Commit graph

5565 commits

Author SHA1 Message Date
Wilmer Paulino
7751cb9066
Use min mempool feerate for outbound updates on anchor channels
As done with inbound feerate updates, we can afford to commit less in
fees, as long as we still may the minimum mempool feerate. This enables
users to spend a bit more of their balance, as less funds are being
committed to transaction fees.
2023-07-14 14:49:57 -07:00
Wilmer Paulino
1349ac8e2d
Relax constraints for inbound feerate updates on anchor channels
Channels supporting anchors outputs no longer require their feerate
updates to target a prompt confirmation since commitment transactions
can be bumped when broadcasting. Commitment transactions must now at
least meet the minimum mempool feerate, until package relay is deployed,
such that they can propagate across node mempools in the network by
themselves.

The existing higher bound no longer applies to channels supporting
anchor outputs since their HTLC transactions don't have any fees
committed, which directly impact the available balance users can send.
2023-07-14 14:49:56 -07:00
Wilmer Paulino
db3d58c586
Add new ConfirmationTarget variant for min mempool feerates
Now that we support channels with anchor outputs, we add a new
ConfirmationTarget variant that, for now, will only apply to such
channels. This new variant should target estimating the minimum feerate
required to be accepted into most node mempools across the network.
2023-07-14 14:49:52 -07:00
Wilmer Paulino
ff474ba384
Integrate BumpTransactionEventHandler into existing anchor tests 2023-07-14 14:45:20 -07:00
Wilmer Paulino
38f12698a7
Add BumpTransactionEventHandler instance to node test harness 2023-07-14 14:45:20 -07:00
Wilmer Paulino
964b4939b1
Improve logging in BumpTransactionEventHandler paths 2023-07-14 14:45:19 -07:00
Wilmer Paulino
c18013c2b6
Add log_iter utility macro
This is a useful primitive to have that formats the contents of the
iterator as a comma-separated list.
2023-07-14 14:45:19 -07:00
Wilmer Paulino
eac1bc18e3
Add debug assertions for weight estimates of bump transactions
This ensures our estimates are correct by never underestimating and
only allowing overestimations by a margin of 1%.
2023-07-14 14:45:18 -07:00
Wilmer Paulino
9088dae7da
Consider existing commitment transaction feerate when bumping
With anchors, we've yet to change the frequency or aggressiveness of
feerate updates, so it's likely that commitment transactions have a
good enough feerate to confirm on its own. In any case, when producing a
child anchor transaction, we should already take into account the fees
paid by the commitment transaction itself, allowing the user to save
some satoshis. Unfortunately, in its current form, this will still
result in overpaying by a small margin at the expense of making the coin
selection API more complex.
2023-07-14 14:45:18 -07:00
Wilmer Paulino
990c500099
Avoid yielding ChannelClose bump events with sufficient feerate
There's no need to yield such an event when the commitment transaction
already meets the target feerate on its own, so we can simply broadcast
it without an anchor child transaction. This may be a common occurrence
until we are less aggressive about feerate updates.
2023-07-14 14:45:17 -07:00
Wilmer Paulino
19de4353d5
Move feerate helpers to chain module
We plan to use these outside of the `bump_transaction` module in the
next commit, and they really should belong in the same module as
`FeeEstimator`.
2023-07-14 14:45:15 -07:00
Jeffrey Czyz
7ad3f88eba
Qualify the BOLT 11 invoice description type
A previous commit qualified the BOLT 11 invoice type, so any related
types should be similarly qualified, if public.
2023-07-14 15:59:33 -05:00
Jeffrey Czyz
a28c90a1b3
Qualify the BOLT 11 invoice signature type
A previous commit qualified the BOLT 11 invoice type, so any related
types should be similarly qualified, if public.
2023-07-14 15:53:07 -05:00
Jeffrey Czyz
8c4a85b357
Qualify the BOLT 11 invoice features type
A previous commit qualified the BOLT 11 invoice type, so any related
types should be similarly qualified, if public.
2023-07-14 15:49:00 -05:00
Jeffrey Czyz
62ca48f979
Qualify the BOLT 11 semantic error type
A previous commit qualified the BOLT 12 semantic error type. Qualify the
BOLT 11 semantic error type for consistency.
2023-07-14 15:06:17 -05:00
Jeffrey Czyz
6fb34d30b3
Qualify the BOLT 11 parse error type
A previous commit qualified the BOLT 12 parse error type. Qualify the
BOLT 11 parse error type for consistency.
2023-07-14 15:06:17 -05:00
Jeffrey Czyz
4c383a39a8
Qualify the BOLT 11 raw invoice types
A previous commit qualified the BOLT 11 invoice type, so any related
types should be similarly qualified, if public.
2023-07-14 15:06:10 -05:00
Jeffrey Czyz
93ead4aec5
Qualify the BOLT 11 invoice type
A previous commit qualified the BOLT 12 invoice type. Qualify the BOLT
11 invoice type for consistency.
2023-07-14 15:05:11 -05:00
Jeffrey Czyz
3234136f57
Qualify the BOLT 12 semantic error
To avoid a naming conflict in bindings with BOLT 11 semantic error,
qualify the BOLT 12 semantic error type.
2023-07-14 15:04:43 -05:00
Jeffrey Czyz
5627d7cc1f
Qualify the BOLT 12 parse error
To avoid a naming conflict in bindings with BOLT 11 parse error, qualify
the BOLT 12 parse error type.
2023-07-14 15:04:43 -05:00
Jeffrey Czyz
d94227cc13
Qualify the BOLT 12 unsigned invoice type
A previous commit qualified the BOLT 12 invoice type, so any related
types should be similarly qualified, if public.
2023-07-14 15:04:43 -05:00
Jeffrey Czyz
f8c9b092fd
Qualify the BOLT 12 invoice type
To avoid a naming conflict in bindings with BOLT 11 invoices, qualify
the BOLT 12 invoice type.
2023-07-14 15:04:43 -05:00
Jeffrey Czyz
3e50011e22
Fix grammar in docs 2023-07-14 15:04:30 -05:00
Jeffrey Czyz
1227dfc1ee
Use rustc stable for check_commits
Otherwise, the compiler will panic when using 1.57 for upcoming commits.
2023-07-14 15:02:29 -05:00
Matt Corallo
df237ba3b4
Merge pull request #2391 from TheBlueMatt/2023-07-all-compl-actions
Handle pre-startup and closed-channel monitor update completion actions
2023-07-12 22:37:40 +00:00
Matt Corallo
550cf91439 Add comment describing when a completion action can be discarded
In an older PR a reviewer had asked why the discarding of a channel
being blocked on another monitor update is okay if the blocked
channel has since closed. At the time, this was not actually okay -
the monitor updates in the channel weren't moved to the
`ChannelManager` on close so the whole pipeline was busted, but
with the changes in 4041f0899f the
handling of channel closes with pending monitor updates is now
correct, and so is the existing code block.
2023-07-12 20:53:10 +00:00
Matt Corallo
f9521a4bda Run monitor update completion actions for pre-startup completion
If a `ChannelMonitorUpdate` completes being persisted, but the
`ChannelManager` isn't informed thereof (or isn't persisted) before
shutdown, on startup we may still have it listed as in-flight. When
we compare the available `ChannelMonitor` with the in-flight set,
we'll notice it completed and remove it, however this may leave
some post-update actions dangling which need to complete.

