Commit graph

1476 commits

Author SHA1 Message Date
RJ Rybarczyk
88fef649b1 Use workspaces to separate crates 2019-11-15 02:44:30 +00:00
Antoine Riard
6de175575b Fulfill error handling for send_commitment in processing htlcs forward 2019-11-14 18:27:47 -05:00
Antoine Riard
945c399a35 Add test_duplicate_htlc_different_direction_onchain 2019-11-12 19:33:27 -05:00
Antoine Riard
543b0983f6 Avoid claiming remote received HTLCs with preimage
In case of duplicate HTLCs with same hash going in opposite
directions we may learn preimage of offered one, but we shouldn't
claim received one to avoid invalidation of combined claim.
The received HTLC is going to be claimed by a timeout tx at
timelock expiration.

Fix #337
2019-11-12 19:27:55 -05:00
Antoine Riard
7608483b0f Rename HandleError to LightningError to stress already-processed error 2019-11-12 17:29:20 -05:00
Matt Corallo
2afd53148f
Merge pull request #386 from TheBlueMatt/2019-10-useless-lints
Disable some useless lints
2019-10-28 21:36:39 +00:00
Matt Corallo
58351200b6 Disable some useless lints 2019-10-28 15:21:57 -04:00
Matt Corallo
2cb5133aeb
Merge pull request #384 from ariard/2019-10-clean-warnings
Remove useless test framework warnings
2019-10-26 20:59:55 +00:00
Antoine Riard
230b0e1fb6 Remove useless test framework warnings 2019-10-25 20:20:41 -04:00
Matt Corallo
39b562e009
Merge pull request #377 from elichai/2019-08-update-deps
Updating dependencies
2019-08-24 23:06:26 +00:00
Elichai Turkel
20302064a8
Update the fuzz and net-tokio crates 2019-08-24 11:05:38 -04:00
Elichai Turkel
5bb7ba5b7d
Cast weights to u64 to support the new rust-bitcoin api 2019-08-24 11:04:41 -04:00
Elichai Turkel
f4e8974c16
Updated bitcoin, bitcoin_hashes and secp256k1 dependencies 2019-08-24 11:04:29 -04:00
Matt Corallo
ab8f5a8620
Merge pull request #374 from dongcarl/2019-08-channel-open-sanity
tests: Add sanity tests for ChannelOpens
2019-08-09 16:53:33 +00:00
Carl Dong
00410bfeab tests: Add sanity tests for ChannelOpens 2019-08-09 10:17:32 -04:00
Matt Corallo
56f16eaa4d
Merge pull request #349 from ariard/2019-07-data_loss
Implement option_data_loss_protect on both sides
2019-08-06 21:12:57 +00:00
Antoine Riard
41def659c0 Add test_data_loss_protect 2019-08-05 16:19:49 -04:00
Antoine Riard
254af05c43 Cache to_remote_script if we are fallen-behind
Also, restrict commitment transaction filters in ChannelMonitor::
block_connected
2019-08-05 16:19:44 -04:00
Antoine Riard
2322c2365c Make get_latest_local_commitment_txn public
You may use it to get a broadcastable local toxic tx in case of fallen-behind,
i.e when receiving a channel_reestablish with a proof that our remote side
knows a higher revocation secret than the local commitment number we are aware
of. Broadcasting these transactions are UNSAFE, as they allow remote side to punish
you. Nevertheless you may want to broadcast them if remote don't close channel with his
higher commitment transaction after a substantial amount of time (a month or even a year)
to get back funds. Best may be to contact out-of-band the other node operator to coordinate
with him if option is available to you. In any-case, choice is up to the user.

Also, log toxic commitment tx id in channel_reestablish sending back
ChannelError::CloseDelayBroadcast
2019-08-05 15:47:37 -04:00
Antoine Riard
c3991602a5 Enforce option_data_loss_protect user-side
If we remote peer provide us a revocation secret which doesn't
match with next_remote_revocation_number we close the channel
If we learn that we are fallen-behind, we send back a CloseDelayBroadcast
error, special take care will be take to log error and channel should
stale, i.e we expect our honest peer to unilateral close to claim
on it our balance

Add ChannelError::CloseDelayBroadcast to signal that you need to close
the channel but not to broadcast it while however update ChannelMonitor
with remote per_commitment_point thanks to our peer being a gentleman
2019-08-05 15:47:36 -04:00
Matt Corallo
127ce296a7
Merge pull request #310 from ariard/2019-02-clarify-send-htlc-policy
Clarify policy applied in send htlc error msgs
2019-08-02 19:30:41 +00:00
Antoine Riard
1d6c09a94a Clarify policy applied in send htlc error msgs
max_htlc_value_in_flight_msat is applied
per-direction
2019-08-02 01:01:23 -04:00
Matt Corallo
e65e03f120
Merge pull request #370 from TheBlueMatt/2019-07-369-fix-spaces
2019 07 369 fix spaces
2019-07-31 15:58:00 +00:00
RJ Rybarczyk
263b2fa138 Add net-tokio/target to gitignore 2019-07-31 11:23:05 -04:00
RJ Rybarczyk
d32015377e Make SocketDescriptor::send_data take slice instead of vec and offset 2019-07-31 11:22:59 -04:00
Matt Corallo
0d162968d6
Merge pull request #367 from TheBlueMatt/2019-07-fst-unique-channels
Make temporary channel ids unique in full_stack_target
2019-07-30 18:26:57 +00:00
Matt Corallo
487452fa97
Merge pull request #368 from TheBlueMatt/2019-07-travis-fix
Fix travis failure if previous travis run on branch failed to build
2019-07-30 18:26:11 +00:00
Matt Corallo
347f5bfc4c Fix travis failure if previous travis run on branch failed to build 2019-07-30 13:41:12 -04:00
Antoine Riard
2869e50d67 Support option_data_loss_protect for remote peer
In case of sending channel_reestablish message, we join
our current per_commitment_point and their highest revocation
secret we know about

