URI: 
       tln: htlc state machine (not used yet) - electrum - Electrum Bitcoin wallet
  HTML git clone https://git.parazyd.org/electrum
   DIR Log
   DIR Files
   DIR Refs
   DIR Submodules
       ---
   DIR commit 497706afbf55f9759d589566769e24f653bbfd87
   DIR parent 85e18be7d0426d30bf968964431e2a62e9d22274
  HTML Author: Janus <ysangkok@gmail.com>
       Date:   Tue, 29 May 2018 11:51:48 +0200
       
       ln: htlc state machine (not used yet)
       
       Diffstat:
         M lib/lnbase.py                       |       8 +++++---
         A lib/lnhtlc.py                       |     340 +++++++++++++++++++++++++++++++
         A lib/tests/test_lnhtlc.py            |     237 +++++++++++++++++++++++++++++++
       
       3 files changed, 582 insertions(+), 3 deletions(-)
       ---
   DIR diff --git a/lib/lnbase.py b/lib/lnbase.py
       t@@ -40,6 +40,10 @@ from .lightning_payencode.lnaddr import lndecode
        
        from collections import namedtuple, defaultdict
        
       +def channel_id_from_funding_tx(funding_txid, funding_index):
       +    funding_txid_bytes = bytes.fromhex(funding_txid)[::-1]
       +    return int.from_bytes(funding_txid_bytes, 'big') ^ funding_index, funding_txid_bytes
       +
        class LightningError(Exception):
            pass
        
       t@@ -566,7 +570,6 @@ def is_synced(network):
            synced = server_height != 0 and network.is_up_to_date() and local_height >= server_height
            return synced
        
       -
        class Peer(PrintError):
        
            def __init__(self, host, port, pubkey, privkey, network, channel_db, path_finder, channel_state, channels, invoices, request_initial_sync=False):
       t@@ -878,8 +881,7 @@ class Peer(PrintError):
                    funding_txid, funding_index, funding_sat,
                    remote_amount, local_amount, remote_config.dust_limit_sat, local_feerate, False, htlcs=[])
                sig_64 = sign_and_get_sig_string(remote_ctx, local_config, remote_config)
       -        funding_txid_bytes = bytes.fromhex(funding_txid)[::-1]
       -        channel_id = int.from_bytes(funding_txid_bytes, 'big') ^ funding_index
       +        channel_id, funding_txid_bytes = channel_id_from_funding_tx(funding_txid, funding_index)
                self.send_message(gen_msg("funding_created",
                    temporary_channel_id=temp_channel_id,
                    funding_txid=funding_txid_bytes,
   DIR diff --git a/lib/lnhtlc.py b/lib/lnhtlc.py
       t@@ -0,0 +1,340 @@
       +# ported from lnd 42de4400bff5105352d0552155f73589166d162b
       +from .lnbase import *
       +
       +SettleHtlc = namedtuple("SettleHtlc", ["htlc_id"])
       +RevokeAndAck = namedtuple("RevokeAndAck", ["height", "per_commitment_secret", "next_per_commitment_point"])
       +
       +class UpdateAddHtlc:
       +    def __init__(self, amount_msat, payment_hash, cltv_expiry, final_cltv_expiry_with_deltas):
       +        self.amount_msat = amount_msat
       +        self.payment_hash = payment_hash
       +        self.cltv_expiry = cltv_expiry
       +
       +        # the height the htlc was locked in at, or None
       +        self.locked_in = None
       +
       +        # this field is not in update_add_htlc but we need to to make the right htlcs
       +        self.final_cltv_expiry_with_deltas = final_cltv_expiry_with_deltas
       +
       +        self.htlc_id = None
       +
       +    def as_tuple(self):
       +        return (self.htlc_id, self.amount_msat, self.payment_hash, self.cltv_expiry, self.locked_in, self.final_cltv_expiry_with_deltas)
       +
       +    def __hash__(self):
       +        return hash(self.as_tuple())
       +
       +    def __eq__(self, o):
       +        return type(o) is UpdateAddHtlc and self.as_tuple() == o.as_tuple()
       +
       +    def __repr__(self):
       +        return "UpdateAddHtlc" + str(self.as_tuple())
       +
       +
       +class HTLCStateMachine(PrintError):
       +    def lookup_htlc(self, log, htlc_id):
       +        assert type(htlc_id) is int
       +        for htlc in log:
       +            if type(htlc) is not UpdateAddHtlc: continue
       +            if htlc.htlc_id == htlc_id:
       +                return htlc
       +        assert False, self.diagnostic_name() + ": htlc_id {} not found in {}".format(htlc_id, log)
       +
       +    def diagnostic_name(self):
       +        return str(self.name)
       +
       +    def __init__(self, state: OpenChannel, name = None):
       +        self.state = state
       +        self.local_update_log = []
       +        self.remote_update_log = []
       +
       +        self.name = name
       +
       +        self.current_height = 0
       +        self.total_msat_sent = 0
       +        self.total_msat_received = 0
       +
       +    def add_htlc(self, htlc):
       +        """
       +        AddHTLC adds an HTLC to the state machine's local update log. This method
       +        should be called when preparing to send an outgoing HTLC.
