• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

lightningnetwork / lnd / 14446551845

14 Apr 2025 01:12PM UTC coverage: 57.404% (-1.2%) from 58.624%
14446551845

push

github

web-flow
Merge pull request #9703 from yyforyongyu/fix-attempt-hash

Patch htlc attempt hash for legacy payments

12 of 26 new or added lines in 1 file covered. (46.15%)

2039 existing lines in 44 files now uncovered.

95138 of 165734 relevant lines covered (57.4%)

0.61 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

76.47
/routing/payment_lifecycle.go
1
package routing
2

3
import (
4
        "context"
5
        "errors"
6
        "fmt"
7
        "time"
8

9
        "github.com/btcsuite/btcd/btcec/v2"
10
        "github.com/davecgh/go-spew/spew"
11
        sphinx "github.com/lightningnetwork/lightning-onion"
12
        "github.com/lightningnetwork/lnd/channeldb"
13
        "github.com/lightningnetwork/lnd/fn/v2"
14
        "github.com/lightningnetwork/lnd/graph/db/models"
15
        "github.com/lightningnetwork/lnd/htlcswitch"
16
        "github.com/lightningnetwork/lnd/lntypes"
17
        "github.com/lightningnetwork/lnd/lnutils"
18
        "github.com/lightningnetwork/lnd/lnwire"
19
        "github.com/lightningnetwork/lnd/routing/route"
20
        "github.com/lightningnetwork/lnd/routing/shards"
21
        "github.com/lightningnetwork/lnd/tlv"
22
)
23

24
// ErrPaymentLifecycleExiting is used when waiting for htlc attempt result, but
25
// the payment lifecycle is exiting .
26
var ErrPaymentLifecycleExiting = errors.New("payment lifecycle exiting")
27

28
// switchResult is the result sent back from the switch after processing the
29
// HTLC.
30
type switchResult struct {
31
        // attempt is the HTLC sent to the switch.
32
        attempt *channeldb.HTLCAttempt
33

34
        // result is sent from the switch which contains either a preimage if
35
        // ths HTLC is settled or an error if it's failed.
36
        result *htlcswitch.PaymentResult
37
}
38

39
// paymentLifecycle holds all information about the current state of a payment
40
// needed to resume if from any point.
41
type paymentLifecycle struct {
42
        router                *ChannelRouter
43
        feeLimit              lnwire.MilliSatoshi
44
        identifier            lntypes.Hash
45
        paySession            PaymentSession
46
        shardTracker          shards.ShardTracker
47
        currentHeight         int32
48
        firstHopCustomRecords lnwire.CustomRecords
49

50
        // quit is closed to signal the sub goroutines of the payment lifecycle
51
        // to stop.
52
        quit chan struct{}
53

54
        // resultCollected is used to send the result returned from the switch
55
        // for a given HTLC attempt.
56
        resultCollected chan *switchResult
57

58
        // resultCollector is a function that is used to collect the result of
59
        // an HTLC attempt, which is always mounted to `p.collectResultAsync`
60
        // except in unit test, where we use a much simpler resultCollector to
61
        // decouple the test flow for the payment lifecycle.
62
        resultCollector func(attempt *channeldb.HTLCAttempt)
63
}
64

65
// newPaymentLifecycle initiates a new payment lifecycle and returns it.
66
func newPaymentLifecycle(r *ChannelRouter, feeLimit lnwire.MilliSatoshi,
67
        identifier lntypes.Hash, paySession PaymentSession,
68
        shardTracker shards.ShardTracker, currentHeight int32,
69
        firstHopCustomRecords lnwire.CustomRecords) *paymentLifecycle {
1✔
70

1✔
71
        p := &paymentLifecycle{
1✔
72
                router:                r,
1✔
73
                feeLimit:              feeLimit,
1✔
74
                identifier:            identifier,
1✔
75
                paySession:            paySession,
1✔
76
                shardTracker:          shardTracker,
1✔
77
                currentHeight:         currentHeight,
1✔
78
                quit:                  make(chan struct{}),
1✔
79
                resultCollected:       make(chan *switchResult, 1),
1✔
80
                firstHopCustomRecords: firstHopCustomRecords,
1✔
81
        }
1✔
82

1✔
83
        // Mount the result collector.
1✔
84
        p.resultCollector = p.collectResultAsync
1✔
85

1✔
86
        return p
1✔
87
}
1✔
88

89
// calcFeeBudget returns the available fee to be used for sending HTLC
90
// attempts.
91
func (p *paymentLifecycle) calcFeeBudget(
92
        feesPaid lnwire.MilliSatoshi) lnwire.MilliSatoshi {
1✔
93

1✔
94
        budget := p.feeLimit
1✔
95

1✔
96
        // We'll subtract the used fee from our fee budget. In case of
1✔
97
        // overflow, we need to check whether feesPaid exceeds our budget
1✔
98
        // already.
1✔
99
        if feesPaid <= budget {
2✔
100
                budget -= feesPaid
1✔
101
        } else {
2✔
102
                budget = 0
1✔
103
        }
1✔
104

105
        return budget
1✔
106
}
107

108
// stateStep defines an action to be taken in our payment lifecycle. We either
109
// quit, continue, or exit the lifecycle, see details below.
110
type stateStep uint8
111

112
const (
113
        // stepSkip is used when we need to skip the current lifecycle and jump
114
        // to the next one.
115
        stepSkip stateStep = iota
116

117
        // stepProceed is used when we can proceed the current lifecycle.
118
        stepProceed
119

120
        // stepExit is used when we need to quit the current lifecycle.
121
        stepExit
122
)
123

124
// decideNextStep is used to determine the next step in the payment lifecycle.
125
// It first checks whether the current state of the payment allows more HTLC
126
// attempts to be made. If allowed, it will return so the lifecycle can continue
127
// making new attempts. Otherwise, it checks whether we need to wait for the
128
// results of already sent attempts. If needed, it will block until one of the
129
// results is sent back. then process its result here. When there's no need to
130
// wait for results, the method will exit with `stepExit` such that the payment
131
// lifecycle loop will terminate.
132
func (p *paymentLifecycle) decideNextStep(
133
        payment DBMPPayment) (stateStep, error) {
1✔
134

1✔
135
        // Check whether we could make new HTLC attempts.
1✔
136
        allow, err := payment.AllowMoreAttempts()
1✔
137
        if err != nil {
1✔
138
                return stepExit, err
×
139
        }
×
140

141
        // Exit early we need to make more attempts.
142
        if allow {
2✔
143
                return stepProceed, nil
1✔
144
        }
1✔
145

146
        // We cannot make more attempts, we now check whether we need to wait
147
        // for results.
148
        wait, err := payment.NeedWaitAttempts()
1✔
149
        if err != nil {
1✔
150
                return stepExit, err
×
151
        }
×
152

