2021-12-04 12:23:56 +01:00
# include "config.h"
2020-12-16 04:18:00 +01:00
# include <bitcoin/chainparams.h>
# include <ccan/array_size/array_size.h>
2021-09-30 23:19:36 +02:00
# include <ccan/cast/cast.h>
2020-12-16 04:18:00 +01:00
# include <ccan/json_out/json_out.h>
2020-12-16 04:18:20 +01:00
# include <ccan/mem/mem.h>
2020-12-16 04:18:42 +01:00
# include <ccan/str/hex/hex.h>
2020-12-16 04:18:00 +01:00
# include <ccan/tal/str/str.h>
# include <common/blindedpath.h>
# include <common/bolt12_merkle.h>
# include <common/dijkstra.h>
# include <common/gossmap.h>
2022-07-04 05:49:38 +02:00
# include <common/json_param.h>
2020-12-16 04:18:00 +01:00
# include <common/json_stream.h>
# include <common/memleak.h>
2020-12-16 04:18:20 +01:00
# include <common/overflows.h>
2020-12-16 04:18:00 +01:00
# include <common/route.h>
# include <common/type_to_string.h>
# include <errno.h>
# include <plugins/libplugin.h>
2020-12-16 04:18:20 +01:00
# include <secp256k1_schnorrsig.h>
2021-09-16 07:00:42 +02:00
# include <sodium.h>
2020-12-16 04:18:00 +01:00
static struct gossmap * global_gossmap ;
2021-09-21 07:23:45 +02:00
static struct pubkey local_id ;
2021-07-01 06:28:57 +02:00
static bool disable_connect = false ;
2020-12-16 04:18:20 +01:00
static LIST_HEAD ( sent_list ) ;
2020-12-16 04:18:00 +01:00
struct sent {
2020-12-16 04:18:20 +01:00
/* We're in sent_invreqs, awaiting reply. */
struct list_node list ;
2022-11-09 02:30:10 +01:00
/* The secret used by reply */
struct secret * reply_secret ;
2020-12-16 04:18:20 +01:00
/* The command which sent us. */
struct command * cmd ;
2021-01-07 19:38:47 +01:00
/* The offer we are trying to get an invoice/payment for. */
2020-12-16 04:18:00 +01:00
struct tlv_offer * offer ;
2021-09-21 07:23:45 +02:00
/* Path to use (including self) */
struct pubkey * path ;
2021-01-07 19:38:47 +01:00
/* The invreq we sent, OR the invoice we sent */
2020-12-16 04:18:00 +01:00
struct tlv_invoice_request * invreq ;
2021-01-07 19:38:47 +01:00
struct tlv_invoice * inv ;
struct preimage inv_preimage ;
struct json_escape * inv_label ;
2021-01-07 19:39:47 +01:00
/* How long to wait for response before giving up. */
2021-01-07 19:40:47 +01:00
u32 wait_timeout ;
2020-12-16 04:18:00 +01:00
} ;
2022-11-09 02:30:10 +01:00
static struct sent * find_sent_by_secret ( const struct secret * pathsecret )
2021-09-30 23:19:36 +02:00
{
struct sent * i ;
list_for_each ( & sent_list , i , list ) {
2022-11-09 02:30:10 +01:00
if ( i - > reply_secret & & secret_eq_consttime ( i - > reply_secret , pathsecret ) )
2021-09-30 23:19:36 +02:00
return i ;
}
return NULL ;
}
2020-12-16 04:18:20 +01:00
/* Hack to suppress warnings when we finish a different command */
static void discard_result ( struct command_result * ret )
{
}
2021-01-07 19:38:47 +01:00
/* Returns NULL if it wasn't an error. */
static struct command_result * handle_error ( struct command * cmd ,
struct sent * sent ,
const char * buf ,
const jsmntok_t * om )
{
const u8 * data ;
size_t dlen ;
struct tlv_invoice_error * err ;
struct json_out * details ;
const jsmntok_t * errtok ;
errtok = json_get_member ( buf , om , " invoice_error " ) ;
if ( ! errtok )
return NULL ;
data = json_tok_bin_from_hex ( cmd , buf , errtok ) ;
dlen = tal_bytelen ( data ) ;
details = json_out_new ( cmd ) ;
plugin_log ( cmd - > plugin , LOG_DBG , " errtok = %.*s " ,
json_tok_full_len ( errtok ) ,
json_tok_full ( buf , errtok ) ) ;
json_out_start ( details , NULL , ' { ' ) ;
2022-03-23 00:31:14 +01:00
err = fromwire_tlv_invoice_error ( cmd , & data , & dlen ) ;
if ( ! err ) {
2021-01-07 19:38:47 +01:00
plugin_log ( cmd - > plugin , LOG_DBG ,
" Invalid invoice_error %.*s " ,
json_tok_full_len ( errtok ) ,
json_tok_full ( buf , errtok ) ) ;
json_out_addstr ( details , " invoice_error_hex " ,
tal_strndup ( tmpctx ,
buf + errtok - > start ,
errtok - > end - errtok - > start ) ) ;
} else {
char * failstr ;
/* FIXME: with a bit more generate-wire.py support,
* we could have fieldnames and even types . */
if ( err - > erroneous_field )
json_out_add ( details , " erroneous_field " , false ,
" % " PRIu64 , * err - > erroneous_field ) ;
if ( err - > suggested_value )
json_out_addstr ( details , " suggested_value " ,
tal_hex ( tmpctx ,
err - > suggested_value ) ) ;
/* If they don't include this, it'll be empty */
failstr = tal_strndup ( tmpctx ,
err - > error ,
tal_bytelen ( err - > error ) ) ;
json_out_addstr ( details , " error " , failstr ) ;
}
json_out_end ( details , ' } ' ) ;
discard_result ( command_done_err ( sent - > cmd ,
OFFER_BAD_INVREQ_REPLY ,
" Remote node sent failure message " ,
details ) ) ;
return command_hook_success ( cmd ) ;
}
2022-11-09 03:32:00 +01:00
/* BOLT-offers #12:
* - if the invoice is a response to an ` invoice_request ` :
* - MUST reject the invoice if all fields less than type 160 do not
* exactly match the ` invoice_request ` .
*/
static bool invoice_matches_request ( struct command * cmd ,
const u8 * invbin ,
const struct tlv_invoice_request * invreq )
{
size_t len1 , len2 ;
u8 * wire ;
/* We linearize then strip signature. This is dumb! */
wire = tal_arr ( tmpctx , u8 , 0 ) ;
towire_tlv_invoice_request ( & wire , invreq ) ;
len1 = tlv_span ( wire , 0 , 159 , NULL ) ;
len2 = tlv_span ( invbin , 0 , 159 , NULL ) ;
return memeq ( wire , len1 , invbin , len2 ) ;
}
2021-01-07 19:38:47 +01:00
static struct command_result * handle_invreq_response ( struct command * cmd ,
struct sent * sent ,
const char * buf ,
const jsmntok_t * om )
2020-12-16 04:18:20 +01:00
{
2022-11-09 03:32:00 +01:00
const u8 * invbin , * cursor ;
2021-01-07 19:38:47 +01:00
const jsmntok_t * invtok ;
2020-12-16 04:18:20 +01:00
size_t len ;
struct tlv_invoice * inv ;
struct sha256 merkle , sighash ;
struct json_stream * out ;
const char * badfield ;
u64 * expected_amount ;
2020-12-16 04:18:42 +01:00
invtok = json_get_member ( buf , om , " invoice " ) ;
if ( ! invtok ) {
plugin_log ( cmd - > plugin , LOG_UNUSUAL ,
" Neither invoice nor invoice_request_failed in reply %.*s " ,
json_tok_full_len ( om ) ,
json_tok_full ( buf , om ) ) ;
discard_result ( command_fail ( sent - > cmd ,
OFFER_BAD_INVREQ_REPLY ,
" Neither invoice nor invoice_request_failed in reply %.*s " ,
json_tok_full_len ( om ) ,
json_tok_full ( buf , om ) ) ) ;
return command_hook_success ( cmd ) ;
}
2020-12-16 04:18:20 +01:00
invbin = json_tok_bin_from_hex ( cmd , buf , invtok ) ;
2022-11-09 03:32:00 +01:00
cursor = invbin ;
2020-12-16 04:18:20 +01:00
len = tal_bytelen ( invbin ) ;
2022-11-09 03:32:00 +01:00
inv = fromwire_tlv_invoice ( cmd , & cursor , & len ) ;
2022-03-23 00:31:14 +01:00
if ( ! inv ) {
2020-12-16 04:18:20 +01:00
badfield = " invoice " ;
goto badinv ;
}
2021-08-19 06:53:04 +02:00
# if DEVELOPER
/* Raw send? Just fwd reply. */
if ( ! sent - > offer ) {
out = jsonrpc_stream_success ( sent - > cmd ) ;
json_add_string ( out , " invoice " , invoice_encode ( tmpctx , inv ) ) ;
discard_result ( command_finished ( sent - > cmd , out ) ) ;
return command_hook_success ( cmd ) ;
}
# endif /* DEVELOPER */
2020-12-16 04:18:20 +01:00
/* BOLT-offers #12:
2022-11-09 03:32:00 +01:00
* - if the invoice is a response to an ` invoice_request ` :
* - MUST reject the invoice if all fields less than type 160 do not
* exactly match the ` invoice_request ` .