       +        """
       +        assert type(htlc) is UpdateAddHtlc
       +        self.local_update_log.append(htlc)
       +        self.print_error("add_htlc")
       +        htlc_id = len(self.local_update_log)-1
       +        htlc.htlc_id = htlc_id
       +        return htlc_id
       +
       +    def receive_htlc(self, htlc):
       +        """
       +        ReceiveHTLC adds an HTLC to the state machine's remote update log. This
       +        method should be called in response to receiving a new HTLC from the remote
       +        party.
       +        """
       +        assert type(htlc) is UpdateAddHtlc
       +        self.remote_update_log.append(htlc)
       +        self.print_error("receive_htlc")
       +        htlc_id = len(self.remote_update_log)-1
       +        htlc.htlc_id = htlc_id
       +        return htlc_id
       +
       +    def sign_next_commitment(self):
       +        """
       +        SignNextCommitment signs a new commitment which includes any previous
       +        unsettled HTLCs, any new HTLCs, and any modifications to prior HTLCs
       +        committed in previous commitment updates. Signing a new commitment
       +        decrements the available revocation window by 1. After a successful method
       +        call, the remote party's commitment chain is extended by a new commitment
       +        which includes all updates to the HTLC log prior to this method invocation.
       +        The first return parameter is the signature for the commitment transaction
       +        itself, while the second parameter is a slice of all HTLC signatures (if
       +        any). The HTLC signatures are sorted according to the BIP 69 order of the
       +        HTLC's on the commitment transaction.
       +        """
       +        for htlc in self.remote_update_log:
       +            if not type(htlc) is UpdateAddHtlc: continue
       +            if htlc.locked_in is None: htlc.locked_in = self.current_height
       +        self.print_error("sign_next_commitment")
       +
       +        sig_64 = sign_and_get_sig_string(self.remote_commitment, self.state.local_config, self.state.remote_config)
       +
       +        their_remote_htlc_privkey_number = derive_privkey(
       +            int.from_bytes(self.state.local_config.htlc_basepoint.privkey, 'big'),
       +            self.state.remote_state.next_per_commitment_point)
       +        their_remote_htlc_privkey = their_remote_htlc_privkey_number.to_bytes(32, 'big')
       +
       +        for_us = False
       +
       +        htlcs = self.htlcs_in_remote # TODO also htlcs_in_local
       +        assert len(htlcs) <= 1
       +        htlcsigs = []
       +        for htlc in htlcs:
       +            original_htlc_output_index = 0
       +            we_receive = True # when we do htlcs_in_local, we need to flip this flag
       +            htlc_tx = make_htlc_tx_with_open_channel(self.state, self.state.remote_state.next_per_commitment_point, for_us, we_receive, htlc.amount_msat, htlc.final_cltv_expiry_with_deltas, htlc.payment_hash, self.remote_commitment, original_htlc_output_index)
       +            sig = bfh(htlc_tx.sign_txin(0, their_remote_htlc_privkey))
       +            r, s = sigdecode_der(sig[:-1], SECP256k1.generator.order())
       +            htlc_sig = sigencode_string_canonize(r, s, SECP256k1.generator.order())
       +            htlcsigs.append(htlc_sig)
       +
       +        return sig_64, htlcsigs
       +
       +    def receive_new_commitment(self, sig, htlc_sigs):
       +        """
       +        ReceiveNewCommitment process a signature for a new commitment state sent by
       +        the remote party. This method should be called in response to the
       +        remote party initiating a new change, or when the remote party sends a
       +        signature fully accepting a new state we've initiated. If we are able to
       +        successfully validate the signature, then the generated commitment is added
       +        to our local commitment chain. Once we send a revocation for our prior
       +        state, then this newly added commitment becomes our current accepted channel
       +        state.