Here we handle this with a new `BackgroundEvent` indicating we need
to handle any post-update action(s) for a given channel.
2023-07-12 20:53:10 +00:00
Elias Rohrer
07606c1841
Merge pull request #2393 from wpaulino/bump-transaction-event-handler-fixups
Bump transaction event handler fixups
2023-07-12 21:17:56 +02:00
Matt Corallo
29f81104f5
Merge pull request #2406 from tnull/2023-07-pin-serde
Pin `serde_json` in CI to fix MSRV builds
2023-07-12 16:12:11 +00:00
Elias Rohrer
7b7ccb6de9
Pin serde_json in CI to fix MSRV
Unfortunately `serde_json` switched to use Rust edition 2021 with
version 1.0.101, i.e., has an MSRV of 1.56 now.
2023-07-12 13:28:25 +02:00
Wilmer Paulino
4c7883c831
Expose previous UTXO for anchor and HTLC inputs
This may be required by some wallets that rely on PSBTs internally to
create/sign transactions.
2023-07-11 16:53:25 -07:00
Wilmer Paulino
0dbfe245a9
Add transaction-related helpers to AnchorDescriptor
This provides a similar interface as `HTLCDescriptor` for users which
choose to implement their own bump transaction event handler.
2023-07-11 16:53:24 -07:00
Wilmer Paulino
690ad18b22
Provide missing post-derivation signer parameters
Users may expect these to be provided manually after derivation in the
event they need to perform any enforcement prior to signing.
2023-07-11 16:53:24 -07:00
Wilmer Paulino
72c42ee786
Cache HTLC per_commitment_point in descriptor
This allows us to obtain the HTLC input and output from its descriptor
without needing to derive the `per_commitment_point` through the signer.
2023-07-11 16:53:22 -07:00
Wilmer Paulino
ae701a0d20
Expose CoinSelection struct members
These are meant to be provided by the user, so they need to be exposed
in the API.
2023-07-11 13:34:42 -07:00
Wilmer Paulino
a100ed0098
Accept BumpTransactionEvent in handle_event
There's no reason to accept the general `Event` enum.
2023-07-11 13:34:35 -07:00
Matt Corallo
e404c129a5
Merge pull request #2400 from TheBlueMatt/2023-07-kill-vec_type
Fix backwards compat for blocked_monitor_updates and finally kill `vec_type`
2023-07-11 19:58:34 +00:00
Matt Corallo
d83390c63b Document some TLV write/read formats
While we don't want to publicly document these and support them for
downstream crates, documenting them internally is useful.
2023-07-11 16:20:03 +00:00
Matt Corallo
907ea200f0 Drop vec_type TLV handling entirely
Historically, we used `vec_type` for all TLV Vec reads/writes, but
it is asymmetric and thus somewhat confusing - on the write side it
always writes a TLV entry, even if there are zero elements. On the
read side, it happily accepts a missing TLV, providing a
zero-length vector.

