2018-01-19 00:54:52 +03:00
|
|
|
package contractcourt
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"sync"
|
2018-01-20 04:12:08 +03:00
|
|
|
"sync/atomic"
|
2018-11-20 17:09:46 +03:00
|
|
|
"time"
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-07-12 12:02:52 +03:00
|
|
|
"github.com/btcsuite/btcd/btcec"
|
2018-06-05 04:34:16 +03:00
|
|
|
"github.com/btcsuite/btcd/chaincfg"
|
|
|
|
"github.com/btcsuite/btcd/txscript"
|
|
|
|
"github.com/btcsuite/btcd/wire"
|
|
|
|
"github.com/btcsuite/btcutil"
|
2018-07-12 12:02:52 +03:00
|
|
|
"github.com/davecgh/go-spew/spew"
|
|
|
|
"github.com/lightningnetwork/lnd/chainntnfs"
|
|
|
|
"github.com/lightningnetwork/lnd/channeldb"
|
2019-01-16 17:47:43 +03:00
|
|
|
"github.com/lightningnetwork/lnd/input"
|
2018-07-12 12:02:52 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnwallet"
|
2018-01-19 00:54:52 +03:00
|
|
|
)
|
|
|
|
|
2018-11-20 17:09:46 +03:00
|
|
|
const (
|
|
|
|
// minCommitPointPollTimeout is the minimum time we'll wait before
|
|
|
|
// polling the database for a channel's commitpoint.
|
|
|
|
minCommitPointPollTimeout = 1 * time.Second
|
|
|
|
|
|
|
|
// maxCommitPointPollTimeout is the maximum time we'll wait before
|
|
|
|
// polling the database for a channel's commitpoint.
|
|
|
|
maxCommitPointPollTimeout = 10 * time.Minute
|
|
|
|
)
|
|
|
|
|
2018-03-16 16:08:37 +03:00
|
|
|
// LocalUnilateralCloseInfo encapsulates all the informnation we need to act
|
|
|
|
// on a local force close that gets confirmed.
|
|
|
|
type LocalUnilateralCloseInfo struct {
|
|
|
|
*chainntnfs.SpendDetail
|
|
|
|
*lnwallet.LocalForceCloseSummary
|
2018-08-21 13:21:15 +03:00
|
|
|
*channeldb.ChannelCloseSummary
|
2018-03-16 16:08:37 +03:00
|
|
|
}
|
|
|
|
|
2018-08-21 13:21:15 +03:00
|
|
|
// CooperativeCloseInfo encapsulates all the informnation we need to act
|
|
|
|
// on a cooperative close that gets confirmed.
|
|
|
|
type CooperativeCloseInfo struct {
|
|
|
|
*channeldb.ChannelCloseSummary
|
|
|
|
}
|
|
|
|
|
2018-01-19 00:54:52 +03:00
|
|
|
// ChainEventSubscription is a struct that houses a subscription to be notified
|
|
|
|
// for any on-chain events related to a channel. There are three types of
|
|
|
|
// possible on-chain events: a cooperative channel closure, a unilateral
|
|
|
|
// channel closure, and a channel breach. The fourth type: a force close is
|
|
|
|
// locally initiated, so we don't provide any event stream for said event.
|
|
|
|
type ChainEventSubscription struct {
|
2018-01-20 04:12:08 +03:00
|
|
|
// ChanPoint is that channel that chain events will be dispatched for.
|
2018-01-19 00:54:52 +03:00
|
|
|
ChanPoint wire.OutPoint
|
|
|
|
|
2018-03-16 16:08:37 +03:00
|
|
|
// RemoteUnilateralClosure is a channel that will be sent upon in the
|
|
|
|
// event that the remote party's commitment transaction is confirmed.
|
|
|
|
RemoteUnilateralClosure chan *lnwallet.UnilateralCloseSummary
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-03-16 16:08:37 +03:00
|
|
|
// LocalUnilateralClosure is a channel that will be sent upon in the
|
|
|
|
// event that our commitment transaction is confirmed.
|
|
|
|
LocalUnilateralClosure chan *LocalUnilateralCloseInfo
|
|
|
|
|
|
|
|
// CooperativeClosure is a signal that will be sent upon once a
|
|
|
|
// cooperative channel closure has been detected confirmed.
|
2018-08-21 13:21:15 +03:00
|
|
|
CooperativeClosure chan *CooperativeCloseInfo
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
// ContractBreach is a channel that will be sent upon if we detect a
|
|
|
|
// contract breach. The struct sent across the channel contains all the
|
|
|
|
// material required to bring the cheating channel peer to justice.
|
|
|
|
ContractBreach chan *lnwallet.BreachRetribution
|
|
|
|
|
|
|
|
// Cancel cancels the subscription to the event stream for a particular
|
|
|
|
// channel. This method should be called once the caller no longer needs to
|
|
|
|
// be notified of any on-chain events for a particular channel.
|
|
|
|
Cancel func()
|
|
|
|
}
|
|
|
|
|
2018-04-19 14:05:05 +03:00
|
|
|
// chainWatcherConfig encapsulates all the necessary functions and interfaces
|
|
|
|
// needed to watch and act on on-chain events for a particular channel.
|
|
|
|
type chainWatcherConfig struct {
|
2018-01-19 00:54:52 +03:00
|
|
|
// chanState is a snapshot of the persistent state of the channel that
|
|
|
|
// we're watching. In the event of an on-chain event, we'll query the
|
|
|
|
// database to ensure that we act using the most up to date state.
|
|
|
|
chanState *channeldb.OpenChannel
|
|
|
|
|
|
|
|
// notifier is a reference to the channel notifier that we'll use to be
|
|
|
|
// notified of output spends and when transactions are confirmed.
|
|
|
|
notifier chainntnfs.ChainNotifier
|
|
|
|
|
|
|
|
// pCache is a reference to the shared preimage cache. We'll use this
|
|
|
|
// to see if we can settle any incoming HTLC's during a remote
|
|
|
|
// commitment close event.
|
|
|
|
pCache WitnessBeacon
|
|
|
|
|
|
|
|
// signer is the main signer instances that will be responsible for
|
|
|
|
// signing any HTLC and commitment transaction generated by the state
|
|
|
|
// machine.