       +        """
       +        self.print_error("receive_new_commitment")
       +        # TODO
       +
       +    def revoke_current_commitment(self):
       +        """
       +        RevokeCurrentCommitment revokes the next lowest unrevoked commitment
       +        transaction in the local commitment chain. As a result the edge of our
       +        revocation window is extended by one, and the tail of our local commitment
       +        chain is advanced by a single commitment. This now lowest unrevoked
       +        commitment becomes our currently accepted state within the channel. This
       +        method also returns the set of HTLC's currently active within the commitment
       +        transaction. This return value allows callers to act once an HTLC has been
       +        locked into our commitment transaction.
       +        """
       +        self.current_height += 1
       +        self.print_error("revoke_current_commitment")
       +
       +        chan = self.state
       +        last_small_num = chan.local_state.ctn
       +        next_small_num = last_small_num + 2
       +        this_small_num = last_small_num + 1
       +        last_secret = get_per_commitment_secret_from_seed(chan.local_state.per_commitment_secret_seed, 2**48-last_small_num-1)
       +        this_secret = get_per_commitment_secret_from_seed(chan.local_state.per_commitment_secret_seed, 2**48-this_small_num-1)
       +        this_point = secret_to_pubkey(int.from_bytes(this_secret, 'big'))
       +        next_secret = get_per_commitment_secret_from_seed(chan.local_state.per_commitment_secret_seed, 2**48-next_small_num-1)
       +        next_point = secret_to_pubkey(int.from_bytes(next_secret, 'big'))
       +        self.state = chan._replace(
       +            local_state=chan.local_state._replace(
       +                ctn=chan.local_state.ctn + 1
       +            )
       +        )
       +
       +        return RevokeAndAck(self.current_height, last_secret, next_point), "current htlcs"
       +
       +    def receive_revocation(self, revocation):
       +        """
       +        ReceiveRevocation processes a revocation sent by the remote party for the
       +        lowest unrevoked commitment within their commitment chain. We receive a
       +        revocation either during the initial session negotiation wherein revocation
       +        windows are extended, or in response to a state update that we initiate. If
       +        successful, then the remote commitment chain is advanced by a single
       +        commitment, and a log compaction is attempted.
       +
       +        Returns the forwarding package corresponding to the remote commitment height
       +        that was revoked.
       +        """
       +        self.print_error("receive_revocation")
       +
       +        settle_fails2 = []
       +        for x in self.remote_update_log:
       +            if type(x) is not SettleHtlc:
       +                continue
       +            settle_fails2.append(x)
       +
       +        if revocation.height is not None:
       +            adds2 = list(x for x in self.htlcs_in_remote if x.locked_in == revocation.height)
       +
       +            class FwdPkg:
       +                adds = adds2
       +                settle_fails = settle_fails2
       +
       +        for x in settle_fails2:
       +            self.total_msat_sent += self.lookup_htlc(self.local_update_log, x.htlc_id).amount_msat
       +
       +        # increase received_msat counter for htlc's that have been settled
       +        adds2 = self.gen_htlc_indices(self.remote_update_log)
       +        for x in adds2:
       +            if SettleHtlc(x) in self.local_update_log:
       +                self.total_msat_received += self.lookup_htlc(self.remote_update_log, x).amount_msat
       +
       +        # log compaction (remove entries relating to htlc's that have been settled)
       +
       +        to_remove = []
       +        for x in filter(lambda x: type(x) is SettleHtlc, self.remote_update_log):
       +            to_remove += [y for y in self.local_update_log if y.htlc_id == x.htlc_id]
       +
       +        # assert that we should have compacted the log earlier
       +        assert len(to_remove) <= 1, to_remove
       +        if len(to_remove) == 1:
       +            self.remote_update_log = [x for x in self.remote_update_log if x.htlc_id != to_remove[0].htlc_id]
