When using postgres, at startup we optionnally run a few basic safety checks, e.g. the number of local channels, how long since the last local channel update, etc. The goal is to make sure that we are connected to the correct database instance.
10 KiB
Eclair vnext
Major changes
Anchor outputs activated by default
Experimental support for anchor outputs channels was first introduced in eclair v0.4.2. Going from an experimental feature to production-ready required a lot more work than we expected! What seems to be a simple change in transaction structure had a lot of impact in many unexpected places, and fundamentally changes the mechanisms to ensure funds safety.
When using anchor outputs, you will need to keep utxos available in your bitcoind
wallet to fee-bump HTLC transactions when channels are force-closed.
Eclair will warn you via the notifications.log
file when your bitcoind
wallet balance is too low to protect your funds against malicious channel peers.
Eclair will wait for you to add funds to your wallet and automatically retry, but you may be at risk in the meantime if you had pending payments at the time of the force-close.
We recommend activating debug logs for the transaction publication mechanisms.
This will make it much easier to follow the trail of RBF-ed transactions, and shouldn't be too noisy unless you constantly have a lot of channels force-closing.
To activate these logs, simply add the following line to your logback.xml
:
<logger name="fr.acinq.eclair.channel.publish" level="DEBUG"/>
You don't even need to restart eclair, it will automatically pick up the logging configuration update after a short while.
If you don't want to use anchor outputs, you can disable the feature in your eclair.conf
:
eclair.features.option_anchors_zero_fee_htlc_tx = disabled
Alternate strategy to avoid mass force-close of channels in certain cases
The default strategy, when an unhandled exception or internal error happens, is to locally force-close the channel. Not only is there a delay before the channel balance gets refunded, but if the exception was due to some misconfiguration or bug in eclair that affects all channels, we risk force-closing all channels.
This is why an alternative behavior is to simply log an error and stop the node. Note that if you don't closely monitor your node, there is a risk that your peers take advantage of the downtime to try and cheat by publishing a revoked commitment. Additionally, while there is no known way of triggering an internal error in eclair from the outside, there may very well be a bug that allows just that, which could be used as a way to remotely stop the node (with the default behavior, it would "only" cause a local force-close of the channel).
Separate log for important notifications
Eclair added a new log file (notifications.log
) for important notifications that require an action from the node operator.
Node operators should watch this file very regularly.
An event is also sent to the event stream for every such notification. This lets plugins notify the node operator via external systems (push notifications, email, etc).
Support for onion messages
Eclair now supports the option_onion_messages
feature (see https://github.com/lightning/bolts/pull/759).
This feature is enabled by default: eclair will automatically relay onion messages it receives.
By default, eclair will only accept and relay onion messages from peers with whom you have channels.
You can change that strategy by updating eclair.onion-messages.relay-policy
in your eclair.conf
.
Eclair applies some rate-limiting on the number of messages that can be relayed to and from each peer.
You can choose what limits to apply by updating eclair.onion-messages.max-per-peer-per-second
in your eclair.conf
.
Whenever an onion message for your node is received, eclair will emit an event, that can for example be received on the websocket (onion-message-received
).
You can also send onion messages via the API. This will be covered in the API changes section below.
To disable the feature, you can simply update your eclair.conf
:
eclair.features.option_onion_messages = disabled
Support for option_payment_metadata
Eclair now supports the option_payment_metadata
feature (see https://github.com/lightning/bolts/pull/912).
This feature will let recipients generate "light" invoices that don't need to be stored locally until they're paid.
This is particularly useful for payment hubs that generate a lot of invoices (e.g. to be displayed on a website) but expect only a fraction of them to actually be paid.
Eclair includes a small payment_metadata
field in all invoices it generates.
This lets node operators verify that payers actually support that feature.
Optional safety checks when using Postgres
When using postgres, at startup we optionally run a few basic safety checks, e.g. the number of local channels, how long since the last local channel update, etc. The goal is to make sure that we are connected to the correct database instance.
