Commit graph

8307 commits

Author SHA1 Message Date
Jeffrey Czyz
716758f5a3
Fix incorrect expect message 2024-11-11 16:32:28 -06:00
Jeffrey Czyz
c331b67137
Remove NodeSigner::sign_bolt12_invoice_request
Now that invoice requests are signed using transient keys only, remove
the corresponding signing method from NodeSigner since it is never used.
2024-11-11 16:18:11 -06:00
Jeffrey Czyz
5af0cf1c04
Remove PayerSigningPubkeyStrategy
Now that InvoiceRequest::payer_signing_pubkey is always a derived
pubkey, there is no longer a need for PayerSigningPubkeyStrategy.
2024-11-11 16:18:11 -06:00
Jeffrey Czyz
d596b4e635
Disallow user-provided payer_signing_pubkey
When creating an InvoiceRequests, users may choose to either use a
transient signing pubkey generated by LDK or provide a static one.
Disallow the latter as it allows users to reuse the same pubkey, which
results in poor sender privacy.
2024-11-11 16:18:11 -06:00
Jeffrey Czyz
ad487e7232
Replace spaces with tabs 2024-11-11 16:18:10 -06:00
Matt Corallo
739c412bc1
Merge pull request #3389 from jkczyz/2024-10-bolt11-invoice-utils
Add `ChannelManager::create_bolt11_invoice`
2024-11-11 14:35:08 +00:00
Valentine Wallace
9cc6969314
Verify blinded keysend payment secrets
If we're receiving a keysend to a blinded path, then we created the payment
secret within. Using our inbound_payment_key, we can decrypt the payment secret
bytes to get the payment's min_cltv_expiry_delta and min amount, to verify the
payment is valid. However, if we're receiving an MPP keysend *not* to a blinded
path, then we did not create the payment secret and shouldn't verify it since
it's only used to correlate MPP parts.

Therefore, store whether the payment secret is recipient-generated in our pending
inbound payment data so we know whether to verify it or not.
2024-11-08 17:08:27 -05:00
Jeffrey Czyz
7878801be7
Update BOLT11 docs in ChannelManager
Update ChannelManager docs to use create_bolt11_invoice and correct
references to modules in the lightning-invoice crate that no longer
exist.
2024-11-08 12:14:57 -06:00
Jeffrey Czyz
2a4a470c98
Test new behavior in create_bolt11_invoice
Bolt11InvoiceParameters allows for setting currency and
duration_since_epoch. If currency is not set, test that the one
corresponding to ChannelManager's chain hash is usd. If
duration_since_epoch, is not set then highest seen timestamp is used in
non-std compilations.
2024-11-08 12:14:51 -06:00
Jeffrey Czyz
b6ceafb4f6
Deprecate functions in invoice_utils module
ChannelManager::create_bolt11_invoice is a simpler and more flexible way
of creating a BOLT11 invoice, so deprecate the corresponding functions
in the invoice_utils module.
2024-11-08 12:06:45 -06:00
Jeffrey Czyz
ce0e182ea5
Use ChannelManager::create_bolt11_invoice in tests
The utility methods in in invoice_utils will be removed or deprecated in
an upcoming commit.
2024-11-08 12:06:19 -06:00
Jeffrey Czyz
3c6896c9fa
Add a BOLT11 invoice utility to ChannelManager
Now that the lightning crate depends on the lightning_invoice crate, the
utility functions previously living in the latter can be implemented on
ChannelManager. Additionally, the parameters are now moved to a struct
in order to remove the increasingly combinatorial blow-up of methods.

