2015-12-30 05:31:03 +03:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2018-02-02 07:52:40 +03:00
|
|
|
"bufio"
|
2015-12-30 05:58:58 +03:00
|
|
|
"bytes"
|
2019-09-29 01:44:45 +03:00
|
|
|
"context"
|
2016-07-13 03:47:24 +03:00
|
|
|
"encoding/hex"
|
2018-01-24 05:34:29 +03:00
|
|
|
"errors"
|
2016-04-25 06:27:19 +03:00
|
|
|
"fmt"
|
2016-07-08 01:35:06 +03:00
|
|
|
"io"
|
2017-01-24 07:32:17 +03:00
|
|
|
"io/ioutil"
|
2017-01-25 05:07:15 +03:00
|
|
|
"math"
|
2015-12-30 05:58:58 +03:00
|
|
|
"os"
|
2017-01-24 07:32:17 +03:00
|
|
|
"strconv"
|
2016-06-21 22:35:07 +03:00
|
|
|
"strings"
|
2018-01-24 05:34:29 +03:00
|
|
|
"sync"
|
2019-10-04 01:12:39 +03:00
|
|
|
"time"
|
2016-12-27 08:52:15 +03:00
|
|
|
|
2018-07-31 10:17:17 +03:00
|
|
|
"github.com/btcsuite/btcd/chaincfg/chainhash"
|
2018-12-10 07:16:11 +03:00
|
|
|
"github.com/btcsuite/btcd/wire"
|
2019-12-20 12:05:08 +03:00
|
|
|
"github.com/lightninglabs/protobuf-hex-display/json"
|
|
|
|
"github.com/lightninglabs/protobuf-hex-display/jsonpb"
|
|
|
|
"github.com/lightninglabs/protobuf-hex-display/proto"
|
2016-01-16 21:45:54 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnrpc"
|
2019-11-18 14:08:42 +03:00
|
|
|
"github.com/lightningnetwork/lnd/routing/route"
|
2019-02-21 17:25:42 +03:00
|
|
|
"github.com/lightningnetwork/lnd/walletunlocker"
|
2016-07-26 20:42:35 +03:00
|
|
|
"github.com/urfave/cli"
|
2017-11-07 01:34:49 +03:00
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/status"
|
2015-12-30 05:31:03 +03:00
|
|
|
)
|
|
|
|
|
2016-06-21 22:35:07 +03:00
|
|
|
// TODO(roasbeef): cli logic for supporting both positional and unix style
|
|
|
|
// arguments.
|
|
|
|
|
2017-11-23 22:40:14 +03:00
|
|
|
// TODO(roasbeef): expose all fee conf targets
|
|
|
|
|
2019-02-23 05:08:01 +03:00
|
|
|
const defaultRecoveryWindow int32 = 2500
|
2018-03-27 00:15:04 +03:00
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
func printJSON(resp interface{}) {
|
2015-12-30 05:58:58 +03:00
|
|
|
b, err := json.Marshal(resp)
|
|
|
|
if err != nil {
|
|
|
|
fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var out bytes.Buffer
|
|
|
|
json.Indent(&out, b, "", "\t")
|
2017-03-16 22:06:12 +03:00
|
|
|
out.WriteString("\n")
|
2015-12-30 05:58:58 +03:00
|
|
|
out.WriteTo(os.Stdout)
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
func printRespJSON(resp proto.Message) {
|
2017-01-30 01:56:31 +03:00
|
|
|
jsonMarshaler := &jsonpb.Marshaler{
|
|
|
|
EmitDefaults: true,
|
2020-02-11 16:07:27 +03:00
|
|
|
OrigName: true,
|
2017-01-30 01:56:31 +03:00
|
|
|
Indent: " ",
|
|
|
|
}
|
|
|
|
|
|
|
|
jsonStr, err := jsonMarshaler.MarshalToString(resp)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Println("unable to decode response: ", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Println(jsonStr)
|
|
|
|
}
|
|
|
|
|
2017-11-07 01:34:49 +03:00
|
|
|
// actionDecorator is used to add additional information and error handling
|
|
|
|
// to command actions.
|
|
|
|
func actionDecorator(f func(*cli.Context) error) func(*cli.Context) error {
|
|
|
|
return func(c *cli.Context) error {
|
|
|
|
if err := f(c); err != nil {
|
2018-05-06 23:50:07 +03:00
|
|
|
s, ok := status.FromError(err)
|
|
|
|
|
|
|
|
// If it's a command for the UnlockerService (like
|
|
|
|
// 'create' or 'unlock') but the wallet is already
|
|
|
|
// unlocked, then these methods aren't recognized any
|
|
|
|
// more because this service is shut down after
|
|
|
|
// successful unlock. That's why the code
|
|
|
|
// 'Unimplemented' means something different for these
|
|
|
|
// two commands.
|
|
|
|
if s.Code() == codes.Unimplemented &&
|
|
|
|
(c.Command.Name == "create" ||
|
|
|
|
c.Command.Name == "unlock") {
|
|
|
|
return fmt.Errorf("Wallet is already unlocked")
|
|
|
|
}
|
|
|
|
|
2017-11-07 01:34:49 +03:00
|
|
|
// lnd might be active, but not possible to contact
|
|
|
|
// using RPC if the wallet is encrypted. If we get
|
|
|
|
// error code Unimplemented, it means that lnd is
|
|
|
|
// running, but the RPC server is not active yet (only
|
|
|
|
// WalletUnlocker server active) and most likely this
|
|
|
|
// is because of an encrypted wallet.
|
|
|
|
if ok && s.Code() == codes.Unimplemented {
|
|
|
|
return fmt.Errorf("Wallet is encrypted. " +
|
|
|
|
"Please unlock using 'lncli unlock', " +
|
|
|
|
"or set password using 'lncli create'" +
|
|
|
|
" if this is the first time starting " +
|
|
|
|
"lnd.")
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var newAddressCommand = cli.Command{
|
2017-03-03 01:23:16 +03:00
|
|
|
Name: "newaddress",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "Wallet",
|
2018-02-06 02:05:04 +03:00
|
|
|
Usage: "Generates a new address.",
|
2017-03-03 01:23:16 +03:00
|
|
|
ArgsUsage: "address-type",
|
2017-11-23 22:40:14 +03:00
|
|
|
Description: `
|
|
|
|
Generate a wallet new address. Address-types has to be one of:
|
2018-02-18 02:41:34 +03:00
|
|
|
- p2wkh: Pay to witness key hash
|
|
|
|
- np2wkh: Pay to nested witness key hash`,
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(newAddress),
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 23:01:08 +03:00
|
|
|
func newAddress(ctx *cli.Context) error {
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2015-12-30 05:31:03 +03:00
|
|
|
|
2017-03-03 01:23:16 +03:00
|
|
|
stringAddrType := ctx.Args().First()
|
2016-04-25 06:27:19 +03:00
|
|
|
|
|
|
|
// Map the string encoded address type, to the concrete typed address
|
|
|
|
// type enum. An unrecognized address type will result in an error.
|
2018-09-27 16:49:44 +03:00
|
|
|
var addrType lnrpc.AddressType
|
2016-04-25 06:27:19 +03:00
|
|
|
switch stringAddrType { // TODO(roasbeef): make them ints on the cli?
|
|
|
|
case "p2wkh":
|
2018-09-27 16:49:44 +03:00
|
|
|
addrType = lnrpc.AddressType_WITNESS_PUBKEY_HASH
|
2016-04-25 06:27:19 +03:00
|
|
|
case "np2wkh":
|
2018-09-27 16:49:44 +03:00
|
|
|
addrType = lnrpc.AddressType_NESTED_PUBKEY_HASH
|
2016-04-25 06:27:19 +03:00
|
|
|
default:
|
2016-06-29 23:01:08 +03:00
|
|
|
return fmt.Errorf("invalid address type %v, support address type "+
|
2018-02-18 02:41:34 +03:00
|
|
|
"are: p2wkh and np2wkh", stringAddrType)
|
2016-04-25 06:27:19 +03:00
|
|
|
}
|
|
|
|
|
2015-12-30 05:31:03 +03:00
|
|
|
ctxb := context.Background()
|
2016-04-25 06:27:19 +03:00
|
|
|
addr, err := client.NewAddress(ctxb, &lnrpc.NewAddressRequest{
|
|
|
|
Type: addrType,
|
|
|
|
})
|
2015-12-30 05:31:03 +03:00
|
|
|
if err != nil {
|
2016-06-29 23:01:08 +03:00
|
|
|
return err
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(addr)
|
2016-06-29 23:01:08 +03:00
|
|
|
return nil
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
|
|
|
|
2019-03-05 16:22:30 +03:00
|
|
|
var estimateFeeCommand = cli.Command{
|
|
|
|
Name: "estimatefee",
|
|
|
|
Category: "On-chain",
|
|
|
|
Usage: "Get fee estimates for sending bitcoin on-chain to multiple addresses.",
|
|
|
|
ArgsUsage: "send-json-string [--conf_target=N]",
|
|
|
|
Description: `
|
|
|
|
Get fee estimates for sending a transaction paying the specified amount(s) to the passed address(es).
|
|
|
|
|
|
|
|
The send-json-string' param decodes addresses and the amount to send respectively in the following format:
|
|
|
|
|
|
|
|
'{"ExampleAddr": NumCoinsInSatoshis, "SecondAddr": NumCoins}'
|
|
|
|
`,
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "conf_target",
|
|
|
|
Usage: "(optional) the number of blocks that the transaction *should* " +
|
|
|
|
"confirm in",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: actionDecorator(estimateFees),
|
|
|
|
}
|
|
|
|
|
|
|
|
func estimateFees(ctx *cli.Context) error {
|
|
|
|
var amountToAddr map[string]int64
|
|
|
|
|
|
|
|
jsonMap := ctx.Args().First()
|
|
|
|
if err := json.Unmarshal([]byte(jsonMap), &amountToAddr); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
resp, err := client.EstimateFee(ctxb, &lnrpc.EstimateFeeRequest{
|
|
|
|
AddrToAmount: amountToAddr,
|
|
|
|
TargetConf: int32(ctx.Int64("conf_target")),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-18 15:13:24 +03:00
|
|
|
var txLabelFlag = cli.StringFlag{
|
|
|
|
Name: "label",
|
|
|
|
Usage: "(optional) a label for the transaction",
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var sendCoinsCommand = cli.Command{
|
2017-03-03 01:23:16 +03:00
|
|
|
Name: "sendcoins",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "On-chain",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Send bitcoin on-chain to an address.",
|
2017-03-03 01:23:16 +03:00
|
|
|
ArgsUsage: "addr amt",
|
2017-11-23 22:40:14 +03:00
|
|
|
Description: `
|
2020-01-15 16:01:42 +03:00
|
|
|
Send amt coins in satoshis to the base58 or bech32 encoded bitcoin address addr.
|
2017-11-23 22:40:14 +03:00
|
|
|
|
2018-09-10 01:16:00 +03:00
|
|
|
Fees used when sending the transaction can be specified via the --conf_target, or
|
2017-11-23 22:40:14 +03:00
|
|
|
--sat_per_byte optional flags.
|
2018-09-10 01:16:00 +03:00
|
|
|
|
2017-11-23 22:40:14 +03:00
|
|
|
Positional arguments and flags can be used interchangeably but not at the same time!
|
|
|
|
`,
|
2016-06-29 21:29:21 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
2020-01-15 16:01:42 +03:00
|
|
|
Name: "addr",
|
|
|
|
Usage: "the base58 or bech32 encoded bitcoin address to send coins " +
|
|
|
|
"to on-chain",
|
2016-06-29 21:29:21 +03:00
|
|
|
},
|
2018-11-18 08:11:47 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "sweepall",
|
|
|
|
Usage: "if set, then the amount field will be ignored, " +
|
2020-08-20 10:44:38 +03:00
|
|
|
"and the wallet will attempt to sweep all " +
|
2018-11-18 08:11:47 +03:00
|
|
|
"outputs within the wallet to the target " +
|
|
|
|
"address",
|
|
|
|
},
|
2017-03-03 01:23:16 +03:00
|
|
|
cli.Int64Flag{
|
2016-06-29 21:29:21 +03:00
|
|
|
Name: "amt",
|
|
|
|
Usage: "the number of bitcoin denominated in satoshis to send",
|
|
|
|
},
|
2017-11-23 22:40:14 +03:00
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "conf_target",
|
|
|
|
Usage: "(optional) the number of blocks that the " +
|
|
|
|
"transaction *should* confirm in, will be " +
|
|
|
|
"used for fee estimation",
|
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "sat_per_byte",
|
|
|
|
Usage: "(optional) a manual fee expressed in " +
|
|
|
|
"sat/byte that should be used when crafting " +
|
|
|
|
"the transaction",
|
|
|
|
},
|
2020-05-18 15:13:24 +03:00
|
|
|
txLabelFlag,
|
2016-06-29 21:29:21 +03:00
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(sendCoins),
|
2016-06-29 21:29:21 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 23:01:08 +03:00
|
|
|
func sendCoins(ctx *cli.Context) error {
|
2017-03-03 01:23:16 +03:00
|
|
|
var (
|
|
|
|
addr string
|
|
|
|
amt int64
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
if ctx.NArg() == 0 && ctx.NumFlags() == 0 {
|
|
|
|
cli.ShowCommandHelp(ctx, "sendcoins")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-11-23 22:40:14 +03:00
|
|
|
if ctx.IsSet("conf_target") && ctx.IsSet("sat_per_byte") {
|
|
|
|
return fmt.Errorf("either conf_target or sat_per_byte should be " +
|
|
|
|
"set, but not both")
|
|
|
|
}
|
|
|
|
|
2017-03-03 01:23:16 +03:00
|
|
|
switch {
|
|
|
|
case ctx.IsSet("addr"):
|
|
|
|
addr = ctx.String("addr")
|
|
|
|
case args.Present():
|
|
|
|
addr = args.First()
|
|
|
|
args = args.Tail()
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("Address argument missing")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("amt"):
|
|
|
|
amt = ctx.Int64("amt")
|
|
|
|
case args.Present():
|
|
|
|
amt, err = strconv.ParseInt(args.First(), 10, 64)
|
2018-11-18 08:11:47 +03:00
|
|
|
case !ctx.Bool("sweepall"):
|
2017-03-03 01:23:16 +03:00
|
|
|
return fmt.Errorf("Amount argument missing")
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode amount: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-11-18 08:11:47 +03:00
|
|
|
if amt != 0 && ctx.Bool("sweepall") {
|
|
|
|
return fmt.Errorf("amount cannot be set if attempting to " +
|
|
|
|
"sweep all coins out of the wallet")
|
|
|
|
}
|
|
|
|
|
2016-06-29 21:29:21 +03:00
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-06-29 21:29:21 +03:00
|
|
|
|
|
|
|
req := &lnrpc.SendCoinsRequest{
|
2017-11-23 22:40:14 +03:00
|
|
|
Addr: addr,
|
|
|
|
Amount: amt,
|
|
|
|
TargetConf: int32(ctx.Int64("conf_target")),
|
|
|
|
SatPerByte: ctx.Int64("sat_per_byte"),
|
2018-11-18 08:11:47 +03:00
|
|
|
SendAll: ctx.Bool("sweepall"),
|
2020-05-18 15:13:24 +03:00
|
|
|
Label: ctx.String(txLabelFlag.Name),
|
2016-06-29 21:29:21 +03:00
|
|
|
}
|
|
|
|
txid, err := client.SendCoins(ctxb, req)
|
|
|
|
if err != nil {
|
2016-06-29 23:01:08 +03:00
|
|
|
return err
|
2016-06-29 21:29:21 +03:00
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(txid)
|
2016-06-29 23:01:08 +03:00
|
|
|
return nil
|
2016-06-29 21:29:21 +03:00
|
|
|
}
|
|
|
|
|
2018-09-27 16:49:44 +03:00
|
|
|
var listUnspentCommand = cli.Command{
|
|
|
|
Name: "listunspent",
|
|
|
|
Category: "On-chain",
|
|
|
|
Usage: "List utxos available for spending.",
|
2019-02-12 00:02:35 +03:00
|
|
|
ArgsUsage: "[min-confs [max-confs]] [--unconfirmed_only]",
|
2018-09-27 16:49:44 +03:00
|
|
|
Description: `
|
|
|
|
For each spendable utxo currently in the wallet, with at least min_confs
|
2019-02-12 00:02:35 +03:00
|
|
|
confirmations, and at most max_confs confirmations, lists the txid,
|
|
|
|
index, amount, address, address type, scriptPubkey and number of
|
|
|
|
confirmations. Use --min_confs=0 to include unconfirmed coins. To list
|
|
|
|
all coins with at least min_confs confirmations, omit the second
|
|
|
|
argument or flag '--max_confs'. To list all confirmed and unconfirmed
|
2019-02-21 17:25:42 +03:00
|
|
|
coins, no arguments are required. To see only unconfirmed coins, use
|
2019-02-12 00:02:35 +03:00
|
|
|
'--unconfirmed_only' with '--min_confs' and '--max_confs' set to zero or
|
|
|
|
not present.