153
        // If we are not allowed to make new HTLC attempts and there's no need
154
        // to wait, the lifecycle is done and we can exit.
155
        if !wait {
2✔
156
                return stepExit, nil
1✔
157
        }
1✔
158

159
        log.Tracef("Waiting for attempt results for payment %v", p.identifier)
1✔
160

1✔
161
        // Otherwise we wait for the result for one HTLC attempt then continue
1✔
162
        // the lifecycle.
1✔
163
        select {
1✔
164
        case r := <-p.resultCollected:
1✔
165
                log.Tracef("Received attempt result for payment %v",
1✔
166
                        p.identifier)
1✔
167

1✔
168
                // Handle the result here. If there's no error, we will return
1✔
169
                // stepSkip and move to the next lifecycle iteration, which will
1✔
170
                // refresh the payment and wait for the next attempt result, if
1✔
171
                // any.
1✔
172
                _, err := p.handleAttemptResult(r.attempt, r.result)
1✔
173

1✔
174
                // We would only get a DB-related error here, which will cause
1✔
175
                // us to abort the payment flow.
1✔
176
                if err != nil {
1✔
177
                        return stepExit, err
×
178
                }
×
179

180
        case <-p.quit:
×
181
                return stepExit, ErrPaymentLifecycleExiting
×
182

183
        case <-p.router.quit:
1✔
184
                return stepExit, ErrRouterShuttingDown
1✔
185
        }
186

187
        return stepSkip, nil
1✔
188
}
189

190
// resumePayment resumes the paymentLifecycle from the current state.
191
func (p *paymentLifecycle) resumePayment(ctx context.Context) ([32]byte,
192
        *route.Route, error) {
1✔
193

1✔
194
        // When the payment lifecycle loop exits, we make sure to signal any
1✔
195
        // sub goroutine of the HTLC attempt to exit, then wait for them to
1✔
196
        // return.
1✔
197
        defer p.stop()
1✔
198

1✔
199
        // If we had any existing attempts outstanding, we'll start by spinning
1✔
200
        // up goroutines that'll collect their results and deliver them to the
1✔
201
        // lifecycle loop below.
1✔
202
        payment, err := p.reloadInflightAttempts()
1✔
203
        if err != nil {
1✔
204
                return [32]byte{}, nil, err
×
205
        }
×
206

207
        // Get the payment status.
208
        status := payment.GetStatus()
1✔
209

1✔
210
        // exitWithErr is a helper closure that logs and returns an error.
1✔
211
        exitWithErr := func(err error) ([32]byte, *route.Route, error) {
2✔
212
                // Log an error with the latest payment status.
1✔
213
                //
1✔
214
                // NOTE: this `status` variable is reassigned in the loop
1✔
215
                // below. We could also call `payment.GetStatus` here, but in a
1✔
216
                // rare case when the critical log is triggered when using
1✔
217
                // postgres as db backend, the `payment` could be nil, causing
1✔
218
                // the payment fetching to return an error.
1✔
219
                log.Errorf("Payment %v with status=%v failed: %v", p.identifier,
1✔
220
                        status, err)
1✔
221

1✔
222
                return [32]byte{}, nil, err
1✔
223
        }
1✔
224

225
        // We'll continue until either our payment succeeds, or we encounter a
226
        // critical error during path finding.
227
lifecycle:
1✔
228
        for {
2✔
229
                // We update the payment state on every iteration.
1✔
230
                currentPayment, ps, err := p.reloadPayment()
1✔
231
                if err != nil {
1✔
232
                        return exitWithErr(err)
×
233
                }
×
234

235
                // Reassign status so it can be read in `exitWithErr`.
236
                status = currentPayment.GetStatus()
1✔
237

1✔
238
                // Reassign payment such that when the lifecycle exits, the
1✔
239
                // latest payment can be read when we access its terminal info.
1✔
240
                payment = currentPayment
1✔
241

1✔
242
                // We now proceed our lifecycle with the following tasks in
1✔
243
                // order,
1✔
244
                //   1. check context.
1✔
245
                //   2. request route.
1✔
246
                //   3. create HTLC attempt.
1✔
247
                //   4. send HTLC attempt.
1✔
248
                //   5. collect HTLC attempt result.
1✔
249
                //
1✔
250
                // Before we attempt any new shard, we'll check to see if we've
1✔
251
                // gone past the payment attempt timeout, or if the context was
1✔
252
                // cancelled, or the router is exiting. In any of these cases,
1✔
253
                // we'll stop this payment attempt short.
1✔
254
                if err := p.checkContext(ctx); err != nil {
1✔
255
                        return exitWithErr(err)
×
256
                }
×
257

258
                // Now decide the next step of the current lifecycle.
259
                step, err := p.decideNextStep(payment)
1✔
260
                if err != nil {
2✔
261
                        return exitWithErr(err)
1✔
262
                }
1✔
263

264
                switch step {
1✔
265
                // Exit the for loop and return below.
266
                case stepExit:
1✔
267
                        break lifecycle
1✔
268

269
                // Continue the for loop and skip the rest.
270
                case stepSkip:
1✔
271
                        continue lifecycle
1✔
272

273
                // Continue the for loop and proceed the rest.
274
                case stepProceed:
1✔
275

276
                // Unknown step received, exit with an error.
277
                default:
×
278
                        err = fmt.Errorf("unknown step: %v", step)
×
279
                        return exitWithErr(err)
×
280
                }
281

282
                // Now request a route to be used to create our HTLC attempt.
283
                rt, err := p.requestRoute(ps)
1✔
284
                if err != nil {
1✔
285
                        return exitWithErr(err)
×
286
                }
×
287

288
                // We may not be able to find a route for current attempt. In
289
                // that case, we continue the loop and move straight to the
290
                // next iteration in case there are results for inflight HTLCs
291
                // that still need to be collected.
292
                if rt == nil {
2✔
293
                        log.Errorf("No route found for payment %v",
1✔
294
                                p.identifier)
1✔
295

1✔
296
                        continue lifecycle
1✔
297
                }
298

299
                log.Tracef("Found route: %s", spew.Sdump(rt.Hops))
1✔
300

1✔
301
                // We found a route to try, create a new HTLC attempt to try.
1✔
302
                attempt, err := p.registerAttempt(rt, ps.RemainingAmt)
1✔
303
                if err != nil {
1✔
304
                        return exitWithErr(err)
×
305
                }
×
306

307
                // Once the attempt is created, send it to the htlcswitch.
308
                result, err := p.sendAttempt(attempt)
1✔
309
                if err != nil {
1✔
310
                        return exitWithErr(err)
×
311
                }
×
312

313
                // Now that the shard was successfully sent, launch a go
314
                // routine that will handle its result when its back.
315
                if result.err == nil {
2✔
316
                        p.resultCollector(attempt)
1✔
317
                }
1✔
318
        }
319