|
2019-01-16 17:47:43 +03:00
|
|
|
signer input.Signer
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-18 14:41:03 +03:00
|
|
|
// contractBreach is a method that will be called by the watcher if it
|
|
|
|
// detects that a contract breach transaction has been confirmed. Only
|
|
|
|
// when this method returns with a non-nil error it will be safe to mark
|
|
|
|
// the channel as pending close in the database.
|
|
|
|
contractBreach func(*lnwallet.BreachRetribution) error
|
|
|
|
|
2018-04-19 14:05:05 +03:00
|
|
|
// isOurAddr is a function that returns true if the passed address is
|
|
|
|
// known to us.
|
|
|
|
isOurAddr func(btcutil.Address) bool
|
|
|
|
}
|
|
|
|
|
|
|
|
// chainWatcher is a system that's assigned to every active channel. The duty
|
|
|
|
// of this system is to watch the chain for spends of the channels chan point.
|
|
|
|
// If a spend is detected then with chain watcher will notify all subscribers
|
|
|
|
// that the channel has been closed, and also give them the materials necessary
|
|
|
|
// to sweep the funds of the channel on chain eventually.
|
|
|
|
type chainWatcher struct {
|
2018-06-01 01:41:41 +03:00
|
|
|
started int32 // To be used atomically.
|
|
|
|
stopped int32 // To be used atomically.
|
2018-04-19 14:05:05 +03:00
|
|
|
|
|
|
|
quit chan struct{}
|
|
|
|
wg sync.WaitGroup
|
|
|
|
|
|
|
|
cfg chainWatcherConfig
|
|
|
|
|
|
|
|
// stateHintObfuscator is a 48-bit state hint that's used to obfuscate
|
|
|
|
// the current state number on the commitment transactions.
|
|
|
|
stateHintObfuscator [lnwallet.StateHintSize]byte
|
|
|
|
|
2018-01-19 00:54:52 +03:00
|
|
|
// All the fields below are protected by this mutex.
|
2018-01-21 07:25:54 +03:00
|
|
|
sync.Mutex
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
// clientID is an ephemeral counter used to keep track of each
|
|
|
|
// individual client subscription.
|
|
|
|
clientID uint64
|
|
|
|
|
|
|
|
// clientSubscriptions is a map that keeps track of all the active
|
|
|
|
// client subscriptions for events related to this channel.
|
|
|
|
clientSubscriptions map[uint64]*ChainEventSubscription
|
|
|
|
}
|
|
|
|
|
|
|
|
// newChainWatcher returns a new instance of a chainWatcher for a channel given
|
|
|
|
// the chan point to watch, and also a notifier instance that will allow us to
|
|
|
|
// detect on chain events.
|
2018-04-19 14:05:05 +03:00
|
|
|
func newChainWatcher(cfg chainWatcherConfig) (*chainWatcher, error) {
|
2018-01-19 00:54:52 +03:00
|
|
|
// In order to be able to detect the nature of a potential channel
|
|
|
|
// closure we'll need to reconstruct the state hint bytes used to
|
|
|
|
// obfuscate the commitment state number encoded in the lock time and
|
|
|
|
// sequence fields.
|
|
|
|
var stateHint [lnwallet.StateHintSize]byte
|
2018-04-19 14:05:05 +03:00
|
|
|
chanState := cfg.chanState
|
2018-01-19 00:54:52 +03:00
|
|
|
if chanState.IsInitiator {
|
|
|
|
stateHint = lnwallet.DeriveStateHintObfuscator(
|
2018-02-18 02:29:01 +03:00
|
|
|
chanState.LocalChanCfg.PaymentBasePoint.PubKey,
|
|
|
|
chanState.RemoteChanCfg.PaymentBasePoint.PubKey,
|
2018-01-19 00:54:52 +03:00
|
|
|
)
|
|
|
|
} else {
|
|
|
|
stateHint = lnwallet.DeriveStateHintObfuscator(
|
2018-02-18 02:29:01 +03:00
|
|
|
chanState.RemoteChanCfg.PaymentBasePoint.PubKey,
|
|
|
|
chanState.LocalChanCfg.PaymentBasePoint.PubKey,
|
2018-01-19 00:54:52 +03:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &chainWatcher{
|
2018-04-19 14:05:05 +03:00
|
|
|
cfg: cfg,
|
2018-01-19 00:54:52 +03:00
|
|
|
stateHintObfuscator: stateHint,
|
|
|
|
quit: make(chan struct{}),
|
|
|
|
clientSubscriptions: make(map[uint64]*ChainEventSubscription),
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start starts all goroutines that the chainWatcher needs to perform its
|
|
|
|
// duties.
|
|
|
|
func (c *chainWatcher) Start() error {
|
2018-01-20 04:12:08 +03:00
|
|
|
if !atomic.CompareAndSwapInt32(&c.started, 0, 1) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-19 14:05:05 +03:00
|
|
|
chanState := c.cfg.chanState
|
2018-01-19 00:54:52 +03:00
|
|
|
log.Debugf("Starting chain watcher for ChannelPoint(%v)",
|
2018-04-19 14:05:05 +03:00
|
|
|
chanState.FundingOutpoint)
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
// First, we'll register for a notification to be dispatched if the
|
|
|
|
// funding output is spent.
|
2018-04-19 14:05:05 +03:00
|
|
|
fundingOut := &chanState.FundingOutpoint
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
// As a height hint, we'll try to use the opening height, but if the
|
|
|
|
// channel isn't yet open, then we'll use the height it was broadcast
|
|
|
|
// at.