2020-12-16 04:18:20 +01:00
*/
2022-11-09 03:32:00 +01:00
if ( ! invoice_matches_request ( cmd , invbin , sent - > invreq ) ) {
badfield = " invoice_request match " ;
goto badinv ;
}
/* BOLT-offers #12:
* - if ` offer_node_id ` is present ( invoice_request for an offer ) :
* - MUST reject the invoice if ` invoice_node_id ` is not equal to ` offer_node_id ` .
*/
if ( ! inv - > invoice_node_id | | ! pubkey_eq ( inv - > offer_node_id , inv - > invoice_node_id ) ) {
badfield = " invoice_node_id " ;
2020-12-16 04:18:20 +01:00
goto badinv ;
}
/* BOLT-offers #12:
* - MUST reject the invoice if ` signature ` is not a valid signature
2022-11-09 03:32:00 +01:00
* using ` invoice_node_id ` as described in [ Signature Calculation ]
2020-12-16 04:18:20 +01:00
*/
merkle_tlv ( inv - > fields , & merkle ) ;
sighash_from_merkle ( " invoice " , " signature " , & merkle , & sighash ) ;
if ( ! inv - > signature
2022-11-09 03:32:00 +01:00
| | ! check_schnorr_sig ( & sighash , & inv - > invoice_node_id - > pubkey , inv - > signature ) ) {
2020-12-16 04:18:20 +01:00
badfield = " signature " ;
goto badinv ;
}
/* BOLT-offers #12:
2022-11-09 03:32:00 +01:00
* A reader of an invoice :
* - MUST reject the invoice if ` invoice_amount ` is not present .
2020-12-16 04:18:20 +01:00
*/
2022-11-09 03:32:00 +01:00
if ( ! inv - > invoice_amount ) {
badfield = " invoice_amount " ;
2020-12-16 04:18:20 +01:00
goto badinv ;
}
2021-07-21 07:37:39 +02:00
/* Get the amount we expected: firstly, if that's what we sent,
* secondly , if specified in the invoice . */
2022-11-09 03:32:01 +01:00
if ( inv - > invreq_amount ) {
expected_amount = tal_dup ( tmpctx , u64 , inv - > invreq_amount ) ;
} else if ( inv - > offer_amount & & ! inv - > offer_currency ) {
2020-12-16 04:18:20 +01:00
expected_amount = tal ( tmpctx , u64 ) ;
2022-11-09 03:32:01 +01:00
* expected_amount = * inv - > offer_amount ;
if ( inv - > invreq_quantity ) {
2020-12-16 04:18:20 +01:00
/* We should never have sent this! */
if ( mul_overflows_u64 ( * expected_amount ,
2022-11-09 03:32:01 +01:00
* inv - > invreq_quantity ) ) {
2020-12-16 04:18:20 +01:00
badfield = " quantity overflow " ;
goto badinv ;
}
2022-11-09 03:32:01 +01:00
* expected_amount * = * inv - > invreq_quantity ;
2020-12-16 04:18:20 +01:00
}
} else
expected_amount = NULL ;
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2020-12-16 04:18:42 +01:00
* - if the offer contained ` recurrence ` :
* - MUST reject the invoice if ` recurrence_basetime ` is not set .
*/
2022-11-09 03:32:01 +01:00
if ( inv - > invreq_recurrence_counter & & ! inv - > invoice_recurrence_basetime ) {
2020-12-16 04:18:42 +01:00
badfield = " recurrence_basetime " ;
goto badinv ;
}
2020-12-16 04:18:20 +01:00
out = jsonrpc_stream_success ( sent - > cmd ) ;
json_add_string ( out , " invoice " , invoice_encode ( tmpctx , inv ) ) ;
json_object_start ( out , " changes " ) ;
/* BOLT-offers #12:
* - SHOULD confirm authorization if ` msat ` is not within the amount
* range authorized .
*/
/* We always tell them this unless it's trivial to calc and
* exactly as expected . */
2022-11-09 03:32:00 +01:00
if ( ! expected_amount | | * inv - > invoice_amount ! = * expected_amount ) {
2022-06-20 12:22:09 +02:00
json_add_amount_msat_only ( out , " amount_msat " ,
2022-11-09 03:32:00 +01:00
amount_msat ( * inv - > invoice_amount ) ) ;
2022-06-20 12:22:09 +02:00
}
2020-12-16 04:18:20 +01:00
json_object_end ( out ) ;
2020-12-16 04:18:42 +01:00
/* We tell them about next period at this point, if any. */
2022-11-09 03:32:01 +01:00
if ( inv - > offer_recurrence ) {
2020-12-16 04:18:42 +01:00
u64 next_counter , next_period_idx ;
u64 paywindow_start , paywindow_end ;
2022-11-09 03:32:01 +01:00
next_counter = * inv - > invreq_recurrence_counter + 1 ;
if ( inv - > invreq_recurrence_start )
next_period_idx = * inv - > invreq_recurrence_start
2020-12-16 04:18:42 +01:00
+ next_counter ;
else
next_period_idx = next_counter ;
/* If this was the last, don't tell them about a next! */
2022-11-09 03:32:01 +01:00
if ( ! inv - > offer_recurrence_limit
| | next_period_idx < = * inv - > offer_recurrence_limit ) {
2020-12-16 04:18:42 +01:00
json_object_start ( out , " next_period " ) ;
json_add_u64 ( out , " counter " , next_counter ) ;
json_add_u64 ( out , " starttime " ,
2022-11-09 03:32:00 +01:00
offer_period_start ( * inv - > invoice_recurrence_basetime ,
2020-12-16 04:18:42 +01:00
next_period_idx ,
2022-11-09 03:32:01 +01:00
inv - > offer_recurrence ) ) ;
2020-12-16 04:18:42 +01:00
json_add_u64 ( out , " endtime " ,
2022-11-09 03:32:00 +01:00
offer_period_start ( * inv - > invoice_recurrence_basetime ,
2020-12-16 04:18:42 +01:00
next_period_idx + 1 ,
2022-11-09 03:32:01 +01:00
inv - > offer_recurrence ) - 1 ) ;
2020-12-16 04:18:42 +01:00
2022-11-09 03:32:01 +01:00
offer_period_paywindow ( inv - > offer_recurrence ,
inv - > offer_recurrence_paywindow ,
inv - > offer_recurrence_base ,
2022-11-09 03:32:00 +01:00
* inv - > invoice_recurrence_basetime ,
2020-12-16 04:18:42 +01:00
next_period_idx ,
& paywindow_start , & paywindow_end ) ;
json_add_u64 ( out , " paywindow_start " , paywindow_start ) ;
json_add_u64 ( out , " paywindow_end " , paywindow_end ) ;
json_object_end ( out ) ;
}
}
2020-12-16 04:18:20 +01:00
discard_result ( command_finished ( sent - > cmd , out ) ) ;
return command_hook_success ( cmd ) ;
badinv :
plugin_log ( cmd - > plugin , LOG_DBG , " Failed invoice due to %s " , badfield ) ;
discard_result ( command_fail ( sent - > cmd ,
OFFER_BAD_INVREQ_REPLY ,
" Incorrect %s field in %.*s " ,
badfield ,
json_tok_full_len ( invtok ) ,
json_tok_full ( buf , invtok ) ) ) ;
return command_hook_success ( cmd ) ;
}
2021-09-30 23:19:36 +02:00
static struct command_result * recv_modern_onion_message ( struct command * cmd ,
const char * buf ,
const jsmntok_t * params )
{
2022-11-09 02:30:10 +01:00
const jsmntok_t * om , * secrettok ;
2021-09-30 23:19:36 +02:00
struct sent * sent ;
2022-11-09 02:30:10 +01:00
struct secret pathsecret ;
2021-09-30 23:19:36 +02:00
struct command_result * err ;
om = json_get_member ( buf , params , " onion_message " ) ;
2022-11-09 02:30:10 +01:00
secrettok = json_get_member ( buf , om , " pathsecret " ) ;
json_to_secret ( buf , secrettok , & pathsecret ) ;
sent = find_sent_by_secret ( & pathsecret ) ;
2021-09-30 23:19:36 +02:00
if ( ! sent ) {
plugin_log ( cmd - > plugin , LOG_DBG ,
