Commit graph

1537 commits

Author SHA1 Message Date
Matt Corallo
3fb482a8d9 Add additional trace logging in channel signature validation
This makes it easier to amend the full_stack_target
test_no_existing_test_breakage test by always providing the
neccessary data in the log.
2020-04-29 14:50:09 -04:00
Matt Corallo
9098240e34
Merge pull request #590 from jkczyz/2020-04-feature-flags
Features module improvements
2020-04-29 18:49:39 +00:00
Jeffrey Czyz
ee27e8432a Sanity check that known features are not required 2020-04-29 11:11:51 -07:00
Jeffrey Czyz
b1c6499e1c Expand testing of unknown feature bits
Include tests for requires_unknown_bits and supports_unknown_bits when
an unknown even bit, odd bit, or neither is set. Refactor bit clearing
such that tests and production code share the same code path. Fix a
potential spec incompatibility (currently only exposed in testing code)
where trailing zero bytes are not removed after a bit is cleared.
2020-04-29 11:11:51 -07:00
Jeffrey Czyz
4bd2c974a2 Generalize with_known_relevant_init_flags
Converting from InitFeatures to other Features is accomplished using
Features::with_known_relevant_init_flags. Define a more general
to_context method which converts from Features of one Context to
another.

Additionally, ensure the source context only has known flags before
selecting flags for the target context.
2020-04-29 11:11:51 -07:00
Jeffrey Czyz
65ff1bf0be Generalize feature methods to work in any context
Refactoring the features module allowed for making code specific to
certain contexts generalizable. Specifically, KNOWN_FEATURE_MASK
is defined on Context instead of hardcoded in each method
specialization. Thus, such methods are no longer required.
2020-04-29 11:11:51 -07:00
Jeffrey Czyz
9dd2be15e9 Remove duplicate specification of features
Features for a given context are duplicated throughout the features
module. Use a macro for defining a Context and the applicable features
such that features only need to be defined for a Context in one place.
The Context provides bitmasks for selecting known and unknown feature
flags.

BOLT 1 and BOLT 9 refer to features as "known" if a peer understands
them. They also use the term "supported" to mean either optional or
required.

Update the features module to use similar terminology.
- Define contexts in terms of required and optional features rather than
  just supported features
- Define known features as those that are optional or required
- Rename supported() constructor to known()

For completeness, clear_optional_bit for each feature is now called
clear_bits and clears both optional and required bits.
2020-04-29 11:09:23 -07:00
Jeffrey Czyz
77b467c845 Improve features module documentation 2020-04-29 11:09:23 -07:00
Jeffrey Czyz
491bbc56cf Encapsulate feature flag checking and manipulation
Each feature is represented by two bits within Features' flags field.
Working with these flags requires bitwise operations, which can be error
prone. Rather than directly checking and manipulating bits, encapsulate
the bits within each feature trait and provide mechanisms for doing so.

This removes the need to comment on which features correspond to bitwise
expressions since the expressions use feature trait identifiers instead.

With this approach, byte literals and expressions can be evaluated at
compile time still. However, for these cases, knowing which byte within
the flags that a feature corresponds to still must be determined by the
implementor.

Remove the special case where initial_routing_sync has no even bit. Now,
it (bit 2) is considered known by the implementation.
2020-04-29 11:07:47 -07:00
Jeffrey Czyz
07cea6bfed Set initial_routing_sync in InitFeatures
The initial_routing_sync feature is set by peer_handler whenever a full
sync of the network graph is desired. It is not explicitly set when
creating features with InitFeatures::supported().

