2017-05-01 20:03:41 +03:00
|
|
|
package htlcswitch
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2017-05-03 17:07:55 +03:00
|
|
|
"sync"
|
|
|
|
"sync/atomic"
|
2017-05-01 20:03:41 +03:00
|
|
|
"time"
|
|
|
|
|
2017-05-02 22:01:46 +03:00
|
|
|
"io"
|
|
|
|
|
2017-06-29 16:40:45 +03:00
|
|
|
"crypto/sha256"
|
|
|
|
|
|
|
|
"github.com/go-errors/errors"
|
2017-08-03 07:11:31 +03:00
|
|
|
"github.com/lightningnetwork/lnd/chainntnfs"
|
2017-05-01 20:03:41 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnwallet"
|
|
|
|
"github.com/lightningnetwork/lnd/lnwire"
|
|
|
|
"github.com/roasbeef/btcd/chaincfg/chainhash"
|
|
|
|
"github.com/roasbeef/btcd/wire"
|
|
|
|
"github.com/roasbeef/btcutil"
|
|
|
|
)
|
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
const (
|
|
|
|
// expiryGraceDelta is a grace period that the timeout of incoming
|
|
|
|
// HTLC's that pay directly to us (i.e we're the "exit node") must up
|
|
|
|
// hold. We'll reject any HTLC's who's timeout minus this value is less
|
|
|
|
// that or equal to the current block height. We require this in order
|
|
|
|
// to ensure that if the extending party goes to the chain, then we'll
|
|
|
|
// be able to claim the HTLC still.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): must be < default delta
|
|
|
|
expiryGraceDelta = 2
|
|
|
|
)
|
|
|
|
|
2017-06-17 00:30:55 +03:00
|
|
|
// ForwardingPolicy describes the set of constraints that a given ChannelLink
|
|
|
|
// is to adhere to when forwarding HTLC's. For each incoming HTLC, this set of
|
|
|
|
// constraints will be consulted in order to ensure that adequate fees are
|
|
|
|
// paid, and our time-lock parameters are respected. In the event that an
|
|
|
|
// incoming HTLC violates any of these constraints, it is to be _rejected_ with
|
|
|
|
// the error possibly carrying along a ChannelUpdate message that includes the
|
|
|
|
// latest policy.
|
|
|
|
type ForwardingPolicy struct {
|
|
|
|
// MinHTLC is the smallest HTLC that is to be forwarded.
|
2017-08-22 09:36:43 +03:00
|
|
|
MinHTLC lnwire.MilliSatoshi
|
2017-06-17 00:30:55 +03:00
|
|
|
|
|
|
|
// BaseFee is the base fee, expressed in milli-satoshi that must be
|
|
|
|
// paid for each incoming HTLC. This field, combined with FeeRate is
|
|
|
|
// used to compute the required fee for a given HTLC.
|
2017-08-22 09:36:43 +03:00
|
|
|
BaseFee lnwire.MilliSatoshi
|
2017-06-17 00:30:55 +03:00
|
|
|
|
|
|
|
// FeeRate is the fee rate, expressed in milli-satoshi that must be
|
|
|
|
// paid for each incoming HTLC. This field combined with BaseFee is
|
|
|
|
// used to compute the required fee for a given HTLC.
|
2017-08-22 09:36:43 +03:00
|
|
|
FeeRate lnwire.MilliSatoshi
|
2017-06-17 00:30:55 +03:00
|
|
|
|
|
|
|
// TimeLockDelta is the absolute time-lock value, expressed in blocks,
|
|
|
|
// that will be subtracted from an incoming HTLC's timelock value to
|
|
|
|
// create the time-lock value for the forwarded outgoing HTLC. The
|
|
|
|
// following constraint MUST hold for an HTLC to be forwarded:
|
|
|
|
//
|
|
|
|
// * incomingHtlc.timeLock - timeLockDelta = fwdInfo.OutgoingCTLV
|
|
|
|
//
|
|
|
|
// where fwdInfo is the forwarding information extracted from the
|
|
|
|
// per-hop payload of the incoming HTLC's onion packet.
|
|
|
|
TimeLockDelta uint32
|
|
|
|
|
|
|
|
// TODO(roasbeef): add fee module inside of switch
|
|
|
|
}
|
|
|
|
|
|
|
|
// ExpectedFee computes the expected fee for a given htlc amount. The value
|
|
|
|
// returned from this function is to be used as a sanity check when forwarding
|
|
|
|
// HTLC's to ensure that an incoming HTLC properly adheres to our propagated
|
|
|
|
// forwarding policy.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): also add in current available channel bandwidth, inverse
|
|
|
|
// func
|
2017-08-22 09:36:43 +03:00
|
|
|
func ExpectedFee(f ForwardingPolicy, htlcAmt lnwire.MilliSatoshi) lnwire.MilliSatoshi {
|
|
|
|
|
|
|
|
// TODO(roasbeef): write some basic table driven tests
|
2017-06-17 00:30:55 +03:00
|
|
|
return f.BaseFee + (htlcAmt*f.FeeRate)/1000000
|
|
|
|
}
|
|
|
|
|
2017-05-03 17:02:22 +03:00
|
|
|
// ChannelLinkConfig defines the configuration for the channel link. ALL
|
|
|
|
// elements within the configuration MUST be non-nil for channel link to carry
|
|
|
|
// out its duties.
|
|
|
|
type ChannelLinkConfig struct {
|
2017-06-17 00:30:55 +03:00
|
|
|
// FwrdingPolicy is the initial forwarding policy to be used when
|
|
|
|
// deciding whether to forwarding incoming HTLC's or not. This value
|
|
|
|
// can be updated with subsequent calls to UpdateForwardingPolicy
|
|
|
|
// targeted at a given ChannelLink concrete interface implementation.
|
|
|
|
FwrdingPolicy ForwardingPolicy
|
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
// Switch is a subsystem which is used to forward the incoming HTLC
|
2017-06-17 00:30:55 +03:00
|
|
|
// packets according to the encoded hop forwarding information
|
|
|
|
// contained in the forwarding blob within each HTLC.
|
2017-09-25 22:31:52 +03:00
|
|
|
//
|
|
|
|
// TODO(roasbeef): remove in favor of simple ForwardPacket closure func
|
2017-05-03 17:02:22 +03:00
|
|
|
Switch *Switch
|
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
// DecodeHopIterator function is responsible for decoding HTLC Sphinx
|
2017-07-15 06:08:29 +03:00
|
|
|
// onion blob, and creating hop iterator which will give us next
|
2017-08-03 07:10:35 +03:00
|
|
|
// destination of HTLC.
|
2017-06-29 16:40:45 +03:00
|
|
|
DecodeHopIterator func(r io.Reader, rHash []byte) (HopIterator, lnwire.FailCode)
|
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
// DecodeOnionObfuscator function is responsible for decoding HTLC
|
2017-07-15 06:08:29 +03:00
|
|
|
// Sphinx onion blob, and creating onion failure obfuscator.
|
2017-10-11 05:36:52 +03:00
|
|
|
DecodeOnionObfuscator func(r io.Reader) (ErrorEncrypter, lnwire.FailCode)
|
2017-06-29 16:40:45 +03:00
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
// GetLastChannelUpdate retrieves the latest routing policy for this
|
|
|
|
// particular channel. This will be used to provide payment senders our
|
|
|
|
// latest policy when sending encrypted error messages.
|
2017-06-29 16:40:45 +03:00
|
|
|
GetLastChannelUpdate func() (*lnwire.ChannelUpdate, error)
|
2017-05-02 22:01:46 +03:00
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// Peer is a lightning network node with which we have the channel link
|
|
|
|
// opened.
|
2017-05-03 17:02:22 +03:00
|
|
|
Peer Peer
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// Registry is a sub-system which responsible for managing the invoices
|
|
|
|
// in thread-safe manner.
|
2017-05-03 17:02:22 +03:00
|
|
|
Registry InvoiceDatabase
|
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
// BlockEpochs is an active block epoch event stream backed by an
|
|
|
|
// active ChainNotifier instance. The ChannelLink will use new block
|
|
|
|
// notifications sent over this channel to decide when a _new_ HTLC is
|
|
|
|
// too close to expiry, and also when any active HTLC's have expired
|
|
|
|
// (or are close to expiry).
|
|
|
|
BlockEpochs *chainntnfs.BlockEpochEvent
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// SettledContracts is used to notify that a channel has peacefully
|
|
|
|
// been closed. Once a channel has been closed the other subsystem no
|
|
|
|
// longer needs to watch for breach closes.
|
2017-05-03 17:02:22 +03:00
|
|
|
SettledContracts chan *wire.OutPoint
|
|
|
|
|
|
|
|
// DebugHTLC should be turned on if you want all HTLCs sent to a node
|
|
|
|
// with the debug htlc R-Hash are immediately settled in the next
|
|
|
|
// available state transition.
|
|
|
|
DebugHTLC bool
|
2017-09-01 04:30:11 +03:00
|
|
|
|
|
|
|
// HodlHTLC should be active if you want this node to refrain from
|
|
|
|
// settling all incoming HTLCs with the sender if it finds itself to be
|
|
|
|
// the exit node.
|
|
|
|
// NOTE: HodlHTLC should be active in conjunction with DebugHTLC.
|
|
|
|
HodlHTLC bool
|
2017-07-09 02:30:20 +03:00
|
|
|
|
|
|
|
// SyncStates is used to indicate that we need send the channel
|
|
|
|
// reestablishment message to the remote peer. It should be done if our
|
|
|
|
// clients have been restarted, or remote peer have been reconnected.
|
|
|
|
SyncStates bool
|
2017-05-03 17:02:22 +03:00
|
|
|
}
|
|
|
|
|
2017-05-03 17:07:55 +03:00
|
|
|
// channelLink is the service which drives a channel's commitment update
|
|
|
|
// state-machine. In the event that an htlc needs to be propagated to another
|
2017-06-17 00:30:55 +03:00
|
|
|
// link, the forward handler from config is used which sends htlc to the
|
2017-05-03 17:07:55 +03:00
|
|
|
// switch. Additionally, the link encapsulate logic of commitment protocol
|
|
|
|
// message ordering and updates.
|
|
|
|
type channelLink struct {
|
2017-06-17 00:58:02 +03:00
|
|
|
// The following fields are only meant to be used *atomically*
|
|
|
|
started int32
|
|
|
|
shutdown int32
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// batchCounter is the number of updates which we received from remote
|
|
|
|
// side, but not include in commitment transaction yet and plus the
|
|
|
|
// current number of settles that have been sent, but not yet committed
|
|
|
|
// to the commitment.
|
|
|
|
//
|
2017-05-02 00:06:10 +03:00
|
|
|
// TODO(andrew.shvv) remove after we add additional
|
|
|
|
// BatchNumber() method in state machine.
