]> git.bitcoin.ninja Git - rust-lightning/log
rust-lightning
4 weeks agoMerge pull request #3377 from G8XSU/hex-impls
Matt Corallo [Tue, 22 Oct 2024 13:55:34 +0000 (13:55 +0000)]
Merge pull request #3377 from G8XSU/hex-impls

Implement to_lower_hex() Display/Debug for PaymentId & OfferId

4 weeks agoMerge pull request #3267 from arik-so/rgs_metrics_2024-08
Gursharan Singh [Mon, 21 Oct 2024 23:15:43 +0000 (16:15 -0700)]
Merge pull request #3267 from arik-so/rgs_metrics_2024-08

Update RGS stats for August 2024.

4 weeks agoImplement to_lower_hex() Display/Debug for OfferId.
G8XSU [Mon, 21 Oct 2024 22:36:11 +0000 (15:36 -0700)]
Implement to_lower_hex() Display/Debug for OfferId.

4 weeks agoImplement to_lower_hex() Display/Debug for PaymentId.
G8XSU [Mon, 21 Oct 2024 22:32:30 +0000 (15:32 -0700)]
Implement to_lower_hex() Display/Debug for PaymentId.

4 weeks agoUpdate processing times for iPhone.
Arik Sosman [Wed, 11 Sep 2024 19:01:34 +0000 (12:01 -0700)]
Update processing times for iPhone.

4 weeks agoUpdate RGS stats for August 2024.
Arik Sosman [Thu, 22 Aug 2024 16:55:20 +0000 (09:55 -0700)]
Update RGS stats for August 2024.

4 weeks agoMerge pull request #3370 from dunxen/2024-10-dry-funding-created-signed
Matt Corallo [Mon, 21 Oct 2024 19:25:18 +0000 (19:25 +0000)]
Merge pull request #3370 from dunxen/2024-10-dry-funding-created-signed

DRY `funding_created()` and `funding_signed()` for V1 channels

4 weeks agoDRY `funding_created()` and `funding_signed()` for V1 channels
Duncan Dean [Fri, 4 Oct 2024 14:35:43 +0000 (16:35 +0200)]
DRY `funding_created()` and `funding_signed()` for V1 channels

There is a decent amount of shared code in these two methods so we make
an attempt to share that code here by introducing the
`InitialRemoteCommitmentReceiver` trait. This trait will also come in
handy when we need similar commitment_signed handling behaviour for
dual-funded channels.

4 weeks agoMerge pull request #3356 from jkczyz/2024-10-inflight-scoring
Matt Corallo [Sat, 19 Oct 2024 13:41:11 +0000 (13:41 +0000)]
Merge pull request #3356 from jkczyz/2024-10-inflight-scoring

Don't over-penalize channels with inflight HTLCs

4 weeks agoUse total_inflight_amount_msat for probability fns
Jeffrey Czyz [Fri, 18 Oct 2024 22:42:18 +0000 (17:42 -0500)]
Use total_inflight_amount_msat for probability fns

Rename parameters used when calculating success probability to make it
clear that the total mount in-flight should be used rather than the
payment amount.

4 weeks agoCorrect comments in avoids_saturating_channels
Jeffrey Czyz [Wed, 16 Oct 2024 20:18:17 +0000 (15:18 -0500)]
Correct comments in avoids_saturating_channels

4 weeks agoCorrect base_penalty_amount_multiplier_msat docs
Jeffrey Czyz [Thu, 10 Oct 2024 23:20:25 +0000 (18:20 -0500)]
Correct base_penalty_amount_multiplier_msat docs

Commit df52da7b31494c7ec77a705cca4c44bc840f8a95 modified
ProbabilisticScorer to apply some penalty amount multipliers to the
total amount flowing over the channel. However, the commit updated the
docs for base_penalty_amount_multiplier_msat even though that behavior
didn't change. This commit reverts those docs.

4 weeks agoDon't over-penalize channels with inflight HTLCs
Jeffrey Czyz [Thu, 10 Oct 2024 23:01:23 +0000 (18:01 -0500)]
Don't over-penalize channels with inflight HTLCs

Commit df52da7b31494c7ec77a705cca4c44bc840f8a95 modified
ProbabilisticScorer to apply some penalty amount multipliers (e.g.,
liquidity_penalty_amount_multiplier_msat) to the total amount flowing
over the channel (i.e., including inflight HTLCs), not just the payment
in question. This led to over-penalizing in-use channels. Instead, only
apply the total amount when calculating success probability.

