diff --git a/htlcInterceptor.go b/htlcInterceptor.go index 87ee7a4..4168102 100644 --- a/htlcInterceptor.go +++ b/htlcInterceptor.go @@ -139,10 +139,10 @@ func (app *app) interceptHtlcEvents(ctx context.Context, interceptor routerrpc.R IncomingCircuitKey: event.IncomingCircuitKey, } if <-decision_chan { - log.Infof("[forward] ✅ Allow HTLC %s", Configuration.ForwardMode, forward_info_string) + log.Infof("[forward] ✅ Allow HTLC %s", forward_info_string) response.Action = routerrpc.ResolveHoldForwardAction_RESUME } else { - log.Infof("[forward] ❌ Deny HTLC %s", Configuration.ForwardMode, forward_info_string) + log.Infof("[forward] ❌ Deny HTLC %s", forward_info_string) response.Action = routerrpc.ResolveHoldForwardAction_FAIL } err = interceptor.Send(response) diff --git a/main.go b/main.go index b37cb67..299e9fb 100644 --- a/main.go +++ b/main.go @@ -49,12 +49,12 @@ func getClientConnection(ctx context.Context) (*grpc.ClientConn, error) { grpc.WithBlock(), grpc.WithPerRPCCredentials(cred), } - log.Infof("Connecting to LND...") + log.Infof("Connecting to %s", Configuration.Host) conn, err := grpc.DialContext(ctx, Configuration.Host, opts...) if err != nil { return nil, err } - log.Infof("Connected to %s", Configuration.Host) + return conn, nil } @@ -78,7 +78,12 @@ func main() { log.Errorf("Could not get my pubkey: %s", err) continue } - log.Info("My pubkey: ", app.myPubkey) + myAlias, err := app.getNodeAlias(ctx, app.myPubkey) + if err == nil { + log.Infof("Connected to %s (%s)", myAlias, trimPubKey([]byte(app.myPubkey))) + } else { + log.Infof("Connected to %s", app.myPubkey) + } var wg sync.WaitGroup ctx = context.WithValue(ctx, ctxKeyWaitGroup, &wg)