|
2017-05-31 15:44:42 +03:00
|
|
|
batchCounter uint32
|
2017-05-01 20:03:41 +03:00
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
// bestHeight is the best known height of the main chain. The link will
|
|
|
|
// use this information to govern decisions based on HTLC timeouts.
|
|
|
|
bestHeight uint32
|
|
|
|
|
2017-05-02 00:06:10 +03:00
|
|
|
// channel is a lightning network channel to which we apply htlc
|
|
|
|
// updates.
|
|
|
|
channel *lnwallet.LightningChannel
|
2017-05-03 17:02:22 +03:00
|
|
|
|
|
|
|
// cfg is a structure which carries all dependable fields/handlers
|
|
|
|
// which may affect behaviour of the service.
|
2017-06-17 00:58:02 +03:00
|
|
|
cfg ChannelLinkConfig
|
2017-05-03 17:07:55 +03:00
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// overflowQueue is used to store the htlc add updates which haven't
|
|
|
|
// been processed because of the commitment transaction overflow.
|
|
|
|
overflowQueue *packetQueue
|
2017-05-24 18:27:39 +03:00
|
|
|
|
2017-11-11 01:48:23 +03:00
|
|
|
// mailBox is the main interface between the outside world and the
|
|
|
|
// link. All incoming messages will be sent over this mailBox. Messages
|
|
|
|
// include new updates from our connected peer, and new packets to be
|
|
|
|
// forwarded sent by the switch.
|
|
|
|
mailBox *memoryMailBox
|
2017-09-25 22:31:52 +03:00
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// upstream is a channel that new messages sent from the remote peer to
|
|
|
|
// the local peer will be sent across.
|
2017-05-03 17:07:55 +03:00
|
|
|
upstream chan lnwire.Message
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// downstream is a channel in which new multi-hop HTLC's to be
|
|
|
|
// forwarded will be sent across. Messages from this channel are sent
|
|
|
|
// by the HTLC switch.
|
2017-05-03 17:07:55 +03:00
|
|
|
downstream chan *htlcPacket
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// linkControl is a channel which is used to query the state of the
|
|
|
|
// link, or update various policies used which govern if an HTLC is to
|
|
|
|
// be forwarded and/or accepted.
|
|
|
|
linkControl chan interface{}
|
2017-05-03 17:07:55 +03:00
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// logCommitTimer is a timer which is sent upon if we go an interval
|
|
|
|
// without receiving/sending a commitment update. It's role is to
|
|
|
|
// ensure both chains converge to identical state in a timely manner.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): timer should be >> then RTT
|
|
|
|
logCommitTimer *time.Timer
|
|
|
|
logCommitTick <-chan time.Time
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
wg sync.WaitGroup
|
|
|
|
quit chan struct{}
|
2017-05-03 17:07:55 +03:00
|
|
|
}
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// NewChannelLink creates a new instance of a ChannelLink given a configuration
|
|
|
|
// and active channel that will be used to verify/apply updates to.
|
2017-08-03 07:10:35 +03:00
|
|
|
func NewChannelLink(cfg ChannelLinkConfig, channel *lnwallet.LightningChannel,
|
|
|
|
currentHeight uint32) ChannelLink {
|
2017-05-02 00:06:10 +03:00
|
|
|
|
2017-11-11 01:48:23 +03:00
|
|
|
link := &channelLink{
|
2017-07-09 02:38:50 +03:00
|
|
|
cfg: cfg,
|
|
|
|
channel: channel,
|
2017-11-11 01:48:23 +03:00
|
|
|
mailBox: newMemoryMailBox(),
|
2017-07-09 02:38:50 +03:00
|
|
|
linkControl: make(chan interface{}),
|
2017-09-25 22:31:52 +03:00
|
|
|
// TODO(roasbeef): just do reserve here?
|
2017-11-11 01:48:23 +03:00
|
|
|
logCommitTimer: time.NewTimer(300 * time.Millisecond),
|
|
|
|
overflowQueue: newPacketQueue(lnwallet.MaxHTLCNumber / 2),
|
|
|
|
bestHeight: currentHeight,
|
|
|
|
quit: make(chan struct{}),
|
2017-05-02 00:06:10 +03:00
|
|
|
}
|
2017-11-11 01:48:23 +03:00
|
|
|
|
|
|
|
link.upstream = link.mailBox.MessageOutBox()
|
|
|
|
link.downstream = link.mailBox.PacketOutBox()
|
|
|
|
|
|
|
|
return link
|
2017-05-02 00:06:10 +03:00
|
|
|
}
|
|
|
|
|
2017-05-03 17:07:55 +03:00
|
|
|
// A compile time check to ensure channelLink implements the ChannelLink
|
|
|
|
// interface.
|
|
|
|
var _ ChannelLink = (*channelLink)(nil)
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// Start starts all helper goroutines required for the operation of the channel
|
|
|
|
// link.
|
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) Start() error {
|
|
|
|
if !atomic.CompareAndSwapInt32(&l.started, 0, 1) {
|
2017-07-09 02:30:20 +03:00
|
|
|
err := errors.Errorf("channel link(%v): already started", l)
|
|
|
|
log.Warn(err)
|
|
|
|
return err
|
2017-05-03 17:07:55 +03:00
|
|
|
}
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
log.Infof("ChannelLink(%v) is starting", l)
|
2017-05-03 17:07:55 +03:00
|
|
|
|
2017-11-11 01:52:27 +03:00
|
|
|
l.mailBox.Start()
|
2017-09-23 01:54:10 +03:00
|
|
|
l.overflowQueue.Start()
|
|
|
|
|
2017-05-03 17:07:55 +03:00
|
|
|
l.wg.Add(1)
|
2017-06-17 00:58:02 +03:00
|
|
|
go l.htlcManager()
|
2017-05-03 17:07:55 +03:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stop gracefully stops all active helper goroutines, then waits until they've
|
|
|
|
// exited.
|
2017-06-01 02:43:37 +03:00
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) Stop() {
|
|
|
|
if !atomic.CompareAndSwapInt32(&l.shutdown, 0, 1) {
|
|
|
|
log.Warnf("channel link(%v): already stopped", l)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
log.Infof("ChannelLink(%v) is stopping", l)
|
2017-05-03 17:07:55 +03:00
|
|
|
|
2017-09-23 01:56:06 +03:00
|
|
|
l.channel.Stop()
|
|
|
|
|
2017-11-11 01:52:27 +03:00
|
|
|
l.mailBox.Stop()
|
2017-09-23 01:54:10 +03:00
|
|
|
l.overflowQueue.Stop()
|
|
|
|
|
2017-05-03 17:07:55 +03:00
|
|
|
close(l.quit)
|
|
|
|
l.wg.Wait()
|
2017-08-03 07:10:35 +03:00
|
|
|
|
|
|
|
l.cfg.BlockEpochs.Cancel()
|
2017-05-01 20:03:41 +03:00
|
|
|
}
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// htlcManager is the primary goroutine which drives a channel's commitment
|
2017-05-01 20:03:41 +03:00
|
|
|
// update state-machine in response to messages received via several channels.
|
2017-05-04 00:03:47 +03:00
|
|
|
// This goroutine reads messages from the upstream (remote) peer, and also from
|
|
|
|
// downstream channel managed by the channel link. In the event that an htlc
|
|
|
|
// needs to be forwarded, then send-only forward handler is used which sends
|
|
|
|
// htlc packets to the switch. Additionally, the this goroutine handles acting
|
|
|
|
// upon all timeouts for any active HTLCs, manages the channel's revocation
|
|
|
|
// window, and also the htlc trickle queue+timer for this active channels.
|
2017-06-01 02:43:37 +03:00
|
|
|
//
|
|
|
|
// NOTE: This MUST be run as a goroutine.
|
2017-06-17 00:58:02 +03:00
|
|
|
func (l *channelLink) htlcManager() {
|
2017-11-11 06:37:47 +03:00
|
|
|
defer func() {
|
|
|
|
l.wg.Done()
|
|
|
|
log.Infof("ChannelLink(%v) has exited", l)
|
|
|
|
}()
|
2017-05-04 00:03:47 +03:00
|
|
|
|
|
|
|
log.Infof("HTLC manager for ChannelPoint(%v) started, "+
|
2017-09-25 22:31:52 +03:00
|
|
|
"bandwidth=%v", l.channel.ChannelPoint(), l.Bandwidth())
|
2017-05-01 20:03:41 +03:00
|
|
|
|
2017-11-11 01:57:59 +03:00
|
|
|
// TODO(roasbeef): need to call wipe chan whenever D/C?
|
|
|
|
|
|
|
|
// If this isn't the first time that this channel link has been
|
|
|
|
// created, then we'll need to check to see if we need to
|
|
|
|
// re-synchronize state with the remote peer.
|
2017-07-09 02:30:20 +03:00
|
|
|
if l.cfg.SyncStates {
|
2017-11-11 01:57:59 +03:00
|
|
|
log.Infof("Attempting to re-resynchronize ChannelPoint(%v)",
|
|
|
|
l.channel.ChannelPoint())
|
|
|
|
|
|
|
|
// First, we'll generate our ChanSync message to send to the
|
|
|
|
// other side. Based on this message, the remote party will
|
|
|
|
// decide if they need to retransmit any data or not.
|
2017-11-14 09:51:16 +03:00
|
|
|
localChanSyncMsg, err := l.channel.ChanSyncMsg()
|
|
|
|
if err != nil {
|
|
|
|
l.fail("unable to generate chan sync message for "+
|
|
|
|
"ChannelPoint(%v)", l.channel.ChannelPoint())
|
|
|
|
return
|
|
|
|
}
|
2017-11-11 01:57:59 +03:00
|
|
|
if err := l.cfg.Peer.SendMessage(localChanSyncMsg); err != nil {
|
|
|
|
l.fail("Unable to send chan sync message for "+
|
|
|
|
"ChannelPoint(%v)", l.channel.ChannelPoint())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, we'll wait to receive the ChanSync message with a
|
|
|
|
// timeout period. The first message sent MUST be the ChanSync
|
|
|
|
// message, otherwise, we'll terminate the connection.
|
|
|
|
chanSyncDeadline := time.After(time.Second * 30)
|
|
|
|
select {
|
|
|
|
case msg := <-l.upstream:
|
|
|
|
remoteChanSyncMsg, ok := msg.(*lnwire.ChannelReestablish)
|
|
|
|
if !ok {
|
|
|
|
l.fail("first message sent to sync should be "+
|
|
|
|
"ChannelReestablish, instead "+
|
|
|
|
"received: %T", msg)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the remote party indicates that they think we
|
|
|
|
// haven't done any state updates yet, then we'll
|
|
|
|
// retransmit the funding locked message first. We do
|
|
|
|
// this, as at this point we can't be sure if they've
|
|
|
|
// really received the FundingLocked message.