" No match for modern onion %.*s " ,
json_tok_full_len ( om ) ,
json_tok_full ( buf , om ) ) ;
return command_hook_success ( cmd ) ;
}
plugin_log ( cmd - > plugin , LOG_DBG , " Received modern onion message: %.*s " ,
json_tok_full_len ( params ) ,
json_tok_full ( buf , params ) ) ;
err = handle_error ( cmd , sent , buf , om ) ;
if ( err )
return err ;
if ( sent - > invreq )
return handle_invreq_response ( cmd , sent , buf , om ) ;
return command_hook_success ( cmd ) ;
}
2020-12-16 04:18:20 +01:00
static void destroy_sent ( struct sent * sent )
{
list_del ( & sent - > list ) ;
}
2021-01-07 19:40:47 +01:00
/* We've received neither a reply nor a payment; return failure. */
static void timeout_sent_invreq ( struct sent * sent )
{
/* This will free sent! */
discard_result ( command_fail ( sent - > cmd , OFFER_TIMEOUT ,
" Timeout waiting for response " ) ) ;
}
2020-12-16 04:18:00 +01:00
static struct command_result * sendonionmsg_done ( struct command * cmd ,
const char * buf UNUSED ,
const jsmntok_t * result UNUSED ,
struct sent * sent )
{
2021-01-07 19:40:47 +01:00
tal_steal ( cmd , plugin_timer ( cmd - > plugin ,
time_from_sec ( sent - > wait_timeout ) ,
timeout_sent_invreq , sent ) ) ;
2020-12-16 04:18:20 +01:00
sent - > cmd = cmd ;
list_add_tail ( & sent_list , & sent - > list ) ;
tal_add_destructor ( sent , destroy_sent ) ;
2020-12-16 04:18:00 +01:00
return command_still_pending ( cmd ) ;
}
static void init_gossmap ( struct plugin * plugin )
{
2021-08-20 06:12:27 +02:00
size_t num_cupdates_rejected ;
2020-12-16 04:18:00 +01:00
global_gossmap
= notleak_with_children ( gossmap_load ( NULL ,
2021-08-20 06:12:27 +02:00
GOSSIP_STORE_FILENAME ,
& num_cupdates_rejected ) ) ;
2020-12-16 04:18:00 +01:00
if ( ! global_gossmap )
plugin_err ( plugin , " Could not load gossmap %s: %s " ,
GOSSIP_STORE_FILENAME , strerror ( errno ) ) ;
2021-08-20 06:12:27 +02:00
if ( num_cupdates_rejected )
plugin_log ( plugin , LOG_DBG ,
" gossmap ignored %zu channel updates " ,
num_cupdates_rejected ) ;
2020-12-16 04:18:00 +01:00
}
static struct gossmap * get_gossmap ( struct plugin * plugin )
{
if ( ! global_gossmap )
init_gossmap ( plugin ) ;
else
2021-08-20 06:12:27 +02:00
gossmap_refresh ( global_gossmap , NULL ) ;
2020-12-16 04:18:00 +01:00
return global_gossmap ;
}
static struct command_result * param_offer ( struct command * cmd ,
const char * name ,
const char * buffer ,
const jsmntok_t * tok ,
struct tlv_offer * * offer )
{
char * fail ;
2022-11-09 03:32:00 +01:00
int badf ;
2020-12-16 04:18:00 +01:00
* offer = offer_decode ( cmd , buffer + tok - > start , tok - > end - tok - > start ,
plugin_feature_set ( cmd - > plugin ) , chainparams ,
& fail ) ;
if ( ! * offer )
return command_fail_badparam ( cmd , name , buffer , tok ,
tal_fmt ( cmd ,
" Unparsable offer: %s " ,
fail ) ) ;
/* BOLT-offers #12:
2022-11-09 03:32:00 +01:00
* A reader of an offer :
* - if the offer contains any unknown TLV fields greater or equal to 80 :
* - MUST NOT respond to the offer .
* - if ` offer_features ` contains unknown _odd_ bits that are non - zero :
* - MUST ignore the bit .
* - if ` offer_features ` contains unknown _even_ bits that are non - zero :
* - MUST NOT respond to the offer .
* - SHOULD indicate the unknown bit to the user .
* - if ` offer_description ` is not set :
* - MUST NOT respond to the offer .
* - if ` offer_node_id ` is not set :
* - MUST NOT respond to the offer .
2020-12-16 04:18:00 +01:00
*/
2022-11-09 03:32:00 +01:00
for ( size_t i = 0 ; i < tal_count ( ( * offer ) - > fields ) ; i + + ) {
if ( ( * offer ) - > fields [ i ] . numtype > 80 ) {
return command_fail_badparam ( cmd , name , buffer , tok ,
tal_fmt ( tmpctx ,
" Offer % " PRIu64
" field >= 80 " ,
( * offer ) - > fields [ i ] . numtype ) ) ;
}
}
badf = features_unsupported ( plugin_feature_set ( cmd - > plugin ) ,
( * offer ) - > offer_features ,
BOLT12_OFFER_FEATURE ) ;
if ( badf ! = - 1 ) {
return command_fail_badparam ( cmd , name , buffer , tok ,
tal_fmt ( tmpctx ,
" unknown feature %i " ,
badf ) ) ;
}
if ( ! ( * offer ) - > offer_description )
return command_fail_badparam ( cmd , name , buffer , tok ,
" Offer does not contain a description " ) ;
if ( ! ( * offer ) - > offer_node_id )
2020-12-16 04:18:00 +01:00
return command_fail_badparam ( cmd , name , buffer , tok ,
" Offer does not contain a node_id " ) ;
2022-11-09 03:32:00 +01:00
/* BOLT-offers #12:
* - if ` offer_chains ` is not set :
* - if the node does not accept bitcoin invoices :
* - MUST NOT respond to the offer
* - otherwise : ( ` offer_chains ` is set ) :
* - if the node does not accept invoices for any of the ` chains ` :
* - MUST NOT respond to the offer
*/
if ( ! bolt12_chains_match ( ( * offer ) - > offer_chains ,
tal_count ( ( * offer ) - > offer_chains ) ,
chainparams ) ) {
2020-12-16 04:18:00 +01:00
return command_fail_badparam ( cmd , name , buffer , tok ,
2022-11-09 03:32:00 +01:00
" Offer for wrong chains " ) ;
}
2020-12-16 04:18:00 +01:00
return NULL ;
}
static bool can_carry_onionmsg ( const struct gossmap * map ,
const struct gossmap_chan * c ,
int dir ,
struct amount_msat amount UNUSED ,
void * arg UNUSED )
{
const struct gossmap_node * n ;
/* Don't use it if either side says it's disabled */
if ( ! c - > half [ dir ] . enabled | | ! c - > half [ ! dir ] . enabled )
return false ;
/* Check features of recipient */
n = gossmap_nth_node ( map , c , ! dir ) ;
2021-07-02 02:11:30 +02:00
/* 102/103 was the old EXPERIMENTAL feature bit: remove soon! */
return gossmap_node_get_feature ( map , n , OPT_ONION_MESSAGES ) ! = - 1
| | gossmap_node_get_feature ( map , n , 102 ) ! = - 1 ;
2020-12-16 04:18:00 +01:00
}
2021-09-21 07:23:45 +02:00
static struct pubkey * path_to_node ( const tal_t * ctx ,
struct plugin * plugin ,
2022-10-17 02:37:05 +02:00
const struct pubkey * node_id )
2020-12-16 04:18:00 +01:00
{
2021-09-21 06:05:24 +02:00
struct route_hop * r ;
const struct dijkstra * dij ;
const struct gossmap_node * src ;
2021-01-07 19:44:47 +01:00
const struct gossmap_node * dst ;
2021-09-21 07:23:45 +02:00
struct node_id dstid , local_nodeid ;
struct pubkey * nodes ;
struct gossmap * gossmap = get_gossmap ( plugin ) ;
2020-12-16 04:18:00 +01:00
2022-10-17 02:37:05 +02:00
node_id_from_pubkey ( & dstid , node_id ) ;
2020-12-16 04:18:00 +01:00
dst = gossmap_find_node ( gossmap , & dstid ) ;
