Commit graph

6296 commits

Author SHA1 Message Date
Matt Corallo
103180df8f
Merge pull request #2708 from TheBlueMatt/2023-11-less-graph-memory-frag
Reduce common allocations across the codebase
2023-11-13 16:45:26 +00:00
Arik Sosman
2feae7bc58
Update MuSig2 dependency for Hash trait derivation. 2023-11-13 11:07:07 -05:00
Matt Corallo
d5a0eb4270
Merge pull request #2715 from valentinewallace/2023-11-skimmed-fees
Complete underpaying HTLCs support
2023-11-12 20:27:25 +00:00
Matt Corallo
22305a9bff Drop old expiry_time_from_unix_epoch helper in expiry time lookup
Since there's a much simpler way to go about it with
`Bolt11Invoice::expires_at`.
2023-11-12 17:18:00 +00:00
Matt Corallo
98544772e2
Merge pull request #2722 from benthecarman/dust-overflow
Fix potential cases where max_dust_htlc_exposure_msat overflows
2023-11-12 17:03:09 +00:00
Matt Corallo
70b18663f4 Don't send init closing_signed too early after final HTLC removal
If we remove an HTLC (or fee update), commit, and receive our
counterparty's `revoke_and_ack`, we remove all knowledge of said
HTLC (or fee update). However, the latest local commitment
transaction that we can broadcast still contains the HTLC (or old
fee), thus we are not eligible for initiating the `closing_signed`
negotiation if we're shutting down and are generally expecting a
counterparty `commitment_signed` immediately.

Because we don't have any tracking of these updates in the `Channel`
(only the `ChannelMonitor` is aware of the HTLC being in our latest
local commitment transaction), we'd previously send a
`closing_signed` too early, causing LDK<->LDK channels with an HTLC
pending towards the channel initiator at the time of `shutdown` to
always fail to cooperatively close.

To fix this race, we add an additional unpersisted bool to
`Channel` and use that to gate sending the initial `closing_signed`.
2023-11-11 20:24:58 +00:00
Matt Corallo
d30d599a2f Drop non-anchor channel fee upper bound limit entirely
Quite a while ago we added checks for the total current dust
exposure on a channel to explicitly limit dust inflation attacks.
When we did this, we kept the existing upper bound on the channel's
feerate in place. However, these two things are redundant - the
point of the feerate upper bound is to prevent dust inflation, and
it does so in a crude way that can cause spurious force-closures.

Here we simply drop the upper bound entirely, relying on the dust
inflation limit to prevent dust inflation instead.
2023-11-11 17:32:31 +00:00
benthecarman
3fbfde360f
Impl display for invoice fields 2023-11-10 20:41:53 -06:00
Matt Corallo
a6039b9af2 Replace maze of BOLT11 payment utilities with parameter generators
`lightning-invoice` was historically responsible for actually
paying invoices, handling retries and everything. However, that
turned out to be buggy and hard to maintain, so the payment logic
was eventually moved into `ChannelManager`. However, the old
utilites remain.

Because our payment logic has a number of tunable parameters and
there are different ways to pay a BOLT11 invoice, we ended up with
six different methods to pay or probe a BOLT11 invoice, with more
requested as various options still were not exposed.

Instead, here, we replace all six methods with two simple ones
which return the arguments which need to be passed to
`ChannelManager`. Those arguments can be further tweaked before
passing them on, allowing more flexibility.
2023-11-10 19:23:21 +00:00
Matt Corallo
7a951b1bf7 Stop writing signer data as a part of channels
This breaks backwards compatibility with versions of LDK prior to
0.0.113 as they expect to always read signer data.

This also substantially reduces allocations during `ChannelManager`
serialization, as we currently don't pre-allocate the `Vec` that
the signer gets written in to. We could alternatively pre-allocate
that `Vec`, but we've been set up to skip the write entirely for a
while, and 0.0.113 was released nearly a year ago. Users
downgrading to LDK 0.0.112 and before at this point should not be
expected.
2023-11-09 22:28:08 +00:00
Matt Corallo
a8d4cfa811 Avoid allocating when checking gossip message signatures
When we check gossip message signatures, there's no reason to
serialize out the full gossip message before hashing, and it
generates a lot of allocations during the initial startup when we
fetch the full gossip from peers.
2023-11-09 22:28:08 +00:00
Matt Corallo
18dc7f248b Avoid a tokio::mpsc::Sender clone for each P2P send operation
Whenever we go to send bytes to a peer, we need to construct a
waker for tokio to call back into if we need to finish sending
later. That waker needs some reference to the peer's read task to
wake it up, hidden behind a single `*const ()`. To do this, we'd
previously simply stored a `Box<tokio::mpsc::Sender>` in that
pointer, which requires a `clone` for each waker construction. This
leads to substantial malloc traffic.

Instead, here, we replace this box with an `Arc`, leaving a single
`tokio::mpsc::Sender` floating around and simply change the
refcounts whenever we construct a new waker, which we can do
without allocations.
2023-11-09 22:28:08 +00:00
Matt Corallo
969085bf1e Avoid re-allocating to encrypt gossip messages when forwarding
When we forward gossip messages, we store them in a separate buffer
before we encrypt them (and commit to the order in which they'll
appear on the wire). Rather than storing that buffer encoded with
no headroom, requiring re-allocating to add the message length and
two MAC blocks, we here add the headroom prior to pushing it into
the gossip buffer, avoiding an allocation.
2023-11-09 22:28:08 +00:00
benthecarman
55da9c434e
Fix potential cases where max_dust_htlc_exposure_msat overflows 2023-11-09 14:51:44 -06:00
Valentine Wallace
0edd645ba8
Link to LSP spec in accept_underpaying_htlcs config 2023-11-07 15:14:27 -05:00
Valentine Wallace
1926c82b9e
Include counterparty skimmed fees in PaymentClaimed event. 2023-11-07 15:08:55 -05:00
Matt Corallo
6e40e5f18a
Merge pull request #2702 from G8XSU/libFuzzer
Update fuzzing instructions for libFuzzer/cargo-fuzz
2023-11-07 18:16:49 +00:00
Matt Corallo
0503df88c7 Use VecDeque, rather than LinkedList in peer message buffering
When buffering outbound messages for peers, `LinkedList` adds
rather substantial allocation overhead, which we avoid here by
swapping for a `VecDeque`.
2023-11-07 18:13:23 +00:00
Matt Corallo
48edd01d02 Avoid unnecessarily alloc'ing a new buffer when decrypting messages
When decrypting P2P messages, we already have a read buffer that we
read the message into. There's no reason to allocate a new `Vec` to
store the decrypted message when we can just overwrite the read
buffer and call it a day.
2023-11-07 18:13:23 +00:00
Matt Corallo
5e34bc4404 Add an option to in-place decrypt with ChaCha20Poly1305
In the next commit we'll use this to avoid an allocation when
deserializing messages from the wire.
2023-11-07 18:13:23 +00:00
Jeffrey Czyz
1e25979128
Merge pull request #2714 from TheBlueMatt/2023-11-one-less-alloc
Avoid an unnecessary allocation in `TaggedHash`
2023-11-07 07:43:26 -06:00
optout
649129ddab Add Splicing (and Quiescence) wire message definitions 2023-11-07 12:13:58 +01:00
Matt Corallo
1aa5210c2f Avoid an unnecessary allocation in TaggedHash
A well-formed tag is always a constant, so allocating to store it
is unnecessary when we can just make the tag a `&'static str`.
2023-11-07 05:08:16 +00:00
Matt Corallo
96e7d7a258
Merge pull request #2687 from orbitalturtle/signature-data-enum
Expose more granular data in TaggedHash struct
2023-11-07 05:04:48 +00:00
Matt Corallo
2e33acbd9c
Merge pull request #2677 from Evanfeenstra/public-onion-utils
public create_payment_onion in onion_utils
2023-11-07 04:41:03 +00:00
Matt Corallo
e4c6b70e8e Pre-allocate the full Vec prior to serializing as a Vec<u8>
We end up generating a substantial amount of allocations just
doubling `Vec`s when serializing to them, and our
`serialized_length` method is generally rather effecient, so we
just rely on it and allocate correctly up front.
2023-11-07 04:12:30 +00:00
Orbital
caafcedf3f
expose more granular data in TaggedHash struct
Expose tag and merkle root fields in the TaggedHash struct.
2023-11-06 21:36:54 -06:00
Orbital
38dfbf99db
refactor to remove message_digest
We change the Bolt12Invoice struct to carry a tagged hash. Because
message_digest is then only used in one place, we can inline it in
the TaggedHash constructor.
2023-11-06 21:29:50 -06:00
Gursharan Singh
dabe4afad6
Update fuzzing instructions for libFuzzer/cargo-fuzz 2023-11-06 16:28:43 -08:00
Evan Feenstra
0c7b6479b0 export create_onion_message and peel_onion_message from ln::onion_message 2023-11-06 10:42:50 -08:00
Evan Feenstra
c126f0b187 public create_payment_onion in onion_utils 2023-11-06 10:41:35 -08:00
Matt Corallo
50eba2624f
Merge pull request #2699 from mhrheaume/mhr/temporary_channel_id
Added `temporary_channel_id` to `create_channel`.
2023-11-05 05:35:40 +00:00
Matt Corallo
e09afafc43 Avoid unnecessarily overriding serialized_length
...as LLVM will handle it just fine for us, in most cases.
2023-11-04 16:21:29 +00:00
Matt Corallo
1455452177 Pre-allocate send buffer when forwarding gossip
When forwarding gossip, rather than relying on Vec doubling,
pre-allocate the message encoding buffer.
2023-11-04 16:20:51 +00:00
Matt Corallo
abee51b10c Prefer Writeable.encode() over VecWriter use
It does the same thing and its much simpler.
2023-11-04 16:20:24 +00:00
Matt Corallo
c0107c6069 Reduce on-startup heap frag due to network graph map/vec doubling
When we're reading a `NetworkGraph`, we know how many
nodes/channels we are reading, there's no reason not to
pre-allocate the `IndexedMap`'s inner `HashMap` and `Vec`, which we
do here.

