //drop the mutex
+               //Add 2 to the previous fee rate to the final fee increases by 1 (with no HTLCs the fee is essentially
+               //fee_rate*(724/1000) so the increment of 1*0.724 is rounded back down)
+               nodes[0].node.update_fee(channel_id, feerate+2).unwrap();
+               check_added_monitors!(nodes[0], 1);
+               let update2_msg = get_htlc_update_msgs!(nodes[0], nodes[1].node.get_our_node_id());
+               nodes[1].node.handle_update_fee(&nodes[0].node.get_our_node_id(), &update2_msg.update_fee.unwrap());
+               //While producing the commitment_signed response after handling a received update_fee request the
+               //check to see if the funder, who sent the update_fee request, can afford the new fee (funder_balance >= fee+channel_reserve)
+               //Should produce and error.
+               let err = nodes[1].node.handle_commitment_signed(&nodes[0].node.get_our_node_id(), &update2_msg.commitment_signed).unwrap_err();
+               assert!(match err.err {
+                       "Funding remote cannot afford proposed new fee" => true,
+                       _ => false,
+               });
+               //clear the message we could not handle
+               nodes[1].node.get_and_clear_pending_msg_events();
+       }
        #[test]
        fn test_update_fee_with_fundee_update_add_htlc() {
                let mut nodes = create_network(2);
                let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
                let channel_id = chan.2;
  
-               macro_rules! get_feerate {
-                       ($node: expr) => {{
-                               let chan_lock = $node.node.channel_state.lock().unwrap();
-                               let chan = chan_lock.by_id.get(&channel_id).unwrap();
-                               chan.get_feerate()
-                       }}
-               }
                // balancing
                send_payment(&nodes[0], &vec!(&nodes[1])[..], 8000000);
  
-               let feerate = get_feerate!(nodes[0]);
+               let feerate = get_feerate!(nodes[0], channel_id);
                nodes[0].node.update_fee(channel_id, feerate+20).unwrap();
                check_added_monitors!(nodes[0], 1);
  
                let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
                let channel_id = chan.2;
  
-               macro_rules! get_feerate {
-                       ($node: expr) => {{
-                               let chan_lock = $node.node.channel_state.lock().unwrap();
-                               let chan = chan_lock.by_id.get(&channel_id).unwrap();
-                               chan.get_feerate()
-                       }}
-               }
                // A                                        B
                // (1) update_fee/commitment_signed      ->
                //                                       <- (2) revoke_and_ack
                // revoke_and_ack                        ->
  
                // Create and deliver (1)...
-               let feerate = get_feerate!(nodes[0]);
+               let feerate = get_feerate!(nodes[0], channel_id);
                nodes[0].node.update_fee(channel_id, feerate+20).unwrap();
                check_added_monitors!(nodes[0], 1);
  
                check_added_monitors!(nodes[1], 1);
                assert!(nodes[1].node.get_and_clear_pending_msg_events().is_empty());
  
-               assert_eq!(get_feerate!(nodes[0]), feerate + 30);
-               assert_eq!(get_feerate!(nodes[1]), feerate + 30);
+               assert_eq!(get_feerate!(nodes[0], channel_id), feerate + 30);
+               assert_eq!(get_feerate!(nodes[1], channel_id), feerate + 30);
                close_channel(&nodes[0], &nodes[1], &chan.2, chan.3, true);
        }
  
  
        /// pending_htlc_adds includes both the holding cell and in-flight update_add_htlcs, whereas
        /// for claims/fails they are separated out.
 -      fn reconnect_nodes(node_a: &Node, node_b: &Node, pre_all_htlcs: bool, pending_htlc_adds: (i64, i64), pending_htlc_claims: (usize, usize), pending_cell_htlc_claims: (usize, usize), pending_cell_htlc_fails: (usize, usize), pending_raa: (bool, bool)) {
 +      fn reconnect_nodes(node_a: &Node, node_b: &Node, send_funding_locked: (bool, bool), pending_htlc_adds: (i64, i64), pending_htlc_claims: (usize, usize), pending_cell_htlc_claims: (usize, usize), pending_cell_htlc_fails: (usize, usize), pending_raa: (bool, bool)) {
                node_a.node.peer_connected(&node_b.node.get_our_node_id());
                let reestablish_1 = get_chan_reestablish_msgs!(node_a, node_b);
                node_b.node.peer_connected(&node_a.node.get_our_node_id());
                        (pending_htlc_adds.1 == 0 && pending_htlc_claims.1 == 0 && pending_cell_htlc_claims.1 == 0 && pending_cell_htlc_fails.1 == 0));
  