|
2018-09-27 16:49:44 +03:00
|
|
|
`,
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "min_confs",
|
|
|
|
Usage: "the minimum number of confirmations for a utxo",
|
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "max_confs",
|
|
|
|
Usage: "the maximum number of confirmations for a utxo",
|
|
|
|
},
|
2019-02-12 00:02:35 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "unconfirmed_only",
|
|
|
|
Usage: "when min_confs and max_confs are zero, " +
|
|
|
|
"setting false implicitly overrides max_confs " +
|
|
|
|
"to be MaxInt32, otherwise max_confs remains " +
|
|
|
|
"zero. An error is returned if the value is " +
|
|
|
|
"true and both min_confs and max_confs are " +
|
2019-05-05 01:35:37 +03:00
|
|
|
"non-zero. (default: false)",
|
2019-02-12 00:02:35 +03:00
|
|
|
},
|
2018-09-27 16:49:44 +03:00
|
|
|
},
|
|
|
|
Action: actionDecorator(listUnspent),
|
|
|
|
}
|
|
|
|
|
|
|
|
func listUnspent(ctx *cli.Context) error {
|
|
|
|
var (
|
|
|
|
minConfirms int64
|
|
|
|
maxConfirms int64
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
if ctx.IsSet("max_confs") && !ctx.IsSet("min_confs") {
|
|
|
|
return fmt.Errorf("max_confs cannot be set without " +
|
|
|
|
"min_confs being set")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("min_confs"):
|
|
|
|
minConfirms = ctx.Int64("min_confs")
|
|
|
|
case args.Present():
|
|
|
|
minConfirms, err = strconv.ParseInt(args.First(), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
cli.ShowCommandHelp(ctx, "listunspent")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
args = args.Tail()
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("max_confs"):
|
|
|
|
maxConfirms = ctx.Int64("max_confs")
|
|
|
|
case args.Present():
|
|
|
|
maxConfirms, err = strconv.ParseInt(args.First(), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
cli.ShowCommandHelp(ctx, "listunspent")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
args = args.Tail()
|
|
|
|
}
|
|
|
|
|
2019-02-12 00:02:35 +03:00
|
|
|
unconfirmedOnly := ctx.Bool("unconfirmed_only")
|
|
|
|
|
|
|
|
// Force minConfirms and maxConfirms to be zero if unconfirmedOnly is
|
|
|
|
// true.
|
|
|
|
if unconfirmedOnly && (minConfirms != 0 || maxConfirms != 0) {
|
|
|
|
cli.ShowCommandHelp(ctx, "listunspent")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// When unconfirmedOnly is inactive, we will override maxConfirms to be
|
|
|
|
// a MaxInt32 to return all confirmed and unconfirmed utxos.
|
|
|
|
if maxConfirms == 0 && !unconfirmedOnly {
|
|
|
|
maxConfirms = math.MaxInt32
|
2018-09-27 16:49:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
req := &lnrpc.ListUnspentRequest{
|
|
|
|
MinConfs: int32(minConfirms),
|
|
|
|
MaxConfs: int32(maxConfirms),
|
|
|
|
}
|
2019-02-02 05:02:02 +03:00
|
|
|
resp, err := client.ListUnspent(ctxb, req)
|
2018-09-27 16:49:44 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-02-02 05:02:02 +03:00
|
|
|
|
|
|
|
// Parse the response into the final json object that will be printed
|
|
|
|
// to stdout. At the moment, this filters out the raw txid bytes from
|
|
|
|
// each utxo's outpoint and only prints the txid string.
|
|
|
|
var listUnspentResp = struct {
|
|
|
|
Utxos []*Utxo `json:"utxos"`
|
|
|
|
}{
|
|
|
|
Utxos: make([]*Utxo, 0, len(resp.Utxos)),
|
|
|
|
}
|
|
|
|
for _, protoUtxo := range resp.Utxos {
|
|
|
|
utxo := NewUtxoFromProto(protoUtxo)
|
|
|
|
listUnspentResp.Utxos = append(listUnspentResp.Utxos, utxo)
|
|
|
|
}
|
|
|
|
|
|
|
|
printJSON(listUnspentResp)
|
|
|
|
|
2018-09-27 16:49:44 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var sendManyCommand = cli.Command{
|
2017-03-03 01:23:16 +03:00
|
|
|
Name: "sendmany",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "On-chain",
|
2018-02-06 02:05:04 +03:00
|
|
|
Usage: "Send bitcoin on-chain to multiple addresses.",
|
2017-11-23 22:40:14 +03:00
|
|
|
ArgsUsage: "send-json-string [--conf_target=N] [--sat_per_byte=P]",
|
|
|
|
Description: `
|
|
|
|
Create and broadcast a transaction paying the specified amount(s) to the passed address(es).
|
|
|
|
|
2018-09-10 01:16:00 +03:00
|
|
|
The send-json-string' param decodes addresses and the amount to send
|
2017-11-23 22:40:14 +03:00
|
|
|
respectively in the following format:
|
|
|
|
|
|
|
|
'{"ExampleAddr": NumCoinsInSatoshis, "SecondAddr": NumCoins}'
|
|
|
|
`,
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "conf_target",
|
|
|
|
Usage: "(optional) the number of blocks that the transaction *should* " +
|
|
|
|
"confirm in, will be used for fee estimation",
|
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "sat_per_byte",
|
|
|
|
Usage: "(optional) a manual fee expressed in sat/byte that should be " +
|
|
|
|
"used when crafting the transaction",
|
|
|
|
},
|
2020-05-18 15:13:24 +03:00
|
|
|
txLabelFlag,
|
2017-11-23 22:40:14 +03:00
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(sendMany),
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 23:01:08 +03:00
|
|
|
func sendMany(ctx *cli.Context) error {
|
2015-12-30 05:31:03 +03:00
|
|
|
var amountToAddr map[string]int64
|
|
|
|
|
2017-03-03 01:23:16 +03:00
|
|
|
jsonMap := ctx.Args().First()
|
2015-12-30 05:31:03 +03:00
|
|
|
if err := json.Unmarshal([]byte(jsonMap), &amountToAddr); err != nil {
|
2016-06-29 23:01:08 +03:00
|
|
|
return err
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
|
|
|
|
2017-11-23 22:40:14 +03:00
|
|
|
if ctx.IsSet("conf_target") && ctx.IsSet("sat_per_byte") {
|
|
|
|
return fmt.Errorf("either conf_target or sat_per_byte should be " +
|
|
|
|
"set, but not both")
|
|
|
|
}
|
|
|
|
|
2015-12-30 05:31:03 +03:00
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2015-12-30 05:31:03 +03:00
|
|
|
|
2017-02-23 22:09:34 +03:00
|
|
|
txid, err := client.SendMany(ctxb, &lnrpc.SendManyRequest{
|
|
|
|
AddrToAmount: amountToAddr,
|
2017-11-23 22:40:14 +03:00
|
|
|
TargetConf: int32(ctx.Int64("conf_target")),
|
|
|
|
SatPerByte: ctx.Int64("sat_per_byte"),
|
2020-05-18 15:13:24 +03:00
|
|
|
Label: ctx.String(txLabelFlag.Name),
|
2017-02-23 22:09:34 +03:00
|
|
|
})
|
2015-12-30 05:31:03 +03:00
|
|
|
if err != nil {
|
2016-06-29 23:01:08 +03:00
|
|
|
return err
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(txid)
|
2016-06-29 23:01:08 +03:00
|
|
|
return nil
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
2016-01-17 06:10:29 +03:00
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var connectCommand = cli.Command{
|
2017-03-03 01:23:16 +03:00
|
|
|
Name: "connect",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "Peers",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Connect to a remote lnd peer.",
|
2017-03-03 01:23:16 +03:00
|
|
|
ArgsUsage: "<pubkey>@host",
|
2017-01-10 06:09:45 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "perm",
|
2017-03-03 01:23:16 +03:00
|
|
|
Usage: "If set, the daemon will attempt to persistently " +
|
|
|
|
"connect to the target peer.\n" +
|
|
|
|
" If not, the call will be synchronous.",
|
2017-01-10 06:09:45 +03:00
|
|
|
},
|
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(connectPeer),
|
2016-01-17 06:10:29 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 23:01:08 +03:00
|
|
|
func connectPeer(ctx *cli.Context) error {
|
2016-01-17 06:10:29 +03:00
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-01-17 06:10:29 +03:00
|
|
|
|
2017-03-03 01:23:16 +03:00
|
|
|
targetAddress := ctx.Args().First()
|
2016-06-21 22:35:07 +03:00
|
|
|
splitAddr := strings.Split(targetAddress, "@")
|
2016-07-17 03:43:27 +03:00
|
|
|
if len(splitAddr) != 2 {
|
2016-10-28 05:42:47 +03:00
|
|
|
return fmt.Errorf("target address expected in format: " +
|
|
|
|
"pubkey@host:port")
|
2016-07-17 03:43:27 +03:00
|
|
|
}
|
|
|
|
|
2016-06-21 22:35:07 +03:00
|
|
|
addr := &lnrpc.LightningAddress{
|
2016-10-28 05:42:47 +03:00
|
|
|
Pubkey: splitAddr[0],
|
|
|
|
Host: splitAddr[1],
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
2017-01-10 06:09:45 +03:00
|
|
|
req := &lnrpc.ConnectPeerRequest{
|
|
|
|
Addr: addr,
|
|
|
|
Perm: ctx.Bool("perm"),
|
|
|
|
}
|
2016-01-17 06:10:29 +03:00
|
|
|
|
|
|
|
lnid, err := client.ConnectPeer(ctxb, req)
|
2017-05-05 15:05:30 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(lnid)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var disconnectCommand = cli.Command{
|
|
|
|
Name: "disconnect",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "Peers",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Disconnect a remote lnd peer identified by public key.",
|
2017-05-05 15:05:30 +03:00
|
|
|
ArgsUsage: "<pubkey>",
|
2017-05-06 01:54:25 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "node_key",
|
|
|
|
Usage: "The hex-encoded compressed public key of the peer " +
|
|
|
|
"to disconnect from",
|
|
|
|
},
|
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(disconnectPeer),
|
2017-05-05 15:05:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func disconnectPeer(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
2017-05-06 01:54:25 +03:00
|
|
|
var pubKey string
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("node_key"):
|
|
|
|
pubKey = ctx.String("node_key")
|
|
|
|
case ctx.Args().Present():
|
|
|
|
pubKey = ctx.Args().First()
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("must specify target public key")
|
2017-05-05 15:05:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
req := &lnrpc.DisconnectPeerRequest{
|
|
|
|
PubKey: pubKey,
|
|
|
|
}
|
|
|
|
|
|
|
|
lnid, err := client.DisconnectPeer(ctxb, req)
|
2016-01-17 06:10:29 +03:00
|
|
|
if err != nil {
|
2016-06-29 23:01:08 +03:00
|
|
|
return err
|
2016-01-17 06:10:29 +03:00
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(lnid)
|
2016-06-29 23:01:08 +03:00
|
|
|
return nil
|
2016-01-17 06:10:29 +03:00
|
|
|
}
|
2016-06-21 22:35:07 +03:00
|
|
|
|
|
|
|
// TODO(roasbeef): also allow short relative channel ID.
|
2017-02-23 22:56:47 +03:00
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var closeChannelCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "closechannel",
|
|
|
|
Category: "Channels",
|
|
|
|
Usage: "Close an existing channel.",
|
2017-11-23 22:40:14 +03:00
|
|
|
Description: `
|
2018-01-24 05:34:29 +03:00
|
|
|
Close an existing channel. The channel can be closed either cooperatively,
|
2017-11-23 22:40:14 +03:00
|
|
|
or unilaterally (--force).
|
2018-01-24 05:34:29 +03:00
|
|
|
|
2017-11-23 22:40:14 +03:00
|
|
|
A unilateral channel closure means that the latest commitment
|
|
|
|
transaction will be broadcast to the network. As a result, any settled
|
2018-01-24 05:34:29 +03:00
|
|
|
funds will be time locked for a few blocks before they can be spent.
|
2017-11-23 22:40:14 +03:00
|
|
|
|
2019-12-09 16:43:59 +03:00
|
|
|
In the case of a cooperative closure, one can manually set the fee to
|
2017-11-23 22:40:14 +03:00
|
|
|
be used for the closing transaction via either the --conf_target or
|
|
|
|
--sat_per_byte arguments. This will be the starting value used during
|
2018-04-16 04:28:37 +03:00
|
|
|
fee negotiation. This is optional.
|
|
|
|
|
2019-12-09 16:43:59 +03:00
|
|
|
In the case of a cooperative closure, one can manually set the address
|
|
|
|
to deliver funds to upon closure. This is optional, and may only be used
|
|
|
|
if an upfront shutdown address has not already been set. If neither are
|
|
|
|
set the funds will be delivered to a new wallet address.
|
|
|
|
|
2018-04-16 04:28:37 +03:00
|
|
|
To view which funding_txids/output_indexes can be used for a channel close,
|
|
|
|
see the channel_point values within the listchannels command output.
|
|
|
|
The format for a channel_point is 'funding_txid:output_index'.`,
|
2019-04-14 20:09:52 +03:00
|
|
|
ArgsUsage: "funding_txid [output_index]",
|
2016-06-21 22:35:07 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "funding_txid",
|
|
|
|
Usage: "the txid of the channel's funding transaction",
|
|
|
|
},
|
|
|
|
cli.IntFlag{
|
|
|
|
Name: "output_index",
|
|
|
|
Usage: "the output index for the funding output of the funding " +
|
|
|
|
"transaction",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
2019-04-14 20:09:52 +03:00
|
|
|
Name: "force",
|
|
|
|
Usage: "attempt an uncooperative closure",
|
2016-06-21 22:35:07 +03:00
|
|
|
},
|
2016-07-08 01:35:06 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "block",
|
|
|
|
Usage: "block until the channel is closed",
|
|
|
|
},
|
2017-11-23 22:40:14 +03:00
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "conf_target",
|
|
|
|
Usage: "(optional) the number of blocks that the " +
|
|
|
|
"transaction *should* confirm in, will be " +
|
|
|
|
"used for fee estimation",
|
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "sat_per_byte",
|
|
|
|
Usage: "(optional) a manual fee expressed in " +
|
|
|
|
"sat/byte that should be used when crafting " +
|
|
|
|
"the transaction",
|
|
|
|
},
|
2019-12-09 16:43:59 +03:00
|
|
|
cli.StringFlag{
|
|
|
|
Name: "delivery_addr",
|
|
|
|
Usage: "(optional) an address to deliver funds " +
|
|
|
|
"upon cooperative channel closing, may only " +
|
2020-05-25 17:32:49 +03:00
|
|
|
"be used if an upfront shutdown address is not " +
|
2019-12-09 16:43:59 +03:00
|
|
|
"already set",
|
|
|
|
},
|
2016-06-21 22:35:07 +03:00
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(closeChannel),
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 23:01:08 +03:00
|
|
|
func closeChannel(ctx *cli.Context) error {
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-06-21 22:35:07 +03:00
|
|
|
|
2018-01-24 05:34:29 +03:00
|
|
|
// Show command help if no arguments and flags were provided.
|
2017-03-03 01:23:16 +03:00
|
|
|
if ctx.NArg() == 0 && ctx.NumFlags() == 0 {
|
2017-12-26 04:06:21 +03:00
|
|
|
cli.ShowCommandHelp(ctx, "closechannel")
|
2017-03-03 01:23:16 +03:00
|
|
|
return nil
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2018-05-29 12:26:47 +03:00
|
|
|
channelPoint, err := parseChannelPoint(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-09-12 22:28:28 +03:00
|
|
|
// TODO(roasbeef): implement time deadline within server
|
2016-06-21 22:35:07 +03:00
|
|
|
req := &lnrpc.CloseChannelRequest{
|
2019-12-09 16:43:59 +03:00
|
|
|
ChannelPoint: channelPoint,
|
|
|
|
Force: ctx.Bool("force"),
|
|
|
|
TargetConf: int32(ctx.Int64("conf_target")),
|
|
|
|
SatPerByte: ctx.Int64("sat_per_byte"),
|
|
|
|
DeliveryAddress: ctx.String("delivery_addr"),
|
2017-03-03 01:23:16 +03:00
|
|
|
}
|
|
|
|
|
2018-01-24 05:34:29 +03:00
|
|
|
// After parsing the request, we'll spin up a goroutine that will
|
|
|
|
// retrieve the closing transaction ID when attempting to close the
|
|
|
|
// channel. We do this to because `executeChannelClose` can block, so we
|
|
|
|
// would like to present the closing transaction ID to the user as soon
|
|
|
|
// as it is broadcasted.
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
txidChan := make(chan string, 1)
|
|
|
|
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
printJSON(struct {
|
|
|
|
ClosingTxid string `json:"closing_txid"`
|
|
|
|
}{
|
|
|
|
ClosingTxid: <-txidChan,
|
|
|
|
})
|
|
|
|
}()
|
|
|
|
|
2018-05-29 12:26:47 +03:00
|
|
|
err = executeChannelClose(client, req, txidChan, ctx.Bool("block"))
|
2018-01-24 05:34:29 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// In the case that the user did not provide the `block` flag, then we
|
|
|
|
// need to wait for the goroutine to be done to prevent it from being
|
|
|
|
// destroyed when exiting before printing the closing transaction ID.
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// executeChannelClose attempts to close the channel from a request. The closing
|
|
|
|
// transaction ID is sent through `txidChan` as soon as it is broadcasted to the
|
|
|
|
// network. The block boolean is used to determine if we should block until the
|
|
|
|
// closing transaction receives all of its required confirmations.
|
|
|
|
func executeChannelClose(client lnrpc.LightningClient, req *lnrpc.CloseChannelRequest,
|
|
|
|
txidChan chan<- string, block bool) error {
|
|
|
|
|
|
|
|
stream, err := client.CloseChannel(context.Background(), req)
|
2016-06-21 22:35:07 +03:00
|
|
|
if err != nil {
|
2016-06-29 23:01:08 +03:00
|
|
|
return err
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2016-07-08 01:35:06 +03:00
|
|
|
for {
|
|
|
|
resp, err := stream.Recv()
|
|
|
|
if err == io.EOF {
|
|
|
|
return nil
|
|
|
|
} else if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-08-31 02:54:49 +03:00
|
|
|
|
|
|
|
switch update := resp.Update.(type) {
|
2017-02-08 06:36:15 +03:00
|
|
|
case *lnrpc.CloseStatusUpdate_ClosePending:
|
|
|
|
closingHash := update.ClosePending.Txid
|
|
|
|
txid, err := chainhash.NewHash(closingHash)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-24 05:34:29 +03:00
|
|
|
txidChan <- txid.String()
|
2017-02-08 06:36:15 +03:00
|
|
|
|
2018-01-24 05:34:29 +03:00
|
|
|
if !block {
|
2017-02-08 06:36:15 +03:00
|
|
|
return nil
|
|
|
|
}
|
2016-08-31 02:54:49 +03:00
|
|
|
case *lnrpc.CloseStatusUpdate_ChanClose:
|
2018-01-24 05:34:29 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var closeAllChannelsCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "closeallchannels",
|
|
|
|
Category: "Channels",
|
|
|
|
Usage: "Close all existing channels.",
|
2018-01-24 05:34:29 +03:00
|
|
|
Description: `
|
|
|
|
Close all existing channels.
|
|
|
|
|
|
|
|
Channels will be closed either cooperatively or unilaterally, depending
|
|
|
|
on whether the channel is active or not. If the channel is inactive, any
|
|
|
|
settled funds within it will be time locked for a few blocks before they
|
|
|
|
can be spent.
|
|
|
|
|
|
|
|
One can request to close inactive channels only by using the
|
|
|
|
--inactive_only flag.
|
|
|
|
|
|
|
|
By default, one is prompted for confirmation every time an inactive
|
|
|
|
channel is requested to be closed. To avoid this, one can set the
|
|
|
|
--force flag, which will only prompt for confirmation once for all
|
2019-05-10 16:03:22 +03:00
|
|
|
inactive channels and proceed to close them.
|
|
|
|
|
|
|
|
In the case of cooperative closures, one can manually set the fee to
|
|
|
|
be used for the closing transactions via either the --conf_target or
|
|
|
|
--sat_per_byte arguments. This will be the starting value used during
|
|
|
|
fee negotiation. This is optional.`,
|
2018-01-24 05:34:29 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "inactive_only",
|
|
|
|
Usage: "close inactive channels only",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "force",
|
|
|
|
Usage: "ask for confirmation once before attempting " +
|
|
|
|
"to close existing channels",
|
|
|
|
},
|
2019-05-10 16:03:22 +03:00
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "conf_target",
|
|
|
|
Usage: "(optional) the number of blocks that the " +
|
|
|
|
"closing transactions *should* confirm in, will be " +
|
|
|
|
"used for fee estimation",
|
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "sat_per_byte",
|
|
|
|
Usage: "(optional) a manual fee expressed in " +
|
|
|
|
"sat/byte that should be used when crafting " +
|
|
|
|
"the closing transactions",
|
|
|
|
},
|
2018-01-24 05:34:29 +03:00
|
|
|
},
|
|
|
|
Action: actionDecorator(closeAllChannels),
|
|
|
|
}
|
|
|
|
|
|
|
|
func closeAllChannels(ctx *cli.Context) error {
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
listReq := &lnrpc.ListChannelsRequest{}
|
|
|
|
openChannels, err := client.ListChannels(context.Background(), listReq)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to fetch open channels: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(openChannels.Channels) == 0 {
|
|
|
|
return errors.New("no open channels to close")
|
|
|
|
}
|
|
|
|
|
2018-03-13 22:11:30 +03:00
|
|
|
var channelsToClose []*lnrpc.Channel
|
2018-01-24 05:34:29 +03:00
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.Bool("force") && ctx.Bool("inactive_only"):
|
|
|
|
msg := "Unilaterally close all inactive channels? The funds " +
|
|
|
|
"within these channels will be locked for some blocks " +
|
|
|
|
"(CSV delay) before they can be spent. (yes/no): "
|
|
|
|
|
|
|
|
confirmed := promptForConfirmation(msg)
|
|
|
|
|
|
|
|
// We can safely exit if the user did not confirm.
|
|
|
|
if !confirmed {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Go through the list of open channels and only add inactive
|
|
|
|
// channels to the closing list.
|
|
|
|
for _, channel := range openChannels.Channels {
|
|
|
|
if !channel.GetActive() {
|
|
|
|
channelsToClose = append(
|
|
|
|
channelsToClose, channel,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
case ctx.Bool("force"):
|
|
|
|
msg := "Close all active and inactive channels? Inactive " +
|
|
|
|
"channels will be closed unilaterally, so funds " +
|
|
|
|
"within them will be locked for a few blocks (CSV " +
|
|
|
|
"delay) before they can be spent. (yes/no): "
|
|
|
|
|
|
|
|
confirmed := promptForConfirmation(msg)
|
|
|
|
|
|
|
|
// We can safely exit if the user did not confirm.
|
|
|
|
if !confirmed {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
channelsToClose = openChannels.Channels
|
|
|
|
default:
|
|
|
|
// Go through the list of open channels and determine which
|
|
|
|
// should be added to the closing list.
|
|
|
|
for _, channel := range openChannels.Channels {
|
|
|
|
// If the channel is inactive, we'll attempt to
|
|
|
|
// unilaterally close the channel, so we should prompt
|
|
|
|
// the user for confirmation beforehand.
|
|
|
|
if !channel.GetActive() {
|
|
|
|
msg := fmt.Sprintf("Unilaterally close channel "+
|
|
|
|
"with node %s and channel point %s? "+
|
|
|
|
"The closing transaction will need %d "+
|
|
|
|
"confirmations before the funds can be "+
|
|
|
|
"spent. (yes/no): ", channel.RemotePubkey,
|
2020-06-10 15:21:13 +03:00
|
|
|
channel.ChannelPoint, channel.LocalConstraints.CsvDelay)
|
2018-01-24 05:34:29 +03:00
|
|
|
|
|
|
|
confirmed := promptForConfirmation(msg)
|
|
|
|
|
|
|
|
if confirmed {
|
|
|
|
channelsToClose = append(
|
|
|
|
channelsToClose, channel,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
} else if !ctx.Bool("inactive_only") {
|
|
|
|
// Otherwise, we'll only add active channels if
|
|
|
|
// we were not requested to close inactive
|
|
|
|
// channels only.
|
|
|
|
channelsToClose = append(
|
|
|
|
channelsToClose, channel,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// result defines the result of closing a channel. The closing
|
|
|
|
// transaction ID is populated if a channel is successfully closed.
|
|
|
|
// Otherwise, the error that prevented closing the channel is populated.
|
|
|
|
type result struct {
|
|
|
|
RemotePubKey string `json:"remote_pub_key"`
|
|
|
|
ChannelPoint string `json:"channel_point"`
|
|
|
|
ClosingTxid string `json:"closing_txid"`
|
|
|
|
FailErr string `json:"error"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Launch each channel closure in a goroutine in order to execute them
|
|
|
|
// in parallel. Once they're all executed, we will print the results as
|
|
|
|
// they come.
|
|
|
|
resultChan := make(chan result, len(channelsToClose))
|
|
|
|
for _, channel := range channelsToClose {
|
2018-03-13 22:11:30 +03:00
|
|
|
go func(channel *lnrpc.Channel) {
|
2018-01-24 05:34:29 +03:00
|
|
|
res := result{}
|
|
|
|
res.RemotePubKey = channel.RemotePubkey
|
|
|
|
res.ChannelPoint = channel.ChannelPoint
|
|
|
|
defer func() {
|
|
|
|
resultChan <- res
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Parse the channel point in order to create the close
|
|
|
|
// channel request.
|
|
|
|
s := strings.Split(res.ChannelPoint, ":")
|
|
|
|
if len(s) != 2 {
|
|
|
|
res.FailErr = "expected channel point with " +
|
|
|
|
"format txid:index"
|
|
|
|
return
|
|
|
|
}
|
|
|
|
index, err := strconv.ParseUint(s[1], 10, 32)
|
2016-08-31 02:54:49 +03:00
|
|
|
if err != nil {
|
2018-01-24 05:34:29 +03:00
|
|
|
res.FailErr = fmt.Sprintf("unable to parse "+
|
|
|
|
"channel point output index: %v", err)
|
|
|
|
return
|
2016-08-31 02:54:49 +03:00
|
|
|
}
|
|
|
|
|
2018-01-24 05:34:29 +03:00
|
|
|
req := &lnrpc.CloseChannelRequest{
|
|
|
|
ChannelPoint: &lnrpc.ChannelPoint{
|
|
|
|
FundingTxid: &lnrpc.ChannelPoint_FundingTxidStr{
|
|
|
|
FundingTxidStr: s[0],
|
|
|
|
},
|
|
|
|
OutputIndex: uint32(index),
|
|
|
|
},
|
2019-05-10 16:03:22 +03:00
|
|
|
Force: !channel.GetActive(),
|
|
|
|
TargetConf: int32(ctx.Int64("conf_target")),
|
|
|
|
SatPerByte: ctx.Int64("sat_per_byte"),
|
2018-01-24 05:34:29 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
txidChan := make(chan string, 1)
|
|
|
|
err = executeChannelClose(client, req, txidChan, false)
|
|
|
|
if err != nil {
|
|
|
|
res.FailErr = fmt.Sprintf("unable to close "+
|
|
|
|
"channel: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
res.ClosingTxid = <-txidChan
|
|
|
|
}(channel)
|
|
|
|
}
|
|
|
|
|
|
|
|
for range channelsToClose {
|
|
|
|
res := <-resultChan
|
|
|
|
printJSON(res)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// promptForConfirmation continuously prompts the user for the message until
|
|
|
|
// receiving a response of "yes" or "no" and returns their answer as a bool.
|
|
|
|
func promptForConfirmation(msg string) bool {
|
|
|
|
reader := bufio.NewReader(os.Stdin)
|
|
|
|
|
|
|
|
for {
|
|
|
|
fmt.Print(msg)
|
|
|
|
|
|
|
|
answer, err := reader.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
answer = strings.ToLower(strings.TrimSpace(answer))
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case answer == "yes":
|
|
|
|
return true
|
|
|
|
case answer == "no":
|
|
|
|
return false
|
|
|
|
default:
|
|
|
|
continue
|
2016-08-31 02:54:49 +03:00
|
|
|
}
|
2016-07-08 01:35:06 +03:00
|
|
|
}
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2018-05-29 12:26:47 +03:00
|
|
|
var abandonChannelCommand = cli.Command{
|
|
|
|
Name: "abandonchannel",
|
|
|
|
Category: "Channels",
|
|
|
|
Usage: "Abandons an existing channel.",
|
|
|
|
Description: `
|
2018-11-12 18:03:00 +03:00
|
|
|
Removes all channel state from the database except for a close
|
2018-05-29 12:26:47 +03:00
|
|
|
summary. This method can be used to get rid of permanently unusable
|
2018-11-12 18:03:00 +03:00
|
|
|
channels due to bugs fixed in newer versions of lnd.
|
|
|
|
|
2018-05-29 12:26:47 +03:00
|
|
|
Only available when lnd is built in debug mode.
|
|
|
|
|
|
|
|
To view which funding_txids/output_indexes can be used for this command,
|
|
|
|
see the channel_point values within the listchannels command output.
|
|
|
|
The format for a channel_point is 'funding_txid:output_index'.`,
|
|
|
|
ArgsUsage: "funding_txid [output_index]",
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "funding_txid",
|
|
|
|
Usage: "the txid of the channel's funding transaction",
|
|
|
|
},
|
|
|
|
cli.IntFlag{
|
|
|
|
Name: "output_index",
|
|
|
|
Usage: "the output index for the funding output of the funding " +
|
|
|
|
"transaction",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: actionDecorator(abandonChannel),
|
|
|
|
}
|
|
|
|
|
|
|
|
func abandonChannel(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
// Show command help if no arguments and flags were provided.
|
|
|
|
if ctx.NArg() == 0 && ctx.NumFlags() == 0 {
|
|
|
|
cli.ShowCommandHelp(ctx, "abandonchannel")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
channelPoint, err := parseChannelPoint(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
req := &lnrpc.AbandonChannelRequest{
|
|
|
|
ChannelPoint: channelPoint,
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := client.AbandonChannel(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseChannelPoint parses a funding txid and output index from the command
|
|
|
|
// line. Both named options as well as unnamed parameters are supported.
|
|
|
|
func parseChannelPoint(ctx *cli.Context) (*lnrpc.ChannelPoint, error) {
|
|
|
|
channelPoint := &lnrpc.ChannelPoint{}
|
|
|
|
|
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("funding_txid"):
|
|
|
|
channelPoint.FundingTxid = &lnrpc.ChannelPoint_FundingTxidStr{
|
|
|
|
FundingTxidStr: ctx.String("funding_txid"),
|
|
|
|
}
|
|
|
|
case args.Present():
|
|
|
|
channelPoint.FundingTxid = &lnrpc.ChannelPoint_FundingTxidStr{
|
|
|
|
FundingTxidStr: args.First(),
|
|
|
|
}
|
|
|
|
args = args.Tail()
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("funding txid argument missing")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("output_index"):
|
|
|
|
channelPoint.OutputIndex = uint32(ctx.Int("output_index"))
|
|
|
|
case args.Present():
|
|
|
|
index, err := strconv.ParseUint(args.First(), 10, 32)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to decode output index: %v", err)
|
|
|
|
}
|
|
|
|
channelPoint.OutputIndex = uint32(index)
|
|
|
|
default:
|
|
|
|
channelPoint.OutputIndex = 0
|
|
|
|
}
|
|
|
|
|
|
|
|
return channelPoint, nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var listPeersCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "listpeers",
|
|
|
|
Category: "Peers",
|
|
|
|
Usage: "List all active, currently connected peers.",
|
2020-03-13 10:15:49 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "list_errors",
|
|
|
|
Usage: "list a full set of most recent errors for the peer",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: actionDecorator(listPeers),
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 23:01:08 +03:00
|
|
|
func listPeers(ctx *cli.Context) error {
|
2016-06-21 22:35:07 +03:00
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-06-21 22:35:07 +03:00
|
|
|
|
2020-03-13 10:15:49 +03:00
|
|
|
// By default, we display a single error on the cli. If the user
|
|
|
|
// specifically requests a full error set, then we will provide it.
|
|
|
|
req := &lnrpc.ListPeersRequest{
|
|
|
|
LatestError: !ctx.IsSet("list_errors"),
|
|
|
|
}
|
2016-06-21 22:35:07 +03:00
|
|
|
resp, err := client.ListPeers(ctxb, req)
|
|
|
|
if err != nil {
|
2016-06-29 23:01:08 +03:00
|
|
|
return err
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(resp)
|
2016-06-29 23:01:08 +03:00
|
|
|
return nil
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2017-10-12 12:42:06 +03:00
|
|
|
var createCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "create",
|
2018-05-03 11:49:09 +03:00
|
|
|
Category: "Startup",
|
|
|
|
Usage: "Initialize a wallet when starting lnd for the first time.",
|
2018-02-02 07:52:40 +03:00
|
|
|
Description: `
|
|
|
|
The create command is used to initialize an lnd wallet from scratch for
|
|
|
|
the very first time. This is interactive command with one required
|
|
|
|
argument (the password), and one optional argument (the mnemonic
|
2018-09-10 01:16:00 +03:00
|
|
|
passphrase).