2022-10-17 02:37:05 +02:00
if ( ! dst )
return NULL ;
2021-09-21 06:05:24 +02:00
/* If we don't exist in gossip, routing can't happen. */
2021-09-21 07:23:45 +02:00
node_id_from_pubkey ( & local_nodeid , & local_id ) ;
src = gossmap_find_node ( gossmap , & local_nodeid ) ;
2021-09-21 06:05:24 +02:00
if ( ! src )
return NULL ;
dij = dijkstra ( tmpctx , gossmap , dst , AMOUNT_MSAT ( 0 ) , 0 ,
can_carry_onionmsg , route_score_shorter , NULL ) ;
r = route_from_dijkstra ( tmpctx , gossmap , dij , src , AMOUNT_MSAT ( 0 ) , 0 ) ;
if ( ! r )
return NULL ;
2021-09-21 07:23:45 +02:00
nodes = tal_arr ( ctx , struct pubkey , tal_count ( r ) + 1 ) ;
nodes [ 0 ] = local_id ;
for ( size_t i = 0 ; i < tal_count ( r ) ; i + + ) {
if ( ! pubkey_from_node_id ( & nodes [ i + 1 ] , & r [ i ] . node_id ) ) {
plugin_err ( plugin , " Could not convert nodeid %s " ,
type_to_string ( tmpctx , struct node_id ,
& r [ i ] . node_id ) ) ;
}
}
2021-07-01 06:28:57 +02:00
return nodes ;
}
2021-11-30 04:06:04 +01:00
/* Marshal arguments for sending onion messages */
2021-09-30 23:19:36 +02:00
struct sending {
struct sent * sent ;
2022-10-17 02:44:39 +02:00
struct tlv_onionmsg_tlv * payload ;
2021-09-30 23:19:36 +02:00
struct command_result * ( * done ) ( struct command * cmd ,
const char * buf UNUSED ,
const jsmntok_t * result UNUSED ,
struct sent * sent ) ;
} ;
2021-11-30 04:06:05 +01:00
static struct command_result *
send_modern_message ( struct command * cmd ,
2022-10-17 02:44:39 +02:00
struct blinded_path * reply_path ,
2021-11-30 04:06:05 +01:00
struct sending * sending )
{
struct sent * sent = sending - > sent ;
struct privkey blinding_iter ;
struct pubkey fwd_blinding , * node_alias ;
size_t nhops = tal_count ( sent - > path ) ;
2022-10-17 02:44:39 +02:00
struct tlv_onionmsg_tlv * * payloads ;
2021-11-30 04:06:05 +01:00
struct out_req * req ;
2022-11-09 02:30:10 +01:00
struct tlv_encrypted_data_tlv * tlv ;
2021-11-30 04:06:05 +01:00
/* Now create enctlvs for *forward* path. */
randombytes_buf ( & blinding_iter , sizeof ( blinding_iter ) ) ;
if ( ! pubkey_from_privkey ( & blinding_iter , & fwd_blinding ) )
return command_fail ( cmd , LIGHTNINGD ,
" Could not convert blinding %s to pubkey! " ,
type_to_string ( tmpctx , struct privkey ,
& blinding_iter ) ) ;
/* We overallocate: this node (0) doesn't have payload or alias */
2022-10-17 02:44:39 +02:00
payloads = tal_arr ( cmd , struct tlv_onionmsg_tlv * , nhops ) ;
2021-11-30 04:06:05 +01:00
node_alias = tal_arr ( cmd , struct pubkey , nhops ) ;
for ( size_t i = 1 ; i < nhops - 1 ; i + + ) {
2022-10-17 02:44:39 +02:00
payloads [ i ] = tlv_onionmsg_tlv_new ( payloads ) ;
2022-11-09 02:30:10 +01:00
tlv = tlv_encrypted_data_tlv_new ( tmpctx ) ;
tlv - > next_node_id = & sent - > path [ i + 1 ] ;
/* FIXME: Pad? */
payloads [ i ] - > encrypted_recipient_data
= encrypt_tlv_encrypted_data ( payloads [ i ] ,
& blinding_iter ,
& sent - > path [ i ] ,
tlv ,
& blinding_iter ,
& node_alias [ i ] ) ;
2021-11-30 04:06:05 +01:00
}
/* Final payload contains the actual data. */
2022-09-29 05:49:03 +02:00
payloads [ nhops - 1 ] = sending - > payload ;
2021-11-30 04:06:05 +01:00
/* We don't include enctlv in final, but it gives us final alias */
2022-11-09 02:30:10 +01:00
tlv = tlv_encrypted_data_tlv_new ( tmpctx ) ;
if ( ! encrypt_tlv_encrypted_data ( tmpctx ,
& blinding_iter ,
& sent - > path [ nhops - 1 ] ,
tlv ,
NULL ,
& node_alias [ nhops - 1 ] ) ) {
2021-11-30 04:06:05 +01:00
/* Should not happen! */
return command_fail ( cmd , LIGHTNINGD ,
" Could create final enctlv " ) ;
}
payloads [ nhops - 1 ] - > reply_path = reply_path ;
req = jsonrpc_request_start ( cmd - > plugin , cmd , " sendonionmessage " ,
2022-09-29 05:49:03 +02:00
sending - > done ,
2021-11-30 04:06:05 +01:00
forward_error ,
2022-09-29 05:49:03 +02:00
sending - > sent ) ;
2021-11-30 04:06:05 +01:00
json_add_pubkey ( req - > js , " first_id " , & sent - > path [ 1 ] ) ;
json_add_pubkey ( req - > js , " blinding " , & fwd_blinding ) ;
json_array_start ( req - > js , " hops " ) ;
for ( size_t i = 1 ; i < nhops ; i + + ) {
2022-11-09 02:30:10 +01:00
u8 * tlvbin ;
2021-11-30 04:06:05 +01:00
json_object_start ( req - > js , NULL ) ;
json_add_pubkey ( req - > js , " id " , & node_alias [ i ] ) ;
2022-11-09 02:30:10 +01:00
tlvbin = tal_arr ( tmpctx , u8 , 0 ) ;
towire_tlv_onionmsg_tlv ( & tlvbin , payloads [ i ] ) ;
json_add_hex_talarr ( req - > js , " tlv " , tlvbin ) ;
2021-11-30 04:06:05 +01:00
json_object_end ( req - > js ) ;
}
json_array_end ( req - > js ) ;
return send_outreq ( cmd - > plugin , req ) ;
}
2021-09-30 23:19:36 +02:00
/* Lightningd gives us reply path, since we don't know secret to put
* in final so it will recognize it . */
static struct command_result * use_reply_path ( struct command * cmd ,
const char * buf ,
const jsmntok_t * result ,
struct sending * sending )
{
2022-10-17 02:44:39 +02:00
struct blinded_path * rpath ;
2021-09-30 23:19:36 +02:00
2022-10-17 02:44:39 +02:00
rpath = json_to_blinded_path ( cmd , buf ,
json_get_member ( buf , result , " blindedpath " ) ) ;
2021-09-30 23:19:36 +02:00
if ( ! rpath )
plugin_err ( cmd - > plugin ,
" could not parse reply path %.*s? " ,
json_tok_full_len ( result ) ,
2021-11-30 04:06:05 +01:00
json_tok_full ( buf , result ) ) ;
2021-09-30 23:19:36 +02:00
return send_modern_message ( cmd , rpath , sending ) ;
}
static struct command_result * make_reply_path ( struct command * cmd ,
struct sending * sending )
{
struct out_req * req ;
size_t nhops = tal_count ( sending - > sent - > path ) ;
/* FIXME: Maybe we should allow this? */
if ( tal_count ( sending - > sent - > path ) = = 1 )
return command_fail ( cmd , PAY_ROUTE_NOT_FOUND ,
" Refusing to talk to ourselves " ) ;
2022-11-09 02:30:10 +01:00
/* Create transient secret so we can validate reply! */
sending - > sent - > reply_secret = tal ( sending - > sent , struct secret ) ;
randombytes_buf ( sending - > sent - > reply_secret , sizeof ( struct secret ) ) ;
2021-09-30 23:19:36 +02:00
req = jsonrpc_request_start ( cmd - > plugin , cmd , " blindedpath " ,
use_reply_path ,
forward_error ,
sending ) ;
/* FIXME: Could create an independent reply path, not just
* reverse existing . */
json_array_start ( req - > js , " ids " ) ;
for ( int i = nhops - 2 ; i > = 0 ; i - - )
json_add_pubkey ( req - > js , NULL , & sending - > sent - > path [ i ] ) ;