|
|
|
|
if remoteChanSyncMsg.NextLocalCommitHeight == 1 &&
|
|
|
|
localChanSyncMsg.NextLocalCommitHeight == 1 {
|
|
|
|
|
|
|
|
log.Debugf("Resending fundingLocked message " +
|
|
|
|
"to peer")
|
|
|
|
|
|
|
|
nextRevocation, err := l.channel.NextRevocationKey()
|
|
|
|
if err != nil {
|
|
|
|
l.fail("unable to create next "+
|
|
|
|
"revocation: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
fundingLockedMsg := lnwire.NewFundingLocked(
|
|
|
|
l.ChanID(), nextRevocation,
|
|
|
|
)
|
|
|
|
err = l.cfg.Peer.SendMessage(fundingLockedMsg)
|
|
|
|
if err != nil {
|
|
|
|
l.fail("unable to re-send "+
|
|
|
|
"FundingLocked: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// In any case, we'll then process their ChanSync
|
|
|
|
// message.
|
|
|
|
l.handleUpstreamMsg(msg)
|
2017-11-11 06:37:47 +03:00
|
|
|
case <-l.quit:
|
|
|
|
return
|
2017-11-11 01:57:59 +03:00
|
|
|
case <-chanSyncDeadline:
|
|
|
|
l.fail("didn't receive ChannelReestablish before " +
|
|
|
|
"deadline")
|
2017-07-09 02:30:20 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-01 20:03:41 +03:00
|
|
|
// TODO(roasbeef): check to see if able to settle any currently pending
|
|
|
|
// HTLCs
|
|
|
|
// * also need signals when new invoices are added by the
|
|
|
|
// invoiceRegistry
|
|
|
|
|
|
|
|
batchTimer := time.NewTicker(50 * time.Millisecond)
|
|
|
|
defer batchTimer.Stop()
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// TODO(roasbeef): fail chan in case of protocol violation
|
2017-05-01 20:03:41 +03:00
|
|
|
out:
|
|
|
|
for {
|
|
|
|
select {
|
2017-08-03 07:10:35 +03:00
|
|
|
// A new block has arrived, we'll examine all the active HTLC's
|
|
|
|
// to see if any of them have expired, and also update our
|
|
|
|
// track of the best current height.
|
|
|
|
case blockEpoch, ok := <-l.cfg.BlockEpochs.Epochs:
|
|
|
|
if !ok {
|
|
|
|
break out
|
|
|
|
}
|
|
|
|
|
2017-10-05 05:24:27 +03:00
|
|
|
log.Tracef("ChannelPoint(%v): new block(height=%v, "+
|
2017-08-16 03:55:01 +03:00
|
|
|
"hash=%v) examining active HTLC's",
|
|
|
|
l.channel.ChannelPoint(), blockEpoch.Height,
|
2017-08-03 07:10:35 +03:00
|
|
|
blockEpoch.Hash)
|
|
|
|
|
|
|
|
// TODO(roasbeef): check HTLC's for expiry
|
|
|
|
l.bestHeight = uint32(blockEpoch.Height)
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// The underlying channel has notified us of a unilateral close
|
|
|
|
// carried out by the remote peer. In the case of such an
|
|
|
|
// event, we'll wipe the channel state from the peer, and mark
|
|
|
|
// the contract as fully settled. Afterwards we can exit.
|
2017-05-04 00:03:47 +03:00
|
|
|
case <-l.channel.UnilateralCloseSignal:
|
|
|
|
log.Warnf("Remote peer has closed ChannelPoint(%v) on-chain",
|
|
|
|
l.channel.ChannelPoint())
|
2017-05-01 20:03:41 +03:00
|
|
|
|
2017-11-11 01:57:59 +03:00
|
|
|
// TODO(roasbeef): remove all together
|
2017-07-09 02:20:56 +03:00
|
|
|
go func() {
|
|
|
|
if err := l.cfg.Peer.WipeChannel(l.channel); err != nil {
|
|
|
|
log.Errorf("unable to wipe channel %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(roasbeef): need to send HTLC outputs to nursery
|
|
|
|
// TODO(roasbeef): or let the arb sweep?
|
|
|
|
l.cfg.SettledContracts <- l.channel.ChannelPoint()
|
|
|
|
}()
|
2017-06-17 00:58:02 +03:00
|
|
|
|
2017-05-01 20:03:41 +03:00
|
|
|
break out
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// A local sub-system has initiated a force close of the active
|
|
|
|
// channel. In this case we can exit immediately as no further
|
|
|
|
// updates should be processed for the channel.
|
2017-05-04 00:03:47 +03:00
|
|
|
case <-l.channel.ForceCloseSignal:
|
2017-05-01 20:03:41 +03:00
|
|
|
// TODO(roasbeef): path never taken now that server
|
|
|
|
// force closes's directly?
|
2017-05-04 00:03:47 +03:00
|
|
|
log.Warnf("ChannelPoint(%v) has been force "+
|
2017-06-17 00:58:02 +03:00
|
|
|
"closed, disconnecting from peer(%x)",
|
|
|
|
l.channel.ChannelPoint(), l.cfg.Peer.PubKey())
|
2017-05-01 20:03:41 +03:00
|
|
|
break out
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
case <-l.logCommitTick:
|
2017-05-01 20:03:41 +03:00
|
|
|
// If we haven't sent or received a new commitment
|
|
|
|
// update in some time, check to see if we have any
|
|
|
|
// pending updates we need to commit due to our
|
|
|
|
// commitment chains being desynchronized.
|
2017-05-02 00:06:10 +03:00
|
|
|
if l.channel.FullySynced() {
|
2017-05-01 20:03:41 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-05-04 00:03:47 +03:00
|
|
|
if err := l.updateCommitTx(); err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to update commitment: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
break out
|
|
|
|
}
|
|
|
|
|
|
|
|
case <-batchTimer.C:
|
|
|
|
// If the current batch is empty, then we have no work
|
|
|
|
// here.
|
2017-05-02 00:06:10 +03:00
|
|
|
if l.batchCounter == 0 {
|
2017-05-01 20:03:41 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, attempt to extend the remote commitment
|
|
|
|
// chain including all the currently pending entries.
|
|
|
|
// If the send was unsuccessful, then abandon the
|
|
|
|
// update, waiting for the revocation window to open
|
|
|
|
// up.
|
2017-05-04 00:03:47 +03:00
|
|
|
if err := l.updateCommitTx(); err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to update commitment: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
break out
|
|
|
|
}
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// A packet that previously overflowed the commitment
|
|
|
|
// transaction is now eligible for processing once again. So
|
|
|
|
// we'll attempt to re-process the packet in order to allow it
|
|
|
|
// to continue propagating within the network.
|
2017-09-23 01:54:10 +03:00
|
|
|
case packet := <-l.overflowQueue.outgoingPkts:
|
2017-05-24 18:27:39 +03:00
|
|
|
msg := packet.htlc.(*lnwire.UpdateAddHTLC)
|
2017-06-01 02:43:37 +03:00
|
|
|
log.Tracef("Reprocessing downstream add update "+
|
2017-08-03 07:10:35 +03:00
|
|
|
"with payment hash(%x)", msg.PaymentHash[:])
|
2017-06-01 02:43:37 +03:00
|
|
|
|
2017-09-25 22:31:52 +03:00
|
|
|
l.handleDownStreamPkt(packet, true)
|
2017-05-24 18:27:39 +03:00
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// A message from the switch was just received. This indicates
|
|
|
|
// that the link is an intermediate hop in a multi-hop HTLC
|
|
|
|
// circuit.
|
2017-05-04 00:03:47 +03:00
|
|
|
case pkt := <-l.downstream:
|
2017-06-17 00:58:02 +03:00
|
|
|
// If we have non empty processing queue then we'll add
|
|
|
|
// this to the overflow rather than processing it
|
|
|
|
// directly. Once an active HTLC is either settled or
|
|
|
|
// failed, then we'll free up a new slot.
|
2017-05-24 18:27:39 +03:00
|
|
|
htlc, ok := pkt.htlc.(*lnwire.UpdateAddHTLC)
|
2017-09-23 01:54:10 +03:00
|
|
|
if ok && l.overflowQueue.Length() != 0 {
|
2017-05-24 18:27:39 +03:00
|
|
|
log.Infof("Downstream htlc add update with "+
|
2017-06-17 00:58:02 +03:00
|
|
|
"payment hash(%x) have been added to "+
|
2017-09-25 22:31:52 +03:00
|
|
|
"reprocessing queue, batch_size=%v",
|
2017-06-17 00:58:02 +03:00
|
|
|
htlc.PaymentHash[:],
|
2017-05-24 18:27:39 +03:00
|
|
|
l.batchCounter)
|
|
|
|
|
2017-09-23 01:54:10 +03:00
|
|
|
l.overflowQueue.AddPkt(pkt)
|
2017-05-24 18:27:39 +03:00
|
|
|
continue
|
|
|
|
}
|
2017-09-25 22:31:52 +03:00
|
|
|
l.handleDownStreamPkt(pkt, false)
|
2017-05-01 20:03:41 +03:00
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// A message from the connected peer was just received. This
|
|
|
|
// indicates that we have a new incoming HTLC, either directly
|
|
|
|
// for us, or part of a multi-hop HTLC circuit.
|
2017-05-04 00:03:47 +03:00
|
|
|
case msg := <-l.upstream:
|
|
|
|
l.handleUpstreamMsg(msg)
|
|
|
|
|
2017-11-11 01:57:59 +03:00
|
|
|
// TODO(roasbeef): make distinct goroutine to handle?
|
2017-06-17 00:58:02 +03:00
|
|
|
case cmd := <-l.linkControl:
|
2017-07-09 02:30:20 +03:00
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
switch req := cmd.(type) {
|
|
|
|
case *policyUpdate:
|
2017-08-22 09:50:12 +03:00
|
|
|
// In order to avoid overriding a valid policy
|
|
|
|
// with a "null" field in the new policy, we'll
|
|
|
|
// only update to the set sub policy if the new
|
|
|
|
// value isn't uninitialized.
|
|
|
|
if req.policy.MinHTLC != 0 {
|
|
|
|
l.cfg.FwrdingPolicy.MinHTLC = req.policy.MinHTLC
|
|
|
|
}
|
|
|
|
if req.policy.BaseFee != 0 {
|
|
|
|
l.cfg.FwrdingPolicy.BaseFee = req.policy.BaseFee
|
|
|
|
}
|
|
|
|
if req.policy.FeeRate != 0 {
|
|
|
|
l.cfg.FwrdingPolicy.FeeRate = req.policy.FeeRate
|
|
|
|
}
|
|
|
|
if req.policy.TimeLockDelta != 0 {
|
|
|
|
l.cfg.FwrdingPolicy.TimeLockDelta = req.policy.TimeLockDelta
|
|
|
|
}
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
if req.done != nil {
|
|
|
|
close(req.done)
|
|
|
|
}
|
2017-05-01 20:03:41 +03:00
|
|
|
}
|
|
|
|
|
2017-05-04 00:03:47 +03:00
|
|
|
case <-l.quit:
|
2017-05-01 20:03:41 +03:00
|
|
|
break out
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleDownStreamPkt processes an HTLC packet sent from the downstream HTLC
|
|
|
|
// Switch. Possible messages sent by the switch include requests to forward new
|
|
|
|
// HTLCs, timeout previously cleared HTLCs, and finally to settle currently
|
|
|
|
// cleared HTLCs with the upstream peer.
