Skip to content

Commit d8caac4

Browse files
authored
Merge pull request #3567 from TheBlueMatt/2025-01-0.1.1-backports
0.1.1 Backports
2 parents d378023 + 8c49359 commit d8caac4

21 files changed

+812
-352
lines changed

fuzz/src/chanmon_consistency.rs

+10-21
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ use lightning::ln::channel::FEE_SPIKE_BUFFER_FEE_INCREASE_MULTIPLE;
4848
use lightning::ln::channel_state::ChannelDetails;
4949
use lightning::ln::channelmanager::{
5050
ChainParameters, ChannelManager, ChannelManagerReadArgs, PaymentId, RecentPaymentDetails,
51-
RecipientOnionFields, Retry,
51+
RecipientOnionFields,
5252
};
5353
use lightning::ln::functional_test_utils::*;
5454
use lightning::ln::inbound_payment::ExpandedKey;
@@ -82,7 +82,6 @@ use bitcoin::secp256k1::{self, Message, PublicKey, Scalar, Secp256k1, SecretKey}
8282

8383
use lightning::io::Cursor;
8484
use std::cmp::{self, Ordering};
85-
use std::collections::VecDeque;
8685
use std::mem;
8786
use std::sync::atomic;
8887
use std::sync::{Arc, Mutex};
@@ -113,22 +112,14 @@ impl FeeEstimator for FuzzEstimator {
113112
}
114113
}
115114

116-
struct FuzzRouter {
117-
pub next_routes: Mutex<VecDeque<Route>>,
118-
}
115+
struct FuzzRouter {}
119116

120117
impl Router for FuzzRouter {
121118
fn find_route(
122119
&self, _payer: &PublicKey, _params: &RouteParameters,
123120
_first_hops: Option<&[&ChannelDetails]>, _inflight_htlcs: InFlightHtlcs,
124121
) -> Result<Route, msgs::LightningError> {
125-
if let Some(route) = self.next_routes.lock().unwrap().pop_front() {
126-
return Ok(route);
127-
}
128-
Err(msgs::LightningError {
129-
err: String::from("Not implemented"),
130-
action: msgs::ErrorAction::IgnoreError,
131-
})
122+
unreachable!()
132123
}
133124

134125
fn create_blinded_payment_paths<T: secp256k1::Signing + secp256k1::Verification>(
@@ -518,7 +509,7 @@ fn send_payment(
518509
PaymentParameters::from_node_id(source.get_our_node_id(), TEST_FINAL_CLTV),
519510
amt,
520511
);
521-
source.router.next_routes.lock().unwrap().push_back(Route {
512+
let route = Route {
522513
paths: vec![Path {
523514
hops: vec![RouteHop {
524515
pubkey: dest.get_our_node_id(),
@@ -532,11 +523,10 @@ fn send_payment(
532523
blinded_tail: None,
533524
}],
534525
route_params: Some(route_params.clone()),
535-
});
526+
};
536527
let onion = RecipientOnionFields::secret_only(payment_secret);
537528
let payment_id = PaymentId(payment_id);
538-
let res =
539-
source.send_payment(payment_hash, onion, payment_id, route_params, Retry::Attempts(0));
529+
let res = source.send_payment_with_route(route, payment_hash, onion, payment_id);
540530
match res {
541531
Err(err) => {
542532
panic!("Errored with {:?} on initial payment send", err);
@@ -592,7 +582,7 @@ fn send_hop_payment(
592582
PaymentParameters::from_node_id(source.get_our_node_id(), TEST_FINAL_CLTV),
593583
amt,
594584
);
595-
source.router.next_routes.lock().unwrap().push_back(Route {
585+
let route = Route {
596586
paths: vec![Path {
597587
hops: vec![
598588
RouteHop {
@@ -617,11 +607,10 @@ fn send_hop_payment(
617607
blinded_tail: None,
618608
}],
619609
route_params: Some(route_params.clone()),
620-
});
610+
};
621611
let onion = RecipientOnionFields::secret_only(payment_secret);
622612
let payment_id = PaymentId(payment_id);
623-
let res =
624-
source.send_payment(payment_hash, onion, payment_id, route_params, Retry::Attempts(0));
613+
let res = source.send_payment_with_route(route, payment_hash, onion, payment_id);
625614
match res {
626615
Err(err) => {
627616
panic!("Errored with {:?} on initial payment send", err);
@@ -640,7 +629,7 @@ fn send_hop_payment(
640629
pub fn do_test<Out: Output>(data: &[u8], underlying_out: Out, anchors: bool) {
641630
let out = SearchingOutput::new(underlying_out);
642631
let broadcast = Arc::new(TestBroadcaster {});
643-
let router = FuzzRouter { next_routes: Mutex::new(VecDeque::new()) };
632+
let router = FuzzRouter {};
644633