|
2018-05-02 02:27:20 +03:00
|
|
|
heightHint := c.cfg.chanState.ShortChanID().BlockHeight
|
2018-01-19 00:54:52 +03:00
|
|
|
if heightHint == 0 {
|
2018-04-19 14:05:05 +03:00
|
|
|
heightHint = chanState.FundingBroadcastHeight
|
2018-01-19 00:54:52 +03:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:42:17 +03:00
|
|
|
localKey := chanState.LocalChanCfg.MultiSigKey.PubKey.SerializeCompressed()
|
|
|
|
remoteKey := chanState.RemoteChanCfg.MultiSigKey.PubKey.SerializeCompressed()
|
2019-01-16 17:47:43 +03:00
|
|
|
multiSigScript, err := input.GenMultiSigScript(
|
2018-07-18 05:42:17 +03:00
|
|
|
localKey, remoteKey,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-01-16 17:47:43 +03:00
|
|
|
pkScript, err := input.WitnessScriptHash(multiSigScript)
|
2018-07-18 05:42:17 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-04-19 14:05:05 +03:00
|
|
|
spendNtfn, err := c.cfg.notifier.RegisterSpendNtfn(
|
2018-07-18 05:42:17 +03:00
|
|
|
fundingOut, pkScript, heightHint,
|
2018-01-19 00:54:52 +03:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// With the spend notification obtained, we'll now dispatch the
|
|
|
|
// closeObserver which will properly react to any changes.
|
|
|
|
c.wg.Add(1)
|
|
|
|
go c.closeObserver(spendNtfn)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stop signals the close observer to gracefully exit.
|
|
|
|
func (c *chainWatcher) Stop() error {
|
2018-01-20 04:12:08 +03:00
|
|
|
if !atomic.CompareAndSwapInt32(&c.stopped, 0, 1) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-19 00:54:52 +03:00
|
|
|
close(c.quit)
|
|
|
|
|
|
|
|
c.wg.Wait()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-18 05:02:04 +03:00
|
|
|
// SubscribeChannelEvents returns an active subscription to the set of channel
|
2018-01-19 00:54:52 +03:00
|
|
|
// events for the channel watched by this chain watcher. Once clients no longer
|
|
|
|
// require the subscription, they should call the Cancel() method to allow the
|
2018-04-18 14:41:03 +03:00
|
|
|
// watcher to regain those committed resources.
|
|
|
|
func (c *chainWatcher) SubscribeChannelEvents() *ChainEventSubscription {
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-01-21 07:25:54 +03:00
|
|
|
c.Lock()
|
2018-01-19 00:54:52 +03:00
|
|
|
clientID := c.clientID
|
|
|
|
c.clientID++
|
2018-01-21 07:25:54 +03:00
|
|
|
c.Unlock()
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
log.Debugf("New ChainEventSubscription(id=%v) for ChannelPoint(%v)",
|
2018-04-19 14:05:05 +03:00
|
|
|
clientID, c.cfg.chanState.FundingOutpoint)
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
sub := &ChainEventSubscription{
|
2018-04-19 14:05:05 +03:00
|
|
|
ChanPoint: c.cfg.chanState.FundingOutpoint,
|
2018-03-16 16:08:37 +03:00
|
|
|
RemoteUnilateralClosure: make(chan *lnwallet.UnilateralCloseSummary, 1),
|
|
|
|
LocalUnilateralClosure: make(chan *LocalUnilateralCloseInfo, 1),
|
2018-08-21 13:21:15 +03:00
|
|
|
CooperativeClosure: make(chan *CooperativeCloseInfo, 1),
|
2018-03-16 16:08:37 +03:00
|
|
|
ContractBreach: make(chan *lnwallet.BreachRetribution, 1),
|
2018-01-19 00:54:52 +03:00
|
|
|
Cancel: func() {
|
|
|
|
c.Lock()
|
|
|
|
delete(c.clientSubscriptions, clientID)
|
|
|
|
c.Unlock()
|
|
|
|
return
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2018-01-21 07:25:54 +03:00
|
|
|
c.Lock()
|
2018-01-19 00:54:52 +03:00
|
|
|
c.clientSubscriptions[clientID] = sub
|
2018-01-21 07:25:54 +03:00
|
|
|
c.Unlock()
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
return sub
|
|
|
|
}
|
|
|
|
|
|
|
|
// closeObserver is a dedicated goroutine that will watch for any closes of the
|
|
|
|
// channel that it's watching on chain. In the event of an on-chain event, the
|
|
|
|
// close observer will assembled the proper materials required to claim the
|
|
|
|
// funds of the channel on-chain (if required), then dispatch these as
|
|
|
|
// notifications to all subscribers.
|
|
|
|
func (c *chainWatcher) closeObserver(spendNtfn *chainntnfs.SpendEvent) {
|
|
|
|
defer c.wg.Done()
|
|
|
|
|
|
|
|
log.Infof("Close observer for ChannelPoint(%v) active",
|
2018-04-19 14:05:05 +03:00
|
|
|
c.cfg.chanState.FundingOutpoint)
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
select {
|
|
|
|
// We've detected a spend of the channel onchain! Depending on
|
|
|
|
// the type of spend, we'll act accordingly , so we'll examine
|
|
|
|
// the spending transaction to determine what we should do.
|
|
|
|
//
|
|
|
|
// TODO(Roasbeef): need to be able to ensure this only triggers
|
|
|
|
// on confirmation, to ensure if multiple txns are broadcast, we
|
|
|
|
// act on the one that's timestamped
|
|
|
|
case commitSpend, ok := <-spendNtfn.Spend:
|
|
|
|
// If the channel was closed, then this means that the
|
|
|
|
// notifier exited, so we will as well.
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
// Otherwise, the remote party might have broadcast a
|
|
|
|
// prior revoked state...!!!
|
|
|
|
commitTxBroadcast := commitSpend.SpendingTx
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-19 14:05:05 +03:00
|
|
|
localCommit, remoteCommit, err := c.cfg.chanState.LatestCommitments()
|
2018-04-17 11:08:50 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Unable to fetch channel state for "+
|
2018-04-19 14:05:05 +03:00
|
|
|
"chan_point=%v", c.cfg.chanState.FundingOutpoint)
|
2018-04-17 11:08:50 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// We'll not retrieve the latest sate of the revocation
|
|
|
|
// store so we can populate the information within the
|
|
|
|
// channel state object that we have.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): mutation is bad mkay
|
2018-04-19 14:05:05 +03:00
|
|
|
_, err = c.cfg.chanState.RemoteRevocationStore()
|
2018-04-17 11:08:50 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Unable to fetch revocation state for "+
|
2018-04-19 14:05:05 +03:00
|
|
|
"chan_point=%v", c.cfg.chanState.FundingOutpoint)
|
2018-04-17 11:08:50 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// If this is our commitment transaction, then we can
|
|
|
|
// exit here as we don't have any further processing we
|
|
|
|
// need to do (we can't cheat ourselves :p).