json_array_end ( req - > js ) ;
2022-11-09 02:30:10 +01:00
json_add_secret ( req - > js , " pathsecret " , sending - > sent - > reply_secret ) ;
2021-09-30 23:19:36 +02:00
return send_outreq ( cmd - > plugin , req ) ;
}
static struct command_result * send_message ( struct command * cmd ,
struct sent * sent ,
2022-10-17 02:44:39 +02:00
struct tlv_onionmsg_tlv * payload STEALS ,
2021-09-30 23:19:36 +02:00
struct command_result * ( * done )
( struct command * cmd ,
const char * buf UNUSED ,
const jsmntok_t * result UNUSED ,
struct sent * sent ) )
{
struct sending * sending = tal ( cmd , struct sending ) ;
sending - > sent = sent ;
2022-09-29 05:49:03 +02:00
sending - > payload = tal_steal ( sending , payload ) ;
2021-09-30 23:19:36 +02:00
sending - > done = done ;
return make_reply_path ( cmd , sending ) ;
}
2021-07-01 06:28:57 +02:00
/* We've connected (if we tried), so send the invreq. */
static struct command_result *
sendinvreq_after_connect ( struct command * cmd ,
const char * buf UNUSED ,
const jsmntok_t * result UNUSED ,
struct sent * sent )
{
2022-10-17 02:44:39 +02:00
struct tlv_onionmsg_tlv * payload = tlv_onionmsg_tlv_new ( sent ) ;
2022-09-29 05:49:03 +02:00
payload - > invoice_request = tal_arr ( payload , u8 , 0 ) ;
towire_tlv_invoice_request ( & payload - > invoice_request , sent - > invreq ) ;
2022-03-23 00:31:14 +01:00
2022-09-29 05:49:03 +02:00
return send_message ( cmd , sent , payload , sendonionmsg_done ) ;
2021-07-01 06:28:57 +02:00
}
2021-09-21 06:05:24 +02:00
struct connect_attempt {
struct node_id node_id ;
struct command_result * ( * cb ) ( struct command * command ,
const char * buf ,
const jsmntok_t * result ,
struct sent * sent ) ;
struct sent * sent ;
} ;
static struct command_result * connected ( struct command * command ,
const char * buf ,
const jsmntok_t * result ,
struct connect_attempt * ca )
{
return ca - > cb ( command , buf , result , ca - > sent ) ;
}
static struct command_result * connect_failed ( struct command * command ,
const char * buf ,
const jsmntok_t * result ,
struct connect_attempt * ca )
{
return command_done_err ( command , OFFER_ROUTE_NOT_FOUND ,
" Failed: could not route, could not connect " ,
NULL ) ;
}
2021-07-01 06:28:57 +02:00
/* We can't find a route, so we're going to try to connect, then just blast it
* to them . */
static struct command_result *
connect_direct ( struct command * cmd ,
2022-10-17 02:37:05 +02:00
const struct pubkey * dst ,
2021-07-01 06:28:57 +02:00
struct command_result * ( * cb ) ( struct command * command ,
const char * buf ,
const jsmntok_t * result ,
struct sent * sent ) ,
struct sent * sent )
{
struct out_req * req ;
2021-09-21 06:05:24 +02:00
struct connect_attempt * ca = tal ( cmd , struct connect_attempt ) ;
ca - > cb = cb ;
ca - > sent = sent ;
2022-10-17 02:37:05 +02:00
node_id_from_pubkey ( & ca - > node_id , dst ) ;
2021-09-21 06:05:24 +02:00
/* Make a direct path -> dst. */
2021-09-21 07:23:45 +02:00
sent - > path = tal_arr ( sent , struct pubkey , 2 ) ;
sent - > path [ 0 ] = local_id ;
if ( ! pubkey_from_node_id ( & sent - > path [ 1 ] , & ca - > node_id ) ) {
/* Should not happen! */
return command_done_err ( cmd , LIGHTNINGD ,
" Failed: could not convert to pubkey? " ,
NULL ) ;
}
2021-07-01 06:28:57 +02:00
if ( disable_connect ) {
2021-09-21 06:05:24 +02:00
/* FIXME: This means we will fail if parity is wrong! */
2021-07-01 06:28:57 +02:00
plugin_notify_message ( cmd , LOG_UNUSUAL ,
" Cannot find route, but "
" fetchplugin-noconnect set: "
" trying direct anyway to %s " ,
2022-10-17 02:37:05 +02:00
type_to_string ( tmpctx , struct pubkey ,
2021-07-01 06:28:57 +02:00
dst ) ) ;
return cb ( cmd , NULL , NULL , sent ) ;
}
2021-09-21 06:05:24 +02:00
req = jsonrpc_request_start ( cmd - > plugin , cmd , " connect " , connected ,
2022-10-17 02:37:05 +02:00
connect_failed , ca ) ;
2021-09-21 06:05:24 +02:00
json_add_node_id ( req - > js , " id " , & ca - > node_id ) ;
2021-07-01 06:28:57 +02:00
return send_outreq ( cmd - > plugin , req ) ;
}
2020-12-16 04:18:00 +01:00
static struct command_result * invreq_done ( struct command * cmd ,
const char * buf ,
const jsmntok_t * result ,
2021-01-07 19:40:47 +01:00
struct sent * sent )
2020-12-16 04:18:00 +01:00
{
const jsmntok_t * t ;
char * fail ;
/* Get invoice request */
t = json_get_member ( buf , result , " bolt12 " ) ;
if ( ! t )
return command_fail ( cmd , LIGHTNINGD ,
" Missing bolt12 %.*s " ,
json_tok_full_len ( result ) ,
json_tok_full ( buf , result ) ) ;
plugin_log ( cmd - > plugin , LOG_DBG ,
" invoice_request: %.*s " ,
json_tok_full_len ( t ) ,
json_tok_full ( buf , t ) ) ;
2021-01-07 19:38:47 +01:00
sent - > inv = NULL ;
2020-12-16 04:18:00 +01:00
sent - > invreq = invrequest_decode ( sent ,
buf + t - > start ,
t - > end - t - > start ,
plugin_feature_set ( cmd - > plugin ) ,
chainparams ,
& fail ) ;
if ( ! sent - > invreq )
return command_fail ( cmd , LIGHTNINGD ,
" Invalid invoice_request %.*s: %s " ,
json_tok_full_len ( t ) ,
json_tok_full ( buf , t ) ,
fail ) ;
2021-01-07 19:41:47 +01:00
/* Now that's given us the previous base, check this is an OK time
* to request an invoice . */
2022-11-09 03:32:00 +01:00
if ( sent - > invreq - > invreq_recurrence_counter ) {
2021-01-07 19:41:47 +01:00
u64 * base ;
const jsmntok_t * pbtok ;
2022-11-09 03:32:00 +01:00
u64 period_idx = * sent - > invreq - > invreq_recurrence_counter ;
2021-01-07 19:41:47 +01:00
2022-11-09 03:32:00 +01:00
if ( sent - > invreq - > invreq_recurrence_start )
period_idx + = * sent - > invreq - > invreq_recurrence_start ;
2021-01-07 19:41:47 +01:00
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2021-01-07 19:41:47 +01:00
* - if the offer contained ` recurrence_limit ` :
* - MUST NOT send an ` invoice_request ` for a period greater
* than ` max_period `
*/
2022-11-09 03:32:01 +01:00
if ( sent - > invreq - > offer_recurrence_limit
& & period_idx > * sent - > invreq - > offer_recurrence_limit )
2021-01-07 19:41:47 +01:00
return command_fail ( cmd , LIGHTNINGD ,
" Can't send invreq for period % "
PRIu64 " (limit %u) " ,
period_idx ,
2022-11-09 03:32:01 +01:00
* sent - > invreq - > offer_recurrence_limit ) ;
2021-01-07 19:41:47 +01:00
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2021-01-07 19:41:47 +01:00
* - SHOULD NOT send an ` invoice_request ` for a period which has
* already passed .