       +            self.local_update_log = [x for x in self.local_update_log if x.htlc_id != to_remove[0].htlc_id]
       +
       +        to_remove = []
       +        for x in filter(lambda x: type(x) is SettleHtlc, self.local_update_log):
       +            to_remove += [y for y in self.remote_update_log if y.htlc_id == x.htlc_id]
       +
       +        assert len(to_remove) <= 1, to_remove
       +        if len(to_remove) == 1:
       +            self.local_update_log = [x for x in self.local_update_log if x.htlc_id != to_remove[0].htlc_id]
       +            self.remote_update_log = [x for x in self.remote_update_log if x.htlc_id != to_remove[0].htlc_id]
       +
       +        self.state.remote_state.revocation_store.add_next_entry(revocation.per_commitment_secret)
       +
       +        next_point = self.state.remote_state.next_per_commitment_point
       +
       +        self.state = self.state._replace(
       +            remote_state=self.state.remote_state._replace(
       +                ctn=self.state.remote_state.ctn + 1,
       +                last_per_commitment_point=next_point,
       +                next_per_commitment_point=revocation.next_per_commitment_point,
       +            )
       +        )
       +
       +        if revocation.height is not None:
       +            return FwdPkg
       +        else:
       +            return None
       +
       +    @staticmethod
       +    def htlcsum(htlcs):
       +        return sum(x.amount_msat for x in htlcs)
       +
       +    @property
       +    def remote_commitment(self):
       +        local_msat = self.state.local_state.amount_msat -\
       +          self.htlcsum(self.htlcs_in_local)
       +        remote_msat = self.state.remote_state.amount_msat -\
       +          self.htlcsum(self.htlcs_in_remote)
       +        assert local_msat > 0
       +        assert remote_msat > 0
       +
       +        this_point = self.state.remote_state.next_per_commitment_point
       +
       +        remote_htlc_pubkey = derive_pubkey(self.state.remote_config.htlc_basepoint.pubkey, this_point)
       +        local_htlc_pubkey = derive_pubkey(self.state.local_config.htlc_basepoint.pubkey, this_point)
       +        local_revocation_pubkey = derive_blinded_pubkey(self.state.local_config.revocation_basepoint.pubkey, this_point)
       +        remote_revocation_pubkey = derive_blinded_pubkey(self.state.remote_config.revocation_basepoint.pubkey, this_point)
       +
       +        htlcs_in_local = []
       +        for htlc in self.htlcs_in_local:
       +            htlcs_in_local.append(
       +                ( make_received_htlc(local_revocation_pubkey, local_htlc_pubkey, remote_htlc_pubkey, htlc.payment_hash, htlc.cltv_expiry), htlc.amount_msat))
       +
       +        htlcs_in_remote = []
       +        for htlc in self.htlcs_in_remote:
       +            htlcs_in_remote.append(
       +                ( make_offered_htlc(remote_revocation_pubkey, remote_htlc_pubkey, local_htlc_pubkey, htlc.payment_hash), htlc.amount_msat))
       +
       +        commit = make_commitment_using_open_channel(self.state, self.state.remote_state.ctn + 1,
       +            True, this_point,
       +            remote_msat, local_msat, htlcs_in_local + htlcs_in_remote)
       +        assert len(commit.outputs()) == 2 + len(htlcs_in_local) + len(htlcs_in_remote)
       +        return commit
       +
       +    @property
       +    def local_commitment(self):
       +        local_msat = self.state.local_state.amount_msat -\
       +          self.htlcsum(self.htlcs_in_local)
       +        remote_msat = self.state.remote_state.amount_msat -\
       +          self.htlcsum(self.htlcs_in_remote)
       +        assert local_msat > 0
       +        assert remote_msat > 0
       +
       +        this_small_num = self.state.local_state.ctn + 1
       +        this_secret = get_per_commitment_secret_from_seed(self.state.local_state.per_commitment_secret_seed, 2**48-this_small_num-1)
       +        this_point = secret_to_pubkey(int.from_bytes(this_secret, 'big'))
       +
       +        remote_htlc_pubkey = derive_pubkey(self.state.remote_config.htlc_basepoint.pubkey, this_point)
       +        local_htlc_pubkey = derive_pubkey(self.state.local_config.htlc_basepoint.pubkey, this_point)
       +        local_revocation_pubkey = derive_blinded_pubkey(self.state.local_config.revocation_basepoint.pubkey, this_point)
       +        remote_revocation_pubkey = derive_blinded_pubkey(self.state.remote_config.revocation_basepoint.pubkey, this_point)