Those checks are disabled by default because they wouldn't pass on a fresh new node with zero channels. You should enable them when you already have channels, so that there is something to compare to, and the values should be specific to your setup, particularly for local channels. Configuration is done by overriding max-age
and min-count
values in your eclair.conf
:
eclair.db.postgres.safety-checks
{
enabled = true
max-age {
local-channels = 3 minutes
network-nodes = 30 minutes
audit-relayed = 10 minutes
}
min-count {
local-channels = 10
network-nodes = 3000
network-channels = 20000
}
}
API changes
Timestamps
All timestamps are now returned as an object with two attributes:
iso
: ISO-8601 format with GMT time zone. Precision may be second or millisecond depending on the timestamp.unix
: seconds since epoch formats (seconds since epoch). Precision is always second.
Examples:
- second-precision timestamp:
- before:
{ "timestamp": 1633357961 }
- after
{ "timestamp": { "iso": "2021-10-04T14:32:41Z", "unix": 1633357961 } }
- milli-second precision timestamp:
- before:
{ "timestamp": 1633357961456 }
- after (note how the unix format is in second precision):
{ "timestamp": { "iso": "2021-10-04T14:32:41.456Z", "unix": 1633357961 } }
Sending onion messages
You can now send onion messages with sendonionmessage
.
There are two ways to specify the recipient:
- when you're sending to a known
nodeId
, you must set it in the--recipientNode
field - when you're sending to an unknown node behind a blinded route, you must provide the blinded route in the
--recipientBlindedRoute
field (hex-encoded)
If you're not connected to the recipient and don't have channels with them, eclair will try connecting to them based on the best address it knows (usually from their node_announcement
).
If that fails, or if you don't want to expose your nodeId
by directly connecting to the recipient, you should find a route to them and specify the nodes in that route in the --intermediateNodes
field.
You can send arbitrary content to the recipient, by providing a hex-encoded tlv in the --content
field.
If you expect a response, you should provide a route from the recipient back to you in the --replyPath
field.
Eclair will create a corresponding blinded route, and the API will wait for a response (or timeout if it doesn't receive a response).
Balance
The detailed balance json format has been slightly updated for channels in state normal
and shutdown
, and closing
.
Amounts corresponding to incoming htlcs for which we knew the preimage were previously included in toLocal
, they are
now grouped with outgoing htlcs amounts and the field has been renamed from htlcOut
to htlcs
.
Miscellaneous
This release contains many other API updates:
deleteinvoice
allows you to remove unpaid invoices (#1984)findroute
,findroutetonode
andfindroutebetweennodes
supports new output formatfull
(#1969)findroute
,findroutetonode
andfindroutebetweennodes
now accept--ignoreNodeIds
to specify nodes you want to be ignored in path-finding (#1969)findroute
,findroutetonode
andfindroutebetweennodes
now accept--ignoreShortChannelIds
to specify channels you want to be ignored in path-finding (#1969)findroute
,findroutetonode
andfindroutebetweennodes
now accept--maxFeeMsat
to specify an upper bound of fees (#1969)getsentinfo
output includesfailedNode
field for all failed routes- for
payinvoice
andsendtonode
,--feeThresholdSat
has been renamed to--maxFeeFlatSat
- the
networkstats
API has been removed
Have a look at our API documentation for more details.
Miscellaneous improvements and bug fixes
- Eclair now supports cookie authentication for Bitcoin Core RPC (#1986)
Verifying signatures
You will need gpg
and our release signing key 7A73FE77DE2C4027. Note that you can get it:
- from our website: https://acinq.co/pgp/drouinf.asc
- from github user @sstone, a committer on eclair: https://api.github.com/users/sstone/gpg_keys
To import our signing key:
$ gpg --import drouinf.asc
To verify the release file checksums and signatures:
$ gpg -d SHA256SUMS.asc > SHA256SUMS.stripped
$ sha256sum -c SHA256SUMS.stripped
Building
Eclair builds are deterministic. To reproduce our builds, please use the following environment (*):
- Ubuntu 20.04
- AdoptOpenJDK 11.0.6
- Maven 3.8.1
Use the following command to generate the eclair-node package:
mvn clean install -DskipTests
That should generate eclair-node/target/eclair-node-<version>-XXXXXXX-bin.zip
with sha256 checksums that match the one we provide and sign in SHA256SUMS.asc
(*) You may be able to build the exact same artefacts with other operating systems or versions of JDK 11, we have not tried everything.
Upgrading
This release is fully compatible with previous eclair versions. You don't need to close your channels, just stop eclair, upgrade and restart.
Changelog
<fill this section when publishing the release with git log v0.6.2... --format=oneline --reverse
>