Commit graph

6482 commits

Author SHA1 Message Date
Elias Rohrer
8bd4a8f303
Merge pull request #2746 from TheBlueMatt/2023-11-bitcoin-0.30-followups
Drop panic if rust-bitcoin adds a new Network
2023-11-27 12:53:17 +01:00
Matt Corallo
a41954d841 Remove now-redundant checks in BOLT12 Invoice fallback addresses
Now that we use the `rust-bitcoin` `WitnessProgram` to check our
addresses, we can just rely on it, rather than checking the program
length and version.
2023-11-26 19:09:06 +00:00
Matt Corallo
b28068cc42 Drop panic if rust-bitcoin adds a new Network
`rust-bitcoin` 0.30 added `#[non_exhaustive]` to the `Network`
enum, allowing them to "add support" for a new network type without
a major version change in the future. When upgrading, we added a
simple `unreachable` for the general match arm, which would break
in a minor version change of `rust-bitcoin`.

While it seems [possible rust-bitcoin will change
this](https://github.com/rust-bitcoin/rust-bitcoin/issues/2225),
we still shouldn't ba panicking, which we drop here in favor of a
`debug_assert`ion, and a default value.
2023-11-26 19:07:10 +00:00
shaavan
a06d15826f Add test for PathParameterError introduced in previous commit
- Also modify the unwrap_send_err!() macro to handle the
  PathParameterError
2023-11-24 18:51:56 +05:30
Elias Rohrer
31ea90eba2
Use esplora-client's async-https-rustls feature
Now that we upgraded `esplora-client` to 0.6 we can use
`async-https-rustls` instead of manually overriding the `reqwest`
dependency.
2023-11-24 12:48:22 +01:00
Elias Rohrer
c2e81fbb82
DRY up Esplora/Electrum integration_tests 2023-11-23 09:30:58 +01:00
Elias Rohrer
28c14cd884
Add Electrum integration test 2023-11-23 09:30:58 +01:00
Elias Rohrer
4dd5ccbe49
Implement ElectrumSyncClient 2023-11-23 09:30:57 +01:00
Elias Rohrer
d2ecf0766c
Set pending_sync when last-minute check fails in Esplora 2023-11-23 09:30:57 +01:00
Elias Rohrer
82f4c10e18
Move sync_ methods to SyncState 2023-11-23 09:30:57 +01:00
Elias Rohrer
e14e2c3fba
Improve EsploraSyncClient test coverage
In particular, we now test `register_output` functionality, too.
2023-11-23 09:30:57 +01:00
Elias Rohrer
48c46bf772
Improve EsploraSyncClient logging
We give some more information while reducing the log levels to make the
logging less spammy.

