363caa441a
In this commit, we remove the restriction surrounding the largest invoices that we'll allow a user to create. After #3967 has landed, users will be able to send in _aggregate_ a payment larger than the current max HTLC size limit in the network. As a result, we can just treat that value as the system's MTU, and allow users to request payments it multiples of that MTU value. A follow up to this PR at a later time will also allow wumbo _channels_. However, that requires us to tweak the way we scale CSV values, as post wumbo, there is no true channel size limit, only the _local_ limit of a given node. We also need to implement a way for nodes to signal to other nodes their accepted max channel size.
288 lines
7.8 KiB
Go
288 lines
7.8 KiB
Go
// +build invoicesrpc
|
|
|
|
package invoicesrpc
|
|
|
|
import (
|
|
"context"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"google.golang.org/grpc"
|
|
"gopkg.in/macaroon-bakery.v2/bakery"
|
|
|
|
"github.com/lightningnetwork/lnd/channeldb"
|
|
"github.com/lightningnetwork/lnd/lnrpc"
|
|
"github.com/lightningnetwork/lnd/lntypes"
|
|
)
|
|
|
|
const (
|
|
// subServerName is the name of the sub rpc server. We'll use this name
|
|
// to register ourselves, and we also require that the main
|
|
// SubServerConfigDispatcher instance recognize it as the name of our
|
|
// RPC service.
|
|
subServerName = "InvoicesRPC"
|
|
)
|
|
|
|
var (
|
|
// macaroonOps are the set of capabilities that our minted macaroon (if
|
|
// it doesn't already exist) will have.
|
|
macaroonOps = []bakery.Op{
|
|
{
|
|
Entity: "invoices",
|
|
Action: "write",
|
|
},
|
|
{
|
|
Entity: "invoices",
|
|
Action: "read",
|
|
},
|
|
}
|
|
|
|
// macPermissions maps RPC calls to the permissions they require.
|
|
macPermissions = map[string][]bakery.Op{
|
|
"/invoicesrpc.Invoices/SubscribeSingleInvoice": {{
|
|
Entity: "invoices",
|
|
Action: "read",
|
|
}},
|
|
"/invoicesrpc.Invoices/SettleInvoice": {{
|
|
Entity: "invoices",
|
|
Action: "write",
|
|
}},
|
|
"/invoicesrpc.Invoices/CancelInvoice": {{
|
|
Entity: "invoices",
|
|
Action: "write",
|
|
}},
|
|
"/invoicesrpc.Invoices/AddHoldInvoice": {{
|
|
Entity: "invoices",
|
|
Action: "write",
|
|
}},
|
|
}
|
|
|
|
// DefaultInvoicesMacFilename is the default name of the invoices
|
|
// macaroon that we expect to find via a file handle within the main
|
|
// configuration file in this package.
|
|
DefaultInvoicesMacFilename = "invoices.macaroon"
|
|
)
|
|
|
|
// Server is a sub-server of the main RPC server: the invoices RPC. This sub
|
|
// RPC server allows external callers to access the status of the invoices
|
|
// currently active within lnd, as well as configuring it at runtime.
|
|
type Server struct {
|
|
quit chan struct{}
|
|
|
|
cfg *Config
|
|
}
|
|
|
|
// A compile time check to ensure that Server fully implements the
|
|
// InvoicesServer gRPC service.
|
|
var _ InvoicesServer = (*Server)(nil)
|
|
|
|
// New returns a new instance of the invoicesrpc Invoices sub-server. We also
|
|
// return the set of permissions for the macaroons that we may create within
|
|
// this method. If the macaroons we need aren't found in the filepath, then
|
|
// we'll create them on start up. If we're unable to locate, or create the
|
|
// macaroons we need, then we'll return with an error.
|
|
func New(cfg *Config) (*Server, lnrpc.MacaroonPerms, error) {
|
|
// If the path of the invoices macaroon wasn't specified, then we'll
|
|
// assume that it's found at the default network directory.
|
|
macFilePath := filepath.Join(
|
|
cfg.NetworkDir, DefaultInvoicesMacFilename,
|
|
)
|
|
|
|
// Now that we know the full path of the invoices macaroon, we can
|
|
// check to see if we need to create it or not.
|
|
if !lnrpc.FileExists(macFilePath) && cfg.MacService != nil {
|
|
log.Infof("Baking macaroons for invoices RPC Server at: %v",
|
|
macFilePath)
|
|
|
|
// At this point, we know that the invoices macaroon doesn't
|
|
// yet, exist, so we need to create it with the help of the
|
|
// main macaroon service.
|
|
invoicesMac, err := cfg.MacService.Oven.NewMacaroon(
|
|
context.Background(), bakery.LatestVersion, nil,
|
|
macaroonOps...,
|
|
)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
invoicesMacBytes, err := invoicesMac.M().MarshalBinary()
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
err = ioutil.WriteFile(macFilePath, invoicesMacBytes, 0644)
|
|
if err != nil {
|
|
os.Remove(macFilePath)
|
|
return nil, nil, err
|
|
}
|
|
}
|
|
|
|
server := &Server{
|
|
cfg: cfg,
|
|
quit: make(chan struct{}, 1),
|
|
}
|
|
|
|
return server, macPermissions, nil
|
|
}
|
|
|
|
// Start launches any helper goroutines required for the Server to function.
|
|
//
|
|
// NOTE: This is part of the lnrpc.SubServer interface.
|
|
func (s *Server) Start() error {
|
|
return nil
|
|
}
|
|
|
|
// Stop signals any active goroutines for a graceful closure.