                for chan_msgs in resp_1.drain(..) {
 -                      if pre_all_htlcs {
 +                      if send_funding_locked.0 {
                                node_a.node.handle_funding_locked(&node_b.node.get_our_node_id(), &chan_msgs.0.unwrap()).unwrap();
                                let announcement_event = node_a.node.get_and_clear_pending_msg_events();
                                if !announcement_event.is_empty() {
                }
  
                for chan_msgs in resp_2.drain(..) {
 -                      if pre_all_htlcs {
 +                      if send_funding_locked.1 {
                                node_b.node.handle_funding_locked(&node_a.node.get_our_node_id(), &chan_msgs.0.unwrap()).unwrap();
                                let announcement_event = node_b.node.get_and_clear_pending_msg_events();
                                if !announcement_event.is_empty() {
  
                nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
                nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
 -              reconnect_nodes(&nodes[0], &nodes[1], true, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[1], (true, true), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
  
                let payment_preimage_1 = route_payment(&nodes[0], &vec!(&nodes[1], &nodes[2])[..], 1000000).0;
                let payment_hash_2 = route_payment(&nodes[0], &vec!(&nodes[1], &nodes[2])[..], 1000000).1;
  
                nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
                nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
 -              reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
  
                let payment_preimage_3 = route_payment(&nodes[0], &vec!(&nodes[1], &nodes[2])[..], 1000000).0;
                let payment_preimage_4 = route_payment(&nodes[0], &vec!(&nodes[1], &nodes[2])[..], 1000000).0;
                claim_payment_along_route(&nodes[0], &vec!(&nodes[1], &nodes[2]), true, payment_preimage_3);
                fail_payment_along_route(&nodes[0], &[&nodes[1], &nodes[2]], true, payment_hash_5);
  
 -              reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (1, 0), (1, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (1, 0), (1, 0), (false, false));
                {
                        let events = nodes[0].node.get_and_clear_pending_events();
                        assert_eq!(events.len(), 2);
                if messages_delivered < 3 {
                        // Even if the funding_locked messages get exchanged, as long as nothing further was
                        // received on either side, both sides will need to resend them.
 -                      reconnect_nodes(&nodes[0], &nodes[1], true, (0, 1), (0, 0), (0, 0), (0, 0), (false, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (true, true), (0, 1), (0, 0), (0, 0), (0, 0), (false, false));
                } else if messages_delivered == 3 {
                        // nodes[0] still wants its RAA + commitment_signed
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (-1, 0), (0, 0), (0, 0), (0, 0), (true, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (-1, 0), (0, 0), (0, 0), (0, 0), (true, false));
                } else if messages_delivered == 4 {
                        // nodes[0] still wants its commitment_signed
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (-1, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (-1, 0), (0, 0), (0, 0), (0, 0), (false, false));
                } else if messages_delivered == 5 {
                        // nodes[1] still wants its final RAA
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, true));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, true));
                } else if messages_delivered == 6 {
                        // Everything was delivered...
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
                }
  
                let events_1 = nodes[1].node.get_and_clear_pending_events();
  
                nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
                nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
 -              reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
  
                nodes[1].node.channel_state.lock().unwrap().next_forward = Instant::now();
                nodes[1].node.process_pending_htlc_forwards();
                nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
                nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
                if messages_delivered < 2 {
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (1, 0), (0, 0), (0, 0), (false, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (1, 0), (0, 0), (0, 0), (false, false));
                        //TODO: Deduplicate PaymentSent events, then enable this if:
                        //if messages_delivered < 1 {
                                let events_4 = nodes[0].node.get_and_clear_pending_events();
                        //}
                } else if messages_delivered == 2 {
                        // nodes[0] still wants its RAA + commitment_signed
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (0, -1), (0, 0), (0, 0), (0, 0), (false, true));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, -1), (0, 0), (0, 0), (0, 0), (false, true));
                } else if messages_delivered == 3 {
                        // nodes[0] still wants its commitment_signed
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (0, -1), (0, 0), (0, 0), (0, 0), (false, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, -1), (0, 0), (0, 0), (0, 0), (false, false));
                } else if messages_delivered == 4 {
                        // nodes[1] still wants its final RAA
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (true, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (true, false));
                } else if messages_delivered == 5 {
                        // Everything was delivered...
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
                }
  
                nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
                nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
 -              reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
  
