mirror of
https://github.com/ElementsProject/lightning.git
synced 2024-11-19 18:11:28 +01:00
90b669857e
1. Freeing an unconfirmed channel already releases the subd, so don't do that explicitly. 2. Use channel->owner to transfer ownership where possible, using channel_set_owner() which handles all the cases. This simplifies the code and makes it more readable, IMHO. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
292 lines
7.9 KiB
C
292 lines
7.9 KiB
C
#include "config.h"
|
|
#include <ccan/ccan/tal/str/str.h>
|
|
#include <common/json_command.h>
|
|
#include <common/type_to_string.h>
|
|
#include <common/wire_error.h>
|
|
#include <connectd/connectd_wiregen.h>
|
|
#include <errno.h>
|
|
#include <hsmd/hsmd_wiregen.h>
|
|
#include <lightningd/channel.h>
|
|
#include <lightningd/channel_control.h>
|
|
#include <lightningd/notification.h>
|
|
#include <lightningd/opening_common.h>
|
|
#include <lightningd/peer_control.h>
|
|
#include <lightningd/subd.h>
|
|
#include <openingd/openingd_wiregen.h>
|
|
#include <wire/wire_sync.h>
|
|
|
|
static void destroy_uncommitted_channel(struct uncommitted_channel *uc)
|
|
{
|
|
struct subd *open_daemon = uc->open_daemon;
|
|
|
|
if (open_daemon) {
|
|
uc->open_daemon = NULL;
|
|
subd_release_channel(open_daemon, uc);
|
|
}
|
|
|
|
/* This is how shutdown_subdaemons tells us not to delete from db! */
|
|
if (!uc->peer->uncommitted_channel)
|
|
return;
|
|
|
|
uc->peer->uncommitted_channel = NULL;
|
|
|
|
maybe_delete_peer(uc->peer);
|
|
}
|
|
|
|
struct uncommitted_channel *
|
|
new_uncommitted_channel(struct peer *peer)
|
|
{
|
|
struct lightningd *ld = peer->ld;
|
|
struct uncommitted_channel *uc = tal(ld, struct uncommitted_channel);
|
|
u8 *new_channel_msg;
|
|
|
|
uc->peer = peer;
|
|
assert(!peer->uncommitted_channel);
|
|
|
|
uc->transient_billboard = NULL;
|
|
uc->dbid = wallet_get_channel_dbid(ld->wallet);
|
|
|
|
uc->log = new_log(uc, ld->log_book, &uc->peer->id,
|
|
"chan#%"PRIu64, uc->dbid);
|
|
|
|
uc->fc = NULL;
|
|
uc->our_config.id = 0;
|
|
|
|
memset(&uc->cid, 0xFF, sizeof(uc->cid));
|
|
|
|
/* Declare the new channel to the HSM. */
|
|
new_channel_msg = towire_hsmd_new_channel(NULL, &uc->peer->id, uc->dbid);
|
|
if (!wire_sync_write(ld->hsm_fd, take(new_channel_msg)))
|
|
fatal("Could not write to HSM: %s", strerror(errno));
|
|
new_channel_msg = wire_sync_read(tmpctx, ld->hsm_fd);
|
|
if (!fromwire_hsmd_new_channel_reply(new_channel_msg))
|
|
fatal("HSM gave bad hsm_new_channel_reply %s",
|
|
tal_hex(new_channel_msg, new_channel_msg));
|
|
|
|
get_channel_basepoints(ld, &uc->peer->id, uc->dbid,
|
|
&uc->local_basepoints, &uc->local_funding_pubkey);
|
|
|
|
uc->peer->uncommitted_channel = uc;
|
|
