215a47e6bf
This commit loosens the fwdpkg reference acking to be more tolerant of prior deletions. Specifically, we won't fail if certain channels are not found or fwdpkgs do not exist. This will make us more tolerant to future changes where we: - remove fwdpkgs on channel close - defensively cleanup stray responses
934 lines
28 KiB
Go
934 lines
28 KiB
Go
package channeldb
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/binary"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
|
|
"github.com/coreos/bbolt"
|
|
"github.com/lightningnetwork/lnd/lnwire"
|
|
)
|
|
|
|
// ErrCorruptedFwdPkg signals that the on-disk structure of the forwarding
|
|
// package has potentially been mangled.
|
|
var ErrCorruptedFwdPkg = errors.New("fwding package db has been corrupted")
|
|
|
|
// FwdState is an enum used to describe the lifecycle of a FwdPkg.
|
|
type FwdState byte
|
|
|
|
const (
|
|
// FwdStateLockedIn is the starting state for all forwarding packages.
|
|
// Packages in this state have not yet committed to the exact set of
|
|
// Adds to forward to the switch.
|
|
FwdStateLockedIn FwdState = iota
|
|
|
|
// FwdStateProcessed marks the state in which all Adds have been
|
|
// locally processed and the forwarding decision to the switch has been
|
|
// persisted.
|
|
FwdStateProcessed
|
|
|
|
// FwdStateCompleted signals that all Adds have been acked, and that all
|
|
// settles and fails have been delivered to their sources. Packages in
|
|
// this state can be removed permanently.
|
|
FwdStateCompleted
|
|
)
|
|
|
|
var (
|
|
// fwdPackagesKey is the root-level bucket that all forwarding packages
|
|
// are written. This bucket is further subdivided based on the short
|
|
// channel ID of each channel.
|
|
fwdPackagesKey = []byte("fwd-packages")
|
|
|
|
// addBucketKey is the bucket to which all Add log updates are written.
|
|
addBucketKey = []byte("add-updates")
|
|
|
|
// failSettleBucketKey is the bucket to which all Settle/Fail log
|
|
// updates are written.
|
|
failSettleBucketKey = []byte("fail-settle-updates")
|
|
|
|
// fwdFilterKey is a key used to write the set of Adds that passed
|
|
// validation and are to be forwarded to the switch.
|
|
// NOTE: The presence of this key within a forwarding package indicates
|
|
// that the package has reached FwdStateProcessed.
|
|
fwdFilterKey = []byte("fwd-filter-key")
|
|
|
|
// ackFilterKey is a key used to access the PkgFilter indicating which
|
|
// Adds have received a Settle/Fail. This response may come from a
|
|
// number of sources, including: exitHop settle/fails, switch failures,
|
|
// chain arbiter interjections, as well as settle/fails from the
|
|
// next hop in the route.
|
|
ackFilterKey = []byte("ack-filter-key")
|
|
|
|
// settleFailFilterKey is a key used to access the PkgFilter indicating
|
|
// which Settles/Fails in have been received and processed by the link
|
|
// that originally received the Add.
|
|
settleFailFilterKey = []byte("settle-fail-filter-key")
|
|
)
|
|
|
|
// PkgFilter is used to compactly represent a particular subset of the Adds in a
|
|
// forwarding package. Each filter is represented as a simple, statically-sized
|
|
// bitvector, where the elements are intended to be the indices of the Adds as
|
|
// they are written in the FwdPkg.
|
|
type PkgFilter struct {
|
|
count uint16
|
|
filter []byte
|
|
}
|
|
|
|
// NewPkgFilter initializes an empty PkgFilter supporting `count` elements.
|
|
func NewPkgFilter(count uint16) *PkgFilter {
|
|
// We add 7 to ensure that the integer division yields properly rounded
|
|
// values.
|
|
filterLen := (count + 7) / 8
|
|
|
|
return &PkgFilter{
|
|
count: count,
|
|
filter: make([]byte, filterLen),
|
|
}
|
|
}
|
|
|
|
// Count returns the number of elements represented by this PkgFilter.
|
|
func (f *PkgFilter) Count() uint16 {
|
|
return f.count
|
|
}
|
|
|
|
// Set marks the `i`-th element as included by this filter.
|
|
// NOTE: It is assumed that i is always less than count.
|
|
func (f *PkgFilter) Set(i uint16) {
|
|
byt := i / 8
|
|
bit := i % 8
|
|
|
|
// Set the i-th bit in the filter.
|
|
// TODO(conner): ignore if > count to prevent panic?
|
|
f.filter[byt] |= byte(1 << (7 - bit))
|
|
}
|
|
|
|
// Contains queries the filter for membership of index `i`.