4 weeks agoMerge pull request #3359 from TheBlueMatt/2024-10-less-types-re-export
Gursharan Singh [Fri, 18 Oct 2024 21:35:49 +0000 (14:35 -0700)]
Merge pull request #3359 from TheBlueMatt/2024-10-less-types-re-export

Remove deprecated re-exports

4 weeks agoMerge pull request #3297 from TheBlueMatt/2024-09-cleanup-package
Matt Corallo [Fri, 18 Oct 2024 17:44:29 +0000 (17:44 +0000)]
Merge pull request #3297 from TheBlueMatt/2024-09-cleanup-package

Cleanup `PackageTemplate`a bit

4 weeks agoAdd a test for the fee-bump rate of timeout HTLC claims on cp txn 2024-09-cleanup-package
Matt Corallo [Fri, 18 Oct 2024 15:57:25 +0000 (15:57 +0000)]
Add a test for the fee-bump rate of timeout HTLC claims on cp txn

In a previous commit we updated the fee-bump-rate of claims against
HTLC timeouts on counterparty commitment transactions so that
instead of immediately attempting to bump every block we consider
the fact that we actually have at least `MIN_CLTV_EXPIRY_DELTA`
blocks to do so, and bumping at the appropriate rate given that.

Here we test that by adding an extra check to an existing test
that we do not bump in the very next block after the HTLC timeout
claim was initially broadcasted.

4 weeks agoSet correct `counterparty_spendable_height` for outb local HTLCs
Matt Corallo [Wed, 18 Sep 2024 18:20:46 +0000 (18:20 +0000)]
Set correct `counterparty_spendable_height` for outb local HTLCs

For outbound HTLCs, the counterparty can spend the output
immediately. This fixes the `counterparty_spendable_height` in the
`PackageTemplate` claiming outbound HTLCs on local commitment
transactions, which was previously spuriously set to the HTLC
timeout (at which point *we* can claim the HTLC).

5 weeks agoStop exporting `lightning::ln::features` 2024-10-less-types-re-export
Matt Corallo [Thu, 17 Oct 2024 19:38:19 +0000 (19:38 +0000)]
Stop exporting `lightning::ln::features`

Now that the module only contains some implementations of
serialization for the `lightning_types::features` structs, there's
no reason for it to be public.

5 weeks agoRename `soonest_conf_deadline` to `counterparty_spendable_height`
Matt Corallo [Wed, 18 Sep 2024 16:48:24 +0000 (16:48 +0000)]
Rename `soonest_conf_deadline` to `counterparty_spendable_height`

This renames the field in `PackageTemplate` which describes the
height at which a counterparty can make a claim to an output to
match its actual use.

Previously it had been set based on when a counterparty can claim
an output but also used for other purposes. In the previous commit
we cleaned up its use for fee-bumping-rate, so here we can rename
it as it is now only used as the `counteraprty_spendable_height`.

5 weeks agoClean up `PackageTemplate::get_height_timer` to consider type
Matt Corallo [Wed, 18 Sep 2024 16:00:20 +0000 (16:00 +0000)]
Clean up `PackageTemplate::get_height_timer` to consider type

`PackageTemplate::get_height_timer` is used to decide when to next
bump our feerate on claims which need to make it on chain within
some window. It does so by comparing the current height with some
deadline and increasing the bump rate as the deadline approaches.

However, the deadline used is the `counterparty_spendable_height`,
which is the height at which the counterparty might be able to
spend the same output, irrespective of why. This doesn't make sense
for all output types, for example outbound HTLCs are spendable by
our counteraprty immediately (by revealing the preimage), but we
don't need to get our HTLC timeout claims confirmed immedaitely,
as we actually have `MIN_CLTV_EXPIRY` blocks before the inbound
edge of a forwarded HTLC becomes claimable by our (other)
counterparty.

Thus, here, we adapt `get_height_timer` to look at the type of
output being claimed, and adjust the rate at which we bump the fee
according to the real deadline.

5 weeks agoStop passing current height to `PackageTemplate::build_package`
Matt Corallo [Fri, 6 Sep 2024 00:33:45 +0000 (00:33 +0000)]
Stop passing current height to `PackageTemplate::build_package`

Now that we don't store the confirmation height of the inputs
being spent, passing the current height to
`PackageTemplate::build_package` is useless - we only use it to set
the height at which we should next bump the fee, but we just want
it to be "next block", so we might as well use `0` and avoid the
extra argument. Further, in one case we were already passing `0`,
so passing the argument is just confusing as we can't rely on it
being set.

Note that this does remove an assertion that we never merge
packages that were crated at different heights, and in the future
we may wish to do that (as there's no specific reason not to), but
we do not currently change the behavior.

5 weeks agoDrop unused `PackageTemplate::height_original`
Matt Corallo [Thu, 5 Sep 2024 23:48:02 +0000 (23:48 +0000)]
Drop unused `PackageTemplate::height_original`

This has never been used, and its set to a fixed value of zero for
HTLCs on local commitment transactions making it impossible to rely
on so might as well remove it.

