]> git.bitcoin.ninja Git - rust-lightning/log
rust-lightning
11 months agoRemove unused Taproot import.
Arik Sosman [Wed, 29 Nov 2023 00:18:35 +0000 (16:18 -0800)]
Remove unused Taproot import.

11 months agoMove validate_counterparty_revocation to ChannelSigner.
Arik Sosman [Wed, 29 Nov 2023 00:14:09 +0000 (16:14 -0800)]
Move validate_counterparty_revocation to ChannelSigner.

11 months agoRemove superfluous commitment_number parameter.
Arik Sosman [Wed, 29 Nov 2023 00:11:15 +0000 (16:11 -0800)]
Remove superfluous commitment_number parameter.

11 months agoGate Taproot-related todos behind cfg flag.
Arik Sosman [Wed, 29 Nov 2023 00:08:10 +0000 (16:08 -0800)]
Gate Taproot-related todos behind cfg flag.

11 months agoMerge pull request #2512 from arik-so/taproot/2023-08-taproot-signer-variant
Matt Corallo [Tue, 28 Nov 2023 18:10:53 +0000 (18:10 +0000)]
Merge pull request #2512 from arik-so/taproot/2023-08-taproot-signer-variant

Taproot signer variant

11 months agoMerge pull request #2749 from TheBlueMatt/2023-11-2744-followups
Wilmer Paulino [Tue, 28 Nov 2023 16:56:25 +0000 (08:56 -0800)]
Merge pull request #2749 from TheBlueMatt/2023-11-2744-followups

Add `channel_keys_id` to `SpendableOutputDescriptor::StaticOutput`

11 months agoMove ECDSA-specific signers into ecdsa.rs
Arik Sosman [Mon, 28 Aug 2023 23:06:41 +0000 (16:06 -0700)]
Move ECDSA-specific signers into ecdsa.rs

To separate out the logic in the `sign` module, which will start to be
convoluted with multiple signer types, we're splitting out each signer
type into its own submodule, following the taproot.rs example from a
previous commit.

11 months agoReparametrize ChannelSignerType by SignerProvider.
Arik Sosman [Mon, 6 Nov 2023 05:51:15 +0000 (21:51 -0800)]
Reparametrize ChannelSignerType by SignerProvider.

ChannelSignerType is an enum that contains variants of all currently
supported signer types. Given that those signer types are enumerated
as associated types in multiple places, it is prudent to denote one
type as the authority on signer types.

SignerProvider seemed like the best option. Thus, instead of
ChannelSignerType declaring the associated types itself, it simply
uses their definitions from SignerProvider.

11 months agoAdd TaprootSigner variant to SignerProvider.
Arik Sosman [Mon, 6 Nov 2023 05:36:59 +0000 (21:36 -0800)]
Add TaprootSigner variant to SignerProvider.

Previously, SignerProvider was not laid out to support multiple signer
types. However, with the distinction between ECDSA and Taproot signers,
we now need to account for SignerProviders needing to support both.

This approach does mean that if ever we introduced another signer type
in the future, all implementers of SignerProvider would need to add it
as an associated type, and would also need to write a set of dummy
implementations for any Signer trait they do not wish to support.

For the time being, the TaprootSigner associated type is cfg-gated.

11 months agoIntroduce TaprootSigner trait.
Arik Sosman [Sun, 7 May 2023 04:13:53 +0000 (21:13 -0700)]
Introduce TaprootSigner trait.

For Taproot support, we need to define an alternative trait to
EcdsaChannelSigner. This trait will be implemented by all signers
that wish to support Taproot channels.

11 months agoRename SignerProvider's Signer to EcdsaSigner.
Arik Sosman [Tue, 22 Aug 2023 05:37:58 +0000 (22:37 -0700)]
Rename SignerProvider's Signer to EcdsaSigner.

11 months agoAdd `channel_keys_id` to `SpendableOutputDescriptor::StaticOutput` 2023-11-2744-followups
Matt Corallo [Mon, 27 Nov 2023 21:37:42 +0000 (21:37 +0000)]
Add `channel_keys_id` to `SpendableOutputDescriptor::StaticOutput`

In 7f0fd868ad4e8072440f1eb79e78894de1629157, `channel_keys_id` was
added as an argument to `SignerProvider::get_destination_script`,
allowing implementors to generate a new script for each channel.

This is great, however users then have no way to re-derive the
corresponding private key when they ultimately receive a
`SpendableOutputDescriptor::StaticOutput`. Instead, they have to
track all the addresses as they derive them separately. In many
cases this is fine, but we should support both deployments, which
we do here by simply including the missing `channel_keys_id` for
the user.

11 months agoMerge pull request #2744 from rmalonson/destinationscript
Wilmer Paulino [Mon, 27 Nov 2023 20:20:19 +0000 (12:20 -0800)]
Merge pull request #2744 from rmalonson/destinationscript

Add channel_keys_id as param in get_destination_script to support gen…

11 months agoMerge pull request #2675 from yellowred/delayed_payment_key_types
Matt Corallo [Mon, 27 Nov 2023 18:57:37 +0000 (18:57 +0000)]
Merge pull request #2675 from yellowred/delayed_payment_key_types

Implement struct wrappers for Payment, DelayedPayment, HTLC and Revocation channel keys

11 months agoAdd channel_keys_id as param in get_destination_script
Rachel Malonson [Wed, 22 Nov 2023 20:24:20 +0000 (12:24 -0800)]
Add channel_keys_id as param in get_destination_script

This enables implementers to generate a different destination script for each channel.

11 months agoImplement struct wrappers for channel key types to avoid confusion.
olegkubrakov [Tue, 14 Nov 2023 18:08:25 +0000 (10:08 -0800)]
Implement struct wrappers for channel key types to avoid confusion.

Currently all channel keys and their basepoints exist uniformly as
`PublicKey` type, which not only makes in harder for a developer to
distinguish those entities, but also does not engage the language
type system to check if the correct key is being used in any
particular function.

Having struct wrappers around keys also enables more nuanced
semantics allowing to express Lightning Protocol rules in language.
For example, the code allows to derive `HtlcKey` from
`HtlcBasepoint` and not from `PaymentBasepoint`.

This change is transparent for channel monitors that will use the
internal public key of a wrapper.

Payment, DelayedPayment, HTLC and Revocation basepoints and their
derived keys are now wrapped into a specific struct that make it
distinguishable for the Rust type system. Functions that require a
specific key or basepoint should not use generic Public Key, but
require a specific key wrapper struct to engage Rust type
verification system and make it more clear for developers which
key is used.

11 months agoMerge pull request #2685 from tnull/2022-12-add-electrum-sync
Matt Corallo [Mon, 27 Nov 2023 17:10:00 +0000 (17:10 +0000)]
Merge pull request #2685 from tnull/2022-12-add-electrum-sync

Add electrum support to `lightning-transaction-sync`

11 months agoMerge pull request #2741 from shaavan/issue-2215
Elias Rohrer [Mon, 27 Nov 2023 12:13:08 +0000 (13:13 +0100)]
Merge pull request #2741 from shaavan/issue-2215

Explicitly reject routes that double-back

11 months agoMerge pull request #2746 from TheBlueMatt/2023-11-bitcoin-0.30-followups
Elias Rohrer [Mon, 27 Nov 2023 11:53:17 +0000 (12:53 +0100)]
Merge pull request #2746 from TheBlueMatt/2023-11-bitcoin-0.30-followups

Drop panic if rust-bitcoin adds a new Network

11 months agoRemove now-redundant checks in BOLT12 `Invoice` fallback addresses 2023-11-bitcoin-0.30-followups
Matt Corallo [Sun, 26 Nov 2023 19:09:06 +0000 (19:09 +0000)]
Remove now-redundant checks in BOLT12 `Invoice` fallback addresses

Now that we use the `rust-bitcoin` `WitnessProgram` to check our
addresses, we can just rely on it, rather than checking the program
length and version.

11 months agoDrop panic if `rust-bitcoin` adds a new `Network`
Matt Corallo [Sun, 26 Nov 2023 19:07:10 +0000 (19:07 +0000)]
Drop panic if `rust-bitcoin` adds a new `Network`

`rust-bitcoin` 0.30 added `#[non_exhaustive]` to the `Network`
enum, allowing them to "add support" for a new network type without
a major version change in the future. When upgrading, we added a
simple `unreachable` for the general match arm, which would break
in a minor version change of `rust-bitcoin`.

While it seems [possible rust-bitcoin will change
this](https://github.com/rust-bitcoin/rust-bitcoin/issues/2225),
we still shouldn't ba panicking, which we drop here in favor of a
`debug_assert`ion, and a default value.

11 months agoAdd test for PathParameterError introduced in previous commit
shaavan [Fri, 24 Nov 2023 12:20:23 +0000 (17:50 +0530)]
Add test for PathParameterError introduced in previous commit

- Also modify the unwrap_send_err!() macro to handle the
  PathParameterError

11 months agoUse `esplora-client`'s `async-https-rustls` feature
Elias Rohrer [Fri, 24 Nov 2023 11:48:22 +0000 (12:48 +0100)]
Use `esplora-client`'s `async-https-rustls` feature

Now that we upgraded `esplora-client` to 0.6 we can use
`async-https-rustls` instead of manually overriding the `reqwest`
dependency.