In 85b573ddad a new `optional_vec`
TLV format was added which was symmetric, but only supports
optional vecs.

Now that we've migrated entirely to the new `required_vec` TLV
type, we can entirely remove the awkward `vec_type`.
2023-07-11 16:20:03 +00:00
Matt Corallo
4b7631ce16 Convert channelmonitor vec_type TLV writes to required/optional
* `HolderSignedTx::htlc_outputs` has always been written since it
   was converted to TLVs in 86641ea680.
 * `ChanelMonitorUpdateStep::*::htlc_outputs` have been written
   since the enum was converted to TLVs in 86641ea680.
2023-07-11 16:20:03 +00:00
Elias Rohrer
31a0456c0e
Merge pull request #2395 from wpaulino/phantom-deduped-forward-event
Force enqueue second forward event for phantom receives
2023-07-11 09:31:37 +02:00
Matt Corallo
d450e0fb2c Handle monitor completion actions for closed channels
If a channel has been closed, there may still be some
`ChannelMonitorUpdate`(s) which are pending completion. These
in-flight updates may also be blocking another channel from letting
an update fly, e.g. for forwarded payments where the payment
preimage will be removed from the downstream channel after the
upstream channel has closed.

Luckily all the infrastructure to handle this case is already in
place - we just need to process the
`monitor_update_blocked_actions` for closed channels.
2023-07-10 21:32:44 +00:00
Wilmer Paulino
4c342bd6b6
Merge pull request #2369 from TheBlueMatt/2023-06-mon-event-less-race
Don't drop ChannelMonitor Events until they're processed
2023-07-10 13:01:50 -07:00
Matt Corallo
4206e7119b Don't drop ChannelMonitor Events until they're processed
We currently assume the owner of `ChannelMonitor`s won't persist
the `ChannelMonitor` while `Event`s are being processed. This is
fine, except (a) its generally hard to do so and (b) the
`ChainMonitor` doesn't even do this.

Thus, in rare cases, a user could begin processing events which
are, generated by connecting a transaction or a new best-block,
take some time to do so, and while doing so process a further chain
event, causing persistece. This could lose the event being
processed alltogether, which could lose the user funds.

This should be very rare, but may have been made slightly more
reachable with (a) the async event processing making it more
common to do networking in event handling, (b) the new future
generation in the `ChainMonitor`, which now wakes the
`background-processor` directly when chain actions happen on the
`ChainMonitor`.
2023-07-10 16:52:04 +00:00
Wilmer Paulino
81722ca833
Handle new event processing logic when enqueuing forward event
This was a regression resulting from f2453b7 since we now process events
in a loop until there aren't any left. Processing events is done in
batches and they are not removed until we're done processing each batch.
Since handling a `PendingHTLCsForwardable` event will call back into the
`ChannelManager`, we'll still see the original forwarding event not
removed. Phantom payments will need an additional forwarding event
before being claimed to make them look real by taking more time.
2023-07-10 09:49:31 -07:00
Wilmer Paulino
dba3e8f2d9
Merge pull request #2364 from TheBlueMatt/2023-06-htlc-preimage-replay
Re-claim forwarded HTLCs on startup
2023-07-10 09:27:57 -07:00
Matt Corallo
a358ba2e68
Merge pull request #2307 from benthecarman/verify-funcs
Add helper functions to verify node and channel annoucements
2023-07-08 22:04:06 +00:00
Matt Corallo
0d3adb8fa0
Merge pull request #2042 from ffaex/add_fn
added fn_add_htlc
2023-07-08 21:47:48 +00:00
Matt Corallo
b66e3c5376
Merge pull request #2396 from tnull/2023-07-fix-github-actions
Update CI to remove deprecated actions
2023-07-08 20:46:26 +00:00
benthecarman
5cc400c37f Add helper functions to verify node and channel annoucements
Right now the only real way to verify the node and channel
announcements is to call `update_node_from_announcement`/
`update_channel_from_announcement`. If you want to do some
processing before you add to your network graph then you need to
manually verify the signature. This adds some nice helper functions
to make it easier.

I tried to do the same for channel update but it did not seem as
easy so figured that is fine to punt on since I don't see many
people doing manual things with channel updates.
2023-07-08 20:23:15 +00:00