*/
/* If there's no recurrence_base, we need a previous payment
* for this : fortunately createinvoicerequest does that
* lookup . */
pbtok = json_get_member ( buf , result , " previous_basetime " ) ;
if ( pbtok ) {
base = tal ( tmpctx , u64 ) ;
json_to_u64 ( buf , pbtok , base ) ;
2022-11-09 03:32:01 +01:00
} else if ( sent - > invreq - > offer_recurrence_base )
base = & sent - > invreq - > offer_recurrence_base - > basetime ;
2021-01-07 19:41:47 +01:00
else {
/* happens with *recurrence_base == 0 */
2022-11-09 03:32:00 +01:00
assert ( * sent - > invreq - > invreq_recurrence_counter = = 0 ) ;
2021-01-07 19:41:47 +01:00
base = NULL ;
}
if ( base ) {
u64 period_start , period_end , now = time_now ( ) . ts . tv_sec ;
2022-11-09 03:32:01 +01:00
offer_period_paywindow ( sent - > invreq - > offer_recurrence ,
sent - > invreq - > offer_recurrence_paywindow ,
sent - > invreq - > offer_recurrence_base ,
2021-01-07 19:41:47 +01:00
* base , period_idx ,
& period_start , & period_end ) ;
if ( now < period_start )
return command_fail ( cmd , LIGHTNINGD ,
" Too early: can't send until time % "
PRIu64 " (in % " PRIu64 " secs) " ,
period_start ,
period_start - now ) ;
if ( now > period_end )
return command_fail ( cmd , LIGHTNINGD ,
" Too late: expired time % "
PRIu64 " (% " PRIu64 " secs ago) " ,
period_end ,
now - period_end ) ;
}
}
2021-09-21 07:23:45 +02:00
sent - > path = path_to_node ( sent , cmd - > plugin ,
2022-11-09 03:32:01 +01:00
sent - > invreq - > offer_node_id ) ;
2021-09-21 06:05:24 +02:00
if ( ! sent - > path )
2022-11-09 03:32:01 +01:00
return connect_direct ( cmd , sent - > invreq - > offer_node_id ,
2021-07-01 06:28:57 +02:00
sendinvreq_after_connect , sent ) ;
return sendinvreq_after_connect ( cmd , NULL , NULL , sent ) ;
2020-12-16 04:18:00 +01:00
}
2021-07-05 08:23:29 +02:00
/* If they hand us the payer secret, we sign it directly, bypassing checks
* about periods etc . */
static struct command_result *
force_payer_secret ( struct command * cmd ,
struct sent * sent ,
2022-11-09 03:32:01 +01:00
struct tlv_invoice_request * invreq STEALS ,
2021-07-05 08:23:29 +02:00
const struct secret * payer_secret )
{
struct sha256 merkle , sha ;
secp256k1_keypair kp ;
if ( secp256k1_keypair_create ( secp256k1_ctx , & kp , payer_secret - > data ) ! = 1 )
return command_fail ( cmd , LIGHTNINGD , " Bad payer_secret " ) ;
2022-11-09 03:32:00 +01:00
invreq - > invreq_payer_id = tal ( invreq , struct pubkey ) ;
2021-07-05 08:23:29 +02:00
/* Docs say this only happens if arguments are invalid! */
2022-10-17 02:35:31 +02:00
if ( secp256k1_keypair_pub ( secp256k1_ctx ,
2022-11-09 03:32:00 +01:00
& invreq - > invreq_payer_id - > pubkey ,
2022-10-17 02:35:31 +02:00
& kp ) ! = 1 )
2021-07-05 08:23:29 +02:00
plugin_err ( cmd - > plugin ,
" secp256k1_keypair_pub failed on %s? " ,
type_to_string ( tmpctx , struct secret , payer_secret ) ) ;
2022-11-09 03:32:01 +01:00
/* Re-calculate ->fields */
tal_free ( invreq - > fields ) ;
invreq - > fields = tlv_make_fields ( invreq , tlv_invoice_request ) ;
2021-07-05 08:23:29 +02:00
2022-11-09 03:32:01 +01:00
sent - > invreq = tal_steal ( sent , invreq ) ;
2021-07-05 08:23:29 +02:00
merkle_tlv ( sent - > invreq - > fields , & merkle ) ;
2022-09-10 04:06:31 +02:00
sighash_from_merkle ( " invoice_request " , " signature " , & merkle , & sha ) ;
2021-07-05 08:23:29 +02:00
2022-03-22 09:50:13 +01:00
sent - > invreq - > signature = tal ( invreq , struct bip340sig ) ;
2022-04-07 01:54:52 +02:00
if ( ! secp256k1_schnorrsig_sign32 ( secp256k1_ctx ,
2022-03-22 09:50:13 +01:00
sent - > invreq - > signature - > u8 ,
2021-07-05 08:23:29 +02:00
sha . u . u8 ,
& kp ,
2022-04-07 01:54:52 +02:00
NULL ) ) {
2021-07-05 08:23:29 +02:00
return command_fail ( cmd , LIGHTNINGD ,
" Failed to sign with payer_secret " ) ;
}
2021-09-21 07:23:45 +02:00
sent - > path = path_to_node ( sent , cmd - > plugin ,
2022-11-09 03:32:01 +01:00
sent - > invreq - > offer_node_id ) ;
2021-09-21 06:05:24 +02:00
if ( ! sent - > path )
2022-11-09 03:32:01 +01:00
return connect_direct ( cmd , sent - > invreq - > offer_node_id ,
2021-07-05 08:23:29 +02:00
sendinvreq_after_connect , sent ) ;
return sendinvreq_after_connect ( cmd , NULL , NULL , sent ) ;
}
2020-12-16 04:18:00 +01:00
/* Fetches an invoice for this offer, and makes sure it corresponds. */
static struct command_result * json_fetchinvoice ( struct command * cmd ,
const char * buffer ,
const jsmntok_t * params )
{
struct amount_msat * msat ;
2021-07-02 02:11:35 +02:00
const char * rec_label , * payer_note ;
2020-12-16 04:18:00 +01:00
struct out_req * req ;
struct tlv_invoice_request * invreq ;
2021-01-07 19:40:47 +01:00
struct sent * sent = tal ( cmd , struct sent ) ;
2021-07-05 08:23:29 +02:00
struct secret * payer_secret = NULL ;
2021-01-07 19:40:47 +01:00
u32 * timeout ;
2022-11-09 03:32:00 +01:00
u64 * quantity ;
u32 * recurrence_counter , * recurrence_start ;
2020-12-16 04:18:00 +01:00
if ( ! param ( cmd , buffer , params ,
2021-01-07 19:40:47 +01:00
p_req ( " offer " , param_offer , & sent - > offer ) ,
lightningd: change `msatoshi` args to `amount_msat`.
This is consistent with our output changes, and increases consistency.
It also keeps future sanity checks happy, that we only use JSON msat
helpers with '_msat' fields.
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Changelog-Changed: JSON-RPC: `invoice`, `sendonion`, `sendpay`, `pay`, `keysend`, `fetchinvoice`, `sendinvoice`: `msatoshi` argument is now called `amount_msat` to match other fields.
