]> git.bitcoin.ninja Git - rust-lightning/log
rust-lightning
13 months agoConsider `RouteParameters::max_total_routing_fee_msat` in `get_route`
Elias Rohrer [Fri, 14 Jul 2023 11:25:33 +0000 (13:25 +0200)]
Consider `RouteParameters::max_total_routing_fee_msat` in `get_route`

We exclude any candidate hops if we find that using them would let the
aggregated path routing fees exceed `max_total_routing_fee_msat`.

Moreover, we return an error if the aggregated fees over all paths of
the selected route would surpass `max_total_routing_fee_msat`.

13 months agoIntroduce `RouteParameters::max_total_routing_fee_msat`
Elias Rohrer [Fri, 14 Jul 2023 09:47:22 +0000 (11:47 +0200)]
Introduce `RouteParameters::max_total_routing_fee_msat`

Currently, users have no means to upper-bound the total fees accruing
when finding a route. Here, we add a corresponding field to
`RouteParameters` which will be used to limit the candidate set during
path finding in the following commits.

14 months agoMerge pull request #2587 from wpaulino/anchors-fee-fixes
Matt Corallo [Tue, 19 Sep 2023 20:43:08 +0000 (20:43 +0000)]
Merge pull request #2587 from wpaulino/anchors-fee-fixes

Anchor outputs fee fixes

14 months agoSanity check fees on transactions produced by the bump event handler
Wilmer Paulino [Mon, 18 Sep 2023 21:07:57 +0000 (14:07 -0700)]
Sanity check fees on transactions produced by the bump event handler

We add a few debug assertions to ensure we don't overpay fees by 5% more
than expected.

14 months agoAccount for existing input amounts throughout coin selection
Wilmer Paulino [Mon, 18 Sep 2023 21:00:37 +0000 (14:00 -0700)]
Account for existing input amounts throughout coin selection

We'd previously ignore the existing amount transactions were already
attempting to spend when deciding whether we should add more inputs
throughout coin selection. This would result in us attaching more inputs
than necessary to satisfy our target amount. In the case of HTLC
transactions, we'd burn the HTLC amount completely, since the pre-signed
transaction has zero fee (input amount == output amount).

Along the way, we also fix the slight overpayment in anchor
transactions. We now properly account for the fees the transaction
already paid for, simply by pretending the fees are part of the anchor
input amount.

14 months agoLimit external claim feerate bumps
Wilmer Paulino [Fri, 15 Sep 2023 00:38:22 +0000 (17:38 -0700)]
Limit external claim feerate bumps

Since we don't know the total input amount of an external claim (those
which come anchor channels), we can't limit our feerate bumps by the
amount of funds we have available to use. Instead, we choose to limit it
by a margin of the new feerate estimate.

14 months agoMerge pull request #2584 from TheBlueMatt/2023-09-msrv-try-2
valentinewallace [Mon, 18 Sep 2023 19:56:08 +0000 (15:56 -0400)]
Merge pull request #2584 from TheBlueMatt/2023-09-msrv-try-2

Correct syn pinning on cargo 1.48

14 months agoMerge pull request #2534 from tnull/2023-08-upstream-preflight-probing
Matt Corallo [Mon, 18 Sep 2023 16:41:57 +0000 (16:41 +0000)]
Merge pull request #2534 from tnull/2023-08-upstream-preflight-probing

Upstream and fix preflight probing

14 months agoMerge pull request #2582 from TheBlueMatt/2023-09-one-less-clone
Matt Corallo [Mon, 18 Sep 2023 16:16:46 +0000 (16:16 +0000)]
Merge pull request #2582 from TheBlueMatt/2023-09-one-less-clone

Avoid unnecessarily cloning unsigned Transaction when broadcasting

14 months agoExpose `AChannelManager` trait and use it in `lightning-invoice`
Elias Rohrer [Tue, 12 Sep 2023 11:20:31 +0000 (13:20 +0200)]
Expose `AChannelManager` trait and use it in `lightning-invoice`

14 months agoProbe up to second-to-last hop if last was provided by route hint
Elias Rohrer [Mon, 11 Sep 2023 11:50:10 +0000 (13:50 +0200)]
Probe up to second-to-last hop if last was provided by route hint

If the last hop was provided by route hint we assume it's not an announced channel.
If furthermore only a single route hint is provided we refrain from probing through
all the way to the end and instead probe up to the second-to-last channel.

Optimally we'd do this not based on above mentioned assumption but
rather by checking inclusion in our network graph. However, we don't
have access to our graph in `ChannelManager`.

14 months agoTest preflight probing sends and skips if necessary
Elias Rohrer [Fri, 1 Sep 2023 14:39:04 +0000 (16:39 +0200)]
Test preflight probing sends and skips if necessary

14 months agoAdd preflight probing capabilities
Elias Rohrer [Mon, 28 Aug 2023 13:03:04 +0000 (15:03 +0200)]
Add preflight probing capabilities

We add a `ChannelManager::send_preflight_probes` method that can be used
to send pre-flight probes given some [`RouteParameters`]. Additionally,
we add convenience methods in for spontaneous probes and send pre-flight
probes for a given invoice.

As pre-flight probes might take up some of the available liquidity, we
here introduce that channels whose available liquidity is less than the
required amount times
`UserConfig::preflight_probing_liquidity_limit_multiplier` won't be used
to send pre-flight probes.

This commit is a more or less a carbon copy of the pre-flight
probing code recently added to LDK Node.

14 months agoInclude `maybe_announced` field in `RouteHop`
Elias Rohrer [Tue, 12 Sep 2023 13:51:37 +0000 (15:51 +0200)]
Include `maybe_announced` field in `RouteHop`

When sending preflight probes, we want to exclude last hops that are
possibly announced. To this end, we here include a new field in
`RouteHop` that will be `true` when we either def. know the hop to be
announced, or, if there exist public channels between the hop's
counterparties that this hop might refer to (i.e., be an alias for).

14 months agoReplace `cargo build` calls in CI with `cargo check` 2023-09-msrv-try-2
Matt Corallo [Sun, 17 Sep 2023 00:57:00 +0000 (00:57 +0000)]
Replace `cargo build` calls in CI with `cargo check`

We're not actually using the build output, so there's no reason to
do a build vs just running check.

14 months agoMove coverage generation to llvm-cov in the hopes its more stable
Matt Corallo [Sun, 17 Sep 2023 00:10:29 +0000 (00:10 +0000)]
Move coverage generation to llvm-cov in the hopes its more stable

14 months agoCorrect syn pinning on cargo 1.48
Matt Corallo [Fri, 15 Sep 2023 23:52:40 +0000 (23:52 +0000)]
Correct syn pinning on cargo 1.48

Sadly the pinning introduced in 050f5a90297678f2cad36feee9a1db2367e
was brittle in the face of any further syn updates, and has already
broken.

Here we fix it by looking up the actual version of syn to pin.

Note that this dependency is somewhat nonsense as its actually only
a `criterion` dependency, pulled in even though we haven't set the
bench flag (as we aren't yet using `resolver = 2`).

14 months agoMerge pull request #2176 from TheBlueMatt/2023-04-expose-success-prob
Matt Corallo [Fri, 15 Sep 2023 22:38:57 +0000 (22:38 +0000)]
Merge pull request #2176 from TheBlueMatt/2023-04-expose-success-prob

Move the historical bucket tracker to 32 unequal sized buckets

14 months agoMerge pull request #2579 from rmalonson/unsignedtx
Matt Corallo [Fri, 15 Sep 2023 21:31:56 +0000 (21:31 +0000)]
Merge pull request #2579 from rmalonson/unsignedtx

Remove one unnecessary call for sign_holder_commitment_and_htlcs

14 months agoAvoid unnecessarily cloning unsigned Transaction when broadcasting 2023-09-one-less-clone
Matt Corallo [Fri, 15 Sep 2023 19:17:34 +0000 (19:17 +0000)]
Avoid unnecessarily cloning unsigned Transaction when broadcasting

Our `Trusted*` wrappers in `chan_utils` expose additional inner
fields by reference. However, because they were not explicitly
marked as returning a reference with the wrapped struct's
lifetimes, rustc was considering them to return a reference with
the wrapper struct's lifetime.

This is unnecessarily restrictive, and resulted in the addition of
a clone in 9850c5814abdf69883b51a4afe73912ff5436fd9 which we remove
here.

14 months agoRemove unnecessary signing call in ChannelMonitor
Rachel Malonson [Fri, 15 Sep 2023 02:39:30 +0000 (19:39 -0700)]
Remove unnecessary signing call in ChannelMonitor

14 months agoMerge pull request #2577 from TheBlueMatt/2023-09-msrv
Elias Rohrer [Fri, 15 Sep 2023 19:18:57 +0000 (21:18 +0200)]
Merge pull request #2577 from TheBlueMatt/2023-09-msrv

Fix MSRV tests and drop internet-required test

14 months agoMove to a constant for "bucket one" in the scoring buckets 2023-04-expose-success-prob
Matt Corallo [Thu, 7 Sep 2023 22:34:30 +0000 (22:34 +0000)]
Move to a constant for "bucket one" in the scoring buckets

Scoring buckets are stored as fixed point ints, with a 5-bit
fractional part (i.e. a value of 1.0 is stored as "32"). Now that
we also have 32 buckets, this leads to the codebase having many
references to 32 which could reasonably be confused for each other.

Thus, we add a constant here for the value 1.0 in our fixed-point
scheme.

14 months agoDecay `historical_estimated_channel_liquidity_*` result to `None`
Matt Corallo [Tue, 6 Jun 2023 04:08:32 +0000 (04:08 +0000)]
Decay `historical_estimated_channel_liquidity_*` result to `None`

`historical_estimated_channel_liquidity_probabilities` previously
decayed to `Some(([0; 8], [0; 8]))`. This was thought to be useful
in that it allowed identification of cases where data was previously
available but is now decayed away vs cases where data was never
available. However, with the introduction of
`historical_estimated_payment_success_probability` (which uses the
existing scoring routines so will decay to `None`) this is
unnecessarily confusing.

Given data which has decayed to zero will also not be used anyway,
there's little reason to keep the old behavior, and we now decay to
`None`.

We also take this opportunity to split the overloaded
`get_decayed_buckets`, removing uneccessary code during scoring.

14 months agoSpecial-case the 0th minimum bucket in historical scoring
Matt Corallo [Sat, 19 Aug 2023 18:43:45 +0000 (18:43 +0000)]
Special-case the 0th minimum bucket in historical scoring

Points in the 0th minimum bucket either indicate we sent a payment
which is < 1/16,384th of the channel's capacity or, more likely,
we failed to send a payment. In either case, averaging the success
probability across the full range of upper-bounds doesn't make a
whole lot of sense - if we've never managed to send a "real"
payment over a channel, we should be considering it quite poor.

To address this, we special-case the 0th minimum bucket and only
look at the largest-offset max bucket when calculating the success
probability.

14 months agoTrack "steady-state" channel balances in history buckets not live
Matt Corallo [Sun, 16 Apr 2023 04:03:08 +0000 (04:03 +0000)]
Track "steady-state" channel balances in history buckets not live

The lower-bound of the scoring history buckets generally never get
used - if we try to send a payment and it fails, we don't learn
a new lower-bound for the liquidity of a channel, and if we
successfully send a payment we only learn a lower-bound that
applied *before* we sent the payment, not after it completed.

If we assume channels have some "steady-state" liquidity, then
tracking our liquidity estimates *after* a payment doesn't really
make sense - we're not super likely to make a second payment across
the same channel immediately (or, if we are, we can use our
un-decayed liquidity estimates for that). By the time we do go to
use the same channel again, we'd assume that its back at its
"steady-state" and the impacts of our payment have been lost.

To combat both of these effects, here we "subtract" the impact of
any just-successful payments from our liquidity estimates prior to
updating the historical buckets.

14 months agoMove the historical bucket tracker to 32 unequal sized buckets
Matt Corallo [Fri, 8 Sep 2023 17:48:50 +0000 (17:48 +0000)]
Move the historical bucket tracker to 32 unequal sized buckets

Currently we store our historical estimates of channel liquidity in
eight evenly-sized buckets, each representing a full octile of the
channel's total capacity. This lacks precision, especially at the
edges of channels where liquidity is expected to lie.

To mitigate this, we'd originally checked if a payment lies within
a bucket by comparing it to a sliding scale of 64ths of the
channel's capacity. This allowed us to assign penalties to payments
that fall within any more than the bottom 64th or lower than the
top 64th of a channel.

However, this still lacks material precision - on a 1 BTC channel
we could only consider failures for HTLCs above 1.5 million sats.
With today's lightning usage often including 1-100 sat payments in
tips, this is a rather significant lack of precision.

Here we rip out the existing buckets and replace them with 32
*unequal* sized buckets. This allows us to focus our precision at
the edges of a channel (where the liquidity is likely to lie, and
where precision helps the most).

We set the size of the edge buckets to 1/16,384th of the channel,
with the size increasing exponentially until it approaches the
inner buckets. For backwards compatibility, the buckets divide
evenly into octets, allowing us to convert the existing buckets
into the new ones cleanly.

This allows us to consider HTLCs down to 6,000 sats for 1 BTC
channels. In order to avoid failing to penalize channels which have
always failed, we drop the sliding scale for comparisons and simply
check if the payment is above the minimum bucket we're analyzing and
below *or in* the maximum one. This generates somewhat more
pessimistic scores, but fixes the lower bound where we suddenly
assign a 0% failure probability.

While this does represent a regression in routing performance, in
some cases the impact of not having to examine as many nodes
dominates, leading to a performance increase.

On a Xeon E3-1220 v5, the `large_mpp_routes` benchmark shows a 15%
performance increase, while the more stable benchmarks show an 8%
and 15% performance regression.

14 months agoImplement serialization for `[u16; 32]`, DRYing it with `[u8; *]`
Matt Corallo [Fri, 8 Sep 2023 17:47:43 +0000 (17:47 +0000)]
Implement serialization for `[u16; 32]`, DRYing it with `[u8; *]`

In the next commit we'll need serialization for `[u16; 32]`, which
we add here, unifying it with the `[u8; *]` serialization macro.

14 months agoClarify some scoring documentation by removing extraneous info
Matt Corallo [Wed, 13 Sep 2023 18:35:13 +0000 (18:35 +0000)]
Clarify some scoring documentation by removing extraneous info

14 months agoPin memchr in our release dependency list due to `core2` using it 2023-09-msrv
Matt Corallo [Thu, 14 Sep 2023 21:49:14 +0000 (21:49 +0000)]
Pin memchr in our release dependency list due to `core2` using it

We're working with rust-bitcoin to remove the `core2` dependency
at https://github.com/rust-bitcoin/rust-bitcoin/pull/2066 but until
that lands and we can upgrade rust-bitcoin we're stuck with it. In
the mean time, we should still pass our MSRV tests.

14 months agoMerge pull request #2571 from davidcaseria/htlc-descriptor-writeable
Wilmer Paulino [Thu, 14 Sep 2023 22:04:29 +0000 (15:04 -0700)]
Merge pull request #2571 from davidcaseria/htlc-descriptor-writeable

Make HTLCDescriptor writeable

14 months agoDrop `test_esplora_connects_to_public_server`
Matt Corallo [Thu, 14 Sep 2023 21:47:07 +0000 (21:47 +0000)]
Drop `test_esplora_connects_to_public_server`

`blockstream.info` is currently down, causing our CI to fail. This
shouldn't really be a thing, so we drop the blockstream.info-based
test here.

More generally, I'm not really a fan of having tests which run
(outside of CI) and call out to external servers - a developer
working on LDK shouldn't have to have internet access to run our
test suite and shouldn't be registering their presence with a third
party to run our tests.

14 months agoPin `syn` back to 2.0.32 fix MSRV in testing
Matt Corallo [Thu, 14 Sep 2023 20:20:56 +0000 (20:20 +0000)]
Pin `syn` back to 2.0.32 fix MSRV in testing

14 months agoMerge pull request #2568 from tnull/2023-09-housekeeping
Matt Corallo [Thu, 14 Sep 2023 20:17:05 +0000 (20:17 +0000)]
Merge pull request #2568 from tnull/2023-09-housekeeping

Housekeeping: fix some warning and docs

14 months agoMerge pull request #2572 from benthecarman/rexport-route-hint-secret
Matt Corallo [Thu, 14 Sep 2023 18:54:00 +0000 (18:54 +0000)]
Merge pull request #2572 from benthecarman/rexport-route-hint-secret

Re-export RouteHint and PaymentSecret

14 months agoRe-export RouteHint and PaymentSecret
benthecarman [Tue, 12 Sep 2023 22:48:00 +0000 (17:48 -0500)]
Re-export RouteHint and PaymentSecret

14 months agoFix unused import warning in `shutdown_tests`
Elias Rohrer [Wed, 13 Sep 2023 07:49:02 +0000 (09:49 +0200)]
Fix unused import warning in `shutdown_tests`

14 months agoFix more unused warnings in `test_utils`
Elias Rohrer [Wed, 13 Sep 2023 07:42:56 +0000 (09:42 +0200)]
Fix more unused warnings in `test_utils`

14 months agoFix warnings in `lightning-net-tokio`
Elias Rohrer [Tue, 12 Sep 2023 11:47:09 +0000 (13:47 +0200)]
Fix warnings in `lightning-net-tokio`

14 months agoFix unused variable warning in `monitor_tests`
Elias Rohrer [Tue, 12 Sep 2023 11:44:41 +0000 (13:44 +0200)]
Fix unused variable warning in `monitor_tests`

14 months agoMerge pull request #2413 from valentinewallace/2023-07-route-blinding
Matt Corallo [Wed, 13 Sep 2023 20:51:59 +0000 (20:51 +0000)]
Merge pull request #2413 from valentinewallace/2023-07-route-blinding

Route blinding MVP

14 months agoMerge pull request #2521 from TheBlueMatt/2023-08-one-less-write
Matt Corallo [Wed, 13 Sep 2023 15:40:12 +0000 (15:40 +0000)]
Merge pull request #2521 from TheBlueMatt/2023-08-one-less-write

Avoid persisting ChannelManager in some cases and separate event from persist notifies

14 months agoSet `payment_secret` when sending probes
Elias Rohrer [Mon, 28 Aug 2023 11:57:29 +0000 (13:57 +0200)]
Set `payment_secret` when sending probes

Previously, we'd leave the payment secret field empty while sending
probes, which resulted in having them rejected
with `(PERM|invalid_onion_payload)` by Eclair nodes.

In order to mitigate the issue, we just set a random payment secret.

14 months agoRemove mention of spontaneous payments from `lightning-invoice`
Elias Rohrer [Mon, 21 Aug 2023 09:56:34 +0000 (11:56 +0200)]
Remove mention of spontaneous payments from `lightning-invoice`

14 months agoCleanup `ChannelId` re-export
Elias Rohrer [Tue, 12 Sep 2023 11:37:57 +0000 (13:37 +0200)]
Cleanup `ChannelId` re-export

`ChannelId` was weirdly listed in the re-export section of the docs and
reachable via multiple paths. Here we opt to make the `channel_id`
module private and leave only the `ChannelId` struct itself exposed.

14 months agoOnly allow creating 1-hop blinded paths.
Valentine Wallace [Sun, 10 Sep 2023 04:42:18 +0000 (00:42 -0400)]
Only allow creating 1-hop blinded paths.

Useful until forwarding and receiving to multi-hop blinded paths is supported.

14 months agoTest sending and receiving to 1-hop blinded paths
Valentine Wallace [Sat, 9 Sep 2023 23:36:18 +0000 (19:36 -0400)]
Test sending and receiving to 1-hop blinded paths

14 months agoSupport receiving to 1-hop blinded payment paths.
Valentine Wallace [Sun, 10 Sep 2023 05:22:49 +0000 (01:22 -0400)]
Support receiving to 1-hop blinded payment paths.

14 months agoParameterize InboundPayload reads with NodeSigner
Valentine Wallace [Sun, 10 Sep 2023 05:10:03 +0000 (01:10 -0400)]
Parameterize InboundPayload reads with NodeSigner

This will be used in the next commit to deserialize encrypted TLVs for
receiving to 1-hop blinded paths.

14 months agoSupport paying blinded paths.
Valentine Wallace [Thu, 13 Jul 2023 02:32:06 +0000 (22:32 -0400)]
Support paying blinded paths.

14 months agoRestrict `ChannelManager` persist in fuzzing to when we're told to 2023-08-one-less-write
Matt Corallo [Mon, 28 Aug 2023 01:25:36 +0000 (01:25 +0000)]
Restrict `ChannelManager` persist in fuzzing to when we're told to

In the `chanmon_consistency` fuzz, we currently "persist" the
`ChannelManager` on each loop iteration. With the new logic in the
past few commits to reduce the frequency of `ChannelManager`
persistences, this behavior now leaves a gap in our test coverage -
missing persistence notifications.

In order to cath (common-case) persistence misses, we update the
`chanmon_consistency` fuzzer to no longer persist the
`ChannelManager` unless the waker was woken and signaled to
persist, possibly reloading with a previous `ChannelManager` if we
were not signaled.

14 months agoMerge pull request #2169 from TheBlueMatt/2023-03-monitor-e-monitor
Matt Corallo [Tue, 12 Sep 2023 21:24:41 +0000 (21:24 +0000)]
Merge pull request #2169 from TheBlueMatt/2023-03-monitor-e-monitor

Block the mon update removing a preimage until upstream mon writes

14 months agoMake HTLCDescriptor writeable
David Caseria [Tue, 12 Sep 2023 20:30:58 +0000 (16:30 -0400)]
Make HTLCDescriptor writeable

14 months agoRemove largely useless checks in chanmon_consistency fuzzer
Matt Corallo [Mon, 28 Aug 2023 01:35:16 +0000 (01:35 +0000)]
Remove largely useless checks in chanmon_consistency fuzzer

When reloading nodes A or C, the chanmon_consistency fuzzer
currently calls `get_and_clear_pending_msg_events` on the node,
potentially causing additional `ChannelMonitor` or `ChannelManager`
updates, just to check that no unexpected messages are generated.

There's not much reason to do so, the fuzzer could always swap for
a different command to call the same method, and the additional
checking requires some weird monitor persistence introspection.

Here we simplify the fuzzer by simply removing this logic.

14 months agoSkip persistence in the usual case handling channel_reestablish
Matt Corallo [Thu, 24 Aug 2023 20:02:08 +0000 (20:02 +0000)]
Skip persistence in the usual case handling channel_reestablish

When we handle an inbound `channel_reestablish` from our peers it
generally doesn't change any state and thus doesn't need a
`ChannelManager` persistence. Here we avoid said persistence where
possible.

14 months agoAlways persist the `ChannelManager` on a failed ChannelUpdate
Matt Corallo [Thu, 24 Aug 2023 19:57:45 +0000 (19:57 +0000)]
Always persist the `ChannelManager` on a failed ChannelUpdate

If we receive a `ChannelUpdate` message which was invalid, it can
cause us to force-close the channel, which should result in a
`ChannelManager` persistence, though its not critical to do so.

14 months agoAvoid persisting `ChannelManager` in response to peer connection
Matt Corallo [Sun, 10 Sep 2023 23:10:03 +0000 (23:10 +0000)]
Avoid persisting `ChannelManager` in response to peer connection

When a peer connects and we send some `channel_reestablish`
messages or create a `per_peer_state` entry there's really no
reason to need to persist the `ChannelManager`. None of the
possible actions we take immediately result in a change to the
persisted contents of a `ChannelManager`, only the peer's later
`channel_reestablish` message does.

14 months agoMove a handful of channel messages to notify-without-persist
Matt Corallo [Thu, 24 Aug 2023 19:36:58 +0000 (19:36 +0000)]
Move a handful of channel messages to notify-without-persist

Many channel related messages don't actually change the channel
state in a way that changes the persisted channel. For example,
an `update_add_htlc` or `update_fail_htlc` message simply adds the
change to a queue, changing the channel state when we receive a
`commitment_signed` message.

In these cases there's really no reason to wake the background
processor at all - there's no response message and there's no state
update. However, note that if we close the channel we should
persist the `ChannelManager`. If we send an error message without
closing the channel, we should wake the background processor
without persisting.

Here we move to the appropriate `NotifyOption` on some of the
simpler channel message handlers.

14 months agoUpdate `channelmanager::NotifyOption` to indicate persist or event
Matt Corallo [Thu, 24 Aug 2023 18:37:18 +0000 (18:37 +0000)]
Update `channelmanager::NotifyOption` to indicate persist or event

As we now signal events-available from persistence-needed
separately, the `NotifyOption` enum should include a separate
variant for events-but-no-persistence, which we add here.

14 months agoSeparate ChannelManager needing persistence from having events
Matt Corallo [Fri, 8 Sep 2023 20:26:29 +0000 (20:26 +0000)]
Separate ChannelManager needing persistence from having events

Currently, when a ChannelManager generates a notification for the
background processor, any pending events are handled and the
ChannelManager is always re-persisted.

Many channel related messages don't actually change the channel
state in a way that changes the persisted channel. For example,
an `update_add_htlc` or `update_fail_htlc` message simply adds the
change to a queue, changing the channel state when we receive a
`commitment_signed` message.

In these cases we shouldn't be re-persisting the ChannelManager as
it hasn't changed (persisted) state at all. In anticipation of
doing so in the next few commits, here we make the public API
handle the two concepts (somewhat) separately. The notification
still goes out via a single waker, however whether or not to
persist is now handled via a separate atomic bool.

14 months agoMake it harder to forget to call CM::process_background_events
Matt Corallo [Mon, 11 Sep 2023 03:38:14 +0000 (03:38 +0000)]
Make it harder to forget to call CM::process_background_events

Prior to any actions which may generate a `ChannelMonitorUpdate`,
and in general after startup,
`ChannelManager::process_background_events` must be called. This is
mostly accomplished by doing so on taking the
`total_consistency_lock` via the `PersistenceNotifierGuard`. In
order to skip this call in block connection logic, the
`PersistenceNotifierGuard::optionally_notify` constructor did not
call the `process_background_events` method.

However, this is very easy to misuse - `optionally_notify` does not
convey to the reader that they need to call
`process_background_events` at all.

Here we fix this by adding a separate
`optionally_notify_skipping_background_events` method, making the
requirements much clearer to callers.

14 months agoTest monitor update completion actions on pre-startup completion 2023-03-monitor-e-monitor
Matt Corallo [Wed, 5 Jul 2023 16:15:59 +0000 (16:15 +0000)]
Test monitor update completion actions on pre-startup completion

This adds a test for monitor update actions being completed on
startup if a monitor update completed "while we were shut down"
(or, really, the manager didn't get persisted after the update
completed).

14 months agoSplit `expect_payment_forwarded` into a function called by macro
Matt Corallo [Tue, 11 Jul 2023 19:49:41 +0000 (19:49 +0000)]
Split `expect_payment_forwarded` into a function called by macro

Also allowing us to pass the event manually.

14 months agoUpdate tests to test re-claiming of forwarded HTLCs on startup
Matt Corallo [Mon, 21 Aug 2023 18:44:22 +0000 (18:44 +0000)]
Update tests to test re-claiming of forwarded HTLCs on startup

Because some of these tests require connecting blocks without
calling `get_and_clear_pending_msg_events`, we need to split up
the block connection utilities to only optionally call
sanity-checks.

14 months agoCorrect `expect_payment_forwarded` upstream channel checking
Matt Corallo [Sun, 27 Aug 2023 20:37:36 +0000 (20:37 +0000)]
Correct `expect_payment_forwarded` upstream channel checking

`expect_payment_forwarded` takes a bool to indicate that the
inbound channel on which we received a forwarded payment has been
closed, but then ignores it in favor of looking at the fee in the
event. While this is generally correct, in cases where we process
an event after a channel was closed, which was generated before a
channel closed this is incorrect.

Instead, we examine the bool we already passed and use that.

14 months agoBlock the mon update removing a preimage until upstream mon writes
Matt Corallo [Thu, 7 Sep 2023 02:22:52 +0000 (02:22 +0000)]
Block the mon update removing a preimage until upstream mon writes

When we forward a payment and receive an `update_fulfill_htlc`
message from the downstream channel, we immediately claim the HTLC
on the upstream channel, before even doing a `commitment_signed`
dance on the downstream channel. This implies that our
`ChannelMonitorUpdate`s "go out" in the right order - first we
ensure we'll get our money by writing the preimage down, then we
write the update that resolves giving money on the downstream node.

This is safe as long as `ChannelMonitorUpdate`s complete in the
order in which they are generated, but of course looking forward we
want to support asynchronous updates, which may complete in any
order.

Thus, here, we enforce the correct ordering by blocking the
downstream `ChannelMonitorUpdate` until the upstream one completes.
Like the `PaymentSent` event handling we do so only for the
`revoke_and_ack` `ChannelMonitorUpdate`, ensuring the
preimage-containing upstream update has a full RTT to complete
before we actually manage to slow anything down.

14 months agoClean up test handling of resending responding commitment_signed
Matt Corallo [Thu, 31 Aug 2023 19:06:34 +0000 (19:06 +0000)]
Clean up test handling of resending responding commitment_signed

When we need to rebroadcast a `commitment_signed` on reconnect in
response to a previous update (ie not one which contains any
updates) we previously hacked in support for it by passing a `-1`
for the number of expected update_add_htlcs. This is a mess, and
with the introduction of `ReconnectArgs` we can now clean it up
easily with a new bool.

14 months agoFix various unused warnings in test and regular builds
Matt Corallo [Thu, 31 Aug 2023 18:47:13 +0000 (18:47 +0000)]
Fix various unused warnings in test and regular builds

14 months agoMerge pull request #2567 from G8XSU/payment-id
Matt Corallo [Mon, 11 Sep 2023 23:15:49 +0000 (23:15 +0000)]
Merge pull request #2567 from G8XSU/payment-id

Add PaymentId in ChannelManager.list_recent_payments()

14 months agoMerge pull request #2566 from G8XSU/check-best-block-2538
Matt Corallo [Mon, 11 Sep 2023 20:20:50 +0000 (20:20 +0000)]
Merge pull request #2566 from G8XSU/check-best-block-2538

Verify channel-monitor processes blocks with skipped best_block

14 months agoAdd PaymentId in ChannelManager.list_recent_payments()
Gursharan Singh [Sun, 10 Sep 2023 06:56:45 +0000 (23:56 -0700)]
Add PaymentId in ChannelManager.list_recent_payments()

14 months agoMerge pull request #2563 from tnull/2023-09-kvstore-followups
valentinewallace [Mon, 11 Sep 2023 17:59:05 +0000 (13:59 -0400)]
Merge pull request #2563 from tnull/2023-09-kvstore-followups

`KVStore` upstreaming followups

14 months agoAdd length check for read ChannelMonitor keys
Elias Rohrer [Fri, 8 Sep 2023 08:00:25 +0000 (10:00 +0200)]
Add length check for read ChannelMonitor keys

14 months agoMake PersistenceNotifierGuard::optionally_notify take a ChanMan ref
Matt Corallo [Mon, 11 Sep 2023 03:10:36 +0000 (03:10 +0000)]
Make PersistenceNotifierGuard::optionally_notify take a ChanMan ref

Long ago, for reasons lost to the ages, the
`PersistenceNotifierGuard::optionally_notify` constructor didn't
take a `ChannelManager` reference, but rather explicit references
to the fields of it that it needs.

This is cumbersome and useless, so we fix it here.

14 months agoRename `ChannelManager` update future methods for new API
Matt Corallo [Thu, 24 Aug 2023 18:34:55 +0000 (18:34 +0000)]
Rename `ChannelManager` update future methods for new API

In the next commit, we separate `ChannelManager`'s concept of
waking a listener to both be persisted and to allow the user to
handle events. Here we rename the future-fetching method in
anticipation of this split.

14 months agoMerge pull request #2514 from valentinewallace/2023-08-compute-blindedpayinfo
Matt Corallo [Sun, 10 Sep 2023 03:02:22 +0000 (03:02 +0000)]
Merge pull request #2514 from valentinewallace/2023-08-compute-blindedpayinfo

Aggregate `BlindedPayInfo` for blinded routes

14 months agoMerge pull request #2495 from dunxen/2023-07-channelenummap
Matt Corallo [Sat, 9 Sep 2023 18:54:06 +0000 (18:54 +0000)]
Merge pull request #2495 from dunxen/2023-07-channelenummap

Use a single peer state map for all channel phases in peer state

14 months agoVerify channel-monitor processes blocks with skipped best_block
Gursharan Singh [Fri, 8 Sep 2023 22:15:16 +0000 (15:15 -0700)]
Verify channel-monitor processes blocks with skipped best_block

This can happen due to races b/w client's call to block_connect
and adding newly created channel-monitor to chain-monitor using
watch_channel in funding_created.

14 months agoRemove v1 peer state channel maps & refactor with ChannelPhase
Duncan Dean [Mon, 14 Aug 2023 11:28:47 +0000 (13:28 +0200)]
Remove v1 peer state channel maps & refactor with ChannelPhase

14 months agoRefactor `ChannelManager` with `ChannelPhase`
Duncan Dean [Mon, 14 Aug 2023 09:28:40 +0000 (11:28 +0200)]
Refactor `ChannelManager` with `ChannelPhase`

14 months agoMerge pull request #2549 from yanganto/socket-addr
Matt Corallo [Fri, 8 Sep 2023 20:08:08 +0000 (20:08 +0000)]
Merge pull request #2549 from yanganto/socket-addr

Rename SocketAddress from NetAddress

14 months agoStruct-ify blinded payment path intermediate node info
Valentine Wallace [Thu, 7 Sep 2023 21:11:30 +0000 (17:11 -0400)]
Struct-ify blinded payment path intermediate node info

14 months agoRemove unnecessary doc links
Valentine Wallace [Thu, 7 Sep 2023 21:10:21 +0000 (17:10 -0400)]
Remove unnecessary doc links

14 months agoFix blinded payment TLV ser to not length-prefix
Valentine Wallace [Thu, 24 Aug 2023 19:23:06 +0000 (15:23 -0400)]
Fix blinded payment TLV ser to not length-prefix

impl_writeable_tlv_based includes a length prefix to the TLV stream, which we
don't want.

14 months agoDerive Clone and Debug for blinded payment TLV structs
Valentine Wallace [Thu, 7 Sep 2023 17:32:51 +0000 (13:32 -0400)]
Derive Clone and Debug for blinded payment TLV structs

14 months agoMake blinded payment TLV fields public.
Valentine Wallace [Thu, 7 Sep 2023 17:32:30 +0000 (13:32 -0400)]
Make blinded payment TLV fields public.

These should've been made public when they were added for use in
BlindedPath::new_for_payment.

14 months agoSupport aggregating htlc_maximum_msat for BlindedPayInfo
Valentine Wallace [Sat, 19 Aug 2023 21:56:33 +0000 (17:56 -0400)]
Support aggregating htlc_maximum_msat for BlindedPayInfo

14 months agoSupport aggregating htlc_minimum_msat for BlindedPayInfo
Valentine Wallace [Sat, 19 Aug 2023 21:12:15 +0000 (17:12 -0400)]
Support aggregating htlc_minimum_msat for BlindedPayInfo

14 months agoCompute aggregated BlindedPayInfo in path construction
Valentine Wallace [Wed, 21 Jun 2023 00:27:57 +0000 (20:27 -0400)]
Compute aggregated BlindedPayInfo in path construction

14 months agoRename SocketAddress from NetAddress
Antonio Yang [Mon, 4 Sep 2023 02:34:21 +0000 (10:34 +0800)]
Rename SocketAddress from NetAddress

14 months agoIntroduce `ChannelPhase` enum
Duncan Dean [Wed, 26 Jul 2023 09:20:08 +0000 (11:20 +0200)]
Introduce `ChannelPhase` enum

We introduce the `ChannelPhase` enum which will contain the different
channel structs wrapped by each of its variants so that we can place
these within a single `channel_by_id` map in `peer_state` in the
following commits. This will reduce the number of map lookup operations
we need to do in `ChannelManager`'s various methods. It will also make
certain channel counting logic easier to reason about with less risk of
forgetting to modify logic when new channels structs are introduced for
V2 channel establishment.

14 months agoRemove outdated `Channel` TODO
Duncan Dean [Thu, 24 Aug 2023 13:32:05 +0000 (15:32 +0200)]
Remove outdated `Channel` TODO

14 months agoHave `path_to_windows_str` take reference to avoid `clone`s
Elias Rohrer [Fri, 8 Sep 2023 07:40:45 +0000 (09:40 +0200)]
Have `path_to_windows_str` take reference to avoid `clone`s

14 months agoMerge pull request #2371 from jkczyz/2023-06-offer-message-handling
Matt Corallo [Fri, 8 Sep 2023 01:52:38 +0000 (01:52 +0000)]
Merge pull request #2371 from jkczyz/2023-06-offer-message-handling

BOLT 12 Invoice payments

14 months agoMerge pull request #2472 from tnull/2023-08-add-kvstore
Matt Corallo [Thu, 7 Sep 2023 22:26:03 +0000 (22:26 +0000)]
Merge pull request #2472 from tnull/2023-08-add-kvstore

Replace `KVStorePersister` with `KVStore`

14 months agoConfigure BOLT 12 invoice payment retry strategy
Jeffrey Czyz [Tue, 5 Sep 2023 19:32:53 +0000 (14:32 -0500)]
Configure BOLT 12 invoice payment retry strategy

Replace a constant three retry attempts for BOLT 12 invoice payments
with a retry strategy specified when creating a pending outbound
payment. This is configured by users in a later commit when constructing
an InvoiceRequest or a Refund.

14 months agoUse u32 instead of usize in Retry::Attempts
Jeffrey Czyz [Tue, 5 Sep 2023 20:21:35 +0000 (15:21 -0500)]
Use u32 instead of usize in Retry::Attempts

An upcoming commit requires serializing Retry, so use a type with a
fixed byte length. Otherwise, using eight bytes to serialize a usize
would fail to read on 32-bit machines.

14 months agoAdd tests for send_payment_for_bolt12_invoice
Jeffrey Czyz [Thu, 31 Aug 2023 22:22:31 +0000 (17:22 -0500)]
Add tests for send_payment_for_bolt12_invoice

14 months agopub(crate) visibility for offers/test_utils.rs
Jeffrey Czyz [Thu, 31 Aug 2023 22:19:29 +0000 (17:19 -0500)]
pub(crate) visibility for offers/test_utils.rs

The test utilities for Offers are needed for testing message handling in
ChannelManager and OutboundPayments.

14 months agoSupport paying BOLT 12 invoices
Jeffrey Czyz [Fri, 1 Sep 2023 19:01:24 +0000 (14:01 -0500)]
Support paying BOLT 12 invoices

Add a send_payment_for_bolt12_invoice method to OutboundPayments for
initiating payment of a BOLT 12 invoice. This will be called from an
OffersMessageHandler, after which any retries are handled using the
Retryable logic.