                // Channel should still work fine...
                let payment_preimage_2 = send_along_route(&nodes[0], route, &[&nodes[1]], 1000000).0;
                        _ => panic!("Unexpected event"),
                }
  
 +              reconnect_nodes(&nodes[0], &nodes[1], (false, true), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +
 +              nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
 +              nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
 +
                confirm_transaction(&nodes[1].chain_monitor, &tx, tx.version);
                let events_2 = nodes[1].node.get_and_clear_pending_msg_events();
 -              assert_eq!(events_2.len(), 1);
 +              assert_eq!(events_2.len(), 2);
                match events_2[0] {
                        MessageSendEvent::SendFundingLocked { ref node_id, msg: _ } => {
                                assert_eq!(*node_id, nodes[0].node.get_our_node_id());
                        },
                        _ => panic!("Unexpected event"),
                }
 +              match events_2[1] {
 +                      MessageSendEvent::SendAnnouncementSignatures { ref node_id, msg: _ } => {
 +                              assert_eq!(*node_id, nodes[0].node.get_our_node_id());
 +                      },
 +                      _ => panic!("Unexpected event"),
 +              }
  
 -              reconnect_nodes(&nodes[0], &nodes[1], true, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 -              nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
 -              nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
 -              reconnect_nodes(&nodes[0], &nodes[1], true, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[1], (true, true), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
  
                // TODO: We shouldn't need to manually pass list_usable_chanels here once we support
                // rebroadcasting announcement_signatures upon reconnect.
                if disconnect {
                        nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
                        nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
 -                      reconnect_nodes(&nodes[0], &nodes[1], true, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (true, true), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
                }
  
                *nodes[0].chan_monitor.update_ret.lock().unwrap() = Ok(());
                if disconnect {
                        nodes[0].node.peer_disconnected(&nodes[1].node.get_our_node_id(), false);
                        nodes[1].node.peer_disconnected(&nodes[0].node.get_our_node_id(), false);
 -                      reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +                      reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
                }
  
                // ...and make sure we can force-close a TemporaryFailure channel with a PermanentFailure
                nodes[0].node = Arc::new(nodes_0_deserialized);
                check_added_monitors!(nodes[0], 1);
  
 -              reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
  
                fail_payment(&nodes[0], &[&nodes[1]], our_payment_hash);
                claim_payment(&nodes[0], &[&nodes[1]], our_payment_preimage);
                nodes[0].node = Arc::new(nodes_0_deserialized);
  
                // nodes[1] and nodes[2] have no lost state with nodes[0]...
 -              reconnect_nodes(&nodes[0], &nodes[1], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 -              reconnect_nodes(&nodes[0], &nodes[2], false, (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[1], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
 +              reconnect_nodes(&nodes[0], &nodes[2], (false, false), (0, 0), (0, 0), (0, 0), (0, 0), (false, false));
                //... and we can even still claim the payment!
                claim_payment(&nodes[2], &[&nodes[0], &nodes[1]], our_payment_preimage);
  