|
2018-02-02 07:52:40 +03:00
|
|
|
|
|
|
|
The first argument (the password) is required and MUST be greater than
|
|
|
|
8 characters. This will be used to encrypt the wallet within lnd. This
|
|
|
|
MUST be remembered as it will be required to fully start up the daemon.
|
|
|
|
|
|
|
|
The second argument is an optional 24-word mnemonic derived from BIP
|
|
|
|
39. If provided, then the internal wallet will use the seed derived
|
|
|
|
from this mnemonic to generate all keys.
|
|
|
|
|
|
|
|
This command returns a 24-word seed in the scenario that NO mnemonic
|
|
|
|
was provided by the user. This should be written down as it can be used
|
|
|
|
to potentially recover all on-chain funds, and most off-chain funds as
|
|
|
|
well.
|
2018-12-10 07:16:11 +03:00
|
|
|
|
|
|
|
Finally, it's also possible to use this command and a set of static
|
|
|
|
channel backups to trigger a recover attempt for the provided Static
|
|
|
|
Channel Backups. Only one of the three parameters will be accepted. See
|
|
|
|
the restorechanbackup command for further details w.r.t the format
|
|
|
|
accepted.
|
2018-02-02 07:52:40 +03:00
|
|
|
`,
|
2018-12-10 07:16:11 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "single_backup",
|
|
|
|
Usage: "a hex encoded single channel backup obtained " +
|
|
|
|
"from exportchanbackup",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "multi_backup",
|
|
|
|
Usage: "a hex encoded multi-channel backup obtained " +
|
|
|
|
"from exportchanbackup",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "multi_file",
|
|
|
|
Usage: "the path to a multi-channel back up file",
|
|
|
|
},
|
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(create),
|
2017-10-12 12:42:06 +03:00
|
|
|
}
|
|
|
|
|
2018-02-02 07:52:40 +03:00
|
|
|
// monowidthColumns takes a set of words, and the number of desired columns,
|
|
|
|
// and returns a new set of words that have had white space appended to the
|
|
|
|
// word in order to create a mono-width column.
|
|
|
|
func monowidthColumns(words []string, ncols int) []string {
|
|
|
|
// Determine max size of words in each column.
|
|
|
|
colWidths := make([]int, ncols)
|
|
|
|
for i, word := range words {
|
|
|
|
col := i % ncols
|
|
|
|
curWidth := colWidths[col]
|
|
|
|
if len(word) > curWidth {
|
|
|
|
colWidths[col] = len(word)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Append whitespace to each word to make columns mono-width.
|
|
|
|
finalWords := make([]string, len(words))
|
|
|
|
for i, word := range words {
|
|
|
|
col := i % ncols
|
|
|
|
width := colWidths[col]
|
|
|
|
|
|
|
|
diff := width - len(word)
|
|
|
|
finalWords[i] = word + strings.Repeat(" ", diff)
|
|
|
|
}
|
|
|
|
|
|
|
|
return finalWords
|
|
|
|
}
|
|
|
|
|
2017-10-12 12:42:06 +03:00
|
|
|
func create(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getWalletUnlockerClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
2019-11-09 19:37:03 +03:00
|
|
|
var (
|
|
|
|
chanBackups *lnrpc.ChanBackupSnapshot
|
|
|
|
|
|
|
|
// We use var restoreSCB to track if we will be including an SCB
|
|
|
|
// recovery in the init wallet request.
|
|
|
|
restoreSCB = false
|
|
|
|
)
|
|
|
|
|
|
|
|
backups, err := parseChanBackups(ctx)
|
|
|
|
|
|
|
|
// We'll check to see if the user provided any static channel backups (SCB),
|
|
|
|
// if so, we will warn the user that SCB recovery closes all open channels
|
|
|
|
// and ask them to confirm their intention.
|
|
|
|
// If the user agrees, we'll add the SCB recovery onto the final init wallet
|
|
|
|
// request.
|
|
|
|
switch {
|
|
|
|
// parseChanBackups returns an errMissingBackup error (which we ignore) if
|
|
|
|
// the user did not request a SCB recovery.
|
|
|
|
case err == errMissingChanBackup:
|
|
|
|
|
|
|
|
// Passed an invalid channel backup file.
|
|
|
|
case err != nil:
|
|
|
|
return fmt.Errorf("unable to parse chan backups: %v", err)
|
|
|
|
|
|
|
|
// We have an SCB recovery option with a valid backup file.
|
|
|
|
default:
|
|
|
|
|
|
|
|
warningLoop:
|
|
|
|
for {
|
|
|
|
|
|
|
|
fmt.Println()
|
|
|
|
fmt.Printf("WARNING: You are attempting to restore from a " +
|
|
|
|
"static channel backup (SCB) file.\nThis action will CLOSE " +
|
|
|
|
"all currently open channels, and you will pay on-chain fees." +
|
|
|
|
"\n\nAre you sure you want to recover funds from a" +
|
|
|
|
" static channel backup? (Enter y/n): ")
|
|
|
|
|
|
|
|
reader := bufio.NewReader(os.Stdin)
|
|
|
|
answer, err := reader.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
answer = strings.TrimSpace(answer)
|
|
|
|
answer = strings.ToLower(answer)
|
|
|
|
|
|
|
|
switch answer {
|
|
|
|
case "y":
|
|
|
|
restoreSCB = true
|
|
|
|
break warningLoop
|
|
|
|
case "n":
|
2019-12-05 06:24:35 +03:00
|
|
|
fmt.Println("Aborting SCB recovery")
|
|
|
|
return nil
|
2019-11-09 19:37:03 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Proceed with SCB recovery.
|
|
|
|
if restoreSCB {
|
|
|
|
fmt.Println("Static Channel Backup (SCB) recovery selected!")
|
|
|
|
if backups != nil {
|
|
|
|
switch {
|
|
|
|
case backups.GetChanBackups() != nil:
|
|
|
|
singleBackup := backups.GetChanBackups()
|
|
|
|
chanBackups = &lnrpc.ChanBackupSnapshot{
|
|
|
|
SingleChanBackups: singleBackup,
|
|
|
|
}
|
|
|
|
|
|
|
|
case backups.GetMultiChanBackup() != nil:
|
|
|
|
multiBackup := backups.GetMultiChanBackup()
|
|
|
|
chanBackups = &lnrpc.ChanBackupSnapshot{
|
|
|
|
MultiChanBackup: &lnrpc.MultiChanBackup{
|
|
|
|
MultiChanBackup: multiBackup,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2019-07-15 17:27:32 +03:00
|
|
|
walletPassword, err := capturePassword(
|
|
|
|
"Input wallet password: ", false, walletunlocker.ValidatePassword,
|
|
|
|
)
|
2017-10-12 12:42:06 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-02-21 17:25:42 +03:00
|
|
|
|
2018-02-02 07:52:40 +03:00
|
|
|
// Next, we'll see if the user has 24-word mnemonic they want to use to
|
|
|
|
// derive a seed within the wallet.
|
|
|
|
var (
|
|
|
|
hasMnemonic bool
|
|
|
|
)
|
|
|
|
|
|
|
|
mnemonicCheck:
|
|
|
|
for {
|
|
|
|
fmt.Println()
|
|
|
|
fmt.Printf("Do you have an existing cipher seed " +
|
|
|
|
"mnemonic you want to use? (Enter y/n): ")
|
|
|
|
|
|
|
|
reader := bufio.NewReader(os.Stdin)
|
|
|
|
answer, err := reader.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Println()
|
|
|
|
|
|
|
|
answer = strings.TrimSpace(answer)
|
|
|
|
answer = strings.ToLower(answer)
|
|
|
|
|
|
|
|
switch answer {
|
|
|
|
case "y":
|
|
|
|
hasMnemonic = true
|
|
|
|
break mnemonicCheck
|
|
|
|
case "n":
|
|
|
|
hasMnemonic = false
|
|
|
|
break mnemonicCheck
|
|
|
|
}
|
2017-10-12 12:42:06 +03:00
|
|
|
}
|
2018-02-02 07:52:40 +03:00
|
|
|
|
|
|
|
// If the user *does* have an existing seed they want to use, then
|
|
|
|
// we'll read that in directly from the terminal.
|
|
|
|
var (
|
|
|
|
cipherSeedMnemonic []string
|
|
|
|
aezeedPass []byte
|
2018-03-27 00:15:04 +03:00
|
|
|
recoveryWindow int32
|
2018-02-02 07:52:40 +03:00
|
|
|
)
|
|
|
|
if hasMnemonic {
|
|
|
|
// We'll now prompt the user to enter in their 24-word
|
|
|
|
// mnemonic.
|
|
|
|
fmt.Printf("Input your 24-word mnemonic separated by spaces: ")
|
|
|
|
reader := bufio.NewReader(os.Stdin)
|
|
|
|
mnemonic, err := reader.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// We'll trim off extra spaces, and ensure the mnemonic is all
|
|
|
|
// lower case, then populate our request.
|
|
|
|
mnemonic = strings.TrimSpace(mnemonic)
|
|
|
|
mnemonic = strings.ToLower(mnemonic)
|
|
|
|
|
|
|
|
cipherSeedMnemonic = strings.Split(mnemonic, " ")
|
|
|
|
|
|
|
|
fmt.Println()
|
|
|
|
|
2018-03-13 22:42:44 +03:00
|
|
|
if len(cipherSeedMnemonic) != 24 {
|
|
|
|
return fmt.Errorf("wrong cipher seed mnemonic "+
|
|
|
|
"length: got %v words, expecting %v words",
|
2018-03-13 23:01:11 +03:00
|
|
|
len(cipherSeedMnemonic), 24)
|
2018-03-13 22:42:44 +03:00
|
|
|
}
|
|
|
|
|
2018-02-02 07:52:40 +03:00
|
|
|
// Additionally, the user may have a passphrase, that will also
|
|
|
|
// need to be provided so the daemon can properly decipher the
|
|
|
|
// cipher seed.
|
2020-09-04 17:06:13 +03:00
|
|
|
aezeedPass, err = readPassword("Input your cipher seed " +
|
|
|
|
"passphrase (press enter if your seed doesn't have a " +
|
|
|
|
"passphrase): ")
|
2018-02-02 07:52:40 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-03-27 00:15:04 +03:00
|
|
|
for {
|
|
|
|
fmt.Println()
|
|
|
|
fmt.Printf("Input an optional address look-ahead "+
|
|
|
|
"used to scan for used keys (default %d): ",
|
|
|
|
defaultRecoveryWindow)
|
|
|
|
|
|
|
|
reader := bufio.NewReader(os.Stdin)
|
|
|
|
answer, err := reader.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Println()
|
|
|
|
|
|
|
|
answer = strings.TrimSpace(answer)
|
|
|
|
|
|
|
|
if len(answer) == 0 {
|
|
|
|
recoveryWindow = defaultRecoveryWindow
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
lookAhead, err := strconv.Atoi(answer)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Println("Unable to parse recovery "+
|
|
|
|
"window: %v", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
recoveryWindow = int32(lookAhead)
|
|
|
|
break
|
|
|
|
}
|
2018-02-02 07:52:40 +03:00
|
|
|
} else {
|
|
|
|
// Otherwise, if the user doesn't have a mnemonic that they
|
|
|
|
// want to use, we'll generate a fresh one with the GenSeed
|
|
|
|
// command.
|
|
|
|
fmt.Println("Your cipher seed can optionally be encrypted.")
|
2019-07-15 17:27:32 +03:00
|
|
|
|
|
|
|
instruction := "Input your passphrase if you wish to encrypt it " +
|
2018-02-02 07:52:40 +03:00
|
|
|
"(or press enter to proceed without a cipher seed " +
|
2019-07-15 17:27:32 +03:00
|
|
|
"passphrase): "
|
|
|
|
aezeedPass, err = capturePassword(
|
|
|
|
instruction, true, func(_ []byte) error { return nil },
|
|
|
|
)
|
2018-02-02 07:52:40 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Println()
|
|
|
|
fmt.Println("Generating fresh cipher seed...")
|
|
|
|
fmt.Println()
|
|
|
|
|
|
|
|
genSeedReq := &lnrpc.GenSeedRequest{
|
2019-07-15 17:27:32 +03:00
|
|
|
AezeedPassphrase: aezeedPass,
|
2018-02-02 07:52:40 +03:00
|
|
|
}
|
|
|
|
seedResp, err := client.GenSeed(ctxb, genSeedReq)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to generate seed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cipherSeedMnemonic = seedResp.CipherSeedMnemonic
|
|
|
|
}
|
|
|
|
|
|
|
|
// Before we initialize the wallet, we'll display the cipher seed to
|
|
|
|
// the user so they can write it down.
|
|
|
|
mnemonicWords := cipherSeedMnemonic
|
|
|
|
|
|
|
|
fmt.Println("!!!YOU MUST WRITE DOWN THIS SEED TO BE ABLE TO " +
|
|
|
|
"RESTORE THE WALLET!!!\n")
|
|
|
|
|
|
|
|
fmt.Println("---------------BEGIN LND CIPHER SEED---------------")
|
|
|
|
|
|
|
|
numCols := 4
|
|
|
|
colWords := monowidthColumns(mnemonicWords, numCols)
|
|
|
|
for i := 0; i < len(colWords); i += numCols {
|
|
|
|
fmt.Printf("%2d. %3s %2d. %3s %2d. %3s %2d. %3s\n",
|
|
|
|
i+1, colWords[i], i+2, colWords[i+1], i+3,
|
|
|
|
colWords[i+2], i+4, colWords[i+3])
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Println("---------------END LND CIPHER SEED-----------------")
|
|
|
|
|
|
|
|
fmt.Println("\n!!!YOU MUST WRITE DOWN THIS SEED TO BE ABLE TO " +
|
|
|
|
"RESTORE THE WALLET!!!")
|
|
|
|
|
|
|
|
// With either the user's prior cipher seed, or a newly generated one,
|
|
|
|
// we'll go ahead and initialize the wallet.
|
|
|
|
req := &lnrpc.InitWalletRequest{
|
2019-07-15 17:27:32 +03:00
|
|
|
WalletPassword: walletPassword,
|
2018-02-02 07:52:40 +03:00
|
|
|
CipherSeedMnemonic: cipherSeedMnemonic,
|
|
|
|
AezeedPassphrase: aezeedPass,
|
2018-03-27 00:15:04 +03:00
|
|
|
RecoveryWindow: recoveryWindow,
|
2018-12-10 07:16:11 +03:00
|
|
|
ChannelBackups: chanBackups,
|
2018-02-02 07:52:40 +03:00
|
|
|
}
|
|
|
|
if _, err := client.InitWallet(ctxb, req); err != nil {
|
2017-10-12 12:42:06 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-02-02 07:52:40 +03:00
|
|
|
fmt.Println("\nlnd successfully initialized!")
|
|
|
|
|
2017-10-12 12:42:06 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-07-15 17:27:32 +03:00
|
|
|
// capturePassword returns a password value that has been entered twice by the
|
|
|
|
// user, to ensure that the user knows what password they have entered. The user
|
|
|
|
// will be prompted to retry until the passwords match. If the optional param is
|
|
|
|
// true, the function may return an empty byte array if the user opts against
|
|
|
|
// using a password.
|
|
|
|
func capturePassword(instruction string, optional bool,
|
|
|
|
validate func([]byte) error) ([]byte, error) {
|
|
|
|
|
|
|
|
for {
|
2020-09-04 17:06:13 +03:00
|
|
|
password, err := readPassword(instruction)
|
2019-07-15 17:27:32 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do not require users to repeat password if
|
|
|
|
// it is optional and they are not using one.
|
|
|
|
if len(password) == 0 && optional {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the password provided is not valid, restart
|
|
|
|
// password capture process from the beginning.
|
|
|
|
if err := validate(password); err != nil {
|
|
|
|
fmt.Println(err.Error())
|
|
|
|
fmt.Println()
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2020-09-04 17:06:13 +03:00
|
|
|
passwordConfirmed, err := readPassword("Confirm password: ")
|
2019-07-15 17:27:32 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if bytes.Equal(password, passwordConfirmed) {
|
|
|
|
return password, nil
|
|
|
|
}
|
|
|
|
|
2020-09-04 17:06:13 +03:00
|
|
|
fmt.Println("Passwords don't match, please try again")
|
2019-07-15 17:27:32 +03:00
|
|
|
fmt.Println()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-12 12:42:06 +03:00
|
|
|
var unlockCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "unlock",
|
2018-05-03 11:49:09 +03:00
|
|
|
Category: "Startup",
|
|
|
|
Usage: "Unlock an encrypted wallet at startup.",
|
2018-02-02 07:52:40 +03:00
|
|
|
Description: `
|
|
|
|
The unlock command is used to decrypt lnd's wallet state in order to
|
|
|
|
start up. This command MUST be run after booting up lnd before it's
|
|
|
|
able to carry out its duties. An exception is if a user is running with
|
2018-09-05 04:53:37 +03:00
|
|
|
--noseedbackup, then a default passphrase will be used.
|
2018-02-02 07:52:40 +03:00
|
|
|
`,
|
2018-03-27 00:15:04 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.IntFlag{
|
|
|
|
Name: "recovery_window",
|
|
|
|
Usage: "address lookahead to resume recovery rescan, " +
|
|
|
|
"value should be non-zero -- To recover all " +
|
|
|
|
"funds, this should be greater than the " +
|
|
|
|
"maximum number of consecutive, unused " +
|
|
|
|
"addresses ever generated by the wallet.",
|
|
|
|
},
|
2020-03-10 16:19:42 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "stdin",
|
|
|
|
Usage: "read password from standard input instead of " +
|
|
|
|
"prompting for it. THIS IS CONSIDERED TO " +
|
|
|
|
"BE DANGEROUS if the password is located in " +
|
|
|
|
"a file that can be read by another user. " +
|
|
|
|
"This flag should only be used in " +
|
|
|
|
"combination with some sort of password " +
|
|
|
|
"manager or secrets vault.",
|
|
|
|
},
|
2018-03-27 00:15:04 +03:00
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(unlock),
|
2017-10-12 12:42:06 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func unlock(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getWalletUnlockerClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
2020-03-10 16:19:42 +03:00
|
|
|
var (
|
|
|
|
pw []byte
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
switch {
|
|
|
|
// Read the password from standard in as if it were a file. This should
|
|
|
|
// only be used if the password is piped into lncli from some sort of
|
|
|
|
// password manager. If the user types the password instead, it will be
|
|
|
|
// echoed in the console.
|
|
|
|
case ctx.IsSet("stdin"):
|
|
|
|
reader := bufio.NewReader(os.Stdin)
|
|
|
|
pw, err = reader.ReadBytes('\n')
|
|
|
|
|
|
|
|
// Remove carriage return and newline characters.
|
|
|
|
pw = bytes.Trim(pw, "\r\n")
|
|
|
|
|
|
|
|
// Read the password from a terminal by default. This requires the
|
|
|
|
// terminal to be a real tty and will fail if a string is piped into
|
|
|
|
// lncli.
|
|
|
|
default:
|
2020-09-04 17:06:13 +03:00
|
|
|
pw, err = readPassword("Input wallet password: ")
|
2020-03-10 16:19:42 +03:00
|
|
|
}
|
2017-10-12 12:42:06 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-03-27 00:15:04 +03:00
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
// Parse the optional recovery window if it is specified. By default,
|
|
|
|
// the recovery window will be 0, indicating no lookahead should be
|
|
|
|
// used.
|
|
|
|
var recoveryWindow int32
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("recovery_window"):
|
|
|
|
recoveryWindow = int32(ctx.Int64("recovery_window"))
|
|
|
|
case args.Present():
|
|
|
|
window, err := strconv.ParseInt(args.First(), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
recoveryWindow = int32(window)
|
|
|
|
}
|
|
|
|
|
2017-10-12 12:42:06 +03:00
|
|
|
req := &lnrpc.UnlockWalletRequest{
|
2018-02-02 07:52:40 +03:00
|
|
|
WalletPassword: pw,
|
2018-03-27 00:15:04 +03:00
|
|
|
RecoveryWindow: recoveryWindow,
|
2017-10-12 12:42:06 +03:00
|
|
|
}
|
|
|
|
_, err = client.UnlockWallet(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-02-02 07:52:40 +03:00
|
|
|
fmt.Println("\nlnd successfully unlocked!")
|
|
|
|
|
2018-12-10 07:16:11 +03:00
|
|
|
// TODO(roasbeef): add ability to accept hex single and multi backups
|
|
|
|
|
2017-10-12 12:42:06 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-20 10:14:51 +03:00
|
|
|
var changePasswordCommand = cli.Command{
|
|
|
|
Name: "changepassword",
|
|
|
|
Category: "Startup",
|
|
|
|
Usage: "Change an encrypted wallet's password at startup.",
|
|
|
|
Description: `
|
|
|
|
The changepassword command is used to Change lnd's encrypted wallet's
|
|
|
|
password. It will automatically unlock the daemon if the password change
|
|
|
|
is successful.
|
|
|
|
|
|
|
|
If one did not specify a password for their wallet (running lnd with
|
2018-09-05 04:53:37 +03:00
|
|
|
--noseedbackup), one must restart their daemon without
|
|
|
|
--noseedbackup and use this command. The "current password" field
|
2018-04-20 10:14:51 +03:00
|
|
|
should be left empty.
|
|
|
|
`,
|
|
|
|
Action: actionDecorator(changePassword),
|
|
|
|
}
|
|
|
|
|
|
|
|
func changePassword(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getWalletUnlockerClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
2020-09-04 17:06:13 +03:00
|
|
|
currentPw, err := readPassword("Input current wallet password: ")
|
2018-04-20 10:14:51 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-09-04 17:06:13 +03:00
|
|
|
newPw, err := readPassword("Input new wallet password: ")
|
2018-04-20 10:14:51 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-09-04 17:06:13 +03:00
|
|
|
confirmPw, err := readPassword("Confirm new wallet password: ")
|
2018-04-20 10:14:51 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(newPw, confirmPw) {
|
|
|
|
return fmt.Errorf("passwords don't match")
|
|
|
|
}
|
|
|
|
|
|
|
|
req := &lnrpc.ChangePasswordRequest{
|
|
|
|
CurrentPassword: currentPw,
|
|
|
|
NewPassword: newPw,
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = client.ChangePassword(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var walletBalanceCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "walletbalance",
|
|
|
|
Category: "Wallet",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Compute and display the wallet's current balance.",
|
2018-05-01 14:28:30 +03:00
|
|
|
Action: actionDecorator(walletBalance),
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2016-06-29 23:01:08 +03:00
|
|
|
func walletBalance(ctx *cli.Context) error {
|
2016-06-21 22:35:07 +03:00
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-06-21 22:35:07 +03:00
|
|
|
|
2018-02-18 02:42:17 +03:00
|
|
|
req := &lnrpc.WalletBalanceRequest{}
|
2016-06-21 22:35:07 +03:00
|
|
|
resp, err := client.WalletBalance(ctxb, req)
|
|
|
|
if err != nil {
|
2016-06-29 23:01:08 +03:00
|
|
|
return err
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(resp)
|
2016-06-29 23:01:08 +03:00
|
|
|
return nil
|
2016-06-21 22:35:07 +03:00
|
|
|
}
|
2016-07-06 04:58:41 +03:00
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var channelBalanceCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "channelbalance",
|
|
|
|
Category: "Channels",
|
2018-04-20 10:14:51 +03:00
|
|
|
Usage: "Returns the sum of the total available channel balance across " +
|
2018-05-03 11:49:09 +03:00
|
|
|
"all open channels.",
|
2018-04-20 10:14:51 +03:00
|
|
|
Action: actionDecorator(channelBalance),
|
2016-09-15 21:59:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func channelBalance(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-09-15 21:59:51 +03:00
|
|
|
|
|
|
|
req := &lnrpc.ChannelBalanceRequest{}
|
|
|
|
resp, err := client.ChannelBalance(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(resp)
|
2016-09-15 21:59:51 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var getInfoCommand = cli.Command{
|
2017-03-03 01:23:16 +03:00
|
|
|
Name: "getinfo",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Returns basic information related to the active daemon.",
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(getInfo),
|
2016-07-06 04:58:41 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func getInfo(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-07-06 04:58:41 +03:00
|
|
|
|
|
|
|
req := &lnrpc.GetInfoRequest{}
|
|
|
|
resp, err := client.GetInfo(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-12-20 12:05:27 +03:00
|
|
|
printRespJSON(resp)
|
2016-07-06 04:58:41 +03:00
|
|
|
return nil
|
|
|
|
}
|
2016-07-08 01:35:58 +03:00
|
|
|
|
2020-06-09 09:47:17 +03:00
|
|
|
var getRecoveryInfoCommand = cli.Command{
|
|
|
|
Name: "getrecoveryinfo",
|
|
|
|
Usage: "Display information about an ongoing recovery attempt.",
|
|
|
|
Action: actionDecorator(getRecoveryInfo),
|
|
|
|
}
|
|
|
|
|
|
|
|
func getRecoveryInfo(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
req := &lnrpc.GetRecoveryInfoRequest{}
|
|
|
|
resp, err := client.GetRecoveryInfo(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var pendingChannelsCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "pendingchannels",
|
|
|
|
Category: "Channels",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Display information pertaining to pending channels.",
|
2018-05-01 14:28:30 +03:00
|
|
|
Action: actionDecorator(pendingChannels),
|
2016-07-08 01:35:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func pendingChannels(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-07-08 01:35:58 +03:00
|
|
|
|
2018-01-04 23:20:25 +03:00
|
|
|
req := &lnrpc.PendingChannelsRequest{}
|
2016-07-08 01:35:58 +03:00
|
|
|
resp, err := client.PendingChannels(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(resp)
|
2016-07-08 01:35:58 +03:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2016-07-13 03:47:24 +03:00
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var listChannelsCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "listchannels",
|
|
|
|
Category: "Channels",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "List all open channels.",
|
2016-09-26 06:04:58 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.BoolFlag{
|
2018-03-13 22:11:25 +03:00
|
|
|
Name: "active_only",
|
2016-09-26 06:04:58 +03:00
|
|
|
Usage: "only list channels which are currently active",
|
|
|
|
},
|
2018-03-13 22:11:25 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "inactive_only",
|
|
|
|
Usage: "only list channels which are currently inactive",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "public_only",
|
|
|
|
Usage: "only list channels which are currently public",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "private_only",
|
|
|
|
Usage: "only list channels which are currently private",
|
|
|
|
},
|
2020-03-03 16:11:33 +03:00
|
|
|
cli.StringFlag{
|
|
|
|
Name: "peer",
|
|
|
|
Usage: "(optional) only display channels with a " +
|
|
|
|
"particular peer, accepts 66-byte, " +
|
|
|
|
"hex-encoded pubkeys",
|
|
|
|
},
|
2016-09-26 06:04:58 +03:00
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(listChannels),
|
2016-09-26 06:04:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func listChannels(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-09-26 06:04:58 +03:00
|
|
|
|
2020-03-03 16:11:33 +03:00
|
|
|
peer := ctx.String("peer")
|
|
|
|
|
|
|
|
// If the user requested channels with a particular key, parse the
|
|
|
|
// provided pubkey.
|
|
|
|
var peerKey []byte
|
|
|
|
if len(peer) > 0 {
|
|
|
|
pk, err := route.NewVertexFromStr(peer)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("invalid --peer pubkey: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
peerKey = pk[:]
|
|
|
|
}
|
|
|
|
|
2018-03-13 22:11:25 +03:00
|
|
|
req := &lnrpc.ListChannelsRequest{
|
|
|
|
ActiveOnly: ctx.Bool("active_only"),
|
|
|
|
InactiveOnly: ctx.Bool("inactive_only"),
|
|
|
|
PublicOnly: ctx.Bool("public_only"),
|
|
|
|
PrivateOnly: ctx.Bool("private_only"),
|
2020-03-03 16:11:33 +03:00
|
|
|
Peer: peerKey,
|
2018-03-13 22:11:25 +03:00
|
|
|
}
|
|
|
|
|
2016-09-26 06:04:58 +03:00
|
|
|
resp, err := client.ListChannels(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(resp)
|
2016-09-26 06:04:58 +03:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-05-24 12:35:53 +03:00
|
|
|
var closedChannelsCommand = cli.Command{
|
|
|
|
Name: "closedchannels",
|
|
|
|
Category: "Channels",
|
|
|
|
Usage: "List all closed channels.",
|
2018-07-09 22:40:47 +03:00
|
|
|
Flags: []cli.Flag{
|
2018-05-24 12:35:53 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "cooperative",
|
|
|
|
Usage: "list channels that were closed cooperatively",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
2018-07-09 22:40:47 +03:00
|
|
|
Name: "local_force",
|
2018-05-24 12:35:53 +03:00
|
|
|
Usage: "list channels that were force-closed " +
|
2018-07-09 22:40:47 +03:00
|
|
|
"by the local node",
|
2018-05-24 12:35:53 +03:00
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
2018-07-09 22:40:47 +03:00
|
|
|
Name: "remote_force",
|
2018-05-24 12:35:53 +03:00
|
|
|
Usage: "list channels that were force-closed " +
|
2018-07-09 22:40:47 +03:00
|
|
|
"by the remote node",
|
2018-05-24 12:35:53 +03:00
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
2018-07-09 22:40:47 +03:00
|
|
|
Name: "breach",
|
2018-05-24 12:35:53 +03:00
|
|
|
Usage: "list channels for which the remote node " +
|
2018-07-09 22:40:47 +03:00
|
|
|
"attempted to broadcast a prior " +
|
|
|
|
"revoked channel state",
|
2018-05-24 12:35:53 +03:00
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "funding_canceled",
|
|
|
|
Usage: "list channels that were never fully opened",
|
|
|
|
},
|
2018-05-29 12:26:47 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "abandoned",
|
|
|
|
Usage: "list channels that were abandoned by " +
|
|
|
|
"the local node",
|
|
|
|
},
|
2018-05-24 12:35:53 +03:00
|
|
|
},
|
2018-07-09 22:40:47 +03:00
|
|
|
Action: actionDecorator(closedChannels),
|
2018-05-24 12:35:53 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func closedChannels(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
req := &lnrpc.ClosedChannelsRequest{
|
|
|
|
Cooperative: ctx.Bool("cooperative"),
|
|
|
|
LocalForce: ctx.Bool("local_force"),
|
|
|
|
RemoteForce: ctx.Bool("remote_force"),
|
|
|
|
Breach: ctx.Bool("breach"),
|
2019-10-03 18:22:43 +03:00
|
|
|
FundingCanceled: ctx.Bool("funding_canceled"),
|
2018-05-29 12:26:47 +03:00
|
|
|
Abandoned: ctx.Bool("abandoned"),
|
2018-05-24 12:35:53 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := client.ClosedChannels(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var describeGraphCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "describegraph",
|
2020-03-27 12:43:32 +03:00
|
|
|
Category: "Graph",
|
2018-02-06 02:05:04 +03:00
|
|
|
Description: "Prints a human readable version of the known channel " +
|
2016-12-27 08:52:15 +03:00
|
|
|
"graph from the PoV of the node",
|
2018-09-27 09:45:04 +03:00
|
|
|
Usage: "Describe the network graph.",
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "include_unannounced",
|
|
|
|
Usage: "If set, unannounced channels will be included in the " +
|
|
|
|
"graph. Unannounced channels are both private channels, and " +
|
|
|
|
"public channels that are not yet announced to the network.",
|
|
|
|
},
|
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(describeGraph),
|
2016-08-31 02:54:49 +03:00
|
|
|
}
|
2016-08-20 23:49:35 +03:00
|
|
|
|
2016-12-27 08:52:15 +03:00
|
|
|
func describeGraph(ctx *cli.Context) error {
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-08-21 17:46:54 +03:00
|
|
|
|
2018-09-27 09:45:04 +03:00
|
|
|
req := &lnrpc.ChannelGraphRequest{
|
|
|
|
IncludeUnannounced: ctx.Bool("include_unannounced"),
|
|
|
|
}
|
2016-12-28 02:25:43 +03:00
|
|
|
|
2016-12-27 08:52:15 +03:00
|
|
|
graph, err := client.DescribeGraph(context.Background(), req)
|
2016-08-21 17:46:54 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(graph)
|
2016-08-21 17:46:54 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-03-19 13:14:28 +03:00
|
|
|
var getNodeMetricsCommand = cli.Command{
|
|
|
|
Name: "getnodemetrics",
|
|
|
|
Category: "Graph",
|
|
|
|
Description: "Prints out node metrics calculated from the current graph",
|
|
|
|
Usage: "Get node metrics.",
|
|
|
|
Action: actionDecorator(getNodeMetrics),
|
|
|
|
}
|
|
|
|
|
|
|
|
func getNodeMetrics(ctx *cli.Context) error {
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
req := &lnrpc.NodeMetricsRequest{
|
|
|
|
Types: []lnrpc.NodeMetricType{lnrpc.NodeMetricType_BETWEENNESS_CENTRALITY},
|
|
|
|
}
|
|
|
|
|
|
|
|