|
|
|
|
commitmentHash := localCommit.CommitTx.TxHash()
|
|
|
|
isOurCommitment := commitSpend.SpenderTxHash.IsEqual(
|
|
|
|
&commitmentHash,
|
|
|
|
)
|
|
|
|
if isOurCommitment {
|
|
|
|
if err := c.dispatchLocalForceClose(
|
|
|
|
commitSpend, *localCommit,
|
|
|
|
); err != nil {
|
|
|
|
log.Errorf("unable to handle local"+
|
|
|
|
"close for chan_point=%v: %v",
|
2018-04-19 14:05:05 +03:00
|
|
|
c.cfg.chanState.FundingOutpoint, err)
|
2018-01-19 00:54:52 +03:00
|
|
|
}
|
2018-04-17 11:08:50 +03:00
|
|
|
return
|
|
|
|
}
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
// Next, we'll check to see if this is a cooperative
|
|
|
|
// channel closure or not. This is characterized by
|
|
|
|
// having an input sequence number that's finalized.
|
|
|
|
// This won't happen with regular commitment
|
|
|
|
// transactions due to the state hint encoding scheme.
|
|
|
|
if commitTxBroadcast.TxIn[0].Sequence == wire.MaxTxInSequenceNum {
|
|
|
|
err := c.dispatchCooperativeClose(commitSpend)
|
2018-01-19 00:54:52 +03:00
|
|
|
if err != nil {
|
2018-04-17 11:08:50 +03:00
|
|
|
log.Errorf("unable to handle co op close: %v", err)
|
2018-01-19 00:54:52 +03:00
|
|
|
}
|
2018-04-17 11:08:50 +03:00
|
|
|
return
|
|
|
|
}
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
log.Warnf("Unprompted commitment broadcast for "+
|
2018-04-19 14:05:05 +03:00
|
|
|
"ChannelPoint(%v) ", c.cfg.chanState.FundingOutpoint)
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
// Decode the state hint encoded within the commitment
|
|
|
|
// transaction to determine if this is a revoked state
|
|
|
|
// or not.
|
|
|
|
obfuscator := c.stateHintObfuscator
|
|
|
|
broadcastStateNum := lnwallet.GetStateNumHint(
|
|
|
|
commitTxBroadcast, obfuscator,
|
|
|
|
)
|
|
|
|
remoteStateNum := remoteCommit.CommitHeight
|
|
|
|
|
2018-04-30 01:42:01 +03:00
|
|
|
remoteChainTip, err := c.cfg.chanState.RemoteCommitChainTip()
|
|
|
|
if err != nil && err != channeldb.ErrNoPendingCommit {
|
|
|
|
log.Errorf("unable to obtain chain tip for "+
|
|
|
|
"ChannelPoint(%v): %v",
|
|
|
|
c.cfg.chanState.FundingOutpoint, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
switch {
|
|
|
|
// If state number spending transaction matches the
|
|
|
|
// current latest state, then they've initiated a
|
|
|
|
// unilateral close. So we'll trigger the unilateral
|
|
|
|
// close signal so subscribers can clean up the state
|
|
|
|
// as necessary.
|
2018-04-30 01:42:01 +03:00
|
|
|
case broadcastStateNum == remoteStateNum:
|
|
|
|
err := c.dispatchRemoteForceClose(
|
2018-07-12 12:02:52 +03:00
|
|
|
commitSpend, *remoteCommit,
|
|
|
|
c.cfg.chanState.RemoteCurrentRevocation,
|
2018-04-30 01:42:01 +03:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable to handle remote "+
|
|
|
|
"close for chan_point=%v: %v",
|
|
|
|
c.cfg.chanState.FundingOutpoint, err)
|
|
|
|
}
|
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
// We'll also handle the case of the remote party
|
|
|
|
// broadcasting their commitment transaction which is
|
|
|
|
// one height above ours. This case can arise when we
|
|
|
|
// initiate a state transition, but the remote party
|
|
|
|
// has a fail crash _after_ accepting the new state,
|
|
|
|
// but _before_ sending their signature to us.
|
2018-04-30 01:42:01 +03:00
|
|
|
case broadcastStateNum == remoteStateNum+1 &&
|
|
|
|
remoteChainTip != nil:
|
|
|
|
|
|
|
|
err := c.dispatchRemoteForceClose(
|
|
|
|
commitSpend, remoteChainTip.Commitment,
|
2018-07-12 12:02:52 +03:00
|
|
|
c.cfg.chanState.RemoteNextRevocation,
|
2018-04-30 01:42:01 +03:00
|
|
|
)
|
|
|
|
if err != nil {
|
2018-04-17 11:08:50 +03:00
|
|
|
log.Errorf("unable to handle remote "+
|
|
|
|
"close for chan_point=%v: %v",
|
2018-04-19 14:05:05 +03:00
|
|
|
c.cfg.chanState.FundingOutpoint, err)
|
2018-01-20 04:12:08 +03:00
|
|
|
}
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-07-12 12:02:54 +03:00
|
|
|
// This is the case that somehow the commitment broadcast is
|
|
|
|
// actually greater than even one beyond our best known state
|
|
|
|
// number. This should ONLY happen in case we experienced some
|
|
|
|
// sort of data loss.
|
2018-04-30 01:42:01 +03:00
|
|
|
case broadcastStateNum > remoteStateNum+1:
|
2018-07-12 12:02:54 +03:00
|
|
|
log.Warnf("Remote node broadcast state #%v, "+
|
2018-04-30 01:42:01 +03:00
|
|
|
"which is more than 1 beyond best known "+
|
2018-07-12 12:02:54 +03:00
|
|
|
"state #%v!!! Attempting recovery...",
|
|
|
|
broadcastStateNum, remoteStateNum)
|
|
|
|
|
|
|
|
// If we are lucky, the remote peer sent us the correct
|
|
|
|
// commitment point during channel sync, such that we
|
2018-11-20 17:09:46 +03:00
|
|
|
// can sweep our funds. If we cannot find the commit
|
|
|
|
// point, there's not much we can do other than wait
|
|
|
|
// for us to retrieve it. We will attempt to retrieve
|
|
|
|
// it from the peer each time we connect to it.