We set data_loss_protect by default and adjust encoding_init
test in consequence
2019-07-30 00:38:20 -04:00
Matt Corallo
283d40f2e4
Merge pull request #364 from TheBlueMatt/2019-07-no-unimpl
Implement the last three (relevant) unimplemented()s in ChannelManager
2019-07-29 19:20:35 +00:00
Matt Corallo
20bd2b142d
Merge pull request #366 from TheBlueMatt/2019-07-useless-todo-removal
Drop some useless TODO messages to clean things up pre-0.1
2019-07-29 17:48:42 +00:00
Matt Corallo
8ba3529522 Handle monitor update failure during funding on the fundee side
This carries a surprising amount of complexity despite only being
possible in the case where monitor updating failed during the
processing of funding_generated. Specifically, this requires
handling rebroadcasting funding_locked once we successfully persist
our monitor again.

As an alternative we could never send funding_signed when the
monitor failed to persist, but this approach avoids needless
delays during funding.
2019-07-29 13:45:35 -04:00
Matt Corallo
b27f788e91 Allow a counterparty to resend their funding_locked before ours 2019-07-29 13:44:47 -04:00
Matt Corallo
a1e0ca410e Handle monitor update failures during funding on the funder side 2019-07-29 13:26:22 -04:00
Matt Corallo
e5c8f05891 Make temporary channel ids unique in full_stack_target
This avoids a crash where a channel with a duplicate id is created
immediately after another is closed, where the other still has a
pending funding generation event. Resulting in funding generation
being passed to the wrong channel (which isn't in an appropriate
state).
2019-07-29 12:51:33 -04:00
Matt Corallo
ce6f561485 Drop TODO suggesting we avoid a test-only function to get chan keys
It suggested figuring something else out after #81, but the API we
settled on after #81 (which I think is just fine) doesn't allow for
anything cleaner, so this is fine as-is.
2019-07-27 20:50:51 -04:00
Matt Corallo
95dc2762ff Drop update_fee TODOs as we're gonna drop it before 0.1 anyway
See #365 for more.
2019-07-27 20:50:51 -04:00
Matt Corallo
2fd2fef796
Merge pull request #363 from TheBlueMatt/2019-07-codecov
Generate codecov.io reports
2019-07-25 21:34:16 +00:00
Matt Corallo
e14b9f07d3 Generate codecov.io reports 2019-07-25 16:59:20 -04:00
Matt Corallo
4d0993f0d4
Merge pull request #361 from TheBlueMatt/2019-07-cmfc-crash
Make chanmon_fail_consistency slightly less aggressive
2019-07-25 19:47:48 +00:00
Matt Corallo
4e81d8d74a
Merge pull request #362 from TheBlueMatt/2019-07-no-bogus-sec-required
Do not require upfront_shutdown as the security gain is marginal
2019-07-25 19:46:58 +00:00
Matt Corallo
c05e087c43 Do not require upfront_shutdown as the security gain is marginal
There is really no reason to want to never open a channel just
because a counterparty doesn't support upfront_shutdown.
2019-07-25 14:22:00 -04:00
Matt Corallo
a9aa3c37fe Make chanmon_fail_consistency slightly less aggressive
This resolves some crashes that both afl and honggfuzz found.
2019-07-25 11:30:53 -04:00
Matt Corallo
07e927c171
Merge pull request #360 from TheBlueMatt/2019-07-new-warnings
Fix unused variable introduced in my changes in bdbf5666a9
2019-07-24 22:38:34 +00:00
Matt Corallo
60bf1fe601
Merge pull request #355 from ariard/2019-07-fix-csv-delay-check-remote-htlc
Fix bug in check_spend_remote_htlc and let csv delays being user configurable
2019-07-24 22:33:20 +00:00
Antoine Riard
e78c25b605 Add test_user_configurable_csv_delay
Extend test_justice_tx with user-set csv delay to test that
we are able to claim revokeable outputs with different csv delay
between both peers.
2019-07-24 17:56:42 -04:00
Antoine Riard
7ebc0a9365 Add user configurable csv delay encumbering channel refund output,
within reasonable lower or upper bound

Add our_to_self_delay in Channel, to cache user config field at
channel construction.
2019-07-24 17:56:40 -04:00
Antoine Riard
3b09db80ea Move BREAKDOWN_TIMEOUT/MAX_LOCAL_BREAKDOWN_TIMEOUT in ChannelManager
Let these values being used as default ones in UserConfig.

Also, reduce them to something more reasonable, for BREAKDOWN_TIMEOUT
from 1 week to 1 day, for MAX_LOCAL_BREAKDOWN_TIMEOUT from 2 weeks
to 1.
2019-07-24 17:53:04 -04:00
Matt Corallo
1db907f47a Fix unused variable introduced in my changes in bdbf5666a9
The original was written by Tamas, but I made one small tweak and
broke the warning-free-ness of it.
2019-07-24 17:22:03 -04:00
Matt Corallo
19a0f8438d
Merge pull request #359 from rust-bitcoin/2019-07-bump-percentage
Bump progress tracker
2019-07-24 21:19:48 +00:00