Commit graph

4425 commits

Author SHA1 Message Date
Sergi Delgado Segura
d2ffcbc233 util: Adds Into<PaymentHash> for PaymentPreimage
This seems like a useful interface to have for downstream users
2024-02-29 15:41:20 -05:00
Elias Rohrer
affe55733b
Merge pull request #2908 from TheBlueMatt/2024-02-drop-useless-refs
Drop unnecessary int reference in SCID conversion utilities
2024-02-22 11:36:38 +01:00
Matt Corallo
716269e1e8
Merge pull request #2905 from tnull/2024-02-expose-init-features
Refactor `PeerManager::get_peer_node_ids` in favor of `list_peers`/`peer_by_node_id` returning additional information
2024-02-22 00:06:30 +00:00
Matt Corallo
0cd353c2bb Drop unnecessary int reference in SCID conversion utilities 2024-02-21 22:26:27 +00:00
Elias Rohrer
0c74cdc573
Introduce PeerManager::list_peers and peer_by_node_id
.. returning `PeerDetails` rather than tuples of peer-associated values.

Previously, we wouldn't offer any way to retrieve the features a
peer provided in their `Init` message.

Here, we allow to retrieve them via a new `PeerDetails` struct,
side-by-side with `SocketAddress`es and a bool indicating the direction
of the peer connection.
2024-02-21 10:12:16 +01:00
Duncan Dean
efec33fc57
Add V2 ChannelPhase variants 2024-02-20 09:15:18 +02:00
Duncan Dean
e142e4a4e6
Add maybe_handle_error_without_close for OutboundV2Channel 2024-02-20 09:15:17 +02:00
Duncan Dean
909130bfed
Add OutboundV2Channel struct 2024-02-20 09:15:16 +02:00
Duncan Dean
2f43953089
Create ChannelContext constructor for outbound channels 2024-02-20 09:15:15 +02:00
Duncan Dean
fd68df9f95
Add InboundV2Channel struct 2024-02-20 09:15:14 +02:00
Duncan Dean
3fda620cba
Create ChannelContext constructor for inbound channels 2024-02-20 09:15:13 +02:00
Duncan Dean
740bb3188c
Add DualFundingChannelContext struct 2024-02-20 09:15:12 +02:00
Duncan Dean
c5f5b9224f
Add V2 constructors to ChannelId 2024-02-20 09:15:10 +02:00
Matt Corallo
cd847574f2
Merge pull request #2891 from TheBlueMatt/2024-02-no-ahash
Drop the `ahash` dependency
2024-02-19 22:17:35 +00:00
Matt Corallo
6fa1cb2ce8
Merge pull request #2897 from TheBlueMatt/2024-02-fix-route-ser
Fix `Route` serialization round-trip
2024-02-16 21:15:45 +00:00
Matt Corallo
3096061bef Drop ahash dependency in favor of core's SipHasher
https://github.com/tkaitchuck/aHash/pull/196 bumped the MSRV of
`ahash` in a patch release, which makes it rather difficult for us
to have it as a dependency.

Further, it seems that `ahash` hasn't been particularly robust in
the past, notably
https://github.com/tkaitchuck/aHash/issues/163 and
https://github.com/tkaitchuck/aHash/issues/166.

Luckily, `core` provides `SipHasher` even on no-std (sadly its
SipHash-2-4 unlike the SipHash-1-3 used by the `DefaultHasher` in
`std`). Thus, we drop the `ahash` dependency entirely here and
simply wrap `SipHasher` for our `no-std` HashMaps.
2024-02-16 20:34:41 +00:00
Matt Corallo
24d02ff287 Test Route serialization round-trip
This adds testing for the previous two commits by testing that all
routes generated in testing are able to survive a serialization
round-trip.
2024-02-16 19:26:32 +00:00
Matt Corallo
4026d4efd1 Fix Route serialization round-trip
When the `max_total_routing_fee_msat` parameter was added to
`RouteParameters`, the serialization used `map` to get the max fee,
accidentally writing an `Option<Option<u64>>`, but then read it as
an `Option<u64>`. Thus, any `Route`s with a `route_params` written
will fail to be read back.

Luckily, this is an incredibly rarely-used bit of code, so only one
user managed to hit it.
2024-02-16 19:26:22 +00:00
Matt Corallo
2ada7911b1 Fix blinded path serialization in Route
`Route`'s blinded_path serialization logic writes a blinded path
`Option` per path hop, however on read we (correctly) only read one
blinded path `Option` per path. This causes serialization of
`Route`s with blinded paths to fail to round-trip.

Here we fix this by writing blinded paths per path.
2024-02-16 18:42:29 +00:00
Matt Corallo
f3067b84c6 Drop the fails_paying_for_bolt12_invoice test
`fails_paying_for_bolt12_invoice` tests that we fail to send a
payment if the router returns `Ok` but includes a bogus route (one
with 0-length paths). While this marginally increases our test
coverage, in the next commit we'll be testing that all routes
round-trip serialization, which fails here as bogus routes are not
supported in deserialization.