|
|
|
|
// TODO(halseth): actively initiate re-connection to
|
|
|
|
// the peer?
|
|
|
|
var commitPoint *btcec.PublicKey
|
|
|
|
backoff := minCommitPointPollTimeout
|
|
|
|
for {
|
|
|
|
commitPoint, err = c.cfg.chanState.DataLossCommitPoint()
|
|
|
|
if err == nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
2018-07-12 12:02:54 +03:00
|
|
|
log.Errorf("Unable to retrieve commitment "+
|
|
|
|
"point for channel(%v) with lost "+
|
2018-11-20 17:09:46 +03:00
|
|
|
"state: %v. Retrying in %v.",
|
|
|
|
c.cfg.chanState.FundingOutpoint,
|
|
|
|
err, backoff)
|
|
|
|
|
|
|
|
select {
|
|
|
|
// Wait before retrying, with an exponential
|
|
|
|
// backoff.
|
|
|
|
case <-time.After(backoff):
|
|
|
|
backoff = 2 * backoff
|
|
|
|
if backoff > maxCommitPointPollTimeout {
|
|
|
|
backoff = maxCommitPointPollTimeout
|
|
|
|
}
|
|
|
|
|
|
|
|
case <-c.quit:
|
|
|
|
return
|
|
|
|
}
|
2018-07-12 12:02:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
log.Infof("Recovered commit point(%x) for "+
|
|
|
|
"channel(%v)! Now attempting to use it to "+
|
|
|
|
"sweep our funds...",
|
|
|
|
commitPoint.SerializeCompressed(),
|
|
|
|
c.cfg.chanState.FundingOutpoint)
|
|
|
|
|
|
|
|
// Since we don't have the commitment stored for this
|
|
|
|
// state, we'll just pass an empty commitment. Note
|
|
|
|
// that this means we won't be able to recover any HTLC
|
|
|
|
// funds.
|
|
|
|
// TODO(halseth): can we try to recover some HTLCs?
|
|
|
|
err = c.dispatchRemoteForceClose(
|
|
|
|
commitSpend, channeldb.ChannelCommitment{},
|
|
|
|
commitPoint,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable to handle remote "+
|
|
|
|
"close for chan_point=%v: %v",
|
|
|
|
c.cfg.chanState.FundingOutpoint, err)
|
|
|
|
}
|
2018-04-30 01:42:01 +03:00
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
// If the state number broadcast is lower than the
|
|
|
|
// remote node's current un-revoked height, then
|
|
|
|
// THEY'RE ATTEMPTING TO VIOLATE THE CONTRACT LAID OUT
|
|
|
|
// WITHIN THE PAYMENT CHANNEL. Therefore we close the
|
|
|
|
// signal indicating a revoked broadcast to allow
|
2018-04-30 01:42:01 +03:00
|
|
|
// subscribers to swiftly dispatch justice!!!
|
2018-04-17 11:08:50 +03:00
|
|
|
case broadcastStateNum < remoteStateNum:
|
2018-04-30 01:42:01 +03:00
|
|
|
err := c.dispatchContractBreach(
|
2018-04-17 11:08:50 +03:00
|
|
|
commitSpend, remoteCommit,
|
|
|
|
broadcastStateNum,
|
2018-04-30 01:42:01 +03:00
|
|
|
)
|
|
|
|
if err != nil {
|
2018-04-17 11:08:50 +03:00
|
|
|
log.Errorf("unable to handle channel "+
|
|
|
|
"breach for chan_point=%v: %v",
|
2018-04-19 14:05:05 +03:00
|
|
|
c.cfg.chanState.FundingOutpoint, err)
|
2018-01-19 00:54:52 +03:00
|
|
|
}
|
2018-04-17 11:08:50 +03:00
|
|
|
}
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
// Now that a spend has been detected, we've done our
|
|
|
|
// job, so we'll exit immediately.
|
|
|
|
return
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-17 11:08:50 +03:00
|
|
|
// The chainWatcher has been signalled to exit, so we'll do so now.
|
|
|
|
case <-c.quit:
|
|
|
|
return
|
2018-01-19 00:54:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-20 04:12:08 +03:00
|
|
|
// toSelfAmount takes a transaction and returns the sum of all outputs that pay
|
|
|
|
// to a script that the wallet controls. If no outputs pay to us, then we
|
|
|
|
// return zero. This is possible as our output may have been trimmed due to
|
|
|
|
// being dust.
|
|
|
|
func (c *chainWatcher) toSelfAmount(tx *wire.MsgTx) btcutil.Amount {
|
|
|
|
var selfAmt btcutil.Amount
|
|
|
|
for _, txOut := range tx.TxOut {
|
|
|
|
_, addrs, _, err := txscript.ExtractPkScriptAddrs(
|
|
|
|
// Doesn't matter what net we actually pass in.
|
|
|
|
txOut.PkScript, &chaincfg.TestNet3Params,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, addr := range addrs {
|
2018-04-19 14:05:05 +03:00
|
|
|
if c.cfg.isOurAddr(addr) {
|
2018-01-20 04:12:08 +03:00
|
|
|
selfAmt += btcutil.Amount(txOut.Value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return selfAmt
|
|
|
|
}
|
|
|
|
|
|
|
|
// dispatchCooperativeClose processed a detect cooperative channel closure.
|
|
|
|
// We'll use the spending transaction to locate our output within the
|
|
|
|
// transaction, then clean up the database state. We'll also dispatch a
|
|
|
|
// notification to all subscribers that the channel has been closed in this
|
|
|
|
// manner.
|
|
|
|
func (c *chainWatcher) dispatchCooperativeClose(commitSpend *chainntnfs.SpendDetail) error {
|
|
|
|
broadcastTx := commitSpend.SpendingTx
|
|
|
|
|
|
|
|
log.Infof("Cooperative closure for ChannelPoint(%v): %v",
|
2018-04-19 14:05:05 +03:00
|
|
|
c.cfg.chanState.FundingOutpoint, spew.Sdump(broadcastTx))
|
2018-01-20 04:12:08 +03:00
|
|
|
|
|
|
|
// If the input *is* final, then we'll check to see which output is
|
|
|
|
// ours.
