Skip to content

Conversation

@wpaulino
Copy link
Contributor

Alternative version to #4257

@wpaulino wpaulino added this to the 0.3 milestone Jan 22, 2026
@wpaulino wpaulino self-assigned this Jan 22, 2026
@ldk-reviews-bot
Copy link

ldk-reviews-bot commented Jan 22, 2026

👋 Thanks for assigning @jkczyz as a reviewer!
I'll wait for their review and will help manage the review process.
Once they submit their review, I'll check if a second reviewer would be helpful.

@codecov
Copy link

codecov bot commented Jan 22, 2026

Codecov Report

❌ Patch coverage is 69.93166% with 132 lines in your changes missing coverage. Please review.
✅ Project coverage is 86.76%. Comparing base (8cdc86a) to head (0fc923c).

Files with missing lines Patch % Lines
lightning/src/ln/channel.rs 73.27% 53 Missing and 5 partials ⚠️
lightning/src/ln/channelmanager.rs 76.56% 35 Missing and 10 partials ⚠️
lightning/src/ln/splicing_tests.rs 0.00% 28 Missing ⚠️
lightning/src/ln/interactivetxs.rs 50.00% 1 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main    #4336      +/-   ##
==========================================
+ Coverage   86.53%   86.76%   +0.22%     
==========================================
  Files         158      158              
  Lines      103190   102927     -263     
  Branches   103190   102927     -263     
==========================================
+ Hits        89300    89309       +9     
+ Misses      11469    11258     -211     
+ Partials     2421     2360      -61     
Flag Coverage Δ
fuzzing 36.15% <6.15%> (-0.92%) ⬇️
tests 86.06% <74.69%> (+0.23%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Previously, we'd emit a FundingTransactionReadyForSigning event once the
initial commitment_signed is exchanged for a splicing/dual-funding
attempt and require users to call back with their signed inputs using
ChannelManager::funding_transaction_signed. While this approach worked
in practice, it prevents us from abandoning a splice if we cannot or no
longer wish to sign as the splice has already been committed to by this
point.

This commit reworks the API such that this is now possible. After
exchanging tx_complete, we will no longer immediately send our initial
commitment_signed. We will now emit the
FundingTransactionReadyForSigning event and wait for the user to call
back before releasing both our initial commitment_signed and our
tx_signatures. As a result, the event is now persisted, as there is only
one possible path in which it is generated. Note that we continue to
only emit the event if a local contribution to negotiated transaction
was made.

Future work will expose a cancellation API such that we can abandon
splice attempts safely (we can just force close the channel with
dual-funding).
This is crucial to enable the splice cancellation use case. When we
process the initial commitment signed from our counterparty, we queue a
monitor update that cannot be undone. To give the user a chance to abort
the splice negotiation before it's committed to, we buffer the message
until a successful call to `Channel::funding_transaction_signed` and
process it then.

Note that this is currently only done for splice and RBF attempts, as
if we want to abort a dual funding negotiation, we can just force close
the channel as it hasn't been funded yet.
Now that we require users to first call
`ChannelManager::funding_transaction_signed` before releasing any
signatures, it's possible that it is called before we receive the
initial commitment signed from our counterparty, which would transition
the channel to funded. Because of this, we need to support the API call
while the channel is still in the unfunded phase.

Note that this commit is mostly a code move of
`FundedChannel::funding_transaction_signed` to
`Channel::funding_transaction_signed` that doesn't alter the signing
logic.
@wpaulino wpaulino force-pushed the funding-transaction-signed-rework branch from c0193fe to 0fc923c Compare January 22, 2026 19:59
Comment on lines 2101 to 2113
if let FundingNegotiation::ConstructingTransaction {
funding,
mut funding,
interactive_tx_constructor,
} = funding_negotiation
{
let is_initiator = interactive_tx_constructor.is_initiator();
Some((is_initiator, funding, interactive_tx_constructor))
funding.channel_transaction_parameters.funding_outpoint =
Some(funding_outpoint);
pending_splice.funding_negotiation =
Some(FundingNegotiation::AwaitingSignatures {
is_initiator,
funding,
});
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I guess it's preexisting, but consider avoiding these side-effects using if let instead of and_then:

let funding_negotiation = pending_splice.funding_negotiation.take();
if let Some(FundingNegotiation::ConstructingTransaction { .. }) = funding_negotiation {

Comment on lines 11265 to 11274
// We should never be sending a `commitment_signed` in response to their
// `tx_signatures`.
debug_assert!(commitment_signed.is_none());

if let Some(tx_signatures) = tx_signatures {
peer_state.pending_msg_events.push(MessageSendEvent::SendTxSignatures {
node_id: *counterparty_node_id,
msg: tx_signatures,
});
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm a little confused by this. Why would we send our tx_signatures if we aren't sending our commitment_signed? Didn't we want to send both at once?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We've already sent it by this point, we're sending our tx_signatures here in response to theirs

Comment on lines +18998 to +18999
// We may need to regenerate [`Event::FundingTransactionReadyForSigning`] for channels that
// still need their holder `tx_signatures`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does it make sense to start persisting this?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Matt pointed out we shouldn't #4257 (comment)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants