Commit graph

6733 commits

Author SHA1 Message Date
Matt Corallo
7f177bb6dd
Merge pull request #2797 from dunxen/2023-12-purgetochannelid
Remove `Outpoint::to_channel_id` method
2024-01-30 23:04:39 +00:00
Arik Sosman
bb9b389be6
Improve error message for invalid response lengths. 2024-01-30 14:01:29 -08:00
Duncan Dean
cf2c27800a
Remove Outpoint::to_channel_id method
To avoid confusion and for accuracy going forward, we remove this method
as it is inconsistent with channel IDs generated during V2 channel
establishment. If one wants to create a V1, funding outpoint-based
channel ID, then `ChannelId::v1_from_funding_outpoint` should be used
instead.

A large portion of the library has always made the assumption that having
the funding outpoint will always allow us to generate the channel ID.
This will not be the case anymore and we need to pass the channel ID along
where appropriate. All channels that could have been persisted up to this
point could only have used V1 establishment, so if some structures don't
store a channel ID for them they can safely fall back to the funding
outpoint-based version.
2024-01-30 12:30:26 +02:00
Wilmer Paulino
25ec63f70e
Enforce compile-time check for flag getters and setters
This ensures that we cannot define or use flag getters/setters on
`ChannelState` variants in which said flag is not valid.
2024-01-29 14:00:06 -08:00
Wilmer Paulino
9ab7a48ff1
Use clear helper on flags copy to mask off bits 2024-01-29 13:57:19 -08:00
Matt Corallo
51d9ee35e5
Merge pull request #2694 from Evanfeenstra/public-scid-utils
public scid utils
2024-01-25 01:52:13 +00:00
Matt Corallo
a5ba3391f8 [bindings] No-export RouteHopCandidate lifetime'd fields
The bindings cannot express lifetimes, so exposing any field which
is a reference (and not `clone`-able, at least for garbage
collected language bindings) is unsafe for those expecting a
high-level interface.

Thus, we simply no-export the `RouteHopCandidate` inner struct
fields which are references (there are relevant accessors for them
anyway).
2024-01-24 23:19:11 +00:00
Matt Corallo
4764fa3985 [bindings] Mark WithContext log wrapper with no-export
There's not a lot of reason for downstream users to use the
`WithContext` wrapper, it mostly exists for our own downstream
crates anyway, and dealing with lifetimes in bindings isn't super
practical, so simply no-export it.
2024-01-24 23:19:11 +00:00
Matt Corallo
e5c0c62c17 [bindings] Drop the lifetime bound on Record for bindings builds
Because log `Record`s are now being passed by ownership to `log`,
the bindings get quite annoyed that there's a lifetime hanging
around. We already don't use this lifetime in bindings (the
`FormatArgs` is converted to a string and stored on the heap), so
we can just drop the lifetime, even though it requires some
macro'ing of the struct definition to do so.
2024-01-24 23:17:43 +00:00
Matt Corallo
76fff953bd
Merge pull request #2697 from jkczyz/2023-10-offer-functional-tests
Functional tests for BOLT 12 Offers payment flow
2024-01-24 23:14:01 +00:00
Matt Corallo
4bab9c8393
Merge pull request #2844 from TheBlueMatt/2024-01-cut-121
Release 0.0.121
2024-01-22 23:55:35 +00:00
Matt Corallo
7b31b303c6 Bump versions to LDK 0.0.121/invoice 0.29 2024-01-22 22:32:30 +00:00
Matt Corallo
28619a5ced Add CHANGELOG entry for 0.0.121 2024-01-22 22:32:30 +00:00
Matt Corallo
15c9f5bd7c
Merge pull request #2841 from TheBlueMatt/2024-01-batch-deadlock
Fix deadlock when handling bad calls to `batch_funding.._generated`
2024-01-22 22:30:59 +00:00
Matt Corallo
444740cd6d
Merge pull request #2842 from jkczyz/2024-01-fix-peer-handler-unwrap
Fix panic when peer is mid-handshake
2024-01-22 22:30:56 +00:00
Jeffrey Czyz
7b8d018f1f
Remove unnecessary unwraps 2024-01-22 16:26:54 -06:00
Jeffrey Czyz
c7465bdb3e
Fix panic when peer is mid-handshake
Peer::their_node_id is set to Some during the handshake process.
However, df3ab2ee27 accesses the field
unconditionally, causing a panic. This may be triggered if a gossip
message is received mid-handshake from another peer or if the user calls
broadcast_node_announcement during this time. The latter tends to be
executed on a timer.

Ensure that Peer::their_node_id is only accessed once the handshake is
complete.
2024-01-22 15:35:47 -06:00
Matt Corallo
983ca37a97 Fix deadlock when handling bad calls to batch_funding.._generated
When handling calls to `batch_funding_transaction_generated` which
were missing outputs for one of the batch channels, we'd previously
deadlock when trying to clean up the now-closed channels. This
fixes that and adds a new test case for it.

Found by the full_stack_target fuzzer.
2024-01-22 21:22:54 +00:00
Evan Feenstra
9a665ca0b8 public scid utils 2024-01-21 11:20:52 -08:00
Elias Rohrer
6b0ba8c9f1
Merge pull request #2835 from TheBlueMatt/2024-01-cut-120
Change v0.0.120 release name
2024-01-19 21:41:51 +01:00
Matt Corallo
79affa0d51 Change v0.0.120 release name
"Un"blinded makes more sense, since the fuzzer was unblinded :)
2024-01-17 23:19:12 +00:00
Matt Corallo
5592378de2
Merge pull request #2834 from TheBlueMatt/2024-01-cut-120
Cut 0.0.120
2024-01-17 23:02:24 +00:00
Matt Corallo
37017ec39f Bump crate versions to 0.0.120/invoice 0.28 2024-01-17 21:34:29 +00:00
Matt Corallo
947850b1de Add CHANGELOG entry for 0.0.120 2024-01-17 21:34:29 +00:00
Matt Corallo
871db638f2
Merge pull request #2818 from valentinewallace/2024-01-blinded-path-retries
Avoid retrying over previously failed blinded paths
2024-01-17 21:21:36 +00:00
valentinewallace
a1759582ad
Merge pull request #2828 from TheBlueMatt/2024-01-crypto-module
Move cryptographic algorithms and utilities to a new `crypto` mod
2024-01-17 12:53:02 -05:00
Valentine Wallace
5c87f40f6b
Test that we won't retry over previously failed blinded paths. 2024-01-17 10:55:41 -05:00
Valentine Wallace
8fcfaeb8d5
Test util: separate out code to construct a blinded path. 2024-01-17 10:55:41 -05:00
Valentine Wallace
32ab7a9e4d
Avoid building routes over previously failed blinded payment paths. 2024-01-17 10:55:39 -05:00
Valentine Wallace
23ef2535d0
Store previously failed blinded paths on outbound payment failure.
Useful so we don't retry over these paths.
2024-01-17 10:44:38 -05:00
Valentine Wallace
5c5d691425
Persist previously failed blinded paths in RouteParameters.
Useful so we don't retry over these paths.
2024-01-17 10:44:33 -05:00
Valentine Wallace
75a1c47b19
Add failed_within_blinded_path to DecodedOnionFailure.
Will be used to ensure correctness when we store previously failed blinded
paths to avoid retrying over them.
2024-01-17 10:44:33 -05:00
Valentine Wallace
ae1288d8cc
Add failed_within_blinded_path to onion util internal struct.
Will be used to ensure correctness when we store previously failed blinded
paths to avoid retrying over them.
2024-01-17 10:44:33 -05:00
Matt Corallo
fbeb7ac9e1
Merge pull request #2831 from jkczyz/2024-01-fix-cltv-expiry-delta
Use consistent `cltv_expiry_delta` in `ForwardTlvs`
2024-01-17 00:47:48 +00:00
Matt Corallo
a97f945607
Merge pull request #2832 from p2pderivatives/fix-ln-net-tokio-dropping-messages
Fix lightning-net-tokio sometimes dropping messages
2024-01-17 00:37:09 +00:00
Matt Corallo
53f2e2e882
Merge pull request #2812 from valentinewallace/2023-12-blinded-forwarding
Complete route blinding support
2024-01-17 00:28:30 +00:00
Tibo-lg
4cd0e6a391 Fix lightning-net-tokio sometimes dropping messages 2024-01-17 09:24:49 +09:00
Jeffrey Czyz
8053aa3df4
Use consistent cltv_expiry_delta in ForwardTlvs
When converting from CounterpartyForwardingInfo to PaymentRelay, the
cltv_expiry_delta is copied. Then, when forming a blinded payment path,
the value is mutated so that esoteric values don't reveal information
about the path. However, the value was only used in computing
PaymentConstraints and wasn't actually updated in PaymentRelay. Move the
logic for modifying the cltv_expiry_delta to the conversion code to
avoid this inconsistency.
2024-01-16 16:59:27 -06:00
Valentine Wallace
aae39b4090
Advertise route blinding feature as supported.
Now that we fully support forwarding blinded payments, we should advertise
support so nodes on the network can include us in their blinded paths.
2024-01-16 17:46:41 -05:00
Valentine Wallace
027aef2b64
Fix sender double-including shadow offset in CLTV expiry height.
The excess delta is included in the final RouteHop::cltv_expiry_delta, so by
adding it explicitly to cur_cltv we were erroneously including it twice in the
total cltv expiry.

This could've add up to an extra MAX_SHADOW_CLTV_DELTA_OFFSET (432) blocks to
the total cltv expiry.
2024-01-16 17:46:41 -05:00
Valentine Wallace
6e6bd44138
Rename test var to be more descriptive. 2024-01-16 17:46:41 -05:00
Valentine Wallace
a76bb51a3a
Complete remaining TODOs for failing blinded non-intro forwards. 2024-01-16 17:46:41 -05:00
Valentine Wallace
c37d10944e
Add failure mode info to BlindedForward struct.
See added docs.
2024-01-16 17:46:39 -05:00
Matt Corallo
4a0abd52e7 Move cryptographic algorithms and utilities to a new crypto mod
As we'd generally like the `lightning` crate to, over time, have
more modules rather than being very monolithic, we should move the
cryptographic things into their own module, which we do here.

We also take this opportunity to move stream adapters into their
own module and make clear that the ChaChaPoly `decrypt` method is
variable time.
2024-01-16 20:07:08 +00:00
Jeffrey Czyz
4532fb52f0
Fix bench build warning 2024-01-16 11:12:36 -06:00
Jeffrey Czyz
5aeb6c5167
Reorganize #[cfg(not(c_bindings))] imports 2024-01-16 11:12:36 -06:00
Jeffrey Czyz
ffc24c3af9
Add ASCII art diagram explaining offers_tests 2024-01-16 11:12:36 -06:00
Jeffrey Czyz
aef46d8c82
Functional test for failing duplicate payments 2024-01-16 11:12:36 -06:00
Jeffrey Czyz
1c51aa17f3
Functional tests for failing without payment paths 2024-01-16 11:12:36 -06:00
Jeffrey Czyz
e40387fc85
Add Features::clear_route_blinding for testing 2024-01-16 11:12:36 -06:00