]> git.bitcoin.ninja Git - rust-lightning/log
rust-lightning
10 months agoAssert we never write channels in pre-funded/shutdown state
Wilmer Paulino [Fri, 8 Dec 2023 18:44:44 +0000 (10:44 -0800)]
Assert we never write channels in pre-funded/shutdown state

10 months agoCheck funding transaction on outbound channels only
Wilmer Paulino [Fri, 8 Dec 2023 18:23:13 +0000 (10:23 -0800)]
Check funding transaction on outbound channels only

This was a slight regression, but not a critical one. Only outbound
channels should have a funding transaction present.

10 months agoSimplify ChannelState checks
Wilmer Paulino [Fri, 8 Dec 2023 18:21:29 +0000 (10:21 -0800)]
Simplify ChannelState checks

10 months agoRename should_force_holding_cell to can_generate_new_commitment
Wilmer Paulino [Fri, 8 Dec 2023 18:20:51 +0000 (10:20 -0800)]
Rename should_force_holding_cell to can_generate_new_commitment

This better reflects the intent behind the callsites of the method.

10 months agoAdd note and test regarding ChannelState's implicit ordering
Wilmer Paulino [Fri, 8 Dec 2023 18:20:20 +0000 (10:20 -0800)]
Add note and test regarding ChannelState's implicit ordering

10 months agoMerge pull request #2791 from valentinewallace/2023-12-multihop-recv-followups
Matt Corallo [Thu, 11 Jan 2024 00:04:39 +0000 (00:04 +0000)]
Merge pull request #2791 from valentinewallace/2023-12-multihop-recv-followups

Follow-ups to #2688

10 months agoMerge pull request #2809 from TheBlueMatt/2023-12-closing-event-cleanup-fixes
Matt Corallo [Wed, 10 Jan 2024 22:37:07 +0000 (22:37 +0000)]
Merge pull request #2809 from TheBlueMatt/2023-12-closing-event-cleanup-fixes

Clean Up Funding Error Handling and shutdown

10 months agoRename parameter from err_packet to err_contents.
Valentine Wallace [Wed, 13 Dec 2023 21:27:54 +0000 (16:27 -0500)]
Rename parameter from err_packet to err_contents.

This name is more accurate since the method has been generalized to support
malformed HTLCs.

10 months agoRemove outdated comment.
Valentine Wallace [Wed, 13 Dec 2023 19:23:23 +0000 (14:23 -0500)]
Remove outdated comment.

10 months agoNormalize order of (sha256_of_onion, failure_code) in trait.
Valentine Wallace [Wed, 13 Dec 2023 19:20:51 +0000 (14:20 -0500)]
Normalize order of (sha256_of_onion, failure_code) in trait.

This helps avoid destructuring the tuple.

10 months agoDRY malformed HTLC handling during htlc batch processing.
Valentine Wallace [Wed, 13 Dec 2023 19:15:58 +0000 (14:15 -0500)]
DRY malformed HTLC handling during htlc batch processing.

10 months agoFix logger usage during batched htlc processing of malforms.
Valentine Wallace [Wed, 13 Dec 2023 19:09:16 +0000 (14:09 -0500)]
Fix logger usage during batched htlc processing of malforms.

Introduced due to a rebase error.

10 months agoClean up code DRY'd in previous commit.
Valentine Wallace [Wed, 10 Jan 2024 16:19:09 +0000 (11:19 -0500)]
Clean up code DRY'd in previous commit.

10 months agoMerge pull request #2748 from TheBlueMatt/2023-11-2675-followups
Matt Corallo [Tue, 9 Jan 2024 23:22:48 +0000 (23:22 +0000)]
Merge pull request #2748 from TheBlueMatt/2023-11-2675-followups

Doc and style followups from #2675

10 months agoUpdate docs on `HTLC` and `DelayedPayment` keys for clarity 2023-11-2675-followups
Matt Corallo [Mon, 27 Nov 2023 18:52:37 +0000 (18:52 +0000)]
Update docs on `HTLC` and `DelayedPayment` keys for clarity

This also adds required linebreaks to keep the docs to a reasonable
width.

10 months agoDrop the unused `PaymentKey` type
Matt Corallo [Mon, 27 Nov 2023 18:51:13 +0000 (18:51 +0000)]
Drop the unused `PaymentKey` type

935a716cc6c4fada075e2b740a70bb1b7b349d49 added new wrappers for the
various channel keys, including a payment_key. However, the
`payment_key` has been unused in lightning since the introduction
(and broad requiring) of the `static_remotekey` feature.

Thus, we simply remove it (and an incredibly stale TODO) here.