The new Bolt11InvoiceParameters is used to determine what values to set
in the invoice. Using None for any given parameter results in a
reasonable the default or a behavior determined by the ChannelManager as
detailed in the documentation.
2024-11-08 11:56:59 -06:00
Jeffrey Czyz
284cb28af2
Remove currency support from invoice_utils
When creating an invoice using a ChannelManager, payments for a specific
ChainHash / Network are only valid. Use the one from the ChannelManager
instead of allowing arbitrary ones in the form of a Currency.
2024-11-08 11:44:00 -06:00
Valentine Wallace
34c2f25806
Support verifying payment_secrets for inbound static invoice payments
Add a new payment type for this, because normally the payment hash is factored
into the payment secrets we create for invoices, but static invoices don't have
a payment hash since they are paid via keysend.
2024-11-08 10:28:53 -05:00
Valentine Wallace
45f88ee7f9
Add new inbound payment key for spontaneous payments
This key will be used in upcoming commits for encrypting metadata bytes for
spontaneous payments' payment secrets, to be included in the blinded paths of
static invoices for async payments. We need a new type of payment secret for
these payments because they don't have an a prior known payment hash, see the
next commit.
2024-11-08 10:28:53 -05:00
Valentine Wallace
02316d28f1
Remove pending_inbound_payments map from ChannelManager
LDK versions prior to 0.0.104 had stateful inbound payments written in this
map. In 0.0.104, we added support for stateless inbound payments with
deterministically generated payment secrets, and maintained deprecated support
for stateful inbound payments until 0.0.116. After 0.0.116, no further inbound
payments could have been written into this map.
2024-11-08 10:28:29 -05:00
Jeffrey Czyz
0ea225cfe7
Remove no-std support from invoice_utils functions
The upcoming ChannelManager::create_bolt11_invoice will not support
setting a specific creation time, so remove that functionality from the
invoice_utils functions. This will avoid duplicate code when
deprecating.
2024-11-07 17:08:35 -06:00
Matt Corallo
5718baaed9
Merge pull request #3397 from vincenzopalazzo/macros/amount-less-refactoring
[RFC] rename pay_parameters for no amount invoice
2024-11-07 22:13:57 +00:00
Matt Corallo
61a60d543c
Merge pull request #3402 from tnull/2024-11-pin-indexmap
Pin `indexmap` back to account for `hashbrown` MSRV bump
2024-11-07 22:12:19 +00:00
Matt Corallo
6bf218198f
Merge pull request #3399 from TheBlueMatt/2024-11-fuzz-assert
Drop broken debug assertion on peer buffer lengths
2024-11-07 21:43:12 +00:00
Matt Corallo
fcc59730a1
Merge pull request #3395 from mhrheaume/mhr/process_events_docs
Updated docs on `PeerManager::process_events`.
2024-11-07 17:54:03 +00:00
Elias Rohrer
e12ee9d120
Pin indexmap back to account for hashbrown MSRV bump
`indexmap` 2.6.0 upgraded to `hashbrown` 0.15, which unfortunately
bumped their MSRV to rustc 1.65 with the 0.15.1 release. So we pin
`indexmap` to 2.5.0 to fix our MSRV CI.
2024-11-07 14:35:12 +01:00
Elias Rohrer
c35adff51d
Merge pull request #3388 from TheBlueMatt/2024-10-counter-test
Add additional test coverage of `NetworkGraph` counters
2024-11-07 11:07:32 +01:00
Jeffrey Czyz
2a954020c6
Combine import statements 2024-11-06 12:04:15 -06:00
Jeffrey Czyz
65790b6718
Add Description::empty constructor
When creating a default Bolt11InvoiceParameters, having an infallible
constructor avoids an unwrap.
2024-11-06 11:53:46 -06:00
Jeffrey Czyz
1e52c33c07
Merge pull request #3401 from tnull/2024-11-update-fuzz-readme
Update `fuzz` README to account for additional required `RUSTFLAGS`
2024-11-06 10:07:53 -06:00
Elias Rohrer
d13c2bd829
Update fuzz README to account for additional required RUSTFLAGS 2024-11-06 14:27:26 +01:00
Vincenzo Palazzo
c2c670b2b5
rename pay_parameters for no amount invoice
This commit renames the function `pay_parameters_for_zero_amount_invoice`
to `pay_parameters_for_variable_amount_invoice`.

The term "variable amount" is used to align with
the naming convention in the LDK node, helping to avoid
confusion between similar packages.

Fixes: https://github.com/lightningdevkit/rust-lightning/issues/2879
Replaces: https://github.com/lightningdevkit/rust-lightning/pull/2979
Signed-off-by: Vincenzo Palazzo <vincenzopalazzodev@gmail.com>
2024-11-06 11:08:25 +01:00
Matthew Rheaume
9d071068a3 Updated docs on PeerManager::process_events.
Try to make it a bit more clear that there are downsides to solely
relying on `lightning-net-tokio`, and it's still recommended to
occasionally call this function in a separate loop.
2024-11-05 12:17:14 -08:00
Matt Corallo
ebf1de5bc7 Build per_peer_state immediately in ChannelManager deser
Instead of first building a map from peers to a list of channels
then pulling out of that to build the `per_peer_state`, we build
`per_peer_state` immediately and store channels in it immediately.

This avoids an unnecessary map indirection but also gives us
access to the new fields in `per_peer_state` when reading
`Channel`s which we'll need in a coming commit.
2024-11-05 20:13:48 +00:00
Matt Corallo
b423a33bc7 Avoid a short_to_chan_info read lock in claim_funds_from_hop
In 453ed11f80 we started tracking the
counterparty's `node_id` in `HTLCPreviousHopData`, however we were
still trying to look it up using `prev_short_channel_id` in
`claim_funds_from_hop`.

Because we now usually have the counterparty's `node_id` directly
accessible, we should skip the `prev_short_channel_id` lookup.

This will also be more important in the next commit where we need
to look up state for our counterparty to generate
`ChannelMonitorUpdate`s whether we have a live channel or not.
2024-11-05 20:13:48 +00:00
Matt Corallo
9f9d448efb Add missing update_maps_on_chan_removal call in signer restore
When a channel is closed, we have to call
`update_maps_on_chan_removal` in the same per-peer-state lock as
the removal of the `ChannelPhase` object. We forgot to do so in
`ChannelManager::signer_unblocked` leaving dangling references to
the channel.