645634
macro_rules! make_node {
646635
($node_id: expr, $fee_estimator: expr) => {{

lightning-background-processor/src/lib.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -1099,7 +1099,7 @@ mod tests {
10991099
SCORER_PERSISTENCE_SECONDARY_NAMESPACE,
11001100
};
11011101
use lightning::util::ser::Writeable;
1102-
use lightning::util::sweep::{OutputSpendStatus, OutputSweeper};
1102+
use lightning::util::sweep::{OutputSpendStatus, OutputSweeper, PRUNE_DELAY_BLOCKS};
11031103
use lightning::util::test_utils;
11041104
use lightning::{get_event, get_event_msg};
11051105
use lightning_persister::fs_store::FilesystemStore;
@@ -2282,8 +2282,8 @@ mod tests {
22822282
}
22832283

22842284
// Check we stop tracking the spendable outputs when one of the txs reaches
2285-
// ANTI_REORG_DELAY confirmations.
2286-
confirm_transaction_depth(&mut nodes[0], &sweep_tx_0, ANTI_REORG_DELAY);
2285+
// PRUNE_DELAY_BLOCKS confirmations.
2286+
confirm_transaction_depth(&mut nodes[0], &sweep_tx_0, PRUNE_DELAY_BLOCKS);
22872287
assert_eq!(nodes[0].sweeper.tracked_spendable_outputs().len(), 0);
22882288

22892289
if !std::thread::panicking() {

lightning-invoice/src/lib.rs

+20-3
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ use core::iter::FilterMap;
4848
use core::num::ParseIntError;
4949
use core::ops::Deref;
5050
use core::slice::Iter;
51+
use core::str::FromStr;
5152
use core::time::Duration;
5253

5354
#[cfg(feature = "serde")]
@@ -78,8 +79,12 @@ use crate::prelude::*;
7879
/// Re-export serialization traits
7980
#[cfg(fuzzing)]
8081
pub use crate::de::FromBase32;
82+
#[cfg(not(fuzzing))]
83+
use crate::de::FromBase32;
8184
#[cfg(fuzzing)]
8285
pub use crate::ser::Base32Iterable;
86+
#[cfg(not(fuzzing))]
87+
use crate::ser::Base32Iterable;
8388

8489
/// Errors that indicate what is wrong with the invoice. They have some granularity for debug
8590
/// reasons, but should generally result in an "invalid BOLT11 invoice" message for the user.
@@ -1086,9 +1091,6 @@ impl RawBolt11Invoice {
10861091

10871092
/// Calculate the hash of the encoded `RawBolt11Invoice` which should be signed.
10881093
pub fn signable_hash(&self) -> [u8; 32] {
1089-
#[cfg(not(fuzzing))]
1090-
use crate::ser::Base32Iterable;
1091-
10921094
Self::hash_from_parts(self.hrp.to_string().as_bytes(), self.data.fe_iter())
10931095
}
10941096

@@ -1189,6 +1191,21 @@ impl RawBolt11Invoice {
11891191
pub fn currency(&self) -> Currency {
11901192
self.hrp.currency.clone()
11911193
}
1194+
1195+
/// Convert to HRP prefix and Fe32 encoded data part.
1196+
/// Can be used to transmit unsigned invoices for remote signing.
1197+
pub fn to_raw(&self) -> (String, Vec<Fe32>) {
1198+
(self.hrp.to_string(), self.data.fe_iter().collect())
1199+
}
1200+
1201+
/// Convert from HRP prefix and Fe32 encoded data part.
1202+
/// Can be used to receive unsigned invoices for remote signing.
1203+
pub fn from_raw(hrp: &str, data: &[Fe32]) -> Result<Self, Bolt11ParseError> {
1204+
let raw_hrp: RawHrp = RawHrp::from_str(hrp)?;
1205+
let data_part = RawDataPart::from_base32(data)?;
1206+
1207+
Ok(Self { hrp: raw_hrp, data: data_part })
1208+
}
11921209
}
11931210

11941211
impl PositiveTimestamp {

lightning/src/chain/chaininterface.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ pub trait FeeEstimator {
176176
}
177177