|
|
//
|
|
// NOTE: This is part of the lnrpc.SubServer interface.
|
|
func (s *Server) Stop() error {
|
|
close(s.quit)
|
|
|
|
return nil
|
|
}
|
|
|
|
// Name returns a unique string representation of the sub-server. This can be
|
|
// used to identify the sub-server and also de-duplicate them.
|
|
//
|
|
// NOTE: This is part of the lnrpc.SubServer interface.
|
|
func (s *Server) Name() string {
|
|
return subServerName
|
|
}
|
|
|
|
// RegisterWithRootServer will be called by the root gRPC server to direct a sub
|
|
// RPC server to register itself with the main gRPC root server. Until this is
|
|
// called, each sub-server won't be able to have requests routed towards it.
|
|
//
|
|
// NOTE: This is part of the lnrpc.SubServer interface.
|
|
func (s *Server) RegisterWithRootServer(grpcServer *grpc.Server) error {
|
|
// We make sure that we register it with the main gRPC server to ensure
|
|
// all our methods are routed properly.
|
|
RegisterInvoicesServer(grpcServer, s)
|
|
|
|
log.Debugf("Invoices RPC server successfully registered with root " +
|
|
"gRPC server")
|
|
|
|
return nil
|
|
}
|
|
|
|
// SubscribeSingleInvoice returns a uni-directional stream (server -> client)
|
|
// for notifying the client of state changes for a specified invoice.
|
|
func (s *Server) SubscribeSingleInvoice(req *SubscribeSingleInvoiceRequest,
|
|
updateStream Invoices_SubscribeSingleInvoiceServer) error {
|
|
|
|
hash, err := lntypes.MakeHash(req.RHash)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
invoiceClient, err := s.cfg.InvoiceRegistry.SubscribeSingleInvoice(hash)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer invoiceClient.Cancel()
|
|
|
|
for {
|
|
select {
|
|
case newInvoice := <-invoiceClient.Updates:
|
|
rpcInvoice, err := CreateRPCInvoice(
|
|
newInvoice, s.cfg.ChainParams,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := updateStream.Send(rpcInvoice); err != nil {
|
|
return err
|
|
}
|
|
|
|
case <-s.quit:
|
|
return nil
|
|
}
|
|
}
|
|
}
|
|
|
|
// SettleInvoice settles an accepted invoice. If the invoice is already settled,
|
|
// this call will succeed.
|
|
func (s *Server) SettleInvoice(ctx context.Context,
|
|
in *SettleInvoiceMsg) (*SettleInvoiceResp, error) {
|
|
|
|
preimage, err := lntypes.MakePreimage(in.Preimage)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
err = s.cfg.InvoiceRegistry.SettleHodlInvoice(preimage)
|
|
if err != nil && err != channeldb.ErrInvoiceAlreadySettled {
|
|
return nil, err
|
|
}
|
|
|
|
return &SettleInvoiceResp{}, nil
|
|
}
|
|
|
|
// CancelInvoice cancels a currently open invoice. If the invoice is already
|
|
// canceled, this call will succeed. If the invoice is already settled, it will
|
|
// fail.
|
|
func (s *Server) CancelInvoice(ctx context.Context,
|
|
in *CancelInvoiceMsg) (*CancelInvoiceResp, error) {
|
|
|
|
paymentHash, err := lntypes.MakeHash(in.PaymentHash)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
err = s.cfg.InvoiceRegistry.CancelInvoice(paymentHash)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
log.Infof("Canceled invoice %v", paymentHash)
|
|
|
|
return &CancelInvoiceResp{}, nil
|
|
}
|
|
|
|
// AddHoldInvoice attempts to add a new hold invoice to the invoice database.
|
|
// Any duplicated invoices are rejected, therefore all invoices *must* have a
|
|
// unique payment hash.
|
|
func (s *Server) AddHoldInvoice(ctx context.Context,
|
|
invoice *AddHoldInvoiceRequest) (*AddHoldInvoiceResp, error) {
|
|
|
|
addInvoiceCfg := &AddInvoiceConfig{
|
|
AddInvoice: s.cfg.InvoiceRegistry.AddInvoice,
|
|
IsChannelActive: s.cfg.IsChannelActive,
|
|
ChainParams: s.cfg.ChainParams,
|
|
NodeSigner: s.cfg.NodeSigner,
|
|
DefaultCLTVExpiry: s.cfg.DefaultCLTVExpiry,
|
|
ChanDB: s.cfg.ChanDB,
|
|
GenInvoiceFeatures: s.cfg.GenInvoiceFeatures,
|
|
}
|
|
|
|
hash, err := lntypes.MakeHash(invoice.Hash)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
value, err := lnrpc.UnmarshallAmt(invoice.Value, invoice.ValueMsat)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
addInvoiceData := &AddInvoiceData{
|
|
Memo: invoice.Memo,
|
|
Hash: &hash,
|
|
Value: value,
|
|
DescriptionHash: invoice.DescriptionHash,
|
|
Expiry: invoice.Expiry,
|
|
FallbackAddr: invoice.FallbackAddr,
|
|
CltvExpiry: invoice.CltvExpiry,
|
|
Private: invoice.Private,
|
|
}
|
|
|
|
_, dbInvoice, err := AddInvoice(ctx, addInvoiceCfg, addInvoiceData)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &AddHoldInvoiceResp{
|
|
PaymentRequest: string(dbInvoice.PaymentRequest),
|
|
}, nil
|
|
}
|