5 weeks agoMerge pull request #3330 from tnull/2024-09-add-macros-crate
Matt Corallo [Thu, 17 Oct 2024 15:34:18 +0000 (15:34 +0000)]
Merge pull request #3330 from tnull/2024-09-add-macros-crate

Add `lightning-macros` crate and drop `bdk_macros` dependency

5 weeks agoMerge pull request #3371 from tnull/2024-10-allow-to-set-payment-and-description...
Matt Corallo [Thu, 17 Oct 2024 15:33:22 +0000 (15:33 +0000)]
Merge pull request #3371 from tnull/2024-10-allow-to-set-payment-and-description-hash

Invoice utils: allow to set both description hash and payment hash

5 weeks agoUpdate `lightning-transaction-sync` to use macros crate
Elias Rohrer [Sat, 21 Sep 2024 05:21:39 +0000 (14:21 +0900)]
Update `lightning-transaction-sync` to use macros crate

5 weeks agoAdd `lightning-macros` crate
Elias Rohrer [Sat, 21 Sep 2024 04:51:21 +0000 (13:51 +0900)]
Add `lightning-macros` crate

Previously, we used the `bdk_macros` dependency for some simple proc
macros in `lightning-transaction-sync`. However, post-1.0 BDK doesn't
further maintain this crate and will at some point probably yank it
together with the old `bdk` crate that was split up.

Here, we create a new crate for utility proc macros and ~~steal~~ add
what we currently use (slightly modified for the latest `syn` version's
API though). In the future we may want to expand this crate, e.g., for
some `maybe_async` macros in the context of an `async KVStore`
implementation.

5 weeks agoRename `PackageTemplate::timelock` `counteraprty_spendable_height`
Matt Corallo [Fri, 6 Sep 2024 00:25:00 +0000 (00:25 +0000)]
Rename `PackageTemplate::timelock` `counteraprty_spendable_height`

This function was very confusing - its used to determine by when
we have to stop aggregating this claim with others as it starts to
be at risk of pinning due to the counterparty's ability to spend
the output.

It is not ever used as a timelock for a transaction, and thus its
name is very confusing.

Instead we rename it `counterparty_spendable_height`.

5 weeks agoRename claim cleaning match bool for accuracy
Matt Corallo [Thu, 5 Sep 2024 21:06:16 +0000 (21:06 +0000)]
Rename claim cleaning match bool for accuracy

We don't actually care if a confirmed transaction claimed other
outputs, only that it claimed a superset of the outputs in the
pending claim we're looking at. Thus, the variable to detect that
is renamed `is_claim_subset_of_tx` instead of `are_sets_equal`.

5 weeks agoMerge pull request #3316 from optout21/signer_extend
Matt Corallo [Wed, 16 Oct 2024 18:43:09 +0000 (18:43 +0000)]
Merge pull request #3316 from optout21/signer_extend

[Splicing] Signer extended with method to sign prev funding transaction input

5 weeks agoInvoice utils: allow to set both description hash and payment hash
Elias Rohrer [Wed, 16 Oct 2024 15:04:38 +0000 (17:04 +0200)]
Invoice utils: allow to set both description hash and payment hash

5 weeks agoSigner extended with method to sign prev funding transaction input
optout [Tue, 15 Oct 2024 21:12:43 +0000 (23:12 +0200)]
Signer extended with method to sign prev funding transaction input

5 weeks agoMerge pull request #3329 from arik-so/monitor_archive_docs_followup
Gursharan Singh [Tue, 15 Oct 2024 20:54:46 +0000 (13:54 -0700)]
Merge pull request #3329 from arik-so/monitor_archive_docs_followup

Document monitor archival idempotency requirement (#3276 followup)

5 weeks agoDeprecate the `lightning::util::string` re-export from types
Matt Corallo [Sat, 12 Oct 2024 22:06:57 +0000 (22:06 +0000)]
Deprecate the `lightning::util::string` re-export from types

Like we've done for `features` and `payment`, here we mark the
`lightning::util::string` re-export as deprecated.

5 weeks agoDrop the `Payment{Hash,Preimage,Secret}` re-exports in `lightning`
Matt Corallo [Sat, 12 Oct 2024 21:59:54 +0000 (21:59 +0000)]
Drop the `Payment{Hash,Preimage,Secret}` re-exports in `lightning`

These re-exports were deprecated in 0.0.124 in favor of the
`lightning::types::payment::*` paths, which we use here.

5 weeks agoMerge pull request #3363 from G8XSU/event-logging-2
Elias Rohrer [Tue, 15 Oct 2024 07:32:37 +0000 (09:32 +0200)]
Merge pull request #3363 from G8XSU/event-logging-2

Revert "Add logging around event processing."

5 weeks agoMerge pull request #3366 from TheBlueMatt/2024-10-0.0.125-relnotes
Elias Rohrer [Tue, 15 Oct 2024 07:31:13 +0000 (09:31 +0200)]
Merge pull request #3366 from TheBlueMatt/2024-10-0.0.125-relnotes

Add CHANGELOG entry for 0.0.125

5 weeks agoAdd CHANGELOG entry for 0.0.125 2024-10-0.0.125-relnotes
Matt Corallo [Mon, 14 Oct 2024 17:28:25 +0000 (17:28 +0000)]
Add CHANGELOG entry for 0.0.125

5 weeks agoRevert "Add logging around event processing."
G8XSU [Mon, 16 Sep 2024 22:50:24 +0000 (15:50 -0700)]
Revert "Add logging around event processing."

This reverts commit 85eb8145fba1dbf3b9348d9142cc105ee13db33b.
Logging here can be overly verbose and moreover in case of event
handling failure, we loop back without any added delay.

5 weeks agoMerge pull request #3354 from tnull/2024-10-fix-block-init-synchronize
Matt Corallo [Mon, 14 Oct 2024 17:03:09 +0000 (17:03 +0000)]
Merge pull request #3354 from tnull/2024-10-fix-block-init-synchronize

`lightning-block-sync`: Fix `synchronize_listeners` always calling default implementation

5 weeks agoDrop `lightning::ln::features::*` type aliases
Matt Corallo [Sat, 12 Oct 2024 21:34:36 +0000 (21:34 +0000)]
Drop `lightning::ln::features::*` type aliases

These were deprecated in 0.0.124, and we drop them here in favor of
`lightning::types::features::*`.

5 weeks agoDocument monitor archival idempotency requirement.
Arik Sosman [Thu, 19 Sep 2024 16:30:49 +0000 (01:30 +0900)]
Document monitor archival idempotency requirement.

6 weeks agoMerge pull request #3349 from TheBlueMatt/2024-10-3270-followups
Matt Corallo [Fri, 11 Oct 2024 13:47:39 +0000 (13:47 +0000)]
Merge pull request #3349 from TheBlueMatt/2024-10-3270-followups

Minor #3270 Followups

6 weeks agoMerge pull request #3353 from tnull/2024-10-simplify-block-sync
Matt Corallo [Fri, 11 Oct 2024 13:45:53 +0000 (13:45 +0000)]
Merge pull request #3353 from tnull/2024-10-simplify-block-sync

Drop unnecessary `Result` in `RpcClient::new`

6 weeks agoFix `synchronize_listeners` calling default implementation
Elias Rohrer [Thu, 10 Oct 2024 15:16:18 +0000 (17:16 +0200)]
Fix `synchronize_listeners` calling default implementation

Previously, the `ChainListenerSet` `Listen` implementation wouldn't
forward to the listeners `block_connected` implementation outside of
tests. This would result in the default implementation of
`Listen::block_connected` being used and the listeners implementation
never being called.

6 weeks agoDrop unnecessary `Result` in `RestClient::new`
Elias Rohrer [Wed, 9 Oct 2024 17:35:42 +0000 (19:35 +0200)]
Drop unnecessary `Result` in `RestClient::new`

.. as it's infallible

6 weeks agoDrop unnecessary `Result` in `RpcClient::new`
Elias Rohrer [Wed, 9 Oct 2024 10:07:44 +0000 (12:07 +0200)]
Drop unnecessary `Result` in `RpcClient::new`

.. as it's infallible

6 weeks agoMerge pull request #3339 from arik-so/lint-script-file
Matt Corallo [Wed, 9 Oct 2024 14:09:13 +0000 (14:09 +0000)]
Merge pull request #3339 from arik-so/lint-script-file

Create script file for easy local linting

6 weeks agoCreate script file for easy local linting
Arik Sosman [Wed, 25 Sep 2024 02:21:19 +0000 (11:21 +0900)]
Create script file for easy local linting

6 weeks agoMerge pull request #3346 from TheBlueMatt/2024-10-dns-feature-flag
Matt Corallo [Tue, 8 Oct 2024 19:46:11 +0000 (19:46 +0000)]
Merge pull request #3346 from TheBlueMatt/2024-10-dns-feature-flag

Add support for parsing the dns_resolver feature bit

6 weeks agoMerge pull request #3235 from Mirebella/add-local-balance-msats
Matt Corallo [Tue, 8 Oct 2024 17:56:46 +0000 (17:56 +0000)]
Merge pull request #3235 from Mirebella/add-local-balance-msats

Add `last_local_balance_msats` field

6 weeks agoMerge pull request #3351 from carlaKC/arch-update-keys-interface
Matt Corallo [Tue, 8 Oct 2024 15:30:56 +0000 (15:30 +0000)]
Merge pull request #3351 from carlaKC/arch-update-keys-interface

docs/trivial: update diagram to reflect changes to KeysInterface

6 weeks agoAdd `Event::ChannelClosed::last_local_balance_msats`
Mirebella [Sun, 11 Aug 2024 15:50:45 +0000 (17:50 +0200)]
Add `Event::ChannelClosed::last_local_balance_msats`

Users commonly want to know what their balance was when a channel
was closed, which this provides in a somewhat simplified manner.

It does not consider pending HTLCs and will always overstate our
balance by transaction fees.

6 weeks agoarch: update diagram to reflect changes to KeysInterface
Carla Kirk-Cohen [Tue, 8 Oct 2024 13:17:47 +0000 (09:17 -0400)]
arch: update diagram to reflect changes to KeysInterface

KeysInterface was split into EntropySource, SignerProvider and
NodeSigner in #1930.

7 weeks agoHold a reference to byte arrays when serializing to bech32 2024-10-3270-followups
Matt Corallo [Thu, 3 Oct 2024 16:54:20 +0000 (16:54 +0000)]
Hold a reference to byte arrays when serializing to bech32

When we serialize from a byte array to bech32 in
`lightning-invoice`, we can either copy the array itself into the
iterator or hold a reference to the array and iterate through that.

