2015-12-26 09:09:17 +03:00
|
|
|
package main
|
2015-12-30 02:09:38 +03:00
|
|
|
|
|
|
|
import (
|
2016-11-11 04:37:21 +03:00
|
|
|
"crypto/rand"
|
2017-03-16 04:56:25 +03:00
|
|
|
"crypto/sha256"
|
2016-06-21 21:52:09 +03:00
|
|
|
"encoding/hex"
|
2017-01-25 04:12:51 +03:00
|
|
|
"errors"
|
2015-12-31 08:40:41 +03:00
|
|
|
"fmt"
|
2016-07-13 03:46:25 +03:00
|
|
|
"io"
|
2016-12-27 08:51:47 +03:00
|
|
|
"math"
|
2016-10-28 05:49:10 +03:00
|
|
|
"net"
|
2017-03-30 07:17:21 +03:00
|
|
|
"strconv"
|
2017-01-15 05:12:20 +03:00
|
|
|
"strings"
|
2016-09-19 22:04:56 +03:00
|
|
|
"time"
|
2016-01-16 22:09:12 +03:00
|
|
|
|
2018-01-16 19:18:41 +03:00
|
|
|
"gopkg.in/macaroon-bakery.v2/bakery"
|
2017-08-18 04:50:57 +03:00
|
|
|
|
2016-01-17 06:12:36 +03:00
|
|
|
"sync"
|
|
|
|
"sync/atomic"
|
2015-12-30 02:09:38 +03:00
|
|
|
|
2018-03-11 06:00:57 +03:00
|
|
|
"github.com/coreos/bbolt"
|
2016-09-21 03:15:26 +03:00
|
|
|
"github.com/davecgh/go-spew/spew"
|
2016-09-19 22:04:56 +03:00
|
|
|
"github.com/lightningnetwork/lnd/channeldb"
|
2017-05-02 23:04:58 +03:00
|
|
|
"github.com/lightningnetwork/lnd/htlcswitch"
|
2016-01-16 21:38:48 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnrpc"
|
2016-08-13 01:53:18 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnwallet"
|
2016-07-13 03:46:25 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnwire"
|
2016-12-27 08:50:19 +03:00
|
|
|
"github.com/lightningnetwork/lnd/routing"
|
2017-01-03 02:36:15 +03:00
|
|
|
"github.com/lightningnetwork/lnd/zpay32"
|
2017-05-17 05:14:48 +03:00
|
|
|
"github.com/roasbeef/btcd/blockchain"
|
2016-09-21 03:15:26 +03:00
|
|
|
"github.com/roasbeef/btcd/btcec"
|
2017-01-06 00:56:27 +03:00
|
|
|
"github.com/roasbeef/btcd/chaincfg/chainhash"
|
2016-05-15 17:17:44 +03:00
|
|
|
"github.com/roasbeef/btcd/txscript"
|
|
|
|
"github.com/roasbeef/btcd/wire"
|
|
|
|
"github.com/roasbeef/btcutil"
|
|
|
|
"github.com/roasbeef/btcwallet/waddrmgr"
|
2017-04-20 05:28:10 +03:00
|
|
|
"github.com/tv42/zbase32"
|
2015-12-30 02:09:38 +03:00
|
|
|
"golang.org/x/net/context"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
defaultAccount uint32 = waddrmgr.DefaultAccountNum
|
2017-08-18 04:50:57 +03:00
|
|
|
|
2018-01-16 19:18:41 +03:00
|
|
|
// readPermissions is a slice of all entities that allow read
|
|
|
|
// permissions for authorization purposes, all lowercase.
|
|
|
|
readPermissions = []bakery.Op{
|
|
|
|
{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "read",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "read",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "address",
|
|
|
|
Action: "read",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "message",
|
|
|
|
Action: "read",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "peers",
|
|
|
|
Action: "read",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "read",
|
|
|
|
},
|
2018-03-21 02:42:15 +03:00
|
|
|
{
|
|
|
|
Entity: "invoices",
|
|
|
|
Action: "read",
|
|
|
|
},
|
2018-01-16 19:18:41 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// writePermissions is a slice of all entities that allow write
|
|
|
|
// permissions for authorization purposes, all lowercase.
|
|
|
|
writePermissions = []bakery.Op{
|
|
|
|
{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "write",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "write",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "address",
|
|
|
|
Action: "write",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "message",
|
|
|
|
Action: "write",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "peers",
|
|
|
|
Action: "write",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "write",
|
|
|
|
},
|
2018-03-21 02:42:15 +03:00
|
|
|
{
|
|
|
|
Entity: "invoices",
|
|
|
|
Action: "write",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2018-03-21 02:40:14 +03:00
|
|
|
// invoicePermissions is a slice of all the entities that allows a user
|
|
|
|
// to only access calls that are related to invoices, so: streaming
|
|
|
|
// RPC's, generating, and listening invoices.
|
|
|
|
invoicePermissions = []bakery.Op{
|
|
|
|
{
|
|
|
|
Entity: "invoices",
|
|
|
|
Action: "read",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "invoices",
|
|
|
|
Action: "write",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "address",
|
|
|
|
Action: "read",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Entity: "address",
|
|
|
|
Action: "write",
|
|
|
|
},
|
2018-01-16 19:18:41 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// permissions maps RPC calls to the permissions they require.
|
|
|
|
permissions = map[string][]bakery.Op{
|
|
|
|
"/lnrpc.Lightning/SendCoins": {{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/SendMany": {{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/NewAddress": {{
|
|
|
|
Entity: "address",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/NewWitnessAddress": {{
|
|
|
|
Entity: "address",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/SignMessage": {{
|
|
|
|
Entity: "message",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/VerifyMessage": {{
|
|
|
|
Entity: "message",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/ConnectPeer": {{
|
|
|
|
Entity: "peers",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/DisconnectPeer": {{
|
|
|
|
Entity: "peers",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/OpenChannel": {{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "write",
|
|
|
|
}, {
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
2018-02-12 04:15:31 +03:00
|
|
|
"/lnrpc.Lightning/OpenChannelSync": {{
|
2018-01-16 19:18:41 +03:00
|
|
|
Entity: "onchain",
|
|
|
|
Action: "write",
|
|
|
|
}, {
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/CloseChannel": {{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "write",
|
|
|
|
}, {
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/GetInfo": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/ListPeers": {{
|
|
|
|
Entity: "peers",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/WalletBalance": {{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/ChannelBalance": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/PendingChannels": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/ListChannels": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/SendPayment": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/SendPaymentSync": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/AddInvoice": {{
|
2018-03-21 02:44:53 +03:00
|
|
|
Entity: "invoices",
|
2018-01-16 19:18:41 +03:00
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/LookupInvoice": {{
|
2018-03-21 02:44:53 +03:00
|
|
|
Entity: "invoices",
|
2018-01-16 19:18:41 +03:00
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/ListInvoices": {{
|
2018-03-21 02:44:53 +03:00
|
|
|
Entity: "invoices",
|
2018-01-16 19:18:41 +03:00
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/SubscribeInvoices": {{
|
2018-03-21 02:44:53 +03:00
|
|
|
Entity: "invoices",
|
2018-01-16 19:18:41 +03:00
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/SubscribeTransactions": {{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/GetTransactions": {{
|
|
|
|
Entity: "onchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/DescribeGraph": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/GetChanInfo": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/GetNodeInfo": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/QueryRoutes": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/GetNetworkInfo": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/StopDaemon": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/SubscribeChannelGraph": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/ListPayments": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/DeleteAllPayments": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/DebugLevel": {{
|
|
|
|
Entity: "info",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/DecodePayReq": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/FeeReport": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
|
|
|
"/lnrpc.Lightning/UpdateChannelPolicy": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "write",
|
|
|
|
}},
|
2018-02-28 09:23:27 +03:00
|
|
|
"/lnrpc.Lightning/ForwardingHistory": {{
|
|
|
|
Entity: "offchain",
|
|
|
|
Action: "read",
|
|
|
|
}},
|
2017-08-18 04:50:57 +03:00
|
|
|
}
|
2015-12-30 02:09:38 +03:00
|
|
|
)
|
|
|
|
|
2017-08-22 10:28:40 +03:00
|
|
|
const (
|
|
|
|
// maxPaymentMSat is the maximum allowed payment permitted currently as
|
|
|
|
// defined in BOLT-0002.
|
|
|
|
maxPaymentMSat = lnwire.MilliSatoshi(math.MaxUint32)
|
|
|
|
)
|
|
|
|
|
2016-06-21 21:52:09 +03:00
|
|
|
// rpcServer is a gRPC, RPC front end to the lnd daemon.
|
2016-09-26 20:29:18 +03:00
|
|
|
// TODO(roasbeef): pagination support for the list-style calls
|
2016-01-17 06:07:44 +03:00
|
|
|
type rpcServer struct {
|
|
|
|
started int32 // To be used atomically.
|
|
|
|
shutdown int32 // To be used atomically.
|
|
|
|
|
2017-08-22 09:25:41 +03:00
|
|
|
server *server
|
|
|
|
|
2016-01-17 06:07:44 +03:00
|
|
|
wg sync.WaitGroup
|
|
|
|
|
|
|
|
quit chan struct{}
|
2015-12-30 02:09:38 +03:00
|
|
|
}
|
|
|
|
|
2016-06-21 21:52:09 +03:00
|
|
|
// A compile time check to ensure that rpcServer fully implements the
|
|
|
|
// LightningServer gRPC service.
|
2015-12-30 02:21:42 +03:00
|
|
|
var _ lnrpc.LightningServer = (*rpcServer)(nil)
|
|
|
|
|
2017-02-23 01:49:04 +03:00
|
|
|
// newRPCServer creates and returns a new instance of the rpcServer.
|
2018-01-16 19:18:41 +03:00
|
|
|
func newRPCServer(s *server) *rpcServer {
|
2017-08-18 04:50:57 +03:00
|
|
|
return &rpcServer{
|
2018-01-16 19:18:41 +03:00
|
|
|
server: s,
|
|
|
|
quit: make(chan struct{}, 1),
|
2017-08-18 04:50:57 +03:00
|
|
|
}
|
2015-12-30 02:09:38 +03:00
|
|
|
}
|
|
|
|
|
2017-08-22 09:25:41 +03:00
|
|
|
// Start launches any helper goroutines required for the rpcServer to function.
|
2016-01-17 06:12:36 +03:00
|
|
|
func (r *rpcServer) Start() error {
|
|
|
|
if atomic.AddInt32(&r.started, 1) != 1 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-01-14 08:41:46 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-06-21 21:52:09 +03:00
|
|
|
// Stop signals any active goroutines for a graceful closure.
|
2016-01-17 06:12:36 +03:00
|
|
|
func (r *rpcServer) Stop() error {
|
|
|
|
if atomic.AddInt32(&r.shutdown, 1) != 1 {
|
|
|
|
return nil
|
2016-01-02 07:27:40 +03:00
|
|
|
}
|
2016-01-17 06:12:36 +03:00
|
|
|
|
2016-04-25 06:26:32 +03:00
|
|
|
close(r.quit)
|
|
|
|
|
2016-01-17 06:12:36 +03:00
|
|
|
return nil
|
2016-01-02 07:27:40 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 21:31:29 +03:00
|
|
|
// addrPairsToOutputs converts a map describing a set of outputs to be created,
|
|
|
|
// the outputs themselves. The passed map pairs up an address, to a desired
|
|
|
|
// output value amount. Each address is converted to its corresponding pkScript
|
|
|
|
// to be used within the constructed output(s).
|
|
|
|
func addrPairsToOutputs(addrPairs map[string]int64) ([]*wire.TxOut, error) {
|
|
|
|
outputs := make([]*wire.TxOut, 0, len(addrPairs))
|
|
|
|
for addr, amt := range addrPairs {
|
2016-07-14 04:37:50 +03:00
|
|
|
addr, err := btcutil.DecodeAddress(addr, activeNetParams.Params)
|
2016-03-23 04:48:46 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pkscript, err := txscript.PayToAddrScript(addr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
outputs = append(outputs, wire.NewTxOut(amt, pkscript))
|
2015-12-30 02:09:38 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 21:31:29 +03:00
|
|
|
return outputs, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// sendCoinsOnChain makes an on-chain transaction in or to send coins to one or
|
|
|
|
// more addresses specified in the passed payment map. The payment map maps an
|
|
|
|
// address to a specified output value to be sent to that address.
|
2017-11-23 09:57:23 +03:00
|
|
|
func (r *rpcServer) sendCoinsOnChain(paymentMap map[string]int64,
|
2018-02-13 17:13:01 +03:00
|
|
|
feeRate lnwallet.SatPerVByte) (*chainhash.Hash, error) {
|
2017-11-23 09:57:23 +03:00
|
|
|
|
2016-06-29 21:31:29 +03:00
|
|
|
outputs, err := addrPairsToOutputs(paymentMap)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
return r.server.cc.wallet.SendOutputs(outputs, feeRate)
|
2017-11-23 09:57:23 +03:00
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
// determineFeePerVSize will determine the fee in sat/vbyte that should be paid
|
2017-11-23 09:57:23 +03:00
|
|
|
// given an estimator, a confirmation target, and a manual value for sat/byte.
|
2018-02-07 06:11:11 +03:00
|
|
|
// A value is chosen based on the two free parameters as one, or both of them
|
2017-11-23 09:57:23 +03:00
|
|
|
// can be zero.
|
2018-02-13 17:13:01 +03:00
|
|
|
func determineFeePerVSize(feeEstimator lnwallet.FeeEstimator, targetConf int32,
|
|
|
|
feePerByte int64) (lnwallet.SatPerVByte, error) {
|
2017-11-23 09:57:23 +03:00
|
|
|
|
|
|
|
switch {
|
|
|
|
// If the target number of confirmations is set, then we'll use that to
|
2018-02-07 06:11:11 +03:00
|
|
|
// consult our fee estimator for an adequate fee.
|
2017-11-23 09:57:23 +03:00
|
|
|
case targetConf != 0:
|
2018-02-13 17:13:01 +03:00
|
|
|
feePerVSize, err := feeEstimator.EstimateFeePerVSize(
|
2017-11-23 09:57:23 +03:00
|
|
|
uint32(targetConf),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return 0, fmt.Errorf("unable to query fee "+
|
|
|
|
"estimator: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
return feePerVSize, nil
|
2017-11-23 09:57:23 +03:00
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// If a manual sat/byte fee rate is set, then we'll use that directly.
|
2018-02-13 17:13:01 +03:00
|
|
|
case feePerByte != 0:
|
|
|
|
return lnwallet.SatPerVByte(feePerByte), nil
|
2017-11-23 09:57:23 +03:00
|
|
|
|
|
|
|
// Otherwise, we'll attempt a relaxed confirmation target for the
|
|
|
|
// transaction
|
|
|
|
default:
|
2018-02-13 17:13:01 +03:00
|
|
|
feePerVSize, err := feeEstimator.EstimateFeePerVSize(6)
|
2017-11-23 09:57:23 +03:00
|
|
|
if err != nil {
|
|
|
|
return 0, fmt.Errorf("unable to query fee "+
|
|
|
|
"estimator: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
return feePerVSize, nil
|
2017-11-23 09:57:23 +03:00
|
|
|
}
|
2016-06-29 21:31:29 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// SendCoins executes a request to send coins to a particular address. Unlike
|
|
|
|
// SendMany, this RPC call only allows creating a single output at a time.
|
|
|
|
func (r *rpcServer) SendCoins(ctx context.Context,
|
|
|
|
in *lnrpc.SendCoinsRequest) (*lnrpc.SendCoinsResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// Based on the passed fee related parameters, we'll determine an
|
|
|
|
// appropriate fee rate for this transaction.
|
2018-02-13 17:13:01 +03:00
|
|
|
feeRate, err := determineFeePerVSize(
|
2017-11-23 09:57:23 +03:00
|
|
|
r.server.cc.feeEstimator, in.TargetConf, in.SatPerByte,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
rpcsLog.Infof("[sendcoins] addr=%v, amt=%v, sat/vbyte=%v",
|
|
|
|
in.Addr, btcutil.Amount(in.Amount), int64(feeRate))
|
2016-06-29 21:31:29 +03:00
|
|
|
|
|
|
|
paymentMap := map[string]int64{in.Addr: in.Amount}
|
2018-02-13 17:13:01 +03:00
|
|
|
txid, err := r.sendCoinsOnChain(paymentMap, feeRate)
|
2016-06-29 21:31:29 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
rpcsLog.Infof("[sendcoins] spend generated txid: %v", txid.String())
|
|
|
|
|
|
|
|
return &lnrpc.SendCoinsResponse{Txid: txid.String()}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SendMany handles a request for a transaction create multiple specified
|
|
|
|
// outputs in parallel.
|
|
|
|
func (r *rpcServer) SendMany(ctx context.Context,
|
|
|
|
in *lnrpc.SendManyRequest) (*lnrpc.SendManyResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// Based on the passed fee related parameters, we'll determine an
|
2017-11-23 09:57:23 +03:00
|
|
|
// approriate fee rate for this transaction.
|
2018-02-13 17:13:01 +03:00
|
|
|
feeRate, err := determineFeePerVSize(
|
2017-11-23 09:57:23 +03:00
|
|
|
r.server.cc.feeEstimator, in.TargetConf, in.SatPerByte,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
rpcsLog.Infof("[sendmany] outputs=%v, sat/vbyte=%v",
|
|
|
|
spew.Sdump(in.AddrToAmount), int64(feeRate))
|
2017-11-23 09:57:23 +03:00
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
txid, err := r.sendCoinsOnChain(in.AddrToAmount, feeRate)
|
2015-12-30 02:09:38 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-06-29 21:31:29 +03:00
|
|
|
rpcsLog.Infof("[sendmany] spend generated txid: %v", txid.String())
|
2016-04-25 06:26:32 +03:00
|
|
|
|
|
|
|
return &lnrpc.SendManyResponse{Txid: txid.String()}, nil
|
2015-12-30 02:09:38 +03:00
|
|
|
}
|
|
|
|
|
2016-06-21 21:52:09 +03:00
|
|
|
// NewAddress creates a new address under control of the local wallet.
|
2016-04-25 06:26:32 +03:00
|
|
|
func (r *rpcServer) NewAddress(ctx context.Context,
|
|
|
|
in *lnrpc.NewAddressRequest) (*lnrpc.NewAddressResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-04-25 06:26:32 +03:00
|
|
|
// Translate the gRPC proto address type to the wallet controller's
|
|
|
|
// available address types.
|
2016-08-13 01:53:18 +03:00
|
|
|
var addrType lnwallet.AddressType
|
2016-04-25 06:26:32 +03:00
|
|
|
switch in.Type {
|
|
|
|
case lnrpc.NewAddressRequest_WITNESS_PUBKEY_HASH:
|
2016-08-13 01:53:18 +03:00
|
|
|
addrType = lnwallet.WitnessPubKey
|
2016-04-25 06:26:32 +03:00
|
|
|
case lnrpc.NewAddressRequest_NESTED_PUBKEY_HASH:
|
2016-08-13 01:53:18 +03:00
|
|
|
addrType = lnwallet.NestedWitnessPubKey
|
2016-04-25 06:26:32 +03:00
|
|
|
}
|
|
|
|
|
2017-05-18 21:55:25 +03:00
|
|
|
addr, err := r.server.cc.wallet.NewAddress(addrType, false)
|
2015-12-30 02:09:38 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-06-29 21:31:29 +03:00
|
|
|
rpcsLog.Infof("[newaddress] addr=%v", addr.String())
|
2015-12-30 02:09:38 +03:00
|
|
|
return &lnrpc.NewAddressResponse{Address: addr.String()}, nil
|
|
|
|
}
|
2015-12-31 06:56:57 +03:00
|
|
|
|
2016-10-16 00:41:11 +03:00
|
|
|
// NewWitnessAddress returns a new native witness address under the control of
|
|
|
|
// the local wallet.
|
|
|
|
func (r *rpcServer) NewWitnessAddress(ctx context.Context,
|
|
|
|
in *lnrpc.NewWitnessAddressRequest) (*lnrpc.NewAddressResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-08-22 10:23:24 +03:00
|
|
|
addr, err := r.server.cc.wallet.NewAddress(
|
|
|
|
lnwallet.NestedWitnessPubKey, false,
|
|
|
|
)
|
2016-10-16 00:41:11 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
rpcsLog.Infof("[newaddress] addr=%v", addr.String())
|
|
|
|
return &lnrpc.NewAddressResponse{Address: addr.String()}, nil
|
|
|
|
}
|
|
|
|
|
2017-04-20 05:28:10 +03:00
|
|
|
// SignMessage signs a message with the resident node's private key. The
|
|
|
|
// returned signature string is zbase32 encoded and pubkey recoverable,
|
|
|
|
// meaning that only the message digest and signature are needed for
|
|
|
|
// verification.
|
|
|
|
func (r *rpcServer) SignMessage(ctx context.Context,
|
|
|
|
in *lnrpc.SignMessageRequest) (*lnrpc.SignMessageResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-04-20 05:28:10 +03:00
|
|
|
if in.Msg == nil {
|
|
|
|
return nil, fmt.Errorf("need a message to sign")
|
|
|
|
}
|
|
|
|
|
2017-04-29 14:44:29 +03:00
|
|
|
sigBytes, err := r.server.nodeSigner.SignCompact(in.Msg)
|
2017-04-20 05:28:10 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
sig := zbase32.EncodeToString(sigBytes)
|
|
|
|
return &lnrpc.SignMessageResponse{Signature: sig}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// VerifyMessage verifies a signature over a msg. The signature must be
|
|
|
|
// zbase32 encoded and signed by an active node in the resident node's
|
2017-04-29 14:44:29 +03:00
|
|
|
// channel database. In addition to returning the validity of the signature,
|
|
|
|
// VerifyMessage also returns the recovered pubkey from the signature.
|
2017-04-20 05:28:10 +03:00
|
|
|
func (r *rpcServer) VerifyMessage(ctx context.Context,
|
|
|
|
in *lnrpc.VerifyMessageRequest) (*lnrpc.VerifyMessageResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-04-20 05:28:10 +03:00
|
|
|
if in.Msg == nil {
|
|
|
|
return nil, fmt.Errorf("need a message to verify")
|
|
|
|
}
|
|
|
|
|
|
|
|
// The signature should be zbase32 encoded
|
|
|
|
sig, err := zbase32.DecodeString(in.Signature)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode signature: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-04-29 14:44:29 +03:00
|
|
|
// The signature is over the double-sha256 hash of the message.
|
2017-04-20 05:28:10 +03:00
|
|
|
digest := chainhash.DoubleHashB(in.Msg)
|
|
|
|
|
|
|
|
// RecoverCompact both recovers the pubkey and validates the signature.
|
|
|
|
pubKey, _, err := btcec.RecoverCompact(btcec.S256(), sig, digest)
|
|
|
|
if err != nil {
|
|
|
|
return &lnrpc.VerifyMessageResponse{Valid: false}, nil
|
|
|
|
}
|
2017-04-29 14:44:29 +03:00
|
|
|
pubKeyHex := hex.EncodeToString(pubKey.SerializeCompressed())
|
2017-04-20 05:28:10 +03:00
|
|
|
|
2018-01-31 07:30:00 +03:00
|
|
|
var pub [33]byte
|
|
|
|
copy(pub[:], pubKey.SerializeCompressed())
|
|
|
|
|
2017-04-29 14:44:29 +03:00
|
|
|
// Query the channel graph to ensure a node in the network with active
|
|
|
|
// channels signed the message.
|
2017-04-20 05:28:10 +03:00
|
|
|
// TODO(phlip9): Require valid nodes to have capital in active channels.