Changelog-Deprecated: JSON-RPC: `invoice`, `sendonion`, `sendpay`, `pay`, `keysend`, `fetchinvoice`, `sendinvoice` `msatoshi` (use `amount_msat`)
2022-06-19 09:20:11 +02:00
p_opt ( " amount_msat|msatoshi " , param_msat , & msat ) ,
2022-11-09 03:32:00 +01:00
p_opt ( " quantity " , param_u64 , & quantity ) ,
p_opt ( " recurrence_counter " , param_number , & recurrence_counter ) ,
p_opt ( " recurrence_start " , param_number , & recurrence_start ) ,
2020-12-16 04:18:00 +01:00
p_opt ( " recurrence_label " , param_string , & rec_label ) ,
2021-01-07 19:40:47 +01:00
p_opt_def ( " timeout " , param_number , & timeout , 60 ) ,
2021-07-02 02:11:35 +02:00
p_opt ( " payer_note " , param_string , & payer_note ) ,
2021-07-05 08:23:29 +02:00
# if DEVELOPER
p_opt ( " payer_secret " , param_secret , & payer_secret ) ,
# endif
2020-12-16 04:18:00 +01:00
NULL ) )
return command_param_failed ( ) ;
2021-01-07 19:40:47 +01:00
sent - > wait_timeout = * timeout ;
2020-12-16 04:18:00 +01:00
/* BOLT-offers #12:
* - SHOULD not respond to an offer if the current time is after
* ` absolute_expiry ` .
*/
2022-11-09 03:32:00 +01:00
if ( sent - > offer - > offer_absolute_expiry
& & time_now ( ) . ts . tv_sec > * sent - > offer - > offer_absolute_expiry )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , OFFER_EXPIRED , " Offer expired " ) ;
2022-11-09 03:32:00 +01:00
/* BOLT-offers #12:
* The writer :
* - if it is responding to an offer :
* - MUST copy all fields from the offer ( including unknown fields ) .
*/
invreq = invoice_request_for_offer ( sent , sent - > offer ) ;
invreq - > invreq_recurrence_counter = tal_steal ( invreq , recurrence_counter ) ;
invreq - > invreq_recurrence_start = tal_steal ( invreq , recurrence_start ) ;
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2022-11-09 03:32:00 +01:00
* - if ` offer_amount ` is not present :
* - MUST specify ` invreq_amount ` .
* - otherwise :
* - MAY omit ` invreq_amount ` .
* - if it sets ` invreq_amount ` :
* - MUST specify ` invreq_amount ` . ` msat ` as greater or equal to
* amount expected by ` offer_amount ` ( and , if present ,
* ` offer_currency ` and ` invreq_quantity ` ) .
2020-12-16 04:18:00 +01:00
*/
2022-11-09 03:32:01 +01:00
if ( invreq - > offer_amount ) {
2021-01-09 05:25:46 +01:00
/* FIXME: Check after quantity? */
if ( msat ) {
2022-11-09 03:32:00 +01:00
invreq - > invreq_amount = tal_dup ( invreq , u64 ,
& msat - > millisatoshis ) ; /* Raw: tu64 */
2021-01-09 05:25:46 +01:00
}
2020-12-16 04:18:00 +01:00
} else {
if ( ! msat )
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" msatoshi parameter required " ) ;
2022-11-09 03:32:00 +01:00
invreq - > invreq_amount = tal_dup ( invreq , u64 ,
& msat - > millisatoshis ) ; /* Raw: tu64 */
2020-12-16 04:18:00 +01:00
}
/* BOLT-offers #12:
2022-11-09 03:32:00 +01:00
* - if ` offer_quantity_max ` is present :
* - MUST set ` invreq_quantity `
* - if ` offer_quantity_max ` is non - zero :
* - MUST set ` invreq_quantity ` less than or equal to
* ` offer_quantity_max ` .
2020-12-16 04:18:00 +01:00
*/
2022-11-09 03:32:01 +01:00
if ( invreq - > offer_quantity_max ) {
2022-11-09 03:32:00 +01:00
if ( ! invreq - > invreq_quantity )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" quantity parameter required " ) ;
2022-11-09 03:32:01 +01:00
if ( * invreq - > offer_quantity_max
& & * invreq - > invreq_quantity > * invreq - > offer_quantity_max )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" quantity must be <= % " PRIu64 ,
2022-11-09 03:32:01 +01:00
* invreq - > offer_quantity_max ) ;
2020-12-16 04:18:00 +01:00
} else {
2022-11-09 03:32:00 +01:00
if ( invreq - > invreq_quantity )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" quantity parameter unnecessary " ) ;
}
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2020-12-16 04:18:00 +01:00
* - if the offer contained ` recurrence ` :
*/
2022-11-09 03:32:01 +01:00
if ( invreq - > offer_recurrence ) {
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2020-12-16 04:18:00 +01:00
* - for the initial request :
* . . .
* - MUST set ` recurrence_counter ` ` counter ` to 0.
*/
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2020-12-16 04:18:00 +01:00
* - for any successive requests :
* . . .
* - MUST set ` recurrence_counter ` ` counter ` to one greater
* than the highest - paid invoice .
*/
2022-11-09 03:32:00 +01:00
if ( ! invreq - > invreq_recurrence_counter )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" needs recurrence_counter " ) ;
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2020-12-16 04:18:00 +01:00
* - if the offer contained ` recurrence_base ` with
* ` start_any_period ` non - zero :
* - MUST include ` recurrence_start `
* . . .
* - otherwise :
* - MUST NOT include ` recurrence_start `
*/
2022-11-09 03:32:01 +01:00
if ( invreq - > offer_recurrence_base
& & invreq - > offer_recurrence_base - > start_any_period ) {
2022-11-09 03:32:00 +01:00
if ( ! invreq - > invreq_recurrence_start )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" needs recurrence_start " ) ;
} else {
2022-11-09 03:32:00 +01:00
if ( invreq - > invreq_recurrence_start )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" unnecessary recurrence_start " ) ;
}
/* recurrence_label uniquely identifies this series of
2021-07-05 08:23:29 +02:00
* payments ( unless they supply secret themselves ) ! */
if ( ! rec_label & & ! payer_secret )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" needs recurrence_label " ) ;
} else {
2021-11-30 04:06:05 +01:00
/* BOLT-offers-recurrence #12:
2020-12-16 04:18:00 +01:00
* - otherwise :
* - MUST NOT set ` recurrence_counter ` .
* - MUST NOT set ` recurrence_start `
*/
2022-11-09 03:32:00 +01:00
if ( invreq - > invreq_recurrence_counter )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" unnecessary recurrence_counter " ) ;
2022-11-09 03:32:00 +01:00
if ( invreq - > invreq_recurrence_start )
2020-12-16 04:18:00 +01:00
return command_fail ( cmd , JSONRPC2_INVALID_PARAMS ,
" unnecessary recurrence_start " ) ;
}
/* BOLT-offers #12:
*
2022-11-09 03:32:00 +01:00
* - if ` offer_chains ` is set :
* - MUST set ` invreq_chain ` to one of ` offer_chains ` unless that
* chain is bitcoin , in which case it MAY omit ` invreq_chain ` .
2020-12-16 04:18:00 +01:00
* - otherwise :
2022-11-09 03:32:00 +01:00
* - if it sets ` invreq_chain ` it MUST set it to bitcoin .
2020-12-16 04:18:00 +01:00
*/
2022-11-09 03:32:00 +01:00
/* We already checked that we're compatible chain, in param_offer */
2020-12-16 04:18:00 +01:00
if ( ! streq ( chainparams - > network_name , " bitcoin " ) ) {
2022-11-09 03:32:00 +01:00
invreq - > invreq_chain = tal_dup ( invreq , struct bitcoin_blkid ,
& chainparams - > genesis_blockhash ) ;
2020-12-16 04:18:00 +01:00
}
2022-11-09 03:32:00 +01:00
/* BOLT-offers #12:
* - if it supports bolt12 invoice request features :
* - MUST set ` invreq_features ` . ` features ` to the bitmap of features .
