rust-lightning
12 months agoMark the invoice `Network` getter no-export 2023-04-115-bindings-upstream
Matt Corallo [Mon, 17 Apr 2023 17:35:50 +0000 (17:35 +0000)]
Mark the invoice `Network` getter no-export

...as it is redundant with the `currency` getter if we're not using
the rust-bitcoin types natively.

12 months agoMerge pull request #2177 from TheBlueMatt/2023-04-test-function-generics
Wilmer Paulino [Mon, 17 Apr 2023 16:56:18 +0000 (09:56 -0700)]
Merge pull request #2177 from TheBlueMatt/2023-04-test-function-generics

Genericize Test Functions

12 months agoMerge pull request #2191 from TheBlueMatt/2023-04-fix-bucket-deser
Matt Corallo [Mon, 17 Apr 2023 15:11:53 +0000 (15:11 +0000)]
Merge pull request #2191 from TheBlueMatt/2023-04-fix-bucket-deser

Fix deserialization of u16 arrays

12 months agoMerge pull request #2187 from benthecarman/invoice-serde-no-std
Matt Corallo [Mon, 17 Apr 2023 13:28:49 +0000 (13:28 +0000)]
Merge pull request #2187 from benthecarman/invoice-serde-no-std

12 months agoFix deserialization of u16 arrays 2023-04-fix-bucket-deser
Matt Corallo [Sun, 16 Apr 2023 21:57:20 +0000 (21:57 +0000)]
Fix deserialization of u16 arrays

u16 arrays are used in the historical liquidity range tracker.
Previously, we read them without applying the stride multiple,
reading bytes repeatedly and at an offset, corrupting data as we
go.

This applies the correct stride multiplayer fixing the issue.

12 months agoAdd CI test for compile no-std serde lightning-invoice
benthecarman [Sun, 16 Apr 2023 18:17:22 +0000 (13:17 -0500)]
Add CI test for compile no-std serde lightning-invoice

12 months agoFix compiling lightning-invoice for no-std + serde
benthecarman [Sat, 15 Apr 2023 20:38:53 +0000 (15:38 -0500)]
Fix compiling lightning-invoice for no-std + serde

12 months agoMerge pull request #2172 from TheBlueMatt/2023-04-fix-panicy-debug-assert
Matt Corallo [Fri, 14 Apr 2023 15:00:12 +0000 (15:00 +0000)]
Merge pull request #2172 from TheBlueMatt/2023-04-fix-panicy-debug-assert

Remove a race-y debug assertion in new channel update handling

12 months agoMerge pull request #2180 from benthecarman/impl-pk-to-node-id
Matt Corallo [Fri, 14 Apr 2023 14:56:51 +0000 (14:56 +0000)]
Merge pull request #2180 from benthecarman/impl-pk-to-node-id

Implement to and from for PublicKey and NodeId

12 months agoImpl FromStr for NodeId
benthecarman [Thu, 13 Apr 2023 17:54:04 +0000 (12:54 -0500)]
Impl FromStr for NodeId

12 months agoMerge pull request #2179 from benthecarman/use-node-alias-type
Matt Corallo [Thu, 13 Apr 2023 19:46:30 +0000 (19:46 +0000)]
Merge pull request #2179 from benthecarman/use-node-alias-type

Use NodeAlias type in NodeAnnouncement

12 months agoMove some additional test macros into functions 2023-04-test-function-generics
Matt Corallo [Thu, 16 Mar 2023 18:27:52 +0000 (18:27 +0000)]
Move some additional test macros into functions

This marginally reduces the quantity of code compiled in tests
further.

12 months agoIntroduce traits to make test utils generic across the `CM` Holder
Matt Corallo [Fri, 17 Mar 2023 20:50:19 +0000 (20:50 +0000)]
Introduce traits to make test utils generic across the `CM` Holder

In our test utilities, we generally refer to a `Node` struct which
holds a `ChannelManager` and a number of other structs. However, we
use the same utilities in benchmarking, where we have a different
`Node`-like struct. This made moving from macros to functions
entirely impossible, as we end up needing multiple types in a given
context.

Thus, here, we take the pain and introduce some wrapper traits
which encapsulte what we need from `Node`, swapping some of our
macros to functions.

12 months agoUse NodeAlias type in NodeAnnouncement
benthecarman [Wed, 12 Apr 2023 21:09:28 +0000 (16:09 -0500)]
Use NodeAlias type in NodeAnnouncement

12 months agoImplement to and from for PublicKey and NodeId
benthecarman [Thu, 13 Apr 2023 00:14:03 +0000 (19:14 -0500)]
Implement to and from for PublicKey and NodeId

12 months agoDRY the event handling in `ChannelManager`
Matt Corallo [Thu, 30 Mar 2023 23:35:07 +0000 (23:35 +0000)]
DRY the event handling in `ChannelManager`

In the coming commits we'll add some additional complexity to the
event handling flows, so best to DRY them up before we get there.