|
2017-04-29 14:44:29 +03:00
|
|
|
graph := r.server.chanDB.ChannelGraph()
|
2018-01-31 07:30:00 +03:00
|
|
|
_, active, err := graph.HasLightningNode(pub)
|
2017-04-20 05:28:10 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to query graph: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-08-03 06:59:43 +03:00
|
|
|
return &lnrpc.VerifyMessageResponse{
|
|
|
|
Valid: active,
|
|
|
|
Pubkey: pubKeyHex,
|
|
|
|
}, nil
|
2017-04-20 05:28:10 +03:00
|
|
|
}
|
|
|
|
|
2016-06-21 21:52:09 +03:00
|
|
|
// ConnectPeer attempts to establish a connection to a remote peer.
|
2016-01-17 06:12:36 +03:00
|
|
|
func (r *rpcServer) ConnectPeer(ctx context.Context,
|
|
|
|
in *lnrpc.ConnectPeerRequest) (*lnrpc.ConnectPeerResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-08-03 06:59:43 +03:00
|
|
|
// The server hasn't yet started, so it won't be able to service any of
|
|
|
|
// our requests, so we'll bail early here.
|
|
|
|
if !r.server.Started() {
|
|
|
|
return nil, fmt.Errorf("chain backend is still syncing, server " +
|
|
|
|
"not active yet")
|
|
|
|
}
|
|
|
|
|
2016-06-21 21:52:09 +03:00
|
|
|
if in.Addr == nil {
|
2016-01-02 07:27:40 +03:00
|
|
|
return nil, fmt.Errorf("need: lnc pubkeyhash@hostname")
|
|
|
|
}
|
|
|
|
|
2016-10-28 05:49:10 +03:00
|
|
|
pubkeyHex, err := hex.DecodeString(in.Addr.Pubkey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2017-04-21 23:32:17 +03:00
|
|
|
pubKey, err := btcec.ParsePubKey(pubkeyHex, btcec.S256())
|
2016-10-28 05:49:10 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-06-21 21:52:09 +03:00
|
|
|
|
2017-04-21 23:32:17 +03:00
|
|
|
// Connections to ourselves are disallowed for obvious reasons.
|
|
|
|
if pubKey.IsEqual(r.server.identityPriv.PubKey()) {
|
|
|
|
return nil, fmt.Errorf("cannot make connection to self")
|
|
|
|
}
|
|
|
|
|
2017-03-30 07:17:21 +03:00
|
|
|
// If the address doesn't already have a port, we'll assume the current
|
|
|
|
// default port.
|
|
|
|
var addr string
|
|
|
|
_, _, err = net.SplitHostPort(in.Addr.Host)
|
|
|
|
if err != nil {
|
|
|
|
addr = net.JoinHostPort(in.Addr.Host, strconv.Itoa(defaultPeerPort))
|
|
|
|
} else {
|
|
|
|
addr = in.Addr.Host
|
|
|
|
}
|
|
|
|
|
2018-01-22 14:48:59 +03:00
|
|
|
// We use ResolveTCPAddr here in case we wish to resolve hosts over Tor.
|
2017-10-25 05:59:32 +03:00
|
|
|
host, err := cfg.net.ResolveTCPAddr("tcp", addr)
|
2016-06-21 21:52:09 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-10-28 05:49:10 +03:00
|
|
|
peerAddr := &lnwire.NetAddress{
|
2017-04-21 23:32:17 +03:00
|
|
|
IdentityKey: pubKey,
|
2016-10-28 05:49:10 +03:00
|
|
|
Address: host,
|
|
|
|
ChainNet: activeNetParams.Net,
|
|
|
|
}
|
|
|
|
|
2017-01-10 06:08:52 +03:00
|
|
|
if err := r.server.ConnectToPeer(peerAddr, in.Perm); err != nil {
|
2016-06-21 21:52:09 +03:00
|
|
|
rpcsLog.Errorf("(connectpeer): error connecting to peer: %v", err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
rpcsLog.Debugf("Connected to peer: %v", peerAddr.String())
|
2017-01-10 06:08:52 +03:00
|
|
|
return &lnrpc.ConnectPeerResponse{}, nil
|
2016-06-21 21:52:09 +03:00
|
|
|
}
|
2016-06-21 22:32:32 +03:00
|
|
|
|
2017-05-06 02:02:03 +03:00
|
|
|
// DisconnectPeer attempts to disconnect one peer from another identified by a
|
2017-12-30 17:44:31 +03:00
|
|
|
// given pubKey. In the case that we currently have a pending or active channel
|
2017-07-28 02:39:49 +03:00
|
|
|
// with the target peer, this action will be disallowed.
|
2017-05-06 02:02:03 +03:00
|
|
|
func (r *rpcServer) DisconnectPeer(ctx context.Context,
|
|
|
|
in *lnrpc.DisconnectPeerRequest) (*lnrpc.DisconnectPeerResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-05-06 02:02:03 +03:00
|
|
|
rpcsLog.Debugf("[disconnectpeer] from peer(%s)", in.PubKey)
|
|
|
|
|
2017-08-03 06:59:43 +03:00
|
|
|
if !r.server.Started() {
|
|
|
|
return nil, fmt.Errorf("chain backend is still syncing, server " +
|
|
|
|
"not active yet")
|
|
|
|
}
|
|
|
|
|
2017-05-06 02:02:03 +03:00
|
|
|
// First we'll validate the string passed in within the request to
|
|
|
|
// ensure that it's a valid hex-string, and also a valid compressed
|
|
|
|
// public key.
|
|
|
|
pubKeyBytes, err := hex.DecodeString(in.PubKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to decode pubkey bytes: %v", err)
|
|
|
|
}
|
|
|
|
peerPubKey, err := btcec.ParsePubKey(pubKeyBytes, btcec.S256())
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to parse pubkey: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, we'll fetch the pending/active channels we have with a
|
|
|
|
// particular peer.
|
|
|
|
nodeChannels, err := r.server.chanDB.FetchOpenChannels(peerPubKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to fetch channels for peer: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// In order to avoid erroneously disconnecting from a peer that we have
|
|
|
|
// an active channel with, if we have any channels active with this
|
|
|
|
// peer, then we'll disallow disconnecting from them.
|
2018-02-23 01:28:48 +03:00
|
|
|
if len(nodeChannels) > 0 && !cfg.UnsafeDisconnect {
|
2017-05-06 02:02:03 +03:00
|
|
|
return nil, fmt.Errorf("cannot disconnect from peer(%x), "+
|
|
|
|
"all active channels with the peer need to be closed "+
|
|
|
|
"first", pubKeyBytes)
|
|
|
|
}
|
|
|
|
|
|
|
|
// With all initial validation complete, we'll now request that the
|
2017-12-30 17:44:31 +03:00
|
|
|
// server disconnects from the peer.
|
2017-05-06 02:02:03 +03:00
|
|
|
if err := r.server.DisconnectPeer(peerPubKey); err != nil {
|
2017-05-02 22:31:35 +03:00
|
|
|
return nil, fmt.Errorf("unable to disconnect peer: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.DisconnectPeerResponse{}, nil
|
|
|
|
}
|
|
|
|
|
2016-06-21 22:32:32 +03:00
|
|
|
// OpenChannel attempts to open a singly funded channel specified in the
|
|
|
|
// request to a remote peer.
|
2016-07-08 01:30:55 +03:00
|
|
|
func (r *rpcServer) OpenChannel(in *lnrpc.OpenChannelRequest,
|
|
|
|
updateStream lnrpc.Lightning_OpenChannelServer) error {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2018-02-20 02:01:23 +03:00
|
|
|
rpcsLog.Tracef("[openchannel] request to NodeKey(%v) "+
|
2018-02-14 08:48:42 +03:00
|
|
|
"allocation(us=%v, them=%v)", in.NodePubkeyString,
|
2017-07-31 00:25:03 +03:00
|
|
|
in.LocalFundingAmount, in.PushSat)
|
2016-06-21 22:32:32 +03:00
|
|
|
|
2017-08-03 06:59:43 +03:00
|
|
|
if !r.server.Started() {
|
|
|
|
return fmt.Errorf("chain backend is still syncing, server " +
|
|
|
|
"not active yet")
|
|
|
|
}
|
|
|
|
|
2016-06-21 22:32:32 +03:00
|
|
|
localFundingAmt := btcutil.Amount(in.LocalFundingAmount)
|
2017-01-10 06:05:11 +03:00
|
|
|
remoteInitialBalance := btcutil.Amount(in.PushSat)
|
2017-12-17 02:00:11 +03:00
|
|
|
minHtlc := lnwire.MilliSatoshi(in.MinHtlcMsat)
|
2017-01-10 06:05:11 +03:00
|
|
|
|
|
|
|
// Ensure that the initial balance of the remote party (if pushing
|
2017-08-06 02:52:37 +03:00
|
|
|
// satoshis) does not exceed the amount the local party has requested
|
2017-01-10 06:05:11 +03:00
|
|
|
// for funding.
|
2017-08-22 09:25:41 +03:00
|
|
|
//
|
|
|
|
// TODO(roasbeef): incorporate base fee?
|
2017-01-10 06:05:11 +03:00
|
|
|
if remoteInitialBalance >= localFundingAmt {
|
|
|
|
return fmt.Errorf("amount pushed to remote peer for initial " +
|
|
|
|
"state must be below the local funding amount")
|
|
|
|
}
|
2016-11-11 04:37:21 +03:00
|
|
|
|
2017-08-06 02:52:37 +03:00
|
|
|
// Ensure that the user doesn't exceed the current soft-limit for
|
|
|
|
// channel size. If the funding amount is above the soft-limit, then
|
|
|
|
// we'll reject the request.
|
|
|
|
if localFundingAmt > maxFundingAmount {
|
|
|
|
return fmt.Errorf("funding amount is too large, the max "+
|
|
|
|
"channel size is: %v", maxFundingAmount)
|
|
|
|
}
|
|
|
|
|
2018-03-19 02:58:39 +03:00
|
|
|
// Restrict the size of the channel we'll actually open. At a later
|
|
|
|
// level, we'll ensure that the output we create after accounting for
|
|
|
|
// fees that a dust output isn't created.
|
|
|
|
if localFundingAmt < minChanFundingSize {
|
2017-01-17 07:46:32 +03:00
|
|
|
return fmt.Errorf("channel is too small, the minimum channel "+
|
2018-03-19 02:58:39 +03:00
|
|
|
"size is: %v SAT", int64(minChanFundingSize))
|
2017-01-17 07:46:32 +03:00
|
|
|
}
|
|
|
|
|
2017-01-15 05:12:20 +03:00
|
|
|
var (
|
2017-04-21 23:32:17 +03:00
|
|
|
nodePubKey *btcec.PublicKey
|
|
|
|
nodePubKeyBytes []byte
|
2017-02-03 03:49:52 +03:00
|
|
|
err error
|
2017-01-15 05:12:20 +03:00
|
|
|
)
|
|
|
|
|
2017-03-14 06:39:16 +03:00
|
|
|
// TODO(roasbeef): also return channel ID?
|
|
|
|
|
2018-02-20 01:55:22 +03:00
|
|
|
// Ensure that the NodePubKey is set before attempting to use it
|
|
|
|
if len(in.NodePubkey) == 0 {
|
|
|
|
return fmt.Errorf("NodePubKey is not set")
|
|
|
|
}
|
2017-04-21 23:32:17 +03:00
|
|
|
|
2018-02-14 08:48:42 +03:00
|
|
|
// Parse the raw bytes of the node key into a pubkey object so we
|
|
|
|
// can easily manipulate it.
|
|
|
|
nodePubKey, err = btcec.ParsePubKey(in.NodePubkey, btcec.S256())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-04-21 23:32:17 +03:00
|
|
|
|
2018-02-14 08:48:42 +03:00
|
|
|
// Making a channel to ourselves wouldn't be of any use, so we
|
|
|
|
// explicitly disallow them.
|
|
|
|
if nodePubKey.IsEqual(r.server.identityPriv.PubKey()) {
|
|
|
|
return fmt.Errorf("cannot open channel to self")
|
2016-10-28 05:49:10 +03:00
|
|
|
}
|
|
|
|
|
2018-02-14 08:48:42 +03:00
|
|
|
nodePubKeyBytes = nodePubKey.SerializeCompressed()
|
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// Based on the passed fee related parameters, we'll determine an
|
|
|
|
// appropriate fee rate for the funding transaction.
|
2018-02-13 17:13:01 +03:00
|
|
|
feeRate, err := determineFeePerVSize(
|
2017-11-23 09:57:23 +03:00
|
|
|
r.server.cc.feeEstimator, in.TargetConf, in.SatPerByte,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
rpcsLog.Debugf("[openchannel]: using fee of %v sat/vbyte for funding "+
|
|
|
|
"tx", int64(feeRate))
|
2017-11-23 09:57:23 +03:00
|
|
|
|
2016-11-11 04:37:21 +03:00
|
|
|
// Instruct the server to trigger the necessary events to attempt to
|
|
|
|
// open a new channel. A stream is returned in place, this stream will
|
|
|
|
// be used to consume updates of the state of the pending channel.
|
2017-08-22 09:25:41 +03:00
|
|
|
updateChan, errChan := r.server.OpenChannel(
|
2018-02-14 08:48:42 +03:00
|
|
|
nodePubKey, localFundingAmt,
|
2017-08-22 09:25:41 +03:00
|
|
|
lnwire.NewMSatFromSatoshis(remoteInitialBalance),
|
2018-02-13 17:13:01 +03:00
|
|
|
minHtlc, feeRate, in.Private,
|
2017-08-22 09:25:41 +03:00
|
|
|
)
|
2016-01-02 07:27:40 +03:00
|
|
|
|
2016-08-31 02:52:53 +03:00
|
|
|
var outpoint wire.OutPoint
|
|
|
|
out:
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case err := <-errChan:
|
2018-02-20 02:01:23 +03:00
|
|
|
rpcsLog.Errorf("unable to open channel to NodeKey(%x): %v",
|
2018-02-14 08:48:42 +03:00
|
|
|
nodePubKeyBytes, err)
|
2016-07-08 01:30:55 +03:00
|
|
|
return err
|
2016-08-31 02:52:53 +03:00
|
|
|
case fundingUpdate := <-updateChan:
|
|
|
|
rpcsLog.Tracef("[openchannel] sending update: %v",
|
|
|
|
fundingUpdate)
|
|
|
|
if err := updateStream.Send(fundingUpdate); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// If a final channel open update is being sent, then
|
|
|
|
// we can break out of our recv loop as we no longer
|
|
|
|
// need to process any further updates.
|
|
|
|
switch update := fundingUpdate.Update.(type) {
|
|
|
|
case *lnrpc.OpenStatusUpdate_ChanOpen:
|
|
|
|
chanPoint := update.ChanOpen.ChannelPoint
|
2018-01-11 07:59:30 +03:00
|
|
|
txidHash, err := getChanPointFundingTxid(chanPoint)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
h, err := chainhash.NewHash(txidHash)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-08-31 02:52:53 +03:00
|
|
|
outpoint = wire.OutPoint{
|
|
|
|
Hash: *h,
|
|
|
|
Index: chanPoint.OutputIndex,
|
|
|
|
}
|
|
|
|
|
|
|
|
break out
|
|
|
|
}
|
|
|
|
case <-r.quit:
|
|
|
|
return nil
|
2016-07-08 01:30:55 +03:00
|
|
|
}
|
|
|
|
}
|
2016-08-31 02:52:53 +03:00
|
|
|
|
2018-02-20 02:01:23 +03:00
|
|
|
rpcsLog.Tracef("[openchannel] success NodeKey(%x), ChannelPoint(%v)",
|
2018-02-14 08:48:42 +03:00
|
|
|
nodePubKeyBytes, outpoint)
|
2016-07-08 01:30:55 +03:00
|
|
|
return nil
|
2016-06-21 22:32:32 +03:00
|
|
|
}
|
|
|
|
|
2016-11-11 04:37:21 +03:00
|
|
|
// OpenChannelSync is a synchronous version of the OpenChannel RPC call. This
|
|
|
|
// call is meant to be consumed by clients to the REST proxy. As with all other
|
|
|
|
// sync calls, all byte slices are instead to be populated as hex encoded
|
|
|
|
// strings.
|
|
|
|
func (r *rpcServer) OpenChannelSync(ctx context.Context,
|
|
|
|
in *lnrpc.OpenChannelRequest) (*lnrpc.ChannelPoint, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2018-02-20 02:01:23 +03:00
|
|
|
rpcsLog.Tracef("[openchannel] request to NodeKey(%v) "+
|
2018-02-14 08:48:42 +03:00
|
|
|
"allocation(us=%v, them=%v)", in.NodePubkeyString,
|
2017-07-31 00:25:03 +03:00
|
|
|
in.LocalFundingAmount, in.PushSat)
|
2016-11-11 04:37:21 +03:00
|
|
|
|
2017-08-03 06:59:43 +03:00
|
|
|
// We don't allow new channels to be open while the server is still
|
|
|
|
// syncing, as otherwise we may not be able to obtain the relevant
|
|
|
|
// notifications.
|
|
|
|
if !r.server.Started() {
|
|
|
|
return nil, fmt.Errorf("chain backend is still syncing, server " +
|
|
|
|
"not active yet")
|
|
|
|
}
|
|
|
|
|
2017-01-25 04:12:51 +03:00
|
|
|
// Creation of channels before the wallet syncs up is currently
|
|
|
|
// disallowed.
|
2017-12-10 10:42:46 +03:00
|
|
|
isSynced, _, err := r.server.cc.wallet.IsSynced()
|
2017-01-25 04:12:51 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if !isSynced {
|
|
|
|
return nil, errors.New("channels cannot be created before the " +
|
|
|
|
"wallet is fully synced")
|
|
|
|
}
|
|
|
|
|
2016-11-11 04:37:21 +03:00
|
|
|
// Decode the provided target node's public key, parsing it into a pub
|
|
|
|
// key object. For all sync call, byte slices are expected to be
|
|
|
|
// encoded as hex strings.
|
|
|
|
keyBytes, err := hex.DecodeString(in.NodePubkeyString)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
nodepubKey, err := btcec.ParsePubKey(keyBytes, btcec.S256())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
localFundingAmt := btcutil.Amount(in.LocalFundingAmount)
|
2017-01-10 06:05:11 +03:00
|
|
|
remoteInitialBalance := btcutil.Amount(in.PushSat)
|
2017-12-17 02:00:11 +03:00
|
|
|
minHtlc := lnwire.MilliSatoshi(in.MinHtlcMsat)
|
2017-01-10 06:05:11 +03:00
|
|
|
|
|
|
|
// Ensure that the initial balance of the remote party (if pushing
|
2017-12-30 17:44:31 +03:00
|
|
|
// satoshis) does not exceed the amount the local party has requested
|
2017-01-10 06:05:11 +03:00
|
|
|
// for funding.
|
|
|
|
if remoteInitialBalance >= localFundingAmt {
|
|
|
|
return nil, fmt.Errorf("amount pushed to remote peer for " +
|
|
|
|
"initial state must be below the local funding amount")
|
|
|
|
}
|
2016-11-11 04:37:21 +03:00
|
|
|
|
2018-03-19 02:58:39 +03:00
|
|
|
// Restrict the size of the channel we'll actually open. At a later
|
|
|
|
// level, we'll ensure that the output we create after accounting for
|
|
|
|
// fees that a dust output isn't created.
|
|
|
|
if localFundingAmt < minChanFundingSize {
|
|
|
|
return nil, fmt.Errorf("channel is too small, the minimum channel "+
|
|
|
|
"size is: %v SAT", int64(minChanFundingSize))
|
|
|
|
}
|
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// Based on the passed fee related parameters, we'll determine an
|
2017-12-30 17:44:31 +03:00
|
|
|
// appropriate fee rate for the funding transaction.
|
2018-02-13 17:13:01 +03:00
|
|
|
feeRate, err := determineFeePerVSize(
|
2017-11-23 09:57:23 +03:00
|
|
|
r.server.cc.feeEstimator, in.TargetConf, in.SatPerByte,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
rpcsLog.Tracef("[openchannel] target sat/vbyte for funding tx: %v",
|
|
|
|
int64(feeRate))
|
2017-11-23 09:57:23 +03:00
|
|
|
|
2017-08-22 09:25:41 +03:00
|
|
|
updateChan, errChan := r.server.OpenChannel(
|
2018-02-14 08:48:42 +03:00
|
|
|
nodepubKey, localFundingAmt,
|
2017-08-22 09:25:41 +03:00
|
|
|
lnwire.NewMSatFromSatoshis(remoteInitialBalance),
|
2018-02-13 17:13:01 +03:00
|
|
|
minHtlc, feeRate, in.Private,
|
2017-08-22 09:25:41 +03:00
|
|
|
)
|
2016-11-11 04:37:21 +03:00
|
|
|
|
|
|
|
select {
|
|
|
|
// If an error occurs them immediately return the error to the client.
|
|
|
|
case err := <-errChan:
|
2018-02-20 02:01:23 +03:00
|
|
|
rpcsLog.Errorf("unable to open channel to NodeKey(%x): %v",
|
2018-02-14 08:48:42 +03:00
|
|
|
nodepubKey, err)
|
2016-11-11 04:37:21 +03:00
|
|
|
return nil, err
|
|
|
|
|
|
|
|
// Otherwise, wait for the first channel update. The first update sent
|
|
|
|
// is when the funding transaction is broadcast to the network.
|
|
|
|
case fundingUpdate := <-updateChan:
|
|
|
|
rpcsLog.Tracef("[openchannel] sending update: %v",
|
|
|
|
fundingUpdate)
|
|
|
|
|
|
|
|
// Parse out the txid of the pending funding transaction. The
|
|
|
|
// sync client can use this to poll against the list of
|
|
|
|
// PendingChannels.
|
|
|
|
openUpdate := fundingUpdate.Update.(*lnrpc.OpenStatusUpdate_ChanPending)
|
|
|
|
chanUpdate := openUpdate.ChanPending
|
|
|
|
|
|
|
|
return &lnrpc.ChannelPoint{
|
2018-01-11 07:59:30 +03:00
|
|
|
FundingTxid: &lnrpc.ChannelPoint_FundingTxidBytes{
|
|
|
|
FundingTxidBytes: chanUpdate.Txid,
|
|
|
|
},
|
2016-11-11 04:37:21 +03:00
|
|
|
}, nil
|
|
|
|
case <-r.quit:
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-11 07:59:30 +03:00
|
|
|
// getChanPointFundingTxid returns the given channel point's funding txid in
|
|
|
|
// raw bytes.
|
|
|
|
func getChanPointFundingTxid(chanPoint *lnrpc.ChannelPoint) ([]byte, error) {
|
|
|
|
var txid []byte
|
|
|
|
|
|
|
|
// A channel point's funding txid can be get/set as a byte slice or a
|
|
|
|
// string. In the case it is a string, decode it.
|
|
|
|
switch chanPoint.GetFundingTxid().(type) {
|
|
|
|
case *lnrpc.ChannelPoint_FundingTxidBytes:
|
|
|
|
txid = chanPoint.GetFundingTxidBytes()
|
|
|
|
case *lnrpc.ChannelPoint_FundingTxidStr:
|
|
|
|
s := chanPoint.GetFundingTxidStr()
|
|
|
|
h, err := chainhash.NewHashFromStr(s)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
txid = h[:]
|
|
|
|
}
|
|
|
|
|
|
|
|
return txid, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CloseChannel attempts to close an active channel identified by its channel
|
2016-06-21 22:32:32 +03:00
|
|
|
// point. The actions of this method can additionally be augmented to attempt
|
|
|
|
// a force close after a timeout period in the case of an inactive peer.