       +
       +        htlcs_in_local = []
       +        for htlc in self.htlcs_in_local:
       +            htlcs_in_local.append(
       +                ( make_offered_htlc(local_revocation_pubkey, local_htlc_pubkey, remote_htlc_pubkey, htlc.payment_hash), htlc.amount_msat))
       +
       +        htlcs_in_remote = []
       +        for htlc in self.htlcs_in_remote:
       +            htlcs_in_remote.append(
       +                ( make_received_htlc(remote_revocation_pubkey, remote_htlc_pubkey, local_htlc_pubkey, htlc.payment_hash, htlc.cltv_expiry), htlc.amount_msat))
       +
       +        commit = make_commitment_using_open_channel(self.state, self.state.local_state.ctn + 1,
       +            True, this_point,
       +            local_msat, remote_msat, htlcs_in_local + htlcs_in_remote)
       +        assert len(commit.outputs()) == 2 + len(htlcs_in_local) + len(htlcs_in_remote)
       +        return commit
       +
       +    def gen_htlc_indices(self, update_log):
       +        for num, htlc in enumerate(update_log):
       +            if type(htlc) is not UpdateAddHtlc:
       +                continue
       +            if htlc.locked_in is None or htlc.locked_in < self.current_height:
       +                continue
       +            yield num
       +
       +    @property
       +    def htlcs_in_local(self):
       +        return [self.local_update_log[x] for x in self.gen_htlc_indices(self.local_update_log)]
       +
       +    @property
       +    def htlcs_in_remote(self):
       +        return [self.remote_update_log[x] for x in self.gen_htlc_indices(self.remote_update_log)]
       +
       +    def settle_htlc(self, preimage, htlc_id, source_ref, dest_ref, close_key):
       +        """
       +        SettleHTLC attempts to settle an existing outstanding received HTLC.
       +        """
       +        htlc = self.lookup_htlc(self.remote_update_log, htlc_id)
       +        assert htlc.payment_hash == sha256(preimage)
       +        self.local_update_log.append(SettleHtlc(htlc_id))
       +
       +    def receive_htlc_settle(self, preimage, htlc_index):
       +        htlc = self.lookup_htlc(self.local_update_log, htlc_index)
       +        assert htlc.payment_hash == sha256(preimage)
       +        assert len([x.htlc_id == htlc_index for x in self.local_update_log]) == 1
       +        self.remote_update_log.append(SettleHtlc(htlc_index))
   DIR diff --git a/lib/tests/test_lnhtlc.py b/lib/tests/test_lnhtlc.py
       t@@ -0,0 +1,237 @@
       +# ported from lnd 42de4400bff5105352d0552155f73589166d162b
       +
       +import unittest
       +import lib.bitcoin as bitcoin
       +import lib.lnbase as lnbase
       +import lib.lnhtlc as lnhtlc
       +import lib.util as util
       +import os
       +import binascii
       +
       +def create_channel_state(funding_txid, funding_index, funding_sat, local_feerate, is_initiator, local_amount, remote_amount, privkeys, other_pubkeys, seed, cur, nex, other_node_id):
       +    assert local_amount > 0
       +    assert remote_amount > 0
       +    channel_id, _ = lnbase.channel_id_from_funding_tx(funding_txid, funding_index)
       +    their_revocation_store = lnbase.RevocationStore()
       +    local_config=lnbase.ChannelConfig(
       +        payment_basepoint=privkeys[0],
       +        multisig_key=privkeys[1],
       +        htlc_basepoint=privkeys[2],
       +        delayed_basepoint=privkeys[3],
       +        revocation_basepoint=privkeys[4],
       +        to_self_delay=143,
       +        dust_limit_sat=10,
       +        max_htlc_value_in_flight_msat=500000 * 1000,
       +        max_accepted_htlcs=5
       +    )
       +    remote_config=lnbase.ChannelConfig(
       +        payment_basepoint=other_pubkeys[0],
       +        multisig_key=other_pubkeys[1],
       +        htlc_basepoint=other_pubkeys[2],
       +        delayed_basepoint=other_pubkeys[3],
       +        revocation_basepoint=other_pubkeys[4],
       +        to_self_delay=143,
       +        dust_limit_sat=10,
       +        max_htlc_value_in_flight_msat=500000 * 1000,
       +        max_accepted_htlcs=5
       +    )
       +
       +    return lnbase.OpenChannel(
       +            channel_id=channel_id,
       +            short_channel_id=channel_id.to_bytes(32, "big")[:8],
       +            funding_outpoint=lnbase.Outpoint(funding_txid, funding_index),
       +            local_config=local_config,
       +            remote_config=remote_config,