12 months agoMerge pull request #2142 from alecchendev/2023-03-expose-fail-reason-in-payment-failure
valentinewallace [Tue, 11 Apr 2023 21:26:16 +0000 (17:26 -0400)]
Merge pull request #2142 from alecchendev/2023-03-expose-fail-reason-in-payment-failure

Expose a failure reason in `PaymentFailed`

12 months agoAdd reason to `Event::PaymentFailed`
Alec Chen [Sat, 1 Apr 2023 00:07:57 +0000 (19:07 -0500)]
Add reason to `Event::PaymentFailed`

This includes adding a reason to `PendingOutboundPayment::Abandoned` and
using that reason when pushing an `Event::PaymentFailed`.

12 months agoMerge pull request #2173 from benthecarman/convert-currency-to-netowkr
valentinewallace [Mon, 10 Apr 2023 16:21:16 +0000 (12:21 -0400)]
Merge pull request #2173 from benthecarman/convert-currency-to-netowkr

Convert Network to and from Currency

12 months agoConvert Network to and from Currency
benthecarman [Sun, 9 Apr 2023 02:24:17 +0000 (21:24 -0500)]
Convert Network to and from Currency

12 months agoRemove a race-y debug assertion in new channel update handling 2023-04-fix-panicy-debug-assert
Matt Corallo [Sun, 9 Apr 2023 01:43:39 +0000 (01:43 +0000)]
Remove a race-y debug assertion in new channel update handling

In 6090d9e6a862a2010eb80be56b7449947bc08374 we swapped out old
debug assertions that checked that a lock was `try_lock`able to
test that certain locks weren't held when we needed to be able to
take them in some near branch. However, another slipped in after in
the `ChannelMonitorUpdate` handling rework, which is replaced with
the new debug assertions here.

12 months agoMerge pull request #2161 from benthecarman/prune-stale-channels-rgs
Arik [Sat, 8 Apr 2023 06:26:19 +0000 (23:26 -0700)]
Merge pull request #2161 from benthecarman/prune-stale-channels-rgs

Prune stale channels from network graph after RGS sync.

12 months agoMerge pull request #2158 from TheBlueMatt/2023-04-handle_err_more-check
valentinewallace [Fri, 7 Apr 2023 20:19:27 +0000 (16:19 -0400)]
Merge pull request #2158 from TheBlueMatt/2023-04-handle_err_more-check

Test for extra locks held in `handle_error` unconditionally

12 months agoMerge pull request #2023 from futurepaul/fallback-to-address
Jeffrey Czyz [Fri, 7 Apr 2023 19:39:32 +0000 (14:39 -0500)]
Merge pull request #2023 from futurepaul/fallback-to-address

add `Fallback` getter that returns `Address`

12 months agoCreate `PaymentFailureReason` enum
Alec Chen [Thu, 30 Mar 2023 03:30:08 +0000 (22:30 -0500)]
Create `PaymentFailureReason` enum

12 months agoMerge pull request #2170 from TheBlueMatt/2023-04-silent-merge-conflict
Matt Corallo [Fri, 7 Apr 2023 18:27:33 +0000 (18:27 +0000)]
Merge pull request #2170 from TheBlueMatt/2023-04-silent-merge-conflict

Fix silent merge conflict between new test and payment refactor

12 months agoMerge pull request #2162 from jkczyz/2023-04-invoice-hash
Wilmer Paulino [Fri, 7 Apr 2023 17:11:36 +0000 (10:11 -0700)]
Merge pull request #2162 from jkczyz/2023-04-invoice-hash

12 months agoFix silent merge conflict between new test and payment refactor 2023-04-silent-merge-conflict
Matt Corallo [Fri, 7 Apr 2023 16:29:19 +0000 (16:29 +0000)]
Fix silent merge conflict between new test and payment refactor

12 months agoMerge pull request #2148 from TheBlueMatt/2023-04-claim-from-closed
Matt Corallo [Fri, 7 Apr 2023 16:17:25 +0000 (16:17 +0000)]
Merge pull request #2148 from TheBlueMatt/2023-04-claim-from-closed

Allow claiming a payment if a channel with an HTLC has closed

12 months agoMerge pull request #2139 from TheBlueMatt/2023-03-metadata-prefactors
Matt Corallo [Fri, 7 Apr 2023 16:14:30 +0000 (16:14 +0000)]
Merge pull request #2139 from TheBlueMatt/2023-03-metadata-prefactors

Add a new `RecipientOnionFields` and replace `PaymentSecret` with it

12 months agoMerge pull request #2165 from wpaulino/fix-bp-channel-pending-panic-flake
Matt Corallo [Fri, 7 Apr 2023 16:08:34 +0000 (16:08 +0000)]
Merge pull request #2165 from wpaulino/fix-bp-channel-pending-panic-flake

Use signal for handling ChannelPending in test_background_event_handling

12 months agoSplit up comically long error return 2023-04-handle_err_more-check
Matt Corallo [Fri, 7 Apr 2023 04:54:07 +0000 (04:54 +0000)]
Split up comically long error return

12 months agoExpose a BOLT 12 Invoice's signable_hash
Jeffrey Czyz [Thu, 6 Apr 2023 15:30:57 +0000 (10:30 -0500)]
Expose a BOLT 12 Invoice's signable_hash

This is useful as an identifier for downstream clients like VLS.