In aa2f6b47df312f026213d0ceaaff20ffe955c377 we opted to copy the
array into the iterator, which is fine for the current array sizes
we're working with, but does result in additional memory on the
stack if, in the future, we end up writing large arrays.

Instead, here, we switch to using the slice serialization code when
writing arrays, (very marginally) reducing code size and reducing
stack usage.

7 weeks agoMarginally reduce allocations in `lightning-invoice`
Matt Corallo [Thu, 3 Oct 2024 16:54:14 +0000 (16:54 +0000)]
Marginally reduce allocations in `lightning-invoice`

In aa2f6b47df312f026213d0ceaaff20ffe955c377 we refactored
`lightning-invoice` de/serialization to use the new version of
`bech32`, but in order to keep the public API the same we
introduced one allocation we could have skipped.

Instead, here, we replace the public `Utf8Error` with
`FromUtf8Error` which contains the original data which failed
conversion, removing an allocation in the process.

7 weeks agoCheck that the HRPs generated in BOLT 11 `RawHrp` are always valid
Matt Corallo [Thu, 3 Oct 2024 16:54:10 +0000 (16:54 +0000)]
Check that the HRPs generated in BOLT 11 `RawHrp` are always valid

...in `debug_assertions`.

7 weeks agoDrop one unnecessary allocation added in aa2f6b47df312f026213d0ceaa
Matt Corallo [Thu, 3 Oct 2024 16:54:03 +0000 (16:54 +0000)]
Drop one unnecessary allocation added in aa2f6b47df312f026213d0ceaa

In aa2f6b47df312f026213d0ceaaff20ffe955c377 we refactored
`lightning-invoice` de/serialization to use the new version of
`bech32`, but ended up adding one unnecessary allocation in our
offers logic, which we drop here.

7 weeks agoMarginally reduce allocations in `lightning-invoice`
Matt Corallo [Thu, 3 Oct 2024 16:53:56 +0000 (16:53 +0000)]
Marginally reduce allocations in `lightning-invoice`

In aa2f6b47df312f026213d0ceaaff20ffe955c377 we refactored
`lightning-invoice` de/serialization to use the new version of
`bech32`, also reducing some trivial unnecessary allocations when
we did so.

Here we drop a few additional allocations which came up in review.

7 weeks agoMerge pull request #3270 from optout21/bech32-iterser
Matt Corallo [Thu, 3 Oct 2024 17:02:55 +0000 (17:02 +0000)]
Merge pull request #3270 from optout21/bech32-iterser

Upgrade bech32 dependency (iterative)

7 weeks agoUpgrade bech32 dependency, bech32 serialization improvements
optout [Wed, 2 Oct 2024 19:21:07 +0000 (21:21 +0200)]
Upgrade bech32 dependency, bech32 serialization improvements

7 weeks agoAllow a `DNSResolverMessageHandler` to set `dns_resolver` feature 2024-10-dns-feature-flag
Matt Corallo [Wed, 2 Oct 2024 18:21:33 +0000 (18:21 +0000)]
Allow a `DNSResolverMessageHandler` to set `dns_resolver` feature

A `DNSResolverMessageHandler` which handles resolution requests
should want the `NodeFeatures` included in the node's
`node_announcement` to include `dns_resolver` to indicate to the
world that it provides that service. Here we enable this by
requesting extra feature flags from the `DNSResolverMessageHandler`
in the features `OnionMessenger`, in turn, provides to
`PeerManager` (which builds the `node_announcement`).

7 weeks agoAdd support for parsing the `dns_resolver` feature bit
Matt Corallo [Wed, 2 Oct 2024 18:12:38 +0000 (18:12 +0000)]
Add support for parsing the `dns_resolver` feature bit

This feature bit is used to indicate that a node will make DNS
queries on behalf of onion message senders, returning DNSSEC TXT
proofs for the requested names.

It is used to signal support for bLIP 32 resolution and can be used
to find nodes from which we can try to resolve BIP 32 HRNs.

7 weeks agoMerge pull request #3179 from TheBlueMatt/2024-07-human-readable-names-resolution-1
Arik [Wed, 2 Oct 2024 17:00:13 +0000 (10:00 -0700)]
Merge pull request #3179 from TheBlueMatt/2024-07-human-readable-names-resolution-1

Add the core functionality required to resolve Human Readable Names

7 weeks agoMerge pull request #3301 from dunxen/2024-9-fixnevertypefallback
Matt Corallo [Wed, 2 Oct 2024 14:29:09 +0000 (14:29 +0000)]
Merge pull request #3301 from dunxen/2024-9-fixnevertypefallback

Add an explicit_type TLV syntax for avoiding certain cases of type inference

7 weeks agoAdd Bolt11InvoiceFeatures serialization tests
optout [Wed, 11 Sep 2024 20:32:27 +0000 (22:32 +0200)]
Add Bolt11InvoiceFeatures serialization tests

7 weeks agoAdd an `explicit_type` TLV syntax for avoiding certain cases of type inference
Duncan Dean [Fri, 6 Sep 2024 10:26:19 +0000 (12:26 +0200)]
Add an `explicit_type` TLV syntax for avoiding certain cases of type inference

This new syntax is used to fix "dependency on fallback of ! -> ()".
This avoids cases where code compiles with a fallback of the
never type leading to the unit type. The behaviour in Rust edition 2024
would make this a compile error.