178178
/// Minimum relay fee as required by bitcoin network mempool policy.
179-
pub const MIN_RELAY_FEE_SAT_PER_1000_WEIGHT: u64 = 4000;
179+
pub const MIN_RELAY_FEE_SAT_PER_1000_WEIGHT: u64 = 253;
180180
/// Minimum feerate that takes a sane approach to bitcoind weight-to-vbytes rounding.
181181
/// See the following Core Lightning commit for an explanation:
182182
/// <https://github.com/ElementsProject/lightning/commit/2e687b9b352c9092b5e8bd4a688916ac50b44af0>

lightning/src/chain/channelmonitor.rs

+90-13
Original file line numberDiff line numberDiff line change
@@ -256,6 +256,10 @@ pub(crate) const LATENCY_GRACE_PERIOD_BLOCKS: u32 = 3;
256256
// solved by a previous claim tx. What we want to avoid is reorg evicting our claim tx and us not
257257
// keep bumping another claim tx to solve the outpoint.
258258
pub const ANTI_REORG_DELAY: u32 = 6;
259+
/// Number of blocks we wait before assuming a [`ChannelMonitor`] to be fully resolved and
260+
/// considering it be safely archived.
261+
// 4032 blocks are roughly four weeks
262+
pub const ARCHIVAL_DELAY_BLOCKS: u32 = 4032;
259263
/// Number of blocks before confirmation at which we fail back an un-relayed HTLC or at which we
260264
/// refuse to accept a new HTLC.
261265
///
@@ -1023,6 +1027,12 @@ pub(crate) struct ChannelMonitorImpl<Signer: EcdsaChannelSigner> {
10231027

10241028
/// The first block height at which we had no remaining claimable balances.
10251029
balances_empty_height: Option<u32>,
1030+
1031+
/// In-memory only HTLC ids used to track upstream HTLCs that have been failed backwards due to
1032+
/// a downstream channel force-close remaining unconfirmed by the time the upstream timeout
1033+
/// expires. This is used to tell us we already generated an event to fail this HTLC back
1034+
/// during a previous block scan.
1035+
failed_back_htlc_ids: HashSet<SentHTLCId>,
10261036
}
10271037

10281038
/// Transaction outputs to watch for on-chain spends.
@@ -1445,6 +1455,8 @@ impl<Signer: EcdsaChannelSigner> ChannelMonitor<Signer> {
14451455
counterparty_node_id: Some(counterparty_node_id),
14461456
initial_counterparty_commitment_info: None,
14471457
balances_empty_height: None,
1458+
1459+
failed_back_htlc_ids: new_hash_set(),
14481460
})
14491461
}
14501462

@@ -2015,10 +2027,11 @@ impl<Signer: EcdsaChannelSigner> ChannelMonitor<Signer> {
20152027
///
20162028
/// This function returns a tuple of two booleans, the first indicating whether the monitor is
20172029
/// fully resolved, and the second whether the monitor needs persistence to ensure it is
2018-
/// reliably marked as resolved within 4032 blocks.
2030+
/// reliably marked as resolved within [`ARCHIVAL_DELAY_BLOCKS`] blocks.
20192031
///
2020-
/// The first boolean is true only if [`Self::get_claimable_balances`] has been empty for at least
2021-
/// 4032 blocks as an additional protection against any bugs resulting in spuriously empty balance sets.
2032+
/// The first boolean is true only if [`Self::get_claimable_balances`] has been empty for at
2033+
/// least [`ARCHIVAL_DELAY_BLOCKS`] blocks as an additional protection against any bugs
2034+
/// resulting in spuriously empty balance sets.
20222035
pub fn check_and_update_full_resolution_status<L: Logger>(&self, logger: &L) -> (bool, bool) {
20232036
let mut is_all_funds_claimed = self.get_claimable_balances().is_empty();
20242037
let current_height = self.current_best_block().height;
@@ -2034,11 +2047,10 @@ impl<Signer: EcdsaChannelSigner> ChannelMonitor<Signer> {
20342047
// once processed, implies the preimage exists in the corresponding inbound channel.
20352048
let preimages_not_needed_elsewhere = inner.pending_monitor_events.is_empty();
20362049

2037-
const BLOCKS_THRESHOLD: u32 = 4032; // ~four weeks
20382050
match (inner.balances_empty_height, is_all_funds_claimed, preimages_not_needed_elsewhere) {
20392051
(Some(balances_empty_height), true, true) => {
20402052
// Claimed all funds, check if reached the blocks threshold.
2041-
(current_height >= balances_empty_height + BLOCKS_THRESHOLD, false)
2053+
(current_height >= balances_empty_height + ARCHIVAL_DELAY_BLOCKS, false)
20422054
},
20432055
(Some(_), false, _)|(Some(_), _, false) => {
20442056
// previously assumed we claimed all funds, but we have new funds to claim or
@@ -2058,7 +2070,7 @@ impl<Signer: EcdsaChannelSigner> ChannelMonitor<Signer> {
20582070
// None. It is set to the current block height.
20592071
log_debug!(logger,
20602072
"ChannelMonitor funded at {} is now fully resolved. It will become archivable in {} blocks",
2061-
inner.get_funding_txo().0, BLOCKS_THRESHOLD);
2073+
inner.get_funding_txo().0, ARCHIVAL_DELAY_BLOCKS);
20622074
inner.balances_empty_height = Some(current_height);
20632075
(false, true)
20642076
},
@@ -3274,7 +3286,7 @@ impl<Signer: EcdsaChannelSigner> ChannelMonitorImpl<Signer> {
32743286
}
32753287
}
32763288