12 months agoDRY up Esplora/Electrum `integration_tests`
Elias Rohrer [Mon, 13 Nov 2023 10:29:04 +0000 (11:29 +0100)]
DRY up Esplora/Electrum `integration_tests`

12 months agoAdd Electrum integration test
Elias Rohrer [Thu, 16 Nov 2023 11:04:14 +0000 (12:04 +0100)]
Add Electrum integration test

12 months agoImplement `ElectrumSyncClient`
Elias Rohrer [Mon, 23 Oct 2023 08:26:00 +0000 (10:26 +0200)]
Implement `ElectrumSyncClient`

12 months agoSet `pending_sync` when last-minute check fails in Esplora
Elias Rohrer [Thu, 16 Nov 2023 10:56:17 +0000 (11:56 +0100)]
Set `pending_sync` when last-minute check fails in Esplora

12 months agoMove `sync_` methods to `SyncState`
Elias Rohrer [Tue, 7 Nov 2023 08:21:40 +0000 (09:21 +0100)]
Move `sync_` methods to `SyncState`

12 months agoImprove `EsploraSyncClient` test coverage
Elias Rohrer [Wed, 25 Oct 2023 11:58:47 +0000 (13:58 +0200)]
Improve `EsploraSyncClient` test coverage

In particular, we now test `register_output` functionality, too.

12 months agoImprove `EsploraSyncClient` logging
Elias Rohrer [Wed, 25 Oct 2023 09:27:05 +0000 (11:27 +0200)]
Improve `EsploraSyncClient` logging

We give some more information while reducing the log levels to make the
logging less spammy.

We also convert one safe-to-unwrap case from returning an error to
unwrapping the value.

12 months agoUse upstream `TestLogger` util in tx sync tests
Elias Rohrer [Wed, 25 Oct 2023 08:59:13 +0000 (10:59 +0200)]
Use upstream `TestLogger` util in tx sync tests

12 months agoReturn confirmation height via `Confirm::get_relevant_txids`
Elias Rohrer [Mon, 13 Nov 2023 10:00:41 +0000 (11:00 +0100)]
Return confirmation height via `Confirm::get_relevant_txids`

We previously included the block hash, but it's also useful to include
the height under which we expect the respective transaction to be
confirmed.

12 months agoMerge pull request #2740 from wpaulino/rust-bitcoin-30-update
Elias Rohrer [Thu, 23 Nov 2023 08:28:41 +0000 (09:28 +0100)]
Merge pull request #2740 from wpaulino/rust-bitcoin-30-update

Update to rust-bitcoin v0.30.2

12 months agoRemove nightly warnings
Wilmer Paulino [Tue, 21 Nov 2023 01:05:52 +0000 (17:05 -0800)]
Remove nightly warnings

12 months agoBump rust-bitcoin to v0.30.2
Wilmer Paulino [Thu, 27 Apr 2023 07:16:40 +0000 (00:16 -0700)]
Bump rust-bitcoin to v0.30.2

12 months agoExplicitly reject routes that double-back
shaavan [Tue, 21 Nov 2023 14:41:46 +0000 (20:11 +0530)]
Explicitly reject routes that double-back

- If a path within a route passes through the same channelID twice,
  that shows the path is looped and will be rejected by nodes.
- Add a check to explicitly reject such payment before trying to send
  them.

12 months agoMerge pull request #2700 from Evanfeenstra/pub-htlc-routing
Matt Corallo [Thu, 16 Nov 2023 17:02:05 +0000 (17:02 +0000)]
Merge pull request #2700 from Evanfeenstra/pub-htlc-routing

peel_payment_onion static fn in channelmanager

12 months agoMerge pull request #2730 from benthecarman/invoice-utils
Matt Corallo [Wed, 15 Nov 2023 22:01:33 +0000 (22:01 +0000)]
Merge pull request #2730 from benthecarman/invoice-utils

Add some public utilities to `lightning_invoice`

12 months agoInboundOnionErr fields public
Evan Feenstra [Wed, 15 Nov 2023 21:08:56 +0000 (13:08 -0800)]
InboundOnionErr fields public

12 months agoHave Invoice Description use UntrustedString
benthecarman [Tue, 14 Nov 2023 16:14:30 +0000 (10:14 -0600)]
Have Invoice Description use UntrustedString

12 months agoMake invoice fields public
benthecarman [Fri, 10 Nov 2023 22:12:43 +0000 (16:12 -0600)]
Make invoice fields public

12 months agoMerge pull request #2696 from TheBlueMatt/2023-10-no-chan-feerate-upper-bound
Elias Rohrer [Wed, 15 Nov 2023 09:25:06 +0000 (10:25 +0100)]
Merge pull request #2696 from TheBlueMatt/2023-10-no-chan-feerate-upper-bound

Drop non-anchor channel fee upper bound limit entirely

12 months agoMerge pull request #2727 from TheBlueMatt/2023-11-better-bolt11-utils
Gursharan Singh [Tue, 14 Nov 2023 21:37:29 +0000 (13:37 -0800)]
Merge pull request #2727 from TheBlueMatt/2023-11-better-bolt11-utils

Replace maze of BOLT11 payment utilities with parameter generators

12 months agoremove obsolete comment
Evan Feenstra [Tue, 14 Nov 2023 19:56:31 +0000 (11:56 -0800)]
remove obsolete comment

12 months agopeel_payment_onion static fn in channelmanager
Evan Feenstra [Tue, 31 Oct 2023 23:51:14 +0000 (16:51 -0700)]
peel_payment_onion static fn in channelmanager

12 months agoMerge pull request #2529 from TheBlueMatt/2023-08-shutdown-remove-early-sign
Matt Corallo [Tue, 14 Nov 2023 19:09:46 +0000 (19:09 +0000)]
Merge pull request #2529 from TheBlueMatt/2023-08-shutdown-remove-early-sign

Don't send init `closing_signed` too early after final HTLC removal

12 months agoMerge pull request #2726 from shaavan/issue2712
Matt Corallo [Tue, 14 Nov 2023 17:57:19 +0000 (17:57 +0000)]
Merge pull request #2726 from shaavan/issue2712

Log the error, when trying to forward the intercepted HTLC, but the channel is not found

12 months agoLog the error, when trying to forward the intercepted HTLC, but the
shaavan [Fri, 10 Nov 2023 12:50:16 +0000 (18:20 +0530)]
Log the error, when trying to forward the intercepted HTLC, but the

channel is not found

12 months agoMerge pull request #2716 from TheBlueMatt/2023-11-hash-if-eq
Elias Rohrer [Tue, 14 Nov 2023 07:50:38 +0000 (08:50 +0100)]
Merge pull request #2716 from TheBlueMatt/2023-11-hash-if-eq

`derive(Hash)` for P2P messages

12 months ago`derive(Hash)` for P2P messages 2023-11-hash-if-eq
Matt Corallo [Mon, 13 Nov 2023 22:50:40 +0000 (22:50 +0000)]
`derive(Hash)` for P2P messages

In other languages (Java and C#, notably), overriding `Eq` without
overriding `Hash` can lead to surprising or broken behavior. Even
in Rust, its usually the case that you actually want both. Here we
add missing `Hash` derivations for P2P messages, to at least
address the first pile of warnings the C# compiler dumps.

12 months agoRely on const generic big arrays for `PartialEq` in msgs
Matt Corallo [Mon, 13 Nov 2023 22:48:48 +0000 (22:48 +0000)]
Rely on const generic big arrays for `PartialEq` in msgs

Implementation of standard traits on arrays longer than 32 elements
was shipped in rustc 1.47, which is below our MSRV of 1.48 and we
can use to remove some unnecessary manual implementation of
`PartialEq` on `OnionPacket`.

12 months agoMerge pull request #2544 from optout21/splicing-msgs0
Matt Corallo [Mon, 13 Nov 2023 22:38:51 +0000 (22:38 +0000)]
Merge pull request #2544 from optout21/splicing-msgs0

Add Splicing (and Quiescence) wire message definitions

12 months agoMerge pull request #2732 from arik-so/2023/11/update-musig2-dep
Matt Corallo [Mon, 13 Nov 2023 17:29:39 +0000 (17:29 +0000)]
Merge pull request #2732 from arik-so/2023/11/update-musig2-dep

Update MuSig2 dependency for Hash trait derivation.

12 months agoMerge pull request #2708 from TheBlueMatt/2023-11-less-graph-memory-frag
Matt Corallo [Mon, 13 Nov 2023 16:45:26 +0000 (16:45 +0000)]
Merge pull request #2708 from TheBlueMatt/2023-11-less-graph-memory-frag

Reduce common allocations across the codebase

12 months agoUpdate MuSig2 dependency for Hash trait derivation.
Arik Sosman [Mon, 13 Nov 2023 16:07:07 +0000 (11:07 -0500)]
Update MuSig2 dependency for Hash trait derivation.