320
        // Once we are out the lifecycle loop, it means we've reached a
321
        // terminal condition. We either return the settled preimage or the
322
        // payment's failure reason.
323
        //
324
        // Optionally delete the failed attempts from the database.
325
        err = p.router.cfg.Control.DeleteFailedAttempts(p.identifier)
1✔
326
        if err != nil {
1✔
327
                log.Errorf("Error deleting failed htlc attempts for payment "+
×
328
                        "%v: %v", p.identifier, err)
×
329
        }
×
330

331
        htlc, failure := payment.TerminalInfo()
1✔
332
        if htlc != nil {
2✔
333
                return htlc.Settle.Preimage, &htlc.Route, nil
1✔
334
        }
1✔
335

336
        // Otherwise return the payment failure reason.
337
        return [32]byte{}, nil, *failure
1✔
338
}
339

340
// checkContext checks whether the payment context has been canceled.
341
// Cancellation occurs manually or if the context times out.
342
func (p *paymentLifecycle) checkContext(ctx context.Context) error {
1✔
343
        select {
1✔
344
        case <-ctx.Done():
1✔
345
                // If the context was canceled, we'll mark the payment as
1✔
346
                // failed. There are two cases to distinguish here: Either a
1✔
347
                // user-provided timeout was reached, or the context was
1✔
348
                // canceled, either to a manual cancellation or due to an
1✔
349
                // unknown error.
1✔
350
                var reason channeldb.FailureReason
1✔
351
                if errors.Is(ctx.Err(), context.DeadlineExceeded) {
1✔
352
                        reason = channeldb.FailureReasonTimeout
×
353
                        log.Warnf("Payment attempt not completed before "+
×
354
                                "context timeout, id=%s", p.identifier.String())
×
355
                } else {
1✔
356
                        reason = channeldb.FailureReasonCanceled
1✔
357
                        log.Warnf("Payment attempt context canceled, id=%s",
1✔
358
                                p.identifier.String())
1✔
359
                }
1✔
360

361
                // By marking the payment failed, depending on whether it has
362
                // inflight HTLCs or not, its status will now either be
363
                // `StatusInflight` or `StatusFailed`. In either case, no more
364
                // HTLCs will be attempted.
365
                err := p.router.cfg.Control.FailPayment(p.identifier, reason)
1✔
366
                if err != nil {
1✔
367
                        return fmt.Errorf("FailPayment got %w", err)
×
368
                }
×
369

370
        case <-p.router.quit:
×
371
                return fmt.Errorf("check payment timeout got: %w",
×
372
                        ErrRouterShuttingDown)
×
373

374
        // Fall through if we haven't hit our time limit.
375
        default:
1✔
376
        }
377

378
        return nil
1✔
379
}
380

381
// requestRoute is responsible for finding a route to be used to create an HTLC
382
// attempt.
383
func (p *paymentLifecycle) requestRoute(
384
        ps *channeldb.MPPaymentState) (*route.Route, error) {
1✔
385

1✔
386
        remainingFees := p.calcFeeBudget(ps.FeesPaid)
1✔
387

1✔
388
        // Query our payment session to construct a route.
1✔
389
        rt, err := p.paySession.RequestRoute(
1✔
390
                ps.RemainingAmt, remainingFees,
1✔
391
                uint32(ps.NumAttemptsInFlight), uint32(p.currentHeight),
1✔
392
                p.firstHopCustomRecords,
1✔
393
        )
1✔
394

1✔
395
        // Exit early if there's no error.
1✔
396
        if err == nil {
2✔
397
                // Allow the traffic shaper to add custom records to the
1✔
398
                // outgoing HTLC and also adjust the amount if needed.
1✔
399
                err = p.amendFirstHopData(rt)
1✔
400
                if err != nil {
1✔
401
                        return nil, err
×
402
                }
×
403

404
                return rt, nil
1✔
405
        }
406

407
        // Otherwise we need to handle the error.
408
        log.Warnf("Failed to find route for payment %v: %v", p.identifier, err)
1✔
409

1✔
410
        // If the error belongs to `noRouteError` set, it means a non-critical
1✔
411
        // error has happened during path finding, and we will mark the payment
1✔
412
        // failed with this reason. Otherwise, we'll return the critical error
1✔
413
        // found to abort the lifecycle.
1✔
414
        var routeErr noRouteError
1✔
415
        if !errors.As(err, &routeErr) {
1✔
416
                return nil, fmt.Errorf("requestRoute got: %w", err)
×
417
        }
×
418

419
        // It's the `paymentSession`'s responsibility to find a route for us
420
        // with the best effort. When it cannot find a path, we need to treat it
421
        // as a terminal condition and fail the payment no matter it has
422
        // inflight HTLCs or not.
423
        failureCode := routeErr.FailureReason()
1✔
424
        log.Warnf("Marking payment %v permanently failed with no route: %v",
1✔
425
                p.identifier, failureCode)
1✔
426

1✔
427
        err = p.router.cfg.Control.FailPayment(p.identifier, failureCode)
1✔
428
        if err != nil {
1✔
429
                return nil, fmt.Errorf("FailPayment got: %w", err)
×
430
        }
×
431

432
        // NOTE: we decide to not return the non-critical noRouteError here to
433
        // avoid terminating the payment lifecycle as there might be other
434
        // inflight HTLCs which we must wait for their results.
435
        return nil, nil
1✔
436
}
437

438
// stop signals any active shard goroutine to exit.
439
func (p *paymentLifecycle) stop() {
1✔
440
        close(p.quit)
1✔
441
}
1✔
442

443
// attemptResult holds the HTLC attempt and a possible error returned from
444
// sending it.
445
type attemptResult struct {
446
        // err is non-nil if a non-critical error was encountered when trying
447
        // to send the attempt, and we successfully updated the control tower
448
        // to reflect this error. This can be errors like not enough local
449
        // balance for the given route etc.
450
        err error
451

452
        // attempt is the attempt structure as recorded in the database.
453
        attempt *channeldb.HTLCAttempt
454
}
455

456
// collectResultAsync launches a goroutine that will wait for the result of the
457
// given HTLC attempt to be available then save its result in a map. Once
458
// received, it will send the result returned from the switch to channel
459
// `resultCollected`.
460
func (p *paymentLifecycle) collectResultAsync(attempt *channeldb.HTLCAttempt) {
1✔
461
        log.Debugf("Collecting result for attempt %v in payment %v",
1✔
462
                attempt.AttemptID, p.identifier)
1✔
463

1✔
464
        go func() {
2✔
465
                result, err := p.collectResult(attempt)
1✔
466
                if err != nil {
2✔
467
                        log.Errorf("Error collecting result for attempt %v in "+
1✔
468
                                "payment %v: %v", attempt.AttemptID,
1✔
469
                                p.identifier, err)
1✔
470

