2019-03-15 12:30:47 +03:00
|
|
|
package wtclient
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net"
|
|
|
|
|
|
|
|
"github.com/btcsuite/btcd/btcec"
|
|
|
|
"github.com/lightningnetwork/lnd/brontide"
|
2019-04-24 06:03:15 +03:00
|
|
|
"github.com/lightningnetwork/lnd/keychain"
|
2019-03-15 12:30:47 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnwire"
|
|
|
|
"github.com/lightningnetwork/lnd/watchtower/wtdb"
|
|
|
|
"github.com/lightningnetwork/lnd/watchtower/wtserver"
|
|
|
|
)
|
|
|
|
|
|
|
|
// DB abstracts the required database operations required by the watchtower
|
|
|
|
// client.
|
|
|
|
type DB interface {
|
|
|
|
// CreateTower initialize an address record used to communicate with a
|
|
|
|
// watchtower. Each Tower is assigned a unique ID, that is used to
|
|
|
|
// amortize storage costs of the public key when used by multiple
|
|
|
|
// sessions.
|
|
|
|
CreateTower(*lnwire.NetAddress) (*wtdb.Tower, error)
|
|
|
|
|
2019-03-28 02:50:59 +03:00
|
|
|
// LoadTower retrieves a tower by its tower ID.
|
2019-05-24 06:47:22 +03:00
|
|
|
LoadTower(wtdb.TowerID) (*wtdb.Tower, error)
|
2019-03-28 02:50:59 +03:00
|
|
|
|
2019-04-24 06:04:40 +03:00
|
|
|
// NextSessionKeyIndex reserves a new session key derivation index for a
|
|
|
|
// particular tower id. The index is reserved for that tower until
|
|
|
|
// CreateClientSession is invoked for that tower and index, at which
|
|
|
|
// point a new index for that tower can be reserved. Multiple calls to
|
|
|
|
// this method before CreateClientSession is invoked should return the
|
|
|
|
// same index.
|
2019-05-24 06:47:22 +03:00
|
|
|
NextSessionKeyIndex(wtdb.TowerID) (uint32, error)
|
2019-04-24 06:04:40 +03:00
|
|
|
|
2019-03-15 12:30:47 +03:00
|
|
|
// CreateClientSession saves a newly negotiated client session to the
|
|
|
|
// client's database. This enables the session to be used across
|
|
|
|
// restarts.
|
|
|
|
CreateClientSession(*wtdb.ClientSession) error
|
|
|
|
|
|
|
|
// ListClientSessions returns all sessions that have not yet been
|
|
|
|
// exhausted. This is used on startup to find any sessions which may
|
|
|
|
// still be able to accept state updates.
|
|
|
|
ListClientSessions() (map[wtdb.SessionID]*wtdb.ClientSession, error)
|
|
|
|
|
2019-05-24 06:48:50 +03:00
|
|
|
// FetchChanSummaries loads a mapping from all registered channels to
|
|
|
|
// their channel summaries.
|
|
|
|
FetchChanSummaries() (wtdb.ChannelSummaries, error)
|
|
|
|
|
|
|
|
// RegisterChannel registers a channel for use within the client
|
|
|
|
// database. For now, all that is stored in the channel summary is the
|
|
|
|
// sweep pkscript that we'd like any tower sweeps to pay into. In the
|
|
|
|
// future, this will be extended to contain more info to allow the
|
|
|
|
// client efficiently request historical states to be backed up under
|
|
|
|
// the client's active policy.
|
|
|
|
RegisterChannel(lnwire.ChannelID, []byte) error
|
2019-03-15 12:30:47 +03:00
|
|
|
|
|
|
|
// MarkBackupIneligible records that the state identified by the
|
|
|
|
// (channel id, commit height) tuple was ineligible for being backed up
|
|
|
|
// under the current policy. This state can be retried later under a
|
|
|
|
// different policy.
|
|
|
|
MarkBackupIneligible(chanID lnwire.ChannelID, commitHeight uint64) error
|
|
|
|
|
|
|
|
// CommitUpdate writes the next state update for a particular
|
|
|
|
// session, so that we can be sure to resend it after a restart if it
|
|
|
|
// hasn't been ACK'd by the tower. The sequence number of the update
|
|
|
|
// should be exactly one greater than the existing entry, and less that
|
|
|
|
// or equal to the session's MaxUpdates.
|
2019-05-24 06:47:36 +03:00
|
|
|
CommitUpdate(id *wtdb.SessionID,
|
2019-03-15 12:30:47 +03:00
|
|
|
update *wtdb.CommittedUpdate) (uint16, error)
|
|
|
|
|
|
|
|
// AckUpdate records an acknowledgment from the watchtower that the
|
|
|
|
// update identified by seqNum was received and saved. The returned
|
|
|
|
// lastApplied will be recorded.
|
|
|
|
AckUpdate(id *wtdb.SessionID, seqNum, lastApplied uint16) error
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dial connects to an addr using the specified net and returns the connection
|
|
|
|
// object.
|
|
|
|
type Dial func(net, addr string) (net.Conn, error)
|
|
|
|
|
|
|
|
// AuthDialer connects to a remote node using an authenticated transport, such as
|
|
|
|
// brontide. The dialer argument is used to specify a resolver, which allows
|
|
|
|
// this method to be used over Tor or clear net connections.
|
|
|
|
type AuthDialer func(localPriv *btcec.PrivateKey, netAddr *lnwire.NetAddress,
|
|
|
|
dialer func(string, string) (net.Conn, error)) (wtserver.Peer, error)
|
|
|
|
|
|
|
|
// AuthDial is the watchtower client's default method of dialing.
|
|
|
|
func AuthDial(localPriv *btcec.PrivateKey, netAddr *lnwire.NetAddress,
|
|
|
|
dialer func(string, string) (net.Conn, error)) (wtserver.Peer, error) {
|
|
|
|
|
|
|
|
return brontide.Dial(localPriv, netAddr, dialer)
|
|
|
|
}
|
2019-04-24 06:03:15 +03:00
|
|
|
|
|
|
|
// SecretKeyRing abstracts the ability to derive HD private keys given a
|
|
|
|
// description of the derivation path.
|
|
|
|
type SecretKeyRing interface {
|
|
|
|
// DerivePrivKey derives the private key from the root seed using a
|
|
|
|
// key descriptor specifying the key's derivation path.
|
|
|
|
DerivePrivKey(loc keychain.KeyDescriptor) (*btcec.PrivateKey, error)
|
|
|
|
}
|