12 months agoExpose a BOLT 11 Invoice's signable_hash
Jeffrey Czyz [Thu, 6 Apr 2023 14:47:45 +0000 (09:47 -0500)]
Expose a BOLT 11 Invoice's signable_hash

Otherwise, an Invoice must first be converted to a SignedRawInvoice to
obtain the hash.

12 months agoLinkify lightning-invoice docs
Jeffrey Czyz [Fri, 7 Apr 2023 04:13:05 +0000 (23:13 -0500)]
Linkify lightning-invoice docs

12 months agoLift std check to function definition
benthecarman [Thu, 6 Apr 2023 23:10:57 +0000 (18:10 -0500)]
Lift std check to function definition

12 months agoUse signal for handling ChannelPending in test_background_event_handling
Wilmer Paulino [Thu, 6 Apr 2023 21:59:04 +0000 (14:59 -0700)]
Use signal for handling ChannelPending in test_background_event_handling

This fixes two potential panics within the test if the
`BackgroundProcessor` for `nodes[0]` consumed the `ChannelPending` event
prior to us consuming it manually in `end_open_channel`. The first panic
would happen within the event handler, since `ChannelPending` was not
being handled. The second panic would happen upon expecting the
`ChannelPending` event after handling `nodes[1]`'s `funding_signed` if
the `BackgroundProcessor` handled the event first. To ensure we still
reliably receive a `ChannelPending` event once possible, we let the
`BackgroundProcessor` consume the event and notify it.

12 months agoMerge pull request #2163 from TheBlueMatt/2023-04-less-lock
Matt Corallo [Thu, 6 Apr 2023 21:53:49 +0000 (21:53 +0000)]
Merge pull request #2163 from TheBlueMatt/2023-04-less-lock

Avoid holding a `per_peer_state` lock while claiming from a monitor

12 months agoPrune stale channels from network graph after RGS sync
benthecarman [Thu, 6 Apr 2023 15:10:14 +0000 (10:10 -0500)]
Prune stale channels from network graph after RGS sync

12 months agoAdd a `claim_deadline` field to `PaymentClaimable` with guarantees 2023-04-claim-from-closed
Matt Corallo [Tue, 4 Apr 2023 04:21:45 +0000 (04:21 +0000)]
Add a `claim_deadline` field to `PaymentClaimable` with guarantees

Now that we guarantee `claim_payment` will always succeed we have
to let the user know what the deadline is. We still fail payments
if they haven't been claimed in time, which we now expose in
`PaymentClaimable`.

12 months agoAvoid holding a `per_peer_state` lock while claiming from a monitor 2023-04-less-lock
Matt Corallo [Sat, 1 Apr 2023 19:22:22 +0000 (19:22 +0000)]
Avoid holding a `per_peer_state` lock while claiming from a monitor

There's no reason to hold a lock on `per_peer_state` while we're
claiming from a since-closed channel via a `ChannelMonitorUpdate`,
which we stop doing here.

12 months agoMerge pull request #2101 from TheBlueMatt/2023-03-one-less-sig
Matt Corallo [Thu, 6 Apr 2023 18:07:55 +0000 (18:07 +0000)]
Merge pull request #2101 from TheBlueMatt/2023-03-one-less-sig

Support future removal of redundant per-HTLC signatures in `CMU`s

12 months ago`Fallback`: add `Address` getter and use bitcoin types
Paul Miller [Wed, 8 Feb 2023 15:09:44 +0000 (09:09 -0600)]
`Fallback`: add `Address` getter and use bitcoin types

13 months agoTest for extra locks held in `handle_error` unconditionally
Matt Corallo [Thu, 6 Apr 2023 02:35:37 +0000 (02:35 +0000)]
Test for extra locks held in `handle_error` unconditionally

`handle_error` must be called without `per_peer_state` mutex or
`pending_events` mutex locks held or we may risk deadlocks.
Previously we checked this in debug builds in the error path, but
not in the success path.

As it turns out, `funding_transaction_generated`'s error path does
hold a `per_peer_state` lock, which we fix here as well as move the
tests to happen unconditionally.