       +            remote_state=lnbase.RemoteState(
       +                ctn = 0,
       +                next_per_commitment_point=nex,
       +                last_per_commitment_point=cur,
       +                amount_msat=remote_amount,
       +                revocation_store=their_revocation_store,
       +                next_htlc_id = 0
       +            ),
       +            local_state=lnbase.LocalState(
       +                ctn = 0,
       +                per_commitment_secret_seed=seed,
       +                amount_msat=local_amount,
       +                next_htlc_id = 0,
       +                funding_locked_received=True
       +            ),
       +            constraints=lnbase.ChannelConstraints(capacity=funding_sat, feerate=local_feerate, is_initiator=is_initiator, funding_txn_minimum_depth=3),
       +            node_id=other_node_id
       +    )
       +
       +def bip32(sequence):
       +    xprv, xpub = bitcoin.bip32_root(b"9dk", 'standard')
       +    xprv, xpub = bitcoin.bip32_private_derivation(xprv, "m/", sequence)
       +    xtype, depth, fingerprint, child_number, c, k = bitcoin.deserialize_xprv(xprv)
       +    assert len(k) == 32
       +    assert type(k) is bytes
       +    return k
       +
       +def create_test_channels():
       +    funding_txid = binascii.hexlify(os.urandom(32)).decode("ascii")
       +    funding_index = 0
       +    funding_sat = bitcoin.COIN * 5
       +    local_amount = (funding_sat * 1000) // 2
       +    remote_amount = (funding_sat * 1000) // 2
       +    alice_raw = [ bip32("m/" + str(i)) for i in range(5) ]
       +    bob_raw = [ bip32("m/" + str(i)) for i in range(5,11) ]
       +    alice_privkeys = [lnbase.Keypair(lnbase.privkey_to_pubkey(x), x) for x in alice_raw]
       +    bob_privkeys = [lnbase.Keypair(lnbase.privkey_to_pubkey(x), x) for x in bob_raw]
       +    alice_pubkeys = [lnbase.OnlyPubkeyKeypair(x.pubkey) for x in alice_privkeys]
       +    bob_pubkeys = [lnbase.OnlyPubkeyKeypair(x.pubkey) for x in bob_privkeys]
       +
       +    alice_seed = os.urandom(32)
       +    bob_seed = os.urandom(32)
       +
       +    alice_cur = lnbase.secret_to_pubkey(int.from_bytes(lnbase.get_per_commitment_secret_from_seed(alice_seed, 2**48 - 1), "big"))
       +    alice_next = lnbase.secret_to_pubkey(int.from_bytes(lnbase.get_per_commitment_secret_from_seed(alice_seed, 2**48 - 2), "big"))
       +    bob_cur = lnbase.secret_to_pubkey(int.from_bytes(lnbase.get_per_commitment_secret_from_seed(bob_seed, 2**48 - 1), "big"))
       +    bob_next = lnbase.secret_to_pubkey(int.from_bytes(lnbase.get_per_commitment_secret_from_seed(bob_seed, 2**48 - 2), "big"))
       +
       +    return lnhtlc.HTLCStateMachine(
       +        create_channel_state(funding_txid, funding_index, funding_sat, 20000, True, local_amount, remote_amount, alice_privkeys, bob_pubkeys, alice_seed, bob_cur, bob_next, b"\x02"*33), "alice"), lnhtlc.HTLCStateMachine(
       +        create_channel_state(funding_txid, funding_index, funding_sat, 20000, False, remote_amount, local_amount, bob_privkeys, alice_pubkeys, bob_seed, alice_cur, alice_next, b"\x01"*33), "bob")
       +
       +one_bitcoin_in_msat = bitcoin.COIN * 1000
       +
       +class TestLNBaseHTLCStateMachine(unittest.TestCase):
       +    def assertOutputExistsByValue(self, tx, amt_sat):
       +        for typ, scr, val in tx.outputs():
       +            if val == amt_sat:
       +                break
       +        else:
       +            self.assertFalse()
       +
       +    def test_SimpleAddSettleWorkflow(self):
       +
       +        # Create a test channel which will be used for the duration of this
       +        # unittest. The channel will be funded evenly with Alice having 5 BTC,
       +        # and Bob having 5 BTC.
       +        alice_channel, bob_channel = create_test_channels()
       +
       +        paymentPreimage = b"\x01" * 32
       +        paymentHash = bitcoin.sha256(paymentPreimage)
       +        htlcAmt = one_bitcoin_in_msat
       +        htlc = lnhtlc.UpdateAddHtlc(
       +            payment_hash = paymentHash,
       +            amount_msat =  htlcAmt,
       +            cltv_expiry =  5,
       +            final_cltv_expiry_with_deltas = 5
       +        )
       +
       +        # First Alice adds the outgoing HTLC to her local channel's state
       +        # update log. Then Alice sends this wire message over to Bob who adds
       +        # this htlc to his remote state update log.