See: https://doc.rust-lang.org/nightly/nightly-rustc/rustc_lint/builtin/static.DEPENDENCY_ON_UNIT_NEVER_TYPE_FALLBACK.html#

7 weeks agoMerge pull request #3324 from tnull/2024-09-rustfmt-util-1
Matt Corallo [Tue, 1 Oct 2024 15:33:17 +0000 (15:33 +0000)]
Merge pull request #3324 from tnull/2024-09-rustfmt-util-1

`rustfmt`: Run on `util/*` (1/2)

7 weeks agoMerge pull request #3311 from TheBlueMatt/2024-09-3010-followups
Matt Corallo [Mon, 30 Sep 2024 21:21:20 +0000 (21:21 +0000)]
Merge pull request #3311 from TheBlueMatt/2024-09-3010-followups

Quick #3010 followups

7 weeks agoCall `ChannelMessageHandler::message_received` without peer lock 2024-09-3010-followups
Matt Corallo [Thu, 12 Sep 2024 15:17:15 +0000 (15:17 +0000)]
Call `ChannelMessageHandler::message_received` without peer lock

While `message_received` purports to be called on every message,
prior to the message, doing so on `Init` messages means we have to
call `message_received` while holding the per-peer mutex, which
can cause some lock contention.

Instead, here, we call `message_received` after processing `Init`
messages (which is probably more useful anyway - the peer isn't
really "connected" until we've processed the `Init` messages),
allowing us to call it unlocked.

7 weeks agoCheck that we aren't reading a second message in BOLT 12 retry test
Matt Corallo [Thu, 12 Sep 2024 15:13:11 +0000 (15:13 +0000)]
Check that we aren't reading a second message in BOLT 12 retry test

`creates_and_pays_for_offer_with_retry` intends to check that we
re-send a BOLT 12 `invoice_request` in response to a
`message_received` call, but doesn't actually test that there were
no messages in the outbound buffer after the initial send, which we
do here.

7 weeks agoAdd the core functionality required to resolve Human Readable Names 2024-07-human-readable-names-resolution-1
Matt Corallo [Thu, 12 Sep 2024 15:57:42 +0000 (15:57 +0000)]
Add the core functionality required to resolve Human Readable Names

This adds a new utility struct, `OMNameResolver`, which implements
the core functionality required to resolve Human Readable Names,
namely generating `DNSSECQuery` onion messages, tracking the state
of requests, and ultimately receiving and verifying `DNSSECProof`
onion messages.

It tracks pending requests with a `PaymentId`, allowing for easy
integration into `ChannelManager` in a coming commit - mapping
received proofs to `PaymentId`s which we can then complete by
handing them `Offer`s to pay.

It does not, directly, implement `DNSResolverMessageHandler`, but
an implementation of `DNSResolverMessageHandler` becomes trivial
with `OMNameResolver` handling the inbound messages and creating
the messages to send.

7 weeks agoAllow `_` in `Hostname`s
Matt Corallo [Mon, 30 Sep 2024 18:03:12 +0000 (18:03 +0000)]
Allow `_` in `Hostname`s

These are perfectly fine and are relied on by BIP 353, so we need
to ensure we allow them.

7 weeks agoAdd a type to track `HumanReadableName`s
Matt Corallo [Sat, 13 Jul 2024 16:23:47 +0000 (16:23 +0000)]
Add a type to track `HumanReadableName`s

BIP 353 `HumanReadableName`s are represented as `â‚¿user@domain` and
can be resolved using DNS into a `bitcoin:` URI. In the next
commit, we will add such a resolver using onion messages to fetch
records from the DNS, which will rely on this new type to get name
information from outside LDK.

7 weeks agoParse and handle `DNSResolverMessage`s in `OnionMessenger`
Matt Corallo [Sat, 13 Jul 2024 17:08:27 +0000 (17:08 +0000)]
Parse and handle `DNSResolverMessage`s in `OnionMessenger`

This adds the requisite message parsing and handling code for the
new DNSSEC messages to `OnionMessenger`.

7 weeks agoAdd DNS(SEC) query and proof messages and onion message handler
Matt Corallo [Mon, 30 Sep 2024 16:16:36 +0000 (16:16 +0000)]
Add DNS(SEC) query and proof messages and onion message handler

This creates the initial DNSSEC proof and query messages in a new
module in `onion_message`, as well as a new message handler to
handle them.

In the coming commits, a default implementation will be added which
verifies DNSSEC proofs which can be used to resolve BIP 353 URIs
without relying on anything outside of the lightning network.

