• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

lightningnetwork / lnd / 15874857031

25 Jun 2025 11:15AM UTC coverage: 67.689% (+9.7%) from 57.952%
15874857031

Pull #9884

github

web-flow
Merge e68b882f7 into fb720c174
Pull Request #9884: multi: use relaxed feature bit `Set` method for peer features

15 of 16 new or added lines in 2 files covered. (93.75%)

1204 existing lines in 11 files now uncovered.

135048 of 199513 relevant lines covered (67.69%)

21884.1 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

81.48
/lnrpc/routerrpc/router_server.go
1
package routerrpc
2

3
import (
4
        "bytes"
5
        "context"
6
        crand "crypto/rand"
7
        "errors"
8
        "fmt"
9
        "os"
10
        "path/filepath"
11
        "sync/atomic"
12
        "time"
13

14
        "github.com/btcsuite/btcd/btcutil"
15
        "github.com/btcsuite/btcd/wire"
16
        "github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
17
        "github.com/lightningnetwork/lnd/aliasmgr"
18
        "github.com/lightningnetwork/lnd/channeldb"
19
        "github.com/lightningnetwork/lnd/fn/v2"
20
        "github.com/lightningnetwork/lnd/lnrpc"
21
        "github.com/lightningnetwork/lnd/lnrpc/invoicesrpc"
22
        "github.com/lightningnetwork/lnd/lntypes"
23
        "github.com/lightningnetwork/lnd/lnwire"
24
        "github.com/lightningnetwork/lnd/macaroons"
25
        "github.com/lightningnetwork/lnd/routing"
26
        "github.com/lightningnetwork/lnd/routing/route"
27
        "github.com/lightningnetwork/lnd/zpay32"
28
        "google.golang.org/grpc"
29
        "google.golang.org/grpc/codes"
30
        "google.golang.org/grpc/status"
31
        "gopkg.in/macaroon-bakery.v2/bakery"
32
)
33

34
const (
35
        // subServerName is the name of the sub rpc server. We'll use this name
36
        // to register ourselves, and we also require that the main
37
        // SubServerConfigDispatcher instance recognize as the name of our
38
        subServerName = "RouterRPC"
39

40
        // routeFeeLimitSat is the maximum routing fee that we allow to occur
41
        // when estimating a routing fee.
42
        routeFeeLimitSat = 100_000_000
43

44
        // DefaultPaymentTimeout is the default value of time we should spend
45
        // when attempting to fulfill the payment.
46
        DefaultPaymentTimeout int32 = 60
47
)
48

49
var (
50
        errServerShuttingDown = errors.New("routerrpc server shutting down")
51

52
        // ErrInterceptorAlreadyExists is an error returned when a new stream is
53
        // opened and there is already one active interceptor. The user must
54
        // disconnect prior to open another stream.
55
        ErrInterceptorAlreadyExists = errors.New("interceptor already exists")
56

57
        errMissingPaymentAttempt = errors.New("missing payment attempt")
58

59
        errMissingRoute = errors.New("missing route")
60

61
        errUnexpectedFailureSource = errors.New("unexpected failure source")
62

63
        // ErrAliasAlreadyExists is returned if a new SCID alias is attempted
64
        // to be added that already exists.
65
        ErrAliasAlreadyExists = errors.New("alias already exists")
66

67
        // ErrNoValidAlias is returned if an alias is not in the valid range for
68
        // allowed SCID aliases.
69
        ErrNoValidAlias = errors.New("not a valid alias")
70

71
        // macaroonOps are the set of capabilities that our minted macaroon (if
72
        // it doesn't already exist) will have.
73
        macaroonOps = []bakery.Op{
74
                {
75
                        Entity: "offchain",
76
                        Action: "read",
77
                },
78
                {
79
                        Entity: "offchain",
80
                        Action: "write",
81
                },
82
        }
83

84
        // macPermissions maps RPC calls to the permissions they require.
85
        macPermissions = map[string][]bakery.Op{
86
                "/routerrpc.Router/SendPaymentV2": {{
87
                        Entity: "offchain",
88
                        Action: "write",
89
                }},
90
                "/routerrpc.Router/SendToRouteV2": {{
91
                        Entity: "offchain",
92
                        Action: "write",
93
                }},
94
                "/routerrpc.Router/SendToRoute": {{
95
                        Entity: "offchain",
96
                        Action: "write",
97
                }},
98
                "/routerrpc.Router/TrackPaymentV2": {{
99
                        Entity: "offchain",
100
                        Action: "read",
101
                }},
102
                "/routerrpc.Router/TrackPayments": {{
103
                        Entity: "offchain",
104
                        Action: "read",
105
                }},
106
                "/routerrpc.Router/EstimateRouteFee": {{
107
                        Entity: "offchain",
108
                        Action: "read",
109
                }},
110
                "/routerrpc.Router/QueryMissionControl": {{
111
                        Entity: "offchain",
112
                        Action: "read",
113
                }},
114
                "/routerrpc.Router/XImportMissionControl": {{
115
                        Entity: "offchain",
116
                        Action: "write",
117
                }},
118
                "/routerrpc.Router/GetMissionControlConfig": {{
119
                        Entity: "offchain",
120
                        Action: "read",
121
                }},
122
                "/routerrpc.Router/SetMissionControlConfig": {{
123
                        Entity: "offchain",
124
                        Action: "write",
125
                }},
126
                "/routerrpc.Router/QueryProbability": {{
127
                        Entity: "offchain",
128
                        Action: "read",
129
                }},
130
                "/routerrpc.Router/ResetMissionControl": {{
131
                        Entity: "offchain",
132
                        Action: "write",
133
                }},
134
                "/routerrpc.Router/BuildRoute": {{
135
                        Entity: "offchain",
136
                        Action: "read",
137
                }},
138
                "/routerrpc.Router/SubscribeHtlcEvents": {{
139
                        Entity: "offchain",
140
                        Action: "read",
141
                }},
142
                "/routerrpc.Router/SendPayment": {{
143
                        Entity: "offchain",
144
                        Action: "write",
145
                }},
146
                "/routerrpc.Router/TrackPayment": {{
147
                        Entity: "offchain",
148
                        Action: "read",
149
                }},
150
                "/routerrpc.Router/HtlcInterceptor": {{
151
                        Entity: "offchain",
152
                        Action: "write",
153
                }},
154
                "/routerrpc.Router/UpdateChanStatus": {{
155
                        Entity: "offchain",
156
                        Action: "write",
157
                }},
158
                "/routerrpc.Router/XAddLocalChanAliases": {{
159
                        Entity: "offchain",
160
                        Action: "write",
161
                }},
162
                "/routerrpc.Router/XDeleteLocalChanAliases": {{
163
                        Entity: "offchain",
164
                        Action: "write",
165
                }},
166
        }
167