13 months agoMerge pull request #2145 from TheBlueMatt/2023-04-async-bp-cleanups
Matt Corallo [Wed, 5 Apr 2023 16:55:51 +0000 (16:55 +0000)]
Merge pull request #2145 from TheBlueMatt/2023-04-async-bp-cleanups

Add test coverage of async BP and fix minor bug

13 months agoCorrect documentation of `payment_id` in events 2023-03-metadata-prefactors
Matt Corallo [Wed, 5 Apr 2023 16:31:50 +0000 (16:31 +0000)]
Correct documentation of `payment_id` in events

13 months agoPipe the new `RecipientOnionFields` through send pipeline
Matt Corallo [Fri, 24 Mar 2023 05:32:56 +0000 (05:32 +0000)]
Pipe the new `RecipientOnionFields` through send pipeline

This passes the new `RecipientOnionFields` through the internal
sending APIs, ensuring we have access to the full struct when we
go to construct the sending onion so that we can include any new
fields added there.

13 months agoAdd a `RecipientOnionFields` argument to spontaneous payment sends
Matt Corallo [Fri, 24 Mar 2023 01:19:20 +0000 (01:19 +0000)]
Add a `RecipientOnionFields` argument to spontaneous payment sends

While most lightning nodes don't (currently) support providing a
payment secret or payment metadata for spontaneous payments,
there's no specific technical reason why we shouldn't support
sending those fields to a recipient.

Further, when we eventually move to allowing custom TLV entries in
the recipient's onion TLV stream, we'll want to support it for
spontaneous payments as well.

Here we simply add the new `RecipientOnionFields` struct as an
argument to the spontaneous payment send methods. We don't yet
plumb it through the payment sending logic, which will come when we
plumb the new struct through the sending logic to replace the
existing payment secret arguments.

13 months agoReplace `PaymentSecret` with `RecipientOnionFields` in the pub API
Matt Corallo [Wed, 22 Mar 2023 21:48:22 +0000 (21:48 +0000)]
Replace `PaymentSecret` with `RecipientOnionFields` in the pub API

This moves the public payment sending API from passing an explicit
`PaymentSecret` to a new `RecipientOnionFields` struct (which
currently only contains the `PaymentSecret`). This gives us
substantial additional flexibility as we look at add both
`PaymentMetadata`, a new (well, year-or-two-old) BOLT11 invoice
extension to provide additional data sent to the recipient.

In the future, we should also add the ability to add custom TLV
entries in the `RecipientOnionFields` struct.

13 months agoRemove the `PaymentSecret` field from `HTLCSource::OutboundRoute`
Matt Corallo [Wed, 22 Mar 2023 19:15:52 +0000 (19:15 +0000)]
Remove the `PaymentSecret` field from `HTLCSource::OutboundRoute`

Many of the fields in `HTLCSource::OutboundRoute` are used to
rebuild the pending-outbound-payment map on reload if the
`ChannelManager` was not serialized though `ChannelMonitor`(s)
were after an HTLC was sent. As of 0.0.114, however, such payments
are not retryable without allowing them to fail and doing a full,
fresh, send.

Thus, some of the fields can be safely removed - we only really
care about having enough information to provide the user a failure
event, not being able to retry.

Here we drop one such field - the `payment_secret`, making our
`ChannelMonitorUpdate`s another handful of bytes smaller.

13 months agoAllow claiming a payment if a channel with an HTLC has closed
Matt Corallo [Tue, 4 Apr 2023 04:12:55 +0000 (04:12 +0000)]
Allow claiming a payment if a channel with an HTLC has closed

Previously, LDK would refuse to claim a payment if a channel on
which the payment was received had been closed between when the
HTLC was received and when we went to claim it. This makes sense in
the payment case - why pay an on-chain fee to claim the HTLC when
presumably the sender may retry later. Long ago it also reduced
total code in the claim pipeline.

However, this doesn't make sense if you're trying to do an atomic
swap or some other protocol that requires atomicity with some other
action - if your money got claimed elsewhere you need to be able to
claim the HTLC in lightning no matter what. Further, this is an
over-optimization - there should be a very, very low likelihood
that a channel closes between when we receive the last HTLC for a
payment and the user goes to claim the payment. Since we now have
code to handle this anyway we should allow it.

Fixes #2017.

13 months agoAdd an async version of BP's test_channel_manager_persist_error 2023-04-async-bp-cleanups
Matt Corallo [Mon, 3 Apr 2023 20:47:02 +0000 (20:47 +0000)]
Add an async version of BP's test_channel_manager_persist_error

This gives us coverage of an async BP returning an error.

13 months agoMake BP's `not_pruning_network_graph_until...` test dual async-sync
Matt Corallo [Mon, 3 Apr 2023 20:34:13 +0000 (20:34 +0000)]
Make BP's `not_pruning_network_graph_until...` test dual async-sync

13 months agoMake BP's `test_payment_path_scoring` dual sync/async.
Matt Corallo [Mon, 3 Apr 2023 20:19:49 +0000 (20:19 +0000)]
Make BP's `test_payment_path_scoring` dual sync/async.

