2019-08-05 13:29:16 +03:00
|
|
|
package routing
|
|
|
|
|
|
|
|
import (
|
2019-07-29 15:20:06 +03:00
|
|
|
"fmt"
|
|
|
|
|
2019-08-05 13:29:16 +03:00
|
|
|
"github.com/lightningnetwork/lnd/channeldb"
|
|
|
|
"github.com/lightningnetwork/lnd/lnwire"
|
|
|
|
"github.com/lightningnetwork/lnd/routing/route"
|
|
|
|
)
|
|
|
|
|
2019-08-05 15:07:25 +03:00
|
|
|
// Instantiate variables to allow taking a reference from the failure reason.
|
|
|
|
var (
|
2019-06-25 11:51:55 +03:00
|
|
|
reasonError = channeldb.FailureReasonError
|
2019-11-20 07:42:21 +03:00
|
|
|
reasonIncorrectDetails = channeldb.FailureReasonPaymentDetails
|
2019-08-05 15:07:25 +03:00
|
|
|
)
|
|
|
|
|
2019-07-29 15:20:06 +03:00
|
|
|
// pairResult contains the result of the interpretation of a payment attempt for
|
|
|
|
// a specific node pair.
|
|
|
|
type pairResult struct {
|
|
|
|
// minPenalizeAmt is the minimum amount for which a penalty should be
|
|
|
|
// applied based on this result. Only applies to fail results.
|
|
|
|
minPenalizeAmt lnwire.MilliSatoshi
|
|
|
|
|
|
|
|
// success indicates whether the payment attempt was successful through
|
|
|
|
// this pair.
|
|
|
|
success bool
|
|
|
|
}
|
|
|
|
|
2019-09-30 20:45:49 +03:00
|
|
|
// failPairResult creates a new result struct for a failure.
|
|
|
|
func failPairResult(minPenalizeAmt lnwire.MilliSatoshi) pairResult {
|
|
|
|
return pairResult{
|
|
|
|
minPenalizeAmt: minPenalizeAmt,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// successPairResult creates a new result struct for a success.
|
|
|
|
func successPairResult() pairResult {
|
|
|
|
return pairResult{
|
|
|
|
success: true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-29 15:20:06 +03:00
|
|
|
// String returns the human-readable representation of a pair result.
|
|
|
|
func (p pairResult) String() string {
|
|
|
|
if p.success {
|
|
|
|
return "success"
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Sprintf("failed (minPenalizeAmt=%v)", p.minPenalizeAmt)
|
|
|
|
}
|
|
|
|
|
2019-08-05 13:29:16 +03:00
|
|
|
// interpretedResult contains the result of the interpretation of a payment
|
2019-07-29 15:20:06 +03:00
|
|
|
// attempt.
|
2019-08-05 13:29:16 +03:00
|
|
|
type interpretedResult struct {
|
|
|
|
// nodeFailure points to a node pubkey if all channels of that node are
|
|
|
|
// responsible for the result.
|
|
|
|
nodeFailure *route.Vertex
|
|
|
|
|
2019-07-29 15:20:06 +03:00
|
|
|
// pairResults contains a map of node pairs for which we have a result.
|
|
|
|
pairResults map[DirectedNodePair]pairResult
|
2019-08-05 13:29:16 +03:00
|
|
|
|
|
|
|
// finalFailureReason is set to a non-nil value if it makes no more
|
|
|
|
// sense to start another payment attempt. It will contain the reason
|
|
|
|
// why.
|
|
|
|
finalFailureReason *channeldb.FailureReason
|
|
|
|
|
|
|
|
// policyFailure is set to a node pair if there is a policy failure on
|
|
|
|
// that connection. This is used to control the second chance logic for
|
|
|
|
// policy failures.
|
|
|
|
policyFailure *DirectedNodePair
|
|
|
|
}
|
|
|
|
|
|
|
|
// interpretResult interprets a payment outcome and returns an object that
|
|
|
|
// contains information required to update mission control.
|
2019-07-29 15:20:06 +03:00
|
|
|
func interpretResult(rt *route.Route, success bool, failureSrcIdx *int,
|
2019-08-05 13:29:16 +03:00
|
|
|
failure lnwire.FailureMessage) *interpretedResult {
|
|
|
|
|
|
|
|
i := &interpretedResult{
|
2019-07-29 15:20:06 +03:00
|
|
|
pairResults: make(map[DirectedNodePair]pairResult),
|
2019-08-05 13:29:16 +03:00
|
|
|
}
|
|
|
|
|
2019-07-29 15:20:06 +03:00
|
|
|
if success {
|
|
|
|
i.processSuccess(rt)
|
|
|
|
} else {
|
|
|
|
i.processFail(rt, failureSrcIdx, failure)
|
|
|
|
}
|
2019-08-05 13:29:16 +03:00
|
|
|
return i
|
|
|
|
}
|
|
|
|
|
2019-07-29 15:20:06 +03:00
|
|
|
// processSuccess processes a successful payment attempt.
|
|
|
|
func (i *interpretedResult) processSuccess(route *route.Route) {
|
|
|
|
// For successes, all nodes must have acted in the right way. Therefore
|
|
|
|
// we mark all of them with a success result.
|
|
|
|
i.successPairRange(route, 0, len(route.Hops)-1)
|
|
|
|
}
|
|
|
|
|
2019-08-05 13:29:16 +03:00
|
|
|
// processFail processes a failed payment attempt.
|
|
|
|
func (i *interpretedResult) processFail(
|
|
|
|
rt *route.Route, errSourceIdx *int,
|
2019-06-25 11:51:55 +03:00
|
|
|
failure lnwire.FailureMessage) {
|
2019-08-05 13:29:16 +03:00
|
|
|
|
|
|
|
if errSourceIdx == nil {
|
2019-08-05 15:07:25 +03:00
|
|
|
i.processPaymentOutcomeUnknown(rt)
|
2019-06-25 11:51:55 +03:00
|
|
|
return
|
2019-08-05 13:29:16 +03:00
|
|
|
}
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
switch *errSourceIdx {
|
2019-08-05 13:29:16 +03:00
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// We are the source of the failure.
|
|
|
|
case 0:
|
|
|
|
i.processPaymentOutcomeSelf(rt, failure)
|
|
|
|
|
|
|
|
// A failure from the final hop was received.
|
|
|
|
case len(rt.Hops):
|
|
|
|
i.processPaymentOutcomeFinal(
|
|
|
|
rt, failure,
|
|
|
|
)
|
|
|
|
|
|
|
|
// An intermediate hop failed. Interpret the outcome, update reputation
|
|
|
|
// and try again.
|
|
|
|
default:
|
|
|
|
i.processPaymentOutcomeIntermediate(
|
|
|
|
rt, *errSourceIdx, failure,
|
|
|
|
)
|
2019-08-05 13:29:16 +03:00
|
|
|
}
|
2019-06-25 11:51:55 +03:00
|
|
|
}
|
2019-08-05 13:29:16 +03:00
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// processPaymentOutcomeSelf handles failures sent by ourselves.
|
|
|
|
func (i *interpretedResult) processPaymentOutcomeSelf(
|
|
|
|
rt *route.Route, failure lnwire.FailureMessage) {
|
2019-08-05 13:29:16 +03:00
|
|
|
|
|
|
|
switch failure.(type) {
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// We receive a malformed htlc failure from our peer. We trust ourselves
|
|
|
|
// to send the correct htlc, so our peer must be at fault.
|
|
|
|
case *lnwire.FailInvalidOnionVersion,
|
|
|
|
*lnwire.FailInvalidOnionHmac,
|
|
|
|
*lnwire.FailInvalidOnionKey:
|
|
|
|
|
|
|
|
i.failNode(rt, 1)
|
|
|
|
|
|
|
|
// If this was a payment to a direct peer, we can stop trying.
|
|
|
|
if len(rt.Hops) == 1 {
|
|
|
|
i.finalFailureReason = &reasonError
|
|
|
|
}
|
|
|
|
|
|
|
|
// Any other failure originating from ourselves should be temporary and
|
|
|
|
// caused by changing conditions between path finding and execution of
|
|
|
|
// the payment. We just retry and trust that the information locally
|
|
|
|
// available in the link has been updated.
|
|
|
|
default:
|
|
|
|
log.Warnf("Routing failure for local channel %v occurred",
|
|
|
|
rt.Hops[0].ChannelID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// processPaymentOutcomeFinal handles failures sent by the final hop.