|
|
|
|
localAmt := c.toSelfAmount(broadcastTx)
|
|
|
|
|
2018-05-22 15:26:02 +03:00
|
|
|
// Once this is known, we'll mark the state as fully closed in the
|
|
|
|
// database. We can do this as a cooperatively closed channel has all
|
|
|
|
// its outputs resolved after only one confirmation.
|
2018-01-20 04:12:08 +03:00
|
|
|
closeSummary := &channeldb.ChannelCloseSummary{
|
2018-08-14 05:17:36 +03:00
|
|
|
ChanPoint: c.cfg.chanState.FundingOutpoint,
|
|
|
|
ChainHash: c.cfg.chanState.ChainHash,
|
|
|
|
ClosingTXID: *commitSpend.SpenderTxHash,
|
|
|
|
RemotePub: c.cfg.chanState.IdentityPub,
|
|
|
|
Capacity: c.cfg.chanState.Capacity,
|
|
|
|
CloseHeight: uint32(commitSpend.SpendingHeight),
|
|
|
|
SettledBalance: localAmt,
|
|
|
|
CloseType: channeldb.CooperativeClose,
|
|
|
|
ShortChanID: c.cfg.chanState.ShortChanID(),
|
2018-08-21 13:21:15 +03:00
|
|
|
IsPending: true,
|
2018-08-14 05:17:36 +03:00
|
|
|
RemoteCurrentRevocation: c.cfg.chanState.RemoteCurrentRevocation,
|
|
|
|
RemoteNextRevocation: c.cfg.chanState.RemoteNextRevocation,
|
|
|
|
LocalChanConfig: c.cfg.chanState.LocalChanCfg,
|
2018-01-20 04:12:08 +03:00
|
|
|
}
|
|
|
|
|
2018-11-20 17:09:45 +03:00
|
|
|
// Attempt to add a channel sync message to the close summary.
|
|
|
|
chanSync, err := lnwallet.ChanSyncMsg(c.cfg.chanState)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("ChannelPoint(%v): unable to create channel sync "+
|
|
|
|
"message: %v", c.cfg.chanState.FundingOutpoint, err)
|
|
|
|
} else {
|
|
|
|
closeSummary.LastChanSyncMsg = chanSync
|
|
|
|
}
|
|
|
|
|
2018-08-21 13:21:15 +03:00
|
|
|
// Create a summary of all the information needed to handle the
|
|
|
|
// cooperative closure.
|
|
|
|
closeInfo := &CooperativeCloseInfo{
|
|
|
|
ChannelCloseSummary: closeSummary,
|
|
|
|
}
|
2018-01-20 04:12:08 +03:00
|
|
|
|
2018-08-21 13:21:15 +03:00
|
|
|
// With the event processed, we'll now notify all subscribers of the
|
|
|
|
// event.
|
2018-01-20 04:12:08 +03:00
|
|
|
c.Lock()
|
|
|
|
for _, sub := range c.clientSubscriptions {
|
|
|
|
select {
|
2018-08-21 13:21:15 +03:00
|
|
|
case sub.CooperativeClosure <- closeInfo:
|
2018-01-20 04:12:08 +03:00
|
|
|
case <-c.quit:
|
2018-04-12 00:50:05 +03:00
|
|
|
c.Unlock()
|
2018-01-20 04:12:08 +03:00
|
|
|
return fmt.Errorf("exiting")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-03-16 16:08:37 +03:00
|
|
|
// dispatchLocalForceClose processes a unilateral close by us being confirmed.
|
|
|
|
func (c *chainWatcher) dispatchLocalForceClose(
|
|
|
|
commitSpend *chainntnfs.SpendDetail,
|
|
|
|
localCommit channeldb.ChannelCommitment) error {
|
|
|
|
|
|
|
|
log.Infof("Local unilateral close of ChannelPoint(%v) "+
|
2018-04-19 14:05:05 +03:00
|
|
|
"detected", c.cfg.chanState.FundingOutpoint)
|
2018-03-16 16:08:37 +03:00
|
|
|
|
|
|
|
forceClose, err := lnwallet.NewLocalForceCloseSummary(
|
2018-04-19 14:05:05 +03:00
|
|
|
c.cfg.chanState, c.cfg.signer, c.cfg.pCache,
|
|
|
|
commitSpend.SpendingTx, localCommit,
|
2018-03-16 16:08:37 +03:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-03-27 15:06:34 +03:00
|
|
|
// As we've detected that the channel has been closed, immediately
|
2018-08-21 13:21:15 +03:00
|
|
|
// creating a close summary for future usage by related sub-systems.
|
2018-03-27 15:06:34 +03:00
|
|
|
chanSnapshot := forceClose.ChanSnapshot
|
|
|
|
closeSummary := &channeldb.ChannelCloseSummary{
|
2018-08-14 05:17:36 +03:00
|
|
|
ChanPoint: chanSnapshot.ChannelPoint,
|
|
|
|
ChainHash: chanSnapshot.ChainHash,
|
|
|
|
ClosingTXID: forceClose.CloseTx.TxHash(),
|
|
|
|
RemotePub: &chanSnapshot.RemoteIdentity,
|
|
|
|
Capacity: chanSnapshot.Capacity,
|
|
|
|
CloseType: channeldb.LocalForceClose,
|
|
|
|
IsPending: true,
|
|
|
|
ShortChanID: c.cfg.chanState.ShortChanID(),
|
|
|
|
CloseHeight: uint32(commitSpend.SpendingHeight),
|
|
|
|
RemoteCurrentRevocation: c.cfg.chanState.RemoteCurrentRevocation,
|
|
|
|
RemoteNextRevocation: c.cfg.chanState.RemoteNextRevocation,
|
|
|
|
LocalChanConfig: c.cfg.chanState.LocalChanCfg,
|
2018-03-27 15:06:34 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// If our commitment output isn't dust or we have active HTLC's on the
|
|
|
|
// commitment transaction, then we'll populate the balances on the
|
|
|
|
// close channel summary.