|
2016-07-08 01:30:55 +03:00
|
|
|
func (r *rpcServer) CloseChannel(in *lnrpc.CloseChannelRequest,
|
|
|
|
updateStream lnrpc.Lightning_CloseChannelServer) error {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-09-12 22:42:26 +03:00
|
|
|
force := in.Force
|
2016-06-21 22:32:32 +03:00
|
|
|
index := in.ChannelPoint.OutputIndex
|
2018-01-11 07:59:30 +03:00
|
|
|
txidHash, err := getChanPointFundingTxid(in.GetChannelPoint())
|
|
|
|
if err != nil {
|
|
|
|
rpcsLog.Errorf("[closechannel] unable to get funding txid: %v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
txid, err := chainhash.NewHash(txidHash)
|
2016-06-21 22:32:32 +03:00
|
|
|
if err != nil {
|
2016-06-29 21:31:29 +03:00
|
|
|
rpcsLog.Errorf("[closechannel] invalid txid: %v", err)
|
2016-07-08 01:30:55 +03:00
|
|
|
return err
|
2016-01-02 07:27:40 +03:00
|
|
|
}
|
2017-01-04 03:02:51 +03:00
|
|
|
chanPoint := wire.NewOutPoint(txid, index)
|
2016-06-21 22:32:32 +03:00
|
|
|
|
2017-09-12 19:00:40 +03:00
|
|
|
rpcsLog.Tracef("[closechannel] request for ChannelPoint(%v), force=%v",
|
|
|
|
chanPoint, force)
|
2017-01-04 03:02:51 +03:00
|
|
|
|
|
|
|
var (
|
|
|
|
updateChan chan *lnrpc.CloseStatusUpdate
|
|
|
|
errChan chan error
|
|
|
|
)
|
|
|
|
|
2017-09-12 19:00:40 +03:00
|
|
|
// TODO(roasbeef): if force and peer online then don't force?
|
|
|
|
|
2018-03-30 22:51:01 +03:00
|
|
|
// First, we'll fetch the channel as is, as we'll need to examine it
|
|
|
|
// regardless of if this is a force close or not.
|
|
|
|
channel, err := r.fetchActiveChannel(*chanPoint)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
channel.Stop()
|
|
|
|
|
2017-01-04 03:02:51 +03:00
|
|
|
// If a force closure was requested, then we'll handle all the details
|
|
|
|
// around the creation and broadcast of the unilateral closure
|
|
|
|
// transaction here rather than going to the switch as we don't require
|
|
|
|
// interaction from the peer.
|
|
|
|
if force {
|
2017-05-18 21:55:25 +03:00
|
|
|
_, bestHeight, err := r.server.cc.chainIO.GetBestBlock()
|
2017-05-11 03:27:05 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-05-05 02:04:41 +03:00
|
|
|
// As we're force closing this channel, as a precaution, we'll
|
|
|
|
// ensure that the switch doesn't continue to see this channel
|
|
|
|
// as eligible for forwarding HTLC's. If the peer is online,
|
|
|
|
// then we'll also purge all of its indexes.
|
|
|
|
remotePub := &channel.StateSnapshot().RemoteIdentity
|
2017-08-09 01:49:32 +03:00
|
|
|
if peer, err := r.server.FindPeer(remotePub); err == nil {
|
2017-05-16 04:13:39 +03:00
|
|
|
// TODO(roasbeef): actually get the active channel
|
|
|
|
// instead too?
|
|
|
|
// * so only need to grab from database
|
2017-11-23 22:36:12 +03:00
|
|
|
peer.WipeChannel(channel.ChannelPoint())
|
2017-05-05 02:04:41 +03:00
|
|
|
} else {
|
|
|
|
chanID := lnwire.NewChanIDFromOutPoint(channel.ChannelPoint())
|
2017-05-02 23:04:58 +03:00
|
|
|
r.server.htlcSwitch.RemoveLink(chanID)
|
2017-05-05 02:04:41 +03:00
|
|
|
}
|
|
|
|
|
2017-05-05 02:05:34 +03:00
|
|
|
// With the necessary indexes cleaned up, we'll now force close
|
|
|
|
// the channel.
|
2018-01-17 07:03:28 +03:00
|
|
|
chainArbitrator := r.server.chainArb
|
|
|
|
closingTx, err := chainArbitrator.ForceCloseContract(
|
|
|
|
*chanPoint,
|
|
|
|
)
|
2017-01-04 03:02:51 +03:00
|
|
|
if err != nil {
|
2017-02-21 06:53:04 +03:00
|
|
|
rpcsLog.Errorf("unable to force close transaction: %v", err)
|
2017-01-04 03:02:51 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-17 07:03:28 +03:00
|
|
|
closingTxid := closingTx.TxHash()
|
|
|
|
|
2017-05-05 02:05:34 +03:00
|
|
|
// With the transaction broadcast, we send our first update to
|
|
|
|
// the client.
|
2017-08-05 04:29:14 +03:00
|
|
|
updateChan = make(chan *lnrpc.CloseStatusUpdate, 2)
|
2017-05-05 02:05:34 +03:00
|
|
|
updateChan <- &lnrpc.CloseStatusUpdate{
|
|
|
|
Update: &lnrpc.CloseStatusUpdate_ClosePending{
|
|
|
|
ClosePending: &lnrpc.PendingUpdate{
|
|
|
|
Txid: closingTxid[:],
|
2017-01-04 03:02:51 +03:00
|
|
|
},
|
2017-05-05 02:05:34 +03:00
|
|
|
},
|
|
|
|
}
|
2016-11-29 05:44:14 +03:00
|
|
|
|
2017-05-05 02:05:34 +03:00
|
|
|
errChan = make(chan error, 1)
|
2017-05-18 21:55:25 +03:00
|
|
|
notifier := r.server.cc.chainNotifier
|
2017-05-11 03:27:05 +03:00
|
|
|
go waitForChanToClose(uint32(bestHeight), notifier, errChan, chanPoint,
|
2018-01-17 07:03:28 +03:00
|
|
|
&closingTxid, func() {
|
2017-05-11 03:27:05 +03:00
|
|
|
// Respond to the local subsystem which
|
|
|
|
// requested the channel closure.
|
|
|
|
updateChan <- &lnrpc.CloseStatusUpdate{
|
|
|
|
Update: &lnrpc.CloseStatusUpdate_ChanClose{
|
|
|
|
ChanClose: &lnrpc.ChannelCloseUpdate{
|
|
|
|
ClosingTxid: closingTxid[:],
|
|
|
|
Success: true,
|
|
|
|
},
|
2017-01-04 03:02:51 +03:00
|
|
|
},
|
2017-05-11 03:27:05 +03:00
|
|
|
}
|
2017-08-05 04:29:14 +03:00
|
|
|
})
|
2017-01-04 03:02:51 +03:00
|
|
|
} else {
|
2018-01-17 07:03:28 +03:00
|
|
|
// Based on the passed fee related parameters, we'll determine
|
|
|
|
// an appropriate fee rate for the cooperative closure
|
2017-11-23 09:57:23 +03:00
|
|
|
// transaction.
|
2018-02-13 17:13:01 +03:00
|
|
|
feeRate, err := determineFeePerVSize(
|
2017-11-23 09:57:23 +03:00
|
|
|
r.server.cc.feeEstimator, in.TargetConf, in.SatPerByte,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
rpcsLog.Debugf("Target sat/vbyte for closing transaction: %v",
|
|
|
|
int64(feeRate))
|
2017-11-23 09:57:23 +03:00
|
|
|
|
2018-02-13 17:13:01 +03:00
|
|
|
if feeRate == 0 {
|
2017-12-17 03:31:57 +03:00
|
|
|
// If the fee rate returned isn't usable, then we'll
|
|
|
|
// fall back to an lax fee estimate.
|
2018-02-13 17:13:01 +03:00
|
|
|
feeRate, err = r.server.cc.feeEstimator.EstimateFeePerVSize(6)
|
2017-12-17 03:31:57 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2017-11-23 09:57:23 +03:00
|
|
|
|
2018-03-30 22:51:01 +03:00
|
|
|
// Before we attempt the cooperative channel closure, we'll
|
|
|
|
// examine the channel to ensure that it doesn't have a
|
|
|
|
// lingering HTLC.
|
2018-03-30 23:04:59 +03:00
|
|
|
if len(channel.ActiveHtlcs()) != 0 {
|
|
|
|
return fmt.Errorf("cannot co-op close channel " +
|
2018-03-30 22:51:01 +03:00
|
|
|
"with active htlcs")
|
|
|
|
}
|
|
|
|
|
2017-01-04 03:02:51 +03:00
|
|
|
// Otherwise, the caller has requested a regular interactive
|
|
|
|
// cooperative channel closure. So we'll forward the request to
|
|
|
|
// the htlc switch which will handle the negotiation and
|
|
|
|
// broadcast details.
|
2018-02-13 17:13:01 +03:00
|
|
|
feePerKw := feeRate.FeePerKWeight()
|
2017-01-04 03:02:51 +03:00
|
|
|
updateChan, errChan = r.server.htlcSwitch.CloseLink(chanPoint,
|
2017-11-23 09:57:23 +03:00
|
|
|
htlcswitch.CloseRegular, feePerKw)
|
2017-01-04 03:02:51 +03:00
|
|
|
}
|
2016-08-31 02:52:53 +03:00
|
|
|
out:
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case err := <-errChan:
|
|
|
|
rpcsLog.Errorf("[closechannel] unable to close "+
|
2017-01-04 03:02:51 +03:00
|
|
|
"ChannelPoint(%v): %v", chanPoint, err)
|
2016-07-08 01:30:55 +03:00
|
|
|
return err
|
2016-08-31 02:52:53 +03:00
|
|
|
case closingUpdate := <-updateChan:
|
2016-08-31 05:34:13 +03:00
|
|
|
rpcsLog.Tracef("[closechannel] sending update: %v",
|
|
|
|
closingUpdate)
|
2016-08-31 02:52:53 +03:00
|
|
|
if err := updateStream.Send(closingUpdate); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// If a final channel closing updates is being sent,
|
|
|
|
// then we can break out of our dispatch loop as we no
|
|
|
|
// longer need to process any further updates.
|
|
|
|
switch closeUpdate := closingUpdate.Update.(type) {
|
|
|
|
case *lnrpc.CloseStatusUpdate_ChanClose:
|
2017-01-06 00:56:27 +03:00
|
|
|
h, _ := chainhash.NewHash(closeUpdate.ChanClose.ClosingTxid)
|
2016-09-12 22:42:26 +03:00
|
|
|
rpcsLog.Infof("[closechannel] close completed: "+
|
2016-08-31 02:52:53 +03:00
|
|
|
"txid(%v)", h)
|
|
|
|
break out
|
|
|
|
}
|
|
|
|
case <-r.quit:
|
|
|
|
return nil
|
2016-07-08 01:30:55 +03:00
|
|
|
}
|
2016-06-21 22:32:32 +03:00
|
|
|
}
|
|
|
|
|
2016-07-08 01:30:55 +03:00
|
|
|
return nil
|
2016-06-21 22:32:32 +03:00
|
|
|
}
|
2016-01-02 07:27:40 +03:00
|
|
|
|
2018-02-07 06:13:07 +03:00
|
|
|
// fetchActiveChannel attempts to locate a channel identified by its channel
|
2017-01-04 03:02:51 +03:00
|
|
|
// point from the database's set of all currently opened channels.
|
|
|
|
func (r *rpcServer) fetchActiveChannel(chanPoint wire.OutPoint) (*lnwallet.LightningChannel, error) {
|
|
|
|
dbChannels, err := r.server.chanDB.FetchAllChannels()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// With the channels fetched, attempt to locate the target channel
|
|
|
|
// according to its channel point.
|
|
|
|
var dbChan *channeldb.OpenChannel
|
|
|
|
for _, dbChannel := range dbChannels {
|
2017-07-31 00:25:03 +03:00
|
|
|
if dbChannel.FundingOutpoint == chanPoint {
|
2017-01-04 03:02:51 +03:00
|
|
|
dbChan = dbChannel
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the channel cannot be located, then we exit with an error to the
|
|
|
|
// caller.
|
|
|
|
if dbChan == nil {
|
|
|
|
return nil, fmt.Errorf("unable to find channel")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, we create a fully populated channel state machine which
|
|
|
|
// uses the db channel as backing storage.
|
2018-01-17 07:03:28 +03:00
|
|
|
return lnwallet.NewLightningChannel(
|
2018-01-19 01:07:56 +03:00
|
|
|
r.server.cc.wallet.Cfg.Signer, nil, dbChan,
|
2018-01-17 07:03:28 +03:00
|
|
|
)
|
2017-01-04 03:02:51 +03:00
|
|
|
}
|
|
|
|
|
2017-07-28 02:39:49 +03:00
|
|
|
// GetInfo returns general information concerning the lightning node including
|
2018-02-07 06:13:07 +03:00
|
|
|
// its identity pubkey, alias, the chains it is connected to, and information
|
2017-07-28 02:39:49 +03:00
|
|
|
// concerning the number of open+pending channels.
|
2016-07-06 04:57:08 +03:00
|
|
|
func (r *rpcServer) GetInfo(ctx context.Context,
|
|
|
|
in *lnrpc.GetInfoRequest) (*lnrpc.GetInfoResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-07-06 04:57:08 +03:00
|
|
|
var activeChannels uint32
|
|
|
|
serverPeers := r.server.Peers()
|
|
|
|
for _, serverPeer := range serverPeers {
|
|
|
|
activeChannels += uint32(len(serverPeer.ChannelSnapshots()))
|
|
|
|
}
|
|
|
|
|
2017-08-09 04:01:15 +03:00
|
|
|
pendingChannels, err := r.server.chanDB.FetchPendingChannels()
|
2017-01-23 10:31:01 +03:00
|
|
|
if err != nil {
|
2017-08-09 04:01:15 +03:00
|
|
|
return nil, fmt.Errorf("unable to get retrieve pending "+
|
2017-06-17 01:11:02 +03:00
|
|
|
"channels: %v", err)
|
2017-01-23 10:31:01 +03:00
|
|
|
}
|
2017-08-09 04:01:15 +03:00
|
|
|
nPendingChannels := uint32(len(pendingChannels))
|
2017-01-23 10:31:01 +03:00
|
|
|
|
2016-07-06 04:57:08 +03:00
|
|
|
idPub := r.server.identityPriv.PubKey().SerializeCompressed()
|
2018-01-07 08:54:14 +03:00
|
|
|
encodedIDPub := hex.EncodeToString(idPub)
|
2016-07-06 04:57:08 +03:00
|
|
|
|
2017-05-18 21:55:25 +03:00
|
|
|
bestHash, bestHeight, err := r.server.cc.chainIO.GetBestBlock()
|
2016-12-13 02:34:47 +03:00
|
|
|
if err != nil {
|
2017-05-02 22:31:35 +03:00
|
|
|
return nil, fmt.Errorf("unable to get best block info: %v", err)
|
2016-12-13 02:34:47 +03:00
|
|
|
}
|
|
|
|
|
2017-12-10 10:42:46 +03:00
|
|
|
isSynced, bestHeaderTimestamp, err := r.server.cc.wallet.IsSynced()
|
2016-12-13 02:34:47 +03:00
|
|
|
if err != nil {
|
2017-05-15 05:20:26 +03:00
|
|
|
return nil, fmt.Errorf("unable to sync PoV of the wallet "+
|
|
|
|
"with current best block in the main chain: %v", err)
|
2016-12-13 02:34:47 +03:00
|
|
|
}
|
|
|
|
|
2017-05-03 05:51:33 +03:00
|
|
|
activeChains := make([]string, registeredChains.NumActiveChains())
|
|
|
|
for i, chain := range registeredChains.ActiveChains() {
|
|
|
|
activeChains[i] = chain.String()
|
|
|
|
}
|
2017-06-06 01:18:06 +03:00
|
|
|
|
2018-01-07 08:54:14 +03:00
|
|
|
// Check if external IP addresses were provided to lnd and use them
|
|
|
|
// to set the URIs.
|
|
|
|
nodeAnn, err := r.server.genNodeAnnouncement(false)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to retrieve current fully signed "+
|
|
|
|
"node announcement: %v", err)
|
|
|
|
}
|
|
|
|
addrs := nodeAnn.Addresses
|
|
|
|
uris := make([]string, len(addrs))
|
|
|
|
for i, addr := range addrs {
|
|
|
|
uris[i] = fmt.Sprintf("%s@%s", encodedIDPub, addr.String())
|
|
|
|
}
|
|
|
|
|
2017-01-15 05:16:53 +03:00
|
|
|
// TODO(roasbeef): add synced height n stuff
|
2016-07-06 04:57:08 +03:00
|
|
|
return &lnrpc.GetInfoResponse{
|
2017-12-10 10:42:46 +03:00
|
|
|
IdentityPubkey: encodedIDPub,
|
|
|
|
NumPendingChannels: nPendingChannels,
|
|
|
|
NumActiveChannels: activeChannels,
|
|
|
|
NumPeers: uint32(len(serverPeers)),
|
|
|
|
BlockHeight: uint32(bestHeight),
|
|
|
|
BlockHash: bestHash.String(),
|
|
|
|
SyncedToChain: isSynced,
|
2018-03-24 12:28:20 +03:00
|
|
|
Testnet: isTestnet(&activeNetParams),
|
2017-12-10 10:42:46 +03:00
|
|
|
Chains: activeChains,
|
|
|
|
Uris: uris,
|
|
|
|
Alias: nodeAnn.Alias.String(),
|
|
|
|
BestHeaderTimestamp: int64(bestHeaderTimestamp),
|
2016-07-06 04:57:08 +03:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2016-06-21 21:52:09 +03:00
|
|
|
// ListPeers returns a verbose listing of all currently active peers.
|
|
|
|
func (r *rpcServer) ListPeers(ctx context.Context,
|
|
|
|
in *lnrpc.ListPeersRequest) (*lnrpc.ListPeersResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-06-29 21:31:29 +03:00
|
|
|
rpcsLog.Tracef("[listpeers] request")
|
2016-06-21 21:52:09 +03:00
|
|
|
|
|
|
|
serverPeers := r.server.Peers()
|
|
|
|
resp := &lnrpc.ListPeersResponse{
|
|
|
|
Peers: make([]*lnrpc.Peer, 0, len(serverPeers)),
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, serverPeer := range serverPeers {
|
2017-01-26 05:24:59 +03:00
|
|
|
var (
|
|
|
|
satSent int64
|
|
|
|
satRecv int64
|
|
|
|
)
|
|
|
|
|
|
|
|
// In order to display the total number of satoshis of outbound
|
|
|
|
// (sent) and inbound (recv'd) satoshis that have been
|
|
|
|
// transported through this peer, we'll sum up the sent/recv'd
|
2017-05-18 21:55:25 +03:00
|
|
|
// values for each of the active channels we have with the
|
2017-01-26 05:24:59 +03:00
|
|
|
// peer.
|
|
|
|
chans := serverPeer.ChannelSnapshots()
|
|
|
|
for _, c := range chans {
|
2017-11-11 02:24:49 +03:00
|
|
|
satSent += int64(c.TotalMSatSent.ToSatoshis())
|
|
|
|
satRecv += int64(c.TotalMSatReceived.ToSatoshis())
|
2017-01-26 05:24:59 +03:00
|
|
|
}
|
|
|
|
|
2016-10-28 05:49:10 +03:00
|
|
|
nodePub := serverPeer.addr.IdentityKey.SerializeCompressed()
|
2016-06-21 21:52:09 +03:00
|
|
|
peer := &lnrpc.Peer{
|
2016-10-27 00:31:41 +03:00
|
|
|
PubKey: hex.EncodeToString(nodePub),
|
|
|
|
Address: serverPeer.conn.RemoteAddr().String(),
|
2018-01-19 01:10:35 +03:00
|
|
|
Inbound: !serverPeer.inbound, // Flip for display
|
2016-10-27 00:31:41 +03:00
|
|
|
BytesRecv: atomic.LoadUint64(&serverPeer.bytesReceived),
|
|
|
|
BytesSent: atomic.LoadUint64(&serverPeer.bytesSent),
|
2017-01-26 05:24:59 +03:00
|
|
|
SatSent: satSent,
|
|
|
|
SatRecv: satRecv,
|
|
|
|
PingTime: serverPeer.PingTime(),
|
2016-06-21 21:52:09 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
resp.Peers = append(resp.Peers, peer)
|
|
|
|
}
|
|
|
|
|
2016-06-29 21:31:29 +03:00
|
|
|
rpcsLog.Debugf("[listpeers] yielded %v peers", serverPeers)
|
2016-06-21 21:52:09 +03:00
|
|
|
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
2017-11-26 16:07:55 +03:00
|
|
|
// WalletBalance returns total unspent outputs(confirmed and unconfirmed), all
|
|
|
|
// confirmed unspent outputs and all unconfirmed unspent outputs under control
|
2016-06-21 21:46:27 +03:00
|
|
|
// by the wallet. This method can be modified by having the request specify
|
|
|
|
// only witness outputs should be factored into the final output sum.
|
2016-08-31 02:52:53 +03:00
|
|
|
// TODO(roasbeef): add async hooks into wallet balance changes
|
2016-06-21 21:46:27 +03:00
|
|
|
func (r *rpcServer) WalletBalance(ctx context.Context,
|
|
|
|
in *lnrpc.WalletBalanceRequest) (*lnrpc.WalletBalanceResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-11-26 16:07:55 +03:00
|
|
|
// Get total balance, from txs that have >= 0 confirmations.
|
2018-02-18 02:38:06 +03:00
|
|
|
totalBal, err := r.server.cc.wallet.ConfirmedBalance(0)
|
2016-08-13 01:53:18 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2016-06-21 21:46:27 +03:00
|
|
|
}
|
|
|
|
|
2017-11-26 16:07:55 +03:00
|
|
|
// Get confirmed balance, from txs that have >= 1 confirmations.
|
2018-02-18 02:38:06 +03:00
|
|
|
confirmedBal, err := r.server.cc.wallet.ConfirmedBalance(1)
|
2017-11-26 16:07:55 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// Get unconfirmed balance, from txs with 0 confirmations.
|
2017-11-26 16:07:55 +03:00
|
|
|
unconfirmedBal := totalBal - confirmedBal
|
|
|
|
|
|
|
|
rpcsLog.Debugf("[walletbalance] Total balance=%v", totalBal)
|
2016-06-21 21:46:27 +03:00
|
|
|
|
2017-02-10 02:28:32 +03:00
|
|
|
return &lnrpc.WalletBalanceResponse{
|
2017-11-26 16:07:55 +03:00
|
|
|
TotalBalance: int64(totalBal),
|
|
|
|
ConfirmedBalance: int64(confirmedBal),
|
|
|
|
UnconfirmedBalance: int64(unconfirmedBal),
|
2017-02-10 02:28:32 +03:00
|
|
|
}, nil
|
2015-12-31 08:40:41 +03:00
|
|
|
}
|
2016-07-08 01:33:52 +03:00
|
|
|
|
2016-09-15 22:24:52 +03:00
|
|
|
// ChannelBalance returns the total available channel flow across all open
|
|
|
|
// channels in satoshis.
|
2016-09-15 21:59:51 +03:00
|
|
|
func (r *rpcServer) ChannelBalance(ctx context.Context,
|
|
|
|
in *lnrpc.ChannelBalanceRequest) (*lnrpc.ChannelBalanceResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-11-12 02:48:15 +03:00
|
|
|
channels, err := r.server.chanDB.FetchAllChannels()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-09-15 21:59:51 +03:00
|
|
|
var balance btcutil.Amount
|
2016-11-12 02:48:15 +03:00
|
|
|
for _, channel := range channels {
|
2017-05-05 01:25:05 +03:00
|
|
|
if !channel.IsPending {
|
2017-11-11 02:24:49 +03:00
|
|
|
balance += channel.LocalCommitment.LocalBalance.ToSatoshis()
|
2017-05-05 01:25:05 +03:00
|
|
|
}
|
2016-09-15 21:59:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.ChannelBalanceResponse{Balance: int64(balance)}, nil
|
|
|
|
}
|
|
|
|
|
2016-07-08 01:33:52 +03:00
|
|
|
// PendingChannels returns a list of all the channels that are currently
|
|
|
|
// considered "pending". A channel is pending if it has finished the funding
|
|
|
|
// workflow and is waiting for confirmations for the funding txn, or is in the
|
2017-05-05 02:13:13 +03:00
|
|
|
// process of closure, either initiated cooperatively or non-cooperatively.