An upcoming refactor will change supported() to known(), which will
return all features known by the implementation. Thus, the
initial_routing_sync flag will need to be set by default. This commit
makes the behavior change ahead of the refactor.
2020-04-29 11:07:47 -07:00
Matt Corallo
ea4ccf63c7
Merge pull request #609 from LNP-BP/refactor-deps
Refactor dependencies
2020-04-29 17:15:38 +00:00
Dr. Maxim Orlovsky
dde344a51d Adopting (W)PubkeyHash types 2020-04-29 12:37:57 +02:00
Dr. Maxim Orlovsky
27079e04d7 Adopting new bitcoin hash types and crate version 2020-04-29 12:37:46 +02:00
Dr. Maxim Orlovsky
eff8af2110 BDR: Linearizing secp256k1 deps 2020-04-28 16:17:44 +02:00
Dr. Maxim Orlovsky
4909d3cd6a Bitcoin deps refactoring (BDR): Linearizing bitcoin_hash deps 2020-04-28 16:17:42 +02:00
Jeffrey Czyz
c1db30d5be Unset upfront_shutdown_script using bit clearing
The test_upfront_shutdown_script functional test clears this feature
flag. However, the method used to clear the flag is implemented by bit
toggling. Thus, if the flag is not set the method would actually set it.
Implement the method using bit clearing instead.
2020-04-27 23:29:23 -07:00
Matt Corallo
12e2a81e1d
Merge pull request #608 from TheBlueMatt/2020-04-0.0.11
0.0.11
2020-04-25 16:42:15 +00:00
Matt Corallo
8fb50f2728
Merge pull request #598 from TheBlueMatt/2020-04-559-cleanups
Clean up ChannelKeys API
2020-04-25 16:42:03 +00:00
Matt Corallo
8b18d906bb Bump versions to 0.0.11/net-tokio 0.0.3 2020-04-24 22:10:00 -04:00
Matt Corallo
03316cd141 Remove trivial assertions in LocalCommitmentTransaction fns
We don't need to assert that transaction structure is what we
expect when the transaction is created by a function twenty lines
up in the same file.
2020-04-24 21:23:51 -04:00
Matt Corallo
92c0698865 Remove TODOs from documentation in keysinterface
We should never be exposing our own TODOs to the world.
2020-04-24 21:23:51 -04:00
Matt Corallo
29199fae46 Don't modify LocalCommitmemntTransaction after construction
Instead of adding signatures to LocalCommitmentTransactions, we
instead leave them unsigned and use them to construct signed
Transactions when we want them. This cleans up the guts of
LocalCommitmentTransaction enough that we can, and do, expose its
state to the world, allowing external signers to have a basic
awareness of what they're signing.
2020-04-24 21:23:51 -04:00
Matt Corallo
7159d1546a Batch-sign local HTLC txn with a well-doc'd API, returning sigs
1107ab06c3 introduced an API to have a
ChannelKeys implementer sign HTLC transactions by calling into the
LocalCommitmentTransaction object, which would then store the tx.

This API was incredibly awkward, both because it required an
external signer trust our own internal interfaces, but also because
it didn't allow for any inspection of what was about to be signed.

Further, it signed the HTLC transactions one-by-one in a somewhat
inefficient way, and there isn't a clear way to resolve this (as
the which-HTLC parameter has to refer to something in between the
HTLC's arbitrary index, and its index in the commitment tx, which
has "holes" for the non-HTLC outputs and skips some HTLCs).

We replace it with a new function in ChannelKeys which allows us
to sign all HTLCs in a given commitment transaction (which allows
for a bit more effeciency on the signers' part, as well as
sidesteps the which-HTLC issue). This may also simplify the signer
implementation as we will always want to sign all HTLCs spending a
given commitment transaction at once anyway.

We also de-mut the LocalCommitmentTransaction passed to the
ChanKeys, instead opting to make LocalCommitmentTransaction const
and avoid storing any new HTLC-related data in it.
2020-04-24 21:23:51 -04:00
Matt Corallo
bf74bb625f Return Result<Signature> instead of modifying args in ChannelKeys
This cleans up sign_local_commitment somewhat by returning a
Result<Signaure, ()> over the local commitment transaction instead
of modifying the struct which was passed in.

This is the first step in making LocalCommitmentTransaction a
completely pub struct, using it just to communicate enough
information to the user to allow them to construct a signaure
instead of having it contain a bunch of logic.

This should make it much easier to implement a custom ChannelKeys
by disconnecting the local commitment transaction signing from our
own datastructures.
2020-04-24 21:23:51 -04:00
Matt Corallo
ddd85fb550 Track signing of local txn in channelmonitor and refuse updates
In e46e183084 we began tracking
whether a local commitment transaction had been signed and
broadcast in OnchainTxHandler, refusing to update the local
commitment transaction state in the ChannelMonitor on that basis.