|
2017-09-26 02:09:48 +03:00
|
|
|
//
|
|
|
|
// TODO(roasbeef): add sync ntfn to ensure switch always has consistent view?
|
2017-09-25 22:31:52 +03:00
|
|
|
func (l *channelLink) handleDownStreamPkt(pkt *htlcPacket, isReProcess bool) {
|
2017-05-01 20:03:41 +03:00
|
|
|
var isSettle bool
|
2017-05-04 00:03:47 +03:00
|
|
|
switch htlc := pkt.htlc.(type) {
|
2017-05-01 20:03:41 +03:00
|
|
|
case *lnwire.UpdateAddHTLC:
|
2017-06-01 02:43:37 +03:00
|
|
|
// A new payment has been initiated via the downstream channel,
|
|
|
|
// so we add the new HTLC to our local log, then update the
|
|
|
|
// commitment chains.
|
2017-05-04 00:03:47 +03:00
|
|
|
htlc.ChanID = l.ChanID()
|
|
|
|
index, err := l.channel.AddHTLC(htlc)
|
2017-06-29 16:40:45 +03:00
|
|
|
if err != nil {
|
|
|
|
switch err {
|
2017-07-15 06:08:29 +03:00
|
|
|
|
|
|
|
// The channels spare bandwidth is fully allocated, so
|
|
|
|
// we'll put this HTLC into the overflow queue.
|
2017-06-29 16:40:45 +03:00
|
|
|
case lnwallet.ErrMaxHTLCNumber:
|
|
|
|
log.Infof("Downstream htlc add update with "+
|
|
|
|
"payment hash(%x) have been added to "+
|
|
|
|
"reprocessing queue, batch: %v",
|
|
|
|
htlc.PaymentHash[:],
|
|
|
|
l.batchCounter)
|
2017-09-25 22:31:52 +03:00
|
|
|
|
2017-09-23 01:54:10 +03:00
|
|
|
l.overflowQueue.AddPkt(pkt)
|
2017-06-29 16:40:45 +03:00
|
|
|
return
|
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// The HTLC was unable to be added to the state
|
|
|
|
// machine, as a result, we'll signal the switch to
|
|
|
|
// cancel the pending payment.
|
2017-06-29 16:40:45 +03:00
|
|
|
default:
|
|
|
|
var (
|
|
|
|
isObfuscated bool
|
|
|
|
reason lnwire.OpaqueReason
|
|
|
|
)
|
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// We'll parse the sphinx packet enclosed so we
|
|
|
|
// can obtain the shared secret required to
|
|
|
|
// encrypt the error back to the source.
|
2017-06-29 16:40:45 +03:00
|
|
|
failure := lnwire.NewTemporaryChannelFailure(nil)
|
|
|
|
onionReader := bytes.NewReader(htlc.OnionBlob[:])
|
|
|
|
obfuscator, failCode := l.cfg.DecodeOnionObfuscator(onionReader)
|
2017-07-15 06:08:29 +03:00
|
|
|
|
|
|
|
switch {
|
|
|
|
// If we were unable to parse the onion blob,
|
|
|
|
// then we'll send an error back to the source.
|
|
|
|
case failCode != lnwire.CodeNone:
|
2017-06-29 16:40:45 +03:00
|
|
|
var b bytes.Buffer
|
|
|
|
err := lnwire.EncodeFailure(&b, failure, 0)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable to encode failure: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
reason = lnwire.OpaqueReason(b.Bytes())
|
|
|
|
isObfuscated = false
|
2017-07-15 06:08:29 +03:00
|
|
|
|
|
|
|
// Otherwise, we'll send back a proper failure
|
|
|
|
// message.
|
|
|
|
default:
|
2017-10-11 05:36:52 +03:00
|
|
|
reason, err = obfuscator.EncryptFirstHop(failure)
|
2017-06-29 16:40:45 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable to obfuscate error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
isObfuscated = true
|
|
|
|
}
|
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
upddateFail := &lnwire.UpdateFailHTLC{
|
|
|
|
Reason: reason,
|
|
|
|
}
|
|
|
|
failPkt := newFailPacket(
|
|
|
|
l.ShortChanID(), upddateFail,
|
|
|
|
htlc.PaymentHash, htlc.Amount,
|
|
|
|
isObfuscated,
|
|
|
|
)
|
2017-06-29 16:40:45 +03:00
|
|
|
|
2017-10-03 08:09:40 +03:00
|
|
|
// TODO(roasbeef): need to identify if sent
|
|
|
|
// from switch so don't need to obfuscate
|
2017-07-15 06:08:29 +03:00
|
|
|
go l.cfg.Switch.forward(failPkt)
|
2017-06-29 16:40:45 +03:00
|
|
|
log.Infof("Unable to handle downstream add HTLC: %v", err)
|
|
|
|
return
|
|
|
|
}
|
2017-05-01 20:03:41 +03:00
|
|
|
}
|
2017-06-17 00:58:02 +03:00
|
|
|
|
|
|
|
log.Tracef("Received downstream htlc: payment_hash=%x, "+
|
|
|
|
"local_log_index=%v, batch_size=%v",
|
|
|
|
htlc.PaymentHash[:], index, l.batchCounter+1)
|
|
|
|
|
2017-05-04 00:03:47 +03:00
|
|
|
htlc.ID = index
|
|
|
|
l.cfg.Peer.SendMessage(htlc)
|
2017-05-01 20:03:41 +03:00
|
|
|
|
|
|
|
case *lnwire.UpdateFufillHTLC:
|
|
|
|
// An HTLC we forward to the switch has just settled somewhere
|
|
|
|
// upstream. Therefore we settle the HTLC within the our local
|
|
|
|
// state machine.
|
|
|
|
pre := htlc.PaymentPreimage
|
2017-11-11 01:52:27 +03:00
|
|
|
logIndex, _, err := l.channel.SettleHTLC(pre)
|
2017-05-01 20:03:41 +03:00
|
|
|
if err != nil {
|
|
|
|
// TODO(roasbeef): broadcast on-chain
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to settle incoming HTLC: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// With the HTLC settled, we'll need to populate the wire
|
|
|
|
// message to target the specific channel and HTLC to be
|
|
|
|
// cancelled.
|
2017-05-04 00:03:47 +03:00
|
|
|
htlc.ChanID = l.ChanID()
|
2017-05-01 20:03:41 +03:00
|
|
|
htlc.ID = logIndex
|
|
|
|
|
|
|
|
// Then we send the HTLC settle message to the connected peer
|
|
|
|
// so we can continue the propagation of the settle message.
|
2017-05-04 00:03:47 +03:00
|
|
|
l.cfg.Peer.SendMessage(htlc)
|
2017-05-01 20:03:41 +03:00
|
|
|
isSettle = true
|
|
|
|
|
|
|
|
case *lnwire.UpdateFailHTLC:
|
|
|
|
// An HTLC cancellation has been triggered somewhere upstream,
|
|
|
|
// we'll remove then HTLC from our local state machine.
|
2017-07-10 13:48:43 +03:00
|
|
|
logIndex, err := l.channel.FailHTLC(pkt.payHash, htlc.Reason)
|
2017-05-01 20:03:41 +03:00
|
|
|
if err != nil {
|
2017-05-04 00:03:47 +03:00
|
|
|
log.Errorf("unable to cancel HTLC: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// With the HTLC removed, we'll need to populate the wire
|
|
|
|
// message to target the specific channel and HTLC to be
|
|
|
|
// cancelled. The "Reason" field will have already been set
|
|
|
|
// within the switch.
|
2017-05-04 00:03:47 +03:00
|
|
|
htlc.ChanID = l.ChanID()
|
2017-05-01 20:03:41 +03:00
|
|
|
htlc.ID = logIndex
|
|
|
|
|
|
|
|
// Finally, we send the HTLC message to the peer which
|
|
|
|
// initially created the HTLC.
|
2017-05-04 00:03:47 +03:00
|
|
|
l.cfg.Peer.SendMessage(htlc)
|
2017-05-01 20:03:41 +03:00
|
|
|
isSettle = true
|
|
|
|
}
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
l.batchCounter++
|
|
|
|
|
2017-05-01 20:03:41 +03:00
|
|
|
// If this newly added update exceeds the min batch size for adds, or
|
|
|
|
// this is a settle request, then initiate an update.
|
2017-05-02 00:06:10 +03:00
|
|
|
if l.batchCounter >= 10 || isSettle {
|
2017-05-04 00:03:47 +03:00
|
|
|
if err := l.updateCommitTx(); err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to update commitment: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleUpstreamMsg processes wire messages related to commitment state
|
|
|
|
// updates from the upstream peer. The upstream peer is the peer whom we have a
|
|
|
|
// direct channel with, updating our respective commitment chains.
|
2017-05-04 00:03:47 +03:00
|
|
|
func (l *channelLink) handleUpstreamMsg(msg lnwire.Message) {
|
|
|
|
switch msg := msg.(type) {
|
2017-07-09 02:30:20 +03:00
|
|
|
case *lnwire.ChannelReestablish:
|
|
|
|
log.Infof("Received re-establishment message from remote side "+
|
|
|
|
"for channel(%v)", l.channel.ChannelPoint())
|
|
|
|
|
2017-11-11 01:57:59 +03:00
|
|
|
// We've just received a ChnSync message from the remote party,
|
|
|
|
// so we'll process the message in order to determine if we
|
|
|
|
// need to re-transmit any messages to the remote party.
|
|
|
|
msgsToReSend, err := l.channel.ProcessChanSyncMsg(msg)
|
2017-07-09 02:30:20 +03:00
|
|
|
if err != nil {
|
2017-11-14 09:51:16 +03:00
|
|
|
// TODO(roasbeef): check conrete type of error, act
|
|
|
|
// accordingly
|
2017-11-11 01:57:59 +03:00
|
|
|
l.fail("unable to handle upstream reestablish "+
|
2017-07-09 02:30:20 +03:00
|
|
|
"message: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-11-11 01:57:59 +03:00
|
|
|
if len(msgsToReSend) > 0 {
|
|
|
|
log.Infof("Sending %v updates to synchronize the "+
|
|
|
|
"state for ChannelPoint(%v)", len(msgsToReSend),
|
|
|
|
l.channel.ChannelPoint())
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we have any messages to retransmit, we'll do so
|
|
|
|
// immediately so we return to a synchronized state as soon as
|
|
|
|
// possible.