tal_add_destructor(uc, destroy_uncommitted_channel);
|
|
|
|
uc->got_offer = false;
|
|
|
|
return uc;
|
|
}
|
|
|
|
void opend_channel_errmsg(struct uncommitted_channel *uc,
|
|
struct per_peer_state *pps,
|
|
const struct channel_id *channel_id UNUSED,
|
|
const char *desc,
|
|
bool warning UNUSED,
|
|
const u8 *err_for_them UNUSED)
|
|
{
|
|
/* Close fds, if any. */
|
|
tal_free(pps);
|
|
uncommitted_channel_disconnect(uc, LOG_INFORM, desc);
|
|
tal_free(uc);
|
|
}
|
|
|
|
/* There's nothing permanent in an unconfirmed transaction */
|
|
void opend_channel_set_billboard(struct uncommitted_channel *uc,
|
|
bool perm UNUSED,
|
|
const char *happenings TAKES)
|
|
{
|
|
uc->transient_billboard = tal_free(uc->transient_billboard);
|
|
if (happenings)
|
|
uc->transient_billboard = tal_strdup(uc, happenings);
|
|
}
|
|
|
|
|
|
void uncommitted_channel_disconnect(struct uncommitted_channel *uc,
|
|
enum log_level level,
|
|
const char *desc)
|
|
{
|
|
u8 *msg = towire_connectd_peer_disconnected(tmpctx, &uc->peer->id);
|
|
log_(uc->log, level, NULL, false, "%s", desc);
|
|
subd_send_msg(uc->peer->ld->connectd, msg);
|
|
if (uc->fc && uc->fc->cmd)
|
|
was_pending(command_fail(uc->fc->cmd, LIGHTNINGD, "%s", desc));
|
|
notify_disconnect(uc->peer->ld, &uc->peer->id);
|
|
}
|
|
|
|
|
|
void kill_uncommitted_channel(struct uncommitted_channel *uc,
|
|
const char *why)
|
|
{
|
|
log_info(uc->log, "Killing opening daemon: %s", why);
|
|
|
|
uncommitted_channel_disconnect(uc, LOG_INFORM, why);
|
|
tal_free(uc);
|
|
}
|
|
|
|
void channel_config(struct lightningd *ld,
|
|
struct channel_config *ours,
|
|
u32 *max_to_self_delay,
|
|
struct amount_msat *min_effective_htlc_capacity)
|
|
{
|
|
/* FIXME: depend on feerate. */
|
|
*max_to_self_delay = ld->config.locktime_max;
|
|
|
|
/* Take minimal effective capacity from config min_capacity_sat */
|
|
if (!amount_sat_to_msat(min_effective_htlc_capacity,
|
|
amount_sat(ld->config.min_capacity_sat)))
|
|
fatal("amount_msat overflow for config.min_capacity_sat");
|
|
|
|
/* BOLT #2:
|
|
*
|
|
* The sending node SHOULD:
|
|
*...
|
|
* - set `dust_limit_satoshis` to a sufficient value to allow
|
|
* commitment transactions to propagate through the Bitcoin network.
|
|
*/
|
|
ours->dust_limit = chainparams->dust_limit;
|
|
ours->max_htlc_value_in_flight = AMOUNT_MSAT(UINT64_MAX);
|
|
|
|
ours->max_dust_htlc_exposure_msat
|
|
= ld->config.max_dust_htlc_exposure_msat;
|
|
|
|
/* Don't care */
|
|
ours->htlc_minimum = AMOUNT_MSAT(0);
|
|
|
|
/* BOLT #2:
|
|
*
|
|
* The sending node SHOULD:
|
|
* - set `to_self_delay` sufficient to ensure the sender can
|
|
* irreversibly spend a commitment transaction output, in case of
|
|
* misbehavior by the receiver.
|
|
*/
|
|
ours->to_self_delay = ld->config.locktime_blocks;
|
|
|
|
ours->max_accepted_htlcs = ld->config.max_concurrent_htlcs;
|
|
|
|
/* This is filled in by lightning_openingd, for consistency. */
|
|
ours->channel_reserve = AMOUNT_SAT(UINT64_MAX);
|
|
}
|
|
|
|
void handle_reestablish(struct lightningd *ld,
|
|
const struct node_id *peer_id,
|
|
const struct channel_id *channel_id,
|
|
const u8 *reestablish,
|
|
struct per_peer_state *pps)
|
|
{
|
|
struct peer *peer;
|
|
struct channel *c;
|
|
|
|
/* We very carefully re-xmit the last reestablish, so they can get
|
|
* their secrets back. We don't otherwise touch them. */
|
|
peer = peer_by_id(ld, peer_id);
|
|
if (peer)
|
|
c = find_channel_by_id(peer, channel_id);
|
|
else
|
|
c = NULL;
|
|
|
|
if (c && channel_closed(c)) {
|
|
log_debug(c->log, "Reestablish on %s channel: using channeld to reply",
|
|
channel_state_name(c));
|
|
peer_start_channeld(c, pps, NULL, true, reestablish);
|
|
} else {
|
|
const u8 *err = towire_errorfmt(tmpctx, channel_id,
|
|
"Unknown channel for reestablish");
|
|
log_debug(ld->log, "Reestablish on UNKNOWN channel %s",
|
|
type_to_string(tmpctx, struct channel_id, channel_id));
|
|
subd_send_msg(ld->connectd,
|
|
take(towire_connectd_peer_final_msg(NULL, peer_id,
|
|
pps, err)));
|
|
subd_send_fd(ld->connectd, pps->peer_fd);
|
|
subd_send_fd(ld->connectd, pps->gossip_fd);
|
|
subd_send_fd(ld->connectd, pps->gossip_store_fd);
|
|
/* Don't close those fds! */
|
|
pps->peer_fd
|
|
= pps->gossip_fd
|
|
= pps->gossip_store_fd
|
|
= -1;
|
|
}
|
|
}
|
|
|
|
#if DEVELOPER
|
|
/* Indented to avoid include ordering check */
|
|
#include <lightningd/memdump.h>
|
|
|
|
static void opening_died_forget_memleak(struct subd *open_daemon,
|
|
struct command *cmd)
|
|
{
|
|
/* FIXME: We ignore the remaining opening daemons in this case. */
|
|
opening_memleak_done(cmd, NULL);
|
|
}
|
|
|
|
/* Mutual recursion */
|
|
static void opening_memleak_req_next(struct command *cmd, struct peer *prev);
|
|
static void opening_memleak_req_done(struct subd *open_daemon,
|
|
const u8 *msg, const int *fds UNUSED,
|
|
struct command *cmd)
|
|
{
|
|
bool found_leak;
|
|
struct peer *p;
|
|
|
|
p = ((struct uncommitted_channel *)open_daemon->channel)->peer;
|
|
|
|
tal_del_destructor2(open_daemon, opening_died_forget_memleak, cmd);
|
|
if (!fromwire_openingd_dev_memleak_reply(msg, &found_leak)) {
|
|
was_pending(command_fail(cmd, LIGHTNINGD,
|
|
"Bad opening_dev_memleak"));
|
|
return;
|
|
}
|
|
|
|
if (found_leak) {
|
|
opening_memleak_done(cmd, open_daemon);
|
|
return;
|
|
}
|
|
opening_memleak_req_next(cmd, p);
|
|
}
|
|
|
|
static void opening_memleak_req_next(struct command *cmd, struct peer *prev)
|
|
{
|
|
struct peer *p;
|
|
struct channel *c;
|
|
u8 *msg;
|
|
|
|
list_for_each(&cmd->ld->peers, p, list) {
|
|
struct subd *open_daemon;
|
|
c = NULL;
|
|
|
|
if (!p->uncommitted_channel
|
|
&& !(c = peer_unsaved_channel(p)))
|
|
continue;
|
|
|
|
if (p == prev) {
|
|
prev = NULL;
|
|
continue;
|
|
}
|
|
if (prev != NULL)
|
|
continue;
|
|
|
|
if (c)
|
|
open_daemon = c->owner;
|
|
else
|
|
open_daemon = p->uncommitted_channel->open_daemon;
|
|
|
|
if (!open_daemon)
|
|
continue;
|
|
|
|
/* FIXME: dualopend doesn't support memleak when we ask */
|
|
if (streq(open_daemon->name, "dualopend"))
|
|
continue;
|
|
|
|
msg = towire_openingd_dev_memleak(NULL);
|
|
subd_req(p, open_daemon, take(msg), -1, 0,
|
|
opening_memleak_req_done, cmd);
|
|
/* Just in case it dies before replying! */
|
|
tal_add_destructor2(open_daemon,
|
|
opening_died_forget_memleak, cmd);
|
|
return;
|
|
}
|
|
opening_memleak_done(cmd, NULL);
|
|
}
|
|
|
|
void opening_dev_memleak(struct command *cmd)
|
|
{
|
|
opening_memleak_req_next(cmd, NULL);
|
|
}
|
|
#endif /* DEVELOPER */
|