2021-12-04 12:23:56 +01:00
|
|
|
#include "config.h"
|
2020-05-16 03:29:05 +02:00
|
|
|
#include <bitcoin/chainparams.h>
|
2019-01-15 05:14:27 +01:00
|
|
|
#include <ccan/array_size/array_size.h>
|
2021-05-26 23:56:58 +02:00
|
|
|
#include <ccan/asort/asort.h>
|
2019-02-23 06:00:04 +01:00
|
|
|
#include <ccan/cast/cast.h>
|
2019-12-12 00:55:45 +01:00
|
|
|
#include <ccan/crypto/siphash24/siphash24.h>
|
|
|
|
#include <ccan/htable/htable_type.h>
|
2019-06-12 02:38:54 +02:00
|
|
|
#include <ccan/json_out/json_out.h>
|
2020-08-11 16:42:20 +02:00
|
|
|
#include <ccan/str/hex/hex.h>
|
2019-01-15 05:14:27 +01:00
|
|
|
#include <ccan/tal/str/str.h>
|
2020-12-14 02:25:37 +01:00
|
|
|
#include <common/bolt12_merkle.h>
|
|
|
|
#include <common/gossmap.h>
|
2022-07-04 05:49:38 +02:00
|
|
|
#include <common/json_param.h>
|
2020-01-30 00:55:55 +01:00
|
|
|
#include <common/json_stream.h>
|
2022-02-26 01:50:33 +01:00
|
|
|
#include <common/memleak.h>
|
2019-01-15 11:04:07 +01:00
|
|
|
#include <common/pseudorand.h>
|
2019-01-15 05:14:27 +01:00
|
|
|
#include <common/type_to_string.h>
|
2020-05-08 15:03:48 +02:00
|
|
|
#include <plugins/libplugin-pay.h>
|
2019-01-15 11:04:07 +01:00
|
|
|
#include <stdio.h>
|
2019-01-15 05:14:27 +01:00
|
|
|
|
2019-01-15 05:20:27 +01:00
|
|
|
/* Public key of this node. */
|
2019-04-08 11:58:32 +02:00
|
|
|
static struct node_id my_id;
|
2019-01-15 05:21:27 +01:00
|
|
|
static unsigned int maxdelay_default;
|
2021-01-13 09:58:38 +01:00
|
|
|
static bool exp_offers;
|
2020-07-10 14:48:00 +02:00
|
|
|
static bool disablempp = false;
|
|
|
|
|
2020-05-18 18:47:21 +02:00
|
|
|
static LIST_HEAD(payments);
|
|
|
|
|
2019-01-15 05:14:27 +01:00
|
|
|
struct pay_command {
|
2020-01-26 15:44:16 +01:00
|
|
|
/* Global state */
|
|
|
|
struct plugin *plugin;
|
|
|
|
|
2019-01-15 05:16:27 +01:00
|
|
|
/* Destination, as text */
|
|
|
|
const char *dest;
|
|
|
|
|
|
|
|
/* How much we're paying, and what riskfactor for routing. */
|
2019-02-21 04:45:44 +01:00
|
|
|
struct amount_msat msat;
|
2020-05-02 13:52:03 +02:00
|
|
|
/* Blank amount to pay, without fees and shadow route(s). */
|
|
|
|
struct amount_msat initial_msat;
|
2020-01-29 12:30:00 +01:00
|
|
|
/* riskfactor 12.345% -> riskfactor_millionths = 12345000 */
|
|
|
|
u64 riskfactor_millionths;
|
2019-01-15 05:22:27 +01:00
|
|
|
unsigned int final_cltv;
|
2019-01-15 05:16:27 +01:00
|
|
|
|
2019-01-15 05:19:27 +01:00
|
|
|
/* Limits on what routes we'll accept. */
|
2020-01-29 12:30:00 +01:00
|
|
|
/* 12.345% -> maxfee_pct_millionths = 12345000 */
|
|
|
|
u64 maxfee_pct_millionths;
|
2019-01-15 05:19:27 +01:00
|
|
|
unsigned int maxdelay;
|
2019-02-21 04:45:44 +01:00
|
|
|
struct amount_msat exemptfee;
|
2019-01-15 05:19:27 +01:00
|
|
|
|
2019-01-15 05:14:27 +01:00
|
|
|
/* Payment hash, as text. */
|
|
|
|
const char *payment_hash;
|
|
|
|
|
2019-11-23 01:19:23 +01:00
|
|
|
/* Payment secret, if specified by invoice. */
|
|
|
|
const char *payment_secret;
|
|
|
|
|
2022-03-31 11:10:50 +02:00
|
|
|
/* Payment metadata, if specified by invoice. */
|
|
|
|
const char *payment_metadata;
|
|
|
|
|
2019-01-15 05:14:27 +01:00
|
|
|
/* Description, if any. */
|
2019-02-23 06:00:02 +01:00
|
|
|
const char *label;
|
2019-01-15 05:16:27 +01:00
|
|
|
|
|
|
|
/* Chatty description of attempts. */
|
2019-01-15 11:04:07 +01:00
|
|
|
struct pay_status *ps;
|
2019-01-15 05:16:27 +01:00
|
|
|
|
2019-01-15 11:04:08 +01:00
|
|
|
/* Error to use if getroute says it can't find route. */
|
|
|
|
const char *expensive_route;
|
|
|
|
|
2019-01-15 05:16:27 +01:00
|
|
|
/* Time to stop retrying. */
|
|
|
|
struct timeabs stoptime;
|
|
|
|
|
|
|
|
/* Channels which have failed us. */
|
|
|
|
const char **excludes;
|
2019-01-15 11:04:01 +01:00
|
|
|
|
2019-02-01 04:03:27 +01:00
|
|
|
/* Current routehint, if any. */
|
|
|
|
struct route_info *current_routehint;
|
|
|
|
|
|
|
|
/* Any remaining routehints to try. */
|
2019-01-15 11:04:01 +01:00
|
|
|
struct route_info **routehints;
|
2019-01-15 11:04:07 +01:00
|
|
|
|
2019-11-04 15:59:01 +01:00
|
|
|
#if DEVELOPER
|
|
|
|
/* Disable the use of shadow route ? */
|
|
|
|
double use_shadow;
|
|
|
|
#endif
|
|
|
|
|
2019-01-15 11:04:07 +01:00
|
|
|
/* Current node during shadow route calculation. */
|
2019-01-16 21:37:11 +01:00
|
|
|
const char *shadow_dest;
|
2019-01-15 05:14:27 +01:00
|
|
|
};
|
|
|
|
|
2019-01-15 11:04:07 +01:00
|
|
|
/* FIXME: Add this to ccan/time? */
|
|
|
|
#define UTC_TIMELEN (sizeof("YYYY-mm-ddTHH:MM:SS.nnnZ"))
|
|
|
|
static void utc_timestring(const struct timeabs *time, char str[UTC_TIMELEN])
|
|
|
|
{
|
|
|
|
char iso8601_msec_fmt[sizeof("YYYY-mm-ddTHH:MM:SS.%03dZ")];
|
2022-03-24 03:44:53 +01:00
|
|
|
struct tm *t = gmtime(&time->ts.tv_sec);
|
2019-01-15 11:04:07 +01:00
|
|
|
|
2022-03-24 03:44:53 +01:00
|
|
|
/* Shouldn't happen, but see
|
|
|
|
* https://github.com/ElementsProject/lightning/issues/4991 :( */
|
|
|
|
if (!t) {
|
|
|
|
snprintf(str, UTC_TIMELEN, "1970-01-01T00:00:00.000Z");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
strftime(iso8601_msec_fmt, sizeof(iso8601_msec_fmt), "%FT%T.%%03dZ", t);
|
2019-01-15 11:04:07 +01:00
|
|
|
snprintf(str, UTC_TIMELEN, iso8601_msec_fmt,
|
|
|
|
(int) time->ts.tv_nsec / 1000000);
|
|
|
|
}
|
|
|
|
|
2020-05-29 15:25:00 +02:00
|
|
|
static void json_add_sendpay_result(struct json_stream *s, const struct payment_result *r)
|
|
|
|
{
|
|
|
|
if (r->code != 0) {
|
|
|
|
/* This is a failure */
|
|
|
|
json_add_string(s, "message", r->message);
|
|
|
|
json_add_u32(s, "code", r->code);
|
|
|
|
|
|
|
|
json_object_start(s, "data");
|
|
|
|
json_add_u32(s, "id", r->id);
|
|
|
|
json_add_hex(s, "raw_message", r->raw_message, tal_bytelen(r->raw_message));
|
|
|
|
json_add_num(s, "failcode", r->failcode);
|
|
|
|
json_add_string(s, "failcodename", r->failcodename);
|
|
|
|
|
|
|
|
if (r->erring_index)
|
|
|
|
json_add_num(s, "erring_index", *r->erring_index);
|
|
|
|
|
|
|
|
if (r->erring_node)
|
|
|
|
json_add_node_id(s, "erring_node", r->erring_node);
|
|
|
|
|
|
|
|
if (r->erring_channel)
|
|
|
|
json_add_short_channel_id(s, "erring_channel",
|
|
|
|
r->erring_channel);
|
|
|
|
|
|
|
|
if (r->erring_direction)
|
|
|
|
json_add_num(s, "erring_direction",
|
|
|
|
*r->erring_direction);
|
2021-03-16 05:20:38 +01:00
|
|
|
|
2020-05-29 15:25:00 +02:00
|
|
|
json_object_end(s);
|
|
|
|
} else {
|
|
|
|
/* This is a success */
|
|
|
|
json_add_u32(s, "id", r->id);
|
|
|
|
json_add_preimage(s, "payment_preimage", r->payment_preimage);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
static void paystatus_add_payment(struct json_stream *s, const struct payment *p)
|
|
|
|
{
|
|
|
|
char timestr[UTC_TIMELEN];
|
|
|
|
|
|
|
|
utc_timestring(&p->start_time, timestr);
|
|
|
|
|
|
|
|
json_object_start(s, NULL);
|
2020-05-29 17:08:20 +02:00
|
|
|
if (p->why != NULL)
|
|
|
|
json_add_string(s, "strategy", p->why);
|
2020-05-29 15:25:00 +02:00
|
|
|
json_add_string(s, "start_time", timestr);
|
|
|
|
json_add_u64(s, "age_in_seconds",
|
|
|
|
time_to_sec(time_between(time_now(), p->start_time)));
|
|
|
|
|
|
|
|
/* Any final state will have an end time. */
|
|
|
|
if (p->step >= PAYMENT_STEP_SPLIT) {
|
|
|
|
utc_timestring(&p->end_time, timestr);
|
|
|
|
json_add_string(s, "end_time", timestr);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* TODO Add routehint. */
|
|
|
|
/* TODO Add route details */
|
|
|
|
|
2021-02-24 22:10:07 +01:00
|
|
|
if (p->step < PAYMENT_STEP_SPLIT)
|
|
|
|
json_add_string(s, "state", "pending");
|
|
|
|
else
|
|
|
|
json_add_string(s, "state", "completed");
|
|
|
|
|
2020-07-03 20:55:20 +02:00
|
|
|