nodeMetrics, err := client.GetNodeMetrics(context.Background(), req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(nodeMetrics)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var listPaymentsCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "listpayments",
|
|
|
|
Category: "Payments",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "List all outgoing payments.",
|
2020-01-17 09:50:50 +03:00
|
|
|
Description: "This command enables the retrieval of payments stored " +
|
|
|
|
"in the database. Pagination is supported by the usage of " +
|
|
|
|
"index_offset in combination with the paginate_forwards flag. " +
|
|
|
|
"Reversed pagination is enabled by default to receive " +
|
|
|
|
"current payments first. Pagination can be resumed by using " +
|
|
|
|
"the returned last_index_offset (for forwards order), or " +
|
|
|
|
"first_index_offset (for reversed order) as the offset_index. ",
|
2019-06-14 02:05:52 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.BoolFlag{
|
2020-01-17 09:50:50 +03:00
|
|
|
Name: "include_incomplete",
|
|
|
|
Usage: "if set to true, payments still in flight (or " +
|
|
|
|
"failed) will be returned as well, keeping" +
|
|
|
|
"indices for payments the same as without " +
|
|
|
|
"the flag",
|
|
|
|
},
|
|
|
|
cli.UintFlag{
|
|
|
|
Name: "index_offset",
|
|
|
|
Usage: "The index of a payment that will be used as " +
|
|
|
|
"either the start (in forwards mode) or end " +
|
|
|
|
"(in reverse mode) of a query to determine " +
|
|
|
|
"which payments should be returned in the " +
|
|
|
|
"response, where the index_offset is " +
|
|
|
|
"excluded. If index_offset is set to zero in " +
|
|
|
|
"reversed mode, the query will end with the " +
|
|
|
|
"last payment made.",
|
|
|
|
},
|
|
|
|
cli.UintFlag{
|
|
|
|
Name: "max_payments",
|
|
|
|
Usage: "the max number of payments to return, by " +
|
|
|
|
"default, all completed payments are returned",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "paginate_forwards",
|
|
|
|
Usage: "if set, payments succeeding the " +
|
|
|
|
"index_offset will be returned, allowing " +
|
|
|
|
"forwards pagination",
|
2019-06-14 02:05:52 +03:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: actionDecorator(listPayments),
|
2016-12-05 14:59:36 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func listPayments(ctx *cli.Context) error {
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-12-05 14:59:36 +03:00
|
|
|
|
2019-06-14 02:05:52 +03:00
|
|
|
req := &lnrpc.ListPaymentsRequest{
|
|
|
|
IncludeIncomplete: ctx.Bool("include_incomplete"),
|
2020-01-17 09:50:50 +03:00
|
|
|
IndexOffset: uint64(ctx.Uint("index_offset")),
|
|
|
|
MaxPayments: uint64(ctx.Uint("max_payments")),
|
|
|
|
Reversed: !ctx.Bool("paginate_forwards"),
|
2019-06-14 02:05:52 +03:00
|
|
|
}
|
2016-12-05 14:59:36 +03:00
|
|
|
|
|
|
|
payments, err := client.ListPayments(context.Background(), req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(payments)
|
2016-12-28 02:45:10 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var getChanInfoCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "getchaninfo",
|
2020-03-27 12:43:32 +03:00
|
|
|
Category: "Graph",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Get the state of a channel.",
|
2018-02-06 02:05:04 +03:00
|
|
|
Description: "Prints out the latest authenticated state for a " +
|
2016-12-28 02:45:10 +03:00
|
|
|
"particular channel",
|
2017-03-03 01:23:16 +03:00
|
|
|
ArgsUsage: "chan_id",
|
2016-12-28 02:45:10 +03:00
|
|
|
Flags: []cli.Flag{
|
2017-03-03 01:23:16 +03:00
|
|
|
cli.Int64Flag{
|
2016-12-28 02:45:10 +03:00
|
|
|
Name: "chan_id",
|
|
|
|
Usage: "the 8-byte compact channel ID to query for",
|
|
|
|
},
|
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(getChanInfo),
|
2016-12-28 02:45:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func getChanInfo(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-12-28 02:45:10 +03:00
|
|
|
|
2017-03-03 01:23:16 +03:00
|
|
|
var (
|
2017-03-09 07:44:32 +03:00
|
|
|
chanID int64
|
|
|
|
err error
|
2017-03-03 01:23:16 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("chan_id"):
|
2017-03-09 07:44:32 +03:00
|
|
|
chanID = ctx.Int64("chan_id")
|
2017-03-03 01:23:16 +03:00
|
|
|
case ctx.Args().Present():
|
2017-03-09 07:44:32 +03:00
|
|
|
chanID, err = strconv.ParseInt(ctx.Args().First(), 10, 64)
|
2019-08-30 03:47:06 +03:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error parsing chan_id: %s", err)
|
|
|
|
}
|
2017-03-03 01:23:16 +03:00
|
|
|
default:
|
|
|
|
return fmt.Errorf("chan_id argument missing")
|
|
|
|
}
|
|
|
|
|
2016-12-28 02:45:10 +03:00
|
|
|
req := &lnrpc.ChanInfoRequest{
|
2017-03-09 07:44:32 +03:00
|
|
|
ChanId: uint64(chanID),
|
2016-12-28 02:45:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
chanInfo, err := client.GetChanInfo(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(chanInfo)
|
2016-12-28 02:45:10 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var getNodeInfoCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "getnodeinfo",
|
2020-03-27 12:43:32 +03:00
|
|
|
Category: "Graph",
|
2018-05-01 14:28:30 +03:00
|
|
|
Usage: "Get information on a specific node.",
|
2018-02-06 02:05:04 +03:00
|
|
|
Description: "Prints out the latest authenticated node state for an " +
|
2016-12-28 02:45:10 +03:00
|
|
|
"advertised node",
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "pub_key",
|
|
|
|
Usage: "the 33-byte hex-encoded compressed public of the target " +
|
|
|
|
"node",
|
|
|
|
},
|
2019-06-17 21:30:38 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "include_channels",
|
|
|
|
Usage: "if true, will return all known channels " +
|
|
|
|
"associated with the node",
|
|
|
|
},
|
2016-12-28 02:45:10 +03:00
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(getNodeInfo),
|
2016-12-28 02:45:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func getNodeInfo(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-12-28 02:45:10 +03:00
|
|
|
|
2017-04-13 21:55:17 +03:00
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
var pubKey string
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("pub_key"):
|
|
|
|
pubKey = ctx.String("pub_key")
|
|
|
|
case args.Present():
|
|
|
|
pubKey = args.First()
|
|
|
|
default:
|
2017-03-03 01:23:16 +03:00
|
|
|
return fmt.Errorf("pub_key argument missing")
|
|
|
|
}
|
|
|
|
|
2016-12-28 02:45:10 +03:00
|
|
|
req := &lnrpc.NodeInfoRequest{
|
2019-06-17 21:30:38 +03:00
|
|
|
PubKey: pubKey,
|
|
|
|
IncludeChannels: ctx.Bool("include_channels"),
|
2016-12-28 02:45:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
nodeInfo, err := client.GetNodeInfo(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(nodeInfo)
|
2016-12-28 02:45:10 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-03-21 05:01:57 +03:00
|
|
|
var queryRoutesCommand = cli.Command{
|
|
|
|
Name: "queryroutes",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "Payments",
|
2017-03-03 01:23:16 +03:00
|
|
|
Usage: "Query a route to a destination.",
|
|
|
|
Description: "Queries the channel router for a potential path to the destination that has sufficient flow for the amount including fees",
|
|
|
|
ArgsUsage: "dest amt",
|
2016-12-28 02:45:10 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "dest",
|
|
|
|
Usage: "the 33-byte hex-encoded public key for the payment " +
|
|
|
|
"destination",
|
|
|
|
},
|
2017-03-03 01:23:16 +03:00
|
|
|
cli.Int64Flag{
|
2016-12-28 02:45:10 +03:00
|
|
|
Name: "amt",
|
|
|
|
Usage: "the amount to send expressed in satoshis",
|
|
|
|
},
|
2018-02-01 01:36:10 +03:00
|
|
|
cli.Int64Flag{
|
2018-04-19 17:28:13 +03:00
|
|
|
Name: "fee_limit",
|
2018-09-10 01:16:00 +03:00
|
|
|
Usage: "maximum fee allowed in satoshis when sending " +
|
2018-04-19 17:28:13 +03:00
|
|
|
"the payment",
|
2018-02-01 01:36:10 +03:00
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
2018-04-19 17:28:13 +03:00
|
|
|
Name: "fee_limit_percent",
|
2018-09-10 01:16:00 +03:00
|
|
|
Usage: "percentage of the payment's amount used as the " +
|
2018-04-19 17:28:13 +03:00
|
|
|
"maximum fee allowed when sending the payment",
|
2018-02-01 01:36:10 +03:00
|
|
|
},
|
2018-02-15 16:14:56 +03:00
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "final_cltv_delta",
|
|
|
|
Usage: "(optional) number of blocks the last hop has to reveal " +
|
|
|
|
"the preimage",
|
|
|
|
},
|
2019-06-26 15:35:03 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "use_mc",
|
|
|
|
Usage: "use mission control probabilities",
|
|
|
|
},
|
2020-09-10 20:00:07 +03:00
|
|
|
cli.Uint64Flag{
|
|
|
|
Name: "outgoing_chanid",
|
|
|
|
Usage: "(optional) the channel id of the channel " +
|
|
|
|
"that must be taken to the first hop",
|
|
|
|
},
|
2019-10-11 22:47:15 +03:00
|
|
|
cltvLimitFlag,
|
2016-12-28 02:45:10 +03:00
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(queryRoutes),
|
2016-12-28 02:45:10 +03:00
|
|
|
}
|
|
|
|
|
2017-03-21 05:01:57 +03:00
|
|
|
func queryRoutes(ctx *cli.Context) error {
|
2016-12-28 02:45:10 +03:00
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-12-28 02:45:10 +03:00
|
|
|
|
2017-03-03 01:23:16 +03:00
|
|
|
var (
|
2018-04-19 17:28:13 +03:00
|
|
|
dest string
|
|
|
|
amt int64
|
|
|
|
err error
|
2017-03-03 01:23:16 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("dest"):
|
|
|
|
dest = ctx.String("dest")
|
|
|
|
case args.Present():
|
|
|
|
dest = args.First()
|
|
|
|
args = args.Tail()
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("dest argument missing")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("amt"):
|
|
|
|
amt = ctx.Int64("amt")
|
|
|
|
case args.Present():
|
|
|
|
amt, err = strconv.ParseInt(args.First(), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode amt argument: %v", err)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("amt argument missing")
|
|
|
|
}
|
|
|
|
|
2020-03-30 13:45:14 +03:00
|
|
|
feeLimit, err := retrieveFeeLimitLegacy(ctx)
|
2018-04-19 17:28:13 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-02-01 01:36:10 +03:00
|
|
|
|
2017-03-21 05:01:57 +03:00
|
|
|
req := &lnrpc.QueryRoutesRequest{
|
2019-06-26 15:35:03 +03:00
|
|
|
PubKey: dest,
|
|
|
|
Amt: amt,
|
|
|
|
FeeLimit: feeLimit,
|
|
|
|
FinalCltvDelta: int32(ctx.Int("final_cltv_delta")),
|
|
|
|
UseMissionControl: ctx.Bool("use_mc"),
|
2019-10-11 22:47:15 +03:00
|
|
|
CltvLimit: uint32(ctx.Uint64(cltvLimitFlag.Name)),
|
2020-09-10 20:00:07 +03:00
|
|
|
OutgoingChanId: ctx.Uint64("outgoing_chanid"),
|
2016-12-28 02:45:10 +03:00
|
|
|
}
|
|
|
|
|
2017-03-21 05:01:57 +03:00
|
|
|
route, err := client.QueryRoutes(ctxb, req)
|
2016-12-28 02:45:10 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(route)
|
2016-12-28 02:45:10 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-03-30 13:45:14 +03:00
|
|
|
// retrieveFeeLimitLegacy retrieves the fee limit based on the different fee
|
|
|
|
// limit flags passed. This function will eventually disappear in favor of
|
|
|
|
// retrieveFeeLimit and the new payment rpc.
|
|
|
|
func retrieveFeeLimitLegacy(ctx *cli.Context) (*lnrpc.FeeLimit, error) {
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("fee_limit") && ctx.IsSet("fee_limit_percent"):
|
|
|
|
return nil, fmt.Errorf("either fee_limit or fee_limit_percent " +
|
|
|
|
"can be set, but not both")
|
|
|
|
case ctx.IsSet("fee_limit"):
|
|
|
|
return &lnrpc.FeeLimit{
|
|
|
|
Limit: &lnrpc.FeeLimit_Fixed{
|
|
|
|
Fixed: ctx.Int64("fee_limit"),
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
case ctx.IsSet("fee_limit_percent"):
|
|
|
|
feeLimitPercent := ctx.Int64("fee_limit_percent")
|
|
|
|
if feeLimitPercent < 0 {
|
|
|
|
return nil, errors.New("negative fee limit percentage " +
|
|
|
|
"provided")
|
|
|
|
}
|
|
|
|
return &lnrpc.FeeLimit{
|
|
|
|
Limit: &lnrpc.FeeLimit_Percent{
|
|
|
|
Percent: feeLimitPercent,
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Since the fee limit flags aren't required, we don't return an error
|
|
|
|
// if they're not set.
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var getNetworkInfoCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "getnetworkinfo",
|
|
|
|
Category: "Channels",
|
2018-04-20 10:14:51 +03:00
|
|
|
Usage: "Get statistical information about the current " +
|
2018-05-03 11:49:09 +03:00
|
|
|
"state of the network.",
|
|
|
|
Description: "Returns a set of statistics pertaining to the known " +
|
|
|
|
"channel graph",
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(getNetworkInfo),
|
2016-12-28 02:45:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func getNetworkInfo(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2016-12-28 02:45:10 +03:00
|
|
|
|
|
|
|
req := &lnrpc.NetworkInfoRequest{}
|
|
|
|
|
|
|
|
netInfo, err := client.GetNetworkInfo(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-12-05 14:59:36 +03:00
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(netInfo)
|
2016-12-05 14:59:36 +03:00
|
|
|
return nil
|
2016-12-27 08:52:15 +03:00
|
|
|
}
|
2017-01-15 05:19:02 +03:00
|
|
|
|
2017-02-24 16:32:33 +03:00
|
|
|
var debugLevelCommand = cli.Command{
|
2017-11-23 22:40:14 +03:00
|
|
|
Name: "debuglevel",
|
|
|
|
Usage: "Set the debug level.",
|
2018-04-17 05:17:58 +03:00
|
|
|
Description: `Logging level for all subsystems {trace, debug, info, warn, error, critical, off}
|
2017-11-23 22:40:14 +03:00
|
|
|
You may also specify <subsystem>=<level>,<subsystem2>=<level>,... to set the log level for individual subsystems
|
2018-09-10 01:16:00 +03:00
|
|
|
|
2017-11-23 22:40:14 +03:00
|
|
|
Use show to list available subsystems`,
|
2017-01-15 05:19:02 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "show",
|
|
|
|
Usage: "if true, then the list of available sub-systems will be printed out",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "level",
|
2017-04-13 21:55:17 +03:00
|
|
|
Usage: "the level specification to target either a coarse logging level, or granular set of specific sub-systems with logging levels for each",
|
2017-01-15 05:19:02 +03:00
|
|
|
},
|
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(debugLevel),
|
2017-01-15 05:19:02 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func debugLevel(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
2017-01-30 01:51:30 +03:00
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
2017-01-15 05:19:02 +03:00
|
|
|
req := &lnrpc.DebugLevelRequest{
|
|
|
|
Show: ctx.Bool("show"),
|
|
|
|
LevelSpec: ctx.String("level"),
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := client.DebugLevel(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-23 22:56:47 +03:00
|
|
|
printRespJSON(resp)
|
2017-01-15 05:19:02 +03:00
|
|
|
return nil
|
|
|
|
}
|
2017-01-18 00:39:30 +03:00
|
|
|
|
2017-03-09 07:44:32 +03:00
|
|
|
var listChainTxnsCommand = cli.Command{
|
2020-05-05 22:10:06 +03:00
|
|
|
Name: "listchaintxns",
|
|
|
|
Category: "On-chain",
|
|
|
|
Usage: "List transactions from the wallet.",
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "start_height",
|
|
|
|
Usage: "the block height from which to list " +
|
|
|
|
"transactions, inclusive",
|
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "end_height",
|
|
|
|
Usage: "the block height until which to list " +
|
|
|
|
"transactions, inclusive, to get transactions " +
|
|
|
|
"until the chain tip, including unconfirmed, " +
|
|
|
|
"set this value to -1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Description: `
|
|
|
|
List all transactions an address of the wallet was involved in.
|
|
|
|
|
|
|
|
This call will return a list of wallet related transactions that paid
|
|
|
|
to an address our wallet controls, or spent utxos that we held. The
|
|
|
|
start_height and end_height flags can be used to specify an inclusive
|
|
|
|
block range over which to query for transactions. If the end_height is
|
|
|
|
less than the start_height, transactions will be queried in reverse.