Because this isn't particularly critical test coverage, we simply
opt to drop the test entirely here.
2024-02-16 18:42:29 +00:00
Elias Rohrer
e32020c449
Merge pull request #2894 from TheBlueMatt/2024-02-future-poll-leak
Never store more than one StdWaker per live Future
2024-02-16 11:55:56 +01:00
Matt Corallo
8157c01eab Never store more than one StdWaker per live Future
When an `std::future::Future` is `poll()`ed, we're only supposed to
use the latest `Waker` provided. However, we currently push an
`StdWaker` onto our callback list every time `poll` is called,
waking every `Waker` but also using more and more memory until the
`Future` itself is woken.

Here we fix this by removing any `StdWaker`s stored for a given
`Future` when it is `drop`ped or prior to pushing a new `StdWaker`
onto the list when `poll`ed.

Sadly, the introduction of a `Drop` impl for `Future` means we
can't trivially destructure the struct any longer, causing a few
methods to need to take `Future`s by reference rather than
ownership and `clone` a few `Arc`s.

Fixes #2874
2024-02-15 21:52:06 +00:00
Matt Corallo
5f404b9d0a Give Futures for a FutureState an idx and track StdWaker idxn
When an `std::future::Future` is `poll()`ed, we're only supposed to
use the latest `Waker` provided. However, we currently push an
`StdWaker` onto our callback list every time `poll` is called,
waking every `Waker` but also using more and more memory until the
`Future` itself is woken.

Here we take a step towards fixing this by giving each `Future` a
unique index and storing which `Future` an `StdWaker` came from in
the callback list. This sets us up to deduplicate `StdWaker`s by
`Future`s in the next commit.
2024-02-15 21:52:06 +00:00
Matt Corallo
2c987209f9 Split lists of Waker and directly-registered Future callbacks
In the next commit we'll fix a memory leak due to keeping too many
`std::task::Waker` callbacks in `FutureState` from redundant `poll`
calls, but first we need to split handling of `StdWaker`-based
future wake callbacks from normal ones, which we do here.
2024-02-15 21:52:06 +00:00
Elias Rohrer
3fd4b3963c
Merge pull request #2895 from TheBlueMatt/2024-02-logging-tweaks
Minor Logging tweaks
2024-02-14 10:29:09 +01:00
Elias Rohrer
3fd85c8cf8
Merge pull request #2883 from tnull/2024-02-dyn-kvstore-blanket-impls
Add blanket `Persist`/`Persister` impls for `dyn KVStore + Send + Sync`
2024-02-14 09:01:51 +01:00
Matt Corallo
89101531aa Opportunistically skip log in update_claims_view_from_matched_txn
On each block, for each `ChannelMonitor`, we log two status
statements in `OnChainTx::update_claims_view_from_matched_txn`.
This can add up to quite a bit, and is generally not very
interesting when we don't actually do anything if there's no claims
to bump.

Here we drop both logs if we have no claims to work with, but
retain it if we process any claims.
2024-02-13 23:43:19 +00:00
Matt Corallo
9125de22c5 Opportunistically skip log in update_claims_view_from_requests
On each block, for each `ChannelMonitor`, we log a status statement
in `OnChainTx::update_claims_view_from_requests`. This can add up
to quite a bit, and is generally not very interesting when we don't
actually do anything if there's no claims to bump.

Here we drop the log if we have no claims to work with, but retain
it if we process any claims.
2024-02-13 23:43:02 +00:00
Matt Corallo
aab5b102e4 Drop some "Channel does not qualify for a feerate change" logs
On a high-traffic/channel node, `Channel .* does not qualify for a
feerate change.*` is our most common log, and it doesn't provide
much useful information. It's logged in two cases - (a) where the
estimator feerate is less than the current channel feerate but not
by more than half twice and (b) where we'd like to update the
channel feerate but the peer is disconnected or channel not
available for updates.

Because these conditions can persist and we log them once a minute
the volume of logs can add up quickly. Here we simply remove the
log in case (a), though leave (b) as its anticipated to be somewhat
quieter and does indicate a persistent issue that should be
addressed (possibly by closing the channel).
2024-02-13 23:06:48 +00:00
Matt Corallo
96b141c503 Make peers sending gossip out of order logging less scary
Multiple times we've had users wonder why they see `Error handling
message from.*; ignoring: Couldn't find channel for update` in
their logs and wonder if its related to their channel
force-closing. While this does indicate a peer is sending us gossip
our of order (and thus misbehaving), its not relevant to channel
operation and the logged message and level should indicate that.

Thus, here, we move the level to Gossip and add "gossip" between
"handling" and "message" (so it reads "Error handling gossip
message from.*").

Fixes #2471
2024-02-13 23:06:38 +00:00
Matt Corallo
f98a652f11
Merge pull request #2816 from wpaulino/retryable-holder-sigs
Allow holder commitment and HTLC signature requests to fail
2024-02-13 21:22:55 +00:00
Elias Rohrer
0995de7fa8
Merge pull request #2892 from TheBlueMatt/2024-02-destination-eq
Add further standard derives to various onion message structs
2024-02-13 09:21:04 +01:00
Matt Corallo
6f02025246 Add further standard derives to various onion message structs 2024-02-12 23:54:14 +00:00
Elias Rohrer
0c2a715c01
Merge pull request #2888 from TheBlueMatt/2024-02-destination-eq
Implement `Debug`/`PartialEq`/`Eq` for `Destination`
2024-02-12 13:29:15 +01:00
Matt Corallo
71c0d56415 Implement Debug/PartialEq/Eq for Destination 2024-02-10 02:27:59 +00:00
Matt Corallo
ee34bcf2d6 Replace spaces with tabs in msgs.rs 2024-02-08 23:05:08 +00:00
Matt Corallo
5faca20934 Fix silent merge conflict introduced in d3ddf15357 2024-02-08 23:05:08 +00:00
Matt Corallo
c93b59e13d
Merge pull request #2871 from dunxen/2024-02-msgcommonfields
Combine common fields for OpenChannel and AcceptChannel V1 & V2
2024-02-08 21:50:27 +00:00
Wilmer Paulino
e38dccaef4
Allow holder commitment and HTLC signature requests to fail
As part of the ongoing async signer work, our holder signatures must
also be capable of being obtained asynchronously. We expose a new
`ChannelMonitor::signer_unblocked` method to retry pending onchain
claims by re-signing and rebroadcasting transactions. Unfortunately, we
cannot retry said claims without them being registered first, so if
we're not able to obtain the signature synchronously, we must return the
transaction as unsigned and ensure it is not broadcast.
2024-02-07 15:44:23 -08:00
Wilmer Paulino
043ab75bb4
Introduce FeerateStrategy enum for onchain claims
This refactors the existing `force_feerate_bump` flag into an enum as we
plan to introduce a new flag/enum variant in a future commit.
2024-02-07 15:42:28 -08:00
Wilmer Paulino
71b4bd0811
Rework get_latest_holder_commitment_txn to broadcast for users
This method is meant to be used as a last resort when a user is forced
to broadcast the current state, even if it is stale, in an attempt to
claim their funds in the channel. Previously, we'd return the commitment
and HTLC transactions such that they broadcast them themselves. Doing so
required a different code path, one which was not tested, to obtain
these transactions than our usual path when force closing. It's not
worth maintaining both, and it's much simpler for us to broadcast
instead.
2024-02-07 15:42:26 -08:00
Valentine Wallace
fff1aa7cb0
Add min_final_cltv_delta to aggregated CLTV delta.
The spec was previously missing this requirement.
2024-02-07 12:02:26 -05:00
Valentine Wallace
fa44185ba8
Parameterize BlindedPath::new_for_payment by min final CLTV delta.
Currently we are not including this value in the aggregated CLTV delta, which
is wrong.
2024-02-07 12:02:24 -05:00
Elias Rohrer
bf4c7292c6
Impl Sync and Send for TestStore 2024-02-07 12:56:06 +01:00
Elias Rohrer
a85d5b1444
Add blanket Persist/Persister impls for dyn KVStore + Send + Sync
Previously, we only had blanket impls for `KVStore`. However, in order
to enable the use of `dyn KVStore + Send + Sync` instead of a `KVStore`
generic, we here also add the corresponding blanket implementations for
said type signature.
2024-02-07 12:56:06 +01:00
Matt Corallo
a9d73c2889
Merge pull request #2873 from tnull/2024-02-expose-channel-details-in-bte
Expose `channel_id` / `counterparty_node_id` in `BumpTransaction` event
2024-02-07 00:57:01 +00:00
Elias Rohrer
5b5c87464a
Expose channel_id / counterparty_node_id in BumpTransaction event
A client node might choose not to handle `Event::BumptTransaction`
events and leave bumping / Anchor output spending to a trusted
counterparty.

However, `Event::BumptTransaction` currently doesn't offer any clear
indication what channel and/or counterparty it is referring to. In order
to allow filtering these events, we here expose the `channel_id` and
`counterparty_node_id` fields.
2024-02-06 21:02:33 +01:00
Matt Corallo
d1c2e143fe Note when new HTLC state can be None 2024-02-06 18:53:56 +00:00
Matt Corallo
8296515871 Fix comment spelling 2024-02-06 18:53:04 +00:00
Matt Corallo
4a7ba675d4
Merge pull request #2442 from wvanlint/list_pending_htlcs
Include pending HTLC's in ChannelDetails
2024-02-06 18:45:36 +00:00