168
        // DefaultRouterMacFilename is the default name of the router macaroon
169
        // that we expect to find via a file handle within the main
170
        // configuration file in this package.
171
        DefaultRouterMacFilename = "router.macaroon"
172
)
173

174
// FetchChannelEndpoints returns the pubkeys of both endpoints of the
175
// given channel id if it exists in the graph.
176
type FetchChannelEndpoints func(chanID uint64) (route.Vertex, route.Vertex,
177
        error)
178

179
// ServerShell is a shell struct holding a reference to the actual sub-server.
180
// It is used to register the gRPC sub-server with the root server before we
181
// have the necessary dependencies to populate the actual sub-server.
182
type ServerShell struct {
183
        RouterServer
184
}
185

186
// Server is a stand-alone sub RPC server which exposes functionality that
187
// allows clients to route arbitrary payment through the Lightning Network.
188
type Server struct {
189
        started                  int32 // To be used atomically.
190
        shutdown                 int32 // To be used atomically.
191
        forwardInterceptorActive int32 // To be used atomically.
192

193
        // Required by the grpc-gateway/v2 library for forward compatibility.
194
        // Must be after the atomically used variables to not break struct
195
        // alignment.
196
        UnimplementedRouterServer
197

198
        cfg *Config
199

200
        quit chan struct{}
201
}
202

203
// A compile time check to ensure that Server fully implements the RouterServer
204
// gRPC service.
205
var _ RouterServer = (*Server)(nil)
206

207
// New creates a new instance of the RouterServer given a configuration struct
208
// that contains all external dependencies. If the target macaroon exists, and
209
// we're unable to create it, then an error will be returned. We also return
210
// the set of permissions that we require as a server. At the time of writing
211
// of this documentation, this is the same macaroon as the admin macaroon.
212
func New(cfg *Config) (*Server, lnrpc.MacaroonPerms, error) {
3✔
213
        // If the path of the router macaroon wasn't generated, then we'll
3✔
214
        // assume that it's found at the default network directory.
3✔
215
        if cfg.RouterMacPath == "" {
6✔
216
                cfg.RouterMacPath = filepath.Join(
3✔
217
                        cfg.NetworkDir, DefaultRouterMacFilename,
3✔
218
                )
3✔
219
        }
3✔
220

221
        // Now that we know the full path of the router macaroon, we can check
222
        // to see if we need to create it or not. If stateless_init is set
223
        // then we don't write the macaroons.
224
        macFilePath := cfg.RouterMacPath
3✔
225
        if cfg.MacService != nil && !cfg.MacService.StatelessInit &&
3✔
226
                !lnrpc.FileExists(macFilePath) {
6✔
227

3✔
228
                log.Infof("Making macaroons for Router RPC Server at: %v",
3✔
229
                        macFilePath)
3✔
230

3✔
231
                // At this point, we know that the router macaroon doesn't yet,
3✔
232
                // exist, so we need to create it with the help of the main
3✔
233
                // macaroon service.
3✔
234
                routerMac, err := cfg.MacService.NewMacaroon(
3✔
235
                        context.Background(), macaroons.DefaultRootKeyID,
3✔
236
                        macaroonOps...,
3✔
237
                )
3✔
238
                if err != nil {
3✔
239
                        return nil, nil, err
×
240
                }
×
241
                routerMacBytes, err := routerMac.M().MarshalBinary()
3✔
242
                if err != nil {
3✔
243
                        return nil, nil, err
×
244
                }
×
245
                err = os.WriteFile(macFilePath, routerMacBytes, 0644)
3✔
246
                if err != nil {
3✔
247
                        _ = os.Remove(macFilePath)
×
248
                        return nil, nil, err
×
249
                }
×
250
        }
251

252
        routerServer := &Server{
3✔
253
                cfg:  cfg,
3✔
254
                quit: make(chan struct{}),
3✔
255
        }
3✔
256

3✔
257
        return routerServer, macPermissions, nil
3✔
258
}
259

260
// Start launches any helper goroutines required for the rpcServer to function.
261
//
262
// NOTE: This is part of the lnrpc.SubServer interface.
263
func (s *Server) Start() error {
3✔
264
        if atomic.AddInt32(&s.started, 1) != 1 {
3✔
265
                return nil
×
266
        }
×
267

268
        return nil
3✔
269
}
270

271
// Stop signals any active goroutines for a graceful closure.
272
//
273
// NOTE: This is part of the lnrpc.SubServer interface.
274
func (s *Server) Stop() error {
3✔
275
        if atomic.AddInt32(&s.shutdown, 1) != 1 {
3✔
276
                return nil
×
277
        }
×
278

279
        close(s.quit)
3✔
280
        return nil
3✔
281
}
282

283
// Name returns a unique string representation of the sub-server. This can be
284
// used to identify the sub-server and also de-duplicate them.
285
//
286
// NOTE: This is part of the lnrpc.SubServer interface.
287
func (s *Server) Name() string {
3✔
288
        return subServerName
3✔
289
}
3✔
290

291
// RegisterWithRootServer will be called by the root gRPC server to direct a
292
// sub RPC server to register itself with the main gRPC root server. Until this
293
// is called, each sub-server won't be able to have requests routed towards it.
294
//
295
// NOTE: This is part of the lnrpc.GrpcHandler interface.
296
func (r *ServerShell) RegisterWithRootServer(grpcServer *grpc.Server) error {
3✔
297
        // We make sure that we register it with the main gRPC server to ensure
3✔
298
        // all our methods are routed properly.
3✔
299
        RegisterRouterServer(grpcServer, r)
3✔
300