We also convert one safe-to-unwrap case from returning an error to
unwrapping the value.
2023-11-23 09:30:57 +01:00
Elias Rohrer
5b7c1d511b
Use upstream TestLogger util in tx sync tests 2023-11-23 09:30:57 +01:00
Elias Rohrer
c8ff32197a
Return confirmation height via Confirm::get_relevant_txids
We previously included the block hash, but it's also useful to include
the height under which we expect the respective transaction to be
confirmed.
2023-11-23 09:30:56 +01:00
Elias Rohrer
70ea110864
Merge pull request #2740 from wpaulino/rust-bitcoin-30-update
Update to rust-bitcoin v0.30.2
2023-11-23 09:28:41 +01:00
Wilmer Paulino
ad56847a6b
Remove nightly warnings 2023-11-22 15:58:01 -08:00
Wilmer Paulino
ec928d55b4
Bump rust-bitcoin to v0.30.2 2023-11-22 15:58:01 -08:00
shaavan
9bd1cc7660 Explicitly reject routes that double-back
- If a path within a route passes through the same channelID twice,
  that shows the path is looped and will be rejected by nodes.
- Add a check to explicitly reject such payment before trying to send
  them.
2023-11-22 18:34:44 +05:30
Matt Corallo
870a0f14ba
Merge pull request #2700 from Evanfeenstra/pub-htlc-routing
peel_payment_onion static fn in channelmanager
2023-11-16 17:02:05 +00:00
Matt Corallo
9c9e5f896c
Merge pull request #2730 from benthecarman/invoice-utils
Add some public utilities to `lightning_invoice`
2023-11-15 22:01:33 +00:00
Evan Feenstra
192fe05147 InboundOnionErr fields public 2023-11-15 13:08:56 -08:00
benthecarman
e80e8c8062
Have Invoice Description use UntrustedString 2023-11-15 12:35:35 -06:00
benthecarman
3def30721f
Make invoice fields public 2023-11-15 12:35:21 -06:00
Elias Rohrer
fb670c8faa
Merge pull request #2696 from TheBlueMatt/2023-10-no-chan-feerate-upper-bound
Drop non-anchor channel fee upper bound limit entirely
2023-11-15 10:25:06 +01:00
Gursharan Singh
0456b0e311
Merge pull request #2727 from TheBlueMatt/2023-11-better-bolt11-utils
Replace maze of BOLT11 payment utilities with parameter generators
2023-11-14 13:37:29 -08:00
Evan Feenstra
378885d8db remove obsolete comment 2023-11-14 11:56:31 -08:00
Evan Feenstra
4b5db8c3ce peel_payment_onion static fn in channelmanager 2023-11-14 11:54:23 -08:00
Matt Corallo
5d187f65b9
Merge pull request #2529 from TheBlueMatt/2023-08-shutdown-remove-early-sign
Don't send init `closing_signed` too early after final HTLC removal
2023-11-14 19:09:46 +00:00
Matt Corallo
185fbc1765
Merge pull request #2726 from shaavan/issue2712
Log the error, when trying to forward the intercepted HTLC, but the channel is not found
2023-11-14 17:57:19 +00:00
shaavan
dce514e912 Log the error, when trying to forward the intercepted HTLC, but the
channel is not found
2023-11-14 15:11:09 +05:30
Elias Rohrer
04b16e74d5
Merge pull request #2716 from TheBlueMatt/2023-11-hash-if-eq
`derive(Hash)` for P2P messages
2023-11-14 08:50:38 +01:00
Matt Corallo
26c00ad751 derive(Hash) for P2P messages
In other languages (Java and C#, notably), overriding `Eq` without
overriding `Hash` can lead to surprising or broken behavior. Even
in Rust, its usually the case that you actually want both. Here we
add missing `Hash` derivations for P2P messages, to at least
address the first pile of warnings the C# compiler dumps.
2023-11-14 00:40:30 +00:00
Matt Corallo
eb23c1e43b Rely on const generic big arrays for PartialEq in msgs
Implementation of standard traits on arrays longer than 32 elements
was shipped in rustc 1.47, which is below our MSRV of 1.48 and we
can use to remove some unnecessary manual implementation of
`PartialEq` on `OnionPacket`.
2023-11-14 00:40:30 +00:00
Matt Corallo
c852ce6139
Merge pull request #2544 from optout21/splicing-msgs0
Add Splicing (and Quiescence) wire message definitions
2023-11-13 22:38:51 +00:00
Matt Corallo
a025c7ca88
Merge pull request #2732 from arik-so/2023/11/update-musig2-dep
Update MuSig2 dependency for Hash trait derivation.
2023-11-13 17:29:39 +00:00
Matt Corallo
103180df8f
Merge pull request #2708 from TheBlueMatt/2023-11-less-graph-memory-frag
Reduce common allocations across the codebase
2023-11-13 16:45:26 +00:00
Arik Sosman
2feae7bc58
Update MuSig2 dependency for Hash trait derivation. 2023-11-13 11:07:07 -05:00
Matt Corallo
d5a0eb4270
Merge pull request #2715 from valentinewallace/2023-11-skimmed-fees
Complete underpaying HTLCs support
2023-11-12 20:27:25 +00:00
Matt Corallo
22305a9bff Drop old expiry_time_from_unix_epoch helper in expiry time lookup
Since there's a much simpler way to go about it with
`Bolt11Invoice::expires_at`.
2023-11-12 17:18:00 +00:00
Matt Corallo
98544772e2
Merge pull request #2722 from benthecarman/dust-overflow
Fix potential cases where max_dust_htlc_exposure_msat overflows
2023-11-12 17:03:09 +00:00
Matt Corallo
70b18663f4 Don't send init closing_signed too early after final HTLC removal
If we remove an HTLC (or fee update), commit, and receive our
counterparty's `revoke_and_ack`, we remove all knowledge of said
HTLC (or fee update). However, the latest local commitment
transaction that we can broadcast still contains the HTLC (or old
fee), thus we are not eligible for initiating the `closing_signed`
negotiation if we're shutting down and are generally expecting a
counterparty `commitment_signed` immediately.