|
|
|
|
for _, msg := range msgsToReSend {
|
2017-07-09 02:30:20 +03:00
|
|
|
l.cfg.Peer.SendMessage(msg)
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
|
2017-05-01 20:03:41 +03:00
|
|
|
case *lnwire.UpdateAddHTLC:
|
|
|
|
// We just received an add request from an upstream peer, so we
|
|
|
|
// add it to our state machine, then add the HTLC to our
|
2017-06-01 02:43:37 +03:00
|
|
|
// "settle" list in the event that we know the preimage.
|
2017-05-04 00:03:47 +03:00
|
|
|
index, err := l.channel.ReceiveHTLC(msg)
|
2017-05-01 20:03:41 +03:00
|
|
|
if err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to handle upstream add HTLC: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
2017-11-11 01:57:59 +03:00
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
log.Tracef("Receive upstream htlc with payment hash(%x), "+
|
|
|
|
"assigning index: %v", msg.PaymentHash[:], index)
|
2017-05-01 20:03:41 +03:00
|
|
|
|
|
|
|
case *lnwire.UpdateFufillHTLC:
|
2017-05-04 00:03:47 +03:00
|
|
|
pre := msg.PaymentPreimage
|
|
|
|
idx := msg.ID
|
|
|
|
if err := l.channel.ReceiveHTLCSettle(pre, idx); err != nil {
|
2017-05-01 20:03:41 +03:00
|
|
|
// TODO(roasbeef): broadcast on-chain
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to handle upstream settle HTLC: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(roasbeef): add preimage to DB in order to swipe
|
|
|
|
// repeated r-values
|
2017-06-29 16:40:45 +03:00
|
|
|
|
|
|
|
case *lnwire.UpdateFailMalformedHTLC:
|
2017-07-15 06:08:29 +03:00
|
|
|
// Convert the failure type encoded within the HTLC fail
|
|
|
|
// message to the proper generic lnwire error code.
|
2017-06-29 16:40:45 +03:00
|
|
|
var failure lnwire.FailureMessage
|
|
|
|
switch msg.FailureCode {
|
|
|
|
case lnwire.CodeInvalidOnionVersion:
|
|
|
|
failure = &lnwire.FailInvalidOnionVersion{
|
|
|
|
OnionSHA256: msg.ShaOnionBlob,
|
|
|
|
}
|
|
|
|
case lnwire.CodeInvalidOnionHmac:
|
|
|
|
failure = &lnwire.FailInvalidOnionHmac{
|
|
|
|
OnionSHA256: msg.ShaOnionBlob,
|
|
|
|
}
|
|
|
|
|
|
|
|
case lnwire.CodeInvalidOnionKey:
|
|
|
|
failure = &lnwire.FailInvalidOnionKey{
|
|
|
|
OnionSHA256: msg.ShaOnionBlob,
|
|
|
|
}
|
|
|
|
default:
|
2017-07-15 06:08:29 +03:00
|
|
|
// TODO(roasbeef): fail channel here?
|
2017-06-29 16:40:45 +03:00
|
|
|
log.Errorf("unable to understand code of received " +
|
|
|
|
"malformed error")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// With the error parsed, we'll convert the into it's opaque
|
|
|
|
// form.
|
2017-06-29 16:40:45 +03:00
|
|
|
var b bytes.Buffer
|
|
|
|
if err := lnwire.EncodeFailure(&b, failure, 0); err != nil {
|
|
|
|
log.Errorf("unable to encode malformed error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-10 13:48:43 +03:00
|
|
|
// If remote side have been unable to parse the onion blob we
|
|
|
|
// have sent to it, than we should transform the malformed HTLC
|
|
|
|
// message to the usual HTLC fail message.
|
2017-11-11 01:52:27 +03:00
|
|
|
_, err := l.channel.ReceiveFailHTLC(msg.ID, b.Bytes())
|
2017-07-10 13:48:43 +03:00
|
|
|
if err != nil {
|
|
|
|
l.fail("unable to handle upstream fail HTLC: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-05-01 20:03:41 +03:00
|
|
|
case *lnwire.UpdateFailHTLC:
|
2017-05-04 00:03:47 +03:00
|
|
|
idx := msg.ID
|
2017-11-11 01:52:27 +03:00
|
|
|
_, err := l.channel.ReceiveFailHTLC(idx, msg.Reason[:])
|
2017-09-25 22:31:52 +03:00
|
|
|
if err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to handle upstream fail HTLC: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
case *lnwire.CommitSig:
|
2017-07-09 02:30:20 +03:00
|
|
|
// We just received a new updates to our local commitment chain,
|
2017-05-01 20:03:41 +03:00
|
|
|
// validate this new commitment, closing the link if invalid.
|
2017-07-31 00:08:25 +03:00
|
|
|
err := l.channel.ReceiveNewCommitment(msg.CommitSig, msg.HtlcSigs)
|
|
|
|
if err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to accept new commitment: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// As we've just just accepted a new state, we'll now
|
|
|
|
// immediately send the remote peer a revocation for our prior
|
|
|
|
// state.
|
2017-05-04 00:03:47 +03:00
|
|
|
nextRevocation, err := l.channel.RevokeCurrentCommitment()
|
2017-05-01 20:03:41 +03:00
|
|
|
if err != nil {
|
2017-05-04 00:03:47 +03:00
|
|
|
log.Errorf("unable to revoke commitment: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
2017-05-04 00:03:47 +03:00
|
|
|
l.cfg.Peer.SendMessage(nextRevocation)
|
2017-05-01 20:03:41 +03:00
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// As we've just received a commitment signature, we'll
|
|
|
|
// re-start the log commit timer to wake up the main processing
|
|
|
|
// loop to check if we need to send a commitment signature as
|
|
|
|
// we owe one.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): instead after revocation?
|
|
|
|
if !l.logCommitTimer.Stop() {
|
|
|
|
select {
|
|
|
|
case <-l.logCommitTimer.C:
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
l.logCommitTimer.Reset(300 * time.Millisecond)
|
|
|
|
l.logCommitTick = l.logCommitTimer.C
|
|
|
|
|
2017-05-01 20:03:41 +03:00
|
|
|
// If both commitment chains are fully synced from our PoV,
|
|
|
|
// then we don't need to reply with a signature as both sides
|
2017-05-04 00:03:47 +03:00
|
|
|
// already have a commitment with the latest accepted l.
|
|
|
|
if l.channel.FullySynced() {
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, the remote party initiated the state transition,
|
|
|
|
// so we'll reply with a signature to provide them with their
|
2017-11-11 01:57:59 +03:00
|
|
|
// version of the latest commitment.
|
2017-05-04 00:03:47 +03:00
|
|
|
if err := l.updateCommitTx(); err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to update commitment: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
case *lnwire.RevokeAndAck:
|
|
|
|
// We've received a revocation from the remote chain, if valid,
|
|
|
|
// this moves the remote chain forward, and expands our
|
|
|
|
// revocation window.
|
2017-05-03 18:57:13 +03:00
|
|
|
htlcs, err := l.channel.ReceiveRevocation(msg)
|
2017-05-01 20:03:41 +03:00
|
|
|
if err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to accept revocation: %v", err)
|
2017-05-01 20:03:41 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// After we treat HTLCs as included in both remote/local
|
|
|
|
// commitment transactions they might be safely propagated over
|
|
|
|
// htlc switch or settled if our node was last node in htlc
|
|
|
|
// path.
|
2017-05-03 18:57:13 +03:00
|
|
|
htlcsToForward := l.processLockedInHtlcs(htlcs)
|
2017-05-01 20:03:41 +03:00
|
|
|
go func() {
|
2017-07-31 03:42:57 +03:00
|
|
|
log.Debugf("ChannelPoint(%v) forwarding %v HTLC's",
|
|
|
|
l.channel.ChannelPoint(), len(htlcsToForward))
|
2017-05-03 18:57:13 +03:00
|
|
|
for _, packet := range htlcsToForward {
|
|
|
|
if err := l.cfg.Switch.forward(packet); err != nil {
|
|
|
|
log.Errorf("channel link(%v): "+
|
|
|
|
"unhandled error while forwarding "+
|
|
|
|
"htlc packet over htlc "+
|
|
|
|
"switch: %v", l, err)
|
2017-05-01 20:03:41 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
2017-08-15 20:09:16 +03:00
|
|
|
|
2017-07-14 21:40:42 +03:00
|
|
|
case *lnwire.UpdateFee:
|
2017-11-11 01:57:59 +03:00
|
|
|
// We received fee update from peer. If we are the initiator we
|
2017-08-03 07:10:35 +03:00
|
|
|
// will fail the channel, if not we will apply the update.
|
2017-07-14 21:40:42 +03:00
|
|
|
fee := msg.FeePerKw
|
|
|
|
if err := l.channel.ReceiveUpdateFee(fee); err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("error receiving fee update: %v", err)
|
2017-07-14 21:40:42 +03:00
|
|
|
return
|
|
|
|
}
|
2017-05-01 20:03:41 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// updateCommitTx signs, then sends an update to the remote peer adding a new
|
|
|
|
// commitment to their commitment chain which includes all the latest updates
|
|
|
|
// we've received+processed up to this point.
|
2017-05-04 00:03:47 +03:00
|
|
|
func (l *channelLink) updateCommitTx() error {
|
2017-07-31 00:08:25 +03:00
|
|
|
theirCommitSig, htlcSigs, err := l.channel.SignNextCommitment()
|
2017-05-01 20:03:41 +03:00
|
|
|
if err == lnwallet.ErrNoWindow {
|
2017-05-04 00:03:47 +03:00
|
|
|
log.Tracef("revocation window exhausted, unable to send %v",
|
2017-05-02 00:06:10 +03:00
|
|
|
l.batchCounter)
|
2017-05-01 20:03:41 +03:00
|
|
|
return nil
|
|
|
|
} else if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
commitSig := &lnwire.CommitSig{
|
2017-05-04 00:03:47 +03:00
|
|
|
ChanID: l.ChanID(),
|
2017-07-31 00:08:25 +03:00
|
|
|
CommitSig: theirCommitSig,
|
|
|
|
HtlcSigs: htlcSigs,
|
2017-05-01 20:03:41 +03:00
|
|
|
}
|
2017-05-04 00:03:47 +03:00
|
|
|
l.cfg.Peer.SendMessage(commitSig)
|
2017-05-01 20:03:41 +03:00
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// We've just initiated a state transition, attempt to stop the
|
|
|
|
// logCommitTimer. If the timer already ticked, then we'll consume the
|
|
|
|
// value, dropping
|
|
|
|
if l.logCommitTimer != nil && !l.logCommitTimer.Stop() {
|
|
|
|
select {
|
|
|
|
case <-l.logCommitTimer.C:
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
l.logCommitTick = nil
|
|
|
|
|
|
|
|
// Finally, clear our the current batch, so we can accurately make
|
|
|
|
// further batch flushing decisions.