This finally gives us a bit of test coverage of the async BP, which
was embarrassingly missing until now.

13 months agoEnsure `background-processor` exits after any sleep future says to
Matt Corallo [Mon, 3 Apr 2023 20:15:04 +0000 (20:15 +0000)]
Ensure `background-processor` exits after any sleep future says to

If the user's sleep future passed to an async background processor
only returns true for exiting once and then reverts back to false,
we should exit anyway when we get a chance to. We do to this here
by always ensuring we check the exit flag even when only polling
sleep futures with no intent to (yet) exit. This is utilized in the
tests added in the coming commit(s).

13 months agoDon't immediately exit BP if `ChannelManager` is persistable
Matt Corallo [Mon, 3 Apr 2023 20:11:30 +0000 (20:11 +0000)]
Don't immediately exit BP if `ChannelManager` is persistable

If `ChannelManager` is persistable before the async background
processor even starts, it may not even get around to overwriting
the `should_exit` flag before testing it, and the default value is
(incorrectly) true, causing an immediate unconditional exit.

The default value should simply be false.

Fixes #2140

13 months agoMake `lightning-background-processor` test failures more debugable
Matt Corallo [Mon, 3 Apr 2023 18:38:26 +0000 (18:38 +0000)]
Make `lightning-background-processor` test failures more debugable

Instead of asserting a `Result` `is_ok`, we should always simply
`unwrap` to get a backgrace, and we should avoid doing so if the
thread is already panicking.

13 months agoMerge pull request #2150 from TonyGiorgio/esplora-0.4
valentinewallace [Tue, 4 Apr 2023 19:49:44 +0000 (15:49 -0400)]
Merge pull request #2150 from TonyGiorgio/esplora-0.4

lightning-transaction-sync: Bump esplora to 0.4

13 months agoMerge pull request #2147 from TheBlueMatt/2023-04-rgs-log-some
Matt Corallo [Tue, 4 Apr 2023 19:07:24 +0000 (19:07 +0000)]
Merge pull request #2147 from TheBlueMatt/2023-04-rgs-log-some

Add some trivial logging during RGS update processing.

13 months agolightning-transaction-sync: Bump esplora to 0.4
Tony Giorgio [Tue, 4 Apr 2023 17:28:15 +0000 (12:28 -0500)]
lightning-transaction-sync: Bump esplora to 0.4

13 months agoMerge pull request #2005 from arik-so/2023-01-taproot-message-types
Matt Corallo [Tue, 4 Apr 2023 16:38:04 +0000 (16:38 +0000)]
Merge pull request #2005 from arik-so/2023-01-taproot-message-types

Update messages for Taproot types.

13 months agoAdd some trivial logging during RGS update processing. 2023-04-rgs-log-some
Matt Corallo [Mon, 3 Apr 2023 22:29:41 +0000 (22:29 +0000)]
Add some trivial logging during RGS update processing.

Rather than being totally silent, we need to at least note that we
are processing an RGS update when doing so in the logs, which we do
here.

Fixes #1981.

13 months agoAdd Taproot CI test.
Arik Sosman [Fri, 31 Mar 2023 05:59:21 +0000 (22:59 -0700)]
Add Taproot CI test.

13 months agoUpdate the `RevokeAndACK` message for Taproot support.
Arik Sosman [Wed, 29 Mar 2023 23:35:05 +0000 (16:35 -0700)]
Update the `RevokeAndACK` message for Taproot support.

13 months agoUpdate the `CommitmentSigned` message for Taproot support.
Arik Sosman [Wed, 29 Mar 2023 22:21:30 +0000 (15:21 -0700)]
Update the `CommitmentSigned` message for Taproot support.

13 months agoUpdate the `FundingSigned` message for Taproot support.
Arik Sosman [Wed, 29 Mar 2023 22:02:34 +0000 (15:02 -0700)]
Update the `FundingSigned` message for Taproot support.

13 months agoUpdate the `FundingCreated` message for Taproot support.
Arik Sosman [Wed, 29 Mar 2023 00:33:45 +0000 (17:33 -0700)]
Update the `FundingCreated` message for Taproot support.

13 months agoUpdate the `AcceptChannel` message for Taproot support.
Arik Sosman [Tue, 28 Mar 2023 21:59:20 +0000 (14:59 -0700)]
Update the `AcceptChannel` message for Taproot support.

13 months agoIntroduce MuSig2-related types for Taproot channels.
Arik Sosman [Tue, 28 Mar 2023 21:37:01 +0000 (14:37 -0700)]
Introduce MuSig2-related types for Taproot channels.