                        assert_eq!(msg.channel_id, channel_id);
                } else { panic!("Unexpected result"); }
        }
 +
 +      macro_rules! check_dynamic_output_p2wsh {
 +              ($node: expr) => {
 +                      {
 +                              let events = $node.chan_monitor.simple_monitor.get_and_clear_pending_events();
 +                              let mut txn = Vec::new();
 +                              for event in events {
 +                                      match event {
 +                                              Event::SpendableOutputs { ref outputs } => {
 +                                                      for outp in outputs {
 +                                                              match *outp {
 +                                                                      SpendableOutputDescriptor::DynamicOutputP2WSH { ref outpoint, ref key, ref witness_script, ref to_self_delay, ref output } => {
 +                                                                              let input = TxIn {
 +                                                                                      previous_output: outpoint.clone(),
 +                                                                                      script_sig: Script::new(),
 +                                                                                      sequence: *to_self_delay as u32,
 +                                                                                      witness: Vec::new(),
 +                                                                              };
 +                                                                              let outp = TxOut {
 +                                                                                      script_pubkey: Builder::new().push_opcode(opcodes::All::OP_RETURN).into_script(),
 +                                                                                      value: output.value,
 +                                                                              };
 +                                                                              let mut spend_tx = Transaction {
 +                                                                                      version: 2,
 +                                                                                      lock_time: 0,
 +                                                                                      input: vec![input],
 +                                                                                      output: vec![outp],
 +                                                                              };
 +                                                                              let secp_ctx = Secp256k1::new();
 +                                                                              let sighash = Message::from_slice(&bip143::SighashComponents::new(&spend_tx).sighash_all(&spend_tx.input[0], witness_script, output.value)[..]).unwrap();
 +                                                                              let local_delaysig = secp_ctx.sign(&sighash, key);
 +                                                                              spend_tx.input[0].witness.push(local_delaysig.serialize_der(&secp_ctx).to_vec());
 +                                                                              spend_tx.input[0].witness[0].push(SigHashType::All as u8);
 +                                                                              spend_tx.input[0].witness.push(vec!(0));
 +                                                                              spend_tx.input[0].witness.push(witness_script.clone().into_bytes());
 +                                                                              txn.push(spend_tx);
 +                                                                      },
 +                                                                      _ => panic!("Unexpected event"),
 +                                                              }
 +                                                      }
 +                                              },
 +                                              _ => panic!("Unexpected event"),
 +                                      };
 +                              }
 +                              txn
 +                      }
 +              }
 +      }
 +
 +      macro_rules! check_dynamic_output_p2wpkh {
 +              ($node: expr) => {
 +                      {
 +                              let events = $node.chan_monitor.simple_monitor.get_and_clear_pending_events();
 +                              let mut txn = Vec::new();
 +                              for event in events {
 +                                      match event {
 +                                              Event::SpendableOutputs { ref outputs } => {
 +                                                      for outp in outputs {
 +                                                              match *outp {
 +                                                                      SpendableOutputDescriptor::DynamicOutputP2WPKH { ref outpoint, ref key, ref output } => {
 +                                                                              let input = TxIn {
 +                                                                                      previous_output: outpoint.clone(),
 +                                                                                      script_sig: Script::new(),
 +                                                                                      sequence: 0,
 +                                                                                      witness: Vec::new(),
 +                                                                              };