if (p->step == PAYMENT_STEP_SPLIT) {
|
|
|
|
/* Don't add anything, this is neither a success nor a failure. */
|
|
|
|
} else if (p->result != NULL) {
|
2020-05-29 15:25:00 +02:00
|
|
|
if (p->step == PAYMENT_STEP_SUCCESS)
|
|
|
|
json_object_start(s, "success");
|
|
|
|
else
|
|
|
|
json_object_start(s, "failure");
|
|
|
|
json_add_sendpay_result(s, p->result);
|
|
|
|
json_object_end(s);
|
2021-02-24 22:10:07 +01:00
|
|
|
} else if (p->step >= PAYMENT_STEP_SPLIT) {
|
2020-05-29 17:08:20 +02:00
|
|
|
json_object_start(s, "failure");
|
|
|
|
json_add_num(s, "code", PAY_ROUTE_NOT_FOUND);
|
|
|
|
json_add_string(s, "message", "Call to getroute: Could not find a route");
|
|
|
|
json_object_end(s);
|
2020-05-29 15:25:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
json_object_end(s);
|
|
|
|
for (size_t i = 0; i < tal_count(p->children); i++)
|
|
|
|
paystatus_add_payment(s, p->children[i]);
|
|
|
|
}
|
|
|
|
|
2019-02-23 06:00:04 +01:00
|
|
|
static struct command_result *json_paystatus(struct command *cmd,
|
|
|
|
const char *buf,
|
|
|
|
const jsmntok_t *params)
|
2019-01-15 11:04:07 +01:00
|
|
|
{
|
2020-12-14 02:24:37 +01:00
|
|
|
const char *invstring;
|
2020-01-31 01:12:07 +01:00
|
|
|
struct json_stream *ret;
|
2020-05-29 15:25:00 +02:00
|
|
|
struct payment *p;
|
2019-01-15 11:04:07 +01:00
|
|
|
|
|
|
|
if (!param(cmd, buf, params,
|
2020-12-14 02:24:37 +01:00
|
|
|
/* FIXME: rename to invstring */
|
|
|
|
p_opt("bolt11", param_string, &invstring),
|
2019-01-15 11:04:07 +01:00
|
|
|
NULL))
|
2019-09-18 12:14:44 +02:00
|
|
|
return command_param_failed();
|
2019-01-15 11:04:07 +01:00
|
|
|
|
2020-01-31 01:12:07 +01:00
|
|
|
ret = jsonrpc_stream_success(cmd);
|
|
|
|
json_array_start(ret, "pay");
|
2019-06-12 02:38:54 +02:00
|
|
|
|
2020-05-29 15:25:00 +02:00
|
|
|
list_for_each(&payments, p, list) {
|
|
|
|
assert(p->parent == NULL);
|
2020-12-14 02:24:37 +01:00
|
|
|
if (invstring && !streq(invstring, p->invstring))
|
2020-05-29 15:25:00 +02:00
|
|
|
continue;
|
|
|
|
|
|
|
|
json_object_start(ret, NULL);
|
2020-07-02 15:33:55 +02:00
|
|
|
if (p->label != NULL)
|
|
|
|
json_add_string(ret, "label", p->label);
|
|
|
|
|
2020-12-14 02:24:37 +01:00
|
|
|
if (p->invstring)
|
|
|
|
json_add_invstring(ret, p->invstring);
|
2020-05-29 15:25:00 +02:00
|
|
|
json_add_amount_msat_only(ret, "amount_msat", p->amount);
|
|
|
|
|
|
|
|
json_add_node_id(ret, "destination", p->destination);
|
|
|
|
|
|
|
|
/* TODO(cdecker) Add label in once we track labels. */
|
|
|
|
/* TODO(cdecker) Add routehint_modifications in once we track
|
|
|
|
* them. */
|
|
|
|
/* TODO(cdecker) Add shadow route once we support it. */
|
|
|
|
|
|
|
|
/* If it's in listpeers right now, this can be 0 */
|
|
|
|
json_array_start(ret, "attempts");
|
|
|
|
paystatus_add_payment(ret, p);
|
|
|
|
json_array_end(ret);
|
|
|
|
json_object_end(ret);
|
|
|
|
}
|
2020-01-31 01:12:07 +01:00
|
|
|
json_array_end(ret);
|
2019-01-15 11:04:07 +01:00
|
|
|
|
2020-01-31 01:12:07 +01:00
|
|
|
return command_finished(cmd, ret);
|
2019-01-15 11:04:07 +01:00
|
|
|
}
|
|
|
|
|
2020-08-11 16:42:20 +02:00
|
|
|
static bool attempt_ongoing(const struct sha256 *payment_hash)
|
2019-05-21 02:27:14 +02:00
|
|
|
{
|
2020-05-27 14:49:40 +02:00
|
|
|
struct payment *root;
|
|
|
|
struct payment_tree_result res;
|
|
|
|
enum payment_step diff,
|
|
|
|
final_states = PAYMENT_STEP_FAILED | PAYMENT_STEP_SUCCESS;
|
2019-05-21 02:27:14 +02:00
|
|
|
|
2020-05-27 14:49:40 +02:00
|
|
|
list_for_each(&payments, root, list) {
|
2020-08-11 16:42:20 +02:00
|
|
|
if (!sha256_eq(payment_hash, root->payment_hash))
|
2020-05-27 14:49:40 +02:00
|
|
|
continue;
|
|
|
|
res = payment_collect_result(root);
|
|
|
|
diff = res.leafstates & ~final_states;
|
|
|
|
return diff != 0;
|
|
|
|
}
|
2019-05-21 02:27:14 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-05-28 22:04:04 +02:00
|
|
|
/* A unique key for each payment attempt, even if the same invoice was
|
|
|
|
* attempted multiple times. */
|
|
|
|
struct pay_sort_key {
|
|
|
|
const struct sha256 *payment_hash;
|
|
|
|
u64 groupid;
|
|
|
|
};
|
|
|
|
|
2019-12-12 00:55:45 +01:00
|
|
|
/* We consolidate multi-part payments into a single entry. */
|
|
|
|
struct pay_mpp {
|
2020-05-26 13:23:25 +02:00
|
|
|
/* payment_hash from the invoice and lookup key */
|
|
|
|
const struct sha256 *payment_hash;
|
|
|
|
|
2020-12-14 02:24:37 +01:00
|
|
|
/* This is the bolt11/bolt12 string */
|
|
|
|
const char *invstring;
|
2021-04-28 14:01:20 +02:00
|
|
|
|
|
|
|
/* Accumulated states of all sendpay commands involved. */
|
|
|
|
enum payment_result_state state;
|
|
|
|
|
2019-12-12 00:55:45 +01:00
|
|
|
/* Optional label (of first one!) */
|
|
|
|
const jsmntok_t *label;
|
2022-04-02 04:33:35 +02:00
|
|
|
/* Optional description (used for bolt11 with description_hash) */
|
|
|
|
const jsmntok_t *description;
|
2019-12-12 00:55:45 +01:00
|
|
|
/* Optional preimage (iff status is successful) */
|
|
|
|
const jsmntok_t *preimage;
|
|
|
|
/* Only counts "complete" or "pending" payments. */
|
|
|
|
size_t num_nonfailed_parts;
|
|
|
|
/* Total amount sent ("complete" or "pending" only). */
|
|
|
|
struct amount_msat amount_sent;
|
2020-07-27 16:27:30 +02:00
|
|
|
|
|
|
|
/* Total amount received by the recipient ("complete" or "pending"
|
|
|
|
* only). Null if we have any part for which we didn't know the
|
|
|
|
* amount. */
|
|
|
|
struct amount_msat *amount;
|
2020-08-06 16:52:33 +02:00
|
|
|
|
|
|
|
/* Timestamp of the first part */
|
|
|
|
u32 timestamp;
|
2020-07-31 17:19:22 +02:00
|
|
|
|
|
|
|
/* The destination of the payment, if specified. */
|
2020-08-20 15:40:34 +02:00
|
|
|
const jsmntok_t *destination;
|
2019-12-12 00:55:45 +01:00
|
|
|
|
2021-05-28 22:04:04 +02:00
|
|
|
/* Which sendpay group is this? Necessary for invoices that have been
|
|
|
|
* attempted multiple times. */
|
|
|
|
struct pay_sort_key sortkey;
|
|
|
|
};
|
2019-12-12 00:55:45 +01:00
|
|
|
|
2021-05-28 22:04:04 +02:00
|
|
|
static const struct pay_sort_key *pay_mpp_key(const struct pay_mpp *pm)
|
2019-12-12 00:55:45 +01:00
|
|
|
{
|
2021-05-28 22:04:04 +02:00
|
|
|
return &pm->sortkey;
|
2019-12-12 00:55:45 +01:00
|
|
|
}
|
|
|
|
|
2021-05-28 22:04:04 +02:00
|
|
|
static size_t pay_mpp_hash(const struct pay_sort_key *key)
|
2019-12-12 00:55:45 +01:00
|
|
|
{
|
2021-05-28 22:04:04 +02:00
|
|
|
struct siphash24_ctx ctx;
|
|
|
|
siphash24_init(&ctx, siphash_seed());
|
|
|
|
siphash24_update(&ctx, key->payment_hash, sizeof(struct sha256));
|
|
|
|
siphash24_update(&ctx, &key->groupid, sizeof(u64));
|
|
|
|
return siphash24_done(&ctx);
|
2019-12-12 00:55:45 +01:00
|
|
|
}
|
|
|
|
|
2021-05-28 22:04:04 +02:00
|
|
|
static bool pay_mpp_eq(const struct pay_mpp *pm, const struct pay_sort_key *key)
|
2021-05-26 23:56:58 +02:00
|
|
|
{
|
2021-05-28 22:04:04 +02:00
|
|
|
return memcmp(pm->sortkey.payment_hash, key->payment_hash,
|
|
|
|
sizeof(struct sha256)) == 0 &&
|
|
|
|
pm->sortkey.groupid == key->groupid;
|
2021-05-26 23:56:58 +02:00
|
|
|
}
|
|
|
|
|
2020-05-26 13:23:25 +02:00
|
|
|
HTABLE_DEFINE_TYPE(struct pay_mpp, pay_mpp_key, pay_mpp_hash, pay_mpp_eq,
|
2019-12-12 00:55:45 +01:00
|
|
|
pay_map);
|
|
|
|
|
2020-01-26 15:44:16 +01:00
|
|
|
static void add_amount_sent(struct plugin *p,
|
2020-12-14 02:24:37 +01:00
|
|
|
const char *invstring,
|
2020-07-27 16:27:30 +02:00
|
|
|
struct pay_mpp *mpp,
|
2019-12-12 00:55:45 +01:00
|
|
|
const char *buf,
|
|
|
|
const jsmntok_t *t)
|
|
|
|
{
|
2020-07-27 16:27:30 +02:00
|
|
|
struct amount_msat sent, recv;
|
|
|
|
const jsmntok_t *msattok;
|
|
|
|
|
|
|
|
|
2019-12-12 00:55:45 +01:00
|
|
|