12 months agoMerge pull request #2715 from valentinewallace/2023-11-skimmed-fees
Matt Corallo [Sun, 12 Nov 2023 20:27:25 +0000 (20:27 +0000)]
Merge pull request #2715 from valentinewallace/2023-11-skimmed-fees

Complete underpaying HTLCs support

12 months agoDrop old `expiry_time_from_unix_epoch` helper in expiry time lookup 2023-11-better-bolt11-utils
Matt Corallo [Sun, 12 Nov 2023 17:16:26 +0000 (17:16 +0000)]
Drop old `expiry_time_from_unix_epoch` helper in expiry time lookup

Since there's a much simpler way to go about it with
`Bolt11Invoice::expires_at`.

12 months agoMerge pull request #2722 from benthecarman/dust-overflow
Matt Corallo [Sun, 12 Nov 2023 17:03:09 +0000 (17:03 +0000)]
Merge pull request #2722 from benthecarman/dust-overflow

Fix potential cases where max_dust_htlc_exposure_msat overflows

12 months agoDon't send init `closing_signed` too early after final HTLC removal 2023-08-shutdown-remove-early-sign
Matt Corallo [Sat, 26 Aug 2023 19:59:21 +0000 (19:59 +0000)]
Don't send init `closing_signed` too early after final HTLC removal

If we remove an HTLC (or fee update), commit, and receive our
counterparty's `revoke_and_ack`, we remove all knowledge of said
HTLC (or fee update). However, the latest local commitment
transaction that we can broadcast still contains the HTLC (or old
fee), thus we are not eligible for initiating the `closing_signed`
negotiation if we're shutting down and are generally expecting a
counterparty `commitment_signed` immediately.

Because we don't have any tracking of these updates in the `Channel`
(only the `ChannelMonitor` is aware of the HTLC being in our latest
local commitment transaction), we'd previously send a
`closing_signed` too early, causing LDK<->LDK channels with an HTLC
pending towards the channel initiator at the time of `shutdown` to
always fail to cooperatively close.

To fix this race, we add an additional unpersisted bool to
`Channel` and use that to gate sending the initial `closing_signed`.

12 months agoDrop non-anchor channel fee upper bound limit entirely 2023-10-no-chan-feerate-upper-bound
Matt Corallo [Tue, 31 Oct 2023 18:39:04 +0000 (18:39 +0000)]
Drop non-anchor channel fee upper bound limit entirely

Quite a while ago we added checks for the total current dust
exposure on a channel to explicitly limit dust inflation attacks.
When we did this, we kept the existing upper bound on the channel's
feerate in place. However, these two things are redundant - the
point of the feerate upper bound is to prevent dust inflation, and
it does so in a crude way that can cause spurious force-closures.

Here we simply drop the upper bound entirely, relying on the dust
inflation limit to prevent dust inflation instead.

12 months agoImpl display for invoice fields
benthecarman [Fri, 10 Nov 2023 22:12:31 +0000 (16:12 -0600)]
Impl display for invoice fields

12 months agoReplace maze of BOLT11 payment utilities with parameter generators
Matt Corallo [Fri, 10 Nov 2023 19:23:21 +0000 (19:23 +0000)]
Replace maze of BOLT11 payment utilities with parameter generators

`lightning-invoice` was historically responsible for actually
paying invoices, handling retries and everything. However, that
turned out to be buggy and hard to maintain, so the payment logic
was eventually moved into `ChannelManager`. However, the old
utilites remain.

Because our payment logic has a number of tunable parameters and
there are different ways to pay a BOLT11 invoice, we ended up with
six different methods to pay or probe a BOLT11 invoice, with more
requested as various options still were not exposed.

Instead, here, we replace all six methods with two simple ones
which return the arguments which need to be passed to
`ChannelManager`. Those arguments can be further tweaked before
passing them on, allowing more flexibility.

12 months agoStop writing signer data as a part of channels 2023-11-less-graph-memory-frag
Matt Corallo [Sat, 4 Nov 2023 23:02:18 +0000 (23:02 +0000)]
Stop writing signer data as a part of channels

This breaks backwards compatibility with versions of LDK prior to
0.0.113 as they expect to always read signer data.

This also substantially reduces allocations during `ChannelManager`
serialization, as we currently don't pre-allocate the `Vec` that
the signer gets written in to. We could alternatively pre-allocate
that `Vec`, but we've been set up to skip the write entirely for a
while, and 0.0.113 was released nearly a year ago. Users
downgrading to LDK 0.0.112 and before at this point should not be
expected.

12 months agoAvoid allocating when checking gossip message signatures
Matt Corallo [Sat, 4 Nov 2023 22:09:44 +0000 (22:09 +0000)]
Avoid allocating when checking gossip message signatures

When we check gossip message signatures, there's no reason to
serialize out the full gossip message before hashing, and it
generates a lot of allocations during the initial startup when we
fetch the full gossip from peers.

12 months agoAvoid a `tokio::mpsc::Sender` clone for each P2P send operation
Matt Corallo [Sat, 4 Nov 2023 21:21:58 +0000 (21:21 +0000)]
Avoid a `tokio::mpsc::Sender` clone for each P2P send operation

Whenever we go to send bytes to a peer, we need to construct a
waker for tokio to call back into if we need to finish sending
later. That waker needs some reference to the peer's read task to
wake it up, hidden behind a single `*const ()`. To do this, we'd
previously simply stored a `Box<tokio::mpsc::Sender>` in that
pointer, which requires a `clone` for each waker construction. This
leads to substantial malloc traffic.

Instead, here, we replace this box with an `Arc`, leaving a single
`tokio::mpsc::Sender` floating around and simply change the
refcounts whenever we construct a new waker, which we can do
without allocations.

12 months agoAvoid re-allocating to encrypt gossip messages when forwarding
Matt Corallo [Sat, 4 Nov 2023 20:37:21 +0000 (20:37 +0000)]
Avoid re-allocating to encrypt gossip messages when forwarding

When we forward gossip messages, we store them in a separate buffer
before we encrypt them (and commit to the order in which they'll
appear on the wire). Rather than storing that buffer encoded with
no headroom, requiring re-allocating to add the message length and
two MAC blocks, we here add the headroom prior to pushing it into
the gossip buffer, avoiding an allocation.

12 months agoFix potential cases where max_dust_htlc_exposure_msat overflows
benthecarman [Thu, 9 Nov 2023 20:46:02 +0000 (14:46 -0600)]
Fix potential cases where max_dust_htlc_exposure_msat overflows

12 months agoLink to LSP spec in accept_underpaying_htlcs config
Valentine Wallace [Tue, 7 Nov 2023 20:14:27 +0000 (15:14 -0500)]
Link to LSP spec in accept_underpaying_htlcs config

12 months agoInclude counterparty skimmed fees in PaymentClaimed event.
Valentine Wallace [Tue, 7 Nov 2023 20:08:55 +0000 (15:08 -0500)]
Include counterparty skimmed fees in PaymentClaimed event.

12 months agoMerge pull request #2702 from G8XSU/libFuzzer
Matt Corallo [Tue, 7 Nov 2023 18:16:49 +0000 (18:16 +0000)]
Merge pull request #2702 from G8XSU/libFuzzer

Update fuzzing instructions for libFuzzer/cargo-fuzz

12 months agoUse `VecDeque`, rather than `LinkedList` in peer message buffering
Matt Corallo [Sat, 4 Nov 2023 20:20:12 +0000 (20:20 +0000)]
Use `VecDeque`, rather than `LinkedList` in peer message buffering

When buffering outbound messages for peers, `LinkedList` adds
rather substantial allocation overhead, which we avoid here by
swapping for a `VecDeque`.

12 months agoAvoid unnecessarily alloc'ing a new buffer when decrypting messages
Matt Corallo [Mon, 6 Nov 2023 16:57:13 +0000 (16:57 +0000)]
Avoid unnecessarily alloc'ing a new buffer when decrypting messages

When decrypting P2P messages, we already have a read buffer that we
read the message into. There's no reason to allocate a new `Vec` to
store the decrypted message when we can just overwrite the read
buffer and call it a day.

12 months agoAdd an option to in-place decrypt with `ChaCha20Poly1305`
Matt Corallo [Sat, 4 Nov 2023 20:39:03 +0000 (20:39 +0000)]
Add an option to in-place decrypt with `ChaCha20Poly1305`

In the next commit we'll use this to avoid an allocation when
deserializing messages from the wire.

12 months agoMerge pull request #2714 from TheBlueMatt/2023-11-one-less-alloc
Jeffrey Czyz [Tue, 7 Nov 2023 13:43:26 +0000 (07:43 -0600)]
Merge pull request #2714 from TheBlueMatt/2023-11-one-less-alloc

Avoid an unnecessary allocation in `TaggedHash`

12 months agoAdd Splicing (and Quiescence) wire message definitions
optout [Tue, 7 Nov 2023 11:12:20 +0000 (12:12 +0100)]
Add Splicing (and Quiescence) wire message definitions

12 months agoAvoid an unnecessary allocation in `TaggedHash` 2023-11-one-less-alloc
Matt Corallo [Tue, 7 Nov 2023 05:07:09 +0000 (05:07 +0000)]
Avoid an unnecessary allocation in `TaggedHash`

A well-formed tag is always a constant, so allocating to store it
is unnecessary when we can just make the tag a `&'static str`.