Because we don't have any tracking of these updates in the `Channel`
(only the `ChannelMonitor` is aware of the HTLC being in our latest
local commitment transaction), we'd previously send a
`closing_signed` too early, causing LDK<->LDK channels with an HTLC
pending towards the channel initiator at the time of `shutdown` to
always fail to cooperatively close.

To fix this race, we add an additional unpersisted bool to
`Channel` and use that to gate sending the initial `closing_signed`.
2023-11-11 20:24:58 +00:00
Matt Corallo
d30d599a2f Drop non-anchor channel fee upper bound limit entirely
Quite a while ago we added checks for the total current dust
exposure on a channel to explicitly limit dust inflation attacks.
When we did this, we kept the existing upper bound on the channel's
feerate in place. However, these two things are redundant - the
point of the feerate upper bound is to prevent dust inflation, and
it does so in a crude way that can cause spurious force-closures.

Here we simply drop the upper bound entirely, relying on the dust
inflation limit to prevent dust inflation instead.
2023-11-11 17:32:31 +00:00
benthecarman
3fbfde360f
Impl display for invoice fields 2023-11-10 20:41:53 -06:00
Matt Corallo
a6039b9af2 Replace maze of BOLT11 payment utilities with parameter generators
`lightning-invoice` was historically responsible for actually
paying invoices, handling retries and everything. However, that
turned out to be buggy and hard to maintain, so the payment logic
was eventually moved into `ChannelManager`. However, the old
utilites remain.

Because our payment logic has a number of tunable parameters and
there are different ways to pay a BOLT11 invoice, we ended up with
six different methods to pay or probe a BOLT11 invoice, with more
requested as various options still were not exposed.

Instead, here, we replace all six methods with two simple ones
which return the arguments which need to be passed to
`ChannelManager`. Those arguments can be further tweaked before
passing them on, allowing more flexibility.
2023-11-10 19:23:21 +00:00
Matt Corallo
7a951b1bf7 Stop writing signer data as a part of channels
This breaks backwards compatibility with versions of LDK prior to
0.0.113 as they expect to always read signer data.

This also substantially reduces allocations during `ChannelManager`
serialization, as we currently don't pre-allocate the `Vec` that
the signer gets written in to. We could alternatively pre-allocate
that `Vec`, but we've been set up to skip the write entirely for a
while, and 0.0.113 was released nearly a year ago. Users
downgrading to LDK 0.0.112 and before at this point should not be
expected.
2023-11-09 22:28:08 +00:00
Matt Corallo
a8d4cfa811 Avoid allocating when checking gossip message signatures
When we check gossip message signatures, there's no reason to
serialize out the full gossip message before hashing, and it
generates a lot of allocations during the initial startup when we
fetch the full gossip from peers.
2023-11-09 22:28:08 +00:00
Matt Corallo
18dc7f248b Avoid a tokio::mpsc::Sender clone for each P2P send operation
Whenever we go to send bytes to a peer, we need to construct a
waker for tokio to call back into if we need to finish sending
later. That waker needs some reference to the peer's read task to
wake it up, hidden behind a single `*const ()`. To do this, we'd
previously simply stored a `Box<tokio::mpsc::Sender>` in that
pointer, which requires a `clone` for each waker construction. This
leads to substantial malloc traffic.

Instead, here, we replace this box with an `Arc`, leaving a single
`tokio::mpsc::Sender` floating around and simply change the
refcounts whenever we construct a new waker, which we can do
without allocations.
2023-11-09 22:28:08 +00:00
Matt Corallo
969085bf1e Avoid re-allocating to encrypt gossip messages when forwarding
When we forward gossip messages, we store them in a separate buffer
before we encrypt them (and commit to the order in which they'll
appear on the wire). Rather than storing that buffer encoded with
no headroom, requiring re-allocating to add the message length and
two MAC blocks, we here add the headroom prior to pushing it into
the gossip buffer, avoiding an allocation.
2023-11-09 22:28:08 +00:00
benthecarman
55da9c434e
Fix potential cases where max_dust_htlc_exposure_msat overflows 2023-11-09 14:51:44 -06:00
Matt Corallo
589a88e749 Fix data_loss_protect test to actually test DLP
The data loss protect test was panicking in a message assertion
which should be passing, but because the test was marked only
`#[should_panic]` it was being treated as a successful outcome.
Instead, we use `catch_unwind` on exactly the line we expect to
panic to ensure we are hitting the right one.
2023-11-09 00:05:23 +00:00