13 months agoMerge pull request #2090 from TheBlueMatt/2023-03-mon-wake-bp
Matt Corallo [Mon, 3 Apr 2023 20:12:46 +0000 (20:12 +0000)]
Merge pull request #2090 from TheBlueMatt/2023-03-mon-wake-bp

Wake background-processor on async monitor update completion

13 months agoMerge pull request #2098 from tnull/2023-03-add-channel-pending-event
Matt Corallo [Mon, 3 Apr 2023 18:26:18 +0000 (18:26 +0000)]
Merge pull request #2098 from tnull/2023-03-add-channel-pending-event

Add `ChannelPending` event emitted upon `funding_signed`

13 months agoMerge pull request #2143 from get10101/chore/convenient-confirm
Matt Corallo [Mon, 3 Apr 2023 17:58:54 +0000 (17:58 +0000)]
Merge pull request #2143 from get10101/chore/convenient-confirm

Implement `chain::Confirm` without mandating any owned values

13 months agoAdd `ChannelPending` event emitted upon `funding_signed`
Elias Rohrer [Fri, 10 Mar 2023 15:30:37 +0000 (16:30 +0100)]
Add `ChannelPending` event emitted upon `funding_signed`

Currently, users don't have good way of being notified when channel open
negotiations have succeeded and new channels are pending confirmation on
chain. To this end, we add a new `ChannelPending` event that is emitted
when send or receive a `funding_signed` message, i.e., at the last
moment before waiting for the confirmation period.

We track whether the event had previously been emitted in `Channel` and
remove it from `internal_funding_created` entirely. Hence, we now
only emit the event after ChannelMonitorUpdate completion, or upon
channel reestablish. This mitigates a race condition where where we
wouldn't persist the event *and* wouldn't regenerate it on restart,
therefore potentially losing it, if async CMU wouldn't complete before
ChannelManager persistence.

13 months agoExpose an option to substantially reduce sleep time in futures BP 2023-03-mon-wake-bp
Matt Corallo [Tue, 14 Mar 2023 21:23:21 +0000 (21:23 +0000)]
Expose an option to substantially reduce sleep time in futures BP

Some users have suggested that waking every 100ms can be
CPU-intensive in deployments with hundreds or thousands of nodes
all running on the same machine. Thus, we add an option to the
futures-based `background-processor` to avoid waking every 100ms to
check for iOS having backgrounded our app and cut our TCP sockets.

This cuts the normal sleep time down from 100ms to 10s, for those
who turn it on.

13 months agoWake the background processor if an async monitor update completes
Matt Corallo [Thu, 9 Mar 2023 03:11:13 +0000 (03:11 +0000)]
Wake the background processor if an async monitor update completes

If the `ChainMonitor` gets an async monitor update completion, this
means the `ChannelManager` needs to be polled for event processing.
Here we wake it using the new multi-`Future`-await `Sleeper`, or
the existing `select` block in the async BP.

Fixes #2052.

13 months agoDrop the dummy no-std `Condvar` which never sleeps
Matt Corallo [Fri, 31 Mar 2023 18:08:10 +0000 (18:08 +0000)]
Drop the dummy no-std `Condvar` which never sleeps

In `no-std`, we exposed `wait` functions which rely on a dummy
`Condvar` which never actually sleeps. This is somwhat nonsensical,
not to mention confusing to users. Instead, we simply remove the
`wait` methods in `no-std` builds.

13 months agoMove the pub `wait` methods from `ChannelManager` to `Future`
Matt Corallo [Thu, 9 Mar 2023 02:48:17 +0000 (02:48 +0000)]
Move the pub `wait` methods from `ChannelManager` to `Future`

Rather than having three ways to await a `ChannelManager` being
persistable, this moves to just exposing the awaitable `Future` and
having sleep functions on that.

13 months agoImplement the ability to block on multiple futures at once
Matt Corallo [Fri, 31 Mar 2023 05:13:35 +0000 (05:13 +0000)]
Implement the ability to block on multiple futures at once

In the next commits we'll be adding a second notify pipeline - from
the `ChainMonitor` back to the background processor. This will
cause the `background-processor` to need to await multiple wakers
at once, which we cannot do in the current scheme without taking on
a full async runtime.

Building a multi-future waiter isn't so bad, and notably will allow
us to remove the existing sleep pipeline entirely, reducing the
complexity of our wakers implementation by only having one notify
path to consider.

13 months agoDo not bound callbacks by `Send` when building for `no-std`
Matt Corallo [Wed, 15 Mar 2023 17:43:29 +0000 (17:43 +0000)]
Do not bound callbacks by `Send` when building for `no-std`

`Send` is rather useless on a `no-std` target - we don't have
threads and are just needlessly restricting ourselves, so here we
skip it for the wakers callback.

13 months agoAdd `CondVar::wait_{timeout_,}while` to `debug_sync`
Matt Corallo [Mon, 20 Mar 2023 18:26:39 +0000 (18:26 +0000)]
Add `CondVar::wait_{timeout_,}while` to `debug_sync`

These are useful, but we previously couldn't use them due to our
MSRV. Now that we can, we should use them, so we expose them via
our normal debug_sync wrappers.