|
2016-07-08 01:33:52 +03:00
|
|
|
func (r *rpcServer) PendingChannels(ctx context.Context,
|
2018-01-04 23:20:25 +03:00
|
|
|
in *lnrpc.PendingChannelsRequest) (*lnrpc.PendingChannelsResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-05-05 02:13:13 +03:00
|
|
|
rpcsLog.Debugf("[pendingchannels]")
|
2016-07-08 01:33:52 +03:00
|
|
|
|
2018-01-04 23:20:25 +03:00
|
|
|
resp := &lnrpc.PendingChannelsResponse{}
|
2017-05-05 02:13:13 +03:00
|
|
|
|
|
|
|
// First, we'll populate the response with all the channels that are
|
|
|
|
// soon to be opened. We can easily fetch this data from the database
|
|
|
|
// and map the db struct to the proto response.
|
|
|
|
pendingOpenChannels, err := r.server.chanDB.FetchPendingChannels()
|
|
|
|
if err != nil {
|
2018-01-17 07:21:18 +03:00
|
|
|
rpcsLog.Errorf("unable to fetch pending channels: %v", err)
|
2017-05-05 02:13:13 +03:00
|
|
|
return nil, err
|
|
|
|
}
|
2018-01-04 23:20:25 +03:00
|
|
|
resp.PendingOpenChannels = make([]*lnrpc.PendingChannelsResponse_PendingOpenChannel,
|
2017-05-05 02:13:13 +03:00
|
|
|
len(pendingOpenChannels))
|
|
|
|
for i, pendingChan := range pendingOpenChannels {
|
|
|
|
pub := pendingChan.IdentityPub.SerializeCompressed()
|
2017-05-17 05:14:48 +03:00
|
|
|
|
|
|
|
// As this is required for display purposes, we'll calculate
|
|
|
|
// the weight of the commitment transaction. We also add on the
|
|
|
|
// estimated weight of the witness to calculate the weight of
|
|
|
|
// the transaction if it were to be immediately unilaterally
|
|
|
|
// broadcast.
|
|
|
|
// TODO(roasbeef): query for funding tx from wallet, display
|
|
|
|
// that also?
|
2017-11-11 02:24:49 +03:00
|
|
|
localCommitment := pendingChan.LocalCommitment
|
|
|
|
utx := btcutil.NewTx(localCommitment.CommitTx)
|
2017-05-17 05:14:48 +03:00
|
|
|
commitBaseWeight := blockchain.GetTransactionWeight(utx)
|
|
|
|
commitWeight := commitBaseWeight + lnwallet.WitnessCommitmentTxWeight
|
|
|
|
|
2018-01-04 23:20:25 +03:00
|
|
|
resp.PendingOpenChannels[i] = &lnrpc.PendingChannelsResponse_PendingOpenChannel{
|
|
|
|
Channel: &lnrpc.PendingChannelsResponse_PendingChannel{
|
2017-05-05 02:13:13 +03:00
|
|
|
RemoteNodePub: hex.EncodeToString(pub),
|
2017-07-31 00:25:03 +03:00
|
|
|
ChannelPoint: pendingChan.FundingOutpoint.String(),
|
2017-05-05 02:13:13 +03:00
|
|
|
Capacity: int64(pendingChan.Capacity),
|
2017-11-11 02:24:49 +03:00
|
|
|
LocalBalance: int64(localCommitment.LocalBalance.ToSatoshis()),
|
|
|
|
RemoteBalance: int64(localCommitment.RemoteBalance.ToSatoshis()),
|
2017-05-05 02:13:13 +03:00
|
|
|
},
|
2018-01-09 04:39:46 +03:00
|
|
|
CommitWeight: commitWeight,
|
|
|
|
CommitFee: int64(localCommitment.CommitFee),
|
|
|
|
FeePerKw: int64(localCommitment.FeePerKw),
|
2017-05-05 02:13:13 +03:00
|
|
|
// TODO(roasbeef): need to track confirmation height
|
2017-01-23 10:31:01 +03:00
|
|
|
}
|
2017-05-05 02:13:13 +03:00
|
|
|
}
|
|
|
|
|
2017-05-18 21:55:25 +03:00
|
|
|
_, currentHeight, err := r.server.cc.chainIO.GetBestBlock()
|
2017-05-05 02:13:13 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, we'll examine the channels that are soon to be closed so we
|
|
|
|
// can populate these fields within the response.
|
|
|
|
pendingCloseChannels, err := r.server.chanDB.FetchClosedChannels(true)
|
|
|
|
if err != nil {
|
2018-01-17 07:21:18 +03:00
|
|
|
rpcsLog.Errorf("unable to fetch closed channels: %v", err)
|
2017-05-05 02:13:13 +03:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
for _, pendingClose := range pendingCloseChannels {
|
|
|
|
// First construct the channel struct itself, this will be
|
|
|
|
// needed regardless of how this channel was closed.
|
|
|
|
pub := pendingClose.RemotePub.SerializeCompressed()
|
|
|
|
chanPoint := pendingClose.ChanPoint
|
2018-01-04 23:20:25 +03:00
|
|
|
channel := &lnrpc.PendingChannelsResponse_PendingChannel{
|
2017-05-05 02:13:13 +03:00
|
|
|
RemoteNodePub: hex.EncodeToString(pub),
|
|
|
|
ChannelPoint: chanPoint.String(),
|
|
|
|
Capacity: int64(pendingClose.Capacity),
|
2017-05-15 05:20:26 +03:00
|
|
|
LocalBalance: int64(pendingClose.SettledBalance),
|
2017-05-05 02:13:13 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
closeTXID := pendingClose.ClosingTXID.String()
|
|
|
|
|
|
|
|
switch pendingClose.CloseType {
|
|
|
|
|
|
|
|
// If the channel was closed cooperatively, then we'll only
|
|
|
|
// need to tack on the closing txid.
|
|
|
|
case channeldb.CooperativeClose:
|
|
|
|
resp.PendingClosingChannels = append(
|
|
|
|
resp.PendingClosingChannels,
|
2018-01-04 23:20:25 +03:00
|
|
|
&lnrpc.PendingChannelsResponse_ClosedChannel{
|
2017-05-05 02:13:13 +03:00
|
|
|
Channel: channel,
|
|
|
|
ClosingTxid: closeTXID,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2017-05-15 04:51:26 +03:00
|
|
|
resp.TotalLimboBalance += channel.LocalBalance
|
|
|
|
|
2017-05-05 02:13:13 +03:00
|
|
|
// If the channel was force closed, then we'll need to query
|
|
|
|
// the utxoNursery for additional information.
|
|
|
|
case channeldb.ForceClose:
|
2018-01-04 23:20:25 +03:00
|
|
|
forceClose := &lnrpc.PendingChannelsResponse_ForceClosedChannel{
|
2017-05-05 02:13:13 +03:00
|
|
|
Channel: channel,
|
|
|
|
ClosingTxid: closeTXID,
|
|
|
|
}
|
|
|
|
|
2017-05-15 05:20:26 +03:00
|
|
|
// Query for the maturity state for this force closed
|
|
|
|
// channel. If we didn't have any time-locked outputs,
|
|
|
|
// then the nursery may not know of the contract.
|
2017-05-05 02:13:13 +03:00
|
|
|
nurseryInfo, err := r.server.utxoNursery.NurseryReport(&chanPoint)
|
2017-05-15 05:20:26 +03:00
|
|
|
if err != nil && err != ErrContractNotFound {
|
|
|
|
return nil, fmt.Errorf("unable to obtain "+
|
|
|
|
"nursery report for ChannelPoint(%v): %v",
|
|
|
|
chanPoint, err)
|
2016-07-08 01:33:52 +03:00
|
|
|
}
|
2017-05-05 02:13:13 +03:00
|
|
|
|
|
|
|
// If the nursery knows of this channel, then we can
|
|
|
|
// populate information detailing exactly how much
|
|
|
|
// funds are time locked and also the height in which
|
|
|
|
// we can ultimately sweep the funds into the wallet.
|
|
|
|
if nurseryInfo != nil {
|
|
|
|
forceClose.LimboBalance = int64(nurseryInfo.limboBalance)
|
2017-11-09 06:27:13 +03:00
|
|
|
forceClose.RecoveredBalance = int64(nurseryInfo.recoveredBalance)
|
2017-05-05 02:13:13 +03:00
|
|
|
forceClose.MaturityHeight = nurseryInfo.maturityHeight
|
|
|
|
|
|
|
|
// If the transaction has been confirmed, then
|
|
|
|
// we can compute how many blocks it has left.
|
|
|
|
if forceClose.MaturityHeight != 0 {
|
2017-11-09 10:08:13 +03:00
|
|
|
forceClose.BlocksTilMaturity =
|
|
|
|
int32(forceClose.MaturityHeight) -
|
|
|
|
currentHeight
|
2017-05-05 02:13:13 +03:00
|
|
|
}
|
|
|
|
|
2017-11-09 06:27:13 +03:00
|
|
|
for _, htlcReport := range nurseryInfo.htlcs {
|
|
|
|
// TODO(conner) set incoming flag
|
|
|
|
// appropriately after handling incoming
|
|
|
|
// incubation
|
|
|
|
htlc := &lnrpc.PendingHTLC{
|
|
|
|
Incoming: false,
|
|
|
|
Amount: int64(htlcReport.amount),
|
|
|
|
Outpoint: htlcReport.outpoint.String(),
|
|
|
|
MaturityHeight: htlcReport.maturityHeight,
|
|
|
|
Stage: htlcReport.stage,
|
|
|
|
}
|
|
|
|
|
|
|
|
if htlc.MaturityHeight != 0 {
|
|
|
|
htlc.BlocksTilMaturity =
|
|
|
|
int32(htlc.MaturityHeight) -
|
|
|
|
currentHeight
|
|
|
|
}
|
|
|
|
|
|
|
|
forceClose.PendingHtlcs = append(forceClose.PendingHtlcs,
|
|
|
|
htlc)
|
2017-05-05 02:13:13 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
resp.TotalLimboBalance += int64(nurseryInfo.limboBalance)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp.PendingForceClosingChannels = append(
|
|
|
|
resp.PendingForceClosingChannels,
|
|
|
|
forceClose,
|
|
|
|
)
|
2016-07-08 01:33:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-05 02:13:13 +03:00
|
|
|
return resp, nil
|
2016-07-08 01:33:52 +03:00
|
|
|
}
|
2016-07-13 03:46:25 +03:00
|
|
|
|
2017-07-28 02:39:49 +03:00
|
|
|
// ListChannels returns a description of all the open channels that this node
|
|
|
|
// is a participant in.
|
2016-09-26 06:04:03 +03:00
|
|
|
func (r *rpcServer) ListChannels(ctx context.Context,
|
|
|
|
in *lnrpc.ListChannelsRequest) (*lnrpc.ListChannelsResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2018-03-13 22:11:19 +03:00
|
|
|
if in.ActiveOnly && in.InactiveOnly {
|
|
|
|
return nil, fmt.Errorf("either `active_only` or " +
|
|
|
|
"`inactive_only` can be set, but not both")
|
|
|
|
}
|
|
|
|
|
|
|
|
if in.PublicOnly && in.PrivateOnly {
|
|
|
|
return nil, fmt.Errorf("either `public_only` or " +
|
|
|
|
"`private_only` can be set, but not both")
|
|
|
|
}
|
|
|
|
|
2016-09-26 06:04:03 +03:00
|
|
|
resp := &lnrpc.ListChannelsResponse{}
|
|
|
|
|
2016-12-27 08:50:19 +03:00
|
|
|
graph := r.server.chanDB.ChannelGraph()
|
|
|
|
|
2016-10-27 01:09:01 +03:00
|
|
|
dbChannels, err := r.server.chanDB.FetchAllChannels()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
rpcsLog.Infof("[listchannels] fetched %v channels from DB",
|
|
|
|
len(dbChannels))
|
|
|
|
|
|
|
|
for _, dbChannel := range dbChannels {
|
2017-02-25 03:12:24 +03:00
|
|
|
if dbChannel.IsPending {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-03-09 01:45:58 +03:00
|
|
|
nodePub := dbChannel.IdentityPub
|
|
|
|
nodeID := hex.EncodeToString(nodePub.SerializeCompressed())
|
2017-07-31 00:25:03 +03:00
|
|
|
chanPoint := dbChannel.FundingOutpoint
|
2016-12-27 08:50:19 +03:00
|
|
|
|
|
|
|
// With the channel point known, retrieve the network channel
|
|
|
|
// ID from the database.
|
2017-01-08 06:19:24 +03:00
|
|
|
var chanID uint64
|
2017-07-31 00:25:03 +03:00
|
|
|
chanID, _ = graph.ChannelID(&chanPoint)
|
2016-10-27 01:09:01 +03:00
|
|
|
|
2017-03-09 01:45:58 +03:00
|
|
|
var peerOnline bool
|
2017-08-09 01:49:32 +03:00
|
|
|
if _, err := r.server.FindPeer(nodePub); err == nil {
|
2017-03-09 01:45:58 +03:00
|
|
|
peerOnline = true
|
|
|
|
}
|
|
|
|
|
2017-11-19 03:30:51 +03:00
|
|
|
channelID := lnwire.NewChanIDFromOutPoint(&chanPoint)
|
|
|
|
var linkActive bool
|
2017-12-06 04:51:06 +03:00
|
|
|
if link, err := r.server.htlcSwitch.GetLink(channelID); err == nil {
|
|
|
|
// A channel is only considered active if it is known
|
|
|
|
// by the switch *and* able to forward
|
|
|
|
// incoming/outgoing payments.
|
|
|
|
linkActive = link.EligibleToForward()
|
2017-11-19 03:30:51 +03:00
|
|
|
}
|
|
|
|
|
2018-03-13 22:11:19 +03:00
|
|
|
// Next, we'll determine whether we should add this channel to
|
|
|
|
// our list depending on the type of channels requested to us.
|
|
|
|
isActive := peerOnline && linkActive
|
|
|
|
isPublic := dbChannel.ChannelFlags&lnwire.FFAnnounceChannel != 0
|
|
|
|
|
|
|
|
// We'll only skip returning this channel if we were requested
|
|
|
|
// for a specific kind and this channel doesn't satisfy it.
|
|
|
|
switch {
|
|
|
|
case in.ActiveOnly && !isActive:
|
|
|
|
continue
|
|
|
|
case in.InactiveOnly && isActive:
|
|
|
|
continue
|
|
|
|
case in.PublicOnly && !isPublic:
|
|
|
|
continue
|
|
|
|
case in.PrivateOnly && isPublic:
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-05-17 05:14:48 +03:00
|
|
|
// As this is required for display purposes, we'll calculate
|
|
|
|
// the weight of the commitment transaction. We also add on the
|
|
|
|
// estimated weight of the witness to calculate the weight of
|
|
|
|
// the transaction if it were to be immediately unilaterally
|
|
|
|
// broadcast.
|
2017-11-11 02:24:49 +03:00
|
|
|
localCommit := dbChannel.LocalCommitment
|
|
|
|
utx := btcutil.NewTx(localCommit.CommitTx)
|
2017-05-17 05:14:48 +03:00
|
|
|
commitBaseWeight := blockchain.GetTransactionWeight(utx)
|
|
|
|
commitWeight := commitBaseWeight + lnwallet.WitnessCommitmentTxWeight
|
|
|
|
|
2017-12-11 04:09:53 +03:00
|
|
|
localBalance := localCommit.LocalBalance
|
|
|
|
remoteBalance := localCommit.RemoteBalance
|
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// As an artifact of our usage of mSAT internally, either party
|
2017-12-11 04:09:53 +03:00
|
|
|
// may end up in a state where they're holding a fractional
|
|
|
|
// amount of satoshis which can't be expressed within the
|
|
|
|
// actual commitment output. Since we round down when going
|
|
|
|
// from mSAT -> SAT, we may at any point be adding an
|
2017-12-12 02:31:12 +03:00
|
|
|
// additional SAT to miners fees. As a result, we display a
|
|
|
|
// commitment fee that accounts for this externally.
|
|
|
|
var sumOutputs btcutil.Amount
|
|
|
|
for _, txOut := range localCommit.CommitTx.TxOut {
|
|
|
|
sumOutputs += btcutil.Amount(txOut.Value)
|
2017-12-11 04:09:53 +03:00
|
|
|
}
|
2017-12-12 02:31:12 +03:00
|
|
|
externalCommitFee := dbChannel.Capacity - sumOutputs
|
2017-12-11 04:09:53 +03:00
|
|
|
|
2018-03-13 22:11:19 +03:00
|
|
|
channel := &lnrpc.Channel{
|
|
|
|
Active: isActive,
|
|
|
|
Private: !isPublic,
|
2016-11-19 03:20:44 +03:00
|
|
|
RemotePubkey: nodeID,
|
2016-12-27 08:50:19 +03:00
|
|
|
ChannelPoint: chanPoint.String(),
|
|
|
|
ChanId: chanID,
|
2016-11-19 03:20:44 +03:00
|
|
|
Capacity: int64(dbChannel.Capacity),
|
2017-12-11 04:09:53 +03:00
|
|
|
LocalBalance: int64(localBalance.ToSatoshis()),
|
|
|
|
RemoteBalance: int64(remoteBalance.ToSatoshis()),
|
2017-12-12 02:31:12 +03:00
|
|
|
CommitFee: int64(externalCommitFee),
|
2017-05-17 05:14:48 +03:00
|
|
|
CommitWeight: commitWeight,
|
2017-11-11 02:24:49 +03:00
|
|
|
FeePerKw: int64(localCommit.FeePerKw),
|
2017-08-22 09:25:41 +03:00
|
|
|
TotalSatoshisSent: int64(dbChannel.TotalMSatSent.ToSatoshis()),
|
|
|
|
TotalSatoshisReceived: int64(dbChannel.TotalMSatReceived.ToSatoshis()),
|
2017-11-11 02:24:49 +03:00
|
|
|
NumUpdates: localCommit.CommitHeight,
|
|
|
|
PendingHtlcs: make([]*lnrpc.HTLC, len(localCommit.Htlcs)),
|
2017-12-06 04:31:14 +03:00
|
|
|
CsvDelay: uint32(dbChannel.LocalChanCfg.CsvDelay),
|
2016-10-27 01:09:01 +03:00
|
|
|
}
|
|
|
|
|
2017-11-11 02:24:49 +03:00
|
|
|
for i, htlc := range localCommit.Htlcs {
|
2016-10-27 01:09:01 +03:00
|
|
|
channel.PendingHtlcs[i] = &lnrpc.HTLC{
|
|
|
|
Incoming: htlc.Incoming,
|
2017-11-16 05:23:51 +03:00
|
|
|
Amount: int64(htlc.Amt.ToSatoshis()),
|
2016-10-27 01:09:01 +03:00
|
|
|
HashLock: htlc.RHash[:],
|
|
|
|
ExpirationHeight: htlc.RefundTimeout,
|
|
|
|
}
|
2016-09-26 06:04:03 +03:00
|
|
|
}
|
|
|
|
|
2016-10-27 01:09:01 +03:00
|
|
|
resp.Channels = append(resp.Channels, channel)
|
2016-09-26 06:04:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
2016-12-31 03:41:59 +03:00
|
|
|
// savePayment saves a successfully completed payment to the database for
|
|
|
|
// historical record keeping.
|
2017-12-14 04:04:18 +03:00
|
|
|
func (r *rpcServer) savePayment(route *routing.Route, amount lnwire.MilliSatoshi, preImage []byte) error {
|
2016-12-21 12:19:01 +03:00
|
|
|
|
2016-12-31 03:41:59 +03:00
|
|
|
paymentPath := make([][33]byte, len(route.Hops))
|
2016-12-27 08:51:18 +03:00
|
|
|
for i, hop := range route.Hops {
|
2018-01-31 07:30:00 +03:00
|
|
|
hopPub := hop.Channel.Node.PubKeyBytes
|
|
|
|
copy(paymentPath[i][:], hopPub[:])
|
2016-12-31 03:41:59 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
payment := &channeldb.OutgoingPayment{
|
|
|
|
Invoice: channeldb.Invoice{
|
|
|
|
Terms: channeldb.ContractTerm{
|
2017-02-23 22:07:01 +03:00
|
|
|
Value: amount,
|
2016-12-31 03:41:59 +03:00
|
|
|
},
|
|
|
|
CreationDate: time.Now(),
|
|
|
|
},
|
|
|
|
Path: paymentPath,
|
|
|
|
Fee: route.TotalFees,
|
|
|
|
TimeLockLength: route.TotalTimeLock,
|
2016-12-05 14:59:36 +03:00
|
|
|
}
|
2017-12-14 04:04:18 +03:00
|
|
|
copy(payment.PaymentPreimage[:], preImage)
|
2016-12-31 03:41:59 +03:00
|
|
|
|
|
|
|
return r.server.chanDB.AddPayment(payment)
|
2016-12-05 14:59:36 +03:00
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
// validatePayReqExpiry checks if the passed payment request has expired. In
|
|
|
|
// the case it has expired, an error will be returned.
|
|
|
|
func validatePayReqExpiry(payReq *zpay32.Invoice) error {
|
|
|
|
expiry := payReq.Expiry()
|
|
|
|
validUntil := payReq.Timestamp.Add(expiry)
|
|
|
|
if time.Now().After(validUntil) {
|
|
|
|
return fmt.Errorf("invoice expired. Valid until %v", validUntil)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-07-13 03:46:25 +03:00
|
|
|
// SendPayment dispatches a bi-directional streaming RPC for sending payments
|
|
|
|
// through the Lightning Network. A single RPC invocation creates a persistent
|
|
|
|
// bi-directional stream allowing clients to rapidly send payments through the
|
|
|
|
// Lightning Network with a single persistent connection.
|
|
|
|
func (r *rpcServer) SendPayment(paymentStream lnrpc.Lightning_SendPaymentServer) error {
|
2017-09-05 19:08:02 +03:00
|
|
|
// For each payment we need to know the msat amount, the destination
|
|
|
|
// public key, and the payment hash.
|
|
|
|
type payment struct {
|
2017-10-23 04:31:57 +03:00
|
|
|
msat lnwire.MilliSatoshi
|
|
|
|
dest []byte
|
|
|
|
pHash []byte
|
|
|
|
cltvDelta uint16
|
2017-09-05 19:08:02 +03:00
|
|
|
}
|
|
|
|
payChan := make(chan *payment)
|
2016-07-22 02:22:30 +03:00
|
|
|
errChan := make(chan error, 1)
|
2016-10-27 01:05:10 +03:00
|
|
|
|
2017-08-22 09:25:41 +03:00
|
|
|
// TODO(roasbeef): enforce fee limits, pass into router, ditch if exceed limit
|
|
|
|
// * limit either a %, or absolute, or iff more than sending
|
|
|
|
|
2017-08-03 06:59:43 +03:00
|
|
|
// We don't allow payments to be sent while the daemon itself is still
|
|
|
|
// syncing as we may be trying to sent a payment over a "stale"
|
|
|
|
// channel.
|
|
|
|
if !r.server.Started() {
|
|
|
|
return fmt.Errorf("chain backend is still syncing, server " +
|
|
|
|
"not active yet")
|
|
|
|
}
|
|
|
|
|
2017-06-17 01:11:02 +03:00
|
|
|
// TODO(roasbeef): check payment filter to see if already used?
|
|
|
|
|
2017-04-12 07:24:16 +03:00
|
|
|
// In order to limit the level of concurrency and prevent a client from
|
|
|
|
// attempting to OOM the server, we'll set up a semaphore to create an
|
|
|
|
// upper ceiling on the number of outstanding payments.
|
|
|
|
const numOutstandingPayments = 2000
|
|
|
|
htlcSema := make(chan struct{}, numOutstandingPayments)
|
|
|
|
for i := 0; i < numOutstandingPayments; i++ {
|
|
|
|
htlcSema <- struct{}{}
|
|
|
|
}
|
|
|
|
|
2016-10-27 01:05:10 +03:00
|
|
|
// Launch a new goroutine to handle reading new payment requests from
|
|
|
|
// the client. This way we can handle errors independently of blocking
|
|
|
|
// and waiting for the next payment request to come through.
|
2017-08-22 10:24:37 +03:00
|
|
|
reqQuit := make(chan struct{})
|
|
|
|
defer func() {
|
|
|
|
close(reqQuit)
|
|
|
|
}()
|
2016-10-27 01:05:10 +03:00
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
select {
|
2017-08-22 10:24:37 +03:00
|
|
|
case <-reqQuit:
|
|
|
|
return
|
2016-10-27 01:05:10 +03:00
|
|
|
case <-r.quit:
|
|
|
|
errChan <- nil
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
// Receive the next pending payment within the
|
|
|
|
// stream sent by the client. If we read the
|
|
|
|
// EOF sentinel, then the client has closed the
|
|
|
|
// stream, and we can exit normally.
|
|
|
|
nextPayment, err := paymentStream.Recv()
|
|
|
|
if err == io.EOF {
|
|
|
|
errChan <- nil
|
|
|
|
return
|
|
|
|
} else if err != nil {
|
2017-08-22 10:24:37 +03:00
|
|
|
select {
|
|
|
|
case errChan <- err:
|
|
|
|
case <-reqQuit:
|
|
|
|
return
|
|
|
|
}
|
2016-10-27 01:05:10 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
// Populate the next payment, either from the
|
|
|
|
// payment request, or from the explicitly set
|
|
|
|
// fields.
|
|
|
|
p := &payment{}
|
|
|
|
|
2017-01-03 02:36:15 +03:00
|
|
|
// If the payment request field isn't blank,
|
|
|
|
// then the details of the invoice are encoded
|
2017-09-05 19:08:02 +03:00
|
|
|
// entirely within the encoded payReq. So we'll
|
2017-01-03 02:36:15 +03:00
|
|
|
// attempt to decode it, populating the
|
2017-09-05 19:08:02 +03:00
|
|
|
// payment accordingly.
|
2017-01-03 02:36:15 +03:00
|
|
|
if nextPayment.PaymentRequest != "" {
|
2018-02-19 18:20:54 +03:00
|
|
|
payReq, err := zpay32.Decode(nextPayment.PaymentRequest,
|
|
|
|
activeNetParams.Params)
|
2017-01-03 02:36:15 +03:00
|
|
|
if err != nil {
|
2017-08-22 10:24:37 +03:00
|
|
|
select {
|
|
|
|
case errChan <- err:
|
|
|
|
case <-reqQuit:
|
|
|
|
}
|
2017-01-03 02:36:15 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(roasbeef): eliminate necessary
|
|
|
|
// encode/decode
|
2017-09-05 19:08:02 +03:00
|
|
|
|
|
|
|
// We first check that this payment
|
|
|
|
// request has not expired.
|
|
|
|
err = validatePayReqExpiry(payReq)
|
|
|
|
if err != nil {
|
|
|
|
select {
|
|
|
|
case errChan <- err:
|
|
|
|
case <-reqQuit:
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
p.dest = payReq.Destination.SerializeCompressed()
|
|
|
|
|
2018-01-22 23:35:25 +03:00
|
|
|
// If the amount was not included in the
|
|
|
|
// invoice, then we let the payee
|
|
|
|
// specify the amount of satoshis they
|
|
|
|
// wish to send. We override the amount
|
|
|
|
// to pay with the amount provided from
|
|
|
|
// the payment request.
|
2017-09-05 19:08:02 +03:00
|
|
|
if payReq.MilliSat == nil {
|
2018-01-22 23:35:25 +03:00
|
|
|
p.msat = lnwire.NewMSatFromSatoshis(
|
|
|
|
btcutil.Amount(nextPayment.Amt),
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
p.msat = *payReq.MilliSat
|
2017-09-05 19:08:02 +03:00
|
|
|
}
|
2018-01-22 23:35:25 +03:00
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
p.pHash = payReq.PaymentHash[:]
|
2017-10-23 04:31:57 +03:00
|
|
|
p.cltvDelta = uint16(payReq.MinFinalCLTVExpiry())
|
2017-09-05 19:08:02 +03:00
|
|
|
} else {
|
|
|
|
// If the payment request field was not
|
|
|
|
// specified, construct the payment from
|
|
|
|
// the other fields.
|
|
|
|
p.msat = lnwire.NewMSatFromSatoshis(
|
|
|
|
btcutil.Amount(nextPayment.Amt),
|
|
|
|
)
|
|
|
|
p.dest = nextPayment.Dest
|
|
|
|
p.pHash = nextPayment.PaymentHash
|
2018-01-17 07:21:18 +03:00
|
|
|
p.cltvDelta = uint16(nextPayment.FinalCltvDelta)
|
2017-01-03 02:36:15 +03:00
|
|
|
}
|
|
|
|
|
2017-08-22 10:24:37 +03:00
|
|
|
select {
|
2017-09-05 19:08:02 +03:00
|
|
|
case payChan <- p:
|
2017-08-22 10:24:37 +03:00
|
|
|
case <-reqQuit:
|
|
|
|
return
|
|
|
|
}
|
2016-10-27 01:05:10 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
2016-09-21 03:15:26 +03:00
|
|
|
|
2016-07-13 03:46:25 +03:00
|
|
|
for {
|
2016-07-22 02:22:30 +03:00
|
|
|
select {
|
|
|
|
case err := <-errChan:
|
2016-07-13 03:46:25 +03:00
|
|
|
return err
|
2017-09-05 19:08:02 +03:00
|
|
|
case p := <-payChan:
|
2017-08-22 10:28:40 +03:00
|
|
|
// Currently, within the bootstrap phase of the
|
|
|
|
// network, we limit the largest payment size allotted
|
|
|
|
// to (2^32) - 1 mSAT or 4.29 million satoshis.
|
2017-09-05 19:08:02 +03:00
|
|
|
if p.msat > maxPaymentMSat {
|
2017-08-22 10:28:40 +03:00
|
|
|
// In this case, we'll send an error to the
|
|
|
|
// caller, but continue our loop for the next
|
|
|
|
// payment.
|
|
|
|
pErr := fmt.Errorf("payment of %v is too "+
|
|
|
|
"large, max payment allowed is %v",
|
2017-09-05 19:08:02 +03:00
|
|
|
p.msat, maxPaymentMSat)
|
2017-08-22 10:28:40 +03:00
|
|
|
|
|
|
|
if err := paymentStream.Send(&lnrpc.SendResponse{
|
|
|
|
PaymentError: pErr.Error(),
|
|
|
|
}); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2016-12-27 08:51:18 +03:00
|
|
|
// Parse the details of the payment which include the
|
|
|
|
// pubkey of the destination and the payment amount.
|
2017-09-05 19:08:02 +03:00
|
|
|
destNode, err := btcec.ParsePubKey(p.dest, btcec.S256())
|
2016-12-27 08:51:18 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-02-02 05:29:46 +03:00
|
|
|
|
|
|
|
// If we're in debug HTLC mode, then all outgoing HTLCs
|
|
|
|
// will pay to the same debug rHash. Otherwise, we pay
|
|
|
|
// to the rHash specified within the RPC request.
|
2016-09-19 22:03:38 +03:00
|
|
|
var rHash [32]byte
|
2017-09-05 19:08:02 +03:00
|
|
|
if cfg.DebugHTLC && len(p.pHash) == 0 {
|
2016-09-19 22:03:38 +03:00
|
|
|
rHash = debugHash
|
|
|
|
} else {
|
2017-09-05 19:08:02 +03:00
|
|
|
copy(rHash[:], p.pHash)
|
2016-09-19 22:03:38 +03:00
|
|
|
}
|
2016-12-27 08:51:18 +03:00
|
|
|
|
2016-11-11 04:37:21 +03:00
|
|
|
// We launch a new goroutine to execute the current
|
|
|
|
// payment so we can continue to serve requests while
|
2016-12-27 08:51:18 +03:00
|
|
|
// this payment is being dispatched.
|
2016-07-22 02:22:30 +03:00
|
|
|
go func() {
|
2017-04-12 07:24:16 +03:00
|
|
|
// Attempt to grab a free semaphore slot, using
|
|
|
|
// a defer to eventually release the slot
|
|
|
|
// regardless of payment success.
|
|
|
|
<-htlcSema
|
|
|
|
defer func() {
|
|
|
|
htlcSema <- struct{}{}
|
|
|
|
}()
|
|
|
|
|
2017-02-02 05:29:46 +03:00
|
|
|
// Construct a payment request to send to the
|
|
|
|
// channel router. If the payment is
|
2017-04-12 07:24:16 +03:00
|
|
|
// successful, the route chosen will be
|
2017-02-02 05:29:46 +03:00
|
|
|
// returned. Otherwise, we'll get a non-nil
|
|
|
|
// error.
|
|
|
|
payment := &routing.LightningPayment{
|
|
|
|
Target: destNode,
|
2017-09-05 19:08:02 +03:00
|
|
|
Amount: p.msat,
|
2017-02-02 05:29:46 +03:00
|
|
|
PaymentHash: rHash,
|
|
|
|
}
|
2017-10-23 04:31:57 +03:00
|
|
|
if p.cltvDelta != 0 {
|
|
|
|
payment.FinalCLTVDelta = &p.cltvDelta
|
|
|
|
}
|
2017-02-21 10:57:43 +03:00
|
|
|
preImage, route, err := r.server.chanRouter.SendPayment(payment)
|
2017-02-02 05:29:46 +03:00
|
|
|
if err != nil {
|
2017-05-19 15:18:21 +03:00
|
|
|
// If we receive payment error than,
|
|
|
|
// instead of terminating the stream,
|
|
|
|
// send error response to the user.
|
|
|
|
err := paymentStream.Send(&lnrpc.SendResponse{
|
2017-08-22 10:28:40 +03:00
|
|
|
PaymentError: err.Error(),
|
2017-05-19 15:18:21 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
errChan <- err
|
|
|
|
}
|
2016-07-22 02:22:30 +03:00
|
|
|
return
|
|
|
|
}
|
2016-12-21 12:19:01 +03:00
|
|
|
|
2016-12-27 08:51:18 +03:00
|
|
|
// Save the completed payment to the database
|
|
|
|
// for record keeping purposes.
|
2017-12-14 04:04:18 +03:00
|
|
|
if err := r.savePayment(route, p.msat, preImage[:]); err != nil {
|
2016-12-27 08:51:18 +03:00
|
|
|
errChan <- err
|
|
|
|
return
|
|
|
|
}
|
2016-12-21 12:19:01 +03:00
|
|
|
|
2017-02-02 05:29:46 +03:00
|
|
|
err = paymentStream.Send(&lnrpc.SendResponse{
|
2017-02-21 10:57:43 +03:00
|
|
|
PaymentPreimage: preImage[:],
|
2017-12-11 04:02:36 +03:00
|
|
|
PaymentRoute: marshallRoute(route),
|
2017-02-02 05:29:46 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
2016-07-22 02:22:30 +03:00
|
|
|
errChan <- err
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}()
|
2016-07-13 03:46:25 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-07-15 14:02:59 +03:00
|
|
|
|
2016-11-11 04:37:21 +03:00
|
|
|
// SendPaymentSync is the synchronous non-streaming version of SendPayment.
|
|
|
|
// This RPC is intended to be consumed by clients of the REST proxy.
|
|
|
|
// Additionally, this RPC expects the destination's public key and the payment
|
|
|
|
// hash (if any) to be encoded as hex strings.
|
|
|
|
func (r *rpcServer) SendPaymentSync(ctx context.Context,
|
|
|
|
nextPayment *lnrpc.SendRequest) (*lnrpc.SendResponse, error) {
|
2017-08-22 10:28:40 +03:00
|
|
|
|
|
|
|
// TODO(roasbeef): enforce fee limits, pass into router, ditch if exceed limit
|
|
|
|
// * limit either a %, or absolute, or iff more than sending
|
|
|
|
|
2017-08-03 06:59:43 +03:00
|
|
|
// We don't allow payments to be sent while the daemon itself is still
|
|
|
|
// syncing as we may be trying to sent a payment over a "stale"
|
|
|
|
// channel.
|
|
|
|
if !r.server.Started() {
|
|
|
|
return nil, fmt.Errorf("chain backend is still syncing, server " +
|
|
|
|
"not active yet")
|
|
|
|
}
|
|
|
|
|
2017-01-03 02:36:15 +03:00
|
|
|
var (
|
2017-10-23 04:31:57 +03:00
|
|
|
destPub *btcec.PublicKey
|
|
|
|
amtMSat lnwire.MilliSatoshi
|
|
|
|
rHash [32]byte
|
|
|
|
cltvDelta uint16
|
2017-01-03 02:36:15 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// If the proto request has an encoded payment request, then we we'll
|
2017-08-22 10:28:40 +03:00
|
|
|
// use that solely to dispatch the payment.
|
2017-01-03 02:36:15 +03:00
|
|
|
if nextPayment.PaymentRequest != "" {
|
2018-02-19 18:20:54 +03:00
|
|
|
payReq, err := zpay32.Decode(nextPayment.PaymentRequest,
|
|
|
|
activeNetParams.Params)
|
2016-11-11 04:37:21 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2017-09-05 19:08:02 +03:00
|
|
|
|
|
|
|
// We first check that this payment request has not expired.
|
|
|
|
if err := validatePayReqExpiry(payReq); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-01-03 02:36:15 +03:00
|
|
|
destPub = payReq.Destination
|
2017-09-05 19:08:02 +03:00
|
|
|
|
2018-01-22 23:35:25 +03:00
|
|
|
// If the amount was not included in the invoice, then we let
|
|
|
|
// the payee specify the amount of satoshis they wish to send.
|
|
|
|
// We override the amount to pay with the amount provided from
|
|
|
|
// the payment request.
|
2017-09-05 19:08:02 +03:00
|
|
|
if payReq.MilliSat == nil {
|
2018-01-22 23:35:25 +03:00
|
|
|
amtMSat = lnwire.NewMSatFromSatoshis(
|
|
|
|
btcutil.Amount(nextPayment.Amt),
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
amtMSat = *payReq.MilliSat
|
2017-09-05 19:08:02 +03:00
|
|
|
}
|
2018-01-22 23:35:25 +03:00
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
rHash = *payReq.PaymentHash
|
2017-10-23 04:31:57 +03:00
|
|
|
cltvDelta = uint16(payReq.MinFinalCLTVExpiry())
|
2016-11-11 04:37:21 +03:00
|
|
|
|
2017-02-02 05:29:46 +03:00
|
|
|
// Otherwise, the payment conditions have been manually
|
|
|
|
// specified in the proto.
|
2017-01-03 02:36:15 +03:00
|
|
|
} else {
|
2017-02-02 05:29:46 +03:00
|
|
|
// If we're in debug HTLC mode, then all outgoing HTLCs will
|
|
|
|
// pay to the same debug rHash. Otherwise, we pay to the rHash
|
|
|
|
// specified within the RPC request.
|
2017-01-03 02:36:15 +03:00
|
|
|
if cfg.DebugHTLC && nextPayment.PaymentHashString == "" {
|
|
|
|
rHash = debugHash
|
|
|
|
} else {
|
|
|
|
paymentHash, err := hex.DecodeString(nextPayment.PaymentHashString)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-11-11 04:37:21 +03:00
|
|
|
|
2017-01-03 02:36:15 +03:00
|
|
|
copy(rHash[:], paymentHash)
|
|
|
|
}
|
2016-12-27 08:51:18 +03:00
|
|
|
|
2017-01-03 02:36:15 +03:00
|
|
|
pubBytes, err := hex.DecodeString(nextPayment.DestString)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
destPub, err = btcec.ParsePubKey(pubBytes, btcec.S256())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
amtMSat = lnwire.NewMSatFromSatoshis(
|
|
|
|
btcutil.Amount(nextPayment.Amt),
|
|
|
|
)
|
2017-01-03 02:36:15 +03:00
|
|
|
}
|
2016-12-27 08:51:18 +03:00
|
|
|
|
2017-08-22 10:28:40 +03:00
|
|
|
// Currently, within the bootstrap phase of the network, we limit the
|
|
|
|
// largest payment size allotted to (2^32) - 1 mSAT or 4.29 million
|
|
|
|
// satoshis.
|
|
|
|
if amtMSat > maxPaymentMSat {
|
2017-10-26 01:32:00 +03:00
|
|
|
err := fmt.Errorf("payment of %v is too large, max payment "+
|
|
|
|
"allowed is %v", nextPayment.Amt, maxPaymentMSat.ToSatoshis())
|
|
|
|
return &lnrpc.SendResponse{
|
|
|
|
PaymentError: err.Error(),
|
|
|
|
}, nil
|
2017-08-22 10:28:40 +03:00
|
|
|
}
|
|
|
|
|
2017-02-02 05:29:46 +03:00
|
|
|
// Finally, send a payment request to the channel router. If the
|
|
|
|
// payment succeeds, then the returned route will be that was used
|
|
|
|
// successfully within the payment.
|
2017-10-23 04:31:57 +03:00
|
|
|
payment := &routing.LightningPayment{
|
2017-02-02 05:29:46 +03:00
|
|
|
Target: destPub,
|
2017-08-22 10:28:40 +03:00
|
|
|
Amount: amtMSat,
|
2017-02-02 05:29:46 +03:00
|
|
|
PaymentHash: rHash,
|
2017-10-23 04:31:57 +03:00
|
|
|
}
|
|
|
|
if cltvDelta != 0 {
|
|
|
|
payment.FinalCLTVDelta = &cltvDelta
|
|
|
|
}
|
|
|
|
preImage, route, err := r.server.chanRouter.SendPayment(payment)
|
2016-11-11 04:37:21 +03:00
|
|
|
if err != nil {
|
2017-10-26 01:32:00 +03:00
|
|
|
return &lnrpc.SendResponse{
|
|
|
|
PaymentError: err.Error(),
|
|
|
|
}, nil
|
2016-11-11 04:37:21 +03:00
|
|
|
}
|
|
|
|
|
2016-12-31 03:41:59 +03:00
|
|
|
// With the payment completed successfully, we now ave the details of
|
2017-04-20 02:23:17 +03:00
|
|
|
// the completed payment to the database for historical record keeping.
|
2017-12-14 04:04:18 +03:00
|
|
|
if err := r.savePayment(route, amtMSat, preImage[:]); err != nil {
|
2016-12-27 08:51:18 +03:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-02-21 03:33:45 +03:00
|
|
|
return &lnrpc.SendResponse{
|
2017-02-21 10:57:43 +03:00
|
|
|
PaymentPreimage: preImage[:],
|
2017-12-11 04:02:36 +03:00
|
|
|
PaymentRoute: marshallRoute(route),
|
2017-02-21 03:33:45 +03:00
|
|
|
}, nil
|
2016-11-11 04:37:21 +03:00
|
|
|
}
|
|
|
|
|
2016-09-19 22:04:56 +03:00
|
|
|
// AddInvoice attempts to add a new invoice to the invoice database. Any
|
|
|
|
// duplicated invoices are rejected, therefore all invoices *must* have a
|
|
|
|
// unique payment preimage.
|
|
|
|
func (r *rpcServer) AddInvoice(ctx context.Context,
|
|
|
|
invoice *lnrpc.Invoice) (*lnrpc.AddInvoiceResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-11-11 04:37:21 +03:00
|
|
|
var paymentPreimage [32]byte
|
|
|
|
|
|
|
|
switch {
|
|
|
|
// If a preimage wasn't specified, then we'll generate a new preimage
|
|
|
|
// from fresh cryptographic randomness.
|
|
|
|
case len(invoice.RPreimage) == 0:
|
|
|
|
if _, err := rand.Read(paymentPreimage[:]); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, if a preimage was specified, then it MUST be exactly
|
|
|
|
// 32-bytes.
|
|
|
|
case len(invoice.RPreimage) > 0 && len(invoice.RPreimage) != 32:
|
2016-09-19 22:04:56 +03:00
|
|
|
return nil, fmt.Errorf("payment preimage must be exactly "+
|
2016-11-11 04:37:21 +03:00
|
|
|
"32 bytes, is instead %v", len(invoice.RPreimage))
|
|
|
|
|
|
|
|
// If the preimage meets the size specifications, then it can be used
|
|
|
|
// as is.
|
|
|
|
default:
|
|
|
|
copy(paymentPreimage[:], invoice.RPreimage[:])
|
2016-09-19 22:04:56 +03:00
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
// The size of the memo, receipt and description hash attached must not
|
|
|
|
// exceed the maximum values for either of the fields.
|
2016-09-19 22:04:56 +03:00
|
|
|
if len(invoice.Memo) > channeldb.MaxMemoSize {
|
|
|
|
return nil, fmt.Errorf("memo too large: %v bytes "+
|
|
|
|
"(maxsize=%v)", len(invoice.Memo), channeldb.MaxMemoSize)
|
|
|
|
}
|
|
|
|
if len(invoice.Receipt) > channeldb.MaxReceiptSize {
|
|
|
|
return nil, fmt.Errorf("receipt too large: %v bytes "+
|
|
|
|
"(maxsize=%v)", len(invoice.Receipt), channeldb.MaxReceiptSize)
|
|
|
|
}
|
2017-09-05 19:08:02 +03:00
|
|
|
if len(invoice.DescriptionHash) > 0 && len(invoice.DescriptionHash) != 32 {
|
|
|
|
return nil, fmt.Errorf("description hash is %v bytes, must be %v",
|
|
|
|
len(invoice.DescriptionHash), channeldb.MaxPaymentRequestSize)
|
|
|
|
}
|
2016-09-19 22:04:56 +03:00
|
|
|
|
2017-08-22 09:25:41 +03:00
|
|
|
amt := btcutil.Amount(invoice.Value)
|
|
|
|
amtMSat := lnwire.NewMSatFromSatoshis(amt)
|
2017-08-22 10:28:40 +03:00
|
|
|
|
|
|
|
// The value of the invoice must also not exceed the current soft-limit
|
|
|
|
// on the largest payment within the network.
|
2018-01-22 23:01:43 +03:00
|
|
|
if amtMSat > maxPaymentMSat {
|
2017-08-22 10:28:40 +03:00
|
|
|
return nil, fmt.Errorf("payment of %v is too large, max "+
|
|
|
|
"payment allowed is %v", amt, maxPaymentMSat.ToSatoshis())
|
2017-01-03 02:35:22 +03:00
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
// Next, generate the payment hash itself from the preimage. This will
|
|
|
|
// be used by clients to query for the state of a particular invoice.
|
|
|
|
rHash := sha256.Sum256(paymentPreimage[:])
|
|
|
|
|
|
|
|
// We also create an encoded payment request which allows the
|
|
|
|
// caller to compactly send the invoice to the payer. We'll create a
|
|
|
|
// list of options to be added to the encoded payment request. For now
|
|
|
|
// we only support the required fields description/description_hash,
|
|
|
|
// expiry, fallback address, and the amount field.
|
|
|
|
var options []func(*zpay32.Invoice)
|
|
|
|
|
2018-01-22 23:01:43 +03:00
|
|
|
// We only include the amount in the invoice if it is greater than 0.