|
2017-05-02 00:06:10 +03:00
|
|
|
l.batchCounter = 0
|
2017-05-31 15:44:42 +03:00
|
|
|
|
2017-05-01 20:03:41 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// Peer returns the representation of remote peer with which we have the
|
|
|
|
// channel link opened.
|
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) Peer() Peer {
|
|
|
|
return l.cfg.Peer
|
|
|
|
}
|
|
|
|
|
2017-06-17 00:32:41 +03:00
|
|
|
// ShortChanID returns the short channel ID for the channel link. The short
|
|
|
|
// channel ID encodes the exact location in the main chain that the original
|
|
|
|
// funding output can be found.
|
|
|
|
//
|
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) ShortChanID() lnwire.ShortChannelID {
|
|
|
|
return l.channel.ShortChanID()
|
|
|
|
}
|
|
|
|
|
|
|
|
// ChanID returns the channel ID for the channel link. The channel ID is a more
|
|
|
|
// compact representation of a channel's full outpoint.
|
2017-06-01 02:43:37 +03:00
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) ChanID() lnwire.ChannelID {
|
|
|
|
return lnwire.NewChanIDFromOutPoint(l.channel.ChannelPoint())
|
|
|
|
}
|
|
|
|
|
|
|
|
// getBandwidthCmd is a wrapper for get bandwidth handler.
|
|
|
|
type getBandwidthCmd struct {
|
2017-08-22 09:36:43 +03:00
|
|
|
resp chan lnwire.MilliSatoshi
|
2017-05-03 17:07:55 +03:00
|
|
|
}
|
|
|
|
|
2017-09-25 22:31:52 +03:00
|
|
|
// Bandwidth returns the total amount that can flow through the channel link at
|
2017-11-11 01:57:59 +03:00
|
|
|
// this given instance. The value returned is expressed in millisatoshi and can
|
|
|
|
// be used by callers when making forwarding decisions to determine if a link
|
|
|
|
// can accept an HTLC.
|
2017-06-01 02:43:37 +03:00
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
2017-08-22 09:36:43 +03:00
|
|
|
func (l *channelLink) Bandwidth() lnwire.MilliSatoshi {
|
2017-11-11 01:52:27 +03:00
|
|
|
// TODO(roasbeef): subtract reserve
|
|
|
|
channelBandwidth := l.channel.AvailableBalance()
|
|
|
|
overflowBandwidth := l.overflowQueue.TotalHtlcAmount()
|
|
|
|
|
|
|
|
return channelBandwidth - overflowBandwidth
|
2017-05-03 17:07:55 +03:00
|
|
|
}
|
|
|
|
|
2017-06-17 01:01:00 +03:00
|
|
|
// policyUpdate is a message sent to a channel link when an outside sub-system
|
|
|
|
// wishes to update the current forwarding policy.
|
|
|
|
type policyUpdate struct {
|
|
|
|
policy ForwardingPolicy
|
|
|
|
|
|
|
|
done chan struct{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateForwardingPolicy updates the forwarding policy for the target
|
|
|
|
// ChannelLink. Once updated, the link will use the new forwarding policy to
|
2017-08-22 09:50:12 +03:00
|
|
|
// govern if it an incoming HTLC should be forwarded or not. Note that this
|
|
|
|
// processing of the new policy will ensure that uninitialized fields in the
|
|
|
|
// passed policy won't override already initialized fields in the current
|
|
|
|
// policy.
|
2017-06-17 01:01:00 +03:00
|
|
|
//
|
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) UpdateForwardingPolicy(newPolicy ForwardingPolicy) {
|
|
|
|
cmd := &policyUpdate{
|
|
|
|
policy: newPolicy,
|
|
|
|
done: make(chan struct{}),
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case l.linkControl <- cmd:
|
|
|
|
case <-l.quit:
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-cmd.done:
|
|
|
|
case <-l.quit:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// Stats returns the statistics of channel link.
|
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
2017-08-22 09:36:43 +03:00
|
|
|
func (l *channelLink) Stats() (uint64, lnwire.MilliSatoshi, lnwire.MilliSatoshi) {
|
2017-05-03 17:07:55 +03:00
|
|
|
snapshot := l.channel.StateSnapshot()
|
2017-08-22 09:50:12 +03:00
|
|
|
|
2017-11-11 01:58:28 +03:00
|
|
|
return snapshot.ChannelCommitment.CommitHeight,
|
|
|
|
snapshot.TotalMSatSent,
|
|
|
|
snapshot.TotalMSatReceived
|
2017-05-03 17:07:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// String returns the string representation of channel link.
|
2017-06-01 02:43:37 +03:00
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) String() string {
|
|
|
|
return l.channel.ChannelPoint().String()
|
|
|
|
}
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// HandleSwitchPacket handles the switch packets. This packets which might be
|
|
|
|
// forwarded to us from another channel link in case the htlc update came from
|
|
|
|
// another peer or if the update was created by user
|
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) HandleSwitchPacket(packet *htlcPacket) {
|
2017-11-11 01:48:23 +03:00
|
|
|
l.mailBox.AddPacket(packet)
|
2017-05-03 17:07:55 +03:00
|
|
|
}
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// HandleChannelUpdate handles the htlc requests as settle/add/fail which sent
|
|
|
|
// to us from remote peer we have a channel with.
|
|
|
|
//
|
2017-05-03 17:07:55 +03:00
|
|
|
// NOTE: Part of the ChannelLink interface.
|
|
|
|
func (l *channelLink) HandleChannelUpdate(message lnwire.Message) {
|
2017-11-11 01:48:23 +03:00
|
|
|
l.mailBox.AddMessage(message)
|
2017-05-03 17:07:55 +03:00
|
|
|
}
|
2017-05-03 18:57:13 +03:00
|
|
|
|
2017-07-14 21:40:42 +03:00
|
|
|
// updateChannelFee updates the commitment fee-per-kw on this channel by
|
|
|
|
// committing to an update_fee message.
|
|
|
|
func (l *channelLink) updateChannelFee(feePerKw btcutil.Amount) error {
|
|
|
|
// Update local fee.
|
|
|
|
if err := l.channel.UpdateFee(feePerKw); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send fee update to remote.
|
|
|
|
msg := lnwire.NewUpdateFee(l.ChanID(), feePerKw)
|
|
|
|
return l.cfg.Peer.SendMessage(msg)
|
|
|
|
}
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// processLockedInHtlcs serially processes each of the log updates which have
|
|
|
|
// been "locked-in". An HTLC is considered locked-in once it has been fully
|
|
|
|
// committed to in both the remote and local commitment state. Once a channel
|
2017-10-19 03:36:28 +03:00
|
|
|
// updates is locked-in, then it can be acted upon, meaning: settling HTLCs,
|
|
|
|
// cancelling them, or forwarding new HTLCs to the next hop.
|
2017-05-03 18:57:13 +03:00
|
|
|
func (l *channelLink) processLockedInHtlcs(
|
|
|
|
paymentDescriptors []*lnwallet.PaymentDescriptor) []*htlcPacket {
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
var (
|
|
|
|
needUpdate bool
|
|
|
|
packetsToForward []*htlcPacket
|
|
|
|
)
|
2017-05-03 18:57:13 +03:00
|
|
|
|
|
|
|
for _, pd := range paymentDescriptors {
|
|
|
|
// TODO(roasbeef): rework log entries to a shared
|
|
|
|
// interface.
|
|
|
|
switch pd.EntryType {
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// A settle for an HTLC we previously forwarded HTLC has been
|
|
|
|
// received. So we'll forward the HTLC to the switch which
|
|
|
|
// will handle propagating the settle to the prior hop.
|
2017-05-03 18:57:13 +03:00
|
|
|
case lnwallet.Settle:
|
2017-06-17 00:58:02 +03:00
|
|
|
settleUpdate := &lnwire.UpdateFufillHTLC{
|
|
|
|
PaymentPreimage: pd.RPreimage,
|
|
|
|
}
|
|
|
|
settlePacket := newSettlePacket(l.ShortChanID(),
|
|
|
|
settleUpdate, pd.RHash, pd.Amount)
|
|
|
|
|
|
|
|
// Add the packet to the batch to be forwarded, and
|
|
|
|
// notify the overflow queue that a spare spot has been
|
|
|
|
// freed up within the commitment state.
|
|
|
|
packetsToForward = append(packetsToForward, settlePacket)
|
2017-09-25 22:47:28 +03:00
|
|
|
l.overflowQueue.SignalFreeSlot()
|
2017-05-03 18:57:13 +03:00
|
|
|
|
2017-06-29 16:40:45 +03:00
|
|
|
// A failureCode message for a previously forwarded HTLC has been
|
2017-06-17 00:58:02 +03:00
|
|
|
// received. As a result a new slot will be freed up in our
|
|
|
|
// commitment state, so we'll forward this to the switch so the
|
|
|
|
// backwards undo can continue.
|
2017-05-03 18:57:13 +03:00
|
|
|
case lnwallet.Fail:
|
2017-06-17 00:58:02 +03:00
|
|
|
// Fetch the reason the HTLC was cancelled so we can
|
|
|
|
// continue to propagate it.
|
|
|
|
failUpdate := &lnwire.UpdateFailHTLC{
|
2017-07-10 13:48:43 +03:00
|
|
|
Reason: lnwire.OpaqueReason(pd.FailReason),
|
2017-06-17 00:58:02 +03:00
|
|
|
ChanID: l.ChanID(),
|
|
|
|
}
|
|
|
|
failPacket := newFailPacket(l.ShortChanID(), failUpdate,
|
2017-06-29 16:40:45 +03:00
|
|
|
pd.RHash, pd.Amount, false)
|
2017-06-17 00:58:02 +03:00
|
|
|
|
|
|
|
// Add the packet to the batch to be forwarded, and
|
|
|
|
// notify the overflow queue that a spare spot has been
|
|
|
|
// freed up within the commitment state.
|
|
|
|
packetsToForward = append(packetsToForward, failPacket)
|
2017-09-25 22:47:28 +03:00
|
|
|
l.overflowQueue.SignalFreeSlot()
|
2017-05-03 18:57:13 +03:00
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// An incoming HTLC add has been full-locked in. As a result we
|
2017-10-19 03:36:28 +03:00
|
|
|
// can now examine the forwarding details of the HTLC, and the
|
2017-07-15 06:08:29 +03:00
|
|
|
// HTLC itself to decide if: we should forward it, cancel it,
|
2017-06-17 00:58:02 +03:00
|
|
|
// or are able to settle it (and it adheres to our fee related
|
|
|
|
// constraints).
|
2017-05-03 18:57:13 +03:00
|
|
|
case lnwallet.Add:
|
2017-06-17 00:58:02 +03:00
|
|
|
// Fetch the onion blob that was included within this
|
|
|
|
// processed payment descriptor.
|
2017-07-09 02:38:50 +03:00
|
|
|
var onionBlob [lnwire.OnionPacketSize]byte
|
|
|
|
copy(onionBlob[:], pd.OnionBlob)
|
2017-06-17 00:58:02 +03:00
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// Retrieve onion obfuscator from onion blob in order
|
|
|
|
// to produce initial obfuscation of the onion
|
|
|
|
// failureCode.
