Commit graph

7231 commits

Author SHA1 Message Date
Jeffrey Czyz
702a003270
Merge similar InvoiceRequestBuilder impl blocks
This avoids needing to create additional macros when adding c_bindings
support.
2024-03-06 09:25:26 -06:00
Jeffrey Czyz
b1ad95158e
Add c_bindings version of RefundBuilder
Use the macros introduced in the previous commit to define a builder
called RefundMaybeWithDerivedMetadataBuilder.

The difference between this and RefundBuilder is that this has methods
that take `self` by mutable reference instead of by value and don't
return anything instead returning the modified builder. This is required
because bindings don't support move semantics. Because of this, the
builder's contents must be cloned when building a Refund.

Keeps RefundBuilder defined so that it can be used internally in
ChannelManager::create_refund_builder even when compiled for c_bindings.
2024-03-06 09:25:26 -06:00
Jeffrey Czyz
1af5c409fe
Macro-ize RefundBuilder
RefundBuilder is not exported to bindings because it has methods that
take `self` by value. Define these methods using macros such that
different builders and related methods can be defined for c_bindings.
2024-03-06 09:25:26 -06:00
Jeffrey Czyz
d9ab2fa581
Add c_bindings version of OfferBuilder
Use the macros introduced in the previous commit to define two builders
for each type parameterization of OfferBuilder
- OfferWithExplicitMetadataBuilder
- OfferWithDerivedMetadataBuilder

The difference between these and OfferBuilder is that these have methods
that take `self` by mutable reference instead of by value and don't
return anything instead returning the modified builder. This is required
because bindings don't support move semantics nor impl blocks specific
to a certain type parameterization. Because of this, the builder's
contents must be cloned when building an Offer.

Keeps OfferBuilder defined so that it can be used internally in
ChannelManager::create_offer_builder even when compiled for c_bindings.
2024-03-06 09:25:26 -06:00
Matt Corallo
7a35bf84f0
Merge pull request #2919 from tnull/2024-03-fix-hashtables-rustfmt
`rustfmt`: Fix CI by running `rustfmt` on `util/hash_tables.rs`
2024-03-04 16:30:29 +00:00
Elias Rohrer
c8880099ac
Run rustfmt on util/hash_tables.rs
.. to fix the silent rebase conflict.
2024-03-04 16:03:41 +01:00
Matt Corallo
3c9d88af26
Merge pull request #2918 from tnull/2024-03-prefer-from-over-into 2024-03-01 21:01:32 +00:00
Elias Rohrer
fe50a507ab
Prefer implementing From over Into
.. as the std library docs state that implementing Into should be avoided:
"One should avoid implementing Into and implement From instead.
Implementing From automatically provides one with an implementation of
Into thanks to the blanket implementation in the standard library."
2024-03-01 11:42:54 +01:00
Matt Corallo
bf3bc420c7
Merge pull request #2916 from sr-gi/2024-02-29-payment-preimage-hash
util: Adds Into<PaymentHash> for PaymentPreimage
2024-02-29 21:48:40 +00:00
Sergi Delgado Segura
d2ffcbc233 util: Adds Into<PaymentHash> for PaymentPreimage
This seems like a useful interface to have for downstream users
2024-02-29 15:41:20 -05:00
Elias Rohrer
cfb4391850
Merge pull request #2915 from TheBlueMatt/2024-02-better-rnf-docs
Update docs on `PaymentFailureReason::RouteNotFound` to add context
2024-02-29 15:58:56 +01:00
Matt Corallo
a6478838e8 Update docs on PaymentFailureReason::RouteNotFound to add context
tnull noted on discord that its somewhat unclear to users what
`RouteNotFound` actually means - that we ran out of routes, rather
than could not find a route at all - so the docs are updated here.
2024-02-29 14:51:21 +00:00
Elias Rohrer
337b8de76e
Merge pull request #2913 from arik-so/2024/02/serialize-socket-address-vectors
Serialize SocketAddress vectors
2024-02-29 09:29:40 +01:00
Arik Sosman
d97e36e3f3
Serialize SocketAddress vectors. 2024-02-28 23:21:53 -08:00
Jeffrey Czyz
e10583365b
Prefer one-hop blinded path to Tor intro nodes
If a node is announced, prefer using a one-hop blinded path with it as
the introduction node to using a two-hop blinded path with a Tor-only
introduction node. The one-hop blinded path is more reliable, thus only
use Tor-only nodes if the recipient is unannounced. And then, prefer
non-Tor-only nodes.
2024-02-28 15:58:14 -06:00
Jeffrey Czyz
5e9a998194
Prefer well-connected nodes for introduction nodes
When forming blinded paths, using a reliable node as the introduction
node is important to ensure onion message reliability. Order blinded
paths by how well-connected the introduction node is as a proxy for
reliability.