       +        aliceHtlcIndex = alice_channel.add_htlc(htlc)
       +
       +        bobHtlcIndex = bob_channel.receive_htlc(htlc)
       +
       +        # Next alice commits this change by sending a signature message. Since
       +        # we expect the messages to be ordered, Bob will receive the HTLC we
       +        # just sent before he receives this signature, so the signature will
       +        # cover the HTLC.
       +        aliceSig, aliceHtlcSigs = alice_channel.sign_next_commitment()
       +
       +        # Bob receives this signature message, and checks that this covers the
       +        # state he has in his remote log. This includes the HTLC just sent
       +        # from Alice.
       +        bob_channel.receive_new_commitment(aliceSig, aliceHtlcSigs)
       +
       +        # Bob revokes his prior commitment given to him by Alice, since he now
       +        # has a valid signature for a newer commitment.
       +        bobRevocation, _ = bob_channel.revoke_current_commitment()
       +
       +        # Bob finally send a signature for Alice's commitment transaction.
       +        # This signature will cover the HTLC, since Bob will first send the
       +        # revocation just created. The revocation also acks every received
       +        # HTLC up to the point where Alice sent here signature.
       +        bobSig, bobHtlcSigs = bob_channel.sign_next_commitment()
       +
       +        # Alice then processes this revocation, sending her own revocation for
       +        # her prior commitment transaction. Alice shouldn't have any HTLCs to
       +        # forward since she's sending an outgoing HTLC.
       +        fwdPkg = alice_channel.receive_revocation(bobRevocation)
       +        self.assertEqual(len(fwdPkg.adds), 0, "alice forwards %s add htlcs, should forward none"% len(fwdPkg.adds))
       +        self.assertEqual(len(fwdPkg.settle_fails), 0, "alice forwards %s settle/fail htlcs, should forward none"% len(fwdPkg.settle_fails))
       +
       +        # Alice then processes bob's signature, and since she just received
       +        # the revocation, she expect this signature to cover everything up to
       +        # the point where she sent her signature, including the HTLC.
       +        alice_channel.receive_new_commitment(bobSig, bobHtlcSigs)
       +
       +        # Alice then generates a revocation for bob.
       +        aliceRevocation, _ = alice_channel.revoke_current_commitment()
       +
       +        # Finally Bob processes Alice's revocation, at this point the new HTLC
       +        # is fully locked in within both commitment transactions. Bob should
       +        # also be able to forward an HTLC now that the HTLC has been locked
       +        # into both commitment transactions.
       +        fwdPkg = bob_channel.receive_revocation(aliceRevocation)
       +        self.assertEqual(len(fwdPkg.adds), 1, "bob forwards %s add htlcs, should only forward one"% len(fwdPkg.adds))
       +        self.assertEqual(len(fwdPkg.settle_fails), 0, "bob forwards %s settle/fail htlcs, should forward none"% len(fwdPkg.settle_fails))
       +
       +        # At this point, both sides should have the proper number of satoshis
       +        # sent, and commitment height updated within their local channel
       +        # state.
       +        aliceSent = 0
       +        bobSent = 0
       +
       +        self.assertEqual(alice_channel.total_msat_sent, aliceSent, "alice has incorrect milli-satoshis sent: %s vs %s"% (alice_channel.total_msat_sent, aliceSent))
       +        self.assertEqual(alice_channel.total_msat_received, bobSent, "alice has incorrect milli-satoshis received %s vs %s"% (alice_channel.total_msat_received, bobSent))
       +        self.assertEqual(bob_channel.total_msat_sent, bobSent, "bob has incorrect milli-satoshis sent %s vs %s"% (bob_channel.total_msat_sent, bobSent))
       +        self.assertEqual(bob_channel.total_msat_received, aliceSent, "bob has incorrect milli-satoshis received %s vs %s"% (bob_channel.total_msat_received, aliceSent))
       +        self.assertEqual(bob_channel.current_height, 1, "bob has incorrect commitment height, %s vs %s"% (bob_channel.current_height, 1))
       +        self.assertEqual(alice_channel.current_height, 1, "alice has incorrect commitment height, %s vs %s"% (alice_channel.current_height, 1))
       +
       +        # Both commitment transactions should have three outputs, and one of
       +        # them should be exactly the amount of the HTLC.