This is fine, except that it doesn't make a lot of sense to store
the full local transaction state in OnchainTxHandler - we should be
providing it the unsigned local transaction at the time we wish to
broadcast and no more (just like we do all other transaction data).
2020-04-24 18:51:29 -04:00
Antoine Riard
359b3d5702 Dry-up InputMaterial::Funding
As channel_value last usage was for computing feerate but as this
one is static per-commitment and will always-be following specification,
we remove it.
2020-04-24 18:51:29 -04:00
Matt Corallo
4dc0dd17c0
Merge pull request #579 from ariard/2020-04-sanitize-cltv-delay
Sanititze and document incoming HTLC cltv_expiry handling
2020-04-24 22:50:45 +00:00
Antoine Riard
886223a313 Sanitize outgoing HTLC cltv_value 2020-04-24 18:31:07 -04:00
Antoine Riard
ad5f72894c Document exactly our CLTV sanitization policy for final incoming HTLCs
We want to avoid a third-party channel closure, where a random node
by sending us a payment expiring at current height, would trigger our
onchain logic to close the channel due to a near-expiration.
2020-04-24 18:30:57 -04:00
Matt Corallo
2cce8d095e
Merge pull request #607 from TheBlueMatt/2020-04-more-cleanups
CI and rustc warning cleanup
2020-04-24 22:17:53 +00:00
Matt Corallo
ecb94689bf Include color when building fuzz targets in CI 2020-04-24 17:35:18 -04:00
Matt Corallo
764e6e71e3 Disable timeout for full_stack_target runs in CI
It seems we've recently been seeing sporadic long-running
full_stack_target cases when running honggfuzz in CI. These
shouldn't be killed (as its possible they hit an error or a deadlock,
especially since the longest-running tests probably have the most
coverage).
2020-04-24 16:56:20 -04:00
Matt Corallo
2e997d758f Silence fuzz build unused import warnings 2020-04-24 16:55:09 -04:00
Matt Corallo
4243b40c77 Address new rustc warnings. 2020-04-24 16:55:09 -04:00
Matt Corallo
21a90245e4 Fix step naming in fuzz tests in GitHub Actions 2020-04-24 16:55:09 -04:00
Matt Corallo
de1e58e1cb Run Github Actions on PRs, too 2020-04-24 16:55:09 -04:00
Matt Corallo
0d75545632
Merge pull request #593 from TheBlueMatt/2020-04-par-fuzz-check
Thread fuzz test cases
2020-04-24 20:52:19 +00:00
Antoine Riard
795aff8da5 Document exactly our CLTV sanitization policy for incoming HTLCs 2020-04-24 16:22:18 -04:00
Matt Corallo
6745aff9b6 Thread fuzz test cases
Adds threading (with logger capture) to fuzz targets so that we can
more effeciently test a failing fuzz corpus on new code changes.
2020-04-24 16:06:34 -04:00
Matt Corallo
44418277a0
Merge pull request #587 from TheBlueMatt/2020-04-mpp-timeout
Time out HTLCs before they expire
2020-04-24 19:07:22 +00:00
Matt Corallo
d316f30710 Add test for timing out HTLCs which are in the holding cell 2020-04-24 14:28:55 -04:00
Antoine Riard
7c23847684 Time out AwatingRemoteRAA outgoing HTLCs when we reach cltv_expiry
In case of committing out-of-time outgoing HTLCs, we force
ourselves to close the channel to avoid remote peer claims on a
non-backed HTLC
2020-04-24 14:28:53 -04:00
Matt Corallo
9fd8107f96 Add test for partial-send MPP due to monitor update failure
Relatively simple test that, after a monitor update fails, we get
the right return value and continue with the bits of the MPP that
did not send after the monitor updating is restored.
2020-04-24 14:28:53 -04:00
Matt Corallo
ecadae9f0f Add a test for timeout'ing HTLCs which claim to be a part of an MPP
This is a key test for our automatic HTLC time-out logic, as it
ensures we don't allow an HTLC which indicates we should wait for
additional HTLCs before responding to cause us to force-close a
channel due to HTLC near-timeout.
2020-04-24 14:28:53 -04:00
Matt Corallo
c0199224ab Expand expect_payment_failed!() to take error codes and use it more
expect_payment_failed!() was introduced after many of the tests
which could use it were written, so we take this opportunity to
switch them over now, increasing test coverage slightly by always
checking the payment hash expected.
2020-04-24 14:28:53 -04:00
Matt Corallo
c9483c6908 Time out incoming HTLCs when we reach cltv_expiry (+ test)
We only do this for incoming HTLCs directly as we rely on channel
closure and HTLC-Timeout broadcast to fail any HTLCs which we
relayed onwards where our next-hop doesn't update_fail in time.
2020-04-24 14:28:50 -04:00
Matt Corallo
f0e9524e6d Add a constant and docs for when we should fail an HTLC. 2020-04-24 14:28:20 -04:00
Matt Corallo
86a2607b00
Merge pull request #601 from D4nte/ci-in-github-action
Add GitHub Action to build the project
2020-04-24 18:14:55 +00:00
Franck Royer
06419a2608
Add a pop of colour 2020-04-24 15:06:15 +10:00
Franck Royer
355dbbcde9
Add CI using GitHub Action
Same setup than Travis except for removing
`rm -f target/debug/lightning-*` as I do not believe
such file would exist on a fresh run.

I have not setup caching at this stage. The library is
small so I don't think it'd be that necessary/helpful.

I'd recommend to let both CI run for a bit to compare
performance and stability. The CI setup is straightforward
so I do not foresee any issue with GitHub actions.

Once happy, Travis file can be removed and branch
protection checks can be updated to block on the GitHub
actions.

You can also check the [Coverage report](752a58bc04/lightning/src/chain) to ensure it is as expected.
2020-04-24 14:49:22 +10:00