For short paths (e.g., when the sender and recipient share an LSP), this
may also result in a scenario where initiating a direct connection isn't
necessary. That is helpful when using RGS since it currently doesn't
include node announcements and thus cannot initiate a direct connection.
2024-02-28 11:23:56 -06:00
Elias Rohrer
7ab438ddcc
Merge pull request #2911 from jkczyz/2024-02-sort-blinded-paths
Prefer non-Tor nodes when creating blinded paths
2024-02-28 12:01:55 +01:00
Jeffrey Czyz
b9547480ea
Prefer non-Tor nodes when creating blinded paths
Tor nodes can have high latency which can have a detrimental effect on
onion message reliability. Prefer using nodes that aren't Tor-only when
creating blinded paths both in offers and in onion message reply paths.
2024-02-27 18:50:58 -06:00
Jeffrey Czyz
093ceffd24
Add NodeInfo::is_tor_only
Add a method to NodeInfo to determine if the node has only announced Tor
addresses. Useful for preferring blinded paths that don't use Tor for
better reliability and improved latency.
2024-02-27 16:14:44 -06:00
Valentine Wallace
5fbc44ee58
Adapt intro node process_pending_htlcs test for non-intro nodes 2024-02-25 19:08:45 -03:00
Valentine Wallace
f753c869bf
Macro-ize test code block that causes an intro node error
Will be useful in the next commit for adapting these tests for non-intro node
failures.
2024-02-25 19:08:45 -03:00
Valentine Wallace
037954b313
Adapt intro node forward checks test for non-intro nodes 2024-02-25 19:08:45 -03:00
Valentine Wallace
d6ed52e982
Macro-ize test code that causes an intro node error on initial update_add
Will be useful in the next commit for adapting this test for non-intro-node
failures.
2024-02-25 19:08:45 -03:00
Valentine Wallace
938e8d4a36
Test MPP to 3-hop blinded paths. 2024-02-25 19:08:45 -03:00
Jeffrey Czyz
a517925f6c
Macro-ize OfferBuilder
OfferBuilder is not exported to bindings because it has methods that
take `self` by value and are only implemented for certain type
parameterizations. Define these methods using macros such that different
builders and related methods can be defined for c_bindings.
2024-02-23 16:37:03 -06:00
Matt Corallo
36e434d8ce
Merge pull request #2909 from benthecarman/inv-pk-helper
Add helper function to properly get invoice pubkey
2024-02-22 19:32:02 +00:00
Matt Corallo
c4a2f1bb21
Merge pull request #2877 from tnull/2024-02-start-rustfmt-journey
`rustfmt`: Add CI scripts and format `onion_utils.rs`
2024-02-22 19:30:17 +00:00
benthecarman
53fc986378
Add helper function to properly get invoice pubkey 2024-02-22 18:05:37 +00:00
Elias Rohrer
affe55733b
Merge pull request #2908 from TheBlueMatt/2024-02-drop-useless-refs
Drop unnecessary int reference in SCID conversion utilities
2024-02-22 11:36:38 +01:00
Matt Corallo
716269e1e8
Merge pull request #2905 from tnull/2024-02-expose-init-features
Refactor `PeerManager::get_peer_node_ids` in favor of `list_peers`/`peer_by_node_id` returning additional information
2024-02-22 00:06:30 +00:00
Matt Corallo
0cd353c2bb Drop unnecessary int reference in SCID conversion utilities 2024-02-21 22:26:27 +00:00
Matt Corallo
2964751bd3
Merge pull request #2770 from dunxen/2023-12-dualfundingpreliminaries
Preliminary refactoring & structure for dual-funded channels
2024-02-21 21:09:26 +00:00
Elias Rohrer
0c74cdc573
Introduce PeerManager::list_peers and peer_by_node_id
.. returning `PeerDetails` rather than tuples of peer-associated values.