10 months agoUpdate docs for slightly more clarity on channel key derivation
Matt Corallo [Mon, 27 Nov 2023 18:32:08 +0000 (18:32 +0000)]
Update docs for slightly more clarity on channel key derivation

10 months agoMerge pull request #2807 from Jossec101/log-errors-do-accept-inbound-channel
Matt Corallo [Tue, 9 Jan 2024 20:08:25 +0000 (20:08 +0000)]
Merge pull request #2807 from Jossec101/log-errors-do-accept-inbound-channel

Log the errors before we return them from ChannelManager::do_accept_inbound_channel

10 months agoMerge pull request #2817 from tnull/2024-01-time-in-electrum
Matt Corallo [Tue, 9 Jan 2024 16:57:16 +0000 (16:57 +0000)]
Merge pull request #2817 from tnull/2024-01-time-in-electrum

Feature-gate `time` use also in `ElectrumSyncClient`

10 months agoImproved error logging in ChannelManager::do_accept_inbound_channel
José A.P [Tue, 9 Jan 2024 10:26:14 +0000 (11:26 +0100)]
Improved error logging in ChannelManager::do_accept_inbound_channel

This refactor ensures that all API errors in do_accept_inbound_channel
are logged before they are returned.

10 months agoFeature-gate `time` use also in `ElectrumSyncClient`
Elias Rohrer [Tue, 9 Jan 2024 08:37:14 +0000 (09:37 +0100)]
Feature-gate `time` use also in `ElectrumSyncClient`

A previous commit introduced the `time` feature to gate the use of
`SystemTime` dependent APIs in `EsploraSyncClient`. It however omitted
doing the same for the Electrum side of things. Here, we address this
oversight.

10 months agoMerge pull request #2802 from TheBlueMatt/2023-12-no-pub-enum
Matt Corallo [Mon, 8 Jan 2024 21:33:00 +0000 (21:33 +0000)]
Merge pull request #2802 from TheBlueMatt/2023-12-no-pub-enum

Move `CandidateRouteHop` enum variant fields into structs

10 months agoMerge pull request #2808 from TheBlueMatt/2023-12-fuzzing-fixes-1
Matt Corallo [Mon, 8 Jan 2024 20:58:30 +0000 (20:58 +0000)]
Merge pull request #2808 from TheBlueMatt/2023-12-fuzzing-fixes-1

10 months agoFix reachable unwrap on non-channel_type manual channel acceptance 2023-12-fuzzing-fixes-1
Matt Corallo [Sun, 24 Dec 2023 17:12:10 +0000 (17:12 +0000)]
Fix reachable unwrap on non-channel_type manual channel acceptance

If we receive an `OpenChannel` message without a `channel_type`
with `manually_accept_inbound_channels` set, we will `unwrap()`
`None`.

This is uncommon these days as most nodes support `channel_type`,
but sadly is rather trivial for a peer to hit for those with manual
channel acceptance enabled.

Reported in and fixes #2804. Luckily, the updated
`full_stack_target` has no issue reaching this issue quickly.

10 months agoMerge pull request #2799 from benthecarman/tx-sync-wasm
Elias Rohrer [Mon, 8 Jan 2024 17:55:07 +0000 (18:55 +0100)]
Merge pull request #2799 from benthecarman/tx-sync-wasm

Don't call system time in no-std

10 months agoMove `CandidateRouteHop` enum variant fields into structs 2023-12-no-pub-enum
Matt Corallo [Tue, 19 Dec 2023 18:21:21 +0000 (18:21 +0000)]
Move `CandidateRouteHop` enum variant fields into structs

The bindings generator struggles a bit with the references in enum
variant fields in `CandidateRouteHop`. While we could probably fix
this, its much eaiser (and less risky) to inline the enum variant
fields from `CandidateRouteHop` into structs. This also lets us
make some of the fields non-public, which seems better at least for
the opaque `hint_idx` in the blinded paths.

10 months agoFix handling of duplicate initial `ChannelMonitor` writing 2023-12-closing-event-cleanup-fixes
Matt Corallo [Mon, 25 Dec 2023 06:55:08 +0000 (06:55 +0000)]
Fix handling of duplicate initial `ChannelMonitor` writing

In e06484b0f44155e647ff29810d2f187967e45813, we added specific
handling for outbound-channel initial monitor updates failing -
in such a case we have a counterparty who tried to open a second
channel with the same funding info we just gave them, causing us
to force-close our outbound channel as it shows up as
duplicate-funding. Its largely harmless as it leads to a spurious
force-closure of a channel with a peer doing something absurd,
however it causes the `full_stack_target` fuzzer to fail.

Sadly, in 574c77e7bc95fd8dea5a8058b6b35996cc99db8d, as we were
dropping handling of `PermanentFailure` handling for updates, we
accidentally dropped handling for initial updates as well.

Here we fix the issue (again) and add a test.

10 months agoDo not panic if a peer learns our funding info before we fund
Matt Corallo [Tue, 26 Dec 2023 18:16:51 +0000 (18:16 +0000)]
Do not panic if a peer learns our funding info before we fund

We'd previously assumed that LDK would receive
`funding_transaction_generated` prior to our peer learning the txid
and panicked if the peer tried to open a redundant channel to us
with the same funding outpoint.

While this assumption is generally safe, some users may have
out-of-band protocols where they notify their LSP about a funding
outpoint first, or this may be violated in the future with
collaborative transaction construction protocols, i.e. the upcoming
dual-funding protocol.

10 months agoDrop now-unused fields from `MsgHandleErrInternal`
Matt Corallo [Fri, 29 Dec 2023 03:55:52 +0000 (03:55 +0000)]
Drop now-unused fields from `MsgHandleErrInternal`

10 months agoMove ChannelClosed generation into finish_close_channel
Matt Corallo [Fri, 29 Dec 2023 03:23:59 +0000 (03:23 +0000)]
Move ChannelClosed generation into finish_close_channel

Currently the channel shutdown sequence has a number of steps which
all the shutdown callsites have to call. Because many shutdown
cases are rare error cases, its relatively easy to miss a call and
leave users without `Event`s or miss some important cleanup.

One of those steps, calling `issue_channel_close_events`, is rather
easy to remove, as it only generates two events, which can simply
be moved to another shutdown step.

Here we remove `issue_channel_close_events` by moving
`ChannelClosed` event generation into `finish_force_close_channel`.

10 months agoMove DiscardFunding generation into finish_close_channel
Matt Corallo [Fri, 29 Dec 2023 03:15:18 +0000 (03:15 +0000)]
Move DiscardFunding generation into finish_close_channel

Currently the channel shutdown sequence has a number of steps which
all the shutdown callsites have to call. Because many shutdown
cases are rare error cases, its relatively easy to miss a call and
leave users without `Event`s or miss some important cleanup.

One of those steps, calling `issue_channel_close_events`, is rather
easy to remove, as it only generates two events, which can simply
be moved to another shutdown step.

Here we move the first of the two events, `DiscardFunding`, into
`finish_force_close_channel`.

10 months agoConsider `MONITOR_UPDATE_IN_PROGRESS` as unbroadcasted funding
Matt Corallo [Fri, 29 Dec 2023 00:45:07 +0000 (00:45 +0000)]
Consider `MONITOR_UPDATE_IN_PROGRESS` as unbroadcasted funding

If we promote our channel to `AwaitingChannelReady` after adding
funding info, but still have `MONITOR_UPDATE_IN_PROGRESS` set, we
haven't broadcasted the funding transaction yet and thus should
return values from `unbroadcasted_funding[_txid]` and generate a
`DiscardFunding` event.

10 months agoFix dust buffer feerate calculation overflow
Matt Corallo [Sun, 24 Dec 2023 06:24:38 +0000 (06:24 +0000)]
Fix dust buffer feerate calculation overflow

If a peer provides a feerate which nears `u32::MAX`, we may
overflow calculating the dust buffer feerate, leading to spuriously
keeping non-anchor channels open when they should be force-closed.

10 months agoFix debug assertion on opening a channel with a disconnected peer
Matt Corallo [Sun, 24 Dec 2023 06:10:38 +0000 (06:10 +0000)]
Fix debug assertion on opening a channel with a disconnected peer

If we try to open a channel with a peer that is disconnected (but
with which we have some other channels), we'll end up with an
unfunded channel which will lead to a panic when the peer
reconnects. Here we drop this debug assertion without bother to add
a new test, given this behavior will change in a PR very soon.

10 months agoFix `REVOKEABLE_REDEEMSCRIPT_MAX_LENGTH` for contest delays >0x7fff
Matt Corallo [Sun, 24 Dec 2023 05:55:11 +0000 (05:55 +0000)]
Fix `REVOKEABLE_REDEEMSCRIPT_MAX_LENGTH` for contest delays >0x7fff

When contest delays are >= 0x8000, script pushes require an extra
byte to avoid being interpreted as a negative int. Thus, for
channels with CSV delays longer than ~7.5 months we may generate
transactions with slightly too little fee. This isn't really a huge
deal, but we should prefer to be conservative here, and slightly
too high fee in the general case is better than slightly too little
fee in other cases.

10 months agoStop including dust values in feerate affordability checks
Matt Corallo [Sun, 24 Dec 2023 05:17:29 +0000 (05:17 +0000)]
Stop including dust values in feerate affordability checks

When we or our counterparty are updating the fees on the channel,
we currently check that the resulting balance is sufficient not
only to meet the reserve threshold, but also not push it below
dust. This isn't required in the BOLTs and may lead to spurious
force-closures (which would be a bit safer, but reserve should
always exceed the dust threshold).

Worse, the current logic is broken - it compares the output value
in *billionths of satoshis* to the dust limit in satoshis. Thus,
the code is borderline dead anyway, but can overflow for channels
with several million Bitcoin, causing the fuzzer to get mad (and
lead to spurious force-closures for few-billion-dollar channels).

10 months agoFix `Feature` eq + hash to ignore excess zero bytes
Matt Corallo [Sun, 24 Dec 2023 04:49:24 +0000 (04:49 +0000)]
Fix `Feature` eq + hash to ignore excess zero bytes

If we get a `Feature` object which has excess zero bytes, we
shouldn't consider it a different `Feature` from another with the
same bits set, but no excess zero bytes. Here we fix both the
`Hash` and `PartialEq` implementation for `Features` to ignore
excess zero bytes.

11 months agoMerge pull request #2788 from tnull/2023-12-enforce-no-warnings-ci
Matt Corallo [Wed, 20 Dec 2023 19:54:59 +0000 (19:54 +0000)]
Merge pull request #2788 from tnull/2023-12-enforce-no-warnings-ci

Deny warnings in CI

11 months agoDon't call system time in unless feature enabled
benthecarman [Sun, 17 Dec 2023 00:08:02 +0000 (18:08 -0600)]
Don't call system time in unless feature enabled

11 months agoAllow `unused_variables` for one `_test_vectors` method
Elias Rohrer [Sat, 16 Dec 2023 18:04:52 +0000 (19:04 +0100)]
Allow `unused_variables` for one `_test_vectors` method

11 months agoAllow unused imports in `lightning-invoice` prelude
Elias Rohrer [Sat, 16 Dec 2023 17:59:49 +0000 (18:59 +0100)]
Allow unused imports in `lightning-invoice` prelude

11 months agoDrop unused `windows` imports in `FilesystemStore` tests
Elias Rohrer [Sat, 16 Dec 2023 13:39:53 +0000 (14:39 +0100)]
Drop unused `windows` imports in `FilesystemStore` tests

11 months agoDrop unenforced bound in trait alias
Elias Rohrer [Sat, 16 Dec 2023 13:15:21 +0000 (14:15 +0100)]
Drop unenforced bound in trait alias

... to fix:
```
  error: bounds on generic parameters are not enforced in type aliases
   --> lightning/src/onion_message/messenger.rs:267:33
```

11 months agoFix unused import warnings in `c_bindings`
Elias Rohrer [Sat, 16 Dec 2023 13:04:12 +0000 (14:04 +0100)]
Fix unused import warnings in `c_bindings`

11 months agoFix unused imports in `lightning-invoice` no-std tests
Elias Rohrer [Sat, 16 Dec 2023 12:55:48 +0000 (13:55 +0100)]
Fix unused imports in `lightning-invoice` no-std tests

11 months agoDrop unused `sync` module from `lightning-invoice`
Elias Rohrer [Sat, 16 Dec 2023 12:39:22 +0000 (13:39 +0100)]
Drop unused `sync` module from `lightning-invoice`

11 months agoFix unused (import) warnings in `no-std` builds
Elias Rohrer [Tue, 12 Dec 2023 17:02:59 +0000 (18:02 +0100)]
Fix unused (import) warnings in `no-std` builds

11 months agoFix redundant import warning in BP's `futures`
Elias Rohrer [Tue, 12 Dec 2023 16:46:57 +0000 (17:46 +0100)]
Fix redundant import warning in BP's `futures`

11 months agoFeature-gate `GetUtxosResponse` in `lightning-block-sync`
Elias Rohrer [Tue, 12 Dec 2023 16:36:04 +0000 (17:36 +0100)]
Feature-gate `GetUtxosResponse` in `lightning-block-sync`

.. as it's only used by the REST client.

11 months agoDeny warnings in CI
Elias Rohrer [Tue, 12 Dec 2023 16:25:09 +0000 (17:25 +0100)]
Deny warnings in CI

Since we recently got rid of our last build/test/doc warnings, we now
deny warnings via `-D warnings` in CI, enforcing no new ones are
introduced.

11 months agoMerge pull request #2794 from TheBlueMatt/2023-12-cut-119 v0.0.119
Matt Corallo [Sat, 16 Dec 2023 02:57:20 +0000 (02:57 +0000)]
Merge pull request #2794 from TheBlueMatt/2023-12-cut-119

Cut 0.0.119

11 months agoBump versions to 0.0.119/`lightning-invoice` 0.27 2023-12-cut-119
Matt Corallo [Fri, 15 Dec 2023 22:46:54 +0000 (22:46 +0000)]
Bump versions to 0.0.119/`lightning-invoice` 0.27

11 months agoAdd CHANGELOG entries for 0.0.119
Matt Corallo [Thu, 14 Dec 2023 04:27:59 +0000 (04:27 +0000)]
Add CHANGELOG entries for 0.0.119

11 months agoMerge pull request #2798 from TheBlueMatt/2023-12-119-bindings-upstream
Matt Corallo [Fri, 15 Dec 2023 23:40:57 +0000 (23:40 +0000)]
Merge pull request #2798 from TheBlueMatt/2023-12-119-bindings-upstream

Small API cleanups pre-0.0.119

11 months agoMerge pull request #2795 from TheBlueMatt/2023-11-robuster-chan-to-peer
Wilmer Paulino [Fri, 15 Dec 2023 23:36:52 +0000 (15:36 -0800)]
Merge pull request #2795 from TheBlueMatt/2023-11-robuster-chan-to-peer

 Move channel -> peer tracking to OutPoints from Channel IDs

11 months agoFix dev MSRV build of lightning-transaction-sync 2023-12-119-bindings-upstream
Matt Corallo [Fri, 15 Dec 2023 22:39:57 +0000 (22:39 +0000)]
Fix dev MSRV build of lightning-transaction-sync

...due to a transitive dependency of the `bitcoind` crate.