12 months agoMerge pull request #2687 from orbitalturtle/signature-data-enum
Matt Corallo [Tue, 7 Nov 2023 05:04:48 +0000 (05:04 +0000)]
Merge pull request #2687 from orbitalturtle/signature-data-enum

Expose more granular data in TaggedHash struct

12 months agoMerge pull request #2677 from Evanfeenstra/public-onion-utils
Matt Corallo [Tue, 7 Nov 2023 04:41:03 +0000 (04:41 +0000)]
Merge pull request #2677 from Evanfeenstra/public-onion-utils

public create_payment_onion in onion_utils

12 months agoPre-allocate the full `Vec` prior to serializing as a `Vec<u8>`
Matt Corallo [Sat, 4 Nov 2023 21:01:18 +0000 (21:01 +0000)]
Pre-allocate the full `Vec` prior to serializing as a `Vec<u8>`

We end up generating a substantial amount of allocations just
doubling `Vec`s when serializing to them, and our
`serialized_length` method is generally rather effecient, so we
just rely on it and allocate correctly up front.

12 months agoexpose more granular data in TaggedHash struct
Orbital [Thu, 26 Oct 2023 03:10:35 +0000 (22:10 -0500)]
expose more granular data in TaggedHash struct

Expose tag and merkle root fields in the TaggedHash struct.

12 months agorefactor to remove message_digest
Orbital [Fri, 3 Nov 2023 00:50:20 +0000 (19:50 -0500)]
refactor to remove message_digest

We change the Bolt12Invoice struct to carry a tagged hash. Because
message_digest is then only used in one place, we can inline it in
the TaggedHash constructor.

12 months agoUpdate fuzzing instructions for libFuzzer/cargo-fuzz
Gursharan Singh [Fri, 3 Nov 2023 00:45:38 +0000 (17:45 -0700)]
Update fuzzing instructions for libFuzzer/cargo-fuzz

12 months agoexport create_onion_message and peel_onion_message from ln::onion_message
Evan Feenstra [Mon, 6 Nov 2023 18:42:50 +0000 (10:42 -0800)]
export create_onion_message and peel_onion_message from ln::onion_message

12 months agopublic create_payment_onion in onion_utils
Evan Feenstra [Sat, 28 Oct 2023 22:10:00 +0000 (15:10 -0700)]
public create_payment_onion in onion_utils

12 months agoMerge pull request #2699 from mhrheaume/mhr/temporary_channel_id
Matt Corallo [Sun, 5 Nov 2023 05:35:40 +0000 (05:35 +0000)]
Merge pull request #2699 from mhrheaume/mhr/temporary_channel_id

Added `temporary_channel_id` to `create_channel`.

12 months agoAvoid unnecessarily overriding `serialized_length`
Matt Corallo [Sat, 4 Nov 2023 16:21:29 +0000 (16:21 +0000)]
Avoid unnecessarily overriding `serialized_length`

...as LLVM will handle it just fine for us, in most cases.

12 months agoPre-allocate send buffer when forwarding gossip
Matt Corallo [Sat, 4 Nov 2023 16:20:51 +0000 (16:20 +0000)]
Pre-allocate send buffer when forwarding gossip

When forwarding gossip, rather than relying on Vec doubling,
pre-allocate the message encoding buffer.

12 months agoPrefer `Writeable.encode()` over `VecWriter` use
Matt Corallo [Sat, 4 Nov 2023 16:20:24 +0000 (16:20 +0000)]
Prefer `Writeable.encode()` over `VecWriter` use

It does the same thing and its much simpler.

12 months agoReduce on-startup heap frag due to network graph map/vec doubling
Matt Corallo [Sat, 4 Nov 2023 03:53:46 +0000 (03:53 +0000)]
Reduce on-startup heap frag due to network graph map/vec doubling

When we're reading a `NetworkGraph`, we know how many
nodes/channels we are reading, there's no reason not to
pre-allocate the `IndexedMap`'s inner `HashMap` and `Vec`, which we
do here.

This seems to reduce on-startup heap fragmentation with glibc by
something like 100MiB.

12 months agoAdded `temporary_channel_id` to `create_channel`.
Matthew Rheaume [Tue, 31 Oct 2023 22:36:11 +0000 (15:36 -0700)]
Added `temporary_channel_id` to `create_channel`.

By default, LDK will generate the initial temporary channel ID for you.
However, in certain cases, it's desirable to have a temporary channel ID
specified by the caller in case of any pre-negotiation that needs to
happen between peers prior to the channel open message. For example, LND
has a `FundingShim` API that allows for advanced funding flows based on
the temporary channel ID of the channel.