Previously, we wouldn't offer any way to retrieve the features a
peer provided in their `Init` message.

Here, we allow to retrieve them via a new `PeerDetails` struct,
side-by-side with `SocketAddress`es and a bool indicating the direction
of the peer connection.
2024-02-21 10:12:16 +01:00
Matt Corallo
a854ccb9b5
Merge pull request #2898 from tnull/2024-02-ignore-RUSTSEC-2021-0145
Have CI's `cargo audit` ignore `RUSTSEC-2021-0125`
2024-02-20 17:42:18 +00:00
Duncan Dean
efec33fc57
Add V2 ChannelPhase variants 2024-02-20 09:15:18 +02:00
Duncan Dean
e142e4a4e6
Add maybe_handle_error_without_close for OutboundV2Channel 2024-02-20 09:15:17 +02:00
Duncan Dean
909130bfed
Add OutboundV2Channel struct 2024-02-20 09:15:16 +02:00
Duncan Dean
2f43953089
Create ChannelContext constructor for outbound channels 2024-02-20 09:15:15 +02:00
Duncan Dean
fd68df9f95
Add InboundV2Channel struct 2024-02-20 09:15:14 +02:00
Duncan Dean
3fda620cba
Create ChannelContext constructor for inbound channels 2024-02-20 09:15:13 +02:00
Duncan Dean
740bb3188c
Add DualFundingChannelContext struct 2024-02-20 09:15:12 +02:00
Duncan Dean
47f7dfe9ee
Test builds with #[cfg(dual_funding)] enabled 2024-02-20 09:15:11 +02:00
Duncan Dean
c5f5b9224f
Add V2 constructors to ChannelId 2024-02-20 09:15:10 +02:00
Matt Corallo
cd847574f2
Merge pull request #2891 from TheBlueMatt/2024-02-no-ahash
Drop the `ahash` dependency
2024-02-19 22:17:35 +00:00
Elias Rohrer
9aa6ddb24e
Have CI's cargo audit ignore RUSTSEC-2021-0125
This advisory is only relevant for a downstream dependency of
`criterion`, which we currently don't want to bump in order to continue
benchmarking with our MSRV 1.63.0.

We therefore just add it to our ignore list for now.
2024-02-19 10:00:36 +01:00
Matt Corallo
6fa1cb2ce8
Merge pull request #2897 from TheBlueMatt/2024-02-fix-route-ser
Fix `Route` serialization round-trip
2024-02-16 21:15:45 +00:00
Matt Corallo
eecd2cdf4f Drop lightning-invoice dependency on hashbrown` 2024-02-16 20:34:41 +00:00
Matt Corallo
3096061bef Drop ahash dependency in favor of core's SipHasher
https://github.com/tkaitchuck/aHash/pull/196 bumped the MSRV of
`ahash` in a patch release, which makes it rather difficult for us
to have it as a dependency.

Further, it seems that `ahash` hasn't been particularly robust in
the past, notably
https://github.com/tkaitchuck/aHash/issues/163 and
https://github.com/tkaitchuck/aHash/issues/166.

Luckily, `core` provides `SipHasher` even on no-std (sadly its
SipHash-2-4 unlike the SipHash-1-3 used by the `DefaultHasher` in
`std`). Thus, we drop the `ahash` dependency entirely here and
simply wrap `SipHasher` for our `no-std` HashMaps.
2024-02-16 20:34:41 +00:00
Matt Corallo
65108a022f Add a crate which wraps getrandom but always compiles
In the next commit we'll drop the `ahash` dependency in favor of
directly calling `getrandom` to seed our hash tables. However,
we'd like to depend on `getrandom` only on certain platforms *and*
only when certain features (no-std) are set.

This introduces an indirection crate to do so, allowing us to
depend on it only when `no-std` is set but only depending on
`getrandom` on platforms which it supports.
2024-02-16 20:34:40 +00:00
Matt Corallo
24d02ff287 Test Route serialization round-trip
This adds testing for the previous two commits by testing that all
routes generated in testing are able to survive a serialization
round-trip.
2024-02-16 19:26:32 +00:00