11 months agoUse correct default value when comparing to `htlc_maximum_msat`
Matt Corallo [Fri, 15 Dec 2023 22:32:24 +0000 (22:32 +0000)]
Use correct default value when comparing to `htlc_maximum_msat`

62f866965436fff1a8e98ee655a8a6dcbb8716c1 added two
`htlc_maximum_msat.unwrap_or`s, but used a default value of 0,
spuriously causing all HTLCs to fail if we don't have an htlc
maximum value. This should be mostly harmless, but we should fix it
anyway.

11 months agoMake `FinalOnionHopData` public
Matt Corallo [Fri, 15 Dec 2023 18:23:42 +0000 (18:23 +0000)]
Make `FinalOnionHopData` public

In 4b5db8c3ce, `channelmanager::PendingHTLCRouting` was made
public, exposing a `FinalOnionHopData` field to the world. However,
`FinalOnionHopData` was left crate-private, making the enum
impossible to construct.

There isn't a strong reason for this (even though the
`FinalOnionHopData` API is somewhat confusing, being separated from
the rest of the onion structs), so we expose it here.

11 months agoDrop explicit `bitcoin_hashes` dependency in `lightning-invoice`
Matt Corallo [Fri, 15 Dec 2023 18:14:56 +0000 (18:14 +0000)]
Drop explicit `bitcoin_hashes` dependency in `lightning-invoice`

Since `lightning-invoice` now depends on the `bitcoin` crate
directly, also depending on the `bitcoin_hashes` crate is redundant
and just means we confuse users by setting the `std` flag only on
`bitcoin`. Thus, we drop the explicit dependency here and replace
it with `bitcoin::hashes`.

11 months agoUn-export the `PrivateRoute` inner field as there are invariants
Matt Corallo [Thu, 14 Dec 2023 22:49:58 +0000 (22:49 +0000)]
Un-export the `PrivateRoute` inner field as there are invariants

When we make the `PrivateRoute` inner `RouteHint` `pub`, we failed
to note that the `PrivateRoute::new` constructor actually verifies
a length invariant. Thus, we un-export the inner field and force
users to go back through the `new` fn.

11 months agoMerge pull request #2781 from jkczyz/2023-09-multihop-paths
Matt Corallo [Fri, 15 Dec 2023 22:30:43 +0000 (22:30 +0000)]
Merge pull request #2781 from jkczyz/2023-09-multihop-paths

Multi-hop `BlindedPath` creation interface

11 months agoFix build warning
Jeffrey Czyz [Fri, 15 Dec 2023 21:11:51 +0000 (15:11 -0600)]
Fix build warning

11 months agoUse one-hop blinded paths only for announced nodes
Jeffrey Czyz [Fri, 15 Dec 2023 03:19:57 +0000 (21:19 -0600)]
Use one-hop blinded paths only for announced nodes

To avoid exposing a node's identity in a blinded path, only create
one-hop blinded paths if the node has been announced, and thus has
public channels. Otherwise, there is no way to route a payment to the
node, exposing its identity needlessly.

11 months agoDRY up OffersMessage::InvoiceRequest handling
Jeffrey Czyz [Thu, 14 Dec 2023 23:28:11 +0000 (17:28 -0600)]
DRY up OffersMessage::InvoiceRequest handling

11 months agoMulti-hop blinded payment paths in ChannelManager
Jeffrey Czyz [Fri, 8 Dec 2023 21:54:21 +0000 (15:54 -0600)]
Multi-hop blinded payment paths in ChannelManager

When constructing blinded payment paths for Bolt12Invoice, delegate to
Router::create_blinded_payment_paths which may produce multi-hop blinded
paths. Fallback to one-hop blinded paths if the Router fails or returns
no paths.

11 months agoAdd create_blinded_payment_paths to Router
Jeffrey Czyz [Fri, 8 Dec 2023 18:03:06 +0000 (12:03 -0600)]
Add create_blinded_payment_paths to Router

The Router trait is used to find a Route for paying a node. Expand the
interface with a create_blinded_payment paths method for creating such
paths to a recipient node.

Provide an implementation for DefaultRouter that creates two-hop
blinded paths where the recipient's peers serve as the introduction
nodes.