This seems to reduce on-startup heap fragmentation with glibc by
something like 100MiB.
2023-11-04 04:00:04 +00:00
Matthew Rheaume
bf395070dd Added temporary_channel_id to create_channel.
By default, LDK will generate the initial temporary channel ID for you.
However, in certain cases, it's desirable to have a temporary channel ID
specified by the caller in case of any pre-negotiation that needs to
happen between peers prior to the channel open message. For example, LND
has a `FundingShim` API that allows for advanced funding flows based on
the temporary channel ID of the channel.

This patch adds support for optionally specifying the temporary channel
ID of the channel through the `create_channel` API.
2023-11-03 17:44:50 -07:00
Matt Corallo
281a0aead7
Merge pull request #2558 from waterson/pr-2554
Handle retrying sign_counterparty_commitment failures
2023-11-02 19:04:05 +00:00
Elias Rohrer
d795e247b7
Merge pull request #2641 from alexanderwiederin/2585-preflight-test-coverage
#2585 Preflight Test Coverage
2023-11-02 09:50:21 +01:00
Chris Waterson
014a336e59 Add basic async signer tests
Adds a `get_signer` method to the context so that a test can get ahold of the
channel signer. Adds a `set_available` method on the `TestChannelSigner` to
allow a test to enable and disable the signer: when disabled some of the
signer's methods will return `Err` which will typically activate the error
handling case. Adds a `set_channel_signer_available` function on the test
`Node` class to make it easy to enable and disable a specific signer.

Adds a new `async_signer_tests` module:

* Check for asynchronous handling of `funding_created` and `funding_signed`.
* Check that we correctly resume processing after awaiting an asynchronous
  signature for a `commitment_signed` event.
* Verify correct handling during peer disconnect.
* Verify correct handling for inbound zero-conf.
2023-11-01 15:24:20 -07:00
Matt Corallo
4278afc9aa Handle retrying sign_counterparty_commitment inb funding failures
If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

This commit adds retrying of inbound funding_created signing
failures, regenerating the `FundingSigned` message, attempting to
re-sign, and sending it to our peers if we succeed.
2023-11-01 15:24:20 -07:00
Matt Corallo
8d01309555 Handle retrying sign_counterparty_commitment outb funding failures
If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

This commit adds retrying of outbound funding_created signing
failures, regenerating the `FundingCreated` message, attempting to
re-sign, and sending it to our peers if we succeed.
2023-11-01 15:24:20 -07:00
Matt Corallo
f36afcbae3 Handle retrying sign_counterparty_commitment failures
If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

This commit adds initial retrying of failures, specifically
regenerating commitment updates, attempting to re-sign the
`CommitmentSigned` message, and sending it to our peers if we
succed.
2023-11-01 15:24:14 -07:00
Matt Corallo
0e3f6b6029 Handle sign_counterparty_commitment failing during inb funding
If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

Here we add initial handling of sign_counterparty_commitment
failing during inbound channel funding, setting a flag in
`ChannelContext` which indicates we should retry sending the
`funding_signed` later. We don't yet add any ability to do that
retry.
2023-11-01 14:41:08 -07:00
Matt Corallo
d86f73b8d5 Handle sign_counterparty_commitment failing during outb funding
If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

Here we add initial handling of sign_counterparty_commitment
failing during outbound channel funding, setting a new flag in
`ChannelContext` which indicates we should retry sending the
`funding_created` later. We don't yet add any ability to do that
retry.
2023-11-01 14:41:02 -07:00
Matt Corallo
1da29290e7 Handling for sign_counterparty_commitment failing during normal op
If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending later, rather than force-closing the
channel (which probably won't even work if the signer is missing).

Here we add initial handling of sign_counterparty_commitment
failing during normal channel operation, setting a new flag in
`ChannelContext` which indicates we should retry sending the
commitment update later. We don't yet add any ability to do that
retry.
2023-11-01 14:29:59 -07:00
valentinewallace
415cbf088e
Merge pull request #2682 from jkczyz/2023-09-bolt12-test-vectors
BOLT 12 Offer test vectors
2023-11-01 14:34:29 -04:00
alexanderwiederin
a38bdbe7bc
add preflight probes test coverage 2023-11-01 19:33:12 +01:00
Matt Corallo
d0f0d9c19f
Merge pull request #2686 from jkczyz/2023-10-onion-message-fuzz
Re-add one-hop onion message fuzzing test
2023-11-01 17:42:29 +00:00
valentinewallace
1f399b0984
Merge pull request #2668 from TheBlueMatt/2023-10-fix-doc
Update docs on `MonitorEvent::HolderForceClosed`
2023-10-30 16:21:36 -04:00