3277-
if ret.is_ok() && (self.funding_spend_seen || self.lockdown_from_offchain) && is_pre_close_update {
3289+
if ret.is_ok() && (self.funding_spend_seen || self.lockdown_from_offchain || self.holder_tx_signed) && is_pre_close_update {
32783290
log_error!(logger, "Refusing Channel Monitor Update as counterparty attempted to update commitment after funding was spent");
32793291
Err(())
32803292
} else { ret }
@@ -4221,6 +4233,71 @@ impl<Signer: EcdsaChannelSigner> ChannelMonitorImpl<Signer> {
42214233
}
42224234
}
42234235

4236+
if self.lockdown_from_offchain || self.funding_spend_seen || self.holder_tx_signed {
4237+
// Fail back HTLCs on backwards channels if they expire within
4238+
// `LATENCY_GRACE_PERIOD_BLOCKS` blocks and the channel is closed (i.e. we're at a
4239+
// point where no further off-chain updates will be accepted). If we haven't seen the
4240+
// preimage for an HTLC by the time the previous hop's timeout expires, we've lost that
4241+
// HTLC, so we might as well fail it back instead of having our counterparty force-close
4242+
// the inbound channel.
4243+
let current_holder_htlcs = self.current_holder_commitment_tx.htlc_outputs.iter()
4244+
.map(|&(ref a, _, ref b)| (a, b.as_ref()));
4245+
4246+
let current_counterparty_htlcs = if let Some(txid) = self.current_counterparty_commitment_txid {
4247+
if let Some(htlc_outputs) = self.counterparty_claimable_outpoints.get(&txid) {
4248+
Some(htlc_outputs.iter().map(|&(ref a, ref b)| (a, b.as_ref().map(|boxed| &**boxed))))
4249+
} else { None }
4250+
} else { None }.into_iter().flatten();
4251+
4252+
let prev_counterparty_htlcs = if let Some(txid) = self.prev_counterparty_commitment_txid {
4253+
if let Some(htlc_outputs) = self.counterparty_claimable_outpoints.get(&txid) {
4254+
Some(htlc_outputs.iter().map(|&(ref a, ref b)| (a, b.as_ref().map(|boxed| &**boxed))))
4255+
} else { None }
4256+
} else { None }.into_iter().flatten();
4257+
4258+
let htlcs = current_holder_htlcs
4259+
.chain(current_counterparty_htlcs)
4260+
.chain(prev_counterparty_htlcs);
4261+
4262+
let height = self.best_block.height;
4263+
for (htlc, source_opt) in htlcs {
4264+
// Only check forwarded HTLCs' previous hops
4265+
let source = match source_opt {
4266+
Some(source) => source,
4267+
None => continue,
4268+
};
4269+
let inbound_htlc_expiry = match source.inbound_htlc_expiry() {
4270+
Some(cltv_expiry) => cltv_expiry,
4271+
None => continue,
4272+
};
4273+
let max_expiry_height = height.saturating_add(LATENCY_GRACE_PERIOD_BLOCKS);
4274+
if inbound_htlc_expiry > max_expiry_height {
4275+
continue;
4276+
}
4277+
let duplicate_event = self.pending_monitor_events.iter().any(
4278+
|update| if let &MonitorEvent::HTLCEvent(ref upd) = update {
4279+
upd.source == *source
4280+
} else { false });
4281+
if duplicate_event {
4282+
continue;
4283+
}
4284+
if !self.failed_back_htlc_ids.insert(SentHTLCId::from_source(source)) {
4285+
continue;
4286+
}
4287+
if !duplicate_event {
4288+
log_error!(logger, "Failing back HTLC {} upstream to preserve the \
4289+
channel as the forward HTLC hasn't resolved and our backward HTLC \
4290+
expires soon at {}", log_bytes!(htlc.payment_hash.0), inbound_htlc_expiry);
4291+
self.pending_monitor_events.push(MonitorEvent::HTLCEvent(HTLCUpdate {
4292+
source: source.clone(),
4293+
payment_preimage: None,
4294+
payment_hash: htlc.payment_hash,
4295+
htlc_value_satoshis: Some(htlc.amount_msat / 1000),
4296+
}));
4297+
}
4298+
}
4299+
}
4300+
42244301
let conf_target = self.closure_conf_target();
42254302
self.onchain_tx_handler.update_claims_view_from_requests(claimable_outpoints, conf_height, self.best_block.height, broadcaster, conf_target, fee_estimator, logger);
42264303
self.onchain_tx_handler.update_claims_view_from_matched_txn(&txn_matched, conf_height, conf_hash, self.best_block.height, broadcaster, conf_target, fee_estimator, logger);
@@ -5066,6 +5143,7 @@ impl<'a, 'b, ES: EntropySource, SP: SignerProvider> ReadableArgs<(&'a ES, &'b SP
50665143
counterparty_node_id,
50675144
initial_counterparty_commitment_info,
50685145
balances_empty_height,
5146+
failed_back_htlc_ids: new_hash_set(),
50695147
})))
50705148
}
50715149
}
@@ -5092,7 +5170,7 @@ mod tests {
50925170
use crate::chain::chaininterface::LowerBoundedFeeEstimator;
50935171