|
|
|
|
if forceClose.CommitResolution != nil {
|
|
|
|
closeSummary.SettledBalance = chanSnapshot.LocalBalance.ToSatoshis()
|
|
|
|
closeSummary.TimeLockedBalance = chanSnapshot.LocalBalance.ToSatoshis()
|
|
|
|
}
|
|
|
|
for _, htlc := range forceClose.HtlcResolutions.OutgoingHTLCs {
|
|
|
|
htlcValue := btcutil.Amount(htlc.SweepSignDesc.Output.Value)
|
|
|
|
closeSummary.TimeLockedBalance += htlcValue
|
|
|
|
}
|
|
|
|
|
2018-11-20 17:09:45 +03:00
|
|
|
// Attempt to add a channel sync message to the close summary.
|
|
|
|
chanSync, err := lnwallet.ChanSyncMsg(c.cfg.chanState)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("ChannelPoint(%v): unable to create channel sync "+
|
|
|
|
"message: %v", c.cfg.chanState.FundingOutpoint, err)
|
|
|
|
} else {
|
|
|
|
closeSummary.LastChanSyncMsg = chanSync
|
|
|
|
}
|
|
|
|
|
2018-03-16 16:08:37 +03:00
|
|
|
// With the event processed, we'll now notify all subscribers of the
|
|
|
|
// event.
|
2018-08-21 13:21:15 +03:00
|
|
|
closeInfo := &LocalUnilateralCloseInfo{
|
|
|
|
commitSpend, forceClose, closeSummary,
|
|
|
|
}
|
2018-03-16 16:08:37 +03:00
|
|
|
c.Lock()
|
|
|
|
for _, sub := range c.clientSubscriptions {
|
|
|
|
select {
|
|
|
|
case sub.LocalUnilateralClosure <- closeInfo:
|
|
|
|
case <-c.quit:
|
|
|
|
c.Unlock()
|
|
|
|
return fmt.Errorf("exiting")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-30 01:42:01 +03:00
|
|
|
// dispatchRemoteForceClose processes a detected unilateral channel closure by
|
|
|
|
// the remote party. This function will prepare a UnilateralCloseSummary which
|
|
|
|
// will then be sent to any subscribers allowing them to resolve all our funds
|
|
|
|
// in the channel on chain. Once this close summary is prepared, all registered
|
2018-07-12 12:02:52 +03:00
|
|
|
// subscribers will receive a notification of this event. The commitPoint
|
|
|
|
// argument should be set to the per_commitment_point corresponding to the
|
|
|
|
// spending commitment.
|
|
|
|
//
|
|
|
|
// NOTE: The remoteCommit argument should be set to the stored commitment for
|
|
|
|
// this particular state. If we don't have the commitment stored (should only
|
|
|
|
// happen in case we have lost state) it should be set to an empty struct, in
|
|
|
|
// which case we will attempt to sweep the non-HTLC output using the passed
|
|
|
|
// commitPoint.
|
|
|
|
func (c *chainWatcher) dispatchRemoteForceClose(
|
|
|
|
commitSpend *chainntnfs.SpendDetail,
|
|
|
|
remoteCommit channeldb.ChannelCommitment,
|
|
|
|
commitPoint *btcec.PublicKey) error {
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
log.Infof("Unilateral close of ChannelPoint(%v) "+
|
2018-04-19 14:05:05 +03:00
|
|
|
"detected", c.cfg.chanState.FundingOutpoint)
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
// First, we'll create a closure summary that contains all the
|
|
|
|
// materials required to let each subscriber sweep the funds in the
|
|
|
|
// channel on-chain.
|
2018-04-30 01:42:01 +03:00
|
|
|
uniClose, err := lnwallet.NewUnilateralCloseSummary(
|
|
|
|
c.cfg.chanState, c.cfg.signer, c.cfg.pCache, commitSpend,
|
2018-07-12 12:02:52 +03:00
|
|
|
remoteCommit, commitPoint,
|
2018-01-19 00:54:52 +03:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// With the event processed, we'll now notify all subscribers of the
|
|
|
|
// event.
|
|
|
|
c.Lock()
|
|
|
|
for _, sub := range c.clientSubscriptions {
|
|
|
|
select {
|
2018-03-16 16:08:37 +03:00
|
|
|
case sub.RemoteUnilateralClosure <- uniClose:
|
2018-01-19 00:54:52 +03:00
|
|
|
case <-c.quit:
|
2018-04-12 00:50:05 +03:00
|
|
|
c.Unlock()
|
2018-01-19 00:54:52 +03:00
|
|
|
return fmt.Errorf("exiting")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// dispatchContractBreach processes a detected contract breached by the remote
|
|
|
|
// party. This method is to be called once we detect that the remote party has
|
|
|
|
// broadcast a prior revoked commitment state. This method well prepare all the
|
|
|
|
// materials required to bring the cheater to justice, then notify all
|
|
|
|
// registered subscribers of this event.
|
|
|
|
func (c *chainWatcher) dispatchContractBreach(spendEvent *chainntnfs.SpendDetail,
|
2018-01-21 07:26:15 +03:00
|
|
|
remoteCommit *channeldb.ChannelCommitment,
|
|
|
|
broadcastStateNum uint64) error {
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
log.Warnf("Remote peer has breached the channel contract for "+
|
|
|
|
"ChannelPoint(%v). Revoked state #%v was broadcast!!!",
|
2018-04-19 14:05:05 +03:00
|
|
|
c.cfg.chanState.FundingOutpoint, broadcastStateNum)
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-19 14:05:05 +03:00
|
|
|
if err := c.cfg.chanState.MarkBorked(); err != nil {
|
2018-01-19 00:54:52 +03:00
|
|
|
return fmt.Errorf("unable to mark channel as borked: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-12-20 08:50:46 +03:00
|
|
|
spendHeight := uint32(spendEvent.SpendingHeight)
|
2018-01-19 00:54:52 +03:00
|
|
|
|
|
|
|
// Create a new reach retribution struct which contains all the data
|
|
|
|
// needed to swiftly bring the cheating peer to justice.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): move to same package
|
|
|
|
retribution, err := lnwallet.NewBreachRetribution(
|
2018-12-20 08:50:46 +03:00
|
|
|
c.cfg.chanState, broadcastStateNum, spendHeight,
|
2018-01-19 00:54:52 +03:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to create breach retribution: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-03-27 15:07:47 +03:00
|
|
|
// Nil the curve before printing.