json_to_msat(buf, json_get_member(buf, t, "amount_sent_msat"), &sent);
|
2020-07-27 16:27:30 +02:00
|
|
|
if (!amount_msat_add(&mpp->amount_sent, mpp->amount_sent, sent))
|
2020-01-26 15:44:16 +01:00
|
|
|
plugin_log(p, LOG_BROKEN,
|
2019-12-12 00:55:45 +01:00
|
|
|
"Cannot add amount_sent_msat for %s: %s + %s",
|
2020-12-14 02:24:37 +01:00
|
|
|
invstring,
|
2020-07-27 16:27:30 +02:00
|
|
|
type_to_string(tmpctx, struct amount_msat, &mpp->amount_sent),
|
|
|
|
type_to_string(tmpctx, struct amount_msat, &sent));
|
|
|
|
|
|
|
|
msattok = json_get_member(buf, t, "amount_msat");
|
|
|
|
|
|
|
|
/* If this is an unannotated partial payment we drop out estimate for
|
|
|
|
* all parts. */
|
2021-01-29 01:00:09 +01:00
|
|
|
if (msattok == NULL) {
|
2020-07-27 16:27:30 +02:00
|
|
|
mpp->amount = tal_free(mpp->amount);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If we had a part of this multi-part payment for which we don't know
|
|
|
|
* the amount, then this is NULL. No point in summing up if we don't
|
|
|
|
* have the exact value.*/
|
|
|
|
if (mpp->amount == NULL)
|
|
|
|
return;
|
|
|
|
|
2021-01-29 01:00:09 +01:00
|
|
|
if (!json_to_msat(buf, msattok, &recv))
|
|
|
|
plugin_err(p, "Cannot convert amount_sat %.*s",
|
|
|
|
json_tok_full_len(msattok),
|
|
|
|
json_tok_full(buf, msattok));
|
|
|
|
|
2020-07-27 16:27:30 +02:00
|
|
|
if (!amount_msat_add(mpp->amount, *mpp->amount, recv))
|
|
|
|
plugin_log(p, LOG_BROKEN,
|
|
|
|
"Cannot add amount_msat for %s: %s + %s",
|
2020-12-14 02:24:37 +01:00
|
|
|
invstring,
|
2020-07-27 16:27:30 +02:00
|
|
|
type_to_string(tmpctx, struct amount_msat, mpp->amount),
|
2019-12-12 00:55:45 +01:00
|
|
|
type_to_string(tmpctx, struct amount_msat, &sent));
|
|
|
|
}
|
|
|
|
|
2020-01-31 01:12:07 +01:00
|
|
|
static void add_new_entry(struct json_stream *ret,
|
2019-12-12 00:55:45 +01:00
|
|
|
const char *buf,
|
|
|
|
const struct pay_mpp *pm)
|
|
|
|
{
|
2020-01-31 01:12:07 +01:00
|
|
|
json_object_start(ret, NULL);
|
2020-12-14 02:24:37 +01:00
|
|
|
if (pm->invstring)
|
|
|
|
json_add_invstring(ret, pm->invstring);
|
2022-04-02 04:33:35 +02:00
|
|
|
if (pm->description)
|
|
|
|
json_add_tok(ret, "description", pm->description, buf);
|
2020-07-31 17:19:22 +02:00
|
|
|
if (pm->destination)
|
2020-08-20 15:40:34 +02:00
|
|
|
json_add_tok(ret, "destination", pm->destination, buf);
|
2020-07-31 17:19:22 +02:00
|
|
|
|
2020-07-29 10:48:47 +02:00
|
|
|
json_add_sha256(ret, "payment_hash", pm->payment_hash);
|
2021-04-28 14:01:20 +02:00
|
|
|
|
|
|
|
if (pm->state & PAYMENT_COMPLETE)
|
|
|
|
json_add_string(ret, "status", "complete");
|
|
|
|
else if (pm->state & PAYMENT_PENDING || attempt_ongoing(pm->payment_hash))
|
|
|
|
json_add_string(ret, "status", "pending");
|
|
|
|
else
|
|
|
|
json_add_string(ret, "status", "failed");
|
|
|
|
|
2020-08-06 16:52:33 +02:00
|
|
|
json_add_u32(ret, "created_at", pm->timestamp);
|
|
|
|
|
2019-12-12 00:55:45 +01:00
|
|
|
if (pm->label)
|
2020-01-31 01:12:07 +01:00
|
|
|
json_add_tok(ret, "label", pm->label, buf);
|
2019-12-12 00:55:45 +01:00
|
|
|
if (pm->preimage)
|
2020-01-31 01:12:07 +01:00
|
|
|
json_add_tok(ret, "preimage", pm->preimage, buf);
|
2020-07-27 16:27:30 +02:00
|
|
|
|
|
|
|
/* This is only tallied for pending and successful payments, not
|
|
|
|
* failures. */
|
|
|
|
if (pm->amount != NULL && pm->num_nonfailed_parts > 0)
|
2022-07-22 19:26:00 +02:00
|
|
|
json_add_amount_msat_only(ret, "amount_msat", *pm->amount);
|
2020-07-27 16:27:30 +02:00
|
|
|
|
2022-07-22 19:26:00 +02:00
|
|
|
json_add_amount_msat_only(ret, "amount_sent_msat",
|
|
|
|
pm->amount_sent);
|
2019-12-12 00:55:45 +01:00
|
|
|
|
|
|
|
if (pm->num_nonfailed_parts > 1)
|
2020-01-31 01:12:07 +01:00
|
|
|
json_add_u64(ret, "number_of_parts",
|
|
|
|
pm->num_nonfailed_parts);
|
|
|
|
json_object_end(ret);
|
2019-12-12 00:55:45 +01:00
|
|
|
}
|
|
|
|
|
2019-02-23 06:00:04 +01:00
|
|
|
static struct command_result *listsendpays_done(struct command *cmd,
|
2019-02-23 06:00:04 +01:00
|
|
|
const char *buf,
|
|
|
|
const jsmntok_t *result,
|
2020-12-14 02:24:37 +01:00
|
|
|
char *invstring)
|
2019-02-23 06:00:04 +01:00
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
const jsmntok_t *t, *arr;
|
2020-01-31 01:12:07 +01:00
|
|
|
struct json_stream *ret;
|
2019-12-12 00:55:45 +01:00
|
|
|
struct pay_map pay_map;
|
|
|
|
struct pay_mpp *pm;
|
2021-05-28 22:04:04 +02:00
|
|
|
struct pay_sort_key *order = tal_arr(tmpctx, struct pay_sort_key, 0);
|
2019-12-12 00:55:45 +01:00
|
|
|
|
|
|
|
pay_map_init(&pay_map);
|
2019-02-23 06:00:04 +01:00
|
|
|
|
|
|
|
arr = json_get_member(buf, result, "payments");
|
|
|
|
if (!arr || arr->type != JSMN_ARRAY)
|
|
|
|
return command_fail(cmd, LIGHTNINGD,
|
2019-02-23 06:00:04 +01:00
|
|
|
"Unexpected non-array result from listsendpays");
|
2019-02-23 06:00:04 +01:00
|
|
|
|
|
|
|
json_for_each_arr(i, t, arr) {
|
2021-05-28 22:04:04 +02:00
|
|
|
const jsmntok_t *status, *invstrtok, *hashtok, *createdtok, *grouptok;
|
2020-12-14 02:24:37 +01:00
|
|
|
const char *invstr = invstring;
|
2020-05-26 13:23:25 +02:00
|
|
|
struct sha256 payment_hash;
|
2020-08-06 16:52:33 +02:00
|
|
|
u32 created_at;
|
2021-05-28 22:04:04 +02:00
|
|
|
u64 groupid;
|
|
|
|
struct pay_sort_key key;
|
2019-02-23 06:00:04 +01:00
|
|
|
|
2020-12-14 02:24:37 +01:00
|
|
|
invstrtok = json_get_member(buf, t, "bolt11");
|
|
|
|
if (!invstrtok)
|
|
|
|
invstrtok = json_get_member(buf, t, "bolt12");
|
2020-05-26 13:23:25 +02:00
|
|
|
hashtok = json_get_member(buf, t, "payment_hash");
|
2020-08-06 16:52:33 +02:00
|
|
|
createdtok = json_get_member(buf, t, "created_at");
|
2020-05-26 13:23:25 +02:00
|
|
|
assert(hashtok != NULL);
|
2020-08-06 16:52:33 +02:00
|
|
|
assert(createdtok != NULL);
|
2019-02-23 06:00:04 +01:00
|
|
|
|
2021-05-28 22:04:04 +02:00
|
|
|
grouptok = json_get_member(buf, t, "groupid");
|
|
|
|
if (grouptok != NULL)
|
|
|
|
json_to_u64(buf, grouptok, &groupid);
|
|
|
|
else
|
|
|
|
groupid = 0;
|
|
|
|
|
2020-05-26 13:23:25 +02:00
|
|
|
json_to_sha256(buf, hashtok, &payment_hash);
|
2020-08-06 16:52:33 +02:00
|
|
|
json_to_u32(buf, createdtok, &created_at);
|
2020-12-14 02:24:37 +01:00
|
|
|
if (invstrtok)
|
|
|
|
invstr = json_strdup(cmd, buf, invstrtok);
|
2019-12-12 00:55:45 +01:00
|
|
|
|
2021-05-28 22:04:04 +02:00
|
|
|
key.payment_hash = &payment_hash;
|
|
|
|
key.groupid = groupid;
|
|
|
|
|
|
|
|
pm = pay_map_get(&pay_map, &key);
|
2019-12-12 00:55:45 +01:00
|
|
|
if (!pm) {
|
|
|
|
pm = tal(cmd, struct pay_mpp);
|
2021-04-28 14:01:20 +02:00
|
|
|
pm->state = 0;
|
2020-05-26 13:23:25 +02:00
|
|
|
pm->payment_hash = tal_dup(pm, struct sha256, &payment_hash);
|
2020-12-14 02:24:37 +01:00
|
|
|
pm->invstring = tal_steal(pm, invstr);
|
2020-08-20 15:40:34 +02:00
|
|
|
pm->destination = json_get_member(buf, t, "destination");
|
2019-12-12 00:55:45 +01:00
|
|
|
pm->label = json_get_member(buf, t, "label");
|
2022-04-02 04:33:35 +02:00
|
|
|
pm->description = json_get_member(buf, t, "description");
|
2019-12-12 00:55:45 +01:00
|
|
|
pm->preimage = NULL;
|
|
|
|
pm->amount_sent = AMOUNT_MSAT(0);
|
2020-07-27 16:27:30 +02:00
|
|
|
pm->amount = talz(pm, struct amount_msat);
|
2019-12-12 00:55:45 +01:00
|
|
|
pm->num_nonfailed_parts = 0;
|
2020-08-06 16:52:33 +02:00
|
|
|
pm->timestamp = created_at;
|
2021-05-28 22:04:04 +02:00
|
|
|
pm->sortkey.payment_hash = pm->payment_hash;
|
|
|
|
pm->sortkey.groupid = groupid;
|
2019-12-12 00:55:45 +01:00
|
|
|
pay_map_add(&pay_map, pm);
|
2021-05-28 22:04:04 +02:00
|
|
|
// First time we see the groupid we add it to the order
|
|
|
|
// array, so we can retrieve them in the correct order.