50945172
use super::ChannelMonitorUpdateStep;
5095-
use crate::{check_added_monitors, check_spends, get_local_commitment_txn, get_monitor, get_route_and_payment_hash, unwrap_send_err};
5173+
use crate::{check_added_monitors, check_spends, get_local_commitment_txn, get_monitor, get_route_and_payment_hash};
50965174
use crate::chain::{BestBlock, Confirm};
50975175
use crate::chain::channelmonitor::{ChannelMonitor, WithChannelMonitor};
50985176
use crate::chain::package::{weight_offered_htlc, weight_received_htlc, weight_revoked_offered_htlc, weight_revoked_received_htlc, WEIGHT_REVOKED_OUTPUT};
@@ -5102,10 +5180,9 @@ mod tests {
51025180
use crate::types::payment::{PaymentPreimage, PaymentHash};
51035181
use crate::ln::channel_keys::{DelayedPaymentBasepoint, DelayedPaymentKey, HtlcBasepoint, RevocationBasepoint, RevocationKey};
51045182
use crate::ln::chan_utils::{self,HTLCOutputInCommitment, ChannelPublicKeys, ChannelTransactionParameters, HolderCommitmentTransaction, CounterpartyChannelTransactionParameters};
5105-
use crate::ln::channelmanager::{PaymentSendFailure, PaymentId, RecipientOnionFields};
5183+
use crate::ln::channelmanager::{PaymentId, RecipientOnionFields};
51065184
use crate::ln::functional_test_utils::*;
51075185
use crate::ln::script::ShutdownScript;
5108-
use crate::util::errors::APIError;
51095186
use crate::util::test_utils::{TestLogger, TestBroadcaster, TestFeeEstimator};
51105187
use crate::util::ser::{ReadableArgs, Writeable};
51115188
use crate::util::logger::Logger;
@@ -5166,9 +5243,9 @@ mod tests {
51665243
// If the ChannelManager tries to update the channel, however, the ChainMonitor will pass
51675244
// the update through to the ChannelMonitor which will refuse it (as the channel is closed).
51685245
let (route, payment_hash, _, payment_secret) = get_route_and_payment_hash!(nodes[1], nodes[0], 100_000);
5169-
unwrap_send_err!(nodes[1].node.send_payment_with_route(route, payment_hash,
5170-
RecipientOnionFields::secret_only(payment_secret), PaymentId(payment_hash.0)
5171-
), false, APIError::MonitorUpdateInProgress, {});
5246+
nodes[1].node.send_payment_with_route(route, payment_hash,
5247+
RecipientOnionFields::secret_only(payment_secret), PaymentId(payment_hash.0)
5248+
).unwrap();
51725249
check_added_monitors!(nodes[1], 1);
51735250

51745251
// Build a new ChannelMonitorUpdate which contains both the failing commitment tx update

lightning/src/chain/onchaintx.rs

+1
Original file line numberDiff line numberDiff line change
@@ -215,6 +215,7 @@ pub(crate) enum OnchainClaim {
215215
}
216216

217217
/// Represents the different feerate strategies a pending request can use when generating a claim.
218+
#[derive(Debug)]
218219
pub(crate) enum FeerateStrategy {
219220
/// We must reuse the most recently used feerate, if any.
220221
RetryPrevious,

0 commit comments

Comments
 (0)