11 months agoCounterpartyForwardingInfo to PaymentRelay mapping
Jeffrey Czyz [Fri, 8 Dec 2023 18:01:58 +0000 (12:01 -0600)]
CounterpartyForwardingInfo to PaymentRelay mapping

11 months agoFix broken doc link in create_refund_builder
Jeffrey Czyz [Fri, 15 Dec 2023 14:45:38 +0000 (08:45 -0600)]
Fix broken doc link in create_refund_builder

11 months agoMulti-hop blinded paths in ChannelManager
Jeffrey Czyz [Fri, 3 Mar 2023 15:38:45 +0000 (09:38 -0600)]
Multi-hop blinded paths in ChannelManager

When constructing blinded paths for Offer and Refund, delegate to
MessageRouter::create_blinded_paths which may produce multi-hop blinded
paths. Fallback to one-hop blinded paths if the MessageRouter fails or
returns no paths.

Likewise, do the same for InvoiceRequest and Bolt12Invoice reply paths.

11 months agoUse CLTV_FAR_FAR_AWAY in PaymentConstraints
Jeffrey Czyz [Fri, 15 Dec 2023 21:37:18 +0000 (15:37 -0600)]
Use CLTV_FAR_FAR_AWAY in PaymentConstraints

When finding a route through a blinded path, a random CLTV offset may be
added to the path in order to preserve privacy. This needs to be
accounted for in the blinded path's PaymentConstraints. Add
CLTV_FAR_FAR_AWAY to the max_cltv_expiry constraint to allow for such
offsets.

11 months agoConsistently clean up when failing in `internal_funding_created` 2023-11-robuster-chan-to-peer
Matt Corallo [Thu, 30 Nov 2023 00:04:09 +0000 (00:04 +0000)]
Consistently clean up when failing in `internal_funding_created`

When we fail to accept a counterparty's funding for various
reasons, we should ensure we call the correct cleanup methods in
`internal_funding_created` to remove the temporary data for the
channel in our various internal structs (primarily the SCID alias
map).

This adds the missing cleanup, using `convert_chan_phase_err`
consistently in all the error paths.

This also ensures we get a `ChannelClosed` event when relevant.

11 months agoFix create_one_hop_blinded_payment_path docs
Jeffrey Czyz [Fri, 8 Dec 2023 21:02:22 +0000 (15:02 -0600)]
Fix create_one_hop_blinded_payment_path docs

11 months agoRequire any Router also implements MessageRouter
Jeffrey Czyz [Thu, 7 Dec 2023 21:53:15 +0000 (15:53 -0600)]
Require any Router also implements MessageRouter

ChannelManager is parameterized by a Router in order to find routes when
sending and retrying payments. For the offers flow, it needs to be able
to construct blinded paths (e.g., in the offer and in reply paths).
Instead of adding yet another parameter to ChannelManager, require that
any Router also implements MessageRouter. Implement this for
DefaultRouter by delegating to a DefaultMessageRouter.

11 months agoAdd create_blinded_paths to MessageRouter
Jeffrey Czyz [Thu, 7 Dec 2023 21:48:43 +0000 (15:48 -0600)]
Add create_blinded_paths to MessageRouter

The MessageRouter trait is used to find an OnionMessagePath to a
Destination (e.g., to a BlindedPath). Expand the interface with a
create_blinded_paths method for creating such paths to a recipient.
Provide a default implementation creating two-hop blinded paths where
the recipient's peers serve as introduction nodes.

11 months agoAdd RouteBlinding feature flag
Jeffrey Czyz [Thu, 2 Mar 2023 20:57:07 +0000 (14:57 -0600)]
Add RouteBlinding feature flag

The RouteBlinding feature flag is signals support for relaying payments
over blinded paths. It is used for paying BOLT 12 invoices, which are
required to included at least one blinded path.

11 months agoRe-order AnchorsZeroFeeHtlcTx in module docs/tests
Jeffrey Czyz [Thu, 2 Mar 2023 20:15:19 +0000 (14:15 -0600)]
Re-order AnchorsZeroFeeHtlcTx in module docs/tests

Move AnchorsZeroFeeHtlcTx after Wumbo to keep order by feature bit.
Also, update setting order and comment in tests.

11 months agoMerge pull request #2656 from TheBlueMatt/2023-09-scoring-decay-timer
Matt Corallo [Fri, 15 Dec 2023 20:06:30 +0000 (20:06 +0000)]
Merge pull request #2656 from TheBlueMatt/2023-09-scoring-decay-timer

Stop decaying liquidity information during scoring

11 months agoMerge pull request #2796 from yellowred/fix/bitcoind_parse_txid
Matt Corallo [Fri, 15 Dec 2023 19:27:15 +0000 (19:27 +0000)]
Merge pull request #2796 from yellowred/fix/bitcoind_parse_txid

Fixes bug that causes incorrect conversion of JsonValue to Txid.