|
2017-06-17 00:58:02 +03:00
|
|
|
onionReader := bytes.NewReader(onionBlob[:])
|
2017-09-12 23:04:52 +03:00
|
|
|
obfuscator, failureCode := l.cfg.DecodeOnionObfuscator(
|
|
|
|
onionReader,
|
|
|
|
)
|
2017-06-29 16:40:45 +03:00
|
|
|
if failureCode != lnwire.CodeNone {
|
2017-09-12 23:04:52 +03:00
|
|
|
// If we're unable to process the onion blob
|
|
|
|
// than we should send the malformed htlc error
|
|
|
|
// to payment sender.
|
|
|
|
l.sendMalformedHTLCError(pd.RHash, failureCode,
|
|
|
|
onionBlob[:])
|
2017-06-29 16:40:45 +03:00
|
|
|
needUpdate = true
|
2017-07-15 06:08:29 +03:00
|
|
|
|
2017-09-12 23:04:52 +03:00
|
|
|
log.Errorf("unable to decode onion "+
|
|
|
|
"obfuscator: %v", failureCode)
|
2017-06-29 16:40:45 +03:00
|
|
|
continue
|
|
|
|
}
|
2017-05-03 18:57:13 +03:00
|
|
|
|
|
|
|
// Before adding the new htlc to the state machine,
|
2017-06-01 02:43:37 +03:00
|
|
|
// parse the onion object in order to obtain the
|
2017-07-15 06:08:29 +03:00
|
|
|
// routing information with DecodeHopIterator function
|
|
|
|
// which process the Sphinx packet.
|
2017-06-01 02:43:37 +03:00
|
|
|
//
|
2017-05-03 18:57:13 +03:00
|
|
|
// We include the payment hash of the htlc as it's
|
|
|
|
// authenticated within the Sphinx packet itself as
|
|
|
|
// associated data in order to thwart attempts a replay
|
|
|
|
// attacks. In the case of a replay, an attacker is
|
|
|
|
// *forced* to use the same payment hash twice, thereby
|
|
|
|
// losing their money entirely.
|
2017-06-29 16:40:45 +03:00
|
|
|
onionReader = bytes.NewReader(onionBlob[:])
|
2017-08-03 07:10:35 +03:00
|
|
|
chanIterator, failureCode := l.cfg.DecodeHopIterator(
|
|
|
|
onionReader, pd.RHash[:],
|
|
|
|
)
|
2017-06-29 16:40:45 +03:00
|
|
|
if failureCode != lnwire.CodeNone {
|
2017-09-12 23:04:52 +03:00
|
|
|
// If we're unable to process the onion blob
|
|
|
|
// than we should send the malformed htlc error
|
|
|
|
// to payment sender.
|
|
|
|
l.sendMalformedHTLCError(pd.RHash, failureCode,
|
|
|
|
onionBlob[:])
|
2017-05-03 18:57:13 +03:00
|
|
|
needUpdate = true
|
2017-07-15 06:08:29 +03:00
|
|
|
|
2017-09-12 23:04:52 +03:00
|
|
|
log.Errorf("unable to decode onion hop "+
|
|
|
|
"iterator: %v", failureCode)
|
2017-05-03 18:57:13 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
heightNow := l.bestHeight
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
fwdInfo := chanIterator.ForwardingInstructions()
|
|
|
|
switch fwdInfo.NextHop {
|
|
|
|
case exitHop:
|
2017-08-03 07:10:35 +03:00
|
|
|
// First, we'll check the expiry of the HTLC
|
|
|
|
// itself against, the current block height. If
|
|
|
|
// the timeout is too soon, then we'll reject
|
|
|
|
// the HTLC.
|
|
|
|
if pd.Timeout-expiryGraceDelta <= heightNow {
|
|
|
|
log.Errorf("htlc(%x) has an expiry "+
|
|
|
|
"that's too soon: expiry=%v, "+
|
|
|
|
"best_height=%v", pd.RHash[:],
|
|
|
|
pd.Timeout, heightNow)
|
|
|
|
|
|
|
|
failure := lnwire.FailFinalIncorrectCltvExpiry{}
|
|
|
|
l.sendHTLCError(pd.RHash, &failure, obfuscator)
|
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-05-03 18:57:13 +03:00
|
|
|
// We're the designated payment destination.
|
|
|
|
// Therefore we attempt to see if we have an
|
|
|
|
// invoice locally which'll allow us to settle
|
|
|
|
// this htlc.
|
|
|
|
invoiceHash := chainhash.Hash(pd.RHash)
|
|
|
|
invoice, err := l.cfg.Registry.LookupInvoice(invoiceHash)
|
|
|
|
if err != nil {
|
2017-08-22 09:36:43 +03:00
|
|
|
log.Errorf("unable to query invoice registry: "+
|
2017-05-03 18:57:13 +03:00
|
|
|
" %v", err)
|
2017-06-29 16:40:45 +03:00
|
|
|
failure := lnwire.FailUnknownPaymentHash{}
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
2017-05-03 18:57:13 +03:00
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-10-23 04:33:54 +03:00
|
|
|
// If we're not currently in debug mode, and
|
|
|
|
// the extended htlc doesn't meet the value
|
|
|
|
// requested, then we'll fail the htlc.
|
|
|
|
// Otherwise, we settle this htlc within our
|
|
|
|
// local state update log, then send the update
|
|
|
|
// entry to the remote party.
|
|
|
|
if !l.cfg.DebugHTLC && pd.Amount < invoice.Terms.Value {
|
|
|
|
log.Errorf("rejecting htlc due to incorrect "+
|
|
|
|
"amount: expected %v, received %v",
|
|
|
|
invoice.Terms.Value, pd.Amount)
|
|
|
|
failure := lnwire.FailIncorrectPaymentAmount{}
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// As we're the exit hop, we'll double check
|
|
|
|
// the hop-payload included in the HTLC to
|
|
|
|
// ensure that it was crafted correctly by the
|
|
|
|
// sender and matches the HTLC we were
|
2017-07-15 06:08:29 +03:00
|
|
|
// extended.
|
2017-07-05 01:58:14 +03:00
|
|
|
if !l.cfg.DebugHTLC &&
|
|
|
|
fwdInfo.AmountToForward != invoice.Terms.Value {
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
log.Errorf("Onion payload of incoming "+
|
|
|
|
"htlc(%x) has incorrect value: "+
|
|
|
|
"expected %v, got %v", pd.RHash,
|
|
|
|
invoice.Terms.Value,
|
|
|
|
fwdInfo.AmountToForward)
|
|
|
|
|
2017-06-29 16:40:45 +03:00
|
|
|
failure := lnwire.FailIncorrectPaymentAmount{}
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
2017-06-17 00:58:02 +03:00
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
2017-07-15 06:08:29 +03:00
|
|
|
|
|
|
|
// We'll also ensure that our time-lock value
|
|
|
|
// has been computed correctly.
|
2017-10-23 04:33:54 +03:00
|
|
|
//
|
|
|
|
// TODO(roasbeef): also accept global default?
|
2017-09-12 23:04:52 +03:00
|
|
|
expectedHeight := heightNow + l.cfg.FwrdingPolicy.TimeLockDelta
|
|
|
|
if !l.cfg.DebugHTLC {
|
|
|
|
switch {
|
|
|
|
case fwdInfo.OutgoingCTLV < expectedHeight:
|
|
|
|
log.Errorf("Onion payload of incoming "+
|
|
|
|
"htlc(%x) has incorrect time-lock: "+
|
|
|
|
"expected %v, got %v",
|
|
|
|
pd.RHash[:], expectedHeight,
|
|
|
|
fwdInfo.OutgoingCTLV)
|
|
|
|
|
|
|
|
failure := lnwire.NewFinalIncorrectCltvExpiry(
|
|
|
|
fwdInfo.OutgoingCTLV,
|
|
|
|
)
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
case pd.Timeout != fwdInfo.OutgoingCTLV:
|
|
|
|
log.Errorf("HTLC(%x) has incorrect "+
|
|
|
|
"time-lock: expected %v, got %v",
|
|
|
|
pd.RHash[:], pd.Timeout,
|
|
|
|
fwdInfo.OutgoingCTLV)
|
|
|
|
|
|
|
|
failure := lnwire.NewFinalIncorrectCltvExpiry(
|
|
|
|
fwdInfo.OutgoingCTLV,
|
|
|
|
)
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
2017-06-17 00:58:02 +03:00
|
|
|
}
|
|
|
|
|
2017-09-01 04:30:11 +03:00
|
|
|
if l.cfg.DebugHTLC && l.cfg.HodlHTLC {
|
|
|
|
log.Warnf("hodl HTLC mode enabled, " +
|
|
|
|
"will not attempt to settle " +
|
|
|
|
"HTLC with sender")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-05-03 18:57:13 +03:00
|
|
|
preimage := invoice.Terms.PaymentPreimage
|
2017-11-11 01:52:27 +03:00
|
|
|
logIndex, _, err := l.channel.SettleHTLC(preimage)
|
2017-05-03 18:57:13 +03:00
|
|
|
if err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to settle htlc: %v", err)
|
2017-05-03 18:57:13 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// Notify the invoiceRegistry of the invoices
|
|
|
|
// we just settled with this latest commitment
|
2017-05-03 18:57:13 +03:00
|
|
|
// update.
|
|
|
|
err = l.cfg.Registry.SettleInvoice(invoiceHash)
|
|
|
|
if err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to settle invoice: %v", err)
|
2017-05-03 18:57:13 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-06-01 02:43:37 +03:00
|
|
|
// HTLC was successfully settled locally send
|
2017-05-03 18:57:13 +03:00
|
|
|
// notification about it remote peer.
|
|
|
|
l.cfg.Peer.SendMessage(&lnwire.UpdateFufillHTLC{
|
|
|
|
ChanID: l.ChanID(),
|
|
|
|
ID: logIndex,
|
|
|
|
PaymentPreimage: preimage,
|
|
|
|
})
|
|
|
|
needUpdate = true
|
2017-06-17 00:58:02 +03:00
|
|
|
|
|
|
|
// There are additional channels left within this
|
|
|
|
// route. So we'll verify that our forwarding
|
|
|
|
// constraints have been properly met by by this
|
|
|
|
// incoming HTLC.
|
|
|
|
default:
|
2017-08-03 07:10:35 +03:00
|
|
|
// We want to avoid forwarding an HTLC which
|
|
|
|
// will expire in the near future, so we'll
|
|
|
|
// reject an HTLC if its expiration time is too
|
|
|
|
// close to the current height.
|
|
|
|
timeDelta := l.cfg.FwrdingPolicy.TimeLockDelta
|
|
|
|
if pd.Timeout-timeDelta <= heightNow {
|
|
|
|
log.Errorf("htlc(%x) has an expiry "+
|
2017-10-19 08:20:47 +03:00
|
|
|
"that's too soon: outgoing_expiry=%v, "+
|
2017-08-03 07:10:35 +03:00
|
|
|
"best_height=%v", pd.RHash[:],
|
2017-10-19 08:20:47 +03:00
|
|
|
pd.Timeout-timeDelta, heightNow)
|
2017-08-03 07:10:35 +03:00
|
|
|
|
|
|
|
var failure lnwire.FailureMessage
|
|
|
|
update, err := l.cfg.GetLastChannelUpdate()
|
|
|
|
if err != nil {
|
|
|
|
failure = lnwire.NewTemporaryChannelFailure(nil)
|
|
|
|
} else {
|
|
|
|
failure = lnwire.NewExpiryTooSoon(*update)
|
|
|
|
}
|
|
|
|
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// As our second sanity check, we'll ensure that
|
2017-06-17 00:58:02 +03:00
|
|
|
// the passed HTLC isn't too small. If so, then
|
|
|
|
// we'll cancel the HTLC directly.
|
|
|
|
if pd.Amount < l.cfg.FwrdingPolicy.MinHTLC {
|
|
|
|
log.Errorf("Incoming htlc(%x) is too "+
|
|
|
|
"small: min_htlc=%v, hltc_value=%v",
|
|
|
|
pd.RHash[:], l.cfg.FwrdingPolicy.MinHTLC,
|
|
|
|
pd.Amount)
|
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// As part of the returned error, we'll
|
|
|
|
// send our latest routing policy so
|
|
|
|
// the sending node obtains the most up
|
|
|
|
// to date data.
|
2017-06-29 16:40:45 +03:00
|
|
|
var failure lnwire.FailureMessage
|
|
|
|
update, err := l.cfg.GetLastChannelUpdate()
|
|
|
|
if err != nil {
|
|
|
|
failure = lnwire.NewTemporaryChannelFailure(nil)
|
|
|
|
} else {
|
|
|
|
failure = lnwire.NewAmountBelowMinimum(
|
|
|
|
pd.Amount, *update)
|
|
|
|
}
|
|
|
|
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
2017-06-17 00:58:02 +03:00
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-08-03 07:10:35 +03:00
|
|
|
// Next, using the amount of the incoming HTLC,
|
|
|
|
// we'll calculate the expected fee this
|
2017-06-17 00:58:02 +03:00
|
|
|
// incoming HTLC must carry in order to be
|
|
|
|
// accepted.
|
|
|
|
expectedFee := ExpectedFee(
|
|
|
|
l.cfg.FwrdingPolicy,
|
2017-08-22 09:36:43 +03:00
|
|
|
fwdInfo.AmountToForward,
|
2017-06-17 00:58:02 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// If the amount of the incoming HTLC, minus
|
|
|
|
// our expected fee isn't equal to the
|
|
|
|
// forwarding instructions, then either the
|
|
|
|
// values have been tampered with, or the send
|
|
|
|
// used incorrect/dated information to
|
|
|
|
// construct the forwarding information for
|
|
|
|
// this hop. In any case, we'll cancel this
|
|
|
|
// HTLC.
|
2017-08-22 09:50:56 +03:00
|
|
|
if pd.Amount-expectedFee < fwdInfo.AmountToForward {
|
2017-06-17 00:58:02 +03:00
|
|
|
log.Errorf("Incoming htlc(%x) has "+
|
|
|
|
"insufficient fee: expected "+
|
|
|
|
"%v, got %v", pd.RHash[:],
|
2017-08-22 09:36:43 +03:00
|
|
|
int64(expectedFee),
|
|
|
|
int64(pd.Amount-fwdInfo.AmountToForward))
|
2017-06-17 00:58:02 +03:00
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// As part of the returned error, we'll
|
|
|
|
// send our latest routing policy so
|
|
|
|
// the sending node obtains the most up
|
|
|
|
// to date data.
|
2017-06-29 16:40:45 +03:00
|
|
|
var failure lnwire.FailureMessage
|
|
|
|
update, err := l.cfg.GetLastChannelUpdate()
|
|
|
|
if err != nil {
|
|
|
|
failure = lnwire.NewTemporaryChannelFailure(nil)
|
|
|
|
} else {
|
|
|
|
failure = lnwire.NewFeeInsufficient(pd.Amount,
|
|
|
|
*update)
|
|
|
|
}
|
|
|
|
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
2017-06-17 00:58:02 +03:00
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, we'll ensure that the time-lock on
|
|
|
|
// the outgoing HTLC meets the following
|
|
|
|
// constraint: the incoming time-lock minus our
|
|
|
|
// time-lock delta should equal the outgoing
|
|
|
|
// time lock. Otherwise, whether the sender
|
|
|
|
// messed up, or an intermediate node tampered
|
|
|
|
// with the HTLC.
|
2017-10-19 08:20:47 +03:00
|
|
|
if pd.Timeout-timeDelta < fwdInfo.OutgoingCTLV {
|
2017-06-17 00:58:02 +03:00
|
|
|
log.Errorf("Incoming htlc(%x) has "+
|
2017-10-19 08:20:47 +03:00
|
|
|
"incorrect time-lock value: "+
|
|
|
|
"expected at least %v block delta, "+
|
|
|
|
"got %v block delta", pd.RHash[:],
|
|
|
|
timeDelta,
|
|
|
|
pd.Timeout-fwdInfo.OutgoingCTLV)
|
2017-06-17 00:58:02 +03:00
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// Grab the latest routing policy so
|
|
|
|
// the sending node is up to date with
|
|
|
|
// our current policy.
|
2017-06-29 16:40:45 +03:00
|
|
|
update, err := l.cfg.GetLastChannelUpdate()
|
|
|
|
if err != nil {
|
|
|
|
l.fail("unable to create channel update "+
|
|
|
|
"while handling the error: %v", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
failure := lnwire.NewIncorrectCltvExpiry(
|
|
|
|
pd.Timeout, *update)
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
2017-06-17 00:58:02 +03:00
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-09-12 23:04:52 +03:00
|
|
|
// TODO(roasbeef): also add max timeout value
|
|
|
|
|
2017-06-17 00:58:02 +03:00
|
|
|
// With all our forwarding constraints met,
|
|
|
|
// we'll create the outgoing HTLC using the
|
|
|
|
// parameters as specified in the forwarding
|
|
|
|
// info.
|
|
|
|
addMsg := &lnwire.UpdateAddHTLC{
|
|
|
|
Expiry: fwdInfo.OutgoingCTLV,
|
|
|
|
Amount: fwdInfo.AmountToForward,
|
|
|
|
PaymentHash: pd.RHash,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, we'll encode the onion packet for
|
|
|
|
// the _next_ hop using the hop iterator
|
|
|
|
// decoded for the current hop.
|
|
|
|
buf := bytes.NewBuffer(addMsg.OnionBlob[0:0])
|
|
|
|
err := chanIterator.EncodeNextHop(buf)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable to encode the "+
|
|
|
|
"remaining route %v", err)
|
2017-06-29 16:40:45 +03:00
|
|
|
|
|
|
|
failure := lnwire.NewTemporaryChannelFailure(nil)
|
|
|
|
l.sendHTLCError(pd.RHash, failure, obfuscator)
|
2017-06-17 00:58:02 +03:00
|
|
|
needUpdate = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
updatePacket := newAddPacket(l.ShortChanID(),
|
2017-06-29 16:40:45 +03:00
|
|
|
fwdInfo.NextHop, addMsg, obfuscator)
|
2017-06-17 00:58:02 +03:00
|
|
|
packetsToForward = append(packetsToForward, updatePacket)
|
2017-05-03 18:57:13 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if needUpdate {
|
|
|
|
// With all the settle/cancel updates added to the local and
|
2017-07-15 06:08:29 +03:00
|
|
|
// remote HTLC logs, initiate a state transition by updating
|
2017-06-01 02:43:37 +03:00
|
|
|
// the remote commitment chain.
|
2017-05-03 18:57:13 +03:00
|
|
|
if err := l.updateCommitTx(); err != nil {
|
2017-07-12 16:44:17 +03:00
|
|
|
l.fail("unable to update commitment: %v", err)
|
2017-05-03 18:57:13 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return packetsToForward
|
|
|
|
}
|
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// sendHTLCError functions cancels HTLC and send cancel message back to the
|
|
|
|
// peer from which HTLC was received.
|
2017-06-29 16:40:45 +03:00
|
|
|
func (l *channelLink) sendHTLCError(rHash [32]byte, failure lnwire.FailureMessage,
|
2017-10-11 05:36:52 +03:00
|
|
|
e ErrorEncrypter) {
|
|
|
|
|
|
|
|
reason, err := e.EncryptFirstHop(failure)
|
2017-06-29 16:40:45 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable to obfuscate error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
2017-05-03 18:57:13 +03:00
|
|
|
|
2017-07-10 13:48:43 +03:00
|
|
|
index, err := l.channel.FailHTLC(rHash, reason)
|
2017-05-03 18:57:13 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable cancel htlc: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
l.cfg.Peer.SendMessage(&lnwire.UpdateFailHTLC{
|
|
|
|
ChanID: l.ChanID(),
|
|
|
|
ID: index,
|
|
|
|
Reason: reason,
|
|
|
|
})
|
|
|
|
}
|
2017-07-12 16:44:17 +03:00
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// sendMalformedHTLCError helper function which sends the malformed HTLC update
|
2017-06-29 16:40:45 +03:00
|
|
|
// to the payment sender.
|
|
|
|
func (l *channelLink) sendMalformedHTLCError(rHash [32]byte, code lnwire.FailCode,
|
|
|
|
onionBlob []byte) {
|
2017-08-14 14:21:57 +03:00
|
|
|
|
|
|
|
shaOnionBlob := sha256.Sum256(onionBlob)
|
|
|
|
index, err := l.channel.MalformedFailHTLC(rHash, code, shaOnionBlob)
|
2017-06-29 16:40:45 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable cancel htlc: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
l.cfg.Peer.SendMessage(&lnwire.UpdateFailMalformedHTLC{
|
|
|
|
ChanID: l.ChanID(),
|
|
|
|
ID: index,
|
2017-08-14 14:21:57 +03:00
|
|
|
ShaOnionBlob: shaOnionBlob,
|
2017-06-29 16:40:45 +03:00
|
|
|
FailureCode: code,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-07-15 06:08:29 +03:00
|
|
|
// fail helper function which is used to encapsulate the action necessary for
|
|
|
|
// proper disconnect.
|
2017-07-12 16:44:17 +03:00
|
|
|
func (l *channelLink) fail(format string, a ...interface{}) {
|
|
|
|
reason := errors.Errorf(format, a...)
|
|
|
|
log.Error(reason)
|
|
|
|
l.cfg.Peer.Disconnect(reason)
|
2017-06-29 16:40:45 +03:00
|
|
|
}
|