13 months agoImplement chain::Confirm without mandating any owned values
Lucas Soriano del Pino [Mon, 3 Apr 2023 11:12:44 +0000 (21:12 +1000)]
Implement chain::Confirm without mandating any owned values

13 months agoCorrect `lightning-net-tokio` documentation, remove stale example
Matt Corallo [Thu, 9 Mar 2023 02:52:48 +0000 (02:52 +0000)]
Correct `lightning-net-tokio` documentation, remove stale example

The `lightning-net-tokio` crate-level example contained a carryover
from when it was the primary notifier of the background processor
and now just shows an "example" of creating a method to call
another method with the same parameters and then do event
processing (which doesn't make sense, the BP should do that).

Instead, the examples are simply removed and the documentation is
tweaked to include recent changes.

13 months agoMerge pull request #2141 from TheBlueMatt/2023-03-fuck-rust
Wilmer Paulino [Fri, 31 Mar 2023 01:41:21 +0000 (18:41 -0700)]
Merge pull request #2141 from TheBlueMatt/2023-03-fuck-rust

Drop `futures` dependency from `lightning-block-sync`

13 months agoRemove `futures` dependency in `lightning-background-processor` 2023-03-fuck-rust
Matt Corallo [Thu, 30 Mar 2023 22:11:22 +0000 (22:11 +0000)]
Remove `futures` dependency in `lightning-background-processor`

As `futures` apparently makes no guarantees on MSRVs even in patch
releases we really can't rely on it at all, and while it currently
has an acceptable MSRV without the macros feature, its best to just
remove it wholesale.

Luckily, removing it is relatively trivial, even if it requires
the most trivial of unsafe tags.

13 months agoReplace `futures` `select` with our own select enum to fix MSRV
Matt Corallo [Thu, 30 Mar 2023 21:52:03 +0000 (21:52 +0000)]
Replace `futures` `select` with our own select enum to fix MSRV

`futures` recently broke our MSRV by bumping the `syn` major
version in a patch release. This makes it impractical for us to
use, instead here we replace the usage of its `select_biased` macro
with a trivial enum.

Given its simplicity we likely should have done this without ever
taking the dependency.

13 months agoAvoid connection-per-RPC-call again by caching connections
Matt Corallo [Thu, 30 Mar 2023 18:51:56 +0000 (18:51 +0000)]
Avoid connection-per-RPC-call again by caching connections

In general, only one request will be in flight at a time in
`lightning-block-sync`. Ideally we'd only have one connection, but
without using the `futures` mutex type.

Here we solve this narrowly for the one-request-at-a-time case by
caching the connection and takeing the connection out of the cache
while we work on it.

13 months agoDrop `futures` dependency from `lightning-block-sync`
Matt Corallo [Thu, 30 Mar 2023 18:33:04 +0000 (18:33 +0000)]
Drop `futures` dependency from `lightning-block-sync`

Some how I'd understood that `futures` had reasonable MSRV
guarantees (e.g. at least Debian stable), but apparently that isn't
actually the case, as they bumped it to upgrade to syn (with
apparently no actual features or bugfixes added as a result?) with
no minor version bump or any available alternative (unlike Tokio,
which does LTS releases).

Luckily its relatively easy to just drop the `futures` dependency -
it means a new connection for each request, which is annoying, but
certainly not the end of the world, and its easier than trying to
deal with pinning `futures`.

See https://github.com/rust-lang/futures-rs/pull/2733

13 months agoMerge pull request #2136 from marctyndel/2023-03-paymentforwarded-expose-amount-forwarded
Matt Corallo [Thu, 30 Mar 2023 18:15:23 +0000 (18:15 +0000)]
Merge pull request #2136 from marctyndel/2023-03-paymentforwarded-expose-amount-forwarded

Expose amount forwarded in `PaymentForwarded` event

13 months agoMerge pull request #2059 from wpaulino/broadcast-missing-anchors-event
Matt Corallo [Wed, 29 Mar 2023 21:54:58 +0000 (21:54 +0000)]
Merge pull request #2059 from wpaulino/broadcast-missing-anchors-event

Queue BackgroundEvent to force close channels upon ChannelManager::read

13 months agoadd outbound_amount_forwarded_msat field to PaymentForwarded event
Marc Tyndel [Tue, 28 Mar 2023 16:29:00 +0000 (12:29 -0400)]
add outbound_amount_forwarded_msat field to PaymentForwarded event

13 months agoMerge pull request #2062 from alecchendev/2023-02-allow-overshoot-mpp
valentinewallace [Wed, 29 Mar 2023 15:37:51 +0000 (11:37 -0400)]
Merge pull request #2062 from alecchendev/2023-02-allow-overshoot-mpp

Allow overshooting final htlc amount and expiry

13 months agoAdd pending changelog noting possible backwards compat panic
Wilmer Paulino [Tue, 28 Mar 2023 20:22:47 +0000 (13:22 -0700)]
Add pending changelog noting possible backwards compat panic

13 months agoIgnore lockorder violation on same callsite with different construction
Wilmer Paulino [Wed, 22 Mar 2023 18:46:05 +0000 (11:46 -0700)]
Ignore lockorder violation on same callsite with different construction

As long as the lock order on such locks is still valid, we should allow
them regardless of whether they were constructed at the same location or
not. Note that we can only really enforce this if we require one lock
call per line, or if we have access to symbol columns (as we do on Linux
and macOS). We opt for a smaller patch by relying on the latter.