       +        self.assertEqual(len(alice_channel.local_commitment.outputs()), 3, "alice should have three commitment outputs, instead have %s"% len(alice_channel.local_commitment.outputs()))
       +        self.assertEqual(len(bob_channel.local_commitment.outputs()), 3, "bob should have three commitment outputs, instead have %s"% len(bob_channel.local_commitment.outputs()))
       +        self.assertOutputExistsByValue(alice_channel.local_commitment, htlcAmt // 1000)
       +        self.assertOutputExistsByValue(bob_channel.local_commitment, htlcAmt // 1000)
       +
       +        # Now we'll repeat a similar exchange, this time with Bob settling the
       +        # HTLC once he learns of the preimage.
       +        preimage = paymentPreimage
       +        bob_channel.settle_htlc(preimage, bobHtlcIndex, None, None, None)
       +
       +        alice_channel.receive_htlc_settle(preimage, aliceHtlcIndex)
       +
       +        bobSig2, bobHtlcSigs2 = bob_channel.sign_next_commitment()
       +        alice_channel.receive_new_commitment(bobSig2, bobHtlcSigs2)
       +
       +        aliceRevocation2, _ = alice_channel.revoke_current_commitment()
       +        aliceSig2, aliceHtlcSigs2 = alice_channel.sign_next_commitment()
       +
       +        fwdPkg = bob_channel.receive_revocation(aliceRevocation2)
       +        self.assertEqual(fwdPkg.adds, [], "bob forwards %s add htlcs, should forward none"% len(fwdPkg.adds))
       +        self.assertEqual(fwdPkg.settle_fails, [], "bob forwards %s settle/fail htlcs, should forward none"% len(fwdPkg.settle_fails))
       +
       +        bob_channel.receive_new_commitment(aliceSig2, aliceHtlcSigs2)
       +
       +        bobRevocation2, _ = bob_channel.revoke_current_commitment()
       +        fwdPkg = alice_channel.receive_revocation(bobRevocation2)
       +        # Alice should now be able to forward the settlement HTLC to
       +        # any down stream peers.
       +        self.assertEqual(fwdPkg.adds, [] , "alice should be forwarding an add HTLC, instead forwarding %s: %s"% (len(fwdPkg.adds), fwdPkg.adds))
       +        self.assertEqual(len(fwdPkg.settle_fails), 1, "alice should be forwarding one settle/fails HTLC, instead forwarding: %s"% len(fwdPkg.settle_fails))
       +
       +        # At this point, Bob should have 6 BTC settled, with Alice still having
       +        # 4 BTC. Alice's channel should show 1 BTC sent and Bob's channel
       +        # should show 1 BTC received. They should also be at commitment height
       +        # two, with the revocation window extended by 1 (5).
       +        mSatTransferred = one_bitcoin_in_msat
       +        self.assertEqual(alice_channel.total_msat_sent, mSatTransferred, "alice satoshis sent incorrect %s vs %s expected"% (alice_channel.total_msat_sent, mSatTransferred))
       +        self.assertEqual(alice_channel.total_msat_received, 0, "alice satoshis received incorrect %s vs %s expected"% (alice_channel.total_msat_received, 0))
       +        self.assertEqual(bob_channel.total_msat_received, mSatTransferred, "bob satoshis received incorrect %s vs %s expected"% (bob_channel.total_msat_received, mSatTransferred))
       +        self.assertEqual(bob_channel.total_msat_sent, 0, "bob satoshis sent incorrect %s vs %s expected"% (bob_channel.total_msat_sent, 0))
       +        self.assertEqual(bob_channel.current_height, 2, "bob has incorrect commitment height, %s vs %s"% (bob_channel.current_height, 2))
       +        self.assertEqual(alice_channel.current_height, 2, "alice has incorrect commitment height, %s vs %s"% (alice_channel.current_height, 2))
       +
       +        # The logs of both sides should now be cleared since the entry adding
       +        # the HTLC should have been removed once both sides receive the
       +        # revocation.
       +        self.assertEqual(alice_channel.local_update_log, [], "alice's local not updated, should be empty, has %s entries instead"% len(alice_channel.local_update_log))
       +        self.assertEqual(alice_channel.remote_update_log, [], "alice's remote not updated, should be empty, has %s entries instead"% len(alice_channel.remote_update_log))