|
|
|
|
func (i *interpretedResult) processPaymentOutcomeFinal(
|
|
|
|
route *route.Route, failure lnwire.FailureMessage) {
|
|
|
|
|
|
|
|
n := len(route.Hops)
|
|
|
|
|
|
|
|
// If a failure from the final node is received, we will fail the
|
|
|
|
// payment in almost all cases. Only when the penultimate node sends an
|
|
|
|
// incorrect htlc, we want to retry via another route. Invalid onion
|
|
|
|
// failures are not expected, because the final node wouldn't be able to
|
|
|
|
// encrypt that failure.
|
|
|
|
switch failure.(type) {
|
|
|
|
|
|
|
|
// Expiry or amount of the HTLC doesn't match the onion, try another
|
|
|
|
// route.
|
|
|
|
case *lnwire.FailFinalIncorrectCltvExpiry,
|
|
|
|
*lnwire.FailFinalIncorrectHtlcAmount:
|
|
|
|
|
|
|
|
// We trust ourselves. If this is a direct payment, we penalize
|
|
|
|
// the final node and fail the payment.
|
|
|
|
if n == 1 {
|
|
|
|
i.failNode(route, n)
|
|
|
|
i.finalFailureReason = &reasonError
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise penalize the last pair of the route and retry.
|
|
|
|
// Either the final node is at fault, or it gets sent a bad htlc
|
|
|
|
// from its predecessor.
|
|
|
|
i.failPair(route, n-1)
|
|
|
|
|
2019-07-29 15:20:06 +03:00
|
|
|
// The other hops relayed corectly, so assign those pairs a
|
|
|
|
// success result.
|
|
|
|
if n > 2 {
|
|
|
|
i.successPairRange(route, 0, n-2)
|
|
|
|
}
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// We are using wrong payment hash or amount, fail the payment.
|
|
|
|
case *lnwire.FailIncorrectPaymentAmount,
|
|
|
|
*lnwire.FailIncorrectDetails:
|
|
|
|
|
2019-07-29 15:20:06 +03:00
|
|
|
// Assign all pairs a success result, as the payment reached the
|
|
|
|
// destination correctly.
|
|
|
|
i.successPairRange(route, 0, n-1)
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
i.finalFailureReason = &reasonIncorrectDetails
|
|
|
|
|
|
|
|
// The HTLC that was extended to the final hop expires too soon. Fail
|
|
|
|
// the payment, because we may be using the wrong final cltv delta.
|
2019-08-05 13:29:16 +03:00
|
|
|
case *lnwire.FailFinalExpiryTooSoon:
|
2019-06-25 11:51:55 +03:00
|
|
|
// TODO(roasbeef): can happen to to race condition, try again
|
|
|
|
// with recent block height
|
2019-08-05 13:29:16 +03:00
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// TODO(joostjager): can also happen because a node delayed
|
|
|
|
// deliberately. What to penalize?
|
|
|
|
i.finalFailureReason = &reasonIncorrectDetails
|
|
|
|
|
|
|
|
default:
|
|
|
|
// All other errors are considered terminal if coming from the
|
|
|
|
// final hop. They indicate that something is wrong at the
|
|
|
|
// recipient, so we do apply a penalty.
|
|
|
|
i.failNode(route, n)
|
2019-07-29 15:20:06 +03:00
|
|
|
|
|
|
|
// Other channels in the route forwarded correctly.
|
|
|
|
if n > 2 {
|
|
|
|
i.successPairRange(route, 0, n-2)
|
|
|
|
}
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
i.finalFailureReason = &reasonError
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// processPaymentOutcomeIntermediate handles failures sent by an intermediate
|
|
|
|
// hop.
|
|
|
|
func (i *interpretedResult) processPaymentOutcomeIntermediate(
|
|
|
|
route *route.Route, errorSourceIdx int,
|
|
|
|
failure lnwire.FailureMessage) {
|
|
|
|
|
|
|
|
reportOutgoing := func() {
|
|
|
|
i.failPair(
|
|
|
|
route, errorSourceIdx,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
reportOutgoingBalance := func() {
|
|
|
|
i.failPairBalance(
|
|
|
|
route, errorSourceIdx,
|
|
|
|
)
|
2019-07-29 15:20:06 +03:00
|
|
|
|
|
|
|
// All nodes up to the failing pair must have forwarded
|
|
|
|
// successfully.
|
|
|
|
i.successPairRange(route, 0, errorSourceIdx-1)
|
2019-06-25 11:51:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
reportIncoming := func() {
|
|
|
|
// We trust ourselves. If the error comes from the first hop, we
|
|
|
|
// can penalize the whole node. In that case there is no
|
|
|
|
// uncertainty as to which node to blame.
|
|
|
|
if errorSourceIdx == 1 {
|
|
|
|
i.failNode(route, errorSourceIdx)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise report the incoming pair.
|
|
|
|
i.failPair(
|
|
|
|
route, errorSourceIdx-1,
|
|
|
|
)
|
2019-07-29 15:20:06 +03:00
|
|
|
|
|
|
|
// All nodes up to the failing pair must have forwarded
|
|
|
|
// successfully.
|
2019-10-31 07:18:52 +03:00
|
|
|
if errorSourceIdx > 1 {
|
2019-07-29 15:20:06 +03:00
|
|
|
i.successPairRange(route, 0, errorSourceIdx-2)
|
|
|
|
}
|
2019-06-25 11:51:55 +03:00
|
|
|
}
|
|
|
|
|
2019-10-31 07:20:08 +03:00
|
|
|
reportNode := func() {
|
|
|
|
// Fail only the node that reported the failure.
|
|
|
|
i.failNode(route, errorSourceIdx)
|
|
|
|
|
|
|
|
// Other preceding channels in the route forwarded correctly.
|
|
|
|
if errorSourceIdx > 1 {
|
|
|
|
i.successPairRange(route, 0, errorSourceIdx-2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
reportAll := func() {
|
|
|
|
// We trust ourselves. If the error comes from the first hop, we
|
|
|
|
// can penalize the whole node. In that case there is no
|
|
|
|
// uncertainty as to which node to blame.
|
|
|
|
if errorSourceIdx == 1 {
|
|
|
|
i.failNode(route, errorSourceIdx)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise penalize all pairs up to the error source. This
|
|
|
|
// includes our own outgoing connection.
|
|
|
|
i.failPairRange(
|
|
|
|
route, 0, errorSourceIdx-1,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch failure.(type) {
|
|
|
|
|
|
|
|
// If a node reports onion payload corruption or an invalid version,
|
|
|
|
// that node may be responsible, but it could also be that it is just
|
|
|
|
// relaying a malformed htlc failure from it successor. By reporting the
|
|
|
|
// outgoing channel set, we will surely hit the responsible node. At
|
|
|
|
// this point, it is not possible that the node's predecessor corrupted
|
|
|
|
// the onion blob. If the predecessor would have corrupted the payload,
|
|
|
|
// the error source wouldn't have been able to encrypt this failure
|
|
|
|
// message for us.
|
|
|
|
case *lnwire.FailInvalidOnionVersion,
|
|
|
|
*lnwire.FailInvalidOnionHmac,
|
|
|
|
*lnwire.FailInvalidOnionKey:
|
|
|
|
|
|
|
|
reportOutgoing()
|
|
|
|
|
2019-10-31 07:20:08 +03:00
|
|
|
// If InvalidOnionPayload is received, we penalize only the reporting
|
|
|
|
// node. We know the preceding hop didn't corrupt the onion, since the
|
|
|
|
// reporting node is able to send the failure. We assume that we
|
|
|
|
// constructed a valid onion payload and that the failure is most likely
|
|
|
|
// an unknown required type or a bug in their implementation.
|
|
|
|
case *lnwire.InvalidOnionPayload:
|
|
|
|
reportNode()
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// If the next hop in the route wasn't known or offline, we'll only
|
|
|
|
// penalize the channel set which we attempted to route over. This is
|
|
|
|
// conservative, and it can handle faulty channels between nodes
|
|
|
|
// properly. Additionally, this guards against routing nodes returning
|
|
|
|
// errors in order to attempt to black list another node.
|
2019-08-05 13:29:16 +03:00
|
|
|
case *lnwire.FailUnknownNextPeer:
|
2019-06-25 11:51:55 +03:00
|
|
|
reportOutgoing()
|
|
|
|
|
|
|
|
// If we get a permanent channel, we'll prune the channel set in both
|
|
|
|
// directions and continue with the rest of the routes.
|
2019-08-05 13:29:16 +03:00
|
|
|
case *lnwire.FailPermanentChannelFailure:
|
2019-06-25 11:51:55 +03:00
|
|
|
reportOutgoing()
|
|
|
|
|
|
|
|
// When an HTLC parameter is incorrect, the node sending the error may
|
|
|
|
// be doing something wrong. But it could also be that its predecessor
|
|
|
|
// is intentionally modifying the htlc parameters that we instructed it
|
|
|
|
// via the hop payload. Therefore we penalize the incoming node pair. A
|
|
|
|
// third cause of this error may be that we have an out of date channel
|
|
|
|
// update. This is handled by the second chance logic up in mission
|
|
|
|
// control.
|
|
|
|
case *lnwire.FailAmountBelowMinimum,
|
|
|
|
*lnwire.FailFeeInsufficient,
|
|
|
|
*lnwire.FailIncorrectCltvExpiry,
|
|
|
|
*lnwire.FailChannelDisabled:
|
|
|
|
|
|
|
|
// Set the node pair for which a channel update may be out of
|
|
|
|
// date. The second chance logic uses the policyFailure field.
|
|
|
|
i.policyFailure = &DirectedNodePair{
|
|
|
|
From: route.Hops[errorSourceIdx-1].PubKeyBytes,
|
|
|
|
To: route.Hops[errorSourceIdx].PubKeyBytes,
|
|
|
|
}
|
|
|
|
|
|
|
|
// We report incoming channel. If a second pair is granted in
|
|
|
|
// mission control, this report is ignored.
|
|
|
|
reportIncoming()
|
|
|
|
|
|
|
|
// If the outgoing channel doesn't have enough capacity, we penalize.
|
|
|
|
// But we penalize only in a single direction and only for amounts
|
|
|
|
// greater than the attempted amount.
|
|
|
|
case *lnwire.FailTemporaryChannelFailure:
|
|
|
|
reportOutgoingBalance()
|
2019-08-05 13:29:16 +03:00
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// If FailExpiryTooSoon is received, there must have been some delay
|
|
|
|
// along the path. We can't know which node is causing the delay, so we
|
|
|
|
// penalize all of them up to the error source.
|
|
|
|
//
|
|
|
|
// Alternatively it could also be that we ourselves have fallen behind
|
|
|
|
// somehow. We ignore that case for now.
|
|
|
|
case *lnwire.FailExpiryTooSoon:
|
|
|
|
reportAll()
|
|
|
|
|
|
|
|
// In all other cases, we penalize the reporting node. These are all
|
|
|
|
// failures that should not happen.
|
2019-08-05 13:29:16 +03:00
|
|
|
default:
|
2019-06-25 11:51:55 +03:00
|
|
|
i.failNode(route, errorSourceIdx)
|
2019-08-05 13:29:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-05 15:07:25 +03:00
|
|
|
// processPaymentOutcomeUnknown processes a payment outcome for which no failure
|
|
|
|
// message or source is available.
|
|
|
|
func (i *interpretedResult) processPaymentOutcomeUnknown(route *route.Route) {
|
|
|
|
n := len(route.Hops)
|
|
|
|
|
|
|
|
// If this is a direct payment, the destination must be at fault.
|
|
|
|
if n == 1 {
|
|
|
|
i.failNode(route, n)
|
|
|
|
i.finalFailureReason = &reasonError
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise penalize all channels in the route to make sure the
|
|
|
|
// responsible node is at least hit too. We even penalize the connection
|
|
|
|
// to our own peer, because that peer could also be responsible.
|
|
|
|
i.failPairRange(route, 0, n-1)
|
|
|
|
}
|
|
|
|
|
2019-09-04 17:26:18 +03:00
|
|
|
// failNode marks the node indicated by idx in the route as failed. It also
|
|
|
|
// marks the incoming and outgoing channels of the node as failed. This function
|
|
|
|
// intentionally panics when the self node is failed.
|
2019-08-05 15:07:25 +03:00
|
|
|
func (i *interpretedResult) failNode(rt *route.Route, idx int) {
|
2019-09-04 17:26:18 +03:00
|
|
|
// Mark the node as failing.
|
2019-08-05 15:07:25 +03:00
|
|
|
i.nodeFailure = &rt.Hops[idx-1].PubKeyBytes
|
2019-09-04 17:26:18 +03:00
|
|
|
|
|
|
|
// Mark the incoming connection as failed for the node. We intent to
|
|
|
|
// penalize as much as we can for a node level failure, including future
|
|
|
|
// outgoing traffic for this connection. The pair as it is returned by
|
|
|
|
// getPair is directed towards the failed node. Therefore we first
|
|
|
|
// reverse the pair. We don't want to affect the score of the node
|
|
|
|
// sending towards the failing node.
|
|
|
|
incomingChannelIdx := idx - 1
|
|
|
|
inPair, _ := getPair(rt, incomingChannelIdx)
|
|
|
|
i.pairResults[inPair.Reverse()] = failPairResult(0)
|
|
|
|
|
|
|
|
// If not the ultimate node, mark the outgoing connection as failed for
|
|
|
|
// the node.
|
|
|
|
if idx < len(rt.Hops) {
|
|
|
|
outgoingChannelIdx := idx
|
|
|
|
outPair, _ := getPair(rt, outgoingChannelIdx)
|
|
|
|
i.pairResults[outPair] = failPairResult(0)
|
|
|
|
}
|
2019-08-05 15:07:25 +03:00
|
|
|
}
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// failPairRange marks the node pairs from node fromIdx to node toIdx as failed
|
|
|
|
// in both direction.
|
2019-08-05 15:07:25 +03:00
|
|
|
func (i *interpretedResult) failPairRange(
|
|
|
|
rt *route.Route, fromIdx, toIdx int) {
|
|
|
|
|
|
|
|
for idx := fromIdx; idx <= toIdx; idx++ {
|
|
|
|
i.failPair(rt, idx)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// failPair marks a pair as failed in both directions.
|
|
|
|
func (i *interpretedResult) failPair(
|
|
|
|
rt *route.Route, idx int) {
|
|
|
|
|
|
|
|
pair, _ := getPair(rt, idx)
|
|
|
|
|
|
|
|
// Report pair in both directions without a minimum penalization amount.
|
2019-09-30 20:45:49 +03:00
|
|
|
i.pairResults[pair] = failPairResult(0)
|
|
|
|
i.pairResults[pair.Reverse()] = failPairResult(0)
|
2019-08-05 15:07:25 +03:00
|
|
|
}
|
|
|
|
|
2019-06-25 11:51:55 +03:00
|
|
|
// failPairBalance marks a pair as failed with a minimum penalization amount.
|
|
|
|
func (i *interpretedResult) failPairBalance(
|
|
|
|
rt *route.Route, channelIdx int) {
|
|
|
|
|
|
|
|
pair, amt := getPair(rt, channelIdx)
|
|
|
|
|
2019-09-30 20:45:49 +03:00
|
|
|
i.pairResults[pair] = failPairResult(amt)
|
2019-07-29 15:20:06 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// successPairRange marks the node pairs from node fromIdx to node toIdx as
|
|
|
|
// succeeded.
|
|
|
|
func (i *interpretedResult) successPairRange(
|
|
|
|
rt *route.Route, fromIdx, toIdx int) {
|
|
|
|
|
|
|
|
for idx := fromIdx; idx <= toIdx; idx++ {
|
|
|
|
pair, _ := getPair(rt, idx)
|
|
|
|
|
2019-09-30 20:45:49 +03:00
|
|
|
i.pairResults[pair] = successPairResult()
|
2019-07-29 15:20:06 +03:00
|
|
|
}
|
2019-06-25 11:51:55 +03:00
|
|
|
}
|
|
|
|
|
2019-08-05 15:07:25 +03:00
|
|
|
// getPair returns a node pair from the route and the amount passed between that
|
|
|
|
// pair.
|
|
|
|
func getPair(rt *route.Route, channelIdx int) (DirectedNodePair,
|
|
|
|
lnwire.MilliSatoshi) {
|
|
|
|
|
|
|
|
nodeTo := rt.Hops[channelIdx].PubKeyBytes
|
|
|
|
var (
|
|
|
|
nodeFrom route.Vertex
|
|
|
|
amt lnwire.MilliSatoshi
|
|
|
|
)
|
|
|
|
|
|
|
|
if channelIdx == 0 {
|
|
|
|
nodeFrom = rt.SourcePubKey
|
|
|
|
amt = rt.TotalAmount
|
|
|
|
} else {
|
|
|
|
nodeFrom = rt.Hops[channelIdx-1].PubKeyBytes
|
|
|
|
amt = rt.Hops[channelIdx-1].AmtToForward
|
|
|
|
}
|
|
|
|
|
|
|
|
pair := NewDirectedNodePair(nodeFrom, nodeTo)
|
|
|
|
|
|
|
|
return pair, amt
|
|
|
|
}
|