 +                                                                              let outp = TxOut {
 +                                                                                      script_pubkey: Builder::new().push_opcode(opcodes::All::OP_RETURN).into_script(),
 +                                                                                      value: output.value,
 +                                                                              };
 +                                                                              let mut spend_tx = Transaction {
 +                                                                                      version: 2,
 +                                                                                      lock_time: 0,
 +                                                                                      input: vec![input],
 +                                                                                      output: vec![outp],
 +                                                                              };
 +                                                                              let secp_ctx = Secp256k1::new();
 +                                                                              let remotepubkey = PublicKey::from_secret_key(&secp_ctx, &key);
 +                                                                              let witness_script = Address::p2pkh(&remotepubkey, Network::Testnet).script_pubkey();
 +                                                                              let sighash = Message::from_slice(&bip143::SighashComponents::new(&spend_tx).sighash_all(&spend_tx.input[0], &witness_script, output.value)[..]).unwrap();
 +                                                                              let remotesig = secp_ctx.sign(&sighash, key);
 +                                                                              spend_tx.input[0].witness.push(remotesig.serialize_der(&secp_ctx).to_vec());
 +                                                                              spend_tx.input[0].witness[0].push(SigHashType::All as u8);
 +                                                                              spend_tx.input[0].witness.push(remotepubkey.serialize().to_vec());
 +                                                                              txn.push(spend_tx);
 +                                                                      },
 +                                                                      _ => panic!("Unexpected event"),
 +                                                              }
 +                                                      }
 +                                              },
 +                                              _ => panic!("Unexpected event"),
 +                                      };
 +                              }
 +                              txn
 +                      }
 +              }
 +      }
 +
 +      macro_rules! check_static_output {
 +              ($event: expr, $node: expr, $event_idx: expr, $output_idx: expr, $der_idx: expr, $idx_node: expr) => {
 +                      match $event[$event_idx] {
 +                              Event::SpendableOutputs { ref outputs } => {
 +                                      match outputs[$output_idx] {
 +                                              SpendableOutputDescriptor::StaticOutput { ref outpoint, ref output } => {
 +                                                      let secp_ctx = Secp256k1::new();
 +                                                      let input = TxIn {
 +                                                              previous_output: outpoint.clone(),
 +                                                              script_sig: Script::new(),
 +                                                              sequence: 0,
 +                                                              witness: Vec::new(),
 +                                                      };
 +                                                      let outp = TxOut {
 +                                                              script_pubkey: Builder::new().push_opcode(opcodes::All::OP_RETURN).into_script(),
 +                                                              value: output.value,
 +                                                      };
 +                                                      let mut spend_tx = Transaction {
 +                                                              version: 2,
 +                                                              lock_time: 0,
 +                                                              input: vec![input],
 +                                                              output: vec![outp.clone()],
 +                                                      };
 +                                                      let secret = {
 +                                                              match ExtendedPrivKey::new_master(&secp_ctx, Network::Testnet, &$node[$idx_node].node_seed) {
 +                                                                      Ok(master_key) => {
 +                                                                              match master_key.ckd_priv(&secp_ctx, ChildNumber::from_hardened_idx($der_idx)) {
 +                                                                                      Ok(key) => key,
 +                                                                                      Err(_) => panic!("Your RNG is busted"),
 +                                                                              }
 +                                                                      }
 +                                                                      Err(_) => panic!("Your rng is busted"),