3✔
301
        log.Debugf("Router RPC server successfully registered with root gRPC " +
3✔
302
                "server")
3✔
303

3✔
304
        return nil
3✔
305
}
3✔
306

307
// RegisterWithRestServer will be called by the root REST mux to direct a sub
308
// RPC server to register itself with the main REST mux server. Until this is
309
// called, each sub-server won't be able to have requests routed towards it.
310
//
311
// NOTE: This is part of the lnrpc.GrpcHandler interface.
312
func (r *ServerShell) RegisterWithRestServer(ctx context.Context,
313
        mux *runtime.ServeMux, dest string, opts []grpc.DialOption) error {
3✔
314

3✔
315
        // We make sure that we register it with the main REST server to ensure
3✔
316
        // all our methods are routed properly.
3✔
317
        err := RegisterRouterHandlerFromEndpoint(ctx, mux, dest, opts)
3✔
318
        if err != nil {
3✔
319
                log.Errorf("Could not register Router REST server "+
×
320
                        "with root REST server: %v", err)
×
321
                return err
×
322
        }
×
323

324
        log.Debugf("Router REST server successfully registered with " +
3✔
325
                "root REST server")
3✔
326
        return nil
3✔
327
}
328

329
// CreateSubServer populates the subserver's dependencies using the passed
330
// SubServerConfigDispatcher. This method should fully initialize the
331
// sub-server instance, making it ready for action. It returns the macaroon
332
// permissions that the sub-server wishes to pass on to the root server for all
333
// methods routed towards it.
334
//
335
// NOTE: This is part of the lnrpc.GrpcHandler interface.
336
func (r *ServerShell) CreateSubServer(configRegistry lnrpc.SubServerConfigDispatcher) (
337
        lnrpc.SubServer, lnrpc.MacaroonPerms, error) {
3✔
338

3✔
339
        subServer, macPermissions, err := createNewSubServer(configRegistry)
3✔
340
        if err != nil {
3✔
341
                return nil, nil, err
×
342
        }
×
343

344
        r.RouterServer = subServer
3✔
345
        return subServer, macPermissions, nil
3✔
346
}
347

348
// SendPaymentV2 attempts to route a payment described by the passed
349
// PaymentRequest to the final destination. If we are unable to route the
350
// payment, or cannot find a route that satisfies the constraints in the
351
// PaymentRequest, then an error will be returned. Otherwise, the payment
352
// pre-image, along with the final route will be returned.
353
func (s *Server) SendPaymentV2(req *SendPaymentRequest,
354
        stream Router_SendPaymentV2Server) error {
3✔
355

3✔
356
        // Set payment request attempt timeout.
3✔
357
        if req.TimeoutSeconds == 0 {
6✔
358
                req.TimeoutSeconds = DefaultPaymentTimeout
3✔
359
        }
3✔
360

361
        payment, err := s.cfg.RouterBackend.extractIntentFromSendRequest(req)
3✔
362
        if err != nil {
6✔
363
                return err
3✔
364
        }
3✔
365

366
        // Get the payment hash.
367
        payHash := payment.Identifier()
3✔
368

3✔
369
        // Init the payment in db.
3✔
370
        paySession, shardTracker, err := s.cfg.Router.PreparePayment(payment)
3✔
371
        if err != nil {
3✔
372
                log.Errorf("SendPayment async error for payment %x: %v",
×
373
                        payment.Identifier(), err)
×
374

×
375
                // Transform user errors to grpc code.
×
376
                if errors.Is(err, channeldb.ErrPaymentExists) ||
×
377
                        errors.Is(err, channeldb.ErrPaymentInFlight) ||
×
378
                        errors.Is(err, channeldb.ErrAlreadyPaid) {
×
379

×
380
                        return status.Error(
×
381
                                codes.AlreadyExists, err.Error(),
×
382
                        )
×
383
                }
×
384

385
                return err
×
386
        }
387

388
        // Subscribe to the payment before sending it to make sure we won't
389
        // miss events.
390
        sub, err := s.subscribePayment(payHash)
3✔
391
        if err != nil {
3✔
392
                return err
×
393
        }
×
394

395
        // The payment context is influenced by two user-provided parameters,
396
        // the cancelable flag and the payment attempt timeout.
397
        // If the payment is cancelable, we will use the stream context as the
398
        // payment context. That way, if the user ends the stream, the payment
399
        // loop will be canceled.
400
        // The second context parameter is the timeout. If the user provides a
401
        // timeout, we will additionally wrap the context in a deadline. If the
402
        // user provided 'cancelable' and ends the stream before the timeout is
403
        // reached the payment will be canceled.
404
        ctx := context.Background()
3✔
405
        if req.Cancelable {
6✔
406
                ctx = stream.Context()
3✔
407
        }
3✔
408

409
        // Send the payment asynchronously.
410
        s.cfg.Router.SendPaymentAsync(ctx, payment, paySession, shardTracker)
3✔
411

3✔
412
        // Track the payment and return.
3✔
413
        return s.trackPayment(sub, payHash, stream, req.NoInflightUpdates)
3✔
414
}
415

416
// EstimateRouteFee allows callers to obtain an expected value w.r.t how much it
417
// may cost to send an HTLC to the target end destination. This method sends
418
// probe payments to the target node, based on target invoice parameters and a
419
// random payment hash that makes it impossible for the target to settle the
420
// htlc. The probing stops if a user-provided timeout is reached. If provided
421
// with a destination key and amount, this method will perform a local graph
422
// based fee estimation.
423
func (s *Server) EstimateRouteFee(ctx context.Context,
424
        req *RouteFeeRequest) (*RouteFeeResponse, error) {
3✔
425

3✔
426
        isProbeDestination := len(req.Dest) > 0
3✔
427
        isProbeInvoice := len(req.PaymentRequest) > 0
3✔
428