*/
invreq - > invreq_features
= plugin_feature_set ( cmd - > plugin ) - > bits [ BOLT12_OFFER_FEATURE ] ;
2020-12-16 04:18:00 +01:00
2022-11-09 03:32:00 +01:00
/* invreq->invreq_payer_note is not a nul-terminated string! */
2021-07-02 02:11:35 +02:00
if ( payer_note )
2022-11-09 03:32:00 +01:00
invreq - > invreq_payer_note = tal_dup_arr ( invreq , utf8 ,
payer_note ,
strlen ( payer_note ) ,
0 ) ;
2021-07-02 02:11:35 +02:00
2021-07-05 08:23:29 +02:00
/* They can provide a secret, and we don't assume it's our job
* to pay . */
if ( payer_secret )
return force_payer_secret ( cmd , sent , invreq , payer_secret ) ;
2020-12-16 04:18:00 +01:00
/* Make the invoice request (fills in payer_key and payer_info) */
req = jsonrpc_request_start ( cmd - > plugin , cmd , " createinvoicerequest " ,
& invreq_done ,
& forward_error ,
2021-01-07 19:40:47 +01:00
sent ) ;
2022-11-09 03:32:01 +01:00
/* We don't want this is the database: that's only for ones we publish */
2020-12-16 04:18:00 +01:00
json_add_string ( req - > js , " bolt12 " , invrequest_encode ( tmpctx , invreq ) ) ;
2022-11-09 03:32:01 +01:00
json_add_bool ( req - > js , " savetodb " , false ) ;
2020-12-16 04:18:00 +01:00
if ( rec_label )
json_add_string ( req - > js , " recurrence_label " , rec_label ) ;
return send_outreq ( cmd - > plugin , req ) ;
}
2021-01-07 19:39:47 +01:00
/* FIXME: Using a hook here is not ideal: technically it doesn't mean
* it ' s actually hit the db ! But using waitinvoice is also suboptimal
* because we don ' t have libplugin infra to cancel a pending req ( and I
* want to rewrite our wait * API anyway ) */
static struct command_result * invoice_payment ( struct command * cmd ,
const char * buf ,
const jsmntok_t * params )
{
struct sent * i ;
const jsmntok_t * ptok , * preimagetok , * msattok ;
struct preimage preimage ;
struct amount_msat msat ;
ptok = json_get_member ( buf , params , " payment " ) ;
preimagetok = json_get_member ( buf , ptok , " preimage " ) ;
msattok = json_get_member ( buf , ptok , " msat " ) ;
if ( ! preimagetok | | ! msattok )
plugin_err ( cmd - > plugin ,
" Invalid invoice_payment %.*s " ,
json_tok_full_len ( params ) ,
json_tok_full ( buf , params ) ) ;
hex_decode ( buf + preimagetok - > start ,
preimagetok - > end - preimagetok - > start ,
& preimage , sizeof ( preimage ) ) ;
json_to_msat ( buf , msattok , & msat ) ;
list_for_each ( & sent_list , i , list ) {
2021-01-07 19:50:47 +01:00
struct out_req * req ;
2021-01-07 19:39:47 +01:00
if ( ! i - > inv )
continue ;
if ( ! preimage_eq ( & preimage , & i - > inv_preimage ) )
continue ;
2021-01-07 19:50:47 +01:00
/* It was paid! Success. Return as per waitinvoice. */
req = jsonrpc_request_start ( cmd - > plugin , i - > cmd , " waitinvoice " ,
& forward_result ,
& forward_error ,
i ) ;
json_add_escaped_string ( req - > js , " label " , i - > inv_label ) ;
discard_result ( send_outreq ( cmd - > plugin , req ) ) ;
2021-01-07 19:39:47 +01:00
break ;
}
return command_hook_success ( cmd ) ;
}
2021-08-19 06:53:04 +02:00
# if DEVELOPER
static struct command_result * param_invreq ( struct command * cmd ,
const char * name ,
const char * buffer ,
const jsmntok_t * tok ,
struct tlv_invoice_request * * invreq )
{
char * fail ;
* invreq = invrequest_decode ( cmd , buffer + tok - > start , tok - > end - tok - > start ,
plugin_feature_set ( cmd - > plugin ) , chainparams ,
& fail ) ;
if ( ! * invreq )
return command_fail_badparam ( cmd , name , buffer , tok ,
tal_fmt ( cmd ,
" Unparsable invreq: %s " ,
fail ) ) ;
return NULL ;
}
static struct command_result * json_rawrequest ( struct command * cmd ,
const char * buffer ,
const jsmntok_t * params )
{
struct sent * sent = tal ( cmd , struct sent ) ;
u32 * timeout ;
2022-10-17 02:37:05 +02:00
struct pubkey * node_id ;
2021-08-19 06:53:04 +02:00
if ( ! param ( cmd , buffer , params ,
p_req ( " invreq " , param_invreq , & sent - > invreq ) ,
2022-10-17 02:37:05 +02:00
p_req ( " nodeid " , param_pubkey , & node_id ) ,
2021-08-19 06:53:04 +02:00
p_opt_def ( " timeout " , param_number , & timeout , 60 ) ,
NULL ) )
return command_param_failed ( ) ;
/* This is how long we'll wait for a reply for. */
sent - > wait_timeout = * timeout ;
sent - > cmd = cmd ;
sent - > offer = NULL ;
2022-10-17 02:37:05 +02:00
sent - > path = path_to_node ( sent , cmd - > plugin , node_id ) ;
2021-09-21 06:05:24 +02:00
if ( ! sent - > path ) {
2022-10-17 02:37:05 +02:00
return connect_direct ( cmd , node_id ,
2021-08-19 06:53:04 +02:00
sendinvreq_after_connect , sent ) ;
2021-09-21 06:05:24 +02:00
}
2021-08-19 06:53:04 +02:00
return sendinvreq_after_connect ( cmd , NULL , NULL , sent ) ;
}
# endif /* DEVELOPER */
2021-01-07 19:38:47 +01:00
static const struct plugin_command commands [ ] = {
{
" fetchinvoice " ,
" payment " ,
" Request remote node for an invoice for this {offer}, with {amount}, {quanitity}, {recurrence_counter}, {recurrence_start} and {recurrence_label} iff required. " ,
NULL ,
json_fetchinvoice ,
} ,
2021-08-19 06:53:04 +02:00
# if DEVELOPER
{
" dev-rawrequest " ,
" util " ,
" Send {invreq} to {nodeid}, wait {timeout} (60 seconds by default) " ,
NULL ,
json_rawrequest ,
} ,
# endif /* DEVELOPER */
2020-12-16 04:18:00 +01:00
} ;
2021-01-13 04:00:24 +01:00
static const char * init ( struct plugin * p , const char * buf UNUSED ,
const jsmntok_t * config UNUSED )
2020-12-16 04:18:00 +01:00
{
2021-01-13 09:58:38 +01:00
bool exp_offers ;
2021-01-06 06:41:20 +01:00
rpc_scan ( p , " getinfo " ,
take ( json_out_obj ( NULL , NULL , NULL ) ) ,
2021-09-21 07:23:45 +02:00
" {id:%} " , JSON_SCAN ( json_to_pubkey , & local_id ) ) ;
2021-01-13 04:00:24 +01:00
2021-01-13 09:58:38 +01:00
rpc_scan ( p , " listconfigs " ,
take ( json_out_obj ( NULL , " config " , " experimental-offers " ) ) ,
" {experimental-offers:%} " ,
JSON_SCAN ( json_to_bool , & exp_offers ) ) ;
if ( ! exp_offers )
return " offers not enabled in config " ;
2021-01-13 04:00:24 +01:00
return NULL ;
2020-12-16 04:18:00 +01:00
}
2020-12-16 04:18:20 +01:00
static const struct plugin_hook hooks [ ] = {
2021-09-30 23:19:36 +02:00
{
2022-11-09 02:30:10 +01:00
" onion_message_recv_secret " ,
2021-09-30 23:19:36 +02:00
recv_modern_onion_message
2020-12-16 04:18:20 +01:00
} ,
2021-01-07 19:39:47 +01:00
{
" invoice_payment " ,
invoice_payment ,
} ,
2020-12-16 04:18:20 +01:00
} ;
2020-12-16 04:18:00 +01:00
int main ( int argc , char * argv [ ] )
{
setup_locale ( ) ;
plugin_main ( argv , init , PLUGIN_RESTARTABLE , true , NULL ,
commands , ARRAY_SIZE ( commands ) ,
/* No notifications */
NULL , 0 ,
2020-12-16 04:18:20 +01:00
hooks , ARRAY_SIZE ( hooks ) ,
2021-04-28 17:28:27 +02:00
NULL , 0 ,
2021-07-01 06:28:57 +02:00
plugin_option ( " fetchinvoice-noconnect " , " flag " ,
" Don't try to connect directly to fetch an invoice. " ,
flag_option , & disable_connect ) ,
2020-12-16 04:18:00 +01:00
NULL ) ;
}