You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1042 lines
30 KiB
1042 lines
30 KiB
/* This is the lightningd handler for messages to/from various
|
|
* dualopend subdaemons. It manages the callbacks and database
|
|
* saves and funding tx watching for a channel open */
|
|
|
|
#include <bitcoin/psbt.h>
|
|
#include <ccan/ccan/take/take.h>
|
|
#include <ccan/short_types/short_types.h>
|
|
#include <common/amount.h>
|
|
#include <common/channel_config.h>
|
|
#include <common/channel_id.h>
|
|
#include <common/derive_basepoints.h>
|
|
#include <common/features.h>
|
|
#include <common/fee_states.h>
|
|
#include <common/htlc.h>
|
|
#include <common/json_helpers.h>
|
|
#include <common/json_tok.h>
|
|
#include <common/per_peer_state.h>
|
|
#include <common/psbt_open.h>
|
|
#include <common/type_to_string.h>
|
|
#include <hsmd/capabilities.h>
|
|
#include <lightningd/chaintopology.h>
|
|
#include <lightningd/channel_control.h>
|
|
#include <lightningd/dual_open_control.h>
|
|
#include <lightningd/hsm_control.h>
|
|
#include <lightningd/opening_common.h>
|
|
#include <lightningd/peer_control.h>
|
|
#include <lightningd/plugin_hook.h>
|
|
#include <lightningd/subd.h>
|
|
#include <openingd/dualopend_wiregen.h>
|
|
#include <wire/common_wiregen.h>
|
|
#include <wire/peer_wire.h>
|
|
|
|
struct commit_rcvd {
|
|
struct channel *channel;
|
|
struct channel_id cid;
|
|
struct per_peer_state *pps;
|
|
u8 *commitment_msg;
|
|
struct uncommitted_channel *uc;
|
|
};
|
|
|
|
static const struct witness_stack **
|
|
psbt_to_witness_stacks(const tal_t *ctx, struct log *log,
|
|
const struct wally_psbt *psbt, enum side opener)
|
|
{
|
|
size_t stack_index;
|
|
u16 serial_id;
|
|
const struct witness_stack **stacks
|
|
= tal_arr(ctx, const struct witness_stack *, psbt->num_inputs);
|
|
|
|
stack_index = 0;
|
|
for (size_t i = 0; i < psbt->num_inputs; i++) {
|
|
if (!psbt_get_serial_id(&psbt->inputs[i].unknowns, &serial_id)) {
|
|
log_broken(log, "dual funding PSBT must have serial_id for each "
|
|
"input, none found for input %zu", i);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
if (serial_id % 2 == opener) {
|
|
struct wally_tx_witness_stack *wtx_s =
|
|
psbt->inputs[i].final_witness;
|
|
struct witness_stack *stack =
|
|
tal(stacks, struct witness_stack);
|
|
/* Convert the wally_tx_witness_stack to
|
|
* a witness_stack entry */
|
|
stack->witness_element =
|
|
tal_arr(stack, struct witness_element *,
|
|
wtx_s->num_items);
|
|
for (size_t j = 0; j < tal_count(stack->witness_element); j++) {
|
|
stack->witness_element[j] = tal(stack,
|
|
struct witness_element);
|
|
stack->witness_element[j]->witness =
|
|
tal_dup_arr(stack, u8,
|
|
wtx_s->items[j].witness,
|
|
wtx_s->items[j].witness_len,
|
|
0);
|
|
|
|
}
|
|
|
|
stacks[stack_index++] = stack;
|
|
}
|
|
|
|
}
|
|
|
|
if (stack_index == 0)
|
|
return tal_free(stacks);
|
|
|
|
tal_resize(&stacks, stack_index);
|
|
return stacks;
|
|
}
|
|
|
|
static bool psbt_side_finalized(struct log *log, struct wally_psbt *psbt, enum side opener)
|
|
{
|
|
u16 serial_id;
|
|
for (size_t i = 0; i < psbt->num_inputs; i++) {
|
|
if (!psbt_get_serial_id(&psbt->inputs[i].unknowns, &serial_id)) {
|
|
log_broken(log, "dual funding PSBT must have serial_id for each "
|
|
"input, none found for input %zu", i);
|
|
return false;
|
|
}
|
|
/* It's our input if parity matches -- this shorthand
|
|
* works because LOCAL == 0. If the parity is even and
|
|
* we're the opener then it's ours; if the parity is odd
|
|
* and the REMOTE's the opener (opener == 1), then it's also
|
|
* ours. */
|
|
if (serial_id % 2 == opener) {
|
|
if (!psbt->inputs[i].final_witness ||
|
|
psbt->inputs[i].final_witness->num_items == 0)
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
static void handle_signed_psbt(struct lightningd *ld,
|
|
const struct wally_psbt *psbt,
|
|
struct commit_rcvd *rcvd)
|
|
{
|
|
const struct witness_stack **ws =
|
|
psbt_to_witness_stacks(tmpctx, ld->log, psbt, REMOTE);
|
|
|
|
const u8 *fwd_msg_2;
|
|
|
|
/* We've already confirmed that all of the supplied info is good,
|
|
* so now go ahead and create a tx_signatures msg.
|
|
* We'll pass the tx_sigs msg and the already-created
|
|
* commitment_signed tx to channeld, who will send
|
|
* both of them to the peer. */
|
|
fwd_msg_2 = towire_tx_signatures(rcvd, &rcvd->channel->cid,
|
|
&rcvd->channel->funding_txid,
|
|
ws);
|
|
|
|
channel_watch_funding(ld, rcvd->channel);
|
|
|
|
peer_start_channeld(rcvd->channel,
|
|
rcvd->pps,
|
|
rcvd->commitment_msg,
|
|
fwd_msg_2, false);
|
|
}
|
|
|
|
/* ~Map of the Territory~
|
|
*
|
|
* openchannel hook
|
|
- reserveinputs feerate [{"amt": amt, "script": ""}] excludecommon=true -> psbt
|
|
-> psbt_set
|
|
*
|
|
* openchannel_changed hook
|
|
- psbt --> most recent
|
|
-> psbt_set (if same as orig) | complete flag
|
|
*
|
|
* openchannel_sign hook
|
|
- signpsbt psbt -> partially_signed_psbt
|
|
-> partially_signed_psbt
|
|
*/
|
|
struct openchannel2_payload {
|
|
struct subd *dualopend;
|
|
struct node_id peer_id;
|
|
struct amount_sat their_funding;
|
|
struct amount_sat dust_limit_satoshis;
|
|
struct amount_msat max_htlc_value_in_flight_msat;
|
|
struct amount_msat htlc_minimum_msat;
|
|
u32 feerate_per_kw_funding;
|
|
u32 feerate_per_kw;
|
|
u16 to_self_delay;
|
|
u16 max_accepted_htlcs;
|
|
u8 channel_flags;
|
|
u32 locktime;
|
|
u8 *shutdown_scriptpubkey;
|
|
/* FIXME: include the podle? */
|
|
|
|
struct amount_sat accepter_funding;
|
|
struct wally_psbt *psbt;
|
|
const u8 *our_shutdown_scriptpubkey;
|
|
};
|
|
|
|
static void
|
|
openchannel2_hook_serialize(struct openchannel2_payload *payload,
|
|
struct json_stream *stream)
|
|
{
|
|
json_object_start(stream, "openchannel2");
|
|
json_add_node_id(stream, "id", &payload->peer_id);
|
|
json_add_amount_sat_only(stream, "their_funding",
|
|
payload->their_funding);
|
|
json_add_amount_sat_only(stream, "dust_limit_satoshis",
|
|
payload->dust_limit_satoshis);
|
|
json_add_amount_msat_only(stream, "max_htlc_value_in_flight_msat",
|
|
payload->max_htlc_value_in_flight_msat);
|
|
json_add_amount_msat_only(stream, "htlc_minimum_msat",
|
|
payload->htlc_minimum_msat);
|
|
json_add_num(stream, "feerate_per_kw_funding",
|
|
payload->feerate_per_kw_funding);
|
|
json_add_num(stream, "feerate_per_kw", payload->feerate_per_kw);
|
|
json_add_num(stream, "to_self_delay", payload->to_self_delay);
|
|
json_add_num(stream, "max_accepted_htlcs", payload->max_accepted_htlcs);
|
|
json_add_num(stream, "channel_flags", payload->channel_flags);
|
|
json_add_num(stream, "locktime", payload->locktime);
|
|
if (tal_bytelen(payload->shutdown_scriptpubkey) != 0)
|
|
json_add_hex_talarr(stream, "shutdown_scriptpubkey",
|
|
payload->shutdown_scriptpubkey);
|
|
/* FIXME: include the podle? */
|
|
json_object_end(stream);
|
|
}
|
|
|
|
struct openchannel2_psbt_payload {
|
|
struct subd *dualopend;
|
|
struct wally_psbt *psbt;
|
|
struct commit_rcvd *rcvd;
|
|
struct lightningd *ld;
|
|
};
|
|
|
|
static void
|
|
openchannel2_changed_hook_serialize(struct openchannel2_psbt_payload *payload,
|
|
struct json_stream *stream)
|
|
{
|
|
json_object_start(stream, "openchannel2_changed");
|
|
json_add_psbt(stream, "psbt", payload->psbt);
|
|
json_add_string(stream, "channel_id",
|
|
type_to_string(tmpctx, struct channel_id,
|
|
&payload->rcvd->cid));
|
|
json_object_end(stream);
|
|
}
|
|
|
|
static void
|
|
openchannel2_sign_hook_serialize(struct openchannel2_psbt_payload *payload,
|
|
struct json_stream *stream)
|
|
{
|
|
json_object_start(stream, "openchannel2_sign");
|
|
json_add_psbt(stream, "psbt", payload->psbt);
|
|
json_add_string(stream, "channel_id",
|
|
type_to_string(tmpctx, struct channel_id,
|
|
&payload->rcvd->channel->cid));
|
|
json_object_end(stream);
|
|
}
|
|
|
|
static const u8 *hook_extract_shutdown_script(struct subd* dualopend,
|
|
const char *buffer,
|
|
const jsmntok_t *toks)
|
|
{
|
|
const u8 *close_to_script;
|
|
enum address_parse_result parse_res;
|
|
|
|
if (!buffer)
|
|
return NULL;
|
|
|
|
const jsmntok_t *t = json_get_member(buffer, toks, "result");
|
|
if (!t)
|
|
fatal("Plugin must return a 'result'"
|
|
"%.*s", toks[0].end - toks[0].start,
|
|
buffer + toks[0].start);
|
|
|
|
if (!json_tok_streq(buffer, t, "continue")) {
|
|
char *errmsg = "Client error. Unable to continue";
|
|
subd_send_msg(dualopend,
|
|
take(towire_dual_open_fail(NULL, errmsg)));
|
|
return NULL;
|
|
}
|
|
|
|
const jsmntok_t *close_to_tok = json_get_member(buffer, toks, "close_to");
|
|
if (!close_to_tok)
|
|
return NULL;
|
|
|
|
parse_res = json_to_address_scriptpubkey(tmpctx, chainparams, buffer,
|
|
close_to_tok, &close_to_script);
|
|
switch (parse_res) {
|
|
case ADDRESS_PARSE_UNRECOGNIZED:
|
|
fatal("Plugin returned an invalid response to the"
|
|
" openchannel2.close_to hook: %.*s",
|
|
t->end - t->start, buffer + t->start);
|
|
case ADDRESS_PARSE_WRONG_NETWORK:
|
|
fatal("Plugin returned invalid response to the"
|
|
" openchannel2.close_to hook: address %s is"
|
|
" not on network %s",
|
|
tal_hex(NULL, close_to_script),
|
|
chainparams->network_name);
|
|
case ADDRESS_PARSE_SUCCESS:
|
|
return close_to_script;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
static bool
|
|
hook_extract_psbt(const tal_t *ctx, struct subd *dualopend, const char *buffer,
|
|
const jsmntok_t *toks, char *hook_name,
|
|
bool allow_empty,
|
|
struct wally_psbt **out)
|
|
{
|
|
struct wally_psbt *returned_psbt;
|
|
|
|
if (!buffer)
|
|
fatal("Plugin must return a valid response to %s", hook_name);
|
|
|
|
const jsmntok_t *t = json_get_member(buffer, toks, "result");
|
|
if (!t)
|
|
fatal("Plugin must return a 'result' to %s"
|
|
"%.*s", hook_name, toks[0].end - toks[0].start,
|
|
buffer + toks[0].start);
|
|
|
|
if (!json_tok_streq(buffer, t, "continue")) {
|
|
/* dualopend might have closed if we're on the signed round */
|
|
if (dualopend) {
|
|
char *errmsg = "Client error. Unable to continue";
|
|
subd_send_msg(dualopend,
|
|
take(towire_dual_open_fail(NULL, errmsg)));
|
|
}
|
|
return false;
|
|
}
|
|
|
|
const jsmntok_t *psbt_tok = json_get_member(buffer, toks, "psbt");
|
|
if (!psbt_tok) {
|
|
if (!allow_empty)
|
|
fatal("Plugin must return a 'psbt' to a 'continue'd"
|
|
"%s %.*s", hook_name,
|
|
toks[0].end - toks[0].start,
|
|
buffer + toks[0].start);
|
|
*out = NULL;
|
|
return true;
|
|
}
|
|
|
|
if (!json_to_psbt(ctx, buffer, psbt_tok, &returned_psbt))
|
|
fatal("Plugin must return a valid 'psbt' to a 'continue'd"
|
|
"%s %.*s", hook_name,
|
|
toks[0].end - toks[0].start,
|
|
buffer + toks[0].start);
|
|
|
|
*out = returned_psbt;
|
|
return true;
|
|
}
|
|
|
|
/* The field is *always* assumed msats, as that's the unit
|
|
* amount we're transitioning our API over to. A 'xxxsat'
|
|
* unit will be interpreted correctly, but a value given
|
|
* without a unit will always be interpreted as msats */
|
|
static bool
|
|
hook_extract_amount(struct subd *dualopend,
|
|
const char *buffer,
|
|
const jsmntok_t *toks,
|
|
char *field_name,
|
|
struct amount_sat *amount)
|
|
{
|
|
struct amount_msat msats;
|
|
|
|
if (!buffer)
|
|
return false;
|
|
|
|
const jsmntok_t *t = json_get_member(buffer, toks, "result");
|
|
if (!t)
|
|
fatal("Plugin must return a 'result' "
|
|
" %.*s", toks[0].end - toks[0].start,
|
|
buffer + toks[0].start);
|
|
|
|
if (!json_tok_streq(buffer, t, "continue")) {
|
|
char *errmsg = "Client error. Unable to continue";
|
|
subd_send_msg(dualopend,
|
|
take(towire_dual_open_fail(NULL, errmsg)));
|
|
return false;
|
|
}
|
|
|
|
/* If there's no amount_sat field, that's ok */
|
|
const jsmntok_t *amt_tok = json_get_member(buffer, toks, field_name);
|
|
if (!amt_tok) {
|
|
*amount = AMOUNT_SAT(0);
|
|
return true;
|
|
}
|
|
|
|
if (!json_to_msat(buffer, amt_tok, &msats))
|
|
fatal("Plugin must return a valid '%s' to a 'continue'd"
|
|
" %.*s", field_name,
|
|
toks[0].end - toks[0].start,
|
|
buffer + toks[0].start);
|
|
|
|
*amount = amount_msat_to_sat_round_down(msats);
|
|
return true;
|
|
}
|
|
|
|
#define CHECK_CHANGES(set, dir) \
|
|
do { \
|
|
for (size_t i = 0; i < tal_count(set); i++) { \
|
|
ok = psbt_get_serial_id(&set[i].dir.unknowns, &serial_id); \
|
|
assert(ok); \
|
|
if (serial_id % 2 != opener_side) \
|
|
return true; \
|
|
} \
|
|
} while (false) \
|
|
|
|
static bool psbt_side_contribs_changed(struct wally_psbt *orig,
|
|
struct wally_psbt *new,
|
|
enum side opener_side)
|
|
{
|
|
struct psbt_changeset *cs;
|
|
u16 serial_id;
|
|
bool ok;
|
|
|
|
cs = psbt_get_changeset(tmpctx, orig, new);
|
|
|
|
if (tal_count(cs->added_ins) == 0 &&
|
|
tal_count(cs->rm_ins) == 0 &&
|
|
tal_count(cs->added_outs) == 0 &&
|
|
tal_count(cs->rm_outs) == 0)
|
|
return false;
|
|
|
|
/* If there were *any* changes, then the answer to the 'both sides'
|
|
* question is "yes, there were changes" */
|
|
if (opener_side == NUM_SIDES)
|
|
return true;
|
|
|
|
/* Check that none of the included updates have a serial
|
|
* id that's the peer's parity */
|
|
CHECK_CHANGES(cs->added_ins, input);
|
|
CHECK_CHANGES(cs->rm_ins, input);
|
|
CHECK_CHANGES(cs->added_outs, output);
|
|
CHECK_CHANGES(cs->rm_outs, output);
|
|
|
|
return false;
|
|
}
|
|
|
|
/* Adds serials to our inputs + outputs that don't have one yet */
|
|
static void psbt_add_serials(struct wally_psbt *psbt, enum side opener)
|
|
{
|
|
u16 serial_id;
|
|
const u64 serial_space = 100000;
|
|
for (size_t i = 0; i < psbt->num_inputs; i++) {
|
|
/* Skip ones that already have a serial id */
|
|
if (psbt_get_serial_id(&psbt->inputs[i].unknowns, &serial_id))
|
|
continue;
|
|
|
|
while ((serial_id = pseudorand(serial_space)) % 2 != opener ||
|
|
psbt_find_serial_input(psbt, serial_id) != -1) {
|
|
/* keep going; */
|
|
}
|
|
psbt_input_add_serial_id(psbt, &psbt->inputs[i], serial_id);
|
|
}
|
|
for (size_t i = 0; i < psbt->num_outputs; i++) {
|
|
/* Skip ones that already have a serial id */
|
|
if (psbt_get_serial_id(&psbt->outputs[i].unknowns, &serial_id))
|
|
continue;
|
|
|
|
while ((serial_id = pseudorand(serial_space)) % 2 != opener ||
|
|
psbt_find_serial_output(psbt, serial_id) != -1) {
|
|
/* keep going; */
|
|
}
|
|
psbt_output_add_serial_id(psbt, &psbt->outputs[i], serial_id);
|
|
}
|
|
}
|
|
|
|
/* dualopend dies? Remove dualopend ptr from payload */
|
|
static void openchannel2_remove_dualopend(struct subd *dualopend,
|
|
struct openchannel2_payload *payload)
|
|
{
|
|
assert(payload->dualopend == dualopend);
|
|
payload->dualopend = NULL;
|
|
}
|
|
|
|
static bool
|
|
openchannel2_hook_deserialize(struct openchannel2_payload *payload,
|
|
const char *buffer,
|
|
const jsmntok_t *toks)
|
|
{
|
|
struct subd *dualopend = payload->dualopend;
|
|
|
|
/* If our daemon died, we're done */
|
|
if (!dualopend) {
|
|
tal_free(payload);
|
|
return false;
|
|
}
|
|
|
|
if (!hook_extract_psbt(payload, dualopend, buffer, toks,
|
|
"openchannel2", true, &payload->psbt))
|
|
return false;
|
|
|
|
payload->our_shutdown_scriptpubkey =
|
|
hook_extract_shutdown_script(dualopend, buffer, toks);
|
|
|
|
/* Add a serial_id to everything that doesn't have one yet */
|
|
if (payload->psbt)
|
|
psbt_add_serials(payload->psbt, REMOTE);
|
|
|
|
if (payload->psbt && !psbt_has_required_fields(payload->psbt))
|
|
fatal("Plugin supplied PSBT that's missing required fields. %s",
|
|
type_to_string(tmpctx, struct wally_psbt, payload->psbt));
|
|
|
|
if (!hook_extract_amount(dualopend, buffer, toks, "accepter_funding_msat",
|
|
&payload->accepter_funding))
|
|
fatal("Plugin failed to supply accepter_funding_msat field");
|
|
|
|
if (!payload->psbt &&
|
|
!amount_sat_eq(payload->accepter_funding, AMOUNT_SAT(0))) {
|
|
/* Gotta give a PSBT if you set the accepter_funding amount */
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static void
|
|
openchannel2_hook_cb(struct openchannel2_payload *payload STEALS)
|
|
{
|
|
struct subd *dualopend = payload->dualopend;
|
|
|
|
/* Free payload regardless of what happens next */
|
|
tal_steal(tmpctx, payload);
|
|
|
|
/* If our daemon died, we're done */
|
|
if (!dualopend)
|
|
return;
|
|
|
|
tal_del_destructor2(dualopend, openchannel2_remove_dualopend, payload);
|
|
|
|
/* If there's no plugin, the psbt will be NULL. We should pass an empty
|
|
* PSBT over, in this case */
|
|
subd_send_msg(dualopend,
|
|
take(towire_dual_open_got_offer_reply(NULL,
|
|
payload->accepter_funding,
|
|
payload->psbt,
|
|
payload->our_shutdown_scriptpubkey)));
|
|
}
|
|
|
|
/* dualopend dies? Remove dualopend ptr from payload */
|
|
static void openchannel2_psbt_remove_dualopend(struct subd *dualopend,
|
|
struct openchannel2_psbt_payload *payload)
|
|
{
|
|
assert(payload->dualopend == dualopend);
|
|
payload->dualopend = NULL;
|
|
}
|
|
|
|
static bool
|
|
openchannel2_changed_deserialize(struct openchannel2_psbt_payload *payload,
|
|
const char *buffer, const jsmntok_t *toks)
|
|
{
|
|
struct subd *dualopend = payload->dualopend;
|
|
struct wally_psbt *psbt;
|
|
|
|
if (!hook_extract_psbt(NULL, dualopend, buffer,
|
|
toks, "openchannel2_sign",
|
|
false, &psbt))
|
|
return false;
|
|
|
|
/* Add serials to PSBT, before checking for required fields */
|
|
psbt_add_serials(psbt, REMOTE);
|
|
|
|
if (!psbt_has_required_fields(psbt))
|
|
fatal("Plugin supplied PSBT that's missing required fields. %s",
|
|
type_to_string(tmpctx, struct wally_psbt, psbt));
|
|
|
|
if (payload->psbt)
|
|
tal_free(payload->psbt);
|
|
|
|
payload->psbt = tal_steal(payload, psbt);
|
|
return true;
|
|
}
|
|
|
|
static void
|
|
openchannel2_changed_hook_cb(struct openchannel2_psbt_payload *payload STEALS)
|
|
{
|
|
struct subd *dualopend = payload->dualopend;
|
|
|
|
/* Free payload regardless of what happens next */
|
|
tal_steal(tmpctx, payload);
|
|
|
|
/* If our daemon died, we're done */
|
|
if (!dualopend)
|
|
return;
|
|
|
|
tal_del_destructor2(dualopend,
|
|
openchannel2_psbt_remove_dualopend,
|
|
payload);
|
|
|
|
subd_send_msg(dualopend,
|
|
take(towire_dual_open_psbt_changed(NULL,
|
|
&payload->rcvd->cid,
|
|
payload->psbt)));
|
|
}
|
|
|
|
static bool
|
|
openchannel2_signed_deserialize(struct openchannel2_psbt_payload *payload,
|
|
const char *buffer, const jsmntok_t *toks)
|
|
{
|
|
struct subd *dualopend = payload->dualopend;
|
|
struct wally_psbt *psbt;
|
|
|
|
if (!hook_extract_psbt(NULL, dualopend, buffer,
|
|
toks, "openchannel2_sign",
|
|
false, &psbt))
|
|
return false;
|
|
|
|
if (!psbt_has_required_fields(psbt))
|
|
fatal("Plugin supplied PSBT that's missing required fields. %s",
|
|
type_to_string(tmpctx, struct wally_psbt, psbt));
|
|
|
|
/* Verify that inputs/outputs are the same. Note that this is a
|
|
* 'de minimus' check -- we just look at serial_ids. If you've
|
|
* totally managled the data here but left the serial_ids intact,
|
|
* you'll get a failure back from the peer when you send
|
|
* commitment sigs */
|
|
if (psbt_side_contribs_changed(payload->psbt, psbt, NUM_SIDES))
|
|
fatal("Plugin must not change psbt input/output set. "
|
|
"orig: %s. updated: %s",
|
|
type_to_string(tmpctx, struct wally_psbt,
|
|
payload->psbt),
|
|
type_to_string(tmpctx, struct wally_psbt,
|
|
psbt));
|
|
|
|
if (payload->psbt)
|
|
tal_free(payload->psbt);
|
|
payload->psbt = tal_steal(payload, psbt);
|
|
return true;
|
|
}
|
|
|
|
static void
|
|
openchannel2_sign_hook_cb(struct openchannel2_psbt_payload *payload STEALS)
|
|
{
|
|
/* Free payload regardless of what happens next */
|
|
tal_steal(tmpctx, payload);
|
|
|
|
/* Finalize it, if not already. It shouldn't work entirely */
|
|
psbt_finalize(payload->psbt);
|
|
|
|
if (!psbt_side_finalized(payload->ld->log, payload->psbt, REMOTE))
|
|
fatal("Plugin must return a 'psbt' with signatures for their inputs"
|
|
" %s", type_to_string(tmpctx, struct wally_psbt, payload->psbt));
|
|
|
|
handle_signed_psbt(payload->ld, payload->psbt, payload->rcvd);
|
|
}
|
|
|
|
REGISTER_PLUGIN_HOOK(openchannel2,
|
|
openchannel2_hook_deserialize,
|
|
openchannel2_hook_cb,
|
|
openchannel2_hook_serialize,
|
|
struct openchannel2_payload *);
|
|
|
|
REGISTER_PLUGIN_HOOK(openchannel2_changed,
|
|
openchannel2_changed_deserialize,
|
|
openchannel2_changed_hook_cb,
|
|
openchannel2_changed_hook_serialize,
|
|
struct openchannel2_psbt_payload *);
|
|
|
|
REGISTER_PLUGIN_HOOK(openchannel2_sign,
|
|
openchannel2_signed_deserialize,
|
|
openchannel2_sign_hook_cb,
|
|
openchannel2_sign_hook_serialize,
|
|
struct openchannel2_psbt_payload *);
|
|
|
|
/* Steals fields from uncommitted_channel: returns NULL if can't generate a
|
|
* key for this channel (shouldn't happen!). */
|
|
static struct channel *
|
|
wallet_commit_channel(struct lightningd *ld,
|
|
struct uncommitted_channel *uc,
|
|
struct channel_id *cid,
|
|
struct bitcoin_tx *remote_commit,
|
|
struct bitcoin_signature *remote_commit_sig,
|
|
const struct bitcoin_txid *funding_txid,
|
|
u16 funding_outnum,
|
|
struct amount_sat total_funding,
|
|
struct amount_sat our_funding,
|
|
u8 channel_flags,
|
|
const struct channel_info *channel_info,
|
|
u32 feerate,
|
|
enum side opener,
|
|
const u8 *our_upfront_shutdown_script,
|
|
const u8 *remote_upfront_shutdown_script)
|
|
{
|
|
struct channel *channel;
|
|
s64 final_key_idx;
|
|
bool option_static_remotekey;
|
|
bool option_anchor_outputs;
|
|
struct amount_msat our_msat;
|
|
|
|
/* Get a key to use for closing outputs from this tx */
|
|
final_key_idx = wallet_get_newindex(ld);
|
|
if (final_key_idx == -1) {
|
|
log_broken(uc->log, "Can't get final key index");
|
|
return NULL;
|
|
}
|
|
|
|
if (!amount_sat_to_msat(&our_msat, our_funding)) {
|
|
log_broken(uc->log, "Unable to convert funds");
|
|
return NULL;
|
|
}
|
|
|
|
/* BOLT-7b04b1461739c5036add61782d58ac490842d98b #9
|
|
* | 222/223 | `option_dual_fund`
|
|
* | Use v2 of channel open, enables dual funding
|
|
* | IN9
|
|
* | `option_anchor_outputs` */
|
|
option_static_remotekey = true;
|
|
option_anchor_outputs = true;
|
|
|
|
channel = new_channel(uc->peer, uc->dbid,
|
|
NULL, /* No shachain yet */
|
|
CHANNELD_AWAITING_LOCKIN,
|
|
opener,
|
|
uc->log,
|
|
take(uc->transient_billboard),
|
|
channel_flags,
|
|
&uc->our_config,
|
|
uc->minimum_depth,
|
|
1, 1, 0,
|
|
funding_txid,
|
|
funding_outnum,
|
|
total_funding,
|
|
AMOUNT_MSAT(0),
|
|
our_funding,
|
|
false, /* !remote_funding_locked */
|
|
NULL, /* no scid yet */
|
|
cid,
|
|
/* The three arguments below are msatoshi_to_us,
|
|
* msatoshi_to_us_min, and msatoshi_to_us_max.
|
|
* Because, this is a newly-funded channel,
|
|
* all three are same value. */
|
|
our_msat,
|
|
our_msat, /* msat_to_us_min */
|
|
our_msat, /* msat_to_us_max */
|
|
remote_commit,
|
|
remote_commit_sig,
|
|
NULL, /* No HTLC sigs yet */
|
|
channel_info,
|
|
take(new_fee_states(NULL, opener, &feerate)),
|
|
NULL, /* No shutdown_scriptpubkey[REMOTE] yet */
|
|
our_upfront_shutdown_script,
|
|
final_key_idx, false,
|
|
NULL, /* No commit sent yet */
|
|
/* If we're fundee, could be a little before this
|
|
* in theory, but it's only used for timing out. */
|
|
get_block_height(ld->topology),
|
|
feerate, feerate,
|
|
/* We are connected */
|
|
true,
|
|
&uc->local_basepoints,
|
|
&uc->local_funding_pubkey,
|
|
NULL,
|
|
ld->config.fee_base,
|
|
ld->config.fee_per_satoshi,
|
|
remote_upfront_shutdown_script,
|
|
option_static_remotekey,
|
|
option_anchor_outputs);
|
|
|
|
/* Now we finally put it in the database. */
|
|
wallet_channel_insert(ld->wallet, channel);
|
|
|
|
return channel;
|
|
}
|
|
|
|
static void accepter_commit_received(struct subd *dualopend,
|
|
struct uncommitted_channel *uc,
|
|
const int *fds,
|
|
const u8 *msg)
|
|
{
|
|
struct openchannel2_psbt_payload *payload;
|
|
|
|
struct lightningd *ld = dualopend->ld;
|
|
struct channel_info channel_info;
|
|
struct bitcoin_tx *remote_commit;
|
|
struct bitcoin_signature remote_commit_sig;
|
|
struct channel_id cid;
|
|
struct bitcoin_txid funding_txid;
|
|
struct per_peer_state *pps;
|
|
u16 funding_outnum;
|
|
u32 feerate;
|
|
struct amount_sat total_funding, funding_ours, channel_reserve;
|
|
u8 channel_flags, *remote_upfront_shutdown_script,
|
|
*local_upfront_shutdown_script, *commitment_msg;
|
|
struct penalty_base *pbase;
|
|
struct wally_psbt *psbt;
|
|
|
|
payload = tal(uc, struct openchannel2_psbt_payload);
|
|
payload->rcvd = tal(payload, struct commit_rcvd);
|
|
|
|
/* This is a new channel_info.their_config so set its ID to 0 */
|
|
channel_info.their_config.id = 0;
|
|
|
|
if (!fromwire_dual_open_commit_rcvd(tmpctx, msg,
|
|
&channel_info.their_config,
|
|
&remote_commit,
|
|
&pbase,
|
|
&remote_commit_sig,
|
|
&psbt,
|
|
&cid,
|
|
&pps,
|
|
&channel_info.theirbase.revocation,
|
|
&channel_info.theirbase.payment,
|
|
&channel_info.theirbase.htlc,
|
|
&channel_info.theirbase.delayed_payment,
|
|
&channel_info.remote_per_commit,
|
|
&channel_info.remote_fundingkey,
|
|
&funding_txid,
|
|
&funding_outnum,
|
|
&total_funding,
|
|
&funding_ours,
|
|
&channel_flags,
|
|
&feerate,
|
|
&commitment_msg,
|
|
&channel_reserve,
|
|
&local_upfront_shutdown_script,
|
|
&remote_upfront_shutdown_script)) {
|
|
log_broken(uc->log, "bad WIRE_DUAL_OPEN_COMMIT_RCVD %s",
|
|
tal_hex(msg, msg));
|
|
uncommitted_channel_disconnect(uc, LOG_BROKEN, "bad WIRE_DUAL_OPEN_COMMIT_RCVD");
|
|
close(fds[0]);
|
|
close(fds[1]);
|
|
close(fds[3]);
|
|
goto failed;
|
|
}
|
|
|
|
per_peer_state_set_fds_arr(pps, fds);
|
|
payload->psbt = tal_steal(payload, psbt);
|
|
payload->rcvd->pps = tal_steal(payload, pps);
|
|
payload->rcvd->commitment_msg = tal_steal(payload, commitment_msg);
|
|
payload->ld = ld;
|
|
|
|
if (peer_active_channel(uc->peer)) {
|
|
uncommitted_channel_disconnect(uc, LOG_BROKEN, "already have active channel");
|
|
goto failed;
|
|
}
|
|
|
|
/* old_remote_per_commit not valid yet, copy valid one. */
|
|
channel_info.old_remote_per_commit = channel_info.remote_per_commit;
|
|
|
|
payload->rcvd->channel =
|
|
wallet_commit_channel(ld, uc,
|
|
&cid,
|
|
remote_commit,
|
|
&remote_commit_sig,
|
|
&funding_txid,
|
|
funding_outnum,
|
|
total_funding,
|
|
funding_ours,
|
|
channel_flags,
|
|
&channel_info,
|
|
feerate,
|
|
REMOTE,
|
|
local_upfront_shutdown_script,
|
|
remote_upfront_shutdown_script);
|
|
|
|
if (!payload->rcvd->channel) {
|
|
uncommitted_channel_disconnect(uc, LOG_BROKEN, "commit channel failed");
|
|
goto failed;
|
|
}
|
|
|
|
if (pbase)
|
|
wallet_penalty_base_add(ld->wallet, payload->rcvd->channel->dbid,
|
|
pbase);
|
|
|
|
/* dualopend is going away! */
|
|
/* We steal onto `NULL` because `payload` is tal'd off of `uc`;
|
|
* we free `uc` at the end though */
|
|
payload->rcvd->uc = tal_steal(NULL, uc);
|
|
|
|
/* We call out to our hook friend who will provide signatures for us! */
|
|
plugin_hook_call_openchannel2_sign(ld, payload);
|
|
|
|
/* We release the things here; dualopend is going away ?? */
|
|
subd_release_channel(dualopend, uc);
|
|
uc->open_daemon = NULL;
|
|
return;
|
|
|
|
failed:
|
|
subd_release_channel(dualopend, uc);
|
|
uc->open_daemon = NULL;
|
|
tal_free(uc);
|
|
}
|
|
|
|
static void accepter_psbt_changed(struct subd *dualopend,
|
|
const u8 *msg)
|
|
{
|
|
struct openchannel2_psbt_payload *payload =
|
|
tal(dualopend, struct openchannel2_psbt_payload);
|
|
payload->dualopend = dualopend;
|
|
payload->psbt = NULL;
|
|
payload->rcvd = tal(payload, struct commit_rcvd);
|
|
|
|
if (!fromwire_dual_open_psbt_changed(payload, msg,
|
|
&payload->rcvd->cid,
|
|
&payload->psbt)) {
|
|
log_broken(dualopend->log, "Malformed dual_open_psbt_changed %s",
|
|
tal_hex(tmpctx, msg));
|
|
tal_free(dualopend);
|
|
return;
|
|
}
|
|
|
|
tal_add_destructor2(dualopend, openchannel2_psbt_remove_dualopend, payload);
|
|
plugin_hook_call_openchannel2_changed(dualopend->ld, payload);
|
|
}
|
|
|
|
static void accepter_got_offer(struct subd *dualopend,
|
|
struct uncommitted_channel *uc,
|
|
const u8 *msg)
|
|
{
|
|
struct openchannel2_payload *payload;
|
|
|
|
if (peer_active_channel(uc->peer)) {
|
|
subd_send_msg(dualopend,
|
|
take(towire_dual_open_fail(NULL, "Already have active channel")));
|
|
return;
|
|
}
|
|
|
|
payload = tal(dualopend, struct openchannel2_payload);
|
|
payload->dualopend = dualopend;
|
|
payload->psbt = NULL;
|
|
payload->accepter_funding = AMOUNT_SAT(0);
|
|
payload->our_shutdown_scriptpubkey = NULL;
|
|
payload->peer_id = uc->peer->id;
|
|
|
|
if (!fromwire_dual_open_got_offer(payload, msg,
|
|
&payload->their_funding,
|
|
&payload->dust_limit_satoshis,
|
|
&payload->max_htlc_value_in_flight_msat,
|
|
&payload->htlc_minimum_msat,
|
|
&payload->feerate_per_kw_funding,
|
|
&payload->feerate_per_kw,
|
|
&payload->to_self_delay,
|
|
&payload->max_accepted_htlcs,
|
|
&payload->channel_flags,
|
|
&payload->locktime,
|
|
&payload->shutdown_scriptpubkey)) {
|
|
log_broken(uc->log, "Malformed dual_open_got_offer %s",
|
|
tal_hex(tmpctx, msg));
|
|
tal_free(dualopend);
|
|
return;
|
|
}
|
|
|
|
tal_add_destructor2(dualopend, openchannel2_remove_dualopend, payload);
|
|
plugin_hook_call_openchannel2(dualopend->ld, payload);
|
|
}
|
|
|
|
static unsigned int dual_opend_msg(struct subd *dualopend,
|
|
const u8 *msg, const int *fds)
|
|
{
|
|
enum dualopend_wire t = fromwire_peektype(msg);
|
|
struct uncommitted_channel *uc = dualopend->channel;
|
|
|
|
switch (t) {
|
|
case WIRE_DUAL_OPEN_GOT_OFFER:
|
|
accepter_got_offer(dualopend, uc, msg);
|
|
return 0;
|
|
case WIRE_DUAL_OPEN_PSBT_CHANGED:
|
|
accepter_psbt_changed(dualopend, msg);
|
|
return 0;
|
|
case WIRE_DUAL_OPEN_COMMIT_RCVD:
|
|
if (tal_count(fds) != 3)
|
|
return 3;
|
|
accepter_commit_received(dualopend, uc, fds, msg);
|
|
return 0;
|
|
case WIRE_DUAL_OPEN_FAILED:
|
|
case WIRE_DUAL_OPEN_DEV_MEMLEAK_REPLY:
|
|
|
|
/* Messages we send */
|
|
case WIRE_DUAL_OPEN_INIT:
|
|
case WIRE_DUAL_OPEN_GOT_OFFER_REPLY:
|
|
case WIRE_DUAL_OPEN_FAIL:
|
|
case WIRE_DUAL_OPEN_DEV_MEMLEAK:
|
|
break;
|
|
}
|
|
|
|
switch ((enum common_wire)t) {
|
|
#if DEVELOPER
|
|
case WIRE_CUSTOMMSG_IN:
|
|
handle_custommsg_in(dualopend->ld, dualopend->node_id, msg);
|
|
return 0;
|
|
#else
|
|
case WIRE_CUSTOMMSG_IN:
|
|
#endif
|
|
/* We send these. */
|
|
case WIRE_CUSTOMMSG_OUT:
|
|
break;
|
|
}
|
|
|
|
log_broken(dualopend->log, "Unexpected msg %s: %s",
|
|
dualopend_wire_name(t), tal_hex(tmpctx, msg));
|
|
tal_free(dualopend);
|
|
return 0;
|
|
}
|
|
|
|
void peer_start_dualopend(struct peer *peer,
|
|
struct per_peer_state *pps,
|
|
const u8 *send_msg)
|
|
{
|
|
|
|
int hsmfd;
|
|
u32 max_to_self_delay;
|
|
struct amount_msat min_effective_htlc_capacity;
|
|
struct uncommitted_channel *uc;
|
|
const u8 *msg;
|
|
|
|
assert(!peer->uncommitted_channel);
|
|
|
|
uc = peer->uncommitted_channel = new_uncommitted_channel(peer);
|
|
|
|
hsmfd = hsm_get_client_fd(peer->ld, &uc->peer->id, uc->dbid,
|
|
HSM_CAP_COMMITMENT_POINT
|
|
| HSM_CAP_SIGN_REMOTE_TX);
|
|
|
|
uc->open_daemon = new_channel_subd(peer->ld,
|
|
"lightning_dualopend",
|
|
uc, &peer->id, uc->log,
|
|
true, dualopend_wire_name,
|
|
dual_opend_msg,
|
|
opend_channel_errmsg,
|
|
opend_channel_set_billboard,
|
|
take(&pps->peer_fd),
|
|
take(&pps->gossip_fd),
|
|
take(&pps->gossip_store_fd),
|
|
take(&hsmfd), NULL);
|
|
if (!uc->open_daemon) {
|
|
uncommitted_channel_disconnect(uc, LOG_BROKEN,
|
|
tal_fmt(tmpctx,
|
|
"Running lightning_dualopend: %s",
|
|
strerror(errno)));
|
|
tal_free(uc);
|
|
return;
|
|
}
|
|
|
|
channel_config(peer->ld, &uc->our_config,
|
|
&max_to_self_delay,
|
|
&min_effective_htlc_capacity);
|
|
|
|
/* BOLT #2:
|
|
*
|
|
* The sender:
|
|
* - SHOULD set `minimum_depth` to a number of blocks it considers
|
|
* reasonable to avoid double-spending of the funding transaction.
|
|
*/
|
|
uc->minimum_depth = peer->ld->config.anchor_confirms;
|
|
|
|
msg = towire_dual_open_init(NULL,
|
|
chainparams,
|
|
peer->ld->our_features,
|
|
peer->their_features,
|
|
&uc->our_config,
|
|
max_to_self_delay,
|
|
min_effective_htlc_capacity,
|
|
pps, &uc->local_basepoints,
|
|
&uc->local_funding_pubkey,
|
|
uc->minimum_depth,
|
|
feerate_min(peer->ld, NULL),
|
|
feerate_max(peer->ld, NULL),
|
|
feature_negotiated(peer->ld->our_features,
|
|
peer->their_features,
|
|
OPT_ANCHOR_OUTPUTS),
|
|
send_msg);
|
|
subd_send_msg(uc->open_daemon, take(msg));
|
|
}
|
|
|