3✔
429
        switch {
3✔
430
        case isProbeDestination == isProbeInvoice:
×
431
                return nil, errors.New("specify either a destination or an " +
×
432
                        "invoice")
×
433

434
        case isProbeDestination:
3✔
435
                switch {
3✔
436
                case len(req.Dest) != 33:
×
437
                        return nil, errors.New("invalid length destination key")
×
438

439
                case req.AmtSat <= 0:
×
440
                        return nil, errors.New("amount must be greater than 0")
×
441

442
                default:
3✔
443
                        return s.probeDestination(req.Dest, req.AmtSat)
3✔
444
                }
445

446
        case isProbeInvoice:
3✔
447
                return s.probePaymentRequest(
3✔
448
                        ctx, req.PaymentRequest, req.Timeout,
3✔
449
                )
3✔
450
        }
451

452
        return &RouteFeeResponse{}, nil
×
453
}
454

455
// probeDestination estimates fees along a route to a destination based on the
456
// contents of the local graph.
457
func (s *Server) probeDestination(dest []byte, amtSat int64) (*RouteFeeResponse,
458
        error) {
3✔
459

3✔
460
        destNode, err := route.NewVertexFromBytes(dest)
3✔
461
        if err != nil {
3✔
462
                return nil, err
×
463
        }
×
464

465
        // Next, we'll convert the amount in satoshis to mSAT, which are the
466
        // native unit of LN.
467
        amtMsat := lnwire.NewMSatFromSatoshis(btcutil.Amount(amtSat))
3✔
468

3✔
469
        // Finally, we'll query for a route to the destination that can carry
3✔
470
        // that target amount, we'll only request a single route. Set a
3✔
471
        // restriction for the default CLTV limit, otherwise we can find a route
3✔
472
        // that exceeds it and is useless to us.
3✔
473
        mc := s.cfg.RouterBackend.MissionControl
3✔
474
        routeReq, err := routing.NewRouteRequest(
3✔
475
                s.cfg.RouterBackend.SelfNode, &destNode, amtMsat, 0,
3✔
476
                &routing.RestrictParams{
3✔
477
                        FeeLimit:          routeFeeLimitSat,
3✔
478
                        CltvLimit:         s.cfg.RouterBackend.MaxTotalTimelock,
3✔
479
                        ProbabilitySource: mc.GetProbability,
3✔
480
                }, nil, nil, nil, s.cfg.RouterBackend.DefaultFinalCltvDelta,
3✔
481
        )
3✔
482
        if err != nil {
3✔
483
                return nil, err
×
484
        }
×
485

486
        route, _, err := s.cfg.Router.FindRoute(routeReq)
3✔
487
        if err != nil {
6✔
488
                return nil, err
3✔
489
        }
3✔
490

491
        // We are adding a block padding to the total time lock to account for
492
        // the safety buffer that the payment session will add to the last hop's
493
        // cltv delta. This is to prevent the htlc from failing if blocks are
494
        // mined while it is in flight.
495
        timeLockDelay := route.TotalTimeLock + uint32(routing.BlockPadding)
3✔
496

3✔
497
        return &RouteFeeResponse{
3✔
498
                RoutingFeeMsat: int64(route.TotalFees()),
3✔
499
                TimeLockDelay:  int64(timeLockDelay),
3✔
500
                FailureReason:  lnrpc.PaymentFailureReason_FAILURE_REASON_NONE,
3✔
501
        }, nil
3✔
502
}
503

504
// probePaymentRequest estimates fees along a route to a destination that is
505
// specified in an invoice. The estimation duration is limited by a timeout. In
506
// case that route hints are provided, this method applies a heuristic to
507
// identify LSPs which might block probe payments. In that case, fees are
508
// manually calculated and added to the probed fee estimation up until the LSP
509
// node. If the route hints don't indicate an LSP, they are passed as arguments
510
// to the SendPayment_V2 method, which enable it to send probe payments to the
511
// payment request destination.
512
func (s *Server) probePaymentRequest(ctx context.Context, paymentRequest string,
513
        timeout uint32) (*RouteFeeResponse, error) {
514

515
        payReq, err := zpay32.Decode(
516
                paymentRequest, s.cfg.RouterBackend.ActiveNetParams,
517
        )
3✔
518
        if err != nil {
3✔
519
                return nil, err
3✔
520
        }
3✔
521

3✔
522
        if payReq.MilliSat == nil || *payReq.MilliSat <= 0 {
3✔
523
                return nil, errors.New("payment request amount must be " +
×
524
                        "greater than 0")
×
525
        }
526

3✔
527
        // Generate random payment hash, so we can be sure that the target of
528
        // the probe payment doesn't have the preimage to settle the htlc.
UNCOV
529
        var paymentHash lntypes.Hash
×
530
        _, err = crand.Read(paymentHash[:])
531
        if err != nil {
532
                return nil, fmt.Errorf("cannot generate random probe "+
533
                        "preimage: %w", err)
3✔
534
        }
3✔
535

3✔
UNCOV
536
        amtMsat := int64(*payReq.MilliSat)
×
UNCOV
537
        probeRequest := &SendPaymentRequest{
×
UNCOV
538
                TimeoutSeconds:   int32(timeout),
×
539
                Dest:             payReq.Destination.SerializeCompressed(),
540
                MaxParts:         1,
3✔
541
                AllowSelfPayment: false,
3✔
542
                AmtMsat:          amtMsat,
3✔
543
                PaymentHash:      paymentHash[:],
3✔
544
                FeeLimitSat:      routeFeeLimitSat,
3✔
545
                FinalCltvDelta:   int32(payReq.MinFinalCLTVExpiry()),
3✔
546
                DestFeatures:     MarshalFeatures(payReq.Features),
3✔
547
        }
3✔
548

3✔
549
        // If the payment addresses is specified, then we'll also populate that
3✔
550
        // now as well.
3✔
551
        payReq.PaymentAddr.WhenSome(func(addr [32]byte) {
3✔
552
                copy(probeRequest.PaymentAddr, addr[:])
3✔
553
        })
3✔
554