|
|
// NOTE: It is assumed that i is always less than count.
|
|
func (f *PkgFilter) Contains(i uint16) bool {
|
|
byt := i / 8
|
|
bit := i % 8
|
|
|
|
// Read the i-th bit in the filter.
|
|
// TODO(conner): ignore if > count to prevent panic?
|
|
return f.filter[byt]&(1<<(7-bit)) != 0
|
|
}
|
|
|
|
// Equal checks two PkgFilters for equality.
|
|
func (f *PkgFilter) Equal(f2 *PkgFilter) bool {
|
|
if f == f2 {
|
|
return true
|
|
}
|
|
if f.count != f2.count {
|
|
return false
|
|
}
|
|
|
|
return bytes.Equal(f.filter, f2.filter)
|
|
}
|
|
|
|
// IsFull returns true if every element in the filter has been Set, and false
|
|
// otherwise.
|
|
func (f *PkgFilter) IsFull() bool {
|
|
// Batch validate bytes that are fully used.
|
|
for i := uint16(0); i < f.count/8; i++ {
|
|
if f.filter[i] != 0xFF {
|
|
return false
|
|
}
|
|
}
|
|
|
|
// If the count is not a multiple of 8, check that the filter contains
|
|
// all remaining bits.
|
|
rem := f.count % 8
|
|
for idx := f.count - rem; idx < f.count; idx++ {
|
|
if !f.Contains(idx) {
|
|
return false
|
|
}
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
// Size returns number of bytes produced when the PkgFilter is serialized.
|
|
func (f *PkgFilter) Size() uint16 {
|
|
// 2 bytes for uint16 `count`, then round up number of bytes required to
|
|
// represent `count` bits.
|
|
return 2 + (f.count+7)/8
|
|
}
|
|
|
|
// Encode writes the filter to the provided io.Writer.
|
|
func (f *PkgFilter) Encode(w io.Writer) error {
|
|
if err := binary.Write(w, binary.BigEndian, f.count); err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err := w.Write(f.filter)
|
|
|
|
return err
|
|
}
|
|
|
|
// Decode reads the filter from the provided io.Reader.
|
|
func (f *PkgFilter) Decode(r io.Reader) error {
|
|
if err := binary.Read(r, binary.BigEndian, &f.count); err != nil {
|
|
return err
|
|
}
|
|
|
|
f.filter = make([]byte, f.Size()-2)
|
|
_, err := io.ReadFull(r, f.filter)
|
|
|
|
return err
|
|
}
|
|
|
|
// FwdPkg records all adds, settles, and fails that were locked in as a result
|
|
// of the remote peer sending us a revocation. Each package is identified by
|
|
// the short chanid and remote commitment height corresponding to the revocation
|
|
// that locked in the HTLCs. For everything except a locally initiated payment,
|
|
// settles and fails in a forwarding package must have a corresponding Add in
|
|
// another package, and can be removed individually once the source link has
|
|
// received the fail/settle.
|
|
//
|
|
// Adds cannot be removed, as we need to present the same batch of Adds to
|
|
// properly handle replay protection. Instead, we use a PkgFilter to mark that
|
|
// we have finished processing a particular Add. A FwdPkg should only be deleted
|
|
// after the AckFilter is full and all settles and fails have been persistently
|
|
// removed.
|
|
type FwdPkg struct {
|
|
// Source identifies the channel that wrote this forwarding package.
|
|
Source lnwire.ShortChannelID
|
|
|
|
// Height is the height of the remote commitment chain that locked in
|
|
// this forwarding package.
|
|
Height uint64
|
|
|
|
// State signals the persistent condition of the package and directs how
|
|
// to reprocess the package in the event of failures.
|
|
State FwdState
|
|
|
|
// Adds contains all add messages which need to be processed and
|
|
// forwarded to the switch. Adds does not change over the life of a
|
|
// forwarding package.
|
|
Adds []LogUpdate
|
|
|
|
// FwdFilter is a filter containing the indices of all Adds that were
|
|
// forwarded to the switch.
|
|
FwdFilter *PkgFilter
|
|
|
|
// AckFilter is a filter containing the indices of all Adds for which
|
|
// the source has received a settle or fail and is reflected in the next
|
|
// commitment txn. A package should not be removed until IsFull()
|
|
// returns true.
|
|
AckFilter *PkgFilter
|
|
|
|
// SettleFails contains all settle and fail messages that should be
|
|
// forwarded to the switch.
|
|
SettleFails []LogUpdate
|
|
|
|
// SettleFailFilter is a filter containing the indices of all Settle or
|
|
// Fails originating in this package that have been received and locked
|
|
// into the incoming link's commitment state.
|
|
SettleFailFilter *PkgFilter
|
|
}
|
|
|
|
// NewFwdPkg initializes a new forwarding package in FwdStateLockedIn. This
|
|
// should be used to create a package at the time we receive a revocation.
|
|
func NewFwdPkg(source lnwire.ShortChannelID, height uint64,
|
|
addUpdates, settleFailUpdates []LogUpdate) *FwdPkg {
|
|
|
|
nAddUpdates := uint16(len(addUpdates))
|
|
nSettleFailUpdates := uint16(len(settleFailUpdates))
|
|
|
|
return &FwdPkg{
|
|
Source: source,
|
|
Height: height,
|
|
State: FwdStateLockedIn,
|
|
Adds: addUpdates,
|
|
FwdFilter: NewPkgFilter(nAddUpdates),
|
|
AckFilter: NewPkgFilter(nAddUpdates),
|
|
SettleFails: settleFailUpdates,
|
|
SettleFailFilter: NewPkgFilter(nSettleFailUpdates),
|
|
}
|
|
}
|
|
|
|
// ID returns an unique identifier for this package, used to ensure that sphinx
|
|
// replay processing of this batch is idempotent.
|
|
func (f *FwdPkg) ID() []byte {
|
|
var id = make([]byte, 16)
|
|
byteOrder.PutUint64(id[:8], f.Source.ToUint64())
|
|
byteOrder.PutUint64(id[8:], f.Height)
|
|
return id
|
|
}
|
|
|
|
// String returns a human-readable description of the forwarding package.
|
|
func (f *FwdPkg) String() string {
|
|
return fmt.Sprintf("%T(src=%v, height=%v, nadds=%v, nfailsettles=%v)",
|
|
f, f.Source, f.Height, len(f.Adds), len(f.SettleFails))
|
|
}
|
|
|
|
// AddRef is used to identify a particular Add in a FwdPkg. The short channel ID
|
|
// is assumed to be that of the packager.
|
|
type AddRef struct {
|
|
// Height is the remote commitment height that locked in the Add.
|
|
Height uint64
|
|
|
|
// Index is the index of the Add within the fwd pkg's Adds.
|
|
//
|
|
// NOTE: This index is static over the lifetime of a forwarding package.
|
|
Index uint16
|
|
}
|
|
|
|
// Encode serializes the AddRef to the given io.Writer.
|
|
func (a *AddRef) Encode(w io.Writer) error {
|
|
if err := binary.Write(w, binary.BigEndian, a.Height); err != nil {
|
|
return err
|
|
}
|
|
|
|
return binary.Write(w, binary.BigEndian, a.Index)
|
|
}
|
|
|
|
// Decode deserializes the AddRef from the given io.Reader.
|
|
func (a *AddRef) Decode(r io.Reader) error {
|
|
if err := binary.Read(r, binary.BigEndian, &a.Height); err != nil {
|
|
return err
|
|
}
|
|
|
|
return binary.Read(r, binary.BigEndian, &a.Index)
|
|
}
|
|
|
|
// SettleFailRef is used to locate a Settle/Fail in another channel's FwdPkg. A
|
|
// channel does not remove its own Settle/Fail htlcs, so the source is provided
|
|
// to locate a db bucket belonging to another channel.
|
|
type SettleFailRef struct {
|
|
// Source identifies the outgoing link that locked in the settle or
|
|
// fail. This is then used by the *incoming* link to find the settle
|
|
// fail in another link's forwarding packages.
|
|
Source lnwire.ShortChannelID
|
|
|
|
// Height is the remote commitment height that locked in this
|
|
// Settle/Fail.
|
|
Height uint64
|
|
|
|
// Index is the index of the Add with the fwd pkg's SettleFails.
|
|
//
|
|
// NOTE: This index is static over the lifetime of a forwarding package.
|
|
Index uint16
|
|
}
|
|
|
|
// SettleFailAcker is a generic interface providing the ability to acknowledge
|
|
// settle/fail HTLCs stored in forwarding packages.
|
|
type SettleFailAcker interface {
|
|
// AckSettleFails atomically updates the settle-fail filters in *other*
|
|
// channels' forwarding packages.
|
|
AckSettleFails(tx *bolt.Tx, settleFailRefs ...SettleFailRef) error
|
|
}
|
|
|
|
// GlobalFwdPkgReader is an interface used to retrieve the forwarding packages
|
|
// of any active channel.
|
|
type GlobalFwdPkgReader interface {
|
|
// LoadChannelFwdPkgs loads all known forwarding packages for the given
|
|
// channel.
|
|
LoadChannelFwdPkgs(tx *bolt.Tx,
|
|
source lnwire.ShortChannelID) ([]*FwdPkg, error)
|
|
}
|
|
|
|
// FwdOperator defines the interfaces for managing forwarding packages that are
|
|
// external to a particular channel. This interface is used by the switch to
|
|
// read forwarding packages from arbitrary channels, and acknowledge settles and
|
|
// fails for locally-sourced payments.
|
|
type FwdOperator interface {
|
|
// GlobalFwdPkgReader provides read access to all known forwarding
|
|
// packages
|
|
GlobalFwdPkgReader
|
|
|
|
// SettleFailAcker grants the ability to acknowledge settles or fails
|
|
// residing in arbitrary forwarding packages.
|
|
SettleFailAcker
|
|
}
|
|
|
|
// SwitchPackager is a concrete implementation of the FwdOperator interface.
|
|
// A SwitchPackager offers the ability to read any forwarding package, and ack
|
|
// arbitrary settle and fail HTLCs.
|
|
type SwitchPackager struct{}
|
|
|
|
// NewSwitchPackager instantiates a new SwitchPackager.
|
|
func NewSwitchPackager() *SwitchPackager {
|
|
return &SwitchPackager{}
|
|
}
|
|
|
|
// AckSettleFails atomically updates the settle-fail filters in *other*
|
|
// channels' forwarding packages, to mark that the switch has received a settle
|
|
// or fail residing in the forwarding package of a link.
|
|
func (*SwitchPackager) AckSettleFails(tx *bolt.Tx,
|
|
settleFailRefs ...SettleFailRef) error {
|
|
|
|
return ackSettleFails(tx, settleFailRefs)
|
|
}
|
|
|
|
// LoadChannelFwdPkgs loads all forwarding packages for a particular channel.
|
|
func (*SwitchPackager) LoadChannelFwdPkgs(tx *bolt.Tx,
|
|
source lnwire.ShortChannelID) ([]*FwdPkg, error) {
|
|
|
|
return loadChannelFwdPkgs(tx, source)
|
|
}
|
|
|
|
// FwdPackager supports all operations required to modify fwd packages, such as
|
|
// creation, updates, reading, and removal. The interfaces are broken down in
|
|
// this way to support future delegation of the subinterfaces.
|
|
type FwdPackager interface {
|
|
// AddFwdPkg serializes and writes a FwdPkg for this channel at the
|
|
// remote commitment height included in the forwarding package.
|
|
AddFwdPkg(tx *bolt.Tx, fwdPkg *FwdPkg) error
|
|
|
|
// SetFwdFilter looks up the forwarding package at the remote `height`
|
|
// and sets the `fwdFilter`, marking the Adds for which:
|
|
// 1) We are not the exit node
|
|
// 2) Passed all validation
|
|
// 3) Should be forwarded to the switch immediately after a failure
|
|
SetFwdFilter(tx *bolt.Tx, height uint64, fwdFilter *PkgFilter) error
|
|
|
|
// AckAddHtlcs atomically updates the add filters in this channel's
|
|
// forwarding packages to mark the resolution of an Add that was
|
|
// received from the remote party.
|
|
AckAddHtlcs(tx *bolt.Tx, addRefs ...AddRef) error
|
|
|
|
// SettleFailAcker allows a link to acknowledge settle/fail HTLCs
|
|
// belonging to other channels.
|
|
SettleFailAcker
|
|
|
|
// LoadFwdPkgs loads all known forwarding packages owned by this
|
|
// channel.
|
|
LoadFwdPkgs(tx *bolt.Tx) ([]*FwdPkg, error)
|
|
|
|
// RemovePkg deletes a forwarding package owned by this channel at
|
|
// the provided remote `height`.
|
|
RemovePkg(tx *bolt.Tx, height uint64) error
|
|
}
|
|
|
|
// ChannelPackager is used by a channel to manage the lifecycle of its forwarding
|
|
// packages. The packager is tied to a particular source channel ID, allowing it
|
|
// to create and edit its own packages. Each packager also has the ability to
|
|
// remove fail/settle htlcs that correspond to an add contained in one of
|
|
// source's packages.
|
|
type ChannelPackager struct {
|
|
source lnwire.ShortChannelID
|
|
}
|
|
|
|
// NewChannelPackager creates a new packager for a single channel.
|
|
func NewChannelPackager(source lnwire.ShortChannelID) *ChannelPackager {
|
|
return &ChannelPackager{
|
|
source: source,
|
|
}
|
|
}
|
|
|
|
// AddFwdPkg writes a newly locked in forwarding package to disk.
|
|
func (*ChannelPackager) AddFwdPkg(tx *bolt.Tx, fwdPkg *FwdPkg) error {
|
|
fwdPkgBkt, err := tx.CreateBucketIfNotExists(fwdPackagesKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
source := makeLogKey(fwdPkg.Source.ToUint64())
|
|
sourceBkt, err := fwdPkgBkt.CreateBucketIfNotExists(source[:])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
heightKey := makeLogKey(fwdPkg.Height)
|
|
heightBkt, err := sourceBkt.CreateBucketIfNotExists(heightKey[:])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Write ADD updates we received at this commit height.
|
|
addBkt, err := heightBkt.CreateBucketIfNotExists(addBucketKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Write SETTLE/FAIL updates we received at this commit height.
|
|
failSettleBkt, err := heightBkt.CreateBucketIfNotExists(failSettleBucketKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for i := range fwdPkg.Adds {
|
|
err = putLogUpdate(addBkt, uint16(i), &fwdPkg.Adds[i])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Persist the initialized pkg filter, which will be used to determine
|
|
// when we can remove this forwarding package from disk.
|
|
var ackFilterBuf bytes.Buffer
|
|
if err := fwdPkg.AckFilter.Encode(&ackFilterBuf); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := heightBkt.Put(ackFilterKey, ackFilterBuf.Bytes()); err != nil {
|
|
return err
|
|
}
|
|
|
|
for i := range fwdPkg.SettleFails {
|
|
err = putLogUpdate(failSettleBkt, uint16(i), &fwdPkg.SettleFails[i])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
var settleFailFilterBuf bytes.Buffer
|
|
err = fwdPkg.SettleFailFilter.Encode(&settleFailFilterBuf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return heightBkt.Put(settleFailFilterKey, settleFailFilterBuf.Bytes())
|
|
}
|
|
|
|
// putLogUpdate writes an htlc to the provided `bkt`, using `index` as the key.
|
|
func putLogUpdate(bkt *bolt.Bucket, idx uint16, htlc *LogUpdate) error {
|
|
var b bytes.Buffer
|
|
if err := htlc.Encode(&b); err != nil {
|
|
return err
|
|
}
|
|
|
|
return bkt.Put(uint16Key(idx), b.Bytes())
|
|
}
|
|
|
|
// LoadFwdPkgs scans the forwarding log for any packages that haven't been
|
|
// processed, and returns their deserialized log updates in a map indexed by the
|
|
// remote commitment height at which the updates were locked in.
|
|
func (p *ChannelPackager) LoadFwdPkgs(tx *bolt.Tx) ([]*FwdPkg, error) {
|
|
return loadChannelFwdPkgs(tx, p.source)
|
|
}
|
|
|
|
// loadChannelFwdPkgs loads all forwarding packages owned by `source`.
|
|
func loadChannelFwdPkgs(tx *bolt.Tx, source lnwire.ShortChannelID) ([]*FwdPkg, error) {
|
|
fwdPkgBkt := tx.Bucket(fwdPackagesKey)
|
|
if fwdPkgBkt == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
sourceKey := makeLogKey(source.ToUint64())
|
|
sourceBkt := fwdPkgBkt.Bucket(sourceKey[:])
|
|
if sourceBkt == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
var heights []uint64
|
|
if err := sourceBkt.ForEach(func(k, _ []byte) error {
|
|
if len(k) != 8 {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
heights = append(heights, byteOrder.Uint64(k))
|
|
|
|
return nil
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Load the forwarding package for each retrieved height.
|
|
fwdPkgs := make([]*FwdPkg, 0, len(heights))
|
|
for _, height := range heights {
|
|
fwdPkg, err := loadFwdPkg(fwdPkgBkt, source, height)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
fwdPkgs = append(fwdPkgs, fwdPkg)
|
|
}
|
|
|
|
return fwdPkgs, nil
|
|
}
|
|
|
|
// loadFwPkg reads the packager's fwd pkg at a given height, and determines the
|
|
// appropriate FwdState.
|
|
func loadFwdPkg(fwdPkgBkt *bolt.Bucket, source lnwire.ShortChannelID,
|
|
height uint64) (*FwdPkg, error) {
|
|
|
|
sourceKey := makeLogKey(source.ToUint64())
|
|
sourceBkt := fwdPkgBkt.Bucket(sourceKey[:])
|
|
if sourceBkt == nil {
|
|
return nil, ErrCorruptedFwdPkg
|
|
}
|
|
|
|
heightKey := makeLogKey(height)
|
|
heightBkt := sourceBkt.Bucket(heightKey[:])
|
|
if heightBkt == nil {
|
|
return nil, ErrCorruptedFwdPkg
|
|
}
|
|
|
|
// Load ADDs from disk.
|
|
addBkt := heightBkt.Bucket(addBucketKey)
|
|
if addBkt == nil {
|
|
return nil, ErrCorruptedFwdPkg
|
|
}
|
|
|
|
adds, err := loadHtlcs(addBkt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Load ack filter from disk.
|
|
ackFilterBytes := heightBkt.Get(ackFilterKey)
|
|
if ackFilterBytes == nil {
|
|
return nil, ErrCorruptedFwdPkg
|
|
}
|
|
ackFilterReader := bytes.NewReader(ackFilterBytes)
|
|
|
|
ackFilter := &PkgFilter{}
|
|
if err := ackFilter.Decode(ackFilterReader); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Load SETTLE/FAILs from disk.
|
|
failSettleBkt := heightBkt.Bucket(failSettleBucketKey)
|
|
if failSettleBkt == nil {
|
|
return nil, ErrCorruptedFwdPkg
|
|
}
|
|
|
|
failSettles, err := loadHtlcs(failSettleBkt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Load settle fail filter from disk.
|
|
settleFailFilterBytes := heightBkt.Get(settleFailFilterKey)
|
|
if settleFailFilterBytes == nil {
|
|
return nil, ErrCorruptedFwdPkg
|
|
}
|
|
settleFailFilterReader := bytes.NewReader(settleFailFilterBytes)
|
|
|
|
settleFailFilter := &PkgFilter{}
|
|
if err := settleFailFilter.Decode(settleFailFilterReader); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Initialize the fwding package, which always starts in the
|
|
// FwdStateLockedIn. We can determine what state the package was left in
|
|
// by examining constraints on the information loaded from disk.
|
|
fwdPkg := &FwdPkg{
|
|
Source: source,
|
|
State: FwdStateLockedIn,
|
|
Height: height,
|
|
Adds: adds,
|
|
AckFilter: ackFilter,
|
|
SettleFails: failSettles,
|
|
SettleFailFilter: settleFailFilter,
|
|
}
|
|
|
|
// Check to see if we have written the set exported filter adds to
|
|
// disk. If we haven't, processing of this package was never started, or
|
|
// failed during the last attempt.
|
|
fwdFilterBytes := heightBkt.Get(fwdFilterKey)
|
|
if fwdFilterBytes == nil {
|
|
nAdds := uint16(len(adds))
|
|
fwdPkg.FwdFilter = NewPkgFilter(nAdds)
|
|
return fwdPkg, nil
|
|
}
|
|
|
|
fwdFilterReader := bytes.NewReader(fwdFilterBytes)
|
|
fwdPkg.FwdFilter = &PkgFilter{}
|
|
if err := fwdPkg.FwdFilter.Decode(fwdFilterReader); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Otherwise, a complete round of processing was completed, and we
|
|
// advance the package to FwdStateProcessed.
|
|
fwdPkg.State = FwdStateProcessed
|
|
|
|
// If every add, settle, and fail has been fully acknowledged, we can
|
|
// safely set the package's state to FwdStateCompleted, signalling that
|
|
// it can be garbage collected.
|
|
if fwdPkg.AckFilter.IsFull() && fwdPkg.SettleFailFilter.IsFull() {
|
|
fwdPkg.State = FwdStateCompleted
|
|
}
|
|
|
|
return fwdPkg, nil
|
|
}
|
|
|
|
// loadHtlcs retrieves all serialized htlcs in a bucket, returning
|
|
// them in order of the indexes they were written under.
|
|
func loadHtlcs(bkt *bolt.Bucket) ([]LogUpdate, error) {
|
|
var htlcs []LogUpdate
|
|
if err := bkt.ForEach(func(_, v []byte) error {
|
|
var htlc LogUpdate
|
|
if err := htlc.Decode(bytes.NewReader(v)); err != nil {
|
|
return err
|
|
}
|
|
|
|
htlcs = append(htlcs, htlc)
|
|
|
|
return nil
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return htlcs, nil
|
|
}
|
|
|
|
// SetFwdFilter writes the set of indexes corresponding to Adds at the
|
|
// `height` that are to be forwarded to the switch. Calling this method causes
|
|
// the forwarding package at `height` to be in FwdStateProcessed. We write this
|
|
// forwarding decision so that we always arrive at the same behavior for HTLCs
|
|
// leaving this channel. After a restart, we skip validation of these Adds,
|
|
// since they are assumed to have already been validated, and make the switch or
|
|
// outgoing link responsible for handling replays.
|
|
func (p *ChannelPackager) SetFwdFilter(tx *bolt.Tx, height uint64,
|
|
fwdFilter *PkgFilter) error {
|
|
|
|
fwdPkgBkt := tx.Bucket(fwdPackagesKey)
|
|
if fwdPkgBkt == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
source := makeLogKey(p.source.ToUint64())
|
|
sourceBkt := fwdPkgBkt.Bucket(source[:])
|
|
if sourceBkt == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
heightKey := makeLogKey(height)
|
|
heightBkt := sourceBkt.Bucket(heightKey[:])
|
|
if heightBkt == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
// If the fwd filter has already been written, we return early to avoid
|
|
// modifying the persistent state.
|
|
forwardedAddsBytes := heightBkt.Get(fwdFilterKey)
|
|
if forwardedAddsBytes != nil {
|
|
return nil
|
|
}
|
|
|
|
// Otherwise we serialize and write the provided fwd filter.
|
|
var b bytes.Buffer
|
|
if err := fwdFilter.Encode(&b); err != nil {
|
|
return err
|
|
}
|
|
|
|
return heightBkt.Put(fwdFilterKey, b.Bytes())
|
|
}
|
|
|
|
// AckAddHtlcs accepts a list of references to add htlcs, and updates the
|
|
// AckAddFilter of those forwarding packages to indicate that a settle or fail
|
|
// has been received in response to the add.
|
|
func (p *ChannelPackager) AckAddHtlcs(tx *bolt.Tx, addRefs ...AddRef) error {
|
|
if len(addRefs) == 0 {
|
|
return nil
|
|
}
|
|
|
|
fwdPkgBkt := tx.Bucket(fwdPackagesKey)
|
|
if fwdPkgBkt == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
sourceKey := makeLogKey(p.source.ToUint64())
|
|
sourceBkt := fwdPkgBkt.Bucket(sourceKey[:])
|
|
if sourceBkt == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
// Organize the forward references such that we just get a single slice
|
|
// of indexes for each unique height.
|
|
heightDiffs := make(map[uint64][]uint16)
|
|
for _, addRef := range addRefs {
|
|
heightDiffs[addRef.Height] = append(
|
|
heightDiffs[addRef.Height],
|
|
addRef.Index,
|
|
)
|
|
}
|
|
|
|
// Load each height bucket once and remove all acked htlcs at that
|
|
// height.
|
|
for height, indexes := range heightDiffs {
|
|
err := ackAddHtlcsAtHeight(sourceBkt, height, indexes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ackAddHtlcsAtHeight updates the AddAckFilter of a single forwarding package
|
|
// with a list of indexes, writing the resulting filter back in its place.
|
|
func ackAddHtlcsAtHeight(sourceBkt *bolt.Bucket, height uint64,
|
|
indexes []uint16) error {
|
|
|
|
heightKey := makeLogKey(height)
|
|
heightBkt := sourceBkt.Bucket(heightKey[:])
|
|
if heightBkt == nil {
|
|
// If the height bucket isn't found, this could be because the
|
|
// forwarding package was already removed. We'll return nil to
|
|
// signal that the operation is successful, as there is nothing
|
|
// to ack.
|
|
return nil
|
|
}
|
|
|
|
// Load ack filter from disk.
|
|
ackFilterBytes := heightBkt.Get(ackFilterKey)
|
|
if ackFilterBytes == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
ackFilter := &PkgFilter{}
|
|
ackFilterReader := bytes.NewReader(ackFilterBytes)
|
|
if err := ackFilter.Decode(ackFilterReader); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Update the ack filter for this height.
|
|
for _, index := range indexes {
|
|
ackFilter.Set(index)
|
|
}
|
|
|
|
// Write the resulting filter to disk.
|
|
var ackFilterBuf bytes.Buffer
|
|
if err := ackFilter.Encode(&ackFilterBuf); err != nil {
|
|
return err
|
|
}
|
|
|
|
return heightBkt.Put(ackFilterKey, ackFilterBuf.Bytes())
|
|
}
|
|
|
|
// AckSettleFails persistently acknowledges settles or fails from a remote forwarding
|
|
// package. This should only be called after the source of the Add has locked in
|
|
// the settle/fail, or it becomes otherwise safe to forgo retransmitting the
|
|
// settle/fail after a restart.
|
|
func (p *ChannelPackager) AckSettleFails(tx *bolt.Tx, settleFailRefs ...SettleFailRef) error {
|
|
return ackSettleFails(tx, settleFailRefs)
|
|
}
|
|
|
|
// ackSettleFails persistently acknowledges a batch of settle fail references.
|
|
func ackSettleFails(tx *bolt.Tx, settleFailRefs []SettleFailRef) error {
|
|
if len(settleFailRefs) == 0 {
|
|
return nil
|
|
}
|
|
|
|
fwdPkgBkt := tx.Bucket(fwdPackagesKey)
|
|
if fwdPkgBkt == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
// Organize the forward references such that we just get a single slice
|
|
// of indexes for each unique destination-height pair.
|
|
destHeightDiffs := make(map[lnwire.ShortChannelID]map[uint64][]uint16)
|
|
for _, settleFailRef := range settleFailRefs {
|
|
destHeights, ok := destHeightDiffs[settleFailRef.Source]
|
|
if !ok {
|
|
destHeights = make(map[uint64][]uint16)
|
|
destHeightDiffs[settleFailRef.Source] = destHeights
|
|
}
|
|
|
|
destHeights[settleFailRef.Height] = append(
|
|
destHeights[settleFailRef.Height],
|
|
settleFailRef.Index,
|
|
)
|
|
}
|
|
|
|
// With the references organized by destination and height, we now load
|
|
// each remote bucket, and update the settle fail filter for any
|
|
// settle/fail htlcs.
|
|
for dest, destHeights := range destHeightDiffs {
|
|
destKey := makeLogKey(dest.ToUint64())
|
|
destBkt := fwdPkgBkt.Bucket(destKey[:])
|
|
if destBkt == nil {
|
|
// If the destination bucket is not found, this is
|
|
// likely the result of the destination channel being
|
|
// closed and having it's forwarding packages wiped. We
|
|
// won't treat this as an error, because the response
|
|
// will no longer be retransmitted internally.
|
|
continue
|
|
}
|
|
|
|
for height, indexes := range destHeights {
|
|
err := ackSettleFailsAtHeight(destBkt, height, indexes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ackSettleFailsAtHeight given a destination bucket, acks the provided indexes
|
|
// at particular a height by updating the settle fail filter.
|
|
func ackSettleFailsAtHeight(destBkt *bolt.Bucket, height uint64,
|
|
indexes []uint16) error {
|
|
|
|
heightKey := makeLogKey(height)
|
|
heightBkt := destBkt.Bucket(heightKey[:])
|
|
if heightBkt == nil {
|
|
// If the height bucket isn't found, this could be because the
|
|
// forwarding package was already removed. We'll return nil to
|
|
// signal that the operation is as there is nothing to ack.
|
|
return nil
|
|
}
|
|
|
|
// Load ack filter from disk.
|
|
settleFailFilterBytes := heightBkt.Get(settleFailFilterKey)
|
|
if settleFailFilterBytes == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
settleFailFilter := &PkgFilter{}
|
|
settleFailFilterReader := bytes.NewReader(settleFailFilterBytes)
|
|
if err := settleFailFilter.Decode(settleFailFilterReader); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Update the ack filter for this height.
|
|
for _, index := range indexes {
|
|
settleFailFilter.Set(index)
|
|
}
|
|
|
|
// Write the resulting filter to disk.
|
|
var settleFailFilterBuf bytes.Buffer
|
|
if err := settleFailFilter.Encode(&settleFailFilterBuf); err != nil {
|
|
return err
|
|
}
|
|
|
|
return heightBkt.Put(settleFailFilterKey, settleFailFilterBuf.Bytes())
|
|
}
|
|
|
|
// RemovePkg deletes the forwarding package at the given height from the
|
|
// packager's source bucket.
|
|
func (p *ChannelPackager) RemovePkg(tx *bolt.Tx, height uint64) error {
|
|
fwdPkgBkt := tx.Bucket(fwdPackagesKey)
|
|
if fwdPkgBkt == nil {
|
|
return nil
|
|
}
|
|
|
|
sourceBytes := makeLogKey(p.source.ToUint64())
|
|
sourceBkt := fwdPkgBkt.Bucket(sourceBytes[:])
|
|
if sourceBkt == nil {
|
|
return ErrCorruptedFwdPkg
|
|
}
|
|
|
|
heightKey := makeLogKey(height)
|
|
|
|
return sourceBkt.DeleteBucket(heightKey[:])
|
|
}
|
|
|
|
// uint16Key writes the provided 16-bit unsigned integer to a 2-byte slice.
|
|
func uint16Key(i uint16) []byte {
|
|
key := make([]byte, 2)
|
|
byteOrder.PutUint16(key, i)
|
|
return key
|
|
}
|
|
|
|
// uint16FromKey reconstructs a 16-bit unsigned integer from a 2-byte slice.
|
|
func uint16FromKey(key []byte) uint16 {
|
|
return byteOrder.Uint16(key)
|
|
}
|
|
|
|
// Compile-time constraint to ensure that ChannelPackager implements the public
|
|
// FwdPackager interface.
|
|
var _ FwdPackager = (*ChannelPackager)(nil)
|
|
|
|
// Compile-time constraint to ensure that SwitchPackager implements the public
|
|
// FwdOperator interface.
|
|
var _ FwdOperator = (*SwitchPackager)(nil)
|