7 weeks agoAdd a `MessageContext::DNSResolution` to protect against probing
Matt Corallo [Mon, 30 Sep 2024 14:45:36 +0000 (14:45 +0000)]
Add a `MessageContext::DNSResolution` to protect against probing

When we make a DNSSEC query with a reply path, we don't want to
allow the DNS resolver to attempt to respond to various nodes to
try to detect (through timining or other analysis) whether we were
the one who made the query. Thus, we need to include a nonce in the
context in our reply path, which we set up here by creating a new
context type for DNS resolutions.

8 weeks agoMerge pull request #3341 from TheBlueMatt/2024-09-gossip-rustfmt-cleanup
Matt Corallo [Fri, 27 Sep 2024 00:53:08 +0000 (00:53 +0000)]
Merge pull request #3341 from TheBlueMatt/2024-09-gossip-rustfmt-cleanup

Minor `gossip.rs` `rustfmt` cleanups

8 weeks agoMinor `gossip.rs` `rustfmt` cleanups 2024-09-gossip-rustfmt-cleanup
Matt Corallo [Thu, 26 Sep 2024 06:05:22 +0000 (06:05 +0000)]
Minor `gossip.rs` `rustfmt` cleanups

Just a few minor updates to `gossip.rs` to reduce code verticality
and simplify things a bit.

8 weeks agoMerge pull request #3336 from tnull/2024-09-rustfmt-router
valentinewallace [Wed, 25 Sep 2024 04:20:36 +0000 (13:20 +0900)]
Merge pull request #3336 from tnull/2024-09-rustfmt-router

`rustfmt`: Run on the `routing` directory (1/3)

8 weeks agoMerge pull request #3334 from arik-so/lint_fixes
Elias Rohrer [Wed, 25 Sep 2024 02:16:08 +0000 (11:16 +0900)]
Merge pull request #3334 from arik-so/lint_fixes

Fix linter complaints

8 weeks ago`rustfmt`: Drop `routing/gossip.rs` from exclusion list
Elias Rohrer [Tue, 24 Sep 2024 04:51:52 +0000 (13:51 +0900)]
`rustfmt`: Drop `routing/gossip.rs` from exclusion list

8 weeks ago`rustfmt`: Run on `routing/gossip.rs`
Elias Rohrer [Tue, 24 Sep 2024 04:51:52 +0000 (13:51 +0900)]
`rustfmt`: Run on `routing/gossip.rs`

8 weeks agoSuppress linter warnings
Arik Sosman [Tue, 24 Sep 2024 04:38:31 +0000 (13:38 +0900)]
Suppress linter warnings

Allow `map_err` and `dependency_on_unit_never_type_fallback` pending
a future MSRV increase.

8 weeks agoMerge pull request #3303 from TheBlueMatt/2024-09-inbound-payment-id
Elias Rohrer [Tue, 24 Sep 2024 04:38:16 +0000 (13:38 +0900)]
Merge pull request #3303 from TheBlueMatt/2024-09-inbound-payment-id

Add a `PaymentId` for inbound payments

8 weeks agoMerge pull request #3310 from TheBlueMatt/2024-09-unlocked-checksig
Matt Corallo [Tue, 24 Sep 2024 03:13:51 +0000 (03:13 +0000)]
Merge pull request #3310 from TheBlueMatt/2024-09-unlocked-checksig

Validate `channel_update` signatures without holding a graph lock

8 weeks agoMerge pull request #3326 from jkczyz/2024-09-split-router
Elias Rohrer [Tue, 24 Sep 2024 02:47:45 +0000 (11:47 +0900)]
Merge pull request #3326 from jkczyz/2024-09-split-router

Decouple `MessageRouter` from `Router`

8 weeks agoValidate `channel_update` signatures without holding a graph lock 2024-09-unlocked-checksig
Matt Corallo [Wed, 11 Sep 2024 23:36:29 +0000 (23:36 +0000)]
Validate `channel_update` signatures without holding a graph lock

We often process many gossip messages in parallel across different
peer connections, making the `NetworkGraph` mutexes fairly
contention-sensitive (not to mention the potential that we want to
send a payment and need to find a path to do so).

Because we need to look up a node's public key to validate a
signature on `channel_update` messages, we always need to take a
`NetworkGraph::channels` lock before we can validate the message.

For simplicity, and to avoid taking a lock twice, we'd always
validated the `channel_update` signature while holding the same
lock, but here we address the contention issues by doing a
`channel_update` validation in three stages.

First we take a read lock on `NetworkGraph::channels` and check if
the `channel_update` is new, then release the lock and validate the
message signature, and finally take a write lock, (re-check if the
`channel_update` is new) and update the graph.

8 weeks agoDe-couple MessageRouter from Router
Jeffrey Czyz [Wed, 18 Sep 2024 17:40:48 +0000 (12:40 -0500)]
De-couple MessageRouter from Router

Now that ChannelManager is parameterized by both a MessageRouter and a
Router, Router implementations no longer need to implement
MessageRouter, too.