This patch adds support for optionally specifying the temporary channel
ID of the channel through the `create_channel` API.

12 months agoMerge pull request #2558 from waterson/pr-2554
Matt Corallo [Thu, 2 Nov 2023 19:04:05 +0000 (19:04 +0000)]
Merge pull request #2558 from waterson/pr-2554

Handle retrying sign_counterparty_commitment failures

12 months agoMerge pull request #2641 from alexanderwiederin/2585-preflight-test-coverage
Elias Rohrer [Thu, 2 Nov 2023 08:50:21 +0000 (09:50 +0100)]
Merge pull request #2641 from alexanderwiederin/2585-preflight-test-coverage

#2585 Preflight Test Coverage

12 months agoAdd basic async signer tests
Chris Waterson [Wed, 6 Sep 2023 18:38:34 +0000 (11:38 -0700)]
Add basic async signer tests

Adds a `get_signer` method to the context so that a test can get ahold of the
channel signer. Adds a `set_available` method on the `TestChannelSigner` to
allow a test to enable and disable the signer: when disabled some of the
signer's methods will return `Err` which will typically activate the error
handling case. Adds a `set_channel_signer_available` function on the test
`Node` class to make it easy to enable and disable a specific signer.

Adds a new `async_signer_tests` module:

* Check for asynchronous handling of `funding_created` and `funding_signed`.
* Check that we correctly resume processing after awaiting an asynchronous
  signature for a `commitment_signed` event.
* Verify correct handling during peer disconnect.
* Verify correct handling for inbound zero-conf.

12 months agoHandle retrying sign_counterparty_commitment inb funding failures
Matt Corallo [Tue, 5 Sep 2023 22:21:04 +0000 (22:21 +0000)]
Handle retrying sign_counterparty_commitment inb funding failures

If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

This commit adds retrying of inbound funding_created signing
failures, regenerating the `FundingSigned` message, attempting to
re-sign, and sending it to our peers if we succeed.

12 months agoHandle retrying sign_counterparty_commitment outb funding failures
Matt Corallo [Tue, 5 Sep 2023 22:10:34 +0000 (22:10 +0000)]
Handle retrying sign_counterparty_commitment outb funding failures

If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

This commit adds retrying of outbound funding_created signing
failures, regenerating the `FundingCreated` message, attempting to
re-sign, and sending it to our peers if we succeed.

12 months agoHandle retrying sign_counterparty_commitment failures
Matt Corallo [Tue, 5 Sep 2023 22:06:53 +0000 (22:06 +0000)]
Handle retrying sign_counterparty_commitment failures

If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

This commit adds initial retrying of failures, specifically
regenerating commitment updates, attempting to re-sign the
`CommitmentSigned` message, and sending it to our peers if we
succed.

12 months agoHandle sign_counterparty_commitment failing during inb funding
Matt Corallo [Tue, 5 Sep 2023 21:13:07 +0000 (21:13 +0000)]
Handle sign_counterparty_commitment failing during inb funding

If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

Here we add initial handling of sign_counterparty_commitment
failing during inbound channel funding, setting a flag in
`ChannelContext` which indicates we should retry sending the
`funding_signed` later. We don't yet add any ability to do that
retry.

12 months agoHandle sign_counterparty_commitment failing during outb funding
Matt Corallo [Tue, 5 Sep 2023 21:06:22 +0000 (21:06 +0000)]
Handle sign_counterparty_commitment failing during outb funding

If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending which required the signature later,
rather than force-closing the channel (which probably won't even
work if the signer is missing).

Here we add initial handling of sign_counterparty_commitment
failing during outbound channel funding, setting a new flag in
`ChannelContext` which indicates we should retry sending the
`funding_created` later. We don't yet add any ability to do that
retry.

12 months agoHandling for sign_counterparty_commitment failing during normal op
Matt Corallo [Tue, 5 Sep 2023 20:46:28 +0000 (20:46 +0000)]
Handling for sign_counterparty_commitment failing during normal op

If sign_counterparty_commitment fails (i.e. because the signer is
temporarily disconnected), this really indicates that we should
retry the message sending later, rather than force-closing the
channel (which probably won't even work if the signer is missing).

Here we add initial handling of sign_counterparty_commitment
failing during normal channel operation, setting a new flag in
`ChannelContext` which indicates we should retry sending the
commitment update later. We don't yet add any ability to do that
retry.

12 months agoMerge pull request #2682 from jkczyz/2023-09-bolt12-test-vectors
valentinewallace [Wed, 1 Nov 2023 18:34:29 +0000 (14:34 -0400)]
Merge pull request #2682 from jkczyz/2023-09-bolt12-test-vectors

BOLT 12 Offer test vectors