|
|
|
|
// By not including the amount, we enable the creation of invoices that
|
|
|
|
// allow the payee to specify the amount of satoshis they wish to send.
|
|
|
|
if amtMSat > 0 {
|
|
|
|
options = append(options, zpay32.Amount(amtMSat))
|
|
|
|
}
|
2017-09-05 19:08:02 +03:00
|
|
|
|
|
|
|
// If specified, add a fallback address to the payment request.
|
|
|
|
if len(invoice.FallbackAddr) > 0 {
|
|
|
|
addr, err := btcutil.DecodeAddress(invoice.FallbackAddr,
|
|
|
|
activeNetParams.Params)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("invalid fallback address: %v",
|
|
|
|
err)
|
|
|
|
}
|
|
|
|
options = append(options, zpay32.FallbackAddr(addr))
|
|
|
|
}
|
|
|
|
|
|
|
|
// If expiry is set, specify it. If it is not provided, no expiry time
|
|
|
|
// will be explicitly added to this payment request, which will imply
|
|
|
|
// the default 3600 seconds.
|
|
|
|
if invoice.Expiry > 0 {
|
2018-03-30 02:25:03 +03:00
|
|
|
|
|
|
|
// We'll ensure that the specified expiry is restricted to sane
|
|
|
|
// number of seconds. As a result, we'll reject an invoice with
|
|
|
|
// an expiry greater than 1 year.
|
|
|
|
maxExpiry := time.Hour * 24 * 365
|
|
|
|
expSeconds := invoice.Expiry
|
|
|
|
|
|
|
|
if float64(expSeconds) > maxExpiry.Seconds() {
|
|
|
|
return nil, fmt.Errorf("expiry of %v seconds "+
|
|
|
|
"greater than max expiry of %v seconds",
|
|
|
|
float64(expSeconds), maxExpiry.Seconds())
|
|
|
|
}
|
|
|
|
|
|
|
|
expiry := time.Duration(invoice.Expiry) * time.Second
|
|
|
|
options = append(options, zpay32.Expiry(expiry))
|
2017-09-05 19:08:02 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// If the description hash is set, then we add it do the list of options.
|
|
|
|
// If not, use the memo field as the payment request description.
|
|
|
|
if len(invoice.DescriptionHash) > 0 {
|
|
|
|
var descHash [32]byte
|
|
|
|
copy(descHash[:], invoice.DescriptionHash[:])
|
|
|
|
options = append(options, zpay32.DescriptionHash(descHash))
|
|
|
|
} else {
|
|
|
|
// Use the memo field as the description. If this is not set
|
|
|
|
// this will just be an empty string.
|
|
|
|
options = append(options, zpay32.Description(invoice.Memo))
|
|
|
|
}
|
|
|
|
|
2017-10-19 08:15:31 +03:00
|
|
|
// We'll use our current default CLTV value unless one was specified as
|
|
|
|
// an option on the command line when creating an invoice.
|
|
|
|
switch {
|
|
|
|
case invoice.CltvExpiry > math.MaxUint16:
|
|
|
|
return nil, fmt.Errorf("CLTV delta of %v is too large, max "+
|
|
|
|
"accepted is: %v", invoice.CltvExpiry, math.MaxUint16)
|
|
|
|
case invoice.CltvExpiry != 0:
|
|
|
|
options = append(options,
|
|
|
|
zpay32.CLTVExpiry(invoice.CltvExpiry))
|
|
|
|
default:
|
|
|
|
// TODO(roasbeef): assumes set delta between versions
|
2017-12-17 16:33:09 +03:00
|
|
|
defaultDelta := cfg.Bitcoin.TimeLockDelta
|
2018-03-14 07:15:53 +03:00
|
|
|
if registeredChains.PrimaryChain() == litecoinChain {
|
|
|
|
defaultDelta = cfg.Litecoin.TimeLockDelta
|
|
|
|
}
|
2017-10-19 08:15:31 +03:00
|
|
|
options = append(options, zpay32.CLTVExpiry(uint64(defaultDelta)))
|
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
// Create and encode the payment request as a bech32 (zpay32) string.
|
|
|
|
creationDate := time.Now()
|
|
|
|
payReq, err := zpay32.NewInvoice(
|
|
|
|
activeNetParams.Params,
|
|
|
|
rHash,
|
|
|
|
creationDate,
|
|
|
|
options...,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
payReqString, err := payReq.Encode(
|
|
|
|
zpay32.MessageSigner{
|
|
|
|
SignCompact: r.server.nodeSigner.SignDigestCompact,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-09-19 22:04:56 +03:00
|
|
|
i := &channeldb.Invoice{
|
2017-09-05 19:08:02 +03:00
|
|
|
CreationDate: creationDate,
|
|
|
|
Memo: []byte(invoice.Memo),
|
|
|
|
Receipt: invoice.Receipt,
|
|
|
|
PaymentRequest: []byte(payReqString),
|
2016-09-19 22:04:56 +03:00
|
|
|
Terms: channeldb.ContractTerm{
|
2017-08-22 09:25:41 +03:00
|
|
|
Value: amtMSat,
|
2016-09-19 22:04:56 +03:00
|
|
|
},
|
|
|
|
}
|
2016-11-11 04:37:21 +03:00
|
|
|
copy(i.Terms.PaymentPreimage[:], paymentPreimage[:])
|
2016-09-19 22:04:56 +03:00
|
|
|
|
2016-09-26 20:29:18 +03:00
|
|
|
rpcsLog.Tracef("[addinvoice] adding new invoice %v",
|
|
|
|
newLogClosure(func() string {
|
|
|
|
return spew.Sdump(i)
|
2017-10-19 08:15:31 +03:00
|
|
|
}),
|
|
|
|
)
|
2016-09-26 20:29:18 +03:00
|
|
|
|
2016-11-11 04:37:21 +03:00
|
|
|
// With all sanity checks passed, write the invoice to the database.
|
2016-09-19 22:04:56 +03:00
|
|
|
if err := r.server.invoices.AddInvoice(i); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.AddInvoiceResponse{
|
2017-01-03 02:34:49 +03:00
|
|
|
RHash: rHash[:],
|
|
|
|
PaymentRequest: payReqString,
|
2016-09-19 22:04:56 +03:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
// createRPCInvoice creates an *lnrpc.Invoice from the *channeldb.Invoice.
|
|
|
|
func createRPCInvoice(invoice *channeldb.Invoice) (*lnrpc.Invoice, error) {
|
|
|
|
paymentRequest := string(invoice.PaymentRequest)
|
2018-02-19 18:20:54 +03:00
|
|
|
decoded, err := zpay32.Decode(paymentRequest, activeNetParams.Params)
|
2017-09-05 19:08:02 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to decode payment request: %v",
|
|
|
|
err)
|
|
|
|
}
|
|
|
|
|
|
|
|
descHash := []byte("")
|
|
|
|
if decoded.DescriptionHash != nil {
|
|
|
|
descHash = decoded.DescriptionHash[:]
|
|
|
|
}
|
|
|
|
|
|
|
|
fallbackAddr := ""
|
|
|
|
if decoded.FallbackAddr != nil {
|
|
|
|
fallbackAddr = decoded.FallbackAddr.String()
|
|
|
|
}
|
|
|
|
|
2017-12-05 09:18:55 +03:00
|
|
|
settleDate := int64(0)
|
|
|
|
if !invoice.SettleDate.IsZero() {
|
|
|
|
settleDate = invoice.SettleDate.Unix()
|
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
// Expiry time will default to 3600 seconds if not specified
|
|
|
|
// explicitly.
|
|
|
|
expiry := int64(decoded.Expiry().Seconds())
|
|
|
|
|
2017-10-19 08:15:52 +03:00
|
|
|
// The expiry will default to 9 blocks if not specified explicitly.
|
|
|
|
cltvExpiry := decoded.MinFinalCLTVExpiry()
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
preimage := invoice.Terms.PaymentPreimage
|
|
|
|
satAmt := invoice.Terms.Value.ToSatoshis()
|
|
|
|
|
|
|
|
return &lnrpc.Invoice{
|
|
|
|
Memo: string(invoice.Memo[:]),
|
|
|
|
Receipt: invoice.Receipt[:],
|
|
|
|
RHash: decoded.PaymentHash[:],
|
|
|
|
RPreimage: preimage[:],
|
|
|
|
Value: int64(satAmt),
|
|
|
|
CreationDate: invoice.CreationDate.Unix(),
|
2017-12-05 09:18:55 +03:00
|
|
|
SettleDate: settleDate,
|
2017-09-05 19:08:02 +03:00
|
|
|
Settled: invoice.Terms.Settled,
|
|
|
|
PaymentRequest: paymentRequest,
|
|
|
|
DescriptionHash: descHash,
|
|
|
|
Expiry: expiry,
|
2017-10-19 08:15:52 +03:00
|
|
|
CltvExpiry: cltvExpiry,
|
2017-09-05 19:08:02 +03:00
|
|
|
FallbackAddr: fallbackAddr,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// LookupInvoice attempts to look up an invoice according to its payment hash.
|
2016-09-19 22:04:56 +03:00
|
|
|
// The passed payment hash *must* be exactly 32 bytes, if not an error is
|
|
|
|
// returned.
|
|
|
|
func (r *rpcServer) LookupInvoice(ctx context.Context,
|
|
|
|
req *lnrpc.PaymentHash) (*lnrpc.Invoice, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-10-16 00:41:11 +03:00
|
|
|
var (
|
|
|
|
payHash [32]byte
|
|
|
|
rHash []byte
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
|
|
|
|
// If the RHash as a raw string was provided, then decode that and use
|
|
|
|
// that directly. Otherwise, we use the raw bytes provided.
|
|
|
|
if req.RHashStr != "" {
|
|
|
|
rHash, err = hex.DecodeString(req.RHashStr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
rHash = req.RHash
|
2016-09-19 22:04:56 +03:00
|
|
|
}
|
|
|
|
|
2016-10-16 00:41:11 +03:00
|
|
|
// Ensure that the payment hash is *exactly* 32-bytes.
|
|
|
|
if len(rHash) != 0 && len(rHash) != 32 {
|
|
|
|
return nil, fmt.Errorf("payment hash must be exactly "+
|
|
|
|
"32 bytes, is instead %v", len(rHash))
|
|
|
|
}
|
|
|
|
copy(payHash[:], rHash)
|
2016-09-19 22:04:56 +03:00
|
|
|
|
2016-09-26 20:29:18 +03:00
|
|
|
rpcsLog.Tracef("[lookupinvoice] searching for invoice %x", payHash[:])
|
|
|
|
|
2016-09-19 22:04:56 +03:00
|
|
|
invoice, err := r.server.invoices.LookupInvoice(payHash)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-09-26 20:29:18 +03:00
|
|
|
rpcsLog.Tracef("[lookupinvoice] located invoice %v",
|
|
|
|
newLogClosure(func() string {
|
|
|
|
return spew.Sdump(invoice)
|
|
|
|
}))
|
|
|
|
|
2017-11-12 03:09:14 +03:00
|
|
|
rpcInvoice, err := createRPCInvoice(&invoice)
|
2017-09-05 19:08:02 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return rpcInvoice, nil
|
2016-09-19 22:04:56 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// ListInvoices returns a list of all the invoices currently stored within the
|
|
|
|
// database. Any active debug invoices are ignored.
|
|
|
|
func (r *rpcServer) ListInvoices(ctx context.Context,
|
|
|
|
req *lnrpc.ListInvoiceRequest) (*lnrpc.ListInvoiceResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-09-19 22:04:56 +03:00
|
|
|
dbInvoices, err := r.server.chanDB.FetchAllInvoices(req.PendingOnly)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
invoices := make([]*lnrpc.Invoice, len(dbInvoices))
|
|
|
|
for i, dbInvoice := range dbInvoices {
|
2017-04-24 05:20:20 +03:00
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
rpcInvoice, err := createRPCInvoice(dbInvoice)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2016-09-19 22:04:56 +03:00
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
invoices[i] = rpcInvoice
|
2016-09-19 22:04:56 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.ListInvoiceResponse{
|
|
|
|
Invoices: invoices,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2017-12-30 17:44:31 +03:00
|
|
|
// SubscribeInvoices returns a uni-directional stream (server -> client) for
|
2016-10-16 00:41:11 +03:00
|
|
|
// notifying the client of newly added/settled invoices.
|
|
|
|
func (r *rpcServer) SubscribeInvoices(req *lnrpc.InvoiceSubscription,
|
|
|
|
updateStream lnrpc.Lightning_SubscribeInvoicesServer) error {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-10-16 00:41:11 +03:00
|
|
|
invoiceClient := r.server.invoices.SubscribeNotifications()
|
|
|
|
defer invoiceClient.Cancel()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
// TODO(roasbeef): include newly added invoices?
|
|
|
|
case settledInvoice := <-invoiceClient.SettledInvoices:
|
2017-09-05 19:08:02 +03:00
|
|
|
|
|
|
|
rpcInvoice, err := createRPCInvoice(settledInvoice)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2016-10-16 00:41:11 +03:00
|
|
|
}
|
2017-09-05 19:08:02 +03:00
|
|
|
|
|
|
|
if err := updateStream.Send(rpcInvoice); err != nil {
|
2016-10-16 00:41:11 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
case <-r.quit:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// SubscribeTransactions creates a uni-directional stream (server -> client) in
|
|
|
|
// which any newly discovered transactions relevant to the wallet are sent
|
|
|
|
// over.
|
|
|
|
func (r *rpcServer) SubscribeTransactions(req *lnrpc.GetTransactionsRequest,
|
|
|
|
updateStream lnrpc.Lightning_SubscribeTransactionsServer) error {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-05-18 21:55:25 +03:00
|
|
|
txClient, err := r.server.cc.wallet.SubscribeTransactions()
|
2016-10-16 00:41:11 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer txClient.Cancel()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case tx := <-txClient.ConfirmedTransactions():
|
|
|
|
detail := &lnrpc.Transaction{
|
|
|
|
TxHash: tx.Hash.String(),
|
2017-03-06 01:53:37 +03:00
|
|
|
Amount: int64(tx.Value),
|
2016-10-16 00:41:11 +03:00
|
|
|
NumConfirmations: tx.NumConfirmations,
|
|
|
|
BlockHash: tx.BlockHash.String(),
|
|
|
|
TimeStamp: tx.Timestamp,
|
|
|
|
TotalFees: tx.TotalFees,
|
|
|
|
}
|
|
|
|
if err := updateStream.Send(detail); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
case tx := <-txClient.UnconfirmedTransactions():
|
|
|
|
detail := &lnrpc.Transaction{
|
|
|
|
TxHash: tx.Hash.String(),
|
2017-03-06 01:53:37 +03:00
|
|
|
Amount: int64(tx.Value),
|
2016-10-16 00:41:11 +03:00
|
|
|
TimeStamp: tx.Timestamp,
|
|
|
|
TotalFees: tx.TotalFees,
|
|
|
|
}
|
|
|
|
if err := updateStream.Send(detail); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
case <-r.quit:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetTransactions returns a list of describing all the known transactions
|
|
|
|
// relevant to the wallet.
|
2017-08-18 04:50:57 +03:00
|
|
|
func (r *rpcServer) GetTransactions(ctx context.Context,
|
|
|
|
_ *lnrpc.GetTransactionsRequest) (*lnrpc.TransactionDetails, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-11-17 03:00:58 +03:00
|
|
|
// TODO(roasbeef): add pagination support
|
2017-05-18 21:55:25 +03:00
|
|
|
transactions, err := r.server.cc.wallet.ListTransactionDetails()
|
2016-10-16 00:41:11 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
txDetails := &lnrpc.TransactionDetails{
|
|
|
|
Transactions: make([]*lnrpc.Transaction, len(transactions)),
|
|
|
|
}
|
|
|
|
for i, tx := range transactions {
|
2017-12-06 20:19:37 +03:00
|
|
|
var destAddresses []string
|
|
|
|
for _, destAddress := range tx.DestAddresses {
|
|
|
|
destAddresses = append(destAddresses, destAddress.EncodeAddress())
|
|
|
|
}
|
|
|
|
|
2016-10-16 00:41:11 +03:00
|
|
|
txDetails.Transactions[i] = &lnrpc.Transaction{
|
|
|
|
TxHash: tx.Hash.String(),
|
2017-03-06 01:53:37 +03:00
|
|
|
Amount: int64(tx.Value),
|
2016-10-16 00:41:11 +03:00
|
|
|
NumConfirmations: tx.NumConfirmations,
|
|
|
|
BlockHash: tx.BlockHash.String(),
|
2017-03-06 00:39:42 +03:00
|
|
|
BlockHeight: tx.BlockHeight,
|
2016-10-16 00:41:11 +03:00
|
|
|
TimeStamp: tx.Timestamp,
|
|
|
|
TotalFees: tx.TotalFees,
|
2017-12-06 20:19:37 +03:00
|
|
|
DestAddresses: destAddresses,
|
2016-10-16 00:41:11 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return txDetails, nil
|
|
|
|
}
|
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
// DescribeGraph returns a description of the latest graph state from the PoV
|
|
|
|
// of the node. The graph information is partitioned into two components: all
|
|
|
|
// the nodes/vertexes, and all the edges that connect the vertexes themselves.
|
|
|
|
// As this is a directed graph, the edges also contain the node directional
|
|
|
|
// specific routing policy which includes: the time lock delta, fee
|
|
|
|
// information, etc.
|
2017-08-18 04:50:57 +03:00
|
|
|
func (r *rpcServer) DescribeGraph(ctx context.Context,
|
|
|
|
_ *lnrpc.ChannelGraphRequest) (*lnrpc.ChannelGraph, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
resp := &lnrpc.ChannelGraph{}
|
2016-09-21 03:15:26 +03:00
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// Obtain the pointer to the global singleton channel graph, this will
|
2016-12-27 08:51:47 +03:00
|
|
|
// provide a consistent view of the graph due to bolt db's
|
|
|
|
// transactional model.
|
|
|
|
graph := r.server.chanDB.ChannelGraph()
|
|
|
|
|
|
|
|
// First iterate through all the known nodes (connected or unconnected
|
|
|
|
// within the graph), collating their current state into the RPC
|
|
|
|
// response.
|
2017-04-14 23:17:51 +03:00
|
|
|
err := graph.ForEachNode(nil, func(_ *bolt.Tx, node *channeldb.LightningNode) error {
|
2017-02-17 12:29:23 +03:00
|
|
|
nodeAddrs := make([]*lnrpc.NodeAddress, 0)
|
|
|
|
for _, addr := range node.Addresses {
|
|
|
|
nodeAddr := &lnrpc.NodeAddress{
|
|
|
|
Network: addr.Network(),
|
|
|
|
Addr: addr.String(),
|
|
|
|
}
|
|
|
|
nodeAddrs = append(nodeAddrs, nodeAddr)
|
|
|
|
}
|
2017-12-03 05:37:34 +03:00
|
|
|
|
|
|
|
nodeColor := fmt.Sprintf("#%02x%02x%02x", node.Color.R, node.Color.G, node.Color.B)
|
2016-12-27 08:51:47 +03:00
|
|
|
resp.Nodes = append(resp.Nodes, &lnrpc.LightningNode{
|
|
|
|
LastUpdate: uint32(node.LastUpdate.Unix()),
|
2018-01-31 07:30:00 +03:00
|
|
|
PubKey: hex.EncodeToString(node.PubKeyBytes[:]),
|
2017-02-17 12:29:23 +03:00
|
|
|
Addresses: nodeAddrs,
|
2016-12-27 08:51:47 +03:00
|
|
|
Alias: node.Alias,
|
2017-12-03 05:37:34 +03:00
|
|
|
Color: nodeColor,
|
2016-12-27 08:51:47 +03:00
|
|
|
})
|
2017-02-17 12:29:23 +03:00
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, for each active channel we know of within the graph, create a
|
|
|
|
// similar response which details both the edge information as well as
|
|
|
|
// the routing policies of th nodes connecting the two edges.
|
2017-03-06 04:28:12 +03:00
|
|
|
err = graph.ForEachChannel(func(edgeInfo *channeldb.ChannelEdgeInfo,
|
|
|
|
c1, c2 *channeldb.ChannelEdgePolicy) error {
|
|
|
|
|
|
|
|
edge := marshalDbEdge(edgeInfo, c1, c2)
|
2016-12-27 08:51:47 +03:00
|
|
|
resp.Edges = append(resp.Edges, edge)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil && err != channeldb.ErrGraphNoEdgesFound {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
2017-03-06 04:28:12 +03:00
|
|
|
func marshalDbEdge(edgeInfo *channeldb.ChannelEdgeInfo,
|
|
|
|
c1, c2 *channeldb.ChannelEdgePolicy) *lnrpc.ChannelEdge {
|
|
|
|
|
2017-01-18 00:20:06 +03:00
|
|
|
var (
|
2017-03-06 04:28:12 +03:00
|
|
|
lastUpdate int64
|
2017-01-18 00:20:06 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
if c2 != nil {
|
|
|
|
lastUpdate = c2.LastUpdate.Unix()
|
|
|
|
}
|
|
|
|
if c1 != nil {
|
|
|
|
lastUpdate = c1.LastUpdate.Unix()
|
|
|
|
}
|
2016-12-27 08:51:47 +03:00
|
|
|
|
|
|
|
edge := &lnrpc.ChannelEdge{
|
2017-03-06 04:28:12 +03:00
|
|
|
ChannelId: edgeInfo.ChannelID,
|
|
|
|
ChanPoint: edgeInfo.ChannelPoint.String(),
|
2017-01-18 00:20:06 +03:00
|
|
|
// TODO(roasbeef): update should be on edge info itself
|
|
|
|
LastUpdate: uint32(lastUpdate),
|
2018-01-31 07:30:00 +03:00
|
|
|
Node1Pub: hex.EncodeToString(edgeInfo.NodeKey1Bytes[:]),
|
|
|
|
Node2Pub: hex.EncodeToString(edgeInfo.NodeKey2Bytes[:]),
|
2017-03-06 04:28:12 +03:00
|
|
|
Capacity: int64(edgeInfo.Capacity),
|
2016-12-27 08:51:47 +03:00
|
|
|
}
|
|
|
|
|
2017-01-18 00:20:06 +03:00
|
|
|
if c1 != nil {
|
|
|
|
edge.Node1Policy = &lnrpc.RoutingPolicy{
|
2017-03-06 04:28:12 +03:00
|
|
|
TimeLockDelta: uint32(c1.TimeLockDelta),
|
2017-01-18 00:20:06 +03:00
|
|
|
MinHtlc: int64(c1.MinHTLC),
|
|
|
|
FeeBaseMsat: int64(c1.FeeBaseMSat),
|
|
|
|
FeeRateMilliMsat: int64(c1.FeeProportionalMillionths),
|
|
|
|
}
|
2016-12-27 08:51:47 +03:00
|
|
|
}
|
|
|
|
|
2017-01-18 00:20:06 +03:00
|
|
|
if c2 != nil {
|
|
|
|
edge.Node2Policy = &lnrpc.RoutingPolicy{
|
2017-03-06 04:28:12 +03:00
|
|
|
TimeLockDelta: uint32(c2.TimeLockDelta),
|
2017-01-18 00:20:06 +03:00
|
|
|
MinHtlc: int64(c2.MinHTLC),
|
|
|
|
FeeBaseMsat: int64(c2.FeeBaseMSat),
|
|
|
|
FeeRateMilliMsat: int64(c2.FeeProportionalMillionths),
|
|
|
|
}
|
2016-12-27 08:51:47 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return edge
|
|
|
|
}
|
|
|
|
|
2017-08-04 15:57:48 +03:00
|
|
|
// GetChanInfo returns the latest authenticated network announcement for the
|
2016-12-27 08:51:47 +03:00
|
|
|
// given channel identified by its channel ID: an 8-byte integer which uniquely
|
|
|
|
// identifies the location of transaction's funding output within the block
|
|
|
|
// chain.