8 weeks agoExpand DefaultRouter's privacy docs
Jeffrey Czyz [Wed, 18 Sep 2024 17:06:26 +0000 (12:06 -0500)]
Expand DefaultRouter's privacy docs

DefaultRouter::create_blinded_payment_paths may creat a one-hop blinded
path with the recipient as the introduction node. Update the privacy
section of DefaultRouter's docs to indicate this as is done in the docs
for DefaultMessageRouter.

8 weeks agoParameterize ChannelManager with MessageRouter
Jeffrey Czyz [Wed, 18 Sep 2024 16:52:38 +0000 (11:52 -0500)]
Parameterize ChannelManager with MessageRouter

ChannelManager is parameterized by a Router, which must also implement
MessageRouter. Instead, add a MessageRouter parameter such that the
Router and MessageRouter traits can be de-coupled. This simplifies using
something other than DefaultMessageRouter, which DefaultRouter currently
delegates to.

8 weeks agoAdd a `PaymentId` for inbound payments 2024-09-inbound-payment-id
Matt Corallo [Thu, 12 Sep 2024 18:36:58 +0000 (18:36 +0000)]
Add a `PaymentId` for inbound payments

We expect our users to have fully idempotent `Event` handling as we
may replay events on restart for one of a number of reasons. This
isn't a big deal as long as all our events have some kind of
identifier users can use to check if the `Event` has already been
handled.

For outbound payments, this is the `PaymentId` they provide in the
send methods, however for inbound payments we don't have a great
option.

`PaymentHash` largely suffices - users can simply always claim in
response to a `PaymentClaimable` of sufficient value and treat a
`PaymentClaimed` event as duplicate any time they see a second one
for the same `PaymentHash`. This mostly works, but may result in
accepting duplicative payments if someone (incorrectly) pays twice
for the same `PaymentHash`.

Users could also fail for duplicative `PaymentClaimable` events of
the same `PaymentHash`, but doing so may result in spuriously
failing a payment if the `PaymentClaimable` event is a replay and
they never saw a corresponding `PaymentClaimed` event.

While none of this will result in spuriously thinking they've been
paid when they have not, it does result in some pretty awkward
semantics which we'd rather avoid our users having to deal with.

Instead, here, we add a new `PaymentId` which is simply an HMAC of
the HTLCs (as Channel ID, HTLC ID pairs) which were included in the
payment.

8 weeks agoAdd an `inbound_payment_id_secret` to `ChannelManager`
Matt Corallo [Sun, 8 Sep 2024 16:38:22 +0000 (16:38 +0000)]
Add an `inbound_payment_id_secret` to `ChannelManager`

In the next commit we'll start generating `PaymentId`s for inbound
payments randomly by HMAC'ing the HTLC set of the payment. Here we
start by defining the HMAC secret for these HMACs.

This requires one small test adaptation and a full_stack_target
fuzz change because it changes the RNG consumption.

8 weeks agoDo not check the ordering of HTLCs in `PaymentClaim[able,ed]`
Matt Corallo [Sun, 8 Sep 2024 16:09:12 +0000 (16:09 +0000)]
Do not check the ordering of HTLCs in `PaymentClaim[able,ed]`

In the next commit we'll change the order of HTLCs in
`PaymentClaim[able,ed]` events. This shouldn't break anything, but
our current functional tests check that the HTLCs are provided in
the order they expect (the order they were received). Instead, here
we only validate that each claimed HTLC matches one expected path.

2 months ago`rustfmt`: Drop `util/persist.rs` from exclusion list
Elias Rohrer [Wed, 18 Sep 2024 07:40:36 +0000 (09:40 +0200)]
`rustfmt`: Drop `util/persist.rs` from exclusion list

2 months ago`rustfmt`: Run on `util/persist.rs`
Elias Rohrer [Wed, 18 Sep 2024 07:40:36 +0000 (09:40 +0200)]
`rustfmt`: Run on `util/persist.rs`

2 months ago`rustfmt`: Prepare `util/persist.rs`
Elias Rohrer [Thu, 19 Sep 2024 07:58:02 +0000 (09:58 +0200)]
`rustfmt`: Prepare `util/persist.rs`

2 months ago`rustfmt`: Run on `util/message_signing.rs`
Elias Rohrer [Wed, 18 Sep 2024 07:40:27 +0000 (09:40 +0200)]
`rustfmt`: Run on `util/message_signing.rs`

2 months ago`rustfmt`: Drop `util/macro_logger.rs` from exclusion list
Elias Rohrer [Wed, 18 Sep 2024 07:40:21 +0000 (09:40 +0200)]
`rustfmt`: Drop `util/macro_logger.rs` from exclusion list

2 months ago`rustfmt`: Run on `util/macro_logger.rs`
Elias Rohrer [Wed, 18 Sep 2024 07:40:21 +0000 (09:40 +0200)]
`rustfmt`: Run on `util/macro_logger.rs`

2 months ago`rustfmt`: Drop `util/logger.rs` from exclusion list
Elias Rohrer [Wed, 18 Sep 2024 07:40:16 +0000 (09:40 +0200)]
`rustfmt`: Drop `util/logger.rs` from exclusion list