Commit graph

1117 commits

Author SHA1 Message Date
Matt Corallo
39b562e009
Merge pull request #377 from elichai/2019-08-update-deps
Updating dependencies
2019-08-24 23:06:26 +00:00
Elichai Turkel
20302064a8
Update the fuzz and net-tokio crates 2019-08-24 11:05:38 -04:00
Elichai Turkel
5bb7ba5b7d
Cast weights to u64 to support the new rust-bitcoin api 2019-08-24 11:04:41 -04:00
Elichai Turkel
f4e8974c16
Updated bitcoin, bitcoin_hashes and secp256k1 dependencies 2019-08-24 11:04:29 -04:00
Matt Corallo
ab8f5a8620
Merge pull request #374 from dongcarl/2019-08-channel-open-sanity
tests: Add sanity tests for ChannelOpens
2019-08-09 16:53:33 +00:00
Carl Dong
00410bfeab tests: Add sanity tests for ChannelOpens 2019-08-09 10:17:32 -04:00
Matt Corallo
56f16eaa4d
Merge pull request #349 from ariard/2019-07-data_loss
Implement option_data_loss_protect on both sides
2019-08-06 21:12:57 +00:00
Antoine Riard
41def659c0 Add test_data_loss_protect 2019-08-05 16:19:49 -04:00
Antoine Riard
254af05c43 Cache to_remote_script if we are fallen-behind
Also, restrict commitment transaction filters in ChannelMonitor::
block_connected
2019-08-05 16:19:44 -04:00
Antoine Riard
2322c2365c Make get_latest_local_commitment_txn public
You may use it to get a broadcastable local toxic tx in case of fallen-behind,
i.e when receiving a channel_reestablish with a proof that our remote side
knows a higher revocation secret than the local commitment number we are aware
of. Broadcasting these transactions are UNSAFE, as they allow remote side to punish
you. Nevertheless you may want to broadcast them if remote don't close channel with his
higher commitment transaction after a substantial amount of time (a month or even a year)
to get back funds. Best may be to contact out-of-band the other node operator to coordinate
with him if option is available to you. In any-case, choice is up to the user.

Also, log toxic commitment tx id in channel_reestablish sending back
ChannelError::CloseDelayBroadcast
2019-08-05 15:47:37 -04:00
Antoine Riard
c3991602a5 Enforce option_data_loss_protect user-side
If we remote peer provide us a revocation secret which doesn't
match with next_remote_revocation_number we close the channel
If we learn that we are fallen-behind, we send back a CloseDelayBroadcast
error, special take care will be take to log error and channel should
stale, i.e we expect our honest peer to unilateral close to claim
on it our balance

Add ChannelError::CloseDelayBroadcast to signal that you need to close
the channel but not to broadcast it while however update ChannelMonitor
with remote per_commitment_point thanks to our peer being a gentleman
2019-08-05 15:47:36 -04:00
Matt Corallo
127ce296a7
Merge pull request #310 from ariard/2019-02-clarify-send-htlc-policy
Clarify policy applied in send htlc error msgs
2019-08-02 19:30:41 +00:00
Antoine Riard
1d6c09a94a Clarify policy applied in send htlc error msgs
max_htlc_value_in_flight_msat is applied
per-direction
2019-08-02 01:01:23 -04:00
Matt Corallo
e65e03f120
Merge pull request #370 from TheBlueMatt/2019-07-369-fix-spaces
2019 07 369 fix spaces
2019-07-31 15:58:00 +00:00
RJ Rybarczyk
263b2fa138 Add net-tokio/target to gitignore 2019-07-31 11:23:05 -04:00
RJ Rybarczyk
d32015377e Make SocketDescriptor::send_data take slice instead of vec and offset 2019-07-31 11:22:59 -04:00
Matt Corallo
0d162968d6
Merge pull request #367 from TheBlueMatt/2019-07-fst-unique-channels
Make temporary channel ids unique in full_stack_target
2019-07-30 18:26:57 +00:00
Matt Corallo
487452fa97
Merge pull request #368 from TheBlueMatt/2019-07-travis-fix
Fix travis failure if previous travis run on branch failed to build
2019-07-30 18:26:11 +00:00
Matt Corallo
347f5bfc4c Fix travis failure if previous travis run on branch failed to build 2019-07-30 13:41:12 -04:00
Antoine Riard
2869e50d67 Support option_data_loss_protect for remote peer
In case of sending channel_reestablish message, we join
our current per_commitment_point and their highest revocation
secret we know about

We set data_loss_protect by default and adjust encoding_init
test in consequence
2019-07-30 00:38:20 -04:00
Matt Corallo
283d40f2e4
Merge pull request #364 from TheBlueMatt/2019-07-no-unimpl
Implement the last three (relevant) unimplemented()s in ChannelManager
2019-07-29 19:20:35 +00:00
Matt Corallo
20bd2b142d
Merge pull request #366 from TheBlueMatt/2019-07-useless-todo-removal
Drop some useless TODO messages to clean things up pre-0.1
2019-07-29 17:48:42 +00:00
Matt Corallo
8ba3529522 Handle monitor update failure during funding on the fundee side
This carries a surprising amount of complexity despite only being
possible in the case where monitor updating failed during the
processing of funding_generated. Specifically, this requires
handling rebroadcasting funding_locked once we successfully persist
our monitor again.

As an alternative we could never send funding_signed when the
monitor failed to persist, but this approach avoids needless
delays during funding.
2019-07-29 13:45:35 -04:00
Matt Corallo
b27f788e91 Allow a counterparty to resend their funding_locked before ours 2019-07-29 13:44:47 -04:00
Matt Corallo
a1e0ca410e Handle monitor update failures during funding on the funder side 2019-07-29 13:26:22 -04:00
Matt Corallo
e5c8f05891 Make temporary channel ids unique in full_stack_target
This avoids a crash where a channel with a duplicate id is created
immediately after another is closed, where the other still has a
pending funding generation event. Resulting in funding generation
being passed to the wrong channel (which isn't in an appropriate
state).
2019-07-29 12:51:33 -04:00
Matt Corallo
ce6f561485 Drop TODO suggesting we avoid a test-only function to get chan keys
It suggested figuring something else out after #81, but the API we
settled on after #81 (which I think is just fine) doesn't allow for
anything cleaner, so this is fine as-is.
2019-07-27 20:50:51 -04:00
Matt Corallo
95dc2762ff Drop update_fee TODOs as we're gonna drop it before 0.1 anyway
See #365 for more.
2019-07-27 20:50:51 -04:00
Matt Corallo
2fd2fef796
Merge pull request #363 from TheBlueMatt/2019-07-codecov
Generate codecov.io reports
2019-07-25 21:34:16 +00:00
Matt Corallo
e14b9f07d3 Generate codecov.io reports 2019-07-25 16:59:20 -04:00
Matt Corallo
4d0993f0d4
Merge pull request #361 from TheBlueMatt/2019-07-cmfc-crash
Make chanmon_fail_consistency slightly less aggressive
2019-07-25 19:47:48 +00:00
Matt Corallo
4e81d8d74a
Merge pull request #362 from TheBlueMatt/2019-07-no-bogus-sec-required
Do not require upfront_shutdown as the security gain is marginal
2019-07-25 19:46:58 +00:00
Matt Corallo
c05e087c43 Do not require upfront_shutdown as the security gain is marginal
There is really no reason to want to never open a channel just
because a counterparty doesn't support upfront_shutdown.
2019-07-25 14:22:00 -04:00
Matt Corallo
a9aa3c37fe Make chanmon_fail_consistency slightly less aggressive
This resolves some crashes that both afl and honggfuzz found.
2019-07-25 11:30:53 -04:00
Matt Corallo
07e927c171
Merge pull request #360 from TheBlueMatt/2019-07-new-warnings
Fix unused variable introduced in my changes in bdbf5666a9
2019-07-24 22:38:34 +00:00
Matt Corallo
60bf1fe601
Merge pull request #355 from ariard/2019-07-fix-csv-delay-check-remote-htlc
Fix bug in check_spend_remote_htlc and let csv delays being user configurable
2019-07-24 22:33:20 +00:00
Antoine Riard
e78c25b605 Add test_user_configurable_csv_delay
Extend test_justice_tx with user-set csv delay to test that
we are able to claim revokeable outputs with different csv delay
between both peers.
2019-07-24 17:56:42 -04:00
Antoine Riard
7ebc0a9365 Add user configurable csv delay encumbering channel refund output,
within reasonable lower or upper bound

Add our_to_self_delay in Channel, to cache user config field at
channel construction.
2019-07-24 17:56:40 -04:00
Antoine Riard
3b09db80ea Move BREAKDOWN_TIMEOUT/MAX_LOCAL_BREAKDOWN_TIMEOUT in ChannelManager
Let these values being used as default ones in UserConfig.

Also, reduce them to something more reasonable, for BREAKDOWN_TIMEOUT
from 1 week to 1 day, for MAX_LOCAL_BREAKDOWN_TIMEOUT from 2 weeks
to 1.
2019-07-24 17:53:04 -04:00
Matt Corallo
1db907f47a Fix unused variable introduced in my changes in bdbf5666a9
The original was written by Tamas, but I made one small tweak and
broke the warning-free-ness of it.
2019-07-24 17:22:03 -04:00
Matt Corallo
19a0f8438d
Merge pull request #359 from rust-bitcoin/2019-07-bump-percentage
Bump progress tracker
2019-07-24 21:19:48 +00:00
Matt Corallo
3f557cb020
Merge pull request #356 from TheBlueMatt/2019-07-more-chanmon-fuzz
Add deserialize+load steps to chanmon_fail_consistency (fixes #327)
2019-07-24 21:19:39 +00:00
Matt Corallo
c779278bcf
Bump progress tracker
Honestly mostly cause we have progress on simplified_commitment in Core, but also our punishment transaction generation stuff is really coming along nicely.
2019-07-24 20:03:48 +00:00
Matt Corallo
38098ba657
Merge pull request #358 from TheBlueMatt/2019-07-no-unsafe
forbid unsafe
2019-07-24 19:47:44 +00:00
Matt Corallo
20efabdaa6 Add deserialize+load steps to chanmon_fail_consistency (fixes #327) 2019-07-24 15:31:29 -04:00
Tamas Blummer
bdbf5666a9 forbid unsafe 2019-07-24 15:12:15 -04:00
Antoine Riard
3f409a8903 Fix: use our_to_self_delay in check_spend_remote_htlc
We were previously using their_to_self_delay to regenerate scripts for
spending remote revoked htlc transactions, and that's a bug.

Their_to_self_delay is delay enforced by peer upon outputs returning
funds back to us.

Our_to_self_delay is delay enforced by us upon outputs returning funds
back to peer.
2019-07-23 16:23:34 -04:00
Matt Corallo
c2f72b9de3 Drop msgs bound for a disconnecting peer at disconnect time
This simplifies chanmon_fail_consistency greatly and makes it a
tiny bit more realistic. It also sets us up for more
disconnect-relatex events without the complexity blowing up.
2019-07-23 15:53:47 -04:00
Matt Corallo
2ca697aefa Fix some newly-introduced unused-$THING warnings 2019-07-23 15:52:20 -04:00
Matt Corallo
cd8f1de394
Merge pull request #353 from TheBlueMatt/2019-07-no-rand
Make rand a dev-dependency
2019-07-23 19:10:07 +00:00