3✔
555
        hints := payReq.RouteHints
6✔
556

3✔
557
        // If the hints don't indicate an LSP then chances are that our probe
3✔
558
        // payment won't be blocked along the route to the destination. We send
559
        // a probe payment with unmodified route hints.
3✔
560
        if !isLSP(hints, s.cfg.RouterBackend.FetchChannelEndpoints) {
3✔
561
                probeRequest.RouteHints = invoicesrpc.CreateRPCRouteHints(hints)
3✔
562
                return s.sendProbePayment(ctx, probeRequest)
3✔
563
        }
3✔
564

6✔
565
        // If the heuristic indicates an LSP we modify the route hints to allow
3✔
566
        // probing the LSP.
3✔
567
        lspAdjustedRouteHints, lspHint, err := prepareLspRouteHints(
3✔
568
                hints, *payReq.MilliSat,
3✔
569
        )
3✔
570
        if err != nil {
3✔
571
                return nil, err
572
        }
573

574
        // The adjusted route hints serve the payment probe to find the last
3✔
575
        // public hop to the LSP on the route.
3✔
576
        probeRequest.Dest = lspHint.NodeID.SerializeCompressed()
3✔
577
        if len(lspAdjustedRouteHints) > 0 {
3✔
578
                probeRequest.RouteHints = invoicesrpc.CreateRPCRouteHints(
×
579
                        lspAdjustedRouteHints,
×
580
                )
581
        }
582

3✔
583
        // The payment probe will be able to calculate the fee up until the LSP
3✔
584
        // node. The fee of the last hop has to be calculated manually. Since
3✔
585
        // the last hop's fee amount has to be sent across the payment path we
3✔
586
        // have to add it to the original payment amount. Only then will the
3✔
587
        // payment probe be able to determine the correct fee to the last hop
3✔
588
        // prior to the private destination. For example, if the user wants to
3✔
589
        // send 1000 sats to a private destination and the last hop's fee is 10
3✔
590
        // sats, then 1010 sats will have to arrive at the last hop. This means
591
        // that the probe has to be dispatched with 1010 sats to correctly
592
        // calculate the routing fee.
593
        //
594
        // Calculate the hop fee for the last hop manually.
595
        hopFee := lspHint.HopFee(*payReq.MilliSat)
596
        if err != nil {
597
                return nil, err
598
        }
599

600
        // Add the last hop's fee to the requested payment amount that we want
601
        // to get an estimate for.
602
        probeRequest.AmtMsat += int64(hopFee)
603

604
        // Use the hop hint's cltv delta as the payment request's final cltv
605
        // delta. The actual final cltv delta of the invoice will be added to
606
        // the payment probe's cltv delta.
607
        probeRequest.FinalCltvDelta = int32(lspHint.CLTVExpiryDelta)
3✔
608

3✔
UNCOV
609
        // Dispatch the payment probe with adjusted fee amount.
×
UNCOV
610
        resp, err := s.sendProbePayment(ctx, probeRequest)
×
611
        if err != nil {
612
                return nil, err
613
        }
614

3✔
615
        // If the payment probe failed we only return the failure reason and
3✔
616
        // leave the probe result params unaltered.
3✔
617
        if resp.FailureReason != lnrpc.PaymentFailureReason_FAILURE_REASON_NONE { //nolint:ll
3✔
618
                return resp, nil
3✔
619
        }
3✔
620

3✔
621
        // The probe succeeded, so we can add the last hop's fee to fee the
3✔
622
        // payment probe returned.
3✔
623
        resp.RoutingFeeMsat += int64(hopFee)
3✔
UNCOV
624

×
UNCOV
625
        // Add the final cltv delta of the invoice to the payment probe's total
×
UNCOV
626
        // cltv delta. This is the cltv delta for the hop behind the LSP.
×
627
        resp.TimeLockDelay += int64(payReq.MinFinalCLTVExpiry())
628

629
        return resp, nil
630
}
3✔
631

632
// isLSP checks if the route hints indicate an LSP. An LSP is indicated with
633
// true if the destination hop hint in each route hint has the same node id,
634
// false otherwise. If the destination hop hint of any route hint contains a
635
// public channel, the function returns false because we can directly send a
636
// probe to the final destination.
3✔
637
func isLSP(routeHints [][]zpay32.HopHint,
3✔
638
        fetchChannelEndpoints FetchChannelEndpoints) bool {
12✔
639

12✔
640
        if len(routeHints) == 0 || len(routeHints[0]) == 0 {
13✔
641
                return false
4✔
642
        }
4✔
643

644
        destHopHint := routeHints[0][len(routeHints[0])-1]
8✔
645

8✔
646
        // If the destination hop hint of the first route hint contains a public
8✔
647
        // channel we can send a probe to it directly, hence we don't signal an
8✔
648
        // LSP.
8✔
649
        _, _, err := fetchChannelEndpoints(destHopHint.ChannelID)
8✔
650
        if err == nil {
9✔
651
                return false
4✔
652
        }
4✔
653

6✔
654
        for i := 1; i < len(routeHints); i++ {
15✔
655
                // Skip empty route hints.
8✔
656
                if len(routeHints[i]) == 0 {
5✔
657
                        continue
3✔
658
                }
3✔
659

3✔
660
                lastHop := routeHints[i][len(routeHints[i])-1]
8✔
661

8✔
662
                // If the last hop hint of any route hint contains a public
8✔
663
                // channel we can send a probe to it directly, hence we don't
8✔
664
                // signal an LSP.
5✔
665
                _, _, err = fetchChannelEndpoints(lastHop.ChannelID)
5✔
666
                if err == nil {
6✔
667
                        return false
7✔
668
                }
4✔
669

3✔
670
                idMatchesRefNode := bytes.Equal(
4✔
671
                        lastHop.NodeID.SerializeCompressed(),
4✔
672
                        destHopHint.NodeID.SerializeCompressed(),
4✔
673
                )
7✔
674
                if !idMatchesRefNode {
8✔
675
                        return false
4✔
676
                }
4✔
677
        }
3✔
678

3✔
679
        // We ensured that the destination hop hint doesn't contain a public
3✔
680
        // channel, and that all destination hop hints of all route hints match,
681
        // so we signal an LSP.
682
        return true
5✔
683
}
3✔
684

3✔
685
// prepareLspRouteHints assumes that the isLsp heuristic returned true for the
3✔
686
// route hints passed in here. It constructs a modified list of route hints that
3✔
687
// allows the caller to probe the LSP, which itself is returned as a separate
6✔
688
// hop hint.
3✔
689
func prepareLspRouteHints(routeHints [][]zpay32.HopHint,
3✔
690
        amt lnwire.MilliSatoshi) ([][]zpay32.HopHint, *zpay32.HopHint, error) {
5✔
691

5✔
692
        if len(routeHints) == 0 {
5✔
693
                return nil, nil, fmt.Errorf("no route hints provided")
694
        }
695

3✔
696
        // Create the LSP hop hint. We are probing for the worst case fee and
697
        // cltv delta. So we look for the max values amongst all LSP hop hints.
698
        refHint := routeHints[0][len(routeHints[0])-1]
5✔
699
        refHint.CLTVExpiryDelta = maxLspCltvDelta(routeHints)
5✔
700
        refHint.FeeBaseMSat, refHint.FeeProportionalMillionths = maxLspFee(
5✔
701
                routeHints, amt,
5✔
702
        )
5✔
703

8✔
704
        // We construct a modified list of route hints that allows the caller to
8✔
705
        // probe the LSP.
8✔
706
        adjustedHints := make([][]zpay32.HopHint, 0, len(routeHints))
5✔
707

5✔
708
        // Strip off the LSP hop hint from all route hints.
5✔
709
        for i := 0; i < len(routeHints); i++ {
13✔
710
                hint := routeHints[i]
8✔
711
                if len(hint) > 1 {
16✔
712
                        adjustedHints = append(
8✔
713
                                adjustedHints, hint[:len(hint)-1],
8✔
714
                        )
8✔
715
                }
8✔
716
        }
3✔
717

3✔
718
        return adjustedHints, &refHint, nil
8✔
719
}
3✔
720

3✔
721
// maxLspFee returns base fee and fee rate amongst all LSP route hints that
3✔
722
// results in the overall highest fee for the given amount.
6✔
723
func maxLspFee(routeHints [][]zpay32.HopHint, amt lnwire.MilliSatoshi) (uint32,
3✔
724
        uint32) {
8✔
725

5✔
726
        var maxFeePpm uint32
5✔
727
        var maxBaseFee uint32
5✔
728
        var maxTotalFee lnwire.MilliSatoshi
5✔
729
        for _, rh := range routeHints {
13✔
730
                lastHop := rh[len(rh)-1]
8✔
731
                lastHopFee := lastHop.HopFee(amt)
11✔
732
                if lastHopFee > maxTotalFee {
14✔
733
                        maxTotalFee = lastHopFee
6✔
734
                        maxBaseFee = lastHop.FeeBaseMSat
6✔
735
                        maxFeePpm = lastHop.FeeProportionalMillionths
6✔
736
                }
6✔
737
        }
3✔
738

3✔
739
        return maxBaseFee, maxFeePpm
8✔
740
}
3✔
741

3✔
742
// maxLspCltvDelta returns the maximum cltv delta amongst all LSP route hints.
6✔
743
func maxLspCltvDelta(routeHints [][]zpay32.HopHint) uint16 {
8✔
744
        var maxCltvDelta uint16
8✔
745
        for _, rh := range routeHints {
19✔
746
                rhLastHop := rh[len(rh)-1]
11✔
747
                if rhLastHop.CLTVExpiryDelta > maxCltvDelta {
15✔
748
                        maxCltvDelta = rhLastHop.CLTVExpiryDelta
7✔
749
                }
7✔
750
        }
751

752
        return maxCltvDelta
8✔
753
}
754

755
// probePaymentStream is a custom implementation of the grpc.ServerStream
756
// interface. It is used to send payment status updates to the caller on the
3✔
757
// stream channel.
3✔
758
type probePaymentStream struct {
6✔
759
        Router_SendPaymentV2Server
3✔
760

6✔
761
        stream chan *lnrpc.Payment
3✔
762
        ctx    context.Context //nolint:containedctx
3✔
763
}
764

765
// Send sends a payment status update to a payment stream that the caller can
3✔
766
// evaluate.
767
func (p *probePaymentStream) Send(response *lnrpc.Payment) error {
768
        select {
769
        case p.stream <- response:
770

771
        case <-p.ctx.Done():
772
                return p.ctx.Err()
773
        }
774

775
        return nil
776
}
777

778
// Context returns the context of the stream.
779
func (p *probePaymentStream) Context() context.Context {
780
        return p.ctx
3✔
781
}
3✔
782

3✔
783
// sendProbePayment sends a payment to a target node in order to obtain
784
// potential routing fees for it. The payment request has to contain a payment
785
// hash that is guaranteed to be unknown to the target node, so it cannot settle
786
// the payment. This method invokes a payment request loop in a goroutine and
787
// awaits payment status updates.
788
func (s *Server) sendProbePayment(ctx context.Context,
3✔
789
        req *SendPaymentRequest) (*RouteFeeResponse, error) {
790

791
        // We'll launch a goroutine to send the payment probes.
792
        errChan := make(chan error, 1)
3✔
793
        defer close(errChan)
3✔
794

3✔
795
        paymentStream := &probePaymentStream{
796
                stream: make(chan *lnrpc.Payment),
797
                ctx:    ctx,
798
        }
799
        go func() {
800
                err := s.SendPaymentV2(req, paymentStream)
801
                if err != nil {
802
                        select {
3✔
803
                        case errChan <- err:
3✔
804

3✔
805
                        case <-paymentStream.ctx.Done():
3✔
806
                                return
3✔
807
                        }
3✔
808
                }
3✔
809
        }()
3✔
810

3✔
811
        for {
3✔
812
                select {
6✔
813
                case payment := <-paymentStream.stream:
3✔
814
                        switch payment.Status {
3✔
815
                        case lnrpc.Payment_INITIATED:
×
UNCOV
816
                        case lnrpc.Payment_IN_FLIGHT:
×
817
                        case lnrpc.Payment_SUCCEEDED:
818
                                return nil, errors.New("warning, the fee " +
×
819
                                        "estimation payment probe " +
×
820
                                        "unexpectedly succeeded. Please reach" +
821
                                        "out to the probe destination to " +
822
                                        "negotiate a refund. Otherwise the " +
823
                                        "payment probe amount is lost forever")
824

6✔
825
                        case lnrpc.Payment_FAILED:
3✔
826
                                // Incorrect payment details point to a
3✔
827
                                // successful probe.
3✔
UNCOV
828
                                //nolint:ll
×
829
                                if payment.FailureReason == lnrpc.PaymentFailureReason_FAILURE_REASON_INCORRECT_PAYMENT_DETAILS {
3✔
UNCOV
830
                                        return paymentDetails(payment)
×
UNCOV
831
                                }
×
832

UNCOV
833
                                return &RouteFeeResponse{
×
UNCOV
834
                                        RoutingFeeMsat: 0,
×
UNCOV
835
                                        TimeLockDelay:  0,
×
UNCOV
836
                                        FailureReason:  payment.FailureReason,
×
837
                                }, nil
838

3✔
839
                        default:
3✔
840
                                return nil, errors.New("unexpected payment " +
3✔
841
                                        "status")
3✔
842
                        }
6✔
843

3✔
844
                case err := <-errChan:
3✔
845
                        return nil, err
846

3✔
847
                case <-s.quit:
3✔
848
                        return nil, errServerShuttingDown
3✔
849
                }
3✔
850
        }
3✔
851
}
852

UNCOV
853
func paymentDetails(payment *lnrpc.Payment) (*RouteFeeResponse, error) {
×
UNCOV
854
        fee, timeLock, err := timelockAndFee(payment)
×
855
        if errors.Is(err, errUnexpectedFailureSource) {
856
                return nil, err
857
        }
×
858

859
        return &RouteFeeResponse{
UNCOV
860
                RoutingFeeMsat: fee,
×
UNCOV
861
                TimeLockDelay:  timeLock,
×
862
                FailureReason:  lnrpc.PaymentFailureReason_FAILURE_REASON_NONE,
863
        }, nil
864
}
865

866
// timelockAndFee returns the fee and total time lock of the last payment
3✔
867
// attempt.
3✔
868
func timelockAndFee(p *lnrpc.Payment) (int64, int64, error) {
3✔
UNCOV
869
        if len(p.Htlcs) == 0 {
×
870
                return 0, 0, nil
×
871
        }
872

3✔
873
        lastAttempt := p.Htlcs[len(p.Htlcs)-1]
3✔
874
        if lastAttempt == nil {
3✔
875
                return 0, 0, errMissingPaymentAttempt
3✔
876
        }
3✔
877

878
        lastRoute := lastAttempt.Route
879
        if lastRoute == nil {
880
                return 0, 0, errMissingRoute
881
        }
3✔
882

3✔
UNCOV
883
        hopFailureIndex := lastAttempt.Failure.FailureSourceIndex
×
UNCOV
884
        finalHopIndex := uint32(len(lastRoute.Hops))
×
885
        if hopFailureIndex != finalHopIndex {
886
                return 0, 0, errUnexpectedFailureSource
3✔
887
        }
3✔
888

UNCOV
889
        return lastRoute.TotalFeesMsat, int64(lastRoute.TotalTimeLock), nil
×
890
}
891

3✔
892
// SendToRouteV2 sends a payment through a predefined route. The response of
3✔
893
// this call contains structured error information.
894
func (s *Server) SendToRouteV2(ctx context.Context,
895
        req *SendToRouteRequest) (*lnrpc.HTLCAttempt, error) {
896

3✔
897
        if req.Route == nil {
3✔
898
                return nil, fmt.Errorf("unable to send, no routes provided")
3✔
899
        }
×
900

901
        route, err := s.cfg.RouterBackend.UnmarshallRoute(req.Route)
902
        if err != nil {
3✔
903
                return nil, err
904
        }
905

906
        hash, err := lntypes.MakeHash(req.PaymentHash)
907
        if err != nil {
908
                return nil, err
3✔
909
        }
3✔
910

3✔
UNCOV
911
        firstHopRecords := lnwire.CustomRecords(req.FirstHopCustomRecords)
×
UNCOV
912
        if err := firstHopRecords.Validate(); err != nil {
×
913
                return nil, err
914
        }
3✔
915

3✔
UNCOV
916
        var attempt *channeldb.HTLCAttempt
×
UNCOV
917

×
918
        // Pass route to the router. This call returns the full htlc attempt
919
        // information as it is stored in the database. It is possible that both
3✔
920
        // the attempt return value and err are non-nil. This can happen when
3✔
UNCOV
921
        // the attempt was already initiated before the error happened. In that
×
UNCOV
922
        // case, we give precedence to the attempt information as stored in the
×
923
        // db.
924
        if req.SkipTempErr {
3✔
925
                attempt, err = s.cfg.Router.SendToRouteSkipTempErr(
3✔
926
                        hash, route, firstHopRecords,
×
927
                )
×
928
        } else {
929
                attempt, err = s.cfg.Router.SendToRoute(
3✔
930
                        hash, route, firstHopRecords,
3✔
931
                )
3✔
932
        }
3✔
933
        if attempt != nil {
3✔
934
                rpcAttempt, err := s.cfg.RouterBackend.MarshalHTLCAttempt(
3✔
935
                        *attempt,
3✔
936
                )
3✔
937
                if err != nil {
3✔
938
                        return nil, err
×
939
                }
×
UNCOV
940
                return rpcAttempt, nil
×
941
        }
3✔
942

3✔
943
        // Transform user errors to grpc code.
3✔
944
        switch {
3✔
945
        case errors.Is(err, channeldb.ErrPaymentExists):
3✔
946
                fallthrough
6✔
947

3✔
948
        case errors.Is(err, channeldb.ErrPaymentInFlight):
3✔
949
                fallthrough
3✔
950