11 months agoMerge pull request #2779 from G8XSU/2706-stop
Elias Rohrer [Fri, 15 Dec 2023 08:28:31 +0000 (09:28 +0100)]
Merge pull request #2779 from G8XSU/2706-stop

Stop cleaning monitor updates on new block connect

11 months agoFixes bug with incorrect conversion of JsonValue to Txid.
olegkubrakov [Fri, 15 Dec 2023 00:34:01 +0000 (16:34 -0800)]
Fixes bug with incorrect conversion of JsonValue to Txid.

The bug happens when there is a call to a bitcoind that expects a transaction id as a response and
results in a corrupted Txid being returned.

11 months agoStop cleaning monitor updates on new block connect
Gursharan Singh [Fri, 8 Dec 2023 19:28:19 +0000 (11:28 -0800)]
Stop cleaning monitor updates on new block connect

Previously, we used to cleanup monitor updates at both consolidation
threshold and new block connects. With this change we will only
cleanup when our consolidation criteria is met. Also, we remove
monitor read from cleanup logic, in case of update consolidation.
Note: In case of channel-closing monitor update, we still need to
read the old monitor before persisting the new one in order to
determine the cleanup range.

11 months agoMerge pull request #2792 from TheBlueMatt/2023-12-no-async-signing
Wilmer Paulino [Thu, 14 Dec 2023 16:52:11 +0000 (08:52 -0800)]
Merge pull request #2792 from TheBlueMatt/2023-12-no-async-signing

cfg-gate async signing logic

11 months agoDrop fake time advancing in scoring tests 2023-09-scoring-decay-timer
Matt Corallo [Tue, 5 Dec 2023 18:15:55 +0000 (18:15 +0000)]
Drop fake time advancing in scoring tests

Now that we use explicit times passed to decay methods, there's no
reason to make calls to `SinceEpoch::advance` in scoring tests.

11 months agoDrop half-life-based bucket decay in `update_history_buckets`
Matt Corallo [Wed, 29 Nov 2023 00:33:16 +0000 (00:33 +0000)]
Drop half-life-based bucket decay in `update_history_buckets`

Because we decay the bucket information in the background, there's
not much reason to try to decay them immediately prior to updating,
and in removing that we can also clean up a good bit of dead code,
which we do here.

11 months agoMake scorer decay + persistence more frequent
Matt Corallo [Wed, 29 Nov 2023 00:31:00 +0000 (00:31 +0000)]
Make scorer decay + persistence more frequent

There's some edge cases in our scoring when the information really
should be decayed but hasn't yet been prior to an update. Rather
than try to fix them exactly, we instead decay the scorer a bit
more often, which largely solves them but also gives us a bit more
accurate bounds on our channels, allowing us to reuse channels at
a similar amount to what just failed immediately, but at a
substantial penalty.

11 months agoDrop warning about mixing `no-std` and `std` `ProbabilisticScorer`s
Matt Corallo [Thu, 12 Oct 2023 18:23:51 +0000 (18:23 +0000)]
Drop warning about mixing `no-std` and `std` `ProbabilisticScorer`s

Now that the serialization format of `no-std` and `std`
`ProbabilisticScorer`s both just use `Duration` since UNIX epoch
and don't care about time except when decaying, we don't need to
warn users to not mix the scorers across `no-std` and `std` flags.

Fixes #2539

11 months agoAdd a benchmark for decaying a 100k channel scorer's liquidity info
Matt Corallo [Mon, 9 Oct 2023 03:23:55 +0000 (03:23 +0000)]
Add a benchmark for decaying a 100k channel scorer's liquidity info

This is a good gut-check to ensure we don't end up taking a ton of
time decaying channel liquidity info.

It currently clocks in around 1.25ms on an i7-1360P.

11 months agoDrop now-trivial `decayed_offset_msat` helper utility
Matt Corallo [Mon, 9 Oct 2023 02:21:09 +0000 (02:21 +0000)]
Drop now-trivial `decayed_offset_msat` helper utility

As we now no longer decay bounds information when fetching them,
there is no need to have a decaying-fetching helper utility.

11 months agoDrop now-unused `T: Time` bound on `ProbabilisticScorer`
Matt Corallo [Mon, 9 Oct 2023 01:52:20 +0000 (01:52 +0000)]
Drop now-unused `T: Time` bound on `ProbabilisticScorer`

Now that we don't access time via the `Time` trait in
`ProbabilisticScorer`, we can finally drop the `Time` bound
entirely, removing the `ProbabilisticScorerUsingTime` and type
alias indirection and replacing it with a simple struct.

11 months agoUse `Duration` based time info in scoring rather than `Time`
Matt Corallo [Mon, 9 Oct 2023 01:44:33 +0000 (01:44 +0000)]
Use `Duration` based time info in scoring rather than `Time`

In the coming commits, the `T: Time` bound on `ProbabilisticScorer`
will be removed. In order to enable that, we need to switch over to
using the `ScoreUpdate`-provided current time (as a `Duration`
since the unix epoch), making the `T` bound entirely unused.