 +                                                              }
 +                                                      };
 +                                                      let pubkey = ExtendedPubKey::from_private(&secp_ctx, &secret).public_key;
 +                                                      let witness_script = Address::p2pkh(&pubkey, Network::Testnet).script_pubkey();
 +                                                      let sighash = Message::from_slice(&bip143::SighashComponents::new(&spend_tx).sighash_all(&spend_tx.input[0], &witness_script, output.value)[..]).unwrap();
 +                                                      let sig = secp_ctx.sign(&sighash, &secret.secret_key);
 +                                                      spend_tx.input[0].witness.push(sig.serialize_der(&secp_ctx).to_vec());
 +                                                      spend_tx.input[0].witness[0].push(SigHashType::All as u8);
 +                                                      spend_tx.input[0].witness.push(pubkey.serialize().to_vec());
 +                                                      spend_tx
 +                                              },
 +                                              _ => panic!("Unexpected event !"),
 +                                      }
 +                              },
 +                              _ => panic!("Unexpected event !"),
 +                      };
 +              }
 +      }
 +
 +      #[test]
 +      fn test_claim_sizeable_push_msat() {
 +              // Incidentally test SpendableOutput event generation due to detection of to_local output on commitment tx
 +              let nodes = create_network(2);
 +
 +              let chan = create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 100000, 99000000);
 +              nodes[1].node.force_close_channel(&chan.2);
 +              let events = nodes[1].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              let node_txn = nodes[1].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              assert_eq!(node_txn.len(), 1);
 +              check_spends!(node_txn[0], chan.3.clone());
 +              assert_eq!(node_txn[0].output.len(), 2); // We can't force trimming of to_remote output as channel_reserve_satoshis block us to do so at channel opening
 +
 +              let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![node_txn[0].clone()] }, 0);
 +              let spend_txn = check_dynamic_output_p2wsh!(nodes[1]);
 +              assert_eq!(spend_txn.len(), 1);
 +              check_spends!(spend_txn[0], node_txn[0].clone());
 +      }
 +
 +      #[test]
 +      fn test_claim_on_remote_sizeable_push_msat() {
 +              // Same test as precedent, just test on remote commitment tx, as per_commitment_point registration changes following you're funder/fundee and
 +              // to_remote output is encumbered by a P2WPKH
 +
 +              let nodes = create_network(2);
 +
 +              let chan = create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 100000, 99000000);
 +              nodes[0].node.force_close_channel(&chan.2);
 +              let events = nodes[0].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              let node_txn = nodes[0].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              assert_eq!(node_txn.len(), 1);
 +              check_spends!(node_txn[0], chan.3.clone());
 +              assert_eq!(node_txn[0].output.len(), 2); // We can't force trimming of to_remote output as channel_reserve_satoshis block us to do so at channel opening
 +
 +              let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![node_txn[0].clone()] }, 0);
 +              let events = nodes[1].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              let spend_txn = check_dynamic_output_p2wpkh!(nodes[1]);
 +              assert_eq!(spend_txn.len(), 2);
 +              assert_eq!(spend_txn[0], spend_txn[1]);
 +              check_spends!(spend_txn[0], node_txn[0].clone());
 +      }
 +
 +      #[test]
 +      fn test_static_spendable_outputs_preimage_tx() {
 +              let nodes = create_network(2);
 +
 +              // Create some initial channels
 +              let chan_1 = create_announced_chan_between_nodes(&nodes, 0, 1);
 +
 +              let payment_preimage = route_payment(&nodes[0], &vec!(&nodes[1])[..], 3000000).0;
 +
 +              let commitment_tx = nodes[0].node.channel_state.lock().unwrap().by_id.get(&chan_1.2).unwrap().last_local_commitment_txn.clone();
 +              assert_eq!(commitment_tx[0].input.len(), 1);
 +              assert_eq!(commitment_tx[0].input[0].previous_output.txid, chan_1.3.txid());
 +
 +              // Settle A's commitment tx on B's chain
 +              let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              assert!(nodes[1].node.claim_funds(payment_preimage));
 +              check_added_monitors!(nodes[1], 1);
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![commitment_tx[0].clone()] }, 1);
 +              let events = nodes[1].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::UpdateHTLCs { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              match events[1] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexepected event"),
 +              }
 +
 +              // Check B's monitor was able to send back output descriptor event for preimage tx on A's commitment tx
 +              let node_txn = nodes[1].tx_broadcaster.txn_broadcasted.lock().unwrap(); // ChannelManager : 1 (local commitment tx), ChannelMonitor: 2 (1 preimage tx) * 2 (block-rescan)
 +              check_spends!(node_txn[0], commitment_tx[0].clone());
 +              assert_eq!(node_txn[0], node_txn[2]);
 +              assert_eq!(node_txn[0].input[0].witness.last().unwrap().len(), 133);
 +              check_spends!(node_txn[1], chan_1.3.clone());