|
|
|
|
To get all transactions until the chain tip, including unconfirmed
|
|
|
|
transactions (identifiable with BlockHeight=0), set end_height to -1.
|
|
|
|
By default, this call will get all transactions our wallet was involved
|
|
|
|
in, including unconfirmed transactions.
|
|
|
|
`,
|
|
|
|
Action: actionDecorator(listChainTxns),
|
2017-03-04 11:23:04 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func listChainTxns(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
2020-05-05 22:10:06 +03:00
|
|
|
req := &lnrpc.GetTransactionsRequest{}
|
|
|
|
|
|
|
|
if ctx.IsSet("start_height") {
|
|
|
|
req.StartHeight = int32(ctx.Int64("start_height"))
|
|
|
|
}
|
|
|
|
if ctx.IsSet("end_height") {
|
|
|
|
req.EndHeight = int32(ctx.Int64("end_height"))
|
|
|
|
}
|
2017-03-04 11:23:04 +03:00
|
|
|
|
2020-05-05 22:10:06 +03:00
|
|
|
resp, err := client.GetTransactions(ctxb, req)
|
2017-03-04 11:23:04 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-03-09 07:44:32 +03:00
|
|
|
printRespJSON(resp)
|
2017-03-04 11:23:04 +03:00
|
|
|
return nil
|
|
|
|
}
|
2017-05-12 00:55:56 +03:00
|
|
|
|
|
|
|
var stopCommand = cli.Command{
|
2017-11-23 22:40:14 +03:00
|
|
|
Name: "stop",
|
|
|
|
Usage: "Stop and shutdown the daemon.",
|
|
|
|
Description: `
|
2018-09-10 01:16:00 +03:00
|
|
|
Gracefully stop all daemon subsystems before stopping the daemon itself.
|
2017-11-23 22:40:14 +03:00
|
|
|
This is equivalent to stopping it using CTRL-C.`,
|
|
|
|
Action: actionDecorator(stopDaemon),
|
2017-05-12 00:55:56 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func stopDaemon(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
_, err := client.StopDaemon(ctxb, &lnrpc.StopRequest{})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2017-04-20 05:33:09 +03:00
|
|
|
|
|
|
|
var signMessageCommand = cli.Command{
|
|
|
|
Name: "signmessage",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "Wallet",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Sign a message with the node's private key.",
|
2017-04-20 05:33:09 +03:00
|
|
|
ArgsUsage: "msg",
|
2017-11-23 22:40:14 +03:00
|
|
|
Description: `
|
2018-09-10 01:16:00 +03:00
|
|
|
Sign msg with the resident node's private key.
|
|
|
|
Returns the signature as a zbase32 string.
|
|
|
|
|
2017-11-23 22:40:14 +03:00
|
|
|
Positional arguments and flags can be used interchangeably but not at the same time!`,
|
2017-04-20 05:33:09 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "msg",
|
|
|
|
Usage: "the message to sign",
|
|
|
|
},
|
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(signMessage),
|
2017-04-20 05:33:09 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func signMessage(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
var msg []byte
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("msg"):
|
|
|
|
msg = []byte(ctx.String("msg"))
|
|
|
|
case ctx.Args().Present():
|
|
|
|
msg = []byte(ctx.Args().First())
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("msg argument missing")
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := client.SignMessage(ctxb, &lnrpc.SignMessageRequest{Msg: msg})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var verifyMessageCommand = cli.Command{
|
|
|
|
Name: "verifymessage",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "Wallet",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Verify a message signed with the signature.",
|
2017-04-20 05:33:09 +03:00
|
|
|
ArgsUsage: "msg signature",
|
2017-11-23 22:40:14 +03:00
|
|
|
Description: `
|
|
|
|
Verify that the message was signed with a properly-formed signature
|
|
|
|
The signature must be zbase32 encoded and signed with the private key of
|
|
|
|
an active node in the resident node's channel database.
|
|
|
|
|
|
|
|
Positional arguments and flags can be used interchangeably but not at the same time!`,
|
2017-04-20 05:33:09 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "msg",
|
|
|
|
Usage: "the message to verify",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
2017-04-29 14:44:29 +03:00
|
|
|
Name: "sig",
|
2017-04-20 05:33:09 +03:00
|
|
|
Usage: "the zbase32 encoded signature of the message",
|
|
|
|
},
|
|
|
|
},
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(verifyMessage),
|
2017-04-20 05:33:09 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func verifyMessage(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
var (
|
2017-04-29 14:44:29 +03:00
|
|
|
msg []byte
|
|
|
|
sig string
|
2017-04-20 05:33:09 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("msg"):
|
|
|
|
msg = []byte(ctx.String("msg"))
|
|
|
|
case args.Present():
|
|
|
|
msg = []byte(ctx.Args().First())
|
|
|
|
args = args.Tail()
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("msg argument missing")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
2017-04-29 14:44:29 +03:00
|
|
|
case ctx.IsSet("sig"):
|
|
|
|
sig = ctx.String("sig")
|
2017-04-20 05:33:09 +03:00
|
|
|
case args.Present():
|
2017-04-29 14:44:29 +03:00
|
|
|
sig = args.First()
|
2017-04-20 05:33:09 +03:00
|
|
|
default:
|
|
|
|
return fmt.Errorf("signature argument missing")
|
|
|
|
}
|
|
|
|
|
2017-04-29 14:44:29 +03:00
|
|
|
req := &lnrpc.VerifyMessageRequest{Msg: msg, Signature: sig}
|
2017-04-20 05:33:09 +03:00
|
|
|
resp, err := client.VerifyMessage(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
2017-08-22 10:29:08 +03:00
|
|
|
|
|
|
|
var feeReportCommand = cli.Command{
|
2018-05-01 14:28:30 +03:00
|
|
|
Name: "feereport",
|
|
|
|
Category: "Channels",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Display the current fee policies of all active channels.",
|
2018-09-10 01:16:00 +03:00
|
|
|
Description: `
|
2018-01-18 21:32:24 +03:00
|
|
|
Returns the current fee policies of all active channels.
|
2017-12-17 01:13:17 +03:00
|
|
|
Fee policies can be updated using the updatechanpolicy command.`,
|
2017-11-07 01:34:49 +03:00
|
|
|
Action: actionDecorator(feeReport),
|
2017-08-22 10:29:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func feeReport(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
req := &lnrpc.FeeReportRequest{}
|
|
|
|
resp, err := client.FeeReport(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-12-17 01:13:17 +03:00
|
|
|
var updateChannelPolicyCommand = cli.Command{
|
2018-04-20 10:14:51 +03:00
|
|
|
Name: "updatechanpolicy",
|
|
|
|
Category: "Channels",
|
|
|
|
Usage: "Update the channel policy for all channels, or a single " +
|
2018-05-03 11:49:09 +03:00
|
|
|
"channel.",
|
2019-08-20 03:56:13 +03:00
|
|
|
ArgsUsage: "base_fee_msat fee_rate time_lock_delta " +
|
|
|
|
"[--max_htlc_msat=N] [channel_point]",
|
2017-11-23 22:40:14 +03:00
|
|
|
Description: `
|
2017-12-17 01:13:17 +03:00
|
|
|
Updates the channel policy for all channels, or just a particular channel
|
|
|
|
identified by its channel point. The update will be committed, and
|
2017-11-23 22:40:14 +03:00
|
|
|
broadcast to the rest of the network within the next batch.
|
|
|
|
Channel points are encoded as: funding_txid:output_index`,
|
2017-08-22 10:29:08 +03:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "base_fee_msat",
|
|
|
|
Usage: "the base fee in milli-satoshis that will " +
|
|
|
|
"be charged for each forwarded HTLC, regardless " +
|
|
|
|
"of payment size",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "fee_rate",
|
|
|
|
Usage: "the fee rate that will be charged " +
|
|
|
|
"proportionally based on the value of each " +
|
2019-07-03 02:20:53 +03:00
|
|
|
"forwarded HTLC, the lowest possible rate is 0 " +
|
|
|
|
"with a granularity of 0.000001 (millionths)",
|
2017-08-22 10:29:08 +03:00
|
|
|
},
|
2017-12-17 01:13:17 +03:00
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "time_lock_delta",
|
|
|
|
Usage: "the CLTV delta that will be applied to all " +
|
|
|
|
"forwarded HTLCs",
|
|
|
|
},
|
2019-11-15 13:24:58 +03:00
|
|
|
cli.Uint64Flag{
|
|
|
|
Name: "min_htlc_msat",
|
|
|
|
Usage: "if set, the min HTLC size that will be applied " +
|
|
|
|
"to all forwarded HTLCs. If unset, the min HTLC " +
|
|
|
|
"is left unchanged.",
|
|
|
|
},
|
2019-08-20 03:56:13 +03:00
|
|
|
cli.Uint64Flag{
|
|
|
|
Name: "max_htlc_msat",
|
|
|
|
Usage: "if set, the max HTLC size that will be applied " +
|
|
|
|
"to all forwarded HTLCs. If unset, the max HTLC " +
|
|
|
|
"is left unchanged.",
|
|
|
|
},
|
2017-08-22 10:29:08 +03:00
|
|
|
cli.StringFlag{
|
|
|
|
Name: "chan_point",
|
|
|
|
Usage: "The channel whose fee policy should be " +
|
|
|
|
"updated, if nil the policies for all channels " +
|
|
|
|
"will be updated. Takes the form of: txid:output_index",
|
|
|
|
},
|
|
|
|
},
|
2017-12-17 01:13:17 +03:00
|
|
|
Action: actionDecorator(updateChannelPolicy),
|
2017-08-22 10:29:08 +03:00
|
|
|
}
|
|
|
|
|
2018-12-10 07:16:11 +03:00
|
|
|
func parseChanPoint(s string) (*lnrpc.ChannelPoint, error) {
|
|
|
|
split := strings.Split(s, ":")
|
|
|
|
if len(split) != 2 {
|
|
|
|
return nil, fmt.Errorf("expecting chan_point to be in format of: " +
|
|
|
|
"txid:index")
|
|
|
|
}
|
|
|
|
|
|
|
|
index, err := strconv.ParseInt(split[1], 10, 32)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to decode output index: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
txid, err := chainhash.NewHashFromStr(split[0])
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to parse hex string: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.ChannelPoint{
|
|
|
|
FundingTxid: &lnrpc.ChannelPoint_FundingTxidBytes{
|
|
|
|
FundingTxidBytes: txid[:],
|
|
|
|
},
|
|
|
|
OutputIndex: uint32(index),
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2017-12-17 01:13:17 +03:00
|
|
|
func updateChannelPolicy(ctx *cli.Context) error {
|
2017-08-22 10:29:08 +03:00
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
var (
|
2017-12-17 01:13:17 +03:00
|
|
|
baseFee int64
|
|
|
|
feeRate float64
|
|
|
|
timeLockDelta int64
|
|
|
|
err error
|
2017-08-22 10:29:08 +03:00
|
|
|
)
|
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("base_fee_msat"):
|
|
|
|
baseFee = ctx.Int64("base_fee_msat")
|
|
|
|
case args.Present():
|
|
|
|
baseFee, err = strconv.ParseInt(args.First(), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode base_fee_msat: %v", err)
|
|
|
|
}
|
|
|
|
args = args.Tail()
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("base_fee_msat argument missing")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("fee_rate"):
|
|
|
|
feeRate = ctx.Float64("fee_rate")
|
|
|
|
case args.Present():
|
|
|
|
feeRate, err = strconv.ParseFloat(args.First(), 64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode fee_rate: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
args = args.Tail()
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("fee_rate argument missing")
|
|
|
|
}
|
|
|
|
|
2017-12-17 01:13:17 +03:00
|
|
|
switch {
|
|
|
|
case ctx.IsSet("time_lock_delta"):
|
|
|
|
timeLockDelta = ctx.Int64("time_lock_delta")
|
|
|
|
case args.Present():
|
|
|
|
timeLockDelta, err = strconv.ParseInt(args.First(), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode time_lock_delta: %v",
|
|
|
|
err)
|
|
|
|
}
|
|
|
|
|
|
|
|
args = args.Tail()
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("time_lock_delta argument missing")
|
|
|
|
}
|
|
|
|
|
2017-08-22 10:29:08 +03:00
|
|
|
var (
|
|
|
|
chanPoint *lnrpc.ChannelPoint
|
|
|
|
chanPointStr string
|
|
|
|
)
|
2017-12-17 01:13:17 +03:00
|
|
|
|
2017-08-22 10:29:08 +03:00
|
|
|
switch {
|
|
|
|
case ctx.IsSet("chan_point"):
|
|
|
|
chanPointStr = ctx.String("chan_point")
|
|
|
|
case args.Present():
|
|
|
|
chanPointStr = args.First()
|
|
|
|
}
|
|
|
|
|
|
|
|
if chanPointStr != "" {
|
2018-12-10 07:16:11 +03:00
|
|
|
chanPoint, err = parseChanPoint(chanPointStr)
|
2017-08-22 10:29:08 +03:00
|
|
|
if err != nil {
|
2018-12-10 07:16:11 +03:00
|
|
|
return fmt.Errorf("unable to parse chan point: %v", err)
|
2017-08-22 10:29:08 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-17 01:13:17 +03:00
|
|
|
req := &lnrpc.PolicyUpdateRequest{
|
|
|
|
BaseFeeMsat: baseFee,
|
|
|
|
FeeRate: feeRate,
|
|
|
|
TimeLockDelta: uint32(timeLockDelta),
|
2019-08-20 03:56:13 +03:00
|
|
|
MaxHtlcMsat: ctx.Uint64("max_htlc_msat"),
|
2017-08-22 10:29:08 +03:00
|
|
|
}
|
|
|
|
|
2019-11-15 13:24:58 +03:00
|
|
|
if ctx.IsSet("min_htlc_msat") {
|
|
|
|
req.MinHtlcMsat = ctx.Uint64("min_htlc_msat")
|
|
|
|
req.MinHtlcMsatSpecified = true
|
|
|
|
}
|
|
|
|
|
2017-08-22 10:29:08 +03:00
|
|
|
if chanPoint != nil {
|
2017-12-17 01:13:17 +03:00
|
|
|
req.Scope = &lnrpc.PolicyUpdateRequest_ChanPoint{
|
2017-08-22 10:29:08 +03:00
|
|
|
ChanPoint: chanPoint,
|
|
|
|
}
|
|
|
|
} else {
|
2017-12-17 01:13:17 +03:00
|
|
|
req.Scope = &lnrpc.PolicyUpdateRequest_Global{
|
2017-08-22 10:29:08 +03:00
|
|
|
Global: true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-17 01:13:17 +03:00
|
|
|
resp, err := client.UpdateChannelPolicy(ctxb, req)
|
2017-08-22 10:29:08 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
2018-02-28 09:24:37 +03:00
|
|
|
|
|
|
|
var forwardingHistoryCommand = cli.Command{
|
|
|
|
Name: "fwdinghistory",
|
2018-05-01 14:28:30 +03:00
|
|
|
Category: "Payments",
|
2018-05-03 11:49:09 +03:00
|
|
|
Usage: "Query the history of all forwarded HTLCs.",
|
2018-02-28 09:24:37 +03:00
|
|
|
ArgsUsage: "start_time [end_time] [index_offset] [max_events]",
|
|
|
|
Description: `
|
2018-05-03 11:49:09 +03:00
|
|
|
Query the HTLC switch's internal forwarding log for all completed
|
2018-02-28 09:24:37 +03:00
|
|
|
payment circuits (HTLCs) over a particular time range (--start_time and
|
|
|
|
--end_time). The start and end times are meant to be expressed in
|
2019-05-09 23:04:39 +03:00
|
|
|
seconds since the Unix epoch.
|
|
|
|
Alternatively negative time ranges can be used, e.g. "-3d". Supports
|
|
|
|
s(seconds), m(minutes), h(ours), d(ays), w(eeks), M(onths), y(ears).
|
|
|
|
Month equals 30.44 days, year equals 365.25 days.
|
|
|
|
If --start_time isn't provided, then 24 hours ago is used. If
|
|
|
|
--end_time isn't provided, then the current time is used.
|
2018-02-28 09:24:37 +03:00
|
|
|
|
|
|
|
The max number of events returned is 50k. The default number is 100,
|
|
|
|
callers can use the --max_events param to modify this value.
|
|
|
|
|
|
|
|
Finally, callers can skip a series of events using the --index_offset
|
|
|
|
parameter. Each response will contain the offset index of the last
|
|
|
|
entry. Using this callers can manually paginate within a time slice.