1✔
471
                        return
1✔
472
                }
1✔
473

474
                log.Debugf("Result collected for attempt %v in payment %v",
1✔
475
                        attempt.AttemptID, p.identifier)
1✔
476

1✔
477
                // Create a switch result and send it to the resultCollected
1✔
478
                // chan, which gets processed when the lifecycle is waiting for
1✔
479
                // a result to be received in decideNextStep.
1✔
480
                r := &switchResult{
1✔
481
                        attempt: attempt,
1✔
482
                        result:  result,
1✔
483
                }
1✔
484

1✔
485
                // Signal that a result has been collected.
1✔
486
                select {
1✔
487
                // Send the result so decideNextStep can proceed.
488
                case p.resultCollected <- r:
1✔
489

490
                case <-p.quit:
×
491
                        log.Debugf("Lifecycle exiting while collecting "+
×
492
                                "result for payment %v", p.identifier)
×
493

494
                case <-p.router.quit:
×
495
                }
496
        }()
497
}
498

499
// collectResult waits for the result of the given HTLC attempt to be sent by
500
// the switch and returns it.
501
func (p *paymentLifecycle) collectResult(
502
        attempt *channeldb.HTLCAttempt) (*htlcswitch.PaymentResult, error) {
1✔
503

1✔
504
        log.Tracef("Collecting result for attempt %v",
1✔
505
                lnutils.SpewLogClosure(attempt))
1✔
506

1✔
507
        result := &htlcswitch.PaymentResult{}
1✔
508

1✔
509
        // Regenerate the circuit for this attempt.
1✔
510
        circuit, err := attempt.Circuit()
1✔
511

1✔
512
        // TODO(yy): We generate this circuit to create the error decryptor,
1✔
513
        // which is then used in htlcswitch as the deobfuscator to decode the
1✔
514
        // error from `UpdateFailHTLC`. However, suppose it's an
1✔
515
        // `UpdateFulfillHTLC` message yet for some reason the sphinx packet is
1✔
516
        // failed to be generated, we'd miss settling it. This means we should
1✔
517
        // give it a second chance to try the settlement path in case
1✔
518
        // `GetAttemptResult` gives us back the preimage. And move the circuit
1✔
519
        // creation into htlcswitch so it's only constructed when there's a
1✔
520
        // failure message we need to decode.
1✔
521
        if err != nil {
1✔
522
                log.Debugf("Unable to generate circuit for attempt %v: %v",
×
523
                        attempt.AttemptID, err)
×
524
                return nil, err
×
525
        }
×
526

527
        // Using the created circuit, initialize the error decrypter, so we can
528
        // parse+decode any failures incurred by this payment within the
529
        // switch.
530
        errorDecryptor := &htlcswitch.SphinxErrorDecrypter{
1✔
531
                OnionErrorDecrypter: sphinx.NewOnionErrorDecrypter(circuit),
1✔
532
        }
1✔
533

1✔
534
        // Now ask the switch to return the result of the payment when
1✔
535
        // available.
1✔
536
        //
1✔
537
        // TODO(yy): consider using htlcswitch to create the `errorDecryptor`
1✔
538
        // since the htlc is already in db. This will also make the interface
1✔
539
        // `PaymentAttemptDispatcher` deeper and easier to use. Moreover, we'd
1✔
540
        // only create the decryptor when received a failure, further saving us
1✔
541
        // a few CPU cycles.
1✔
542
        resultChan, err := p.router.cfg.Payer.GetAttemptResult(
1✔
543
                attempt.AttemptID, p.identifier, errorDecryptor,
1✔
544
        )
1✔
545
        // Handle the switch error.
1✔
546
        if err != nil {
1✔
547
                log.Errorf("Failed getting result for attemptID %d "+
×
548
                        "from switch: %v", attempt.AttemptID, err)
×
549

×
550
                result.Error = err
×
551

×
552
                return result, nil
×
553
        }
×
554

555
        // The switch knows about this payment, we'll wait for a result to be
556
        // available.
557
        select {
1✔
558
        case r, ok := <-resultChan:
1✔
559
                if !ok {
2✔
560
                        return nil, htlcswitch.ErrSwitchExiting
1✔
561
                }
1✔
562

563
                result = r
1✔
564

565
        case <-p.quit:
×
566
                return nil, ErrPaymentLifecycleExiting
×
567

568
        case <-p.router.quit:
×
569
                return nil, ErrRouterShuttingDown
×
570
        }
571

572
        return result, nil
1✔
573
}
574

575
// registerAttempt is responsible for creating and saving an HTLC attempt in db
576
// by using the route info provided. The `remainingAmt` is used to decide
577
// whether this is the last attempt.
578
func (p *paymentLifecycle) registerAttempt(rt *route.Route,
579
        remainingAmt lnwire.MilliSatoshi) (*channeldb.HTLCAttempt, error) {
1✔
580

1✔
581
        // If this route will consume the last remaining amount to send
1✔
582
        // to the receiver, this will be our last shard (for now).
1✔
583
        isLastAttempt := rt.ReceiverAmt() == remainingAmt
1✔
584

1✔
585
        // Using the route received from the payment session, create a new
1✔
586
        // shard to send.
1✔
587
        attempt, err := p.createNewPaymentAttempt(rt, isLastAttempt)
1✔
588
        if err != nil {
1✔
589
                return nil, err
×
590
        }
×
591

592
        // Before sending this HTLC to the switch, we checkpoint the fresh
593
        // paymentID and route to the DB. This lets us know on startup the ID
594
        // of the payment that we attempted to send, such that we can query the
595
        // Switch for its whereabouts. The route is needed to handle the result
596
        // when it eventually comes back.
597
        err = p.router.cfg.Control.RegisterAttempt(
1✔
598
                p.identifier, &attempt.HTLCAttemptInfo,
1✔
599
        )
1✔
600

1✔
601
        return attempt, err
1✔
602
}
603

604
// createNewPaymentAttempt creates a new payment attempt from the given route.
605
func (p *paymentLifecycle) createNewPaymentAttempt(rt *route.Route,
606
        lastShard bool) (*channeldb.HTLCAttempt, error) {
1✔
607

1✔
608
        // Generate a new key to be used for this attempt.
1✔
609
        sessionKey, err := generateNewSessionKey()
1✔
610
        if err != nil {
1✔
611
                return nil, err
×
612
        }
×
613

614
        // We generate a new, unique payment ID that we will use for
615
        // this HTLC.
616
        attemptID, err := p.router.cfg.NextPaymentID()
1✔
617
        if err != nil {
1✔
618
                return nil, err
×
619
        }
×
620