 +
 +              let events = nodes[1].chan_monitor.simple_monitor.get_and_clear_pending_events();
 +              let spend_tx = check_static_output!(events, nodes, 0, 0, 1, 1);
 +              check_spends!(spend_tx, node_txn[0].clone());
 +      }
 +
 +      #[test]
 +      fn test_static_spendable_outputs_justice_tx_revoked_commitment_tx() {
 +              let nodes = create_network(2);
 +
 +              // Create some initial channels
 +              let chan_1 = create_announced_chan_between_nodes(&nodes, 0, 1);
 +
 +              let payment_preimage = route_payment(&nodes[0], &vec!(&nodes[1])[..], 3000000).0;
 +              let revoked_local_txn = nodes[0].node.channel_state.lock().unwrap().by_id.iter().next().unwrap().1.last_local_commitment_txn.clone();
 +              assert_eq!(revoked_local_txn[0].input.len(), 1);
 +              assert_eq!(revoked_local_txn[0].input[0].previous_output.txid, chan_1.3.txid());
 +
 +              claim_payment(&nodes[0], &vec!(&nodes[1])[..], payment_preimage);
 +
 +              let  header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![revoked_local_txn[0].clone()] }, 1);
 +              let events = nodes[1].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              let mut node_txn = nodes[1].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              assert_eq!(node_txn.len(), 3);
 +              assert_eq!(node_txn.pop().unwrap(), node_txn[0]);
 +              assert_eq!(node_txn[0].input.len(), 2);
 +              check_spends!(node_txn[0], revoked_local_txn[0].clone());
 +
 +              let events = nodes[1].chan_monitor.simple_monitor.get_and_clear_pending_events();
 +              let spend_tx = check_static_output!(events, nodes, 0, 0, 1, 1);
 +              check_spends!(spend_tx, node_txn[0].clone());
 +      }
 +
 +      #[test]
 +      fn test_static_spendable_outputs_justice_tx_revoked_htlc_timeout_tx() {
 +              let nodes = create_network(2);
 +
 +              // Create some initial channels
 +              let chan_1 = create_announced_chan_between_nodes(&nodes, 0, 1);
 +
 +              let payment_preimage = route_payment(&nodes[0], &vec!(&nodes[1])[..], 3000000).0;
 +              let revoked_local_txn = nodes[0].node.channel_state.lock().unwrap().by_id.get(&chan_1.2).unwrap().last_local_commitment_txn.clone();
 +              assert_eq!(revoked_local_txn[0].input.len(), 1);
 +              assert_eq!(revoked_local_txn[0].input[0].previous_output.txid, chan_1.3.txid());
 +
 +              claim_payment(&nodes[0], &vec!(&nodes[1])[..], payment_preimage);
 +
 +              let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              // A will generate HTLC-Timeout from revoked commitment tx
 +              nodes[0].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![revoked_local_txn[0].clone()] }, 1);
 +              let events = nodes[0].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              let revoked_htlc_txn = nodes[0].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              assert_eq!(revoked_htlc_txn.len(), 2);
 +              assert_eq!(revoked_htlc_txn[0].input.len(), 1);
 +              assert_eq!(revoked_htlc_txn[0].input[0].witness.last().unwrap().len(), 133);
 +              check_spends!(revoked_htlc_txn[0], revoked_local_txn[0].clone());
 +
 +              // B will generate justice tx from A's revoked commitment/HTLC tx
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![revoked_local_txn[0].clone(), revoked_htlc_txn[0].clone()] }, 1);
 +              let events = nodes[1].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +
 +              let node_txn = nodes[1].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              assert_eq!(node_txn.len(), 4);
 +              assert_eq!(node_txn[3].input.len(), 1);
 +              check_spends!(node_txn[3], revoked_htlc_txn[0].clone());
 +
 +              let events = nodes[1].chan_monitor.simple_monitor.get_and_clear_pending_events();
 +              // Check B's ChannelMonitor was able to generate the right spendable output descriptor
 +              let spend_tx = check_static_output!(events, nodes, 1, 1, 1, 1);
 +              check_spends!(spend_tx, node_txn[3].clone());
 +      }
 +
 +      #[test]
 +      fn test_static_spendable_outputs_justice_tx_revoked_htlc_success_tx() {
 +              let nodes = create_network(2);
 +
 +              // Create some initial channels
 +              let chan_1 = create_announced_chan_between_nodes(&nodes, 0, 1);
 +
 +              let payment_preimage = route_payment(&nodes[0], &vec!(&nodes[1])[..], 3000000).0;
 +              let revoked_local_txn = nodes[1].node.channel_state.lock().unwrap().by_id.get(&chan_1.2).unwrap().last_local_commitment_txn.clone();
 +              assert_eq!(revoked_local_txn[0].input.len(), 1);
 +              assert_eq!(revoked_local_txn[0].input[0].previous_output.txid, chan_1.3.txid());
 +
 +              claim_payment(&nodes[0], &vec!(&nodes[1])[..], payment_preimage);
 +
 +              let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              // B will generate HTLC-Success from revoked commitment tx
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![revoked_local_txn[0].clone()] }, 1);
 +              let events = nodes[1].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              let revoked_htlc_txn = nodes[1].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +
 +              assert_eq!(revoked_htlc_txn.len(), 2);
 +              assert_eq!(revoked_htlc_txn[0].input.len(), 1);
 +              assert_eq!(revoked_htlc_txn[0].input[0].witness.last().unwrap().len(), 138);
 +              check_spends!(revoked_htlc_txn[0], revoked_local_txn[0].clone());
 +
 +              // A will generate justice tx from B's revoked commitment/HTLC tx