|
|
|
|
tal_arr_expand(&order, pm->sortkey);
|
2022-04-04 04:56:52 +02:00
|
|
|
} else {
|
|
|
|
/* Not all payments have bolt11/bolt12 or
|
|
|
|
* description, as an optimization */
|
|
|
|
if (!pm->invstring)
|
|
|
|
pm->invstring = tal_steal(pm, invstr);
|
|
|
|
if (!pm->description)
|
|
|
|
pm->description = json_get_member(buf, t, "description");
|
2019-12-12 00:55:45 +01:00
|
|
|
}
|
|
|
|
|
2019-05-21 02:27:14 +02:00
|
|
|
status = json_get_member(buf, t, "status");
|
2019-12-12 00:55:45 +01:00
|
|
|
if (json_tok_streq(buf, status, "complete")) {
|
2020-12-14 02:24:37 +01:00
|
|
|
add_amount_sent(cmd->plugin, pm->invstring, pm, buf, t);
|
2019-12-12 00:55:45 +01:00
|
|
|
pm->num_nonfailed_parts++;
|
|
|
|
pm->preimage
|
|
|
|
= json_get_member(buf, t, "payment_preimage");
|
2021-04-28 14:01:20 +02:00
|
|
|
pm->state |= PAYMENT_COMPLETE;
|
2019-12-12 00:55:45 +01:00
|
|
|
} else if (json_tok_streq(buf, status, "pending")) {
|
2020-12-14 02:24:37 +01:00
|
|
|
add_amount_sent(cmd->plugin, pm->invstring, pm, buf, t);
|
2019-12-12 00:55:45 +01:00
|
|
|
pm->num_nonfailed_parts++;
|
2021-04-28 14:01:20 +02:00
|
|
|
pm->state |= PAYMENT_PENDING;
|
2019-12-12 00:55:45 +01:00
|
|
|
} else {
|
2021-04-28 14:01:20 +02:00
|
|
|
pm->state |= PAYMENT_FAILED;
|
2019-05-21 02:27:14 +02:00
|
|
|
}
|
2019-02-23 06:00:04 +01:00
|
|
|
}
|
2019-12-12 00:55:45 +01:00
|
|
|
|
2021-05-26 23:56:58 +02:00
|
|
|
ret = jsonrpc_stream_success(cmd);
|
|
|
|
json_array_start(ret, "pays");
|
2021-05-28 22:04:04 +02:00
|
|
|
for (size_t i = 0; i < tal_count(order); i++) {
|
|
|
|
pm = pay_map_get(&pay_map, &order[i]);
|
|
|
|
assert(pm != NULL);
|
|
|
|
add_new_entry(ret, buf, pm);
|
|
|
|
}
|
|
|
|
pay_map_clear(&pay_map);
|
2020-01-31 01:12:07 +01:00
|
|
|
json_array_end(ret);
|
|
|
|
return command_finished(cmd, ret);
|
2019-02-23 06:00:04 +01:00
|
|
|
}
|
|
|
|
|
2019-02-23 06:00:04 +01:00
|
|
|
static struct command_result *json_listpays(struct command *cmd,
|
|
|
|
const char *buf,
|
|
|
|
const jsmntok_t *params)
|
2019-02-23 06:00:04 +01:00
|
|
|
{
|
2021-09-06 10:51:21 +02:00
|
|
|
const char *invstring, *status_str;
|
2020-07-29 10:48:47 +02:00
|
|
|
struct sha256 *payment_hash;
|
2020-01-30 00:55:55 +01:00
|
|
|
struct out_req *req;
|
2019-02-23 06:00:04 +01:00
|
|
|
|
|
|
|
/* FIXME: would be nice to parse as a bolt11 so check worked in future */
|
|
|
|
if (!param(cmd, buf, params,
|
2020-12-14 02:25:37 +01:00
|
|
|
/* FIXME: parameter should be invstring now */
|
2020-12-14 02:24:37 +01:00
|
|
|
p_opt("bolt11", param_string, &invstring),
|
2020-07-29 10:48:47 +02:00
|
|
|
p_opt("payment_hash", param_sha256, &payment_hash),
|
2021-09-06 10:51:21 +02:00
|
|
|
p_opt("status", param_string, &status_str),
|
2019-02-23 06:00:04 +01:00
|
|
|
NULL))
|
2019-09-18 12:14:44 +02:00
|
|
|
return command_param_failed();
|
2019-02-23 06:00:04 +01:00
|
|
|
|
2020-01-30 00:55:55 +01:00
|
|
|
req = jsonrpc_request_start(cmd->plugin, cmd, "listsendpays",
|
|
|
|
listsendpays_done, forward_error,
|
2020-12-14 02:24:37 +01:00
|
|
|
cast_const(char *, invstring));
|
|
|
|
if (invstring)
|
|
|
|
json_add_string(req->js, "bolt11", invstring);
|
2020-07-29 10:48:47 +02:00
|
|
|
|
|
|
|
if (payment_hash)
|
|
|
|
json_add_sha256(req->js, "payment_hash", payment_hash);
|
2020-07-31 17:19:22 +02:00
|
|
|
|
2021-09-06 10:51:21 +02:00
|
|
|
if (status_str)
|
|
|
|
json_add_string(req->js, "status", status_str);
|
2020-01-30 00:55:55 +01:00
|
|
|
return send_outreq(cmd->plugin, req);
|
2019-02-23 06:00:04 +01:00
|
|
|
}
|
|
|
|
|
2022-02-26 01:50:33 +01:00
|
|
|
#if DEVELOPER
|
|
|
|
static void memleak_mark_payments(struct plugin *p, struct htable *memtable)
|
|
|
|
{
|
|
|
|
memleak_remove_region(memtable, &payments, sizeof(payments));
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-01-13 04:00:24 +01:00
|
|
|
static const char *init(struct plugin *p,
|
|
|
|
const char *buf UNUSED, const jsmntok_t *config UNUSED)
|
2019-01-15 05:20:27 +01:00
|
|
|
{
|
2021-01-06 06:41:20 +01:00
|
|
|
rpc_scan(p, "getinfo", take(json_out_obj(NULL, NULL, NULL)),
|
|
|
|
"{id:%}", JSON_SCAN(json_to_node_id, &my_id));
|
|
|
|
|
|
|
|
rpc_scan(p, "listconfigs",
|
2021-01-13 09:58:38 +01:00
|
|
|
take(json_out_obj(NULL, NULL, NULL)),
|
|
|
|
"{max-locktime-blocks:%,experimental-offers:%}",
|
|
|
|
JSON_SCAN(json_to_number, &maxdelay_default),
|
|
|
|
JSON_SCAN(json_to_bool, &exp_offers));
|
2021-01-13 04:00:24 +01:00
|
|
|
|
2022-02-26 01:50:33 +01:00
|
|
|
#if DEVELOPER
|
|
|
|
plugin_set_memleak_handler(p, memleak_mark_payments);
|
|
|
|
#endif
|
2021-01-13 04:00:24 +01:00
|
|
|
return NULL;
|
2019-01-15 05:20:27 +01:00
|
|
|
}
|
|
|
|
|
2021-10-04 21:13:11 +02:00
|
|
|
static void on_payment_success(struct payment *payment)
|
|
|
|
{
|
2021-10-05 18:04:18 +02:00
|
|
|
struct payment *p;
|
|
|
|
struct payment_tree_result result = payment_collect_result(payment);
|
|
|
|
struct json_stream *ret;
|
2022-08-03 16:50:39 +02:00
|
|
|
struct command *cmd;
|
2021-10-05 18:04:18 +02:00
|
|
|
assert(result.treestates & PAYMENT_STEP_SUCCESS);
|
|
|
|
assert(result.leafstates & PAYMENT_STEP_SUCCESS);
|
|
|
|
assert(result.preimage != NULL);
|
|
|
|
|
|
|
|
/* Iterate through any pending payments we suspended and
|
|
|
|
* terminate them. */
|
|
|
|
|
|
|
|
list_for_each(&payments, p, list) {
|
|
|
|
/* The result for the active payment is returned in
|
|
|
|
* `payment_finished`. */
|
|
|
|
if (payment == p)
|
|
|
|
continue;
|
2022-08-03 16:47:18 +02:00
|
|
|
|
|
|
|
/* Both groupid and payment_hash must match. This is
|
|
|
|
* because when we suspended the payment itself, we
|
|
|
|
* set the groupid to match. */
|
|
|
|
if (!sha256_eq(payment->payment_hash, p->payment_hash) ||
|
|
|
|
payment->groupid != p->groupid)
|
2021-10-05 18:04:18 +02:00
|
|
|
continue;
|
|
|
|
if (p->cmd == NULL)
|
|
|
|
continue;
|
|
|
|
|
2022-08-03 16:50:39 +02:00
|
|
|
cmd = p->cmd;
|
|
|
|
p->cmd = NULL;
|
|
|
|
|
|
|
|
ret = jsonrpc_stream_success(cmd);
|
2021-10-05 18:04:18 +02:00
|
|
|
json_add_node_id(ret, "destination", p->destination);
|
|
|
|
json_add_sha256(ret, "payment_hash", p->payment_hash);
|
|
|
|
json_add_timeabs(ret, "created_at", p->start_time);
|
|
|
|
json_add_num(ret, "parts", result.attempts);
|
|
|
|
|
|
|
|
json_add_amount_msat_compat(ret, p->amount, "msatoshi",
|
|
|
|
"amount_msat");
|
|
|
|
json_add_amount_msat_compat(ret, result.sent, "msatoshi_sent",
|
|
|
|
"amount_sent_msat");
|
|
|
|
|
|
|
|
if (result.leafstates != PAYMENT_STEP_SUCCESS)
|
|
|
|
json_add_string(
|
|
|
|
ret, "warning_partial_completion",
|
|
|
|
"Some parts of the payment are not yet "
|
|
|
|
"completed, but we have the confirmation "
|
|
|
|
"from the recipient.");
|
|
|
|
json_add_preimage(ret, "payment_preimage", result.preimage);
|
|
|
|
|
|
|
|
json_add_string(ret, "status", "complete");
|
2022-08-03 16:50:39 +02:00
|
|
|
if (command_finished(cmd, ret)) {/* Ignore result. */}
|
2021-10-05 18:04:18 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void payment_add_attempt(struct json_stream *s, const char *fieldname, struct payment *p, bool recurse)
|
|
|
|
{
|
|
|
|
bool finished = p->step >= PAYMENT_STEP_RETRY,
|
|
|
|
success = p->step == PAYMENT_STEP_SUCCESS;
|
|
|
|
|
|
|
|
/* A fieldname is only reasonable if we're not recursing. Otherwise the
|
|
|
|
* fieldname would be reused for all attempts. */