621
        // Request a new shard from the ShardTracker. If this is an AMP
622
        // payment, and this is the last shard, the outstanding shards together
623
        // with this one will be enough for the receiver to derive all HTLC
624
        // preimages. If this a non-AMP payment, the ShardTracker will return a
625
        // simple shard with the payment's static payment hash.
626
        shard, err := p.shardTracker.NewShard(attemptID, lastShard)
1✔
627
        if err != nil {
1✔
628
                return nil, err
×
629
        }
×
630

631
        // If this shard carries MPP or AMP options, add them to the last hop
632
        // on the route.
633
        hop := rt.Hops[len(rt.Hops)-1]
1✔
634
        if shard.MPP() != nil {
2✔
635
                hop.MPP = shard.MPP()
1✔
636
        }
1✔
637

638
        if shard.AMP() != nil {
2✔
639
                hop.AMP = shard.AMP()
1✔
640
        }
1✔
641

642
        hash := shard.Hash()
1✔
643

1✔
644
        // We now have all the information needed to populate the current
1✔
645
        // attempt information.
1✔
646
        return channeldb.NewHtlcAttempt(
1✔
647
                attemptID, sessionKey, *rt, p.router.cfg.Clock.Now(), &hash,
1✔
648
        )
1✔
649
}
650

651
// sendAttempt attempts to send the current attempt to the switch to complete
652
// the payment. If this attempt fails, then we'll continue on to the next
653
// available route.
654
func (p *paymentLifecycle) sendAttempt(
655
        attempt *channeldb.HTLCAttempt) (*attemptResult, error) {
1✔
656

1✔
657
        log.Debugf("Sending HTLC attempt(id=%v, total_amt=%v, first_hop_amt=%d"+
1✔
658
                ") for payment %v", attempt.AttemptID,
1✔
659
                attempt.Route.TotalAmount, attempt.Route.FirstHopAmount.Val,
1✔
660
                p.identifier)
1✔
661

1✔
662
        rt := attempt.Route
1✔
663

1✔
664
        // Construct the first hop.
1✔
665
        firstHop := lnwire.NewShortChanIDFromInt(rt.Hops[0].ChannelID)
1✔
666

1✔
667
        // Craft an HTLC packet to send to the htlcswitch. The metadata within
1✔
668
        // this packet will be used to route the payment through the network,
1✔
669
        // starting with the first-hop.
1✔
670
        htlcAdd := &lnwire.UpdateAddHTLC{
1✔
671
                Amount:        rt.FirstHopAmount.Val.Int(),
1✔
672
                Expiry:        rt.TotalTimeLock,
1✔
673
                PaymentHash:   *attempt.Hash,
1✔
674
                CustomRecords: rt.FirstHopWireCustomRecords,
1✔
675
        }
1✔
676

1✔
677
        // Generate the raw encoded sphinx packet to be included along
1✔
678
        // with the htlcAdd message that we send directly to the
1✔
679
        // switch.
1✔
680
        onionBlob, err := attempt.OnionBlob()
1✔
681
        if err != nil {
1✔
682
                log.Errorf("Failed to create onion blob: attempt=%d in "+
×
683
                        "payment=%v, err:%v", attempt.AttemptID,
×
684
                        p.identifier, err)
×
685

×
686
                return p.failAttempt(attempt.AttemptID, err)
×
687
        }
×
688

689
        htlcAdd.OnionBlob = onionBlob
1✔
690

1✔
691
        // Send it to the Switch. When this method returns we assume
1✔
692
        // the Switch successfully has persisted the payment attempt,
1✔
693
        // such that we can resume waiting for the result after a
1✔
694
        // restart.
1✔
695
        err = p.router.cfg.Payer.SendHTLC(firstHop, attempt.AttemptID, htlcAdd)
1✔
696
        if err != nil {
2✔
697
                log.Errorf("Failed sending attempt %d for payment %v to "+
1✔
698
                        "switch: %v", attempt.AttemptID, p.identifier, err)
1✔
699

1✔
700
                return p.handleSwitchErr(attempt, err)
1✔
701
        }
1✔
702

703
        log.Debugf("Attempt %v for payment %v successfully sent to switch, "+
1✔
704
                "route: %v", attempt.AttemptID, p.identifier, &attempt.Route)
1✔
705

1✔
706
        return &attemptResult{
1✔
707
                attempt: attempt,
1✔
708
        }, nil
1✔
709
}
710

711
// amendFirstHopData is a function that calls the traffic shaper to allow it to
712
// add custom records to the outgoing HTLC and also adjust the amount if
713
// needed.
714
func (p *paymentLifecycle) amendFirstHopData(rt *route.Route) error {
1✔
715
        // The first hop amount on the route is the full route amount if not
1✔
716
        // overwritten by the traffic shaper. So we set the initial value now
1✔
717
        // and potentially overwrite it later.
1✔
718
        rt.FirstHopAmount = tlv.NewRecordT[tlv.TlvType0](
1✔
719
                tlv.NewBigSizeT(rt.TotalAmount),
1✔
720
        )
1✔
721

1✔
722
        // By default, we set the first hop custom records to the initial
1✔
723
        // value requested by the RPC. The traffic shaper may overwrite this
1✔
724
        // value.
1✔
725
        rt.FirstHopWireCustomRecords = p.firstHopCustomRecords
1✔
726

1✔
727
        // extraDataRequest is a helper struct to pass the custom records and
1✔
728
        // amount back from the traffic shaper.
1✔
729
        type extraDataRequest struct {
1✔
730
                customRecords fn.Option[lnwire.CustomRecords]
1✔
731

1✔
732
                amount fn.Option[lnwire.MilliSatoshi]
1✔
733
        }
1✔
734

1✔
735
        // If a hook exists that may affect our outgoing message, we call it now
1✔
736
        // and apply its side effects to the UpdateAddHTLC message.
1✔
737
        result, err := fn.MapOptionZ(
1✔
738
                p.router.cfg.TrafficShaper,
1✔
739
                //nolint:ll
1✔
740
                func(ts htlcswitch.AuxTrafficShaper) fn.Result[extraDataRequest] {
1✔
741
                        newAmt, newRecords, err := ts.ProduceHtlcExtraData(
×
742
                                rt.TotalAmount, p.firstHopCustomRecords,
×
743
                        )
×
744
                        if err != nil {
×
745
                                return fn.Err[extraDataRequest](err)
×
746
                        }
×
747

748
                        // Make sure we only received valid records.
749
                        if err := newRecords.Validate(); err != nil {
×
750
                                return fn.Err[extraDataRequest](err)
×
751
                        }
×
752

753
                        log.Debugf("Aux traffic shaper returned custom "+
×
754
                                "records %v and amount %d msat for HTLC",
×
755
                                spew.Sdump(newRecords), newAmt)
×
756

×
757
                        return fn.Ok(extraDataRequest{
×
758
                                customRecords: fn.Some(newRecords),
×
759
                                amount:        fn.Some(newAmt),
×
760
                        })
×
761
                },
762
        ).Unpack()
763
        if err != nil {
1✔
764
                return fmt.Errorf("traffic shaper failed to produce extra "+
×
765
                        "data: %w", err)
×
766
        }
×
767

768
        // Apply the side effects to the UpdateAddHTLC message.
769
        result.customRecords.WhenSome(func(records lnwire.CustomRecords) {
1✔
770
                rt.FirstHopWireCustomRecords = records
×
771
        })
×
772
        result.amount.WhenSome(func(amount lnwire.MilliSatoshi) {
1✔
773
                rt.FirstHopAmount = tlv.NewRecordT[tlv.TlvType0](
×
774
                        tlv.NewBigSizeT(amount),
×
775
                )
×
776
        })
×
777

778
        return nil
1✔
779
}
780

781
// failAttemptAndPayment fails both the payment and its attempt via the
782
// router's control tower, which marks the payment as failed in db.
783
func (p *paymentLifecycle) failPaymentAndAttempt(
784
        attemptID uint64, reason *channeldb.FailureReason,
785
        sendErr error) (*attemptResult, error) {
1✔
786

1✔
787
        log.Errorf("Payment %v failed: final_outcome=%v, raw_err=%v",
1✔
788
                p.identifier, *reason, sendErr)
1✔
789

1✔
790
        // Fail the payment via control tower.
1✔
791
        //
1✔
792
        // NOTE: we must fail the payment first before failing the attempt.
1✔
793
        // Otherwise, once the attempt is marked as failed, another goroutine
1✔
794
        // might make another attempt while we are failing the payment.
1✔
795
        err := p.router.cfg.Control.FailPayment(p.identifier, *reason)
1✔
796
        if err != nil {
1✔
797
                log.Errorf("Unable to fail payment: %v", err)
×
798
                return nil, err
×
799
        }
×
800

801
        // Fail the attempt.
802
        return p.failAttempt(attemptID, sendErr)
1✔
803
}
804

805
// handleSwitchErr inspects the given error from the Switch and determines
806
// whether we should make another payment attempt, or if it should be
807
// considered a terminal error. Terminal errors will be recorded with the
808
// control tower. It analyzes the sendErr for the payment attempt received from
809
// the switch and updates mission control and/or channel policies. Depending on
810
// the error type, the error is either the final outcome of the payment or we
811
// need to continue with an alternative route. A final outcome is indicated by
812
// a non-nil reason value.
813
func (p *paymentLifecycle) handleSwitchErr(attempt *channeldb.HTLCAttempt,
814
        sendErr error) (*attemptResult, error) {
1✔
815

1✔
816
        internalErrorReason := channeldb.FailureReasonError
1✔
817
        attemptID := attempt.AttemptID
1✔
818

1✔
819
        // reportAndFail is a helper closure that reports the failure to the
1✔
820
        // mission control, which helps us to decide whether we want to retry
1✔
821
        // the payment or not. If a non nil reason is returned from mission
1✔
822
        // control, it will further fail the payment via control tower.
1✔
823
        reportAndFail := func(srcIdx *int,
1✔
824
                msg lnwire.FailureMessage) (*attemptResult, error) {
2✔
825

1✔
826
                // Report outcome to mission control.
1✔
827
                reason, err := p.router.cfg.MissionControl.ReportPaymentFail(
1✔
828
                        attemptID, &attempt.Route, srcIdx, msg,
1✔
829
                )
1✔
830
                if err != nil {
1✔
831
                        log.Errorf("Error reporting payment result to mc: %v",
×
832
                                err)
×
833

×
834
                        reason = &internalErrorReason
×
835
                }
×
836

837
                // Fail the attempt only if there's no reason.
838
                if reason == nil {
2✔
839
                        // Fail the attempt.
1✔
840
                        return p.failAttempt(attemptID, sendErr)
1✔
841
                }
1✔
842

843
                // Otherwise fail both the payment and the attempt.
844
                return p.failPaymentAndAttempt(attemptID, reason, sendErr)
1✔
845
        }
846

847
        // If this attempt ID is unknown to the Switch, it means it was never
848
        // checkpointed and forwarded by the switch before a restart. In this
849
        // case we can safely send a new payment attempt, and wait for its
850
        // result to be available.
851
        if errors.Is(sendErr, htlcswitch.ErrPaymentIDNotFound) {
1✔
852
                log.Warnf("Failing attempt=%v for payment=%v as it's not "+
×
853
                        "found in the Switch", attempt.AttemptID, p.identifier)
×
854

×
855
                return p.failAttempt(attemptID, sendErr)
×
856
        }
×
857

858
        if errors.Is(sendErr, htlcswitch.ErrUnreadableFailureMessage) {
1✔
859
                log.Warn("Unreadable failure when sending htlc: id=%v, hash=%v",
×
860
                        attempt.AttemptID, attempt.Hash)
×
861

×
862
                // Since this error message cannot be decrypted, we will send a
×
863
                // nil error message to our mission controller and fail the
×
864
                // payment.
×
865
                return reportAndFail(nil, nil)
×
866
        }
×
867

868
        // If the error is a ClearTextError, we have received a valid wire
869
        // failure message, either from our own outgoing link or from a node
870
        // down the route. If the error is not related to the propagation of
871
        // our payment, we can stop trying because an internal error has
872
        // occurred.
873
        var rtErr htlcswitch.ClearTextError
1✔
874
        ok := errors.As(sendErr, &rtErr)
1✔
875
        if !ok {
1✔
876
                return p.failPaymentAndAttempt(
×
877
                        attemptID, &internalErrorReason, sendErr,
×
878
                )
×
879
        }
×
880

881
        // failureSourceIdx is the index of the node that the failure occurred
882
        // at. If the ClearTextError received is not a ForwardingError the
883
        // payment error occurred at our node, so we leave this value as 0
884
        // to indicate that the failure occurred locally. If the error is a
885
        // ForwardingError, it did not originate at our node, so we set
886
        // failureSourceIdx to the index of the node where the failure occurred.
887
        failureSourceIdx := 0
1✔
888
        var source *htlcswitch.ForwardingError
1✔
889
        ok = errors.As(rtErr, &source)
1✔
890
        if ok {
2✔
891
                failureSourceIdx = source.FailureSourceIdx
1✔
892
        }
1✔
893

894
        // Extract the wire failure and apply channel update if it contains one.
895
        // If we received an unknown failure message from a node along the
896
        // route, the failure message will be nil.
897
        failureMessage := rtErr.WireMessage()
1✔
898
        err := p.handleFailureMessage(
1✔
899
                &attempt.Route, failureSourceIdx, failureMessage,
1✔
900
        )
1✔
901
        if err != nil {
1✔
902
                return p.failPaymentAndAttempt(
×
903
                        attemptID, &internalErrorReason, sendErr,
×
904
                )
×
905
        }
×
906