This was previously triggered by some recent test changes to
`test_manager_serialize_deserialize_inconsistent_monitor`. When the
test ends and a node is dropped causing us to persist each, we'd detect
a possible lockorder violation deadlock across three different `Mutex`
instances that are held at the same location when serializing our
`per_peer_states` in `ChannelManager::write`.

The presumed lockorder violation happens because the first `Mutex` held
shares the same construction location with the third one, while the
second `Mutex` has a different construction location. When we hold the
second one, we consider the first as a dependency, and then consider the
second as a dependency when holding the third, causing a circular
dependency (since the third shares the same construction location as the
first).

This isn't considered a lockorder violation that could result in a
deadlock as the comment suggests inline though, since we are under a
dependent write lock which no one else can have access to.

13 months agoMerge pull request #2082 from wpaulino/bump-htlc-resolution-tx-locktime
Arik [Wed, 29 Mar 2023 00:14:59 +0000 (17:14 -0700)]
Merge pull request #2082 from wpaulino/bump-htlc-resolution-tx-locktime

Expose HTLC transaction locktime in BumpTransactionEvent::HTLCResolution

13 months agoUse onion amount `amt_to_forward` for MPP set calculation
Alec Chen [Tue, 7 Mar 2023 01:51:44 +0000 (19:51 -0600)]
Use onion amount `amt_to_forward` for MPP set calculation

If routing nodes take less fees and pay the final node more than
`amt_to_forward`, the receiver may see that `total_msat` has been met
before all of the sender's intended HTLCs have arrived. The receiver
may then prematurely claim the payment and release the payment hash,
allowing routing nodes to claim the remaining HTLCs. Using the onion
value `amt_to_forward` to determine when `total_msat` has been met
allows the sender to control the set total.

13 months agoAllow overshooting final cltv_expiry
Alec Chen [Tue, 7 Mar 2023 01:33:45 +0000 (19:33 -0600)]
Allow overshooting final cltv_expiry

Final nodes previously had stricter requirements on HTLC contents
matching onion value compared to intermediate nodes. This allowed
for probing, i.e. the last intermediate node could overshoot the
value by a small amount and conclude from the acceptance or rejection
of the HTLC whether the next node was the destination. This also
applies to the msat amount, however this change was already present.

13 months agoAllow overshooting `total_msat` for an MPP
Alec Chen [Wed, 1 Mar 2023 00:42:39 +0000 (18:42 -0600)]
Allow overshooting `total_msat` for an MPP

While retrying a failed path of an MPP, a node may want to overshoot
the `total_msat` in order to use a path with an `htlc_minimum_msat`
greater than the remaining value being sent. This commit no longer
fails MPPs that overshoot the `total_msat`, however it does fail
HTLCs with the same payment hash that are received *after* a
payment has become claimable.

13 months agoAdd `total_value_received` to `ClaimableHTLC` for claim validation
Alec Chen [Thu, 23 Mar 2023 19:34:57 +0000 (14:34 -0500)]
Add `total_value_received` to `ClaimableHTLC` for claim validation

This is pre-work for allowing nodes to overshoot onion values and
changing validation for MPP completion. This adds a field to
`ClaimableHTLC` that is separate from the onion values, which
represents the actual received amount reported in `PaymentClaimable`
which is what we want to validate against when a user goes to claim.

13 months agoExpose HTLC transaction locktime in BumpTransactionEvent::HTLCResolution
Wilmer Paulino [Tue, 7 Mar 2023 01:01:21 +0000 (17:01 -0800)]
Expose HTLC transaction locktime in BumpTransactionEvent::HTLCResolution

While users could easily figure it out based on the set of HTLC
descriptors included within, we already track it within the
`OnchainTxHandler`, so we might as well expose it to users as a
nice-to-have. It's also yet another thing they must get right to ensure
their HTLC transaction broadcasts are valid.

13 months agoSet transaction locktime on malleable packages to discourage fee sniping
Wilmer Paulino [Tue, 28 Mar 2023 19:09:13 +0000 (12:09 -0700)]
Set transaction locktime on malleable packages to discourage fee sniping

This only applies to all malleable packages on channels pre-dating
anchors and malleables packages for counterparty commitments
post-anchors. Malleables packages for holder commitments post-anchors
should have their transaction locktime applied manually by the consumer
of `BumpTransactionEvent::HTLCResolution` events.