We also take this opportunity to include more context in the
channel-closure log in `ChannelManager::signer_unblocked` and add
documentation to `update_maps_on_chan_removal` and
`finish_close_channel` to hopefully avoid this issue in the future.
2024-11-05 20:13:48 +00:00
Matt Corallo
1feb71375c Pass the peer_state lock through to update_maps_on_chan_removal
`update_maps_on_chan_removal` is used to perform `ChannelManager`
state updates when a channel is being removed, prior to dropping
the `peer_state` lock. In a future commit we'll use it to update
fields in the `per_peer_state`, but in order to do so we'll need to
have access to that state in the macro.

Here we get set up for this by passing the per-peer state to
`update_maps_on_chan_removal`, which is sadly a fairly large patch.
2024-11-05 20:13:48 +00:00
Matt Corallo
8c086c772f
Merge pull request #3398 from vincenzopalazzo/macros/fixing-ci
ci: fixing the coverage report
2024-11-05 17:49:27 +00:00
Matt Corallo
d33284fafd
Merge pull request #3394 from tnull/2024-11-pin-idna-adapter
Pin `idna_adapter` to fix MSRV
2024-11-05 17:45:18 +00:00
Jeffrey Czyz
cb650a8606
Merge pull request #3237 from jkczyz/2024-08-offers-experimental-tlvs
Experimental offer TLVs
2024-11-05 11:37:02 -06:00
Matt Corallo
a29cf09417 Drop broken debug assertion on peer buffer lengths
1b711ed15f changed it so that we can
enqueue broadcast gossip messages to peers even though their buffer
is full as long as its our `ChannelMessageHandler` doing it. This
broke a debug assertion that the buffer isn't too large when
appending the broadcast message which is simply dropped here.

Found by the `full_stack_target` fuzzer.
2024-11-05 16:05:06 +00:00
Vincenzo Palazzo
f939d6a5ac
ci: fixing the coverage report
Signed-off-by: Vincenzo Palazzo <vincenzopalazzodev@gmail.com>
2024-11-05 16:03:08 +01:00
Jeffrey Czyz
169b260493
Refactor tuple serialization into a macro 2024-11-04 18:00:24 -06:00
Jeffrey Czyz
76682409d4
Add parsing tests for experimental invoice TLVs 2024-11-04 18:00:24 -06:00
Jeffrey Czyz
8e279f719d
Parse experimental invoice TLV records
The BOLT12 spec defines an experimental TLV range that is allowed in
offer and invoice_request messages. The remaining TLV-space is for
experimental use in invoice messages. Allow this range when parsing an
invoice and include it when signing one.
2024-11-04 18:00:24 -06:00
Jeffrey Czyz
22d30e6b83
Add parsing tests for experimental refund TLVs 2024-11-04 18:00:24 -06:00
Jeffrey Czyz
9cf178f28f
Add parsing tests for experimental invreq TLVs 2024-11-04 18:00:23 -06:00
Jeffrey Czyz
e217c62863
Test verification with experimental invreq TLVs
Payer metadata is generated from the invreq TLVs and should included
those in the experimental range. When verifying invoice messages, these
TLVs must be included. Modify the BOLT12 verification tests to cover
them.
2024-11-04 18:00:23 -06:00
Jeffrey Czyz
5590bc2fa8
Parse experimental invreq TLV records
The BOLT12 spec defines an experimental TLV range that are allowed in
invoice_request messages. Allow this range when parsing an invoice
request and include those bytes in any invoice. Also include those bytes
when verifying that a Bolt12Invoice is for a valid InvoiceRequest.
2024-11-04 18:00:23 -06:00
Jeffrey Czyz
62cddb7d3a
Add offer test vectors for experimental TLVs 2024-11-04 18:00:23 -06:00
Jeffrey Czyz
a728d1dc2f
Add parsing tests for experimental offer TLVs 2024-11-04 18:00:23 -06:00
Jeffrey Czyz
6a708e2d9f
Test verification with experimental offer TLVs
Offer metadata is generated from the offer TLVs and should included
those in the experimental range. When verifying invoice request and
invoice messages, these TLVs must be included. Similarly, OfferId
construction should included these TLVs as well. Modify the BOLT12
verification tests to cover these TLVs.
2024-11-04 18:00:23 -06:00
Jeffrey Czyz
e01e731ff7
Parse experimental offer TLV records
The BOLT12 spec defines an experimental TLV range that are allowed in
offer messages. Allow this range when parsing an offer and include those
bytes in any invoice requests. Also include those bytes when computing
an OfferId and verifying that an InvoiceRequest is for a valid Offer.
2024-11-04 18:00:23 -06:00
Jeffrey Czyz
38e9457d97
Remove unnecessary destructure 2024-11-04 18:00:22 -06:00