|
|
|
|
if retribution.RemoteOutputSignDesc != nil &&
|
|
|
|
retribution.RemoteOutputSignDesc.DoubleTweak != nil {
|
|
|
|
retribution.RemoteOutputSignDesc.DoubleTweak.Curve = nil
|
|
|
|
}
|
2018-12-20 08:50:45 +03:00
|
|
|
if retribution.RemoteOutputSignDesc != nil &&
|
|
|
|
retribution.RemoteOutputSignDesc.KeyDesc.PubKey != nil {
|
|
|
|
retribution.RemoteOutputSignDesc.KeyDesc.PubKey.Curve = nil
|
|
|
|
}
|
2018-03-27 15:07:47 +03:00
|
|
|
if retribution.LocalOutputSignDesc != nil &&
|
|
|
|
retribution.LocalOutputSignDesc.DoubleTweak != nil {
|
|
|
|
retribution.LocalOutputSignDesc.DoubleTweak.Curve = nil
|
|
|
|
}
|
2018-12-20 08:50:45 +03:00
|
|
|
if retribution.LocalOutputSignDesc != nil &&
|
|
|
|
retribution.LocalOutputSignDesc.KeyDesc.PubKey != nil {
|
|
|
|
retribution.LocalOutputSignDesc.KeyDesc.PubKey.Curve = nil
|
|
|
|
}
|
2018-03-27 15:07:47 +03:00
|
|
|
|
2018-01-19 00:54:52 +03:00
|
|
|
log.Debugf("Punishment breach retribution created: %v",
|
2018-03-27 15:07:47 +03:00
|
|
|
newLogClosure(func() string {
|
2018-12-20 08:50:45 +03:00
|
|
|
retribution.KeyRing.CommitPoint.Curve = nil
|
|
|
|
retribution.KeyRing.LocalHtlcKey = nil
|
|
|
|
retribution.KeyRing.RemoteHtlcKey = nil
|
|
|
|
retribution.KeyRing.DelayKey = nil
|
|
|
|
retribution.KeyRing.NoDelayKey = nil
|
|
|
|
retribution.KeyRing.RevocationKey = nil
|
2018-03-27 15:07:47 +03:00
|
|
|
return spew.Sdump(retribution)
|
|
|
|
}))
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-18 14:41:03 +03:00
|
|
|
// Hand the retribution info over to the breach arbiter.
|
|
|
|
if err := c.cfg.contractBreach(retribution); err != nil {
|
|
|
|
log.Errorf("unable to hand breached contract off to "+
|
|
|
|
"breachArbiter: %v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-19 00:54:52 +03:00
|
|
|
// With the event processed, we'll now notify all subscribers of the
|
|
|
|
// event.
|
|
|
|
c.Lock()
|
|
|
|
for _, sub := range c.clientSubscriptions {
|
|
|
|
select {
|
|
|
|
case sub.ContractBreach <- retribution:
|
|
|
|
case <-c.quit:
|
2018-04-12 00:50:05 +03:00
|
|
|
c.Unlock()
|
2018-01-19 00:54:52 +03:00
|
|
|
return fmt.Errorf("quitting")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
// At this point, we've successfully received an ack for the breach
|
|
|
|
// close. We now construct and persist the close summary, marking the
|
|
|
|
// channel as pending force closed.
|
|
|
|
//
|
|
|
|
// TODO(roasbeef): instead mark we got all the monies?
|
2018-08-21 13:21:15 +03:00
|
|
|
// TODO(halseth): move responsibility to breach arbiter?
|
2018-01-19 00:54:52 +03:00
|
|
|
settledBalance := remoteCommit.LocalBalance.ToSatoshis()
|
|
|
|
closeSummary := channeldb.ChannelCloseSummary{
|
2018-08-14 05:17:36 +03:00
|
|
|
ChanPoint: c.cfg.chanState.FundingOutpoint,
|
|
|
|
ChainHash: c.cfg.chanState.ChainHash,
|
|
|
|
ClosingTXID: *spendEvent.SpenderTxHash,
|
|
|
|
CloseHeight: spendHeight,
|
|
|
|
RemotePub: c.cfg.chanState.IdentityPub,
|
|
|
|
Capacity: c.cfg.chanState.Capacity,
|
|
|
|
SettledBalance: settledBalance,
|
|
|
|
CloseType: channeldb.BreachClose,
|
|
|
|
IsPending: true,
|
|
|
|
ShortChanID: c.cfg.chanState.ShortChanID(),
|
|
|
|
RemoteCurrentRevocation: c.cfg.chanState.RemoteCurrentRevocation,
|
|
|
|
RemoteNextRevocation: c.cfg.chanState.RemoteNextRevocation,
|
|
|
|
LocalChanConfig: c.cfg.chanState.LocalChanCfg,
|
2018-01-19 00:54:52 +03:00
|
|
|
}
|
|
|
|
|
2018-11-20 17:09:45 +03:00
|
|
|
// Attempt to add a channel sync message to the close summary.
|
|
|
|
chanSync, err := lnwallet.ChanSyncMsg(c.cfg.chanState)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("ChannelPoint(%v): unable to create channel sync "+
|
|
|
|
"message: %v", c.cfg.chanState.FundingOutpoint, err)
|
|
|
|
} else {
|
|
|
|
closeSummary.LastChanSyncMsg = chanSync
|
|
|
|
}
|
|
|
|
|
2018-04-19 14:05:05 +03:00
|
|
|
if err := c.cfg.chanState.CloseChannel(&closeSummary); err != nil {
|
2018-04-16 16:18:38 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-19 00:54:52 +03:00
|
|
|
log.Infof("Breached channel=%v marked pending-closed",
|
2018-04-19 14:05:05 +03:00
|
|
|
c.cfg.chanState.FundingOutpoint)
|
2018-01-19 00:54:52 +03:00
|
|
|
|
2018-04-16 16:18:38 +03:00
|
|
|
return nil
|
2018-01-19 00:54:52 +03:00
|
|
|
}
|