 +              nodes[0].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![revoked_local_txn[0].clone(), revoked_htlc_txn[0].clone()] }, 1);
 +              let events = nodes[0].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +
 +              let node_txn = nodes[0].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              assert_eq!(node_txn.len(), 4);
 +              assert_eq!(node_txn[3].input.len(), 1);
 +              check_spends!(node_txn[3], revoked_htlc_txn[0].clone());
 +
 +              let events = nodes[0].chan_monitor.simple_monitor.get_and_clear_pending_events();
 +              // Check A's ChannelMonitor was able to generate the right spendable output descriptor
 +              let spend_tx = check_static_output!(events, nodes, 1, 2, 1, 0);
 +              check_spends!(spend_tx, node_txn[3].clone());
 +      }
 +
 +      #[test]
 +      fn test_dynamic_spendable_outputs_local_htlc_success_tx() {
 +              let nodes = create_network(2);
 +
 +              // Create some initial channels
 +              let chan_1 = create_announced_chan_between_nodes(&nodes, 0, 1);
 +
 +              let payment_preimage = route_payment(&nodes[0], &vec!(&nodes[1])[..], 9000000).0;
 +              let local_txn = nodes[1].node.channel_state.lock().unwrap().by_id.get(&chan_1.2).unwrap().last_local_commitment_txn.clone();
 +              assert_eq!(local_txn[0].input.len(), 1);
 +              check_spends!(local_txn[0], chan_1.3.clone());
 +
 +              // Give B knowledge of preimage to be able to generate a local HTLC-Success Tx
 +              nodes[1].node.claim_funds(payment_preimage);
 +              check_added_monitors!(nodes[1], 1);
 +              let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![local_txn[0].clone()] }, 1);
 +              let events = nodes[1].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::UpdateHTLCs { .. } => {},
 +                      _ => panic!("Unexpected event"),
 +              }
 +              match events[1] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexepected event"),
 +              }
 +              let node_txn = nodes[1].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              assert_eq!(node_txn[0].input.len(), 1);
 +              assert_eq!(node_txn[0].input[0].witness.last().unwrap().len(), 138);
 +              check_spends!(node_txn[0], local_txn[0].clone());
 +
 +              // Verify that B is able to spend its own HTLC-Success tx thanks to spendable output event given back by its ChannelMonitor
 +              let spend_txn = check_dynamic_output_p2wsh!(nodes[1]);
 +              assert_eq!(spend_txn.len(), 1);
 +              check_spends!(spend_txn[0], node_txn[0].clone());
 +      }
 +
 +      #[test]
 +      fn test_dynamic_spendable_outputs_local_htlc_timeout_tx() {
 +              let nodes = create_network(2);
 +
 +              // Create some initial channels
 +              let chan_1 = create_announced_chan_between_nodes(&nodes, 0, 1);
 +
 +              route_payment(&nodes[0], &vec!(&nodes[1])[..], 9000000).0;
 +              let local_txn = nodes[0].node.channel_state.lock().unwrap().by_id.get(&chan_1.2).unwrap().last_local_commitment_txn.clone();
 +              assert_eq!(local_txn[0].input.len(), 1);
 +              check_spends!(local_txn[0], chan_1.3.clone());
 +
 +              // Timeout HTLC on A's chain and so it can generate a HTLC-Timeout tx
 +              let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              nodes[0].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![local_txn[0].clone()] }, 200);
 +              let events = nodes[0].node.get_and_clear_pending_msg_events();
 +              match events[0] {
 +                      MessageSendEvent::BroadcastChannelUpdate { .. } => {},
 +                      _ => panic!("Unexepected event"),
 +              }
 +              let node_txn = nodes[0].tx_broadcaster.txn_broadcasted.lock().unwrap();
 +              assert_eq!(node_txn[0].input.len(), 1);
 +              assert_eq!(node_txn[0].input[0].witness.last().unwrap().len(), 133);
 +              check_spends!(node_txn[0], local_txn[0].clone());
 +
 +              // Verify that A is able to spend its own HTLC-Timeout tx thanks to spendable output event given back by its ChannelMonitor
 +              let spend_txn = check_dynamic_output_p2wsh!(nodes[0]);
 +              assert_eq!(spend_txn.len(), 4);
 +              assert_eq!(spend_txn[0], spend_txn[2]);
 +              assert_eq!(spend_txn[1], spend_txn[3]);
 +              check_spends!(spend_txn[0], local_txn[0].clone());
 +              check_spends!(spend_txn[1], node_txn[0].clone());
 +      }
 +
 +      #[test]
 +      fn test_static_output_closing_tx() {
 +              let nodes = create_network(2);
 +
 +              let chan = create_announced_chan_between_nodes(&nodes, 0, 1);
 +
 +              send_payment(&nodes[0], &vec!(&nodes[1])[..], 8000000);
 +              let closing_tx = close_channel(&nodes[0], &nodes[1], &chan.2, chan.3, true).2;
 +
 +              let header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
 +              nodes[0].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![closing_tx.clone()] }, 1);
 +              let events = nodes[0].chan_monitor.simple_monitor.get_and_clear_pending_events();
 +              let spend_tx = check_static_output!(events, nodes, 0, 0, 2, 0);
 +              check_spends!(spend_tx, closing_tx.clone());
 +
 +              nodes[1].chain_monitor.block_connected_with_filtering(&Block { header, txdata: vec![closing_tx.clone()] }, 1);
 +              let events = nodes[1].chan_monitor.simple_monitor.get_and_clear_pending_events();
 +              let spend_tx = check_static_output!(events, nodes, 0, 0, 2, 1);
 +              check_spends!(spend_tx, closing_tx);
 +      }
  }