11 months agoPipe `Duration`-based time information through scoring pipeline
Matt Corallo [Mon, 9 Oct 2023 01:15:18 +0000 (01:15 +0000)]
Pipe `Duration`-based time information through scoring pipeline

In the coming commits, the `T: Time` bound on `ProbabilisticScorer`
will be removed. In order to enable that, we need to pass the
current time (as a `Duration` since the unix epoch) through the
score updating pipeline, allowing us to keep the
`*last_updated_time` fields up-to-date as we go.

11 months agoUpdate history bucket last_update time immediately on update
Matt Corallo [Wed, 29 Nov 2023 03:07:54 +0000 (03:07 +0000)]
Update history bucket last_update time immediately on update

Now that we aren't decaying during scoring, when we set the
last_updated time in the history bucket logic doesn't matter, so
we should just update it when we've just updated the history
buckets.

11 months agoStop decaying liquidity information during bounds-based scoring
Matt Corallo [Mon, 9 Oct 2023 01:11:10 +0000 (01:11 +0000)]
Stop decaying liquidity information during bounds-based scoring

Because scoring is an incredibly performance-sensitive operation,
doing liquidity information decay (and especially fetching the
current time!) during scoring isn't really a great idea. Now that
we decay liquidity information in the background, we don't have any
reason to decay during scoring, and we ultimately remove it
entirely here.

11 months agoStop decaying historical liquidity information during scoring
Matt Corallo [Mon, 9 Oct 2023 02:14:21 +0000 (02:14 +0000)]
Stop decaying historical liquidity information during scoring

Because scoring is an incredibly performance-sensitive operation,
doing liquidity information decay (and especially fetching the
current time!) during scoring isn't really a great idea. Now that
we decay liquidity information in the background, we don't have any
reason to decay during scoring, and we remove the historical bucket
liquidity decaying here.

11 months agoImpl decaying in `ProbabilisticScorer::decay_liquidity_certainty`
Matt Corallo [Mon, 2 Oct 2023 20:07:21 +0000 (20:07 +0000)]
Impl decaying in `ProbabilisticScorer::decay_liquidity_certainty`

This implements decaying in the `ProbabilisticScorer`'s
`ScoreLookup::decay_liquidity_certainty` implementation, using
floats for accuracy since we're no longer particularly
time-sensitive. Further, it (finally) removes score entries which
have decayed to zero.

11 months agoTrack historical liquidity update time separately from the bounds
Matt Corallo [Mon, 2 Oct 2023 19:44:36 +0000 (19:44 +0000)]
Track historical liquidity update time separately from the bounds

In the next commit, we'll start to use the new
`ScoreUpdate::decay_liquidity_certainty` to decay our bounds in the
background. This will result in the `last_updated` field getting
updated regularly on decay, rather than only on update. While this
isn't an issue for the regular liquidity bounds, it poses a problem
for the historical liquidity buckets, which are decayed on a
separate (and by default much longer) timer. If we didn't move to
tracking their decays separately, we'd never let the `last_updated`
field get old enough for the historical buckets to decay at all.

Instead, here we introduce a new `Duration` in the
`ChannelLiquidity` which tracks the last time the historical
liquidity buckets were last updated. We initialize it to a copy of
`last_updated` on deserialization if it is missing.

11 months agoAdd a scoring decay method to the `ScoreUpdate` trait
Matt Corallo [Mon, 2 Oct 2023 19:14:26 +0000 (19:14 +0000)]
Add a scoring decay method to the `ScoreUpdate` trait

Rather than relying on fetching the current time during
routefinding, here we introduce a new trait method to `ScoreUpdate`
to do so. This largely mirrors what we do with the `NetworkGraph`,
and allows us to take on much more expensive operations (floating
point exponentiation) in our decaying.

11 months agocfg-gate async signing logic 2023-12-no-async-signing
Matt Corallo [Wed, 13 Dec 2023 22:55:32 +0000 (22:55 +0000)]
cfg-gate async signing logic

We are intending to release without having completed our async
signing logic, which sadly means we need to cfg-gate it to ensure
we restore the previous state of panicking on signer errors, rather
than putting us in a stuck state with no way to recover.

Here we add a new `async_signing` cfg flag and use it to gate all
the new logic from #2558 effectively reverting commits
1da29290e7af03a5dfc207ee6a5c848a9740bd32 through
014a336e592bfc8cb49929b799b9d6d9286dab16.

11 months agoMerge pull request #2790 from yellowred/tokio-ver-bump
Matt Corallo [Wed, 13 Dec 2023 20:40:08 +0000 (20:40 +0000)]
Merge pull request #2790 from yellowred/tokio-ver-bump

Update tokio version to the latest to avoid tokio versions with security bugs

11 months agoDRY Channel::fail_htlc handling on holding cell free.
Valentine Wallace [Wed, 13 Dec 2023 18:45:45 +0000 (13:45 -0500)]
DRY Channel::fail_htlc handling on holding cell free.