|
2017-08-22 09:25:41 +03:00
|
|
|
func (r *rpcServer) GetChanInfo(ctx context.Context,
|
|
|
|
in *lnrpc.ChanInfoRequest) (*lnrpc.ChannelEdge, error) {
|
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
graph := r.server.chanDB.ChannelGraph()
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-03-06 04:28:12 +03:00
|
|
|
edgeInfo, edge1, edge2, err := graph.FetchChannelEdgesByID(in.ChanId)
|
2016-12-27 08:51:47 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Convert the database's edge format into the network/RPC edge format
|
|
|
|
// which couples the edge itself along with the directional node
|
|
|
|
// routing policies of each node involved within the channel.
|
2017-03-06 04:28:12 +03:00
|
|
|
channelEdge := marshalDbEdge(edgeInfo, edge1, edge2)
|
2016-12-27 08:51:47 +03:00
|
|
|
|
|
|
|
return channelEdge, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetNodeInfo returns the latest advertised and aggregate authenticated
|
|
|
|
// channel information for the specified node identified by its public key.
|
2017-08-22 09:25:41 +03:00
|
|
|
func (r *rpcServer) GetNodeInfo(ctx context.Context,
|
|
|
|
in *lnrpc.NodeInfoRequest) (*lnrpc.NodeInfo, error) {
|
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
graph := r.server.chanDB.ChannelGraph()
|
|
|
|
|
|
|
|
// First, parse the hex-encoded public key into a full in-memory public
|
|
|
|
// key object we can work with for querying.
|
|
|
|
pubKeyBytes, err := hex.DecodeString(in.PubKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
pubKey, err := btcec.ParsePubKey(pubKeyBytes, btcec.S256())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// With the public key decoded, attempt to fetch the node corresponding
|
|
|
|
// to this public key. If the node cannot be found, then an error will
|
|
|
|
// be returned.
|
|
|
|
node, err := graph.FetchLightningNode(pubKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// With the node obtained, we'll now iterate through all its out going
|
|
|
|
// edges to gather some basic statistics about its out going channels.
|
|
|
|
var (
|
2018-02-07 06:11:11 +03:00
|
|
|
numChannels uint32
|
|
|
|
totalCapacity btcutil.Amount
|
2016-12-27 08:51:47 +03:00
|
|
|
)
|
2017-04-14 23:17:51 +03:00
|
|
|
if err := node.ForEachChannel(nil, func(_ *bolt.Tx, edge *channeldb.ChannelEdgeInfo,
|
2017-08-22 09:25:41 +03:00
|
|
|
_, _ *channeldb.ChannelEdgePolicy) error {
|
2017-03-06 04:28:12 +03:00
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
numChannels++
|
2018-02-07 06:11:11 +03:00
|
|
|
totalCapacity += edge.Capacity
|
2016-12-27 08:51:47 +03:00
|
|
|
return nil
|
|
|
|
}); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-09-21 03:15:26 +03:00
|
|
|
|
2017-02-17 12:29:23 +03:00
|
|
|
nodeAddrs := make([]*lnrpc.NodeAddress, 0)
|
|
|
|
for _, addr := range node.Addresses {
|
|
|
|
nodeAddr := &lnrpc.NodeAddress{
|
|
|
|
Network: addr.Network(),
|
|
|
|
Addr: addr.String(),
|
|
|
|
}
|
|
|
|
nodeAddrs = append(nodeAddrs, nodeAddr)
|
|
|
|
}
|
2017-01-18 00:20:06 +03:00
|
|
|
// TODO(roasbeef): list channels as well?
|
2017-12-03 05:37:34 +03:00
|
|
|
|
|
|
|
nodeColor := fmt.Sprintf("#%02x%02x%02x", node.Color.R, node.Color.G, node.Color.B)
|
2016-12-27 08:51:47 +03:00
|
|
|
return &lnrpc.NodeInfo{
|
|
|
|
Node: &lnrpc.LightningNode{
|
|
|
|
LastUpdate: uint32(node.LastUpdate.Unix()),
|
|
|
|
PubKey: in.PubKey,
|
2017-02-17 12:29:23 +03:00
|
|
|
Addresses: nodeAddrs,
|
2016-12-27 08:51:47 +03:00
|
|
|
Alias: node.Alias,
|
2017-12-03 05:37:34 +03:00
|
|
|
Color: nodeColor,
|
2016-12-27 08:51:47 +03:00
|
|
|
},
|
|
|
|
NumChannels: numChannels,
|
2018-02-07 06:11:11 +03:00
|
|
|
TotalCapacity: int64(totalCapacity),
|
2016-12-27 08:51:47 +03:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2017-03-21 05:05:37 +03:00
|
|
|
// QueryRoutes attempts to query the daemons' Channel Router for a possible
|
2016-12-27 08:51:47 +03:00
|
|
|
// route to a target destination capable of carrying a specific amount of
|
|
|
|
// satoshis within the route's flow. The retuned route contains the full
|
|
|
|
// details required to craft and send an HTLC, also including the necessary
|
2018-02-07 06:11:11 +03:00
|
|
|
// information that should be present within the Sphinx packet encapsulated
|
2016-12-27 08:51:47 +03:00
|
|
|
// within the HTLC.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): should return a slice of routes in reality
|
|
|
|
// * create separate PR to send based on well formatted route
|
2017-08-18 04:50:57 +03:00
|
|
|
func (r *rpcServer) QueryRoutes(ctx context.Context,
|
2017-03-21 05:05:37 +03:00
|
|
|
in *lnrpc.QueryRoutesRequest) (*lnrpc.QueryRoutesResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// First parse the hex-encoded public key into a full public key object
|
2016-12-27 08:51:47 +03:00
|
|
|
// we can properly manipulate.
|
|
|
|
pubKeyBytes, err := hex.DecodeString(in.PubKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
pubKey, err := btcec.ParsePubKey(pubKeyBytes, btcec.S256())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-08-22 10:28:40 +03:00
|
|
|
// Currently, within the bootstrap phase of the network, we limit the
|
|
|
|
// largest payment size allotted to (2^32) - 1 mSAT or 4.29 million
|
|
|
|
// satoshis.
|
|
|
|
amt := btcutil.Amount(in.Amt)
|
|
|
|
amtMSat := lnwire.NewMSatFromSatoshis(amt)
|
|
|
|
if amtMSat > maxPaymentMSat {
|
|
|
|
return nil, fmt.Errorf("payment of %v is too large, max payment "+
|
|
|
|
"allowed is %v", amt, maxPaymentMSat.ToSatoshis())
|
|
|
|
}
|
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
// Query the channel router for a possible path to the destination that
|
|
|
|
// can carry `in.Amt` satoshis _including_ the total fee required on
|
|
|
|
// the route.
|
2018-02-13 03:29:07 +03:00
|
|
|
routes, err := r.server.chanRouter.FindRoutes(
|
|
|
|
pubKey, amtMSat, uint32(in.NumRoutes),
|
|
|
|
)
|
2016-12-27 08:51:47 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2016-08-20 23:49:35 +03:00
|
|
|
}
|
2016-09-21 03:15:26 +03:00
|
|
|
|
2018-02-27 03:31:40 +03:00
|
|
|
// As the number of returned routes can be less than the number of
|
|
|
|
// requested routes, we'll clamp down the length of the response to the
|
|
|
|
// minimum of the two.
|
|
|
|
numRoutes := int32(len(routes))
|
|
|
|
if in.NumRoutes < numRoutes {
|
|
|
|
numRoutes = in.NumRoutes
|
|
|
|
}
|
|
|
|
|
2017-03-21 05:05:37 +03:00
|
|
|
// For each valid route, we'll convert the result into the format
|
|
|
|
// required by the RPC system.
|
|
|
|
routeResp := &lnrpc.QueryRoutesResponse{
|
2018-02-13 03:29:07 +03:00
|
|
|
Routes: make([]*lnrpc.Route, 0, in.NumRoutes),
|
2017-03-21 05:05:37 +03:00
|
|
|
}
|
2018-02-27 03:31:40 +03:00
|
|
|
for i := int32(0); i < numRoutes; i++ {
|
2018-02-13 03:29:07 +03:00
|
|
|
routeResp.Routes = append(
|
|
|
|
routeResp.Routes, marshallRoute(routes[i]),
|
|
|
|
)
|
2017-03-21 05:05:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return routeResp, nil
|
2017-01-17 07:41:32 +03:00
|
|
|
}
|
|
|
|
|
2017-12-11 04:02:36 +03:00
|
|
|
func marshallRoute(route *routing.Route) *lnrpc.Route {
|
2016-12-27 08:51:47 +03:00
|
|
|
resp := &lnrpc.Route{
|
|
|
|
TotalTimeLock: route.TotalTimeLock,
|
2017-08-22 09:25:41 +03:00
|
|
|
TotalFees: int64(route.TotalFees.ToSatoshis()),
|
|
|
|
TotalAmt: int64(route.TotalAmount.ToSatoshis()),
|
2016-12-27 08:51:47 +03:00
|
|
|
Hops: make([]*lnrpc.Hop, len(route.Hops)),
|
|
|
|
}
|
|
|
|
for i, hop := range route.Hops {
|
|
|
|
resp.Hops[i] = &lnrpc.Hop{
|
|
|
|
ChanId: hop.Channel.ChannelID,
|
|
|
|
ChanCapacity: int64(hop.Channel.Capacity),
|
2017-08-22 09:25:41 +03:00
|
|
|
AmtToForward: int64(hop.AmtToForward.ToSatoshis()),
|
|
|
|
Fee: int64(hop.Fee.ToSatoshis()),
|
2017-08-03 07:18:15 +03:00
|
|
|
Expiry: uint32(hop.OutgoingTimeLock),
|
2016-12-27 08:51:47 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-17 07:41:32 +03:00
|
|
|
return resp
|
2016-12-27 08:51:47 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetNetworkInfo returns some basic stats about the known channel graph from
|
|
|
|
// the PoV of the node.
|
2017-08-22 09:25:41 +03:00
|
|
|
func (r *rpcServer) GetNetworkInfo(ctx context.Context,
|
|
|
|
_ *lnrpc.NetworkInfoRequest) (*lnrpc.NetworkInfo, error) {
|
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
graph := r.server.chanDB.ChannelGraph()
|
|
|
|
|
|
|
|
var (
|
|
|
|
numNodes uint32
|
|
|
|
numChannels uint32
|
|
|
|
maxChanOut uint32
|
|
|
|
totalNetworkCapacity btcutil.Amount
|
|
|
|
minChannelSize btcutil.Amount = math.MaxInt64
|
|
|
|
maxChannelSize btcutil.Amount
|
|
|
|
)
|
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// We'll use this map to de-duplicate channels during our traversal.
|
|
|
|
// This is needed since channels are directional, so there will be two
|
|
|
|
// edges for each channel within the graph.
|
|
|
|
seenChans := make(map[uint64]struct{})
|
2016-12-27 08:51:47 +03:00
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// We'll run through all the known nodes in the within our view of the
|
2016-12-27 08:51:47 +03:00
|
|
|
// network, tallying up the total number of nodes, and also gathering
|
2017-04-14 23:17:51 +03:00
|
|
|
// each node so we can measure the graph diameter and degree stats
|
2016-12-27 08:51:47 +03:00
|
|
|
// below.
|
2017-04-14 23:17:51 +03:00
|
|
|
if err := graph.ForEachNode(nil, func(tx *bolt.Tx, node *channeldb.LightningNode) error {
|
|
|
|
// Increment the total number of nodes with each iteration.
|
2016-12-27 08:51:47 +03:00
|
|
|
numNodes++
|
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// For each channel we'll compute the out degree of each node,
|
|
|
|
// and also update our running tallies of the min/max channel
|
|
|
|
// capacity, as well as the total channel capacity. We pass
|
|
|
|
// through the db transaction from the outer view so we can
|
|
|
|
// re-use it within this inner view.
|
2016-12-27 08:51:47 +03:00
|
|
|
var outDegree uint32
|
2017-04-14 23:17:51 +03:00
|
|
|
if err := node.ForEachChannel(tx, func(_ *bolt.Tx,
|
2017-08-22 09:25:41 +03:00
|
|
|
edge *channeldb.ChannelEdgeInfo, _, _ *channeldb.ChannelEdgePolicy) error {
|
2017-03-06 04:28:12 +03:00
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// Bump up the out degree for this node for each
|
|
|
|
// channel encountered.
|
2016-12-27 08:51:47 +03:00
|
|
|
outDegree++
|
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// If we've already seen this channel, then we'll
|
|
|
|
// return early to ensure that we don't double-count
|
|
|
|
// stats.
|
|
|
|
if _, ok := seenChans[edge.ChannelID]; ok {
|
|
|
|
return nil
|
|
|
|
}
|
2016-12-27 08:51:47 +03:00
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// Compare the capacity of this channel against the
|
|
|
|
// running min/max to see if we should update the
|
|
|
|
// extrema.
|
|
|
|
chanCapacity := edge.Capacity
|
|
|
|
if chanCapacity < minChannelSize {
|
|
|
|
minChannelSize = chanCapacity
|
|
|
|
}
|
|
|
|
if chanCapacity > maxChannelSize {
|
|
|
|
maxChannelSize = chanCapacity
|
|
|
|
}
|
2017-03-06 04:28:12 +03:00
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// Accumulate the total capacity of this channel to the
|
|
|
|
// network wide-capacity.
|
|
|
|
totalNetworkCapacity += chanCapacity
|
2016-12-27 08:51:47 +03:00
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
numChannels++
|
2016-12-27 08:51:47 +03:00
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
seenChans[edge.ChannelID] = struct{}{}
|
|
|
|
return nil
|
|
|
|
}); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-12-27 08:51:47 +03:00
|
|
|
|
2017-04-14 23:17:51 +03:00
|
|
|
// Finally, if the out degree of this node is greater than what
|
|
|
|
// we've seen so far, update the maxChanOut variable.
|
|
|
|
if outDegree > maxChanOut {
|
|
|
|
maxChanOut = outDegree
|
|
|
|
}
|
2016-12-27 08:51:47 +03:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-05-25 03:28:35 +03:00
|
|
|
// If we don't have any channels, then reset the minChannelSize to zero
|
2017-12-03 05:37:34 +03:00
|
|
|
// to avoid outputting NaN in encoded JSON.
|
2017-05-25 03:28:35 +03:00
|
|
|
if numChannels == 0 {
|
|
|
|
minChannelSize = 0
|
|
|
|
}
|
|
|
|
|
2017-01-30 02:02:57 +03:00
|
|
|
// TODO(roasbeef): graph diameter
|
|
|
|
|
2016-12-27 08:51:47 +03:00
|
|
|
// TODO(roasbeef): also add oldest channel?
|
2017-01-18 00:20:06 +03:00
|
|
|
// * also add median channel size
|
2017-05-25 03:28:35 +03:00
|
|
|
netInfo := &lnrpc.NetworkInfo{
|
2016-12-27 08:51:47 +03:00
|
|
|
MaxOutDegree: maxChanOut,
|
|
|
|
AvgOutDegree: float64(numChannels) / float64(numNodes),
|
|
|
|
NumNodes: numNodes,
|
|
|
|
NumChannels: numChannels,
|
|
|
|
TotalNetworkCapacity: int64(totalNetworkCapacity),
|
|
|
|
AvgChannelSize: float64(totalNetworkCapacity) / float64(numChannels),
|
2017-05-25 03:28:35 +03:00
|
|
|
|
|
|
|
MinChannelSize: int64(minChannelSize),
|
|
|
|
MaxChannelSize: int64(maxChannelSize),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Similarly, if we don't have any channels, then we'll also set the
|
|
|
|
// average channel size to zero in order to avoid weird JSON encoding
|
|
|
|
// outputs.
|
|
|
|
if numChannels == 0 {
|
|
|
|
netInfo.AvgChannelSize = 0
|
|
|
|
}
|
|
|
|
|
|
|
|
return netInfo, nil
|
2016-07-15 14:02:59 +03:00
|
|
|
}
|
2016-12-05 14:59:36 +03:00
|
|
|
|
2017-05-12 00:55:56 +03:00
|
|
|
// StopDaemon will send a shutdown request to the interrupt handler, triggering
|
|
|
|
// a graceful shutdown of the daemon.
|
2017-08-22 09:25:41 +03:00
|
|
|
func (r *rpcServer) StopDaemon(ctx context.Context,
|
|
|
|
_ *lnrpc.StopRequest) (*lnrpc.StopResponse, error) {
|
|
|
|
|
2017-05-12 00:55:56 +03:00
|
|
|
shutdownRequestChannel <- struct{}{}
|
|
|
|
return &lnrpc.StopResponse{}, nil
|
|
|
|
}
|
|
|
|
|
2017-03-14 06:39:16 +03:00
|
|
|
// SubscribeChannelGraph launches a streaming RPC that allows the caller to
|
|
|
|
// receive notifications upon any changes the channel graph topology from the
|
|
|
|
// review of the responding node. Events notified include: new nodes coming
|
|
|
|
// online, nodes updating their authenticated attributes, new channels being
|
|
|
|
// advertised, updates in the routing policy for a directional channel edge,
|
|
|
|
// and finally when prior channels are closed on-chain.
|
|
|
|
func (r *rpcServer) SubscribeChannelGraph(req *lnrpc.GraphTopologySubscription,
|
|
|
|
updateStream lnrpc.Lightning_SubscribeChannelGraphServer) error {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-03-14 06:39:16 +03:00
|
|
|
// First, we start by subscribing to a new intent to receive
|
|
|
|
// notifications from the channel router.
|
|
|
|
client, err := r.server.chanRouter.SubscribeTopology()
|
|
|
|
if err != nil {
|
2017-03-15 06:06:33 +03:00
|
|
|
return err
|
2017-03-14 06:39:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that the resources for the topology update client is cleaned
|
|
|
|
// up once either the server, or client exists.
|
|
|
|
defer client.Cancel()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
|
|
|
|
// A new update has been sent by the channel router, we'll
|
2017-03-15 06:06:33 +03:00
|
|
|
// marshal it into the form expected by the gRPC client, then
|
2017-03-14 06:39:16 +03:00
|
|
|
// send it off.
|
|
|
|
case topChange, ok := <-client.TopologyChanges:
|
|
|
|
// If the second value from the channel read is nil,
|
|
|
|
// then this means that the channel router is exiting
|
|
|
|
// or the notification client was cancelled. So we'll
|
|
|
|
// exit early.
|
|
|
|
if !ok {
|
2017-05-12 00:55:56 +03:00
|
|
|
return errors.New("server shutting down")
|
2017-03-14 06:39:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Convert the struct from the channel router into the
|
|
|
|
// form expected by the gRPC service then send it off
|
|
|
|
// to the client.
|
|
|
|
graphUpdate := marshallTopologyChange(topChange)
|
|
|
|
if err := updateStream.Send(graphUpdate); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// The server is quitting, so we'll exit immediately. Returning
|
|
|
|
// nil will close the clients read end of the stream.
|
|
|
|
case <-r.quit:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-07 06:11:11 +03:00
|
|
|
// marshallTopologyChange performs a mapping from the topology change struct
|
2017-03-14 06:39:16 +03:00
|
|
|
// returned by the router to the form of notifications expected by the current
|
|
|
|
// gRPC service.
|
|
|
|
func marshallTopologyChange(topChange *routing.TopologyChange) *lnrpc.GraphTopologyUpdate {
|
|
|
|
|
|
|
|
// encodeKey is a simple helper function that converts a live public
|
|
|
|
// key into a hex-encoded version of the compressed serialization for
|
|
|
|
// the public key.
|
|
|
|
encodeKey := func(k *btcec.PublicKey) string {
|
|
|
|
return hex.EncodeToString(k.SerializeCompressed())
|
|
|
|
}
|
|
|
|
|
|
|
|
nodeUpdates := make([]*lnrpc.NodeUpdate, len(topChange.NodeUpdates))
|
|
|
|
for i, nodeUpdate := range topChange.NodeUpdates {
|
|
|
|
addrs := make([]string, len(nodeUpdate.Addresses))
|
|
|
|
for i, addr := range nodeUpdate.Addresses {
|
|
|
|
addrs[i] = addr.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
nodeUpdates[i] = &lnrpc.NodeUpdate{
|
|
|
|
Addresses: addrs,
|
|
|
|
IdentityKey: encodeKey(nodeUpdate.IdentityKey),
|
|
|
|
GlobalFeatures: nodeUpdate.GlobalFeatures,
|
|
|
|
Alias: nodeUpdate.Alias,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
channelUpdates := make([]*lnrpc.ChannelEdgeUpdate, len(topChange.ChannelEdgeUpdates))
|
|
|
|
for i, channelUpdate := range topChange.ChannelEdgeUpdates {
|
|
|
|
channelUpdates[i] = &lnrpc.ChannelEdgeUpdate{
|
|
|
|
ChanId: channelUpdate.ChanID,
|
|
|
|
ChanPoint: &lnrpc.ChannelPoint{
|
2018-01-11 07:59:30 +03:00
|
|
|
FundingTxid: &lnrpc.ChannelPoint_FundingTxidBytes{
|
|
|
|
FundingTxidBytes: channelUpdate.ChanPoint.Hash[:],
|
|
|
|
},
|
2017-03-14 06:39:16 +03:00
|
|
|
OutputIndex: channelUpdate.ChanPoint.Index,
|
|
|
|
},
|
|
|
|
Capacity: int64(channelUpdate.Capacity),
|
|
|
|
RoutingPolicy: &lnrpc.RoutingPolicy{
|
|
|
|
TimeLockDelta: uint32(channelUpdate.TimeLockDelta),
|
|
|
|
MinHtlc: int64(channelUpdate.MinHTLC),
|
|
|
|
FeeBaseMsat: int64(channelUpdate.BaseFee),
|
|
|
|
FeeRateMilliMsat: int64(channelUpdate.FeeRate),
|
|
|
|
},
|
|
|
|
AdvertisingNode: encodeKey(channelUpdate.AdvertisingNode),
|
|
|
|
ConnectingNode: encodeKey(channelUpdate.ConnectingNode),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
closedChans := make([]*lnrpc.ClosedChannelUpdate, len(topChange.ClosedChannels))
|
|
|
|
for i, closedChan := range topChange.ClosedChannels {
|
|
|
|
closedChans[i] = &lnrpc.ClosedChannelUpdate{
|
|
|
|
ChanId: closedChan.ChanID,
|
|
|
|
Capacity: int64(closedChan.Capacity),
|
|
|
|
ClosedHeight: closedChan.ClosedHeight,
|
|
|
|
ChanPoint: &lnrpc.ChannelPoint{
|
2018-01-11 07:59:30 +03:00
|
|
|
FundingTxid: &lnrpc.ChannelPoint_FundingTxidBytes{
|
|
|
|
FundingTxidBytes: closedChan.ChanPoint.Hash[:],
|
|
|
|
},
|
2017-03-14 06:39:16 +03:00
|
|
|
OutputIndex: closedChan.ChanPoint.Index,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.GraphTopologyUpdate{
|
|
|
|
NodeUpdates: nodeUpdates,
|
|
|
|
ChannelUpdates: channelUpdates,
|
|
|
|
ClosedChans: closedChans,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-05 14:59:36 +03:00
|
|
|
// ListPayments returns a list of all outgoing payments.