907
        log.Tracef("Node=%v reported failure when sending htlc",
1✔
908
                failureSourceIdx)
1✔
909

1✔
910
        return reportAndFail(&failureSourceIdx, failureMessage)
1✔
911
}
912

913
// handleFailureMessage tries to apply a channel update present in the failure
914
// message if any.
915
func (p *paymentLifecycle) handleFailureMessage(rt *route.Route,
916
        errorSourceIdx int, failure lnwire.FailureMessage) error {
1✔
917

1✔
918
        if failure == nil {
1✔
919
                return nil
×
920
        }
×
921

922
        // It makes no sense to apply our own channel updates.
923
        if errorSourceIdx == 0 {
2✔
924
                log.Errorf("Channel update of ourselves received")
1✔
925

1✔
926
                return nil
1✔
927
        }
1✔
928

929
        // Extract channel update if the error contains one.
930
        update := p.router.extractChannelUpdate(failure)
1✔
931
        if update == nil {
2✔
932
                return nil
1✔
933
        }
1✔
934

935
        // Parse pubkey to allow validation of the channel update. This should
936
        // always succeed, otherwise there is something wrong in our
937
        // implementation. Therefore, return an error.
938
        errVertex := rt.Hops[errorSourceIdx-1].PubKeyBytes
1✔
939
        errSource, err := btcec.ParsePubKey(errVertex[:])
1✔
940
        if err != nil {
1✔
941
                log.Errorf("Cannot parse pubkey: idx=%v, pubkey=%v",
×
942
                        errorSourceIdx, errVertex)
×
943

×
944
                return err
×
945
        }
×
946

947
        var (
1✔
948
                isAdditionalEdge bool
1✔
949
                policy           *models.CachedEdgePolicy
1✔
950
        )
1✔
951

1✔
952
        // Before we apply the channel update, we need to decide whether the
1✔
953
        // update is for additional (ephemeral) edge or normal edge stored in
1✔
954
        // db.
1✔
955
        //
1✔
956
        // Note: the p.paySession might be nil here if it's called inside
1✔
957
        // SendToRoute where there's no payment lifecycle.
1✔
958
        if p.paySession != nil {
2✔
959
                policy = p.paySession.GetAdditionalEdgePolicy(
1✔
960
                        errSource, update.ShortChannelID.ToUint64(),
1✔
961
                )
1✔
962
                if policy != nil {
2✔
963
                        isAdditionalEdge = true
1✔
964
                }
1✔
965
        }
966

967
        // Apply channel update to additional edge policy.
968
        if isAdditionalEdge {
2✔
969
                if !p.paySession.UpdateAdditionalEdge(
1✔
970
                        update, errSource, policy) {
1✔
971

×
972
                        log.Debugf("Invalid channel update received: node=%v",
×
973
                                errVertex)
×
974
                }
×
975
                return nil
1✔
976
        }
977

978
        // Apply channel update to the channel edge policy in our db.
979
        if !p.router.cfg.ApplyChannelUpdate(update) {
2✔
980
                log.Debugf("Invalid channel update received: node=%v",
1✔
981
                        errVertex)
1✔
982
        }
1✔
983
        return nil
1✔
984
}
985

986
// failAttempt calls control tower to fail the current payment attempt.
987
func (p *paymentLifecycle) failAttempt(attemptID uint64,
988
        sendError error) (*attemptResult, error) {
1✔
989

1✔
990
        log.Warnf("Attempt %v for payment %v failed: %v", attemptID,
1✔
991
                p.identifier, sendError)
1✔
992

1✔
993
        failInfo := marshallError(
1✔
994
                sendError,
1✔
995
                p.router.cfg.Clock.Now(),
1✔
996
        )
1✔
997

1✔
998
        // Now that we are failing this payment attempt, cancel the shard with
1✔
999
        // the ShardTracker such that it can derive the correct hash for the
1✔
1000
        // next attempt.
1✔
1001
        if err := p.shardTracker.CancelShard(attemptID); err != nil {
1✔
1002
                return nil, err
×
1003
        }
×
1004

1005
        attempt, err := p.router.cfg.Control.FailAttempt(
1✔
1006
                p.identifier, attemptID, failInfo,
1✔
1007
        )
1✔
1008
        if err != nil {
1✔
1009
                return nil, err
×
1010
        }
×
1011

1012
        return &attemptResult{
1✔
1013
                attempt: attempt,
1✔
1014
                err:     sendError,
1✔
1015
        }, nil
1✔
1016
}
1017

1018
// marshallError marshall an error as received from the switch to a structure
1019
// that is suitable for database storage.
1020
func marshallError(sendError error, time time.Time) *channeldb.HTLCFailInfo {
1✔
1021
        response := &channeldb.HTLCFailInfo{
1✔
1022
                FailTime: time,
1✔
1023
        }
1✔
1024

1✔
1025
        switch {
1✔
1026
        case errors.Is(sendError, htlcswitch.ErrPaymentIDNotFound):
×
1027
                response.Reason = channeldb.HTLCFailInternal
×
1028
                return response
×
1029

1030
        case errors.Is(sendError, htlcswitch.ErrUnreadableFailureMessage):
×
1031
                response.Reason = channeldb.HTLCFailUnreadable
×
1032
                return response
×
1033
        }
1034

1035
        var rtErr htlcswitch.ClearTextError
1✔
1036
        ok := errors.As(sendError, &rtErr)
1✔
1037
        if !ok {
1✔
1038
                response.Reason = channeldb.HTLCFailInternal
×
1039
                return response
×
1040
        }
×
1041

1042
        message := rtErr.WireMessage()
1✔
1043
        if message != nil {
2✔
1044
                response.Reason = channeldb.HTLCFailMessage
1✔
1045
                response.Message = message
1✔
1046
        } else {
1✔
1047
                response.Reason = channeldb.HTLCFailUnknown
×
1048
        }
×
1049

1050
        // If the ClearTextError received is a ForwardingError, the error
1051
        // originated from a node along the route, not locally on our outgoing
1052
        // link. We set failureSourceIdx to the index of the node where the
1053
        // failure occurred. If the error is not a ForwardingError, the failure
1054
        // occurred at our node, so we leave the index as 0 to indicate that
1055
        // we failed locally.
1056
        var fErr *htlcswitch.ForwardingError
1✔
1057
        ok = errors.As(rtErr, &fErr)
1✔
1058
        if ok {
2✔
1059
                response.FailureSourceIndex = uint32(fErr.FailureSourceIdx)
1✔
1060
        }
1✔
1061

1062
        return response
1✔
1063
}
1064

1065
// patchLegacyPaymentHash will make a copy of the passed attempt and sets its
1066
// Hash field to be the payment hash if it's nil.
1067
//
1068
// NOTE: For legacy payments, which were created before the AMP feature was
1069
// enabled, the `Hash` field in their HTLC attempts is nil. In that case, we use
1070
// the payment hash as the `attempt.Hash` as they are identical.
1071
func (p *paymentLifecycle) patchLegacyPaymentHash(
1072
        a channeldb.HTLCAttempt) channeldb.HTLCAttempt {
1✔
1073

1✔
1074
        // Exit early if this is not a legacy attempt.
1✔
1075
        if a.Hash != nil {
2✔
1076
                return a
1✔
1077
        }
1✔
1078

1079
        // Log a warning if the user is still using legacy payments, which has
1080
        // weaker support.
NEW
1081
        log.Warnf("Found legacy htlc attempt %v in payment %v", a.AttemptID,
×
NEW
1082
                p.identifier)
×
NEW
1083

×
NEW
1084
        // Set the attempt's hash to be the payment hash, which is the payment's
×
NEW
1085
        // `PaymentHash`` in the `PaymentCreationInfo`. For legacy payments
×
NEW
1086
        // before AMP feature, the `Hash` field was not set so we use the
×
NEW
1087
        // payment hash instead.
×
NEW
1088
        //
×
NEW
1089
        // NOTE: During the router's startup, we have a similar logic in
×
NEW
1090
        // `resumePayments`, in which we will use the payment hash instead if
×
NEW
1091
        // the attempt's hash is nil.
×
NEW
1092
        a.Hash = &p.identifier
×
NEW
1093

×
NEW
1094
        return a
×
1095
}
1096

1097
// reloadInflightAttempts is called when the payment lifecycle is resumed after
1098
// a restart. It reloads all inflight attempts from the control tower and
1099
// collects the results of the attempts that have been sent before.
1100
func (p *paymentLifecycle) reloadInflightAttempts() (DBMPPayment, error) {
1✔
1101
        payment, err := p.router.cfg.Control.FetchPayment(p.identifier)
1✔
1102
        if err != nil {
1✔
1103
                return nil, err
×
1104
        }
×
1105

1106
        for _, a := range payment.InFlightHTLCs() {
2✔
1107
                a := a
1✔
1108

1✔
1109
                log.Infof("Resuming HTLC attempt %v for payment %v",
1✔
1110
                        a.AttemptID, p.identifier)
1✔
1111

1✔
1112
                // Potentially attach the payment hash to the `Hash` field if
1✔
1113
                // it's a legacy payment.
1✔
1114
                a = p.patchLegacyPaymentHash(a)
1✔
1115

1✔
1116
                p.resultCollector(&a)
1✔
1117
        }
1✔
1118

1119
        return payment, nil
1✔
1120
}
1121

1122
// reloadPayment returns the latest payment found in the db (control tower).
1123
func (p *paymentLifecycle) reloadPayment() (DBMPPayment,
1124
        *channeldb.MPPaymentState, error) {
1✔
1125

1✔
1126
        // Read the db to get the latest state of the payment.
1✔
1127
        payment, err := p.router.cfg.Control.FetchPayment(p.identifier)
1✔
1128
        if err != nil {
1✔
1129
                return nil, nil, err
×
1130
        }
×
1131

1132
        ps := payment.GetState()
1✔
1133
        remainingFees := p.calcFeeBudget(ps.FeesPaid)
1✔
1134

1✔
1135
        log.Debugf("Payment %v: status=%v, active_shards=%v, rem_value=%v, "+
1✔
1136
                "fee_limit=%v", p.identifier, payment.GetStatus(),
1✔
1137
                ps.NumAttemptsInFlight, ps.RemainingAmt, remainingFees)
1✔
1138

1✔
1139
        return payment, ps, nil
1✔
1140
}
1141

1142
// handleAttemptResult processes the result of an HTLC attempt returned from
1143
// the htlcswitch.
1144
func (p *paymentLifecycle) handleAttemptResult(attempt *channeldb.HTLCAttempt,
1145
        result *htlcswitch.PaymentResult) (*attemptResult, error) {
1✔
1146

1✔
1147
        // If the result has an error, we need to further process it by failing
1✔
1148
        // the attempt and maybe fail the payment.
1✔
1149
        if result.Error != nil {
2✔
1150
                return p.handleSwitchErr(attempt, result.Error)
1✔
1151
        }
1✔
1152

1153
        // We got an attempt settled result back from the switch.
1154
        log.Debugf("Payment(%v): attempt(%v) succeeded", p.identifier,
1✔
1155
                attempt.AttemptID)
1✔
1156

1✔
1157
        // Report success to mission control.
1✔
1158
        err := p.router.cfg.MissionControl.ReportPaymentSuccess(
1✔
1159
                attempt.AttemptID, &attempt.Route,
1✔
1160
        )
1✔
1161
        if err != nil {
1✔
1162
                log.Errorf("Error reporting payment success to mc: %v", err)
×
1163
        }
×
1164

1165
        // In case of success we atomically store settle result to the DB and
1166
        // move the shard to the settled state.
1167
        htlcAttempt, err := p.router.cfg.Control.SettleAttempt(
1✔
1168
                p.identifier, attempt.AttemptID,
1✔
1169
                &channeldb.HTLCSettleInfo{
1✔
1170
                        Preimage:   result.Preimage,
1✔
1171
                        SettleTime: p.router.cfg.Clock.Now(),
1✔
1172
                },
1✔
1173
        )
1✔
1174
        if err != nil {
1✔
1175
                log.Errorf("Error settling attempt %v for payment %v with "+
×
1176
                        "preimage %v: %v", attempt.AttemptID, p.identifier,
×
1177
                        result.Preimage, err)
×
1178

×
1179
                // We won't mark the attempt as failed since we already have
×
1180
                // the preimage.
×
1181
                return nil, err
×
1182
        }
×
1183

1184
        return &attemptResult{
1✔
1185
                attempt: htlcAttempt,
1✔
1186
        }, nil
1✔
1187
}
1188

1189
// collectAndHandleResult waits for the result for the given attempt to be
1190
// available from the Switch, then records the attempt outcome with the control
1191
// tower. An attemptResult is returned, indicating the final outcome of this
1192
// HTLC attempt.
1193
func (p *paymentLifecycle) collectAndHandleResult(
1194
        attempt *channeldb.HTLCAttempt) (*attemptResult, error) {
1✔
1195

1✔
1196
        result, err := p.collectResult(attempt)
1✔
1197
        if err != nil {
1✔
1198
                return nil, err
×
1199
        }
×
1200

1201
        return p.handleAttemptResult(attempt, result)
1✔
1202
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc