1
0
Fork 0
mirror of https://github.com/ACINQ/eclair.git synced 2025-03-13 11:35:47 +01:00
Commit graph

2276 commits

Author SHA1 Message Date
dpad85
11b2e27444
Back to development mode 2022-01-19 18:36:44 +01:00
dpad85
bc53da9d86
Release v0.4.15-android-phoenix 2021-10-20 11:34:55 +02:00
dpad85
7caa351ef8
Use bitcoin-lib v0.18.1_2.11 with scala denominated packages
Using `fr.acinq.bitcoin.scala` package prevents confusion with the
bitcoin-kmp packages, and lets us use those 2 libraries at the same
time in the same project.
2021-09-14 15:32:24 +02:00
dpad85
ac076d9c05
Back to development mode 2021-09-09 17:31:38 +02:00
dpad85
0c822f4d6e
Release v0.4.14-android-phoenix 2021-09-02 13:14:26 +02:00
Bastien Teinturier
44d37bfd9e
Retry local channel failures in trampoline payments (#1903)
We previously made a single payment attempt per trampoline fee.
Since our channel selection for the first attempt is deterministic, if we
encountered a local failure with that channel, the retries with higher
trampoline fees were hitting the exact same error, whereas we should
instead try a different channel.
2021-08-12 10:29:12 +02:00
Dominique
73a6b9e55c
Release v0.4.13-android-phoenix 2021-07-20 15:48:00 +02:00
Dominique
88ffec8875
Merge branch 'android' into android-phoenix 2021-07-20 15:45:39 +02:00
Dominique
18926b1a60
Release v0.4.13-android 2021-07-20 15:25:37 +02:00
Pierre-Marie Padiou
c22094fc2d
Fix pay-to-open below minimum when using MPP (#1892)
Compare the *sum* of all pay-to-open parts against the min pay-to-open
amount.
2021-07-19 18:55:50 +02:00
dpad85
e9e5e63057
Use WAL mode on sqlite
This commit is adapted from #1871
2021-07-16 21:01:42 +02:00
dpad85
0e27c19cc2
Back to development mode 2021-07-16 21:00:55 +02:00
dpad85
cca712571c
Release v0.4.12-android-phoenix 2021-06-03 18:09:17 +02:00
Fabrice Drouin
e9c1e09c2d
Symmetrical HTLC limits (#1828) (#1836)
The spec defines `max_accepted_htlcs` and `max_htlc_value_in_flight_msat`
to let nodes reduce their exposure to pending HTLCs. This only applies to
received HTLCs, and we use the remote peer's values for outgoing HTLCs.

But when we're more restrictive than our peer, it makes sense to apply our
limits to outgoing HTLCs as well.

Co-authored-by: Bastien Teinturier <31281497+t-bast@users.noreply.github.com>
2021-06-03 17:47:11 +02:00
dpad85
cf2d6af3cc
Release v0.4.12-android 2021-05-19 15:34:50 +02:00
Bastien Teinturier
fdb7a86621
Stop masking feature bits (#1814)
Remove a legacy work-around for very old eclair-mobile users.
2021-05-19 15:32:18 +02:00
dpad85
fbb996eb1a
Release v0.4.11-android 2021-05-17 15:05:09 +02:00
dpad85
963d47dd02
Release v0.4.11-android-phoenix 2021-05-11 15:02:54 +02:00
dpad85
3115084656
Merge branch 'android' into android-phoenix 2021-05-07 20:21:43 +02:00
Fabrice Drouin
5dd5502d0d
Use secp256k1-kmp (#1788)
* Use secp256k1-kmp

We get rid of our old JNI wrapper and switch to bitcoin-lib 0.18 which is based on secp256k1-kmp.
This will give us a consistent secp256k1 library on all our apps (since secp256k1-kmp also provides an Android library).
We also switch from spongycastle to bouncycastle (bitcoin-lib 0.18 uses bouncycastle).

* Set version to SNAPSHOT

Co-authored-by: dpad85 <5765435+dpad85@users.noreply.github.com>
2021-05-07 19:59:56 +02:00
Fabrice Drouin
0294429e05
Update single-address wallet to accept a public key instead of an address (#1780)
This will allow us to use this key as our static payment point for static-remote-key channels.
We use the BIP84 address for this key as our single address.
2021-04-26 19:25:08 +02:00
pm47
2e250b640f
increase fundee timeout to 14 days
This is a simpler alternative to 083515086f.
2021-04-26 15:43:41 +02:00
dpad85
52d54f0e61
Release v0.4.10-android-phoenix 2021-04-13 11:28:16 +02:00
Bastien Teinturier
88dd72274c
Fix Bolt 3 spec change that broke our test suite (#1719)
We just merged lightningnetwork/lightning-rfc@b201efe in the spec
which added Bolt 3 tests, invalidating one of our tests and failing the build.
2021-04-01 14:31:57 +02:00
pm47
7d3dca6541
pay-to-open: remove phoenix-side timeout
It was error prone because some device's clock are off. The timeout is
handled by our node anyway.
2021-04-01 14:31:57 +02:00
dpad85
d1c7264aaa
Release v0.4.9-android-phoenix 2021-02-05 18:35:37 +01:00
pm47
b59f9d640b
handle min pay-to-open in Phoenix 2021-02-01 15:33:06 +01:00
pm47
0b3ba78c7f
set version to 0.4.9-android-phoenix-SNAPSHOT 2021-02-01 15:10:07 +01:00
Bastien Teinturier
cdb4b8a26f
Remote failure updating routing hint (#1675)
The routing hint we get in a Bolt 11 invoice may be obsolete when we attempt
the payment: one of the nodes in the route may have updated his relay fees.

Since this affects a private channel that is not kept in the routing graph,
we need to update the routing hints before injecting them in the router.
This was already done in `PaymentLifecycle` with automatic retries, but when
using MPP we retried in the `MultiPartPaymentLifecycle` instead of inside
the `PaymentLifecycle`, so we need to handle routing hints updates there.
2021-02-01 11:48:57 +01:00
dpad85
4fa66bbafa
Release v0.4.8-android-phoenix 2021-01-25 16:53:33 +01:00
pm47
cf37cb12c9
set version to 0.4.8-android-phoenix-SNAPSHOT 2021-01-25 15:29:35 +01:00
pm47
f678dfa7b8
simplify pay-to-open message
We remove the `feeThresholdSatoshis`/`feeProportionalMillionths` fields
and only keep the `feeAmount` field, which is renamed to `payToOpenFee`.

Fee aggregation is easier, we just sum the `payToOpenFee`.
2021-01-25 15:19:42 +01:00
pm47
189e67ed67
remove Dockerfile 2021-01-15 12:51:16 +01:00
dpad85
5c98d08849
Release v0.4.7-android-phoenix 2021-01-13 12:24:58 +01:00
Pierre-Marie Padiou
ac8dd4d29f
Accept remote's closing fee when we have nothing at stake (#1633)
If we have nothing at stake there is no need to negotiate and we accept
their fee right away.
2020-12-15 13:34:15 +01:00
dpad85
addc7a4ab4
Release v0.4.6-android-phoenix 2020-11-30 14:11:15 +01:00
Pierre-Marie Padiou
339fe1c9f4
Take mutual close txes into account in bg check (#1621)
We have a background task that periodically checks the blockchain to
detect unexpected transactions, as they could be cheating attempts.

When cooperatively closing a channel, in the `NEGOTIATING` state, peers
exchange signatures in order to converge on a feerate for the mutual
close transaction. Any transaction exchanged during this negotiation
process is valid and may be published, even if the counterparty dies
abruptly before converging, due to e.g. connectivity issues.

Therefore, the electrum background check needs to take those
transactions into account and not flag them as potential cheating
attempts. We already do that when we are in the `CLOSING` state, as
there may be competing mutual closes.
2020-11-30 12:47:26 +01:00
Bastien Teinturier
fccd20df0b
Improve MPP-send for direct channels (#1599) (#1601)
When the recipient is a direct peer, we can use the accurate knowledge
of our local channels instead of hard-coded MPP parameters to choose
the number of routes and the minimum route amount.

This change makes it possible to easily send all local funds in one
payment when we're directly connected to the recipient.
2020-11-19 12:31:49 +01:00
dpad85
74e6576f87
Back to development 2020-11-13 18:37:10 +01:00
dpad85
285f33267a
Release v0.4.5-android-phoenix 2020-11-13 17:32:43 +01:00
dpad85
30cecbded1
Merge remote-tracking branch 'origin/graph-edge-detailed-log' into android-phoenix 2020-11-13 17:24:39 +01:00
Bastien Teinturier
4426981d03
Improve MPP-send for direct channels (#1599) (#1600)
When the recipient is a direct peer, we can use the accurate knowledge
of our local channels instead of hard-coded MPP parameters to choose
the number of routes and the minimum route amount.

This change makes it possible to easily send all local funds in one
payment when we're directly connected to the recipient.
2020-11-13 15:53:36 +01:00
pm47
20eb41fb01
pay-to-open: return errors for final node
Only implemented for channel relay.

This is backward compatible, any errors returned by existing Phoenix
will be interpreted as generic errors and will return an
`UnknownNextPeer`.
2020-11-13 15:16:40 +01:00
t-bast
83837b6992
Path-finding: log edge direction
We were previously ommitting the nodeId from graph edge, which means we
add duplicate edges but couldn't know which one was for which direction.
2020-11-12 17:16:24 +01:00
dpad85
13ff55b68b
Back to development 2020-11-12 15:40:20 +01:00
dpad85
ddd9b2ad5a
Release v0.4.4-android-phoenix 2020-11-12 11:56:08 +01:00
Bastien Teinturier
68209b804c
Add more path finding logs (#1597)
Since Phoenix has a low number of channels and discards the whole public
network graph, we can be more aggressive with what we log without flooding
the logs.

This information will be very helpful to troubleshoot issues when users
send multipart payments.
2020-11-12 11:05:00 +01:00
dpad85
71f0afcdc0
Release v0.4.3-android-phoenix 2020-11-10 18:26:01 +01:00
dpad85
7df8c3f543
Remove special ssl rule for electrum with onion address
This rule is redundant. Client app decides what ssl mode is used when
connecting to onion electrum servers. Some users do want to check
certificate when using tor.
2020-11-10 18:22:32 +01:00
Pierre-Marie Padiou
e876b10ffa
High fee tolerance for small channels (#1595)
For small channels we blindly accept feerate from funder.
This is a temporary fix to allow making payment in high fees
environment and will be removed when "anchor outputs" is deployed
2020-11-09 18:52:54 +01:00