|
|
|
|
`,
|
|
|
|
Flags: []cli.Flag{
|
2019-05-09 23:04:39 +03:00
|
|
|
cli.StringFlag{
|
2018-02-28 09:24:37 +03:00
|
|
|
Name: "start_time",
|
2019-05-09 23:04:39 +03:00
|
|
|
Usage: "the starting time for the query " +
|
|
|
|
`as unix timestamp or relative e.g. "-1w"`,
|
2018-02-28 09:24:37 +03:00
|
|
|
},
|
2019-05-09 23:04:39 +03:00
|
|
|
cli.StringFlag{
|
2018-02-28 09:24:37 +03:00
|
|
|
Name: "end_time",
|
2019-05-09 23:04:39 +03:00
|
|
|
Usage: "the end time for the query " +
|
|
|
|
`as unix timestamp or relative e.g. "-1w"`,
|
2018-02-28 09:24:37 +03:00
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "index_offset",
|
|
|
|
Usage: "the number of events to skip",
|
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "max_events",
|
|
|
|
Usage: "the max number of events to return",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: actionDecorator(forwardingHistory),
|
|
|
|
}
|
|
|
|
|
|
|
|
func forwardingHistory(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
var (
|
|
|
|
startTime, endTime uint64
|
|
|
|
indexOffset, maxEvents uint32
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
args := ctx.Args()
|
2019-05-09 23:04:39 +03:00
|
|
|
now := time.Now()
|
2018-02-28 09:24:37 +03:00
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("start_time"):
|
2019-05-09 23:04:39 +03:00
|
|
|
startTime, err = parseTime(ctx.String("start_time"), now)
|
2018-02-28 09:24:37 +03:00
|
|
|
case args.Present():
|
2019-05-09 23:04:39 +03:00
|
|
|
startTime, err = parseTime(args.First(), now)
|
2018-02-28 09:24:37 +03:00
|
|
|
args = args.Tail()
|
2019-10-04 01:12:39 +03:00
|
|
|
default:
|
|
|
|
now := time.Now()
|
|
|
|
startTime = uint64(now.Add(-time.Hour * 24).Unix())
|
2018-02-28 09:24:37 +03:00
|
|
|
}
|
2019-05-09 23:04:39 +03:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode start_time: %v", err)
|
|
|
|
}
|
2018-02-28 09:24:37 +03:00
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("end_time"):
|
2019-05-09 23:04:39 +03:00
|
|
|
endTime, err = parseTime(ctx.String("end_time"), now)
|
2018-02-28 09:24:37 +03:00
|
|
|
case args.Present():
|
2019-05-09 23:04:39 +03:00
|
|
|
endTime, err = parseTime(args.First(), now)
|
2018-02-28 09:24:37 +03:00
|
|
|
args = args.Tail()
|
2019-05-09 23:04:39 +03:00
|
|
|
default:
|
|
|
|
endTime = uint64(now.Unix())
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode end_time: %v", err)
|
2018-02-28 09:24:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("index_offset"):
|
|
|
|
indexOffset = uint32(ctx.Int64("index_offset"))
|
|
|
|
case args.Present():
|
|
|
|
i, err := strconv.ParseInt(args.First(), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode index_offset: %v", err)
|
|
|
|
}
|
|
|
|
indexOffset = uint32(i)
|
|
|
|
args = args.Tail()
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("max_events"):
|
|
|
|
maxEvents = uint32(ctx.Int64("max_events"))
|
|
|
|
case args.Present():
|
|
|
|
m, err := strconv.ParseInt(args.First(), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to decode max_events: %v", err)
|
|
|
|
}
|
|
|
|
maxEvents = uint32(m)
|
|
|
|
args = args.Tail()
|
|
|
|
}
|
|
|
|
|
|
|
|
req := &lnrpc.ForwardingHistoryRequest{
|
|
|
|
StartTime: startTime,
|
|
|
|
EndTime: endTime,
|
|
|
|
IndexOffset: indexOffset,
|
|
|
|
NumMaxEvents: maxEvents,
|
|
|
|
}
|
|
|
|
resp, err := client.ForwardingHistory(ctxb, req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
2018-12-10 07:16:11 +03:00
|
|
|
|
|
|
|
var exportChanBackupCommand = cli.Command{
|
|
|
|
Name: "exportchanbackup",
|
|
|
|
Category: "Channels",
|
|
|
|
Usage: "Obtain a static channel back up for a selected channels, " +
|
|
|
|
"or all known channels",
|
|
|
|
ArgsUsage: "[chan_point] [--all] [--output_file]",
|
|
|
|
Description: `
|
|
|
|
This command allows a user to export a Static Channel Backup (SCB) for
|
2019-04-12 21:14:32 +03:00
|
|
|
a selected channel. SCB's are encrypted backups of a channel's initial
|
2019-04-04 17:07:06 +03:00
|
|
|
state that are encrypted with a key derived from the seed of a user. In
|
2018-12-10 07:16:11 +03:00
|
|
|
the case of partial or complete data loss, the SCB will allow the user
|
|
|
|
to reclaim settled funds in the channel at its final state. The
|
|
|
|
exported channel backups can be restored at a later time using the
|
|
|
|
restorechanbackup command.
|
|
|
|
|
|
|
|
This command will return one of two types of channel backups depending
|
|
|
|
on the set of passed arguments:
|
|
|
|
|
|
|
|
* If a target channel point is specified, then a single channel
|
|
|
|
backup containing only the information for that channel will be
|
|
|
|
returned.
|
|
|
|
|
|
|
|
* If the --all flag is passed, then a multi-channel backup will be
|
|
|
|
returned. A multi backup is a single encrypted blob (displayed in
|
|
|
|
hex encoding) that contains several channels in a single cipher
|
|
|
|
text.
|
2019-04-04 17:07:06 +03:00
|
|
|
|
2018-12-10 07:16:11 +03:00
|
|
|
Both of the backup types can be restored using the restorechanbackup
|
|
|
|
command.
|
|
|
|
`,
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "chan_point",
|
|
|
|
Usage: "the target channel to obtain an SCB for",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "all",
|
|
|
|
Usage: "if specified, then a multi backup of all " +
|
|
|
|
"active channels will be returned",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "output_file",
|
|
|
|
Usage: `
|
|
|
|
if specified, then rather than printing a JSON output
|
|
|
|
of the static channel backup, a serialized version of
|
|
|
|
the backup (either Single or Multi) will be written to
|
|
|
|
the target file, this is the same format used by lnd in
|
|
|
|
its channels.backup file `,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: actionDecorator(exportChanBackup),
|
|
|
|
}
|
|
|
|
|
|
|
|
func exportChanBackup(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
// Show command help if no arguments provided
|
|
|
|
if ctx.NArg() == 0 && ctx.NumFlags() == 0 {
|
|
|
|
cli.ShowCommandHelp(ctx, "exportchanbackup")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
err error
|
|
|
|
chanPointStr string
|
|
|
|
)
|
|
|
|
args := ctx.Args()
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("chan_point"):
|
|
|
|
chanPointStr = ctx.String("chan_point")
|
|
|
|
|
|
|
|
case args.Present():
|
|
|
|
chanPointStr = args.First()
|
|
|
|
|
|
|
|
case !ctx.IsSet("all"):
|
|
|
|
return fmt.Errorf("must specify chan_point if --all isn't set")
|
|
|
|
}
|
|
|
|
|
|
|
|
if chanPointStr != "" {
|
|
|
|
chanPointRPC, err := parseChanPoint(chanPointStr)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
chanBackup, err := client.ExportChannelBackup(
|
|
|
|
ctxb, &lnrpc.ExportChannelBackupRequest{
|
|
|
|
ChanPoint: chanPointRPC,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
txid, err := chainhash.NewHash(
|
|
|
|
chanPointRPC.GetFundingTxidBytes(),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
chanPoint := wire.OutPoint{
|
|
|
|
Hash: *txid,
|
|
|
|
Index: chanPointRPC.OutputIndex,
|
|
|
|
}
|
|
|
|
|
|
|
|
printJSON(struct {
|
|
|
|
ChanPoint string `json:"chan_point"`
|
2019-12-20 12:05:08 +03:00
|
|
|
ChanBackup []byte `json:"chan_backup"`
|
2018-12-10 07:16:11 +03:00
|
|
|
}{
|
2019-12-20 12:05:08 +03:00
|
|
|
ChanPoint: chanPoint.String(),
|
|
|
|
ChanBackup: chanBackup.ChanBackup,
|
|
|
|
})
|
2018-12-10 07:16:11 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if !ctx.IsSet("all") {
|
|
|
|
return fmt.Errorf("if a channel isn't specified, -all must be")
|
|
|
|
}
|
|
|
|
|
|
|
|
chanBackup, err := client.ExportAllChannelBackups(
|
|
|
|
ctxb, &lnrpc.ChanBackupExportRequest{},
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if ctx.IsSet("output_file") {
|
|
|
|
return ioutil.WriteFile(
|
|
|
|
ctx.String("output_file"),
|
|
|
|
chanBackup.MultiChanBackup.MultiChanBackup,
|
|
|
|
0666,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(roasbeef): support for export | restore ?
|
|
|
|
|
|
|
|
var chanPoints []string
|
|
|
|
for _, chanPoint := range chanBackup.MultiChanBackup.ChanPoints {
|
|
|
|
txid, err := chainhash.NewHash(chanPoint.GetFundingTxidBytes())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
chanPoints = append(chanPoints, wire.OutPoint{
|
|
|
|
Hash: *txid,
|
|
|
|
Index: chanPoint.OutputIndex,
|
|
|
|
}.String())
|
|
|
|
}
|
|
|
|
|
2019-12-20 12:05:08 +03:00
|
|
|
printRespJSON(chanBackup)
|
|
|
|
|
2018-12-10 07:16:11 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-03-11 03:55:12 +03:00
|
|
|
var verifyChanBackupCommand = cli.Command{
|
|
|
|
Name: "verifychanbackup",
|
|
|
|
Category: "Channels",
|
|
|
|
Usage: "Verify an existing channel backup",
|
2019-04-04 17:20:54 +03:00
|
|
|
ArgsUsage: "[--single_backup] [--multi_backup] [--multi_file]",
|
2019-03-11 03:55:12 +03:00
|
|
|
Description: `
|
|
|
|
This command allows a user to verify an existing Single or Multi channel
|
|
|
|
backup for integrity. This is useful when a user has a backup, but is
|
2019-04-04 17:07:06 +03:00
|
|
|
unsure as to if it's valid or for the target node.
|
2019-03-11 03:55:12 +03:00
|
|
|
|
|
|
|
The command will accept backups in one of three forms:
|
|
|
|
|
|
|
|
* A single channel packed SCB, which can be obtained from
|
|
|
|
exportchanbackup. This should be passed in hex encoded format.
|
|
|
|
|
|
|
|
* A packed multi-channel SCB, which couples several individual
|
|
|
|
static channel backups in single blob.
|
|
|
|
|
|
|
|
* A file path which points to a packed multi-channel backup within a
|
|
|
|
file, using the same format that lnd does in its channels.backup
|
|
|
|
file.
|
|
|
|
`,
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "single_backup",
|
|
|
|
Usage: "a hex encoded single channel backup obtained " +
|
|
|
|
"from exportchanbackup",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "multi_backup",
|
|
|
|
Usage: "a hex encoded multi-channel backup obtained " +
|
|
|
|
"from exportchanbackup",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "multi_file",
|
|
|
|
Usage: "the path to a multi-channel back up file",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: actionDecorator(verifyChanBackup),
|
|
|
|
}
|
|
|
|
|
|
|
|
func verifyChanBackup(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
// Show command help if no arguments provided
|
|
|
|
if ctx.NArg() == 0 && ctx.NumFlags() == 0 {
|
|
|
|
cli.ShowCommandHelp(ctx, "verifychanbackup")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
backups, err := parseChanBackups(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
verifyReq := lnrpc.ChanBackupSnapshot{}
|
|
|
|
|
|
|
|
if backups.GetChanBackups() != nil {
|
|
|
|
verifyReq.SingleChanBackups = backups.GetChanBackups()
|
|
|
|
}
|
|
|
|
if backups.GetMultiChanBackup() != nil {
|
|
|
|
verifyReq.MultiChanBackup = &lnrpc.MultiChanBackup{
|
|
|
|
MultiChanBackup: backups.GetMultiChanBackup(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := client.VerifyChanBackup(ctxb, &verifyReq)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
printRespJSON(resp)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-12-10 07:16:11 +03:00
|
|
|
var restoreChanBackupCommand = cli.Command{
|
|
|
|
Name: "restorechanbackup",
|
|
|
|
Category: "Channels",
|
|
|
|
Usage: "Restore an existing single or multi-channel static channel " +
|
|
|
|
"backup",
|
|
|
|
ArgsUsage: "[--single_backup] [--multi_backup] [--multi_file=",
|
|
|
|
Description: `
|
2019-07-04 19:02:26 +03:00
|
|
|
Allows a user to restore a Static Channel Backup (SCB) that was
|
2018-12-10 07:16:11 +03:00
|
|
|
obtained either via the exportchanbackup command, or from lnd's
|
|
|
|
automatically manged channels.backup file. This command should be used
|
|
|
|
if a user is attempting to restore a channel due to data loss on a
|
|
|
|
running node restored with the same seed as the node that created the
|
|
|
|
channel. If successful, this command will allows the user to recover
|
|
|
|
the settled funds stored in the recovered channels.
|
|
|
|
|
|
|
|
The command will accept backups in one of three forms:
|
|
|
|
|
|
|
|
* A single channel packed SCB, which can be obtained from
|
|
|
|
exportchanbackup. This should be passed in hex encoded format.
|
|
|
|
|
|
|
|
* A packed multi-channel SCB, which couples several individual
|
|
|
|
static channel backups in single blob.
|
|
|
|
|
|
|
|
* A file path which points to a packed multi-channel backup within a
|
|
|
|
file, using the same format that lnd does in its channels.backup
|
|
|
|
file.
|
|
|
|
`,
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "single_backup",
|
|
|
|
Usage: "a hex encoded single channel backup obtained " +
|
|
|
|
"from exportchanbackup",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "multi_backup",
|
|
|
|
Usage: "a hex encoded multi-channel backup obtained " +
|
|
|
|
"from exportchanbackup",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "multi_file",
|
|
|
|
Usage: "the path to a multi-channel back up file",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: actionDecorator(restoreChanBackup),
|
|
|
|
}
|
|
|
|
|
2019-09-04 00:03:31 +03:00
|
|
|
// errMissingChanBackup is an error returned when we attempt to parse a channel
|
|
|
|
// backup from a CLI command and it is missing.
|
|
|
|
var errMissingChanBackup = errors.New("missing channel backup")
|
|
|
|
|
2018-12-10 07:16:11 +03:00
|
|
|
func parseChanBackups(ctx *cli.Context) (*lnrpc.RestoreChanBackupRequest, error) {
|
|
|
|
switch {
|
|
|
|
case ctx.IsSet("single_backup"):
|
|
|
|
packedBackup, err := hex.DecodeString(
|
|
|
|
ctx.String("single_backup"),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to decode single packed "+
|
|
|
|
"backup: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.RestoreChanBackupRequest{
|
|
|
|
Backup: &lnrpc.RestoreChanBackupRequest_ChanBackups{
|
|
|
|
ChanBackups: &lnrpc.ChannelBackups{
|
|
|
|
ChanBackups: []*lnrpc.ChannelBackup{
|
|
|
|
{
|
|
|
|
ChanBackup: packedBackup,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
|
|
|
|
case ctx.IsSet("multi_backup"):
|
|
|
|
packedMulti, err := hex.DecodeString(
|
|
|
|
ctx.String("multi_backup"),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to decode multi packed "+
|
|
|
|
"backup: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.RestoreChanBackupRequest{
|
|
|
|
Backup: &lnrpc.RestoreChanBackupRequest_MultiChanBackup{
|
|
|
|
MultiChanBackup: packedMulti,
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
|
|
|
|
case ctx.IsSet("multi_file"):
|
|
|
|
packedMulti, err := ioutil.ReadFile(ctx.String("multi_file"))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to decode multi packed "+
|
|
|
|
"backup: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &lnrpc.RestoreChanBackupRequest{
|
|
|
|
Backup: &lnrpc.RestoreChanBackupRequest_MultiChanBackup{
|
|
|
|
MultiChanBackup: packedMulti,
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
|
|
|
|
default:
|
2019-09-04 00:03:31 +03:00
|
|
|
return nil, errMissingChanBackup
|
2018-12-10 07:16:11 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func restoreChanBackup(ctx *cli.Context) error {
|
|
|
|
ctxb := context.Background()
|
|
|
|
client, cleanUp := getClient(ctx)
|
|
|
|
defer cleanUp()
|
|
|
|
|
|
|
|
// Show command help if no arguments provided
|
|
|
|
if ctx.NArg() == 0 && ctx.NumFlags() == 0 {
|
|
|
|
cli.ShowCommandHelp(ctx, "restorechanbackup")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var req lnrpc.RestoreChanBackupRequest
|
|
|
|
|
|
|
|
backups, err := parseChanBackups(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
req.Backup = backups.Backup
|
|
|
|
|
|
|
|
_, err = client.RestoreChannelBackups(ctxb, &req)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to restore chan backups: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|