|
|
|
|
assert(!recurse || fieldname == NULL);
|
|
|
|
|
|
|
|
json_object_start(s, fieldname);
|
|
|
|
|
|
|
|
if (!finished)
|
|
|
|
json_add_string(s, "status", "pending");
|
|
|
|
else if (success)
|
|
|
|
json_add_string(s, "status", "success");
|
|
|
|
else
|
|
|
|
json_add_string(s, "status", "failed");
|
|
|
|
|
|
|
|
if (p->failreason != NULL)
|
|
|
|
json_add_string(s, "failreason", p->failreason);
|
|
|
|
|
|
|
|
json_add_u64(s, "partid", p->partid);
|
2022-06-20 12:22:09 +02:00
|
|
|
if (deprecated_apis)
|
|
|
|
json_add_amount_msat_only(s, "amount", p->amount);
|
|
|
|
json_add_amount_msat_only(s, "amount_msat", p->amount);
|
2021-10-05 18:04:18 +02:00
|
|
|
if (p->parent != NULL)
|
|
|
|
json_add_u64(s, "parent_partid", p->parent->partid);
|
|
|
|
|
|
|
|
json_object_end(s);
|
|
|
|
for (size_t i=0; i<tal_count(p->children); i++) {
|
|
|
|
payment_add_attempt(s, fieldname, p->children[i], recurse);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void payment_json_add_attempts(struct json_stream *s,
|
|
|
|
const char *fieldname, struct payment *p)
|
|
|
|
{
|
|
|
|
assert(p == payment_root(p));
|
|
|
|
json_array_start(s, fieldname);
|
|
|
|
payment_add_attempt(s, NULL, p, true);
|
|
|
|
json_array_end(s);
|
2021-10-04 21:13:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void on_payment_failure(struct payment *payment)
|
|
|
|
{
|
2021-10-05 18:04:18 +02:00
|
|
|
struct payment *p;
|
|
|
|
struct payment_tree_result result = payment_collect_result(payment);
|
|
|
|
list_for_each(&payments, p, list)
|
|
|
|
{
|
|
|
|
struct json_stream *ret;
|
|
|
|
struct command *cmd;
|
|
|
|
const char *msg;
|
|
|
|
/* The result for the active payment is returned in
|
|
|
|
* `payment_finished`. */
|
|
|
|
if (payment == p)
|
|
|
|
continue;
|
2022-08-03 16:47:18 +02:00
|
|
|
|
|
|
|
/* When we suspended we've set the groupid to match so
|
|
|
|
* we'd know which calls were duplicates. */
|
|
|
|
if (!sha256_eq(payment->payment_hash, p->payment_hash) ||
|
|
|
|
payment->groupid != p->groupid)
|
2021-10-05 18:04:18 +02:00
|
|
|
continue;
|
|
|
|
if (p->cmd == NULL)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
cmd = p->cmd;
|
2022-08-03 16:50:39 +02:00
|
|
|
p->cmd = NULL;
|
2021-10-05 18:04:18 +02:00
|
|
|
if (p->aborterror != NULL) {
|
|
|
|
/* We set an explicit toplevel error message,
|
|
|
|
* so let's report that. */
|
|
|
|
ret = jsonrpc_stream_fail(cmd, PAY_STOPPED_RETRYING,
|
|
|
|
p->aborterror);
|
|
|
|
payment_json_add_attempts(ret, "attempts", p);
|
|
|
|
|
|
|
|
if (command_finished(cmd, ret)) {/* Ignore result. */}
|
|
|
|
} else if (result.failure == NULL || result.failure->failcode < NODE) {
|
|
|
|
/* This is failing because we have no more routes to try */
|
|
|
|
msg = tal_fmt(cmd,
|
|
|
|
"Ran out of routes to try after "
|
|
|
|
"%d attempt%s: see `paystatus`",
|
|
|
|
result.attempts,
|
|
|
|
result.attempts == 1 ? "" : "s");
|
|
|
|
ret = jsonrpc_stream_fail(cmd, PAY_STOPPED_RETRYING,
|
|
|
|
msg);
|
|
|
|
payment_json_add_attempts(ret, "attempts", p);
|
|
|
|
|
|
|
|
if (command_finished(cmd, ret)) {/* Ignore result. */}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
struct payment_result *failure = result.failure;
|
|
|
|
assert(failure!= NULL);
|
|
|
|
|
|
|
|
ret = jsonrpc_stream_fail(cmd, failure->code,
|
|
|
|
failure->message);
|
|
|
|
|
|
|
|
json_add_u64(ret, "id", failure->id);
|
|
|
|
|
|
|
|
json_add_u32(ret, "failcode", failure->failcode);
|
|
|
|
json_add_string(ret, "failcodename",
|
|
|
|
failure->failcodename);
|
|
|
|
|
|
|
|
if (p->invstring)
|
|
|
|
json_add_invstring(ret, p->invstring);
|
|
|
|
|
|
|
|
json_add_hex_talarr(ret, "raw_message",
|
|
|
|
result.failure->raw_message);
|
|
|
|
json_add_num(ret, "created_at", p->start_time.ts.tv_sec);
|
|
|
|
json_add_node_id(ret, "destination", p->destination);
|
|
|
|
json_add_sha256(ret, "payment_hash", p->payment_hash);
|
|
|
|
// OK
|
|
|
|
if (result.leafstates & PAYMENT_STEP_SUCCESS) {
|
|
|
|
/* If one sub-payment succeeded then we have
|
|
|
|
* proof of payment, and the payment is a
|
|
|
|
* success. */
|
|
|
|
json_add_string(ret, "status", "complete");
|
|
|
|
|
|
|
|
} else if (result.leafstates & ~PAYMENT_STEP_FAILED) {
|
|
|
|
/* If there are non-failed leafs we are still trying. */
|
|
|
|
json_add_string(ret, "status", "pending");
|
|
|
|
|
|
|
|
} else {
|
|
|
|
json_add_string(ret, "status", "failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
json_add_amount_msat_compat(ret, p->amount, "msatoshi",
|
|
|
|
"amount_msat");
|
|
|
|
|
|
|
|
json_add_amount_msat_compat(ret, result.sent,
|
|
|
|
"msatoshi_sent",
|
|
|
|
"amount_sent_msat");
|
|
|
|
|
|
|
|
if (failure != NULL) {
|
|
|
|
if (failure->erring_index)
|
|
|
|
json_add_num(ret, "erring_index",
|
|
|
|
*failure->erring_index);
|
|
|
|
|
|
|
|
if (failure->erring_node)
|
|
|
|
json_add_node_id(ret, "erring_node",
|
|
|
|
failure->erring_node);
|
|
|
|
|
|
|
|
if (failure->erring_channel)
|
|
|
|
json_add_short_channel_id(
|
|
|
|
ret, "erring_channel",
|
|
|
|
failure->erring_channel);
|
|
|
|
|
|
|
|
if (failure->erring_direction)
|
|
|
|
json_add_num(
|
|
|
|
ret, "erring_direction",
|
|
|
|
*failure->erring_direction);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (command_finished(cmd, ret)) { /* Ignore result. */}
|
|
|
|
}
|
|
|
|
}
|
2021-10-04 21:13:11 +02:00
|
|
|
}
|
|
|
|
|
2021-09-29 17:56:54 +02:00
|
|
|
/* We are interested in any prior attempts to pay this payment_hash /
|
|
|
|
* invoice so we can set the `groupid` correctly and ensure we don't
|
2021-09-30 18:38:48 +02:00
|
|
|
* already have a pending payment running. We also collect the summary
|
|
|
|
* about an eventual previous complete payment so we can return that
|
|
|
|
* as a no-op. */
|
2021-09-29 17:56:54 +02:00
|
|
|
static struct command_result *
|
|
|
|
payment_listsendpays_previous(struct command *cmd, const char *buf,
|
|
|
|
const jsmntok_t *result, struct payment *p)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
const jsmntok_t *t, *arr, *err;
|
|
|
|
/* What was the groupid of an eventual previous attempt? */
|
|
|
|
u64 last_group = 0;
|
|
|
|
/* Do we have pending sendpays for the previous attempt? */
|
|
|
|
bool pending = false;
|
2022-08-03 16:45:44 +02:00
|
|
|
|
|
|
|
/* Group ID of the first pending payment, this will be the one
|
|
|
|
* who's result gets replayed if we end up suspending. */
|
|
|
|
u64 pending_group_id = 0;
|
2021-09-29 17:56:54 +02:00
|
|
|
/* Did a prior attempt succeed? */
|
|
|
|
bool completed = false;
|
|
|
|
|
2021-09-30 18:38:48 +02:00
|
|
|
/* Metadata for a complete payment, if one exists. */
|
|
|
|
struct json_stream *ret;
|
|
|
|
u32 parts = 0;
|
|
|
|
struct preimage preimage;
|
|
|
|
struct amount_msat sent, msat;
|
|
|
|
struct node_id destination;
|
|
|
|
u32 created_at;
|
|
|
|
|
2021-09-29 17:56:54 +02:00
|
|
|
err = json_get_member(buf, result, "error");
|
|
|
|
if (err)
|
|
|
|
return command_fail(
|
|
|
|
cmd, LIGHTNINGD,
|
|
|
|
"Error retrieving previous pay attempts: %s",
|
|
|
|
json_strdup(tmpctx, buf, err));
|
|
|
|
|
|
|
|
arr = json_get_member(buf, result, "payments");
|
|
|
|
if (!arr || arr->type != JSMN_ARRAY)
|
|
|
|
return command_fail(
|
|
|
|
cmd, LIGHTNINGD,
|
|
|
|
"Unexpected non-array result from listsendpays");
|
|
|
|
|
|
|
|
/* We iterate through all prior sendpays, looking for the
|
|
|
|
* latest group and remembering what its state is. */
|
|
|
|
json_for_each_arr(i, t, arr)
|
|
|
|
{
|
|
|
|
u64 groupid;
|
|
|
|
const jsmntok_t *status, *grouptok;
|
2021-09-30 18:38:48 +02:00
|
|
|
struct amount_msat diff_sent, diff_msat;
|
2021-09-29 17:56:54 +02:00
|
|
|
grouptok = json_get_member(buf, t, "groupid");
|
|
|
|
json_to_u64(buf, grouptok, &groupid);
|
|
|
|
|
|
|
|
/* New group, reset what we collected. */
|
|
|
|
if (last_group != groupid) {
|
|
|
|
completed = false;
|
|
|
|
pending = false;
|
|
|
|
last_group = groupid;
|
2021-09-30 18:38:48 +02:00
|
|
|
|
|
|
|
parts = 1;
|
|
|
|
json_scan(tmpctx, buf, t,
|
|
|
|
"{destination:%"
|
|
|
|
",created_at:%"
|
|
|
|
",amount_msat:%"
|
|
|
|
",amount_sent_msat:%"
|
|
|
|
",payment_preimage:%}",
|
|
|
|
JSON_SCAN(json_to_node_id, &destination),
|
|
|
|
JSON_SCAN(json_to_u32, &created_at),
|
|
|
|
JSON_SCAN(json_to_msat, &msat),
|
|
|
|
JSON_SCAN(json_to_msat, &sent),
|
|
|
|
JSON_SCAN(json_to_preimage, &preimage));
|
|
|
|
} else {
|
|
|
|
json_scan(tmpctx, buf, t,
|
|
|
|
"{amount_msat:%"
|
|
|
|
",amount_sent_msat:%}",
|
|
|
|
JSON_SCAN(json_to_msat, &diff_msat),
|
|
|
|
JSON_SCAN(json_to_msat, &diff_sent));
|
|
|
|
if (!amount_msat_add(&msat, msat, diff_msat) ||
|
|
|
|
!amount_msat_add(&sent, sent, diff_sent))
|
|
|
|
plugin_err(p->plugin,
|
|
|
|
"msat overflow adding up parts");
|
|
|
|
parts++;
|
2021-09-29 17:56:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
status = json_get_member(buf, t, "status");
|
|
|
|
completed |= json_tok_streq(buf, status, "complete");
|
|
|
|
pending |= json_tok_streq(buf, status, "pending");
|
2022-08-03 16:45:44 +02:00
|
|
|
|
|
|
|
/* Remember the group id of the first pending group so
|
|
|
|
* we can replay its result later. */
|
|
|
|
if (!pending_group_id && pending)
|
|
|
|
pending_group_id = groupid;
|
2021-09-29 17:56:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (completed) {
|
2021-09-30 18:38:48 +02:00
|
|
|
ret = jsonrpc_stream_success(cmd);
|
|
|
|
json_add_preimage(ret, "payment_preimage", &preimage);
|
|
|
|
json_add_string(ret, "status", "complete");
|
|
|
|
json_add_amount_msat_compat(ret, msat, "msatoshi",
|
|
|
|
"amount_msat");
|
|
|
|
json_add_amount_msat_compat(ret, sent, "msatoshi_sent",
|
|
|
|
"amount_sent_msat");
|
|
|
|
json_add_node_id(ret, "destination", p->destination);
|
|
|
|
json_add_sha256(ret, "payment_hash", p->payment_hash);
|
|
|
|
json_add_u32(ret, "created_at", created_at);
|
|
|
|
json_add_num(ret, "parts", parts);
|
|
|
|
return command_finished(cmd, ret);
|
2021-09-29 17:56:54 +02:00
|
|
|
} else if (pending) {
|
2021-10-05 18:04:18 +02:00
|
|
|
/* We suspend this call and wait for the
|
|
|
|
* `on_payment_success` or `on_payment_failure`
|
|
|
|
* handler of the currently running payment to notify
|
2022-08-03 16:45:44 +02:00
|
|
|
* us about its completion. We latch on to the result
|
|
|
|
* from the call we extracted above. */
|
|
|
|
p->groupid = pending_group_id;
|
2021-10-05 18:04:18 +02:00
|
|
|
return command_still_pending(cmd);
|
2021-09-29 17:56:54 +02:00
|
|
|
}
|
|
|
|
p->groupid = last_group + 1;
|
2021-10-04 21:13:11 +02:00
|
|
|
p->on_payment_success = on_payment_success;
|
|
|
|
p->on_payment_failure = on_payment_failure;
|
2021-09-29 17:56:54 +02:00
|
|
|
payment_start(p);
|
|
|
|
return command_still_pending(cmd);
|
|
|
|
}
|
|
|
|
|
2020-05-29 15:16:40 +02:00
|
|
|
struct payment_modifier *paymod_mods[] = {
|
2021-11-18 20:24:24 +01:00
|
|
|
/* NOTE: The order in which these four paymods are executed is
|
|
|
|
* significant!
|
|
|
|
* local_channel_hints *must* execute first before route_exclusions
|
|
|
|
* which *must* execute before directpay.
|
|
|
|
* exemptfee *must* also execute before directpay.
|
|
|
|
*/
|
2020-06-09 18:30:14 +02:00
|
|
|
&local_channel_hints_pay_mod,
|
2021-11-18 20:24:24 +01:00
|
|
|
&route_exclusions_pay_mod,
|
2020-06-03 17:58:20 +02:00
|
|
|
&exemptfee_pay_mod,
|
2020-07-18 10:10:51 +02:00
|
|
|
&directpay_pay_mod,
|
|
|
|
&shadowroute_pay_mod,
|
2020-08-14 04:54:31 +02:00
|
|
|
/* NOTE: The order in which these three paymods are executed is
|
2020-08-06 06:56:25 +02:00
|
|
|
* significant!
|
2020-08-14 04:54:31 +02:00
|
|
|
* routehints *must* execute first before payee_incoming_limit
|
|
|
|
* which *must* execute bfore presplit.
|
2020-08-06 06:56:25 +02:00
|
|
|
*
|
|
|
|
* FIXME: Giving an ordered list of paymods to the paymod
|
|
|
|
* system is the wrong interface, given that the order in
|
|
|
|
* which paymods execute is significant.
|
|
|
|
* (This is typical of Entity-Component-System pattern.)
|
|
|
|
* What should be done is that libplugin-pay should have a
|
|
|
|
* canonical list of paymods in the order they execute
|
|
|
|
* correctly, and whether they are default-enabled/default-disabled,
|
|
|
|
* and then clients like `pay` and `keysend` will disable/enable
|
|
|
|
* paymods that do not help them, instead of the current interface
|
|
|
|
* where clients provide an *ordered* list of paymods they want to
|
|
|
|
* use.
|
|
|
|
*/
|
2020-05-29 17:10:47 +02:00
|
|
|
&routehints_pay_mod,
|
2020-08-14 04:54:31 +02:00
|
|
|
&payee_incoming_limit_pay_mod,
|
2020-08-06 06:56:25 +02:00
|
|
|
&presplit_pay_mod,
|
2020-06-11 11:38:41 +02:00
|
|
|
&waitblockheight_pay_mod,
|
2020-05-08 16:51:43 +02:00
|
|
|
&retry_pay_mod,
|
2020-07-06 22:21:40 +02:00
|
|
|
&adaptive_splitter_pay_mod,
|
2020-05-08 15:03:48 +02:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
2022-02-26 01:50:33 +01:00
|
|
|
static void destroy_payment(struct payment *p)
|
|
|
|
{
|
|
|
|
list_del(&p->list);
|
|
|
|
}
|
|
|
|
|
2022-04-02 04:18:05 +02:00
|
|
|
static struct command_result *json_pay(struct command *cmd,
|
|
|
|
const char *buf,
|
|
|
|
const jsmntok_t *params)
|
2020-05-08 15:03:48 +02:00
|
|
|
{
|
|
|
|
struct payment *p;
|
|
|
|
const char *b11str;
|
|
|
|
struct bolt11 *b11;
|
2021-03-09 09:50:53 +01:00
|
|
|
char *b11_fail, *b12_fail;
|
2020-06-03 15:59:12 +02:00
|
|
|
u64 *maxfee_pct_millionths;
|
|
|
|
u32 *maxdelay;
|
2022-04-02 04:25:04 +02:00
|
|
|
struct amount_msat *exemptfee, *msat, *maxfee;
|
2022-04-02 04:33:05 +02:00
|
|
|
const char *label, *description;
|
2020-06-11 11:38:41 +02:00
|
|
|
unsigned int *retryfor;
|
2020-06-11 15:53:55 +02:00
|
|
|
u64 *riskfactor_millionths;
|
2020-07-03 17:24:46 +02:00
|
|
|
struct shadow_route_data *shadow_route;
|
2020-12-14 02:25:37 +01:00
|
|
|
struct amount_msat *invmsat;
|
|
|
|
u64 invexpiry;
|
2020-12-14 02:24:37 +01:00
|
|
|
struct sha256 *local_offer_id;
|
2020-12-14 02:25:37 +01:00
|
|
|
const struct tlv_invoice *b12;
|
2021-09-29 17:56:54 +02:00
|
|
|
struct out_req *req;
|
2021-11-18 20:24:24 +01:00
|
|
|
struct route_exclusion **exclusions;
|
2020-07-02 15:33:55 +02:00
|
|
|
#if DEVELOPER
|
|
|
|
bool *use_shadow;
|
|
|
|
#endif
|
2020-06-03 15:59:12 +02:00
|
|
|
|
2020-05-08 15:03:48 +02:00
|
|
|
/* If any of the modifiers need to add params to the JSON-RPC call we
|
|
|
|
* would add them to the `param()` call below, and have them be
|
|
|
|
* initialized directly that way. */
|
2020-12-14 02:25:37 +01:00
|
|
|
if (!param(cmd, buf, params,
|
|
|
|
/* FIXME: parameter should be invstring now */
|
|
|
|
p_req("bolt11", param_string, &b11str),
|
lightningd: change `msatoshi` args to `amount_msat`.
This is consistent with our output changes, and increases consistency.
It also keeps future sanity checks happy, that we only use JSON msat
helpers with '_msat' fields.
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Changelog-Changed: JSON-RPC: `invoice`, `sendonion`, `sendpay`, `pay`, `keysend`, `fetchinvoice`, `sendinvoice`: `msatoshi` argument is now called `amount_msat` to match other fields.
Changelog-Deprecated: JSON-RPC: `invoice`, `sendonion`, `sendpay`, `pay`, `keysend`, `fetchinvoice`, `sendinvoice` `msatoshi` (use `amount_msat`)
2022-06-19 09:20:11 +02:00
|
|
|
p_opt("amount_msat|msatoshi", param_msat, &msat),
|
2020-07-02 15:33:55 +02:00
|
|
|
p_opt("label", param_string, &label),
|
2020-06-11 15:53:55 +02:00
|
|
|
p_opt_def("riskfactor", param_millionths,
|
|
|
|
&riskfactor_millionths, 10000000),
|
2022-04-02 04:25:04 +02:00
|
|
|
p_opt("maxfeepercent", param_millionths,
|
|
|
|
&maxfee_pct_millionths),
|
2020-06-11 16:55:58 +02:00
|
|
|
p_opt_def("retry_for", param_number, &retryfor, 60),
|
|
|
|
p_opt_def("maxdelay", param_number, &maxdelay,
|
|
|
|
maxdelay_default),
|
2022-04-02 04:25:04 +02:00
|
|
|
p_opt("exemptfee", param_msat, &exemptfee),
|
2020-12-15 00:43:42 +01:00
|
|
|
p_opt("localofferid", param_sha256, &local_offer_id),
|
2021-11-18 20:24:24 +01:00
|
|
|
p_opt("exclude", param_route_exclusion_array, &exclusions),
|
2022-04-02 04:25:04 +02:00
|
|
|
p_opt("maxfee", param_msat, &maxfee),
|
2022-04-02 04:33:05 +02:00
|
|
|
p_opt("description", param_string, &description),
|
2020-07-02 15:33:55 +02:00
|
|
|
#if DEVELOPER
|
|
|
|
p_opt_def("use_shadow", param_bool, &use_shadow, true),
|
|
|
|
#endif
|
2020-05-08 15:03:48 +02:00
|
|
|
NULL))
|
|
|
|
return command_param_failed();
|
|
|
|
|
2020-10-20 06:01:30 +02:00
|
|
|
p = payment_new(cmd, cmd, NULL /* No parent */, paymod_mods);
|
2020-12-14 02:25:37 +01:00
|
|
|
p->invstring = tal_steal(p, b11str);
|
2022-04-02 04:33:35 +02:00
|
|
|
p->description = tal_steal(p, description);
|
2020-10-20 06:01:30 +02:00
|
|
|
|
2021-03-09 09:50:53 +01:00
|
|
|
if (!bolt12_has_prefix(b11str)) {
|
|
|
|
b11 =
|
2022-02-26 01:50:33 +01:00
|
|
|
bolt11_decode(tmpctx, b11str, plugin_feature_set(cmd->plugin),
|
2022-04-02 04:33:05 +02:00
|
|
|
description, chainparams, &b11_fail);
|
2021-03-02 13:12:05 +01:00
|
|
|
if (b11 == NULL)
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
2021-03-09 09:50:53 +01:00
|
|
|
"Invalid bolt11: %s", b11_fail);
|
|
|
|
|
2020-12-14 02:25:37 +01:00
|
|
|
invmsat = b11->msat;
|
|
|
|
invexpiry = b11->timestamp + b11->expiry;
|
|
|
|
|
|
|
|
p->destination = tal_dup(p, struct node_id, &b11->receiver_id);
|
|
|
|
p->payment_hash = tal_dup(p, struct sha256, &b11->payment_hash);
|
2021-03-02 13:12:05 +01:00
|
|
|
p->payment_secret =
|
2021-12-28 00:21:09 +01:00
|
|
|
tal_dup_or_null(p, struct secret, b11->payment_secret);
|
2022-03-31 11:10:50 +02:00
|
|
|
if (b11->metadata)
|
|
|
|
p->payment_metadata = tal_dup_talarr(p, u8, b11->metadata);
|
|
|
|
else
|
|
|
|
p->payment_metadata = NULL;
|
2022-02-26 01:50:33 +01:00
|
|
|
/* FIXME: libplugin-pay plays with this array, and there are many FIXMEs
|
|
|
|
* about it. But it looks like a leak, so we suppress it here. */
|
|
|
|
p->routes = notleak_with_children(tal_steal(p, b11->routes));
|
2020-12-14 02:25:37 +01:00
|
|
|
p->min_final_cltv_expiry = b11->min_final_cltv_expiry;
|
|
|
|
p->features = tal_steal(p, b11->features);
|
|
|
|
/* Sanity check */
|
2021-03-02 13:12:05 +01:00
|
|
|
if (feature_offered(b11->features, OPT_VAR_ONION) &&
|
|
|
|
!b11->payment_secret)
|
|
|
|
return command_fail(
|
|
|
|
cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"Invalid bolt11:"
|
|
|
|
" sets feature var_onion with no secret");
|
2022-04-02 04:33:05 +02:00
|
|
|
|
|
|
|
/* BOLT #11:
|
|
|
|
* A reader:
|
|
|
|
*...
|
|
|
|
* - MUST check that the SHA2 256-bit hash in the `h` field
|
|
|
|
* exactly matches the hashed description.
|
|
|
|
*/
|
|
|
|
if (!b11->description && !deprecated_apis) {
|
|
|
|
if (!b11->description_hash) {
|
|
|
|
return command_fail(cmd,
|
|
|
|
JSONRPC2_INVALID_PARAMS,
|
|
|
|
"Invalid bolt11: missing description");
|
|
|
|
}
|
|
|
|
if (!description)
|
|
|
|
return command_fail(cmd,
|
|
|
|
JSONRPC2_INVALID_PARAMS,
|
|
|
|
"bolt11 uses description_hash, but you did not provide description parameter");
|
|
|
|
}
|
2021-03-02 13:12:05 +01:00
|
|
|
} else {
|
2022-02-26 01:50:33 +01:00
|
|
|
b12 = invoice_decode(tmpctx, b11str, strlen(b11str),
|
2021-03-02 13:12:05 +01:00
|
|
|
plugin_feature_set(cmd->plugin),
|
2021-03-09 09:50:53 +01:00
|
|
|
chainparams, &b12_fail);
|
2021-03-02 13:12:05 +01:00
|
|
|
if (b12 == NULL)
|
2020-12-14 02:25:37 +01:00
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
2021-03-09 09:50:53 +01:00
|
|
|
"Invalid bolt12: %s", b12_fail);
|
2021-01-13 09:58:38 +01:00
|
|
|
if (!exp_offers)
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"experimental-offers disabled");
|
|
|
|
|
2020-12-14 02:25:37 +01:00
|
|
|
p->features = tal_steal(p, b12->features);
|
|
|
|
|
|
|
|
if (!b12->node_id)
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"invoice missing node_id");
|
|
|
|
if (!b12->payment_hash)
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"invoice missing payment_hash");
|
2021-07-21 03:31:39 +02:00
|
|
|
if (!b12->created_at)
|
2020-12-14 02:25:37 +01:00
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
2021-07-21 03:31:39 +02:00
|
|
|
"invoice missing created_at");
|
2020-12-14 02:25:37 +01:00
|
|
|
if (b12->amount) {
|
|
|
|
invmsat = tal(cmd, struct amount_msat);
|
|
|
|
*invmsat = amount_msat(*b12->amount);
|
|
|
|
} else
|
|
|
|
invmsat = NULL;
|
|
|
|
|
2021-10-08 00:54:42 +02:00
|
|
|
/* FIXME: gossmap should store as point32 */
|
2020-12-14 02:25:37 +01:00
|
|
|
p->destination = tal(p, struct node_id);
|
2021-03-02 13:12:05 +01:00
|
|
|
gossmap_guess_node_id(get_gossmap(cmd->plugin), b12->node_id,
|
2020-12-14 02:25:37 +01:00
|
|
|
p->destination);
|
|
|
|
p->payment_hash = tal_dup(p, struct sha256, b12->payment_hash);
|
|
|
|
if (b12->recurrence_counter && !label)
|
2021-03-02 13:12:05 +01:00
|
|
|
return command_fail(
|
|
|
|
cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"recurring invoice requires a label");
|
2020-12-14 02:25:37 +01:00
|
|
|
/* FIXME payment_secret should be signature! */
|
|
|
|
{
|
|
|
|
struct sha256 merkle;
|
|
|
|
|
|
|
|
p->payment_secret = tal(p, struct secret);
|
|
|
|
merkle_tlv(b12->fields, &merkle);
|
|
|
|
memcpy(p->payment_secret, &merkle, sizeof(merkle));
|
2021-03-02 13:12:05 +01:00
|
|
|
BUILD_ASSERT(sizeof(*p->payment_secret) ==
|
|
|
|
sizeof(merkle));
|
2020-12-14 02:25:37 +01:00
|
|
|
}
|
2022-03-31 11:10:50 +02:00
|
|
|
p->payment_metadata = NULL;
|
2020-12-14 02:25:37 +01:00
|
|
|
p->routes = NULL;
|
|
|
|
/* FIXME: paths! */
|
|
|
|
if (b12->cltv)
|
|
|
|
p->min_final_cltv_expiry = *b12->cltv;
|
|
|
|
else
|
|
|
|
p->min_final_cltv_expiry = 18;
|
|
|
|
/* BOLT-offers #12:
|
|
|
|
* - if `relative_expiry` is present:
|
|
|
|
* - MUST reject the invoice if the current time since
|
2021-07-21 03:31:39 +02:00
|
|
|
* 1970-01-01 UTC is greater than `created_at` plus
|
|
|
|
* `seconds_from_creation`.
|
2020-12-14 02:25:37 +01:00
|
|
|
* - otherwise:
|
|
|
|
* - MUST reject the invoice if the current time since
|
2021-07-21 03:31:39 +02:00
|
|
|
* 1970-01-01 UTC is greater than `created_at` plus
|
2021-03-02 13:12:05 +01:00
|
|
|
* 7200.
|
2020-12-14 02:25:37 +01:00
|
|
|
*/
|
|
|
|
if (b12->relative_expiry)
|
2021-07-21 03:31:39 +02:00
|
|
|
invexpiry = *b12->created_at + *b12->relative_expiry;
|
2020-12-14 02:25:37 +01:00
|
|
|
else
|
2021-07-21 03:31:39 +02:00
|
|
|
invexpiry = *b12->created_at + BOLT12_DEFAULT_REL_EXPIRY;
|
2020-12-14 02:25:37 +01:00
|
|
|
p->local_offer_id = tal_steal(p, local_offer_id);
|
2021-03-02 13:12:05 +01:00
|
|
|
}
|
2020-05-08 15:03:48 +02:00
|
|
|
|
2020-12-14 02:25:37 +01:00
|
|
|
if (time_now().ts.tv_sec > invexpiry)
|
2020-05-08 15:03:48 +02:00
|
|
|
return command_fail(cmd, PAY_INVOICE_EXPIRED, "Invoice expired");
|
|
|
|
|
2020-12-14 02:25:37 +01:00
|
|
|
if (invmsat) {
|
2020-06-08 13:53:24 +02:00
|
|
|
if (msat) {
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"msatoshi parameter unnecessary");
|
|
|
|
}
|
2020-12-14 02:25:37 +01:00
|
|
|
p->amount = *invmsat;
|
2022-02-26 01:50:33 +01:00
|
|
|
tal_free(invmsat);
|
2020-06-08 13:53:24 +02:00
|
|
|
} else {
|
|
|
|
if (!msat) {
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"msatoshi parameter required");
|
|
|
|
}
|
|
|
|
p->amount = *msat;
|
|
|
|
}
|
2020-05-08 15:03:48 +02:00
|
|
|
|
2021-02-07 21:00:02 +01:00
|
|
|
if (node_id_eq(&my_id, p->destination))
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"This payment is destined for ourselves. "
|
|
|
|
"Self-payments are not supported");
|
|
|
|
|
2020-05-30 15:33:49 +02:00
|
|
|
p->local_id = &my_id;
|
2020-05-08 15:03:48 +02:00
|
|
|
p->json_buffer = tal_steal(p, buf);
|
|
|
|
p->json_toks = params;
|
2020-05-29 17:08:20 +02:00
|
|
|
p->why = "Initial attempt";
|
2020-06-04 15:44:19 +02:00
|
|
|
p->constraints.cltv_budget = *maxdelay;
|
2022-02-26 01:50:33 +01:00
|
|
|
tal_free(maxdelay);
|
2020-06-11 11:38:41 +02:00
|
|
|
p->deadline = timeabs_add(time_now(), time_from_sec(*retryfor));
|
2022-02-26 01:50:33 +01:00
|
|
|
tal_free(retryfor);
|
2020-06-11 15:53:55 +02:00
|
|
|
p->getroute->riskfactorppm = *riskfactor_millionths;
|
2022-02-26 01:50:33 +01:00
|
|
|
tal_free(riskfactor_millionths);
|
2020-06-03 15:59:12 +02:00
|
|
|
|
2022-04-02 04:25:04 +02:00
|
|
|
if (maxfee) {
|
|
|
|
if (maxfee_pct_millionths || exemptfee) {
|
|
|
|
return command_fail(
|
|
|
|
cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"If you specify maxfee, cannot specify maxfeepercent or exemptfee.");
|
|
|
|
}
|
|
|
|
p->constraints.fee_budget = *maxfee;
|
|
|
|
payment_mod_exemptfee_get_data(p)->amount = AMOUNT_MSAT(0);
|
|
|
|
} else {
|
|
|
|
u64 maxppm;
|
|
|
|
|
|
|
|
if (maxfee_pct_millionths)
|
|
|
|
maxppm = *maxfee_pct_millionths / 100;
|
|
|
|
else
|
|
|
|
maxppm = 500000 / 100;
|
|
|
|
if (!amount_msat_fee(&p->constraints.fee_budget, p->amount, 0,
|
|
|
|
maxppm)) {
|
|
|
|
return command_fail(
|
|
|
|
cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"Overflow when computing fee budget, fee rate too high.");
|
|
|
|
}
|
|
|
|
payment_mod_exemptfee_get_data(p)->amount
|
|
|
|
= exemptfee ? *exemptfee : AMOUNT_MSAT(5000);
|
|
|
|
|
|
|
|
/* We free unneeded params now to keep memleak happy. */
|
|
|
|
tal_free(maxfee_pct_millionths);
|
|
|
|
tal_free(exemptfee);
|
2020-06-03 15:59:12 +02:00
|
|
|
}
|
2020-06-03 17:58:20 +02:00
|
|
|
|
2020-07-03 17:24:46 +02:00
|
|
|
shadow_route = payment_mod_shadowroute_get_data(p);
|
2020-07-10 14:48:00 +02:00
|
|
|
payment_mod_presplit_get_data(p)->disable = disablempp;
|
|
|
|
payment_mod_adaptive_splitter_get_data(p)->disable = disablempp;
|
2021-11-18 20:24:24 +01:00
|
|
|
payment_mod_route_exclusions_get_data(p)->exclusions = exclusions;
|
2020-07-03 17:24:46 +02:00
|
|
|
|
|
|
|
/* This is an MPP enabled pay command, disable amount fuzzing. */
|
|
|
|
shadow_route->fuzz_amount = false;
|
2020-07-02 15:33:55 +02:00
|
|
|
#if DEVELOPER
|
2020-07-03 17:24:46 +02:00
|
|
|
shadow_route->use_shadow = *use_shadow;
|
2022-02-26 01:50:33 +01:00
|
|
|
tal_free(use_shadow);
|
2020-07-02 15:33:55 +02:00
|
|
|
#endif
|
|
|
|
p->label = tal_steal(p, label);
|
2020-05-18 18:47:21 +02:00
|
|
|
list_add_tail(&payments, &p->list);
|
2022-02-26 01:50:33 +01:00
|
|
|
tal_add_destructor(p, destroy_payment);
|
2020-10-20 06:01:30 +02:00
|
|
|
/* We're keeping this around now */
|
|
|
|
tal_steal(cmd->plugin, p);
|
2020-05-08 15:03:48 +02:00
|
|
|
|
2021-09-29 17:56:54 +02:00
|
|
|
req = jsonrpc_request_start(cmd->plugin, cmd, "listsendpays",
|
|
|
|
payment_listsendpays_previous,
|
|
|
|
payment_listsendpays_previous, p);
|
|
|
|
|
|
|
|
json_add_sha256(req->js, "payment_hash", p->payment_hash);
|
|
|
|
return send_outreq(cmd->plugin, req);
|
2020-05-08 15:03:48 +02:00
|
|
|
}
|
|
|
|
|
2020-07-02 14:52:16 +02:00
|
|
|
static const struct plugin_command commands[] = {
|
|
|
|
{
|
2019-01-15 11:04:07 +01:00
|
|
|
"paystatus",
|
2019-05-22 16:27:34 +02:00
|
|
|
"payment",
|
2019-01-15 11:04:07 +01:00
|
|
|
"Detail status of attempts to pay {bolt11}, or all",
|
|
|
|
"Covers both old payments and current ones.",
|
2019-02-23 06:00:04 +01:00
|
|
|
json_paystatus
|
2019-02-23 06:00:04 +01:00
|
|
|
}, {
|
|
|
|
"listpays",
|
2019-05-22 16:27:34 +02:00
|
|
|
"payment",
|
2020-07-29 10:48:47 +02:00
|
|
|
"List result of payment {bolt11} or {payment_hash}, or all",
|
2019-02-23 06:00:04 +01:00
|
|
|
"Covers old payments (failed and succeeded) and current ones.",
|
2019-02-23 06:00:04 +01:00
|
|
|
json_listpays
|
2020-05-08 15:03:48 +02:00
|
|
|
},
|
|
|
|
{
|
2020-07-02 14:52:16 +02:00
|
|
|
"pay",
|
2020-05-08 15:03:48 +02:00
|
|
|
"payment",
|
|
|
|
"Send payment specified by {bolt11}",
|
2020-07-02 14:52:16 +02:00
|
|
|
"Attempt to pay the {bolt11} invoice.",
|
2022-04-02 04:18:05 +02:00
|
|
|
json_pay
|
2020-05-08 15:03:48 +02:00
|
|
|
},
|
2019-01-15 05:14:27 +01:00
|
|
|
};
|
|
|
|
|
2021-04-28 18:36:56 +02:00
|
|
|
static const char *notification_topics[] = {
|
|
|
|
"pay_success",
|
|
|
|
"pay_failure",
|
|
|
|
};
|
|
|
|
|
2019-01-15 05:14:27 +01:00
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
2019-02-23 06:00:02 +01:00
|
|
|
setup_locale();
|
2020-07-20 14:39:32 +02:00
|
|
|
plugin_main(argv, init, PLUGIN_RESTARTABLE, true, NULL, commands,
|
2020-07-10 14:48:00 +02:00
|
|
|
ARRAY_SIZE(commands), NULL, 0, NULL, 0,
|
2021-04-28 18:36:56 +02:00
|
|
|
notification_topics, ARRAY_SIZE(notification_topics),
|
2020-07-10 14:48:00 +02:00
|
|
|
plugin_option("disable-mpp", "flag",
|
|
|
|
"Disable multi-part payments.",
|
|
|
|
flag_option, &disablempp),
|
|
|
|
NULL);
|
2019-01-15 05:14:27 +01:00
|
|
|
}
|