|
2017-08-18 04:50:57 +03:00
|
|
|
func (r *rpcServer) ListPayments(ctx context.Context,
|
|
|
|
_ *lnrpc.ListPaymentsRequest) (*lnrpc.ListPaymentsResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-12-05 14:59:36 +03:00
|
|
|
rpcsLog.Debugf("[ListPayments]")
|
2016-12-21 12:19:01 +03:00
|
|
|
|
2016-12-05 14:59:36 +03:00
|
|
|
payments, err := r.server.chanDB.FetchAllPayments()
|
2017-02-05 03:52:25 +03:00
|
|
|
if err != nil && err != channeldb.ErrNoPaymentsCreated {
|
2016-12-05 14:59:36 +03:00
|
|
|
return nil, err
|
|
|
|
}
|
2016-12-21 12:19:01 +03:00
|
|
|
|
2016-12-05 14:59:36 +03:00
|
|
|
paymentsResp := &lnrpc.ListPaymentsResponse{
|
|
|
|
Payments: make([]*lnrpc.Payment, len(payments)),
|
|
|
|
}
|
2016-12-31 03:41:59 +03:00
|
|
|
for i, payment := range payments {
|
|
|
|
path := make([]string, len(payment.Path))
|
|
|
|
for i, hop := range payment.Path {
|
|
|
|
path[i] = hex.EncodeToString(hop[:])
|
|
|
|
}
|
|
|
|
|
2017-12-14 04:04:18 +03:00
|
|
|
paymentHash := sha256.Sum256(payment.PaymentPreimage[:])
|
2016-12-31 03:41:59 +03:00
|
|
|
paymentsResp.Payments[i] = &lnrpc.Payment{
|
2017-12-14 04:04:18 +03:00
|
|
|
PaymentHash: hex.EncodeToString(paymentHash[:]),
|
|
|
|
Value: int64(payment.Terms.Value.ToSatoshis()),
|
|
|
|
CreationDate: payment.CreationDate.Unix(),
|
|
|
|
Path: path,
|
2018-03-06 21:21:03 +03:00
|
|
|
Fee: int64(payment.Fee.ToSatoshis()),
|
2017-12-14 04:04:18 +03:00
|
|
|
PaymentPreimage: hex.EncodeToString(payment.PaymentPreimage[:]),
|
2016-12-05 14:59:36 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return paymentsResp, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteAllPayments deletes all outgoing payments from DB.
|
2017-08-18 04:50:57 +03:00
|
|
|
func (r *rpcServer) DeleteAllPayments(ctx context.Context,
|
|
|
|
_ *lnrpc.DeleteAllPaymentsRequest) (*lnrpc.DeleteAllPaymentsResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2016-12-05 14:59:36 +03:00
|
|
|
rpcsLog.Debugf("[DeleteAllPayments]")
|
2016-12-21 12:19:01 +03:00
|
|
|
|
2016-12-31 03:41:59 +03:00
|
|
|
if err := r.server.chanDB.DeleteAllPayments(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.DeleteAllPaymentsResponse{}, nil
|
2016-12-27 08:51:18 +03:00
|
|
|
}
|
2016-12-27 08:51:47 +03:00
|
|
|
|
2017-01-15 05:16:53 +03:00
|
|
|
// DebugLevel allows a caller to programmatically set the logging verbosity of
|
|
|
|
// lnd. The logging can be targeted according to a coarse daemon-wide logging
|
|
|
|
// level, or in a granular fashion to specify the logging for a target
|
|
|
|
// sub-system.
|
|
|
|
func (r *rpcServer) DebugLevel(ctx context.Context,
|
|
|
|
req *lnrpc.DebugLevelRequest) (*lnrpc.DebugLevelResponse, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
2017-01-15 05:16:53 +03:00
|
|
|
// If show is set, then we simply print out the list of available
|
|
|
|
// sub-systems.
|
|
|
|
if req.Show {
|
|
|
|
return &lnrpc.DebugLevelResponse{
|
|
|
|
SubSystems: strings.Join(supportedSubsystems(), " "),
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
rpcsLog.Infof("[debuglevel] changing debug level to: %v", req.LevelSpec)
|
|
|
|
|
|
|
|
// Otherwise, we'll attempt to set the logging level using the
|
|
|
|
// specified level spec.
|
|
|
|
if err := parseAndSetDebugLevels(req.LevelSpec); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.DebugLevelResponse{}, nil
|
|
|
|
}
|
2017-01-18 00:39:30 +03:00
|
|
|
|
|
|
|
// DecodePayReq takes an encoded payment request string and attempts to decode
|
|
|
|
// it, returning a full description of the conditions encoded within the
|
|
|
|
// payment request.
|
|
|
|
func (r *rpcServer) DecodePayReq(ctx context.Context,
|
|
|
|
req *lnrpc.PayReqString) (*lnrpc.PayReq, error) {
|
2017-08-22 09:25:41 +03:00
|
|
|
|
|
|
|
rpcsLog.Tracef("[decodepayreq] decoding: %v", req.PayReq)
|
|
|
|
|
2017-01-18 00:39:30 +03:00
|
|
|
// Fist we'll attempt to decode the payment request string, if the
|
|
|
|
// request is invalid or the checksum doesn't match, then we'll exit
|
|
|
|
// here with an error.
|
2018-02-19 18:20:54 +03:00
|
|
|
payReq, err := zpay32.Decode(req.PayReq, activeNetParams.Params)
|
2017-01-18 00:39:30 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-09-05 19:08:02 +03:00
|
|
|
// Let the fields default to empty strings.
|
|
|
|
desc := ""
|
|
|
|
if payReq.Description != nil {
|
|
|
|
desc = *payReq.Description
|
|
|
|
}
|
|
|
|
|
|
|
|
descHash := []byte("")
|
|
|
|
if payReq.DescriptionHash != nil {
|
|
|
|
descHash = payReq.DescriptionHash[:]
|
|
|
|
}
|
|
|
|
|
|
|
|
fallbackAddr := ""
|
|
|
|
if payReq.FallbackAddr != nil {
|
|
|
|
fallbackAddr = payReq.FallbackAddr.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Expiry time will default to 3600 seconds if not specified
|
|
|
|
// explicitly.
|
|
|
|
expiry := int64(payReq.Expiry().Seconds())
|
|
|
|
|
|
|
|
amt := int64(0)
|
|
|
|
if payReq.MilliSat != nil {
|
|
|
|
amt = int64(payReq.MilliSat.ToSatoshis())
|
|
|
|
}
|
|
|
|
|
2017-01-18 00:39:30 +03:00
|
|
|
dest := payReq.Destination.SerializeCompressed()
|
|
|
|
return &lnrpc.PayReq{
|
2017-09-05 19:08:02 +03:00
|
|
|
Destination: hex.EncodeToString(dest),
|
|
|
|
PaymentHash: hex.EncodeToString(payReq.PaymentHash[:]),
|
|
|
|
NumSatoshis: amt,
|
|
|
|
Timestamp: payReq.Timestamp.Unix(),
|
|
|
|
Description: desc,
|
|
|
|
DescriptionHash: hex.EncodeToString(descHash[:]),
|
|
|
|
FallbackAddr: fallbackAddr,
|
|
|
|
Expiry: expiry,
|
2017-10-19 08:16:40 +03:00
|
|
|
CltvExpiry: int64(payReq.MinFinalCLTVExpiry()),
|
2017-01-18 00:39:30 +03:00
|
|
|
}, nil
|
|
|
|
}
|
2017-08-22 10:09:43 +03:00
|
|
|
|
|
|
|
// feeBase is the fixed point that fee rate computation are performed over.
|
|
|
|
// Nodes on the network advertise their fee rate using this point as a base.
|
|
|
|
// This means that the minimal possible fee rate if 1e-6, or 0.000001, or
|
|
|
|
// 0.0001%.
|
|
|
|
const feeBase = 1000000
|
|
|
|
|
|
|
|
// FeeReport allows the caller to obtain a report detailing the current fee
|
|
|
|
// schedule enforced by the node globally for each channel.
|
|
|
|
func (r *rpcServer) FeeReport(ctx context.Context,
|
|
|
|
_ *lnrpc.FeeReportRequest) (*lnrpc.FeeReportResponse, error) {
|
|
|
|
|
|
|
|
// TODO(roasbeef): use UnaryInterceptor to add automated logging
|
|
|
|
|
2018-02-28 09:23:09 +03:00
|
|
|
rpcsLog.Debugf("[feereport]")
|
|
|
|
|
2017-08-22 10:09:43 +03:00
|
|
|
channelGraph := r.server.chanDB.ChannelGraph()
|
|
|
|
selfNode, err := channelGraph.SourceNode()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var feeReports []*lnrpc.ChannelFeeReport
|
|
|
|
err = selfNode.ForEachChannel(nil, func(_ *bolt.Tx, chanInfo *channeldb.ChannelEdgeInfo,
|
|
|
|
edgePolicy, _ *channeldb.ChannelEdgePolicy) error {
|
|
|
|
|
|
|
|
// We'll compute the effective fee rate by converting from a
|
|
|
|
// fixed point fee rate to a floating point fee rate. The fee
|
|
|
|
// rate field in the database the amount of mSAT charged per
|
|
|
|
// 1mil mSAT sent, so will divide by this to get the proper fee
|
|
|
|
// rate.
|
|
|
|
feeRateFixedPoint := edgePolicy.FeeProportionalMillionths
|
|
|
|
feeRate := float64(feeRateFixedPoint) / float64(feeBase)
|
|
|
|
|
|
|
|
// TODO(roasbeef): also add stats for revenue for each channel
|
|
|
|
feeReports = append(feeReports, &lnrpc.ChannelFeeReport{
|
|
|
|
ChanPoint: chanInfo.ChannelPoint.String(),
|
|
|
|
BaseFeeMsat: int64(edgePolicy.FeeBaseMSat),
|
|
|
|
FeePerMil: int64(feeRateFixedPoint),
|
|
|
|
FeeRate: feeRate,
|
|
|
|
})
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-02-28 09:23:09 +03:00
|
|
|
fwdEventLog := r.server.chanDB.ForwardingLog()
|
|
|
|
|
|
|
|
// computeFeeSum is a helper function that computes the total fees for
|
|
|
|
// a particular time slice described by a forwarding event query.
|
|
|
|
computeFeeSum := func(query channeldb.ForwardingEventQuery) (lnwire.MilliSatoshi, error) {
|
|
|
|
|
|
|
|
var totalFees lnwire.MilliSatoshi
|
|
|
|
|
|
|
|
// We'll continue to fetch the next query and accumulate the
|
|
|
|
// fees until the next query returns no events.
|
|
|
|
for {
|
|
|
|
timeSlice, err := fwdEventLog.Query(query)
|
|
|
|
if err != nil {
|
|
|
|
return 0, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the timeslice is empty, then we'll return as
|
|
|
|
// we've retrieved all the entries in this range.
|
|
|
|
if len(timeSlice.ForwardingEvents) == 0 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, we'll tally up an accumulate the total
|
|
|
|
// fees for this time slice.
|
|
|
|
for _, event := range timeSlice.ForwardingEvents {
|
|
|
|
fee := event.AmtIn - event.AmtOut
|
|
|
|
totalFees += fee
|
|
|
|
}
|
|
|
|
|
|
|
|
// We'll now take the last offset index returned as
|
|
|
|
// part of this response, and modify our query to start
|
|
|
|
// at this index. This has a pagination effect in the
|
|
|
|
// case that our query bounds has more than 100k
|
|
|
|
// entries.
|
|
|
|
query.IndexOffset = timeSlice.LastIndexOffset
|
|
|
|
}
|
|
|
|
|
|
|
|
return totalFees, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
now := time.Now()
|
|
|
|
|
|
|
|
// Before we perform the queries below, we'll instruct the switch to
|
|
|
|
// flush any pending events to disk. This ensure we get a complete
|
|
|
|
// snapshot at this particular time.
|
|
|
|
if r.server.htlcSwitch.FlushForwardingEvents(); err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to flush forwarding "+
|
|
|
|
"events: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// In addition to returning the current fee schedule for each channel.
|
|
|
|
// We'll also perform a series of queries to obtain the total fees
|
|
|
|
// earned over the past day, week, and month.
|
|
|
|
dayQuery := channeldb.ForwardingEventQuery{
|
|
|
|
StartTime: now.Add(-time.Hour * 24),
|
|
|
|
EndTime: now,
|
|
|
|
NumMaxEvents: 1000,
|
|
|
|
}
|
|
|
|
dayFees, err := computeFeeSum(dayQuery)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to retrieve day fees: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
weekQuery := channeldb.ForwardingEventQuery{
|
|
|
|
StartTime: now.Add(-time.Hour * 24 * 7),
|
|
|
|
EndTime: now,
|
|
|
|
NumMaxEvents: 1000,
|
|
|
|
}
|
|
|
|
weekFees, err := computeFeeSum(weekQuery)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to retrieve day fees: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
monthQuery := channeldb.ForwardingEventQuery{
|
|
|
|
StartTime: now.Add(-time.Hour * 24 * 30),
|
|
|
|
EndTime: now,
|
|
|
|
NumMaxEvents: 1000,
|
|
|
|
}
|
|
|
|
monthFees, err := computeFeeSum(monthQuery)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to retrieve day fees: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-08-22 11:00:07 +03:00
|
|
|
return &lnrpc.FeeReportResponse{
|
|
|
|
ChannelFees: feeReports,
|
2018-02-28 09:23:09 +03:00
|
|
|
DayFeeSum: uint64(dayFees.ToSatoshis()),
|
|
|
|
WeekFeeSum: uint64(weekFees.ToSatoshis()),
|
|
|
|
MonthFeeSum: uint64(monthFees.ToSatoshis()),
|
2017-08-22 11:00:07 +03:00
|
|
|
}, nil
|
2017-08-22 10:09:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// minFeeRate is the smallest permitted fee rate within the network. This is
|
2018-02-07 06:11:11 +03:00
|
|
|
// derived by the fact that fee rates are computed using a fixed point of
|
2017-08-22 10:09:43 +03:00
|
|
|
// 1,000,000. As a result, the smallest representable fee rate is 1e-6, or
|
|
|
|
// 0.000001, or 0.0001%.
|
|
|
|
const minFeeRate = 1e-6
|
|
|
|
|
2017-12-17 01:14:58 +03:00
|
|
|
// UpdateChannelPolicy allows the caller to update the channel forwarding policy
|
|
|
|
// for all channels globally, or a particular channel.
|
|
|
|
func (r *rpcServer) UpdateChannelPolicy(ctx context.Context,
|
|
|
|
req *lnrpc.PolicyUpdateRequest) (*lnrpc.PolicyUpdateResponse, error) {
|
2017-08-22 10:09:43 +03:00
|
|
|
|
|
|
|
var targetChans []wire.OutPoint
|
|
|
|
switch scope := req.Scope.(type) {
|
|
|
|
// If the request is targeting all active channels, then we don't need
|
|
|
|
// target any channels by their channel point.
|
2017-12-17 01:14:58 +03:00
|
|
|
case *lnrpc.PolicyUpdateRequest_Global:
|
2017-08-22 10:09:43 +03:00
|
|
|
|
|
|
|
// Otherwise, we're targeting an individual channel by its channel
|
|
|
|
// point.
|
2017-12-17 01:14:58 +03:00
|
|
|
case *lnrpc.PolicyUpdateRequest_ChanPoint:
|
2018-01-11 07:59:30 +03:00
|
|
|
txidHash, err := getChanPointFundingTxid(scope.ChanPoint)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
txid, err := chainhash.NewHash(txidHash)
|
2017-08-22 10:09:43 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
targetChans = append(targetChans, wire.OutPoint{
|
|
|
|
Hash: *txid,
|
|
|
|
Index: scope.ChanPoint.OutputIndex,
|
|
|
|
})
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("unknown scope: %v", scope)
|
|
|
|
}
|
|
|
|
|
|
|
|
// As a sanity check, we'll ensure that the passed fee rate is below
|
2017-12-17 01:14:58 +03:00
|
|
|
// 1e-6, or the lowest allowed fee rate, and that the passed timelock
|
|
|
|
// is large enough.
|
2017-08-22 10:09:43 +03:00
|
|
|
if req.FeeRate < minFeeRate {
|
|
|
|
return nil, fmt.Errorf("fee rate of %v is too small, min fee "+
|
|
|
|
"rate is %v", req.FeeRate, minFeeRate)
|
|
|
|
}
|
|
|
|
|
2017-12-17 01:14:58 +03:00
|
|
|
if req.TimeLockDelta < minTimeLockDelta {
|
|
|
|
return nil, fmt.Errorf("time lock delta of %v is too small, "+
|
|
|
|
"minimum supported is %v", req.TimeLockDelta,
|
|
|
|
minTimeLockDelta)
|
|
|
|
}
|
|
|
|
|
2017-08-22 10:09:43 +03:00
|
|
|
// We'll also need to convert the floating point fee rate we accept
|
|
|
|
// over RPC to the fixed point rate that we use within the protocol. We
|
|
|
|
// do this by multiplying the passed fee rate by the fee base. This
|
|
|
|
// gives us the fixed point, scaled by 1 million that's used within the
|
|
|
|
// protocol.
|
|
|
|
feeRateFixed := uint32(req.FeeRate * feeBase)
|
|
|
|
baseFeeMsat := lnwire.MilliSatoshi(req.BaseFeeMsat)
|
|
|
|
feeSchema := routing.FeeSchema{
|
|
|
|
BaseFee: baseFeeMsat,
|
|
|
|
FeeRate: feeRateFixed,
|
|
|
|
}
|
|
|
|
|
2017-12-17 01:14:58 +03:00
|
|
|
chanPolicy := routing.ChannelPolicy{
|
|
|
|
FeeSchema: feeSchema,
|
|
|
|
TimeLockDelta: req.TimeLockDelta,
|
|
|
|
}
|
|
|
|
|
|
|
|
rpcsLog.Tracef("[updatechanpolicy] updating channel policy base_fee=%v, "+
|
|
|
|
"rate_float=%v, rate_fixed=%v, time_lock_delta: %v, targets=%v",
|
|
|
|
req.BaseFeeMsat, req.FeeRate, feeRateFixed, req.TimeLockDelta,
|
2017-08-22 10:09:43 +03:00
|
|
|
spew.Sdump(targetChans))
|
|
|
|
|
|
|
|
// With the scope resolved, we'll now send this to the
|
2017-12-17 01:14:58 +03:00
|
|
|
// AuthenticatedGossiper so it can propagate the new policy for our
|
2017-08-22 10:09:43 +03:00
|
|
|
// target channel(s).
|
2017-12-17 01:14:58 +03:00
|
|
|
err := r.server.authGossiper.PropagateChanPolicyUpdate(
|
|
|
|
chanPolicy, targetChans...,
|
2017-08-22 10:09:43 +03:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, we'll apply the set of active links amongst the target
|
|
|
|
// channels.
|
|
|
|
//
|
|
|
|
// We create a partially policy as the logic won't overwrite a valid
|
|
|
|
// sub-policy with a "nil" one.
|
|
|
|
p := htlcswitch.ForwardingPolicy{
|
2017-12-17 01:14:58 +03:00
|
|
|
BaseFee: baseFeeMsat,
|
|
|
|
FeeRate: lnwire.MilliSatoshi(feeRateFixed),
|
|
|
|
TimeLockDelta: req.TimeLockDelta,
|
2017-08-22 10:09:43 +03:00
|
|
|
}
|
|
|
|
err = r.server.htlcSwitch.UpdateForwardingPolicies(p, targetChans...)
|
|
|
|
if err != nil {
|
|
|
|
// If we're unable update the fees due to the links not being
|
|
|
|
// online, then we don't need to fail the call. We'll simply
|
|
|
|
// log the failure.
|
|
|
|
rpcsLog.Warnf("Unable to update link fees: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-12-17 01:14:58 +03:00
|
|
|
return &lnrpc.PolicyUpdateResponse{}, nil
|
2017-08-22 10:09:43 +03:00
|
|
|
}
|
2018-02-28 09:23:27 +03:00
|
|
|
|
|
|
|
// ForwardingHistory allows the caller to query the htlcswitch for a record of
|
|
|
|
// all HTLC's forwarded within the target time range, and integer offset within
|
|
|
|
// that time range. If no time-range is specified, then the first chunk of the
|
|
|
|
// past 24 hrs of forwarding history are returned.
|
|
|
|
|
|
|
|
// A list of forwarding events are returned. The size of each forwarding event
|
|
|
|
// is 40 bytes, and the max message size able to be returned in gRPC is 4 MiB.
|
|
|
|
// In order to safely stay under this max limit, we'll return 50k events per
|
|
|
|
// response. Each response has the index offset of the last entry. The index
|
|
|
|
// offset can be provided to the request to allow the caller to skip a series
|
|
|
|
// of records.
|
|
|
|
func (r *rpcServer) ForwardingHistory(ctx context.Context,
|
|
|
|
req *lnrpc.ForwardingHistoryRequest) (*lnrpc.ForwardingHistoryResponse, error) {
|
|
|
|
|
|
|
|
rpcsLog.Debugf("[forwardinghistory]")
|
|
|
|
|
|
|
|
// Before we perform the queries below, we'll instruct the switch to
|
|
|
|
// flush any pending events to disk. This ensure we get a complete
|
|
|
|
// snapshot at this particular time.
|
|
|
|
if err := r.server.htlcSwitch.FlushForwardingEvents(); err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to flush forwarding "+
|
|
|
|
"events: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
startTime, endTime time.Time
|
|
|
|
|
|
|
|
numEvents uint32
|
|
|
|
)
|
|
|
|
|
|
|
|
// If the start and end time were not set, then we'll just return the
|
|
|
|
// records over the past 24 hours.
|
|
|
|
if req.StartTime == 0 && req.EndTime == 0 {
|
|
|
|
now := time.Now()
|
|
|
|
startTime = now.Add(-time.Hour * 24)
|
|
|
|
endTime = now
|
|
|
|
} else {
|
|
|
|
startTime = time.Unix(int64(req.StartTime), 0)
|
|
|
|
endTime = time.Unix(int64(req.EndTime), 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the number of events wasn't specified, then we'll default to
|
|
|
|
// returning the last 100 events.
|
|
|
|
numEvents = req.NumMaxEvents
|
|
|
|
if numEvents == 0 {
|
|
|
|
numEvents = 100
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, we'll map the proto request into a format the is understood by
|
|
|
|
// the forwarding log.
|
|
|
|
eventQuery := channeldb.ForwardingEventQuery{
|
|
|
|
StartTime: startTime,
|
|
|
|
EndTime: endTime,
|
|
|
|
IndexOffset: req.IndexOffset,
|
|
|
|
NumMaxEvents: numEvents,
|
|
|
|
}
|
|
|
|
timeSlice, err := r.server.chanDB.ForwardingLog().Query(eventQuery)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to query forwarding log: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(roasbeef): add settlement latency?
|
|
|
|
// * use FPE on all records?
|
|
|
|
|
|
|
|
// With the events retrieved, we'll now map them into the proper proto
|
|
|
|
// response.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): show in ns for the outside?
|
|
|
|
resp := &lnrpc.ForwardingHistoryResponse{
|
|
|
|
ForwardingEvents: make([]*lnrpc.ForwardingEvent, len(timeSlice.ForwardingEvents)),
|
|
|
|
LastOffsetIndex: timeSlice.LastIndexOffset,
|
|
|
|
}
|
|
|
|
for i, event := range timeSlice.ForwardingEvents {
|
|
|
|
amtInSat := event.AmtIn.ToSatoshis()
|
|
|
|
amtOutSat := event.AmtOut.ToSatoshis()
|
|
|
|
|
|
|
|
resp.ForwardingEvents[i] = &lnrpc.ForwardingEvent{
|
|
|
|
Timestamp: uint64(event.Timestamp.Unix()),
|
|
|
|
ChanIdIn: event.IncomingChanID.ToUint64(),
|
|
|
|
ChanIdOut: event.OutgoingChanID.ToUint64(),
|
|
|
|
AmtIn: uint64(amtInSat),
|
|
|
|
AmtOut: uint64(amtOutSat),
|
|
|
|
Fee: uint64(amtInSat - amtOutSat),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp, nil
|
|
|
|
}
|