3✔
951
        case errors.Is(err, channeldb.ErrAlreadyPaid):
×
952
                return nil, status.Error(
×
953
                        codes.AlreadyExists, err.Error(),
3✔
954
                )
955
        }
956

957
        return nil, err
×
958
}
959

960
// ResetMissionControl clears all mission control state and starts with a clean
961
// slate.
962
func (s *Server) ResetMissionControl(ctx context.Context,
963
        req *ResetMissionControlRequest) (*ResetMissionControlResponse, error) {
UNCOV
964

×
UNCOV
965
        err := s.cfg.RouterBackend.MissionControl.ResetHistory()
×
UNCOV
966
        if err != nil {
×
967
                return nil, err
×
968
        }
969

UNCOV
970
        return &ResetMissionControlResponse{}, nil
×
971
}
972

973
// GetMissionControlConfig returns our current mission control config.
974
func (s *Server) GetMissionControlConfig(ctx context.Context,
975
        req *GetMissionControlConfigRequest) (*GetMissionControlConfigResponse,
976
        error) {
3✔
977

3✔
978
        // Query the current mission control config.
3✔
979
        cfg := s.cfg.RouterBackend.MissionControl.GetConfig()
3✔
UNCOV
980
        resp := &GetMissionControlConfigResponse{
×
UNCOV
981
                Config: &MissionControlConfig{
×
982
                        MaximumPaymentResults: uint32(cfg.MaxMcHistory),
983
                        MinimumFailureRelaxInterval: uint64(
3✔
984
                                cfg.MinFailureRelaxInterval.Seconds(),
985
                        ),
986
                },
987
        }
988

989
        // We only populate fields based on the current estimator.
3✔
990
        switch v := cfg.Estimator.Config().(type) {
3✔
991
        case routing.AprioriConfig:
3✔
992
                resp.Config.Model = MissionControlConfig_APRIORI
3✔
993
                aCfg := AprioriParameters{
3✔
994
                        HalfLifeSeconds:  uint64(v.PenaltyHalfLife.Seconds()),
3✔
995
                        HopProbability:   v.AprioriHopProbability,
3✔
996
                        Weight:           v.AprioriWeight,
3✔
997
                        CapacityFraction: v.CapacityFraction,
3✔
998
                }
3✔
999

3✔
1000
                // Populate deprecated fields.
3✔
1001
                resp.Config.HalfLifeSeconds = uint64(
3✔
1002
                        v.PenaltyHalfLife.Seconds(),
3✔
1003
                )
3✔
1004
                resp.Config.HopProbability = float32(v.AprioriHopProbability)
3✔
1005
                resp.Config.Weight = float32(v.AprioriWeight)
3✔
1006

3✔
1007
                resp.Config.EstimatorConfig = &MissionControlConfig_Apriori{
3✔
1008
                        Apriori: &aCfg,
3✔
1009
                }
3✔
1010

3✔
1011
        case routing.BimodalConfig:
3✔
1012
                resp.Config.Model = MissionControlConfig_BIMODAL
3✔
1013
                bCfg := BimodalParameters{
3✔
1014
                        NodeWeight: v.BimodalNodeWeight,
3✔
1015
                        ScaleMsat:  uint64(v.BimodalScaleMsat),
3✔
1016
                        DecayTime:  uint64(v.BimodalDecayTime.Seconds()),
3✔
1017
                }
3✔
1018

3✔
1019
                resp.Config.EstimatorConfig = &MissionControlConfig_Bimodal{
3✔
1020
                        Bimodal: &bCfg,
3✔
1021
                }
3✔
1022

3✔
1023
        default:
1024
                return nil, fmt.Errorf("unknown estimator config type %T", v)
3✔
1025
        }
3✔
1026

3✔
1027
        return resp, nil
3✔
1028
}
3✔
1029

3✔
1030
// SetMissionControlConfig sets parameters in the mission control config.
3✔
1031
func (s *Server) SetMissionControlConfig(ctx context.Context,
3✔
1032
        req *SetMissionControlConfigRequest) (*SetMissionControlConfigResponse,
3✔
1033
        error) {
3✔
1034

3✔
1035
        mcCfg := &routing.MissionControlConfig{
UNCOV
1036
                MaxMcHistory: int(req.Config.MaximumPaymentResults),
×
UNCOV
1037
                MinFailureRelaxInterval: time.Duration(
×
1038
                        req.Config.MinimumFailureRelaxInterval,
1039
                ) * time.Second,
1040
        }
3✔
1041

1042
        switch req.Config.Model {
1043
        case MissionControlConfig_APRIORI:
1044
                var aprioriConfig routing.AprioriConfig
1045

1046
                // Determine the apriori config with backward compatibility
3✔
1047
                // should the api use deprecated fields.
3✔
1048
                switch v := req.Config.EstimatorConfig.(type) {
3✔
1049
                case *MissionControlConfig_Bimodal:
3✔
1050
                        return nil, fmt.Errorf("bimodal config " +
3✔
1051
                                "provided, but apriori model requested")
3✔
1052

3✔
1053
                case *MissionControlConfig_Apriori:
3✔
1054
                        aprioriConfig = routing.AprioriConfig{
3✔
1055
                                PenaltyHalfLife: time.Duration(
3✔
1056
                                        v.Apriori.HalfLifeSeconds,
3✔
1057
                                ) * time.Second,
3✔
1058
                                AprioriHopProbability: v.Apriori.HopProbability,
3✔
1059
                                AprioriWeight:         v.Apriori.Weight,
3✔
1060
                                CapacityFraction: v.Apriori.
3✔
1061
                                        CapacityFraction,
3✔
1062
                        }
3✔
1063

3✔
1064
                default:
3✔
1065
                        aprioriConfig = routing.AprioriConfig{
1066
                                PenaltyHalfLife: time.Duration(
3✔
1067
                                        int64(req.Config.HalfLifeSeconds),
3✔
1068
                                ) * time.Second,
3✔
1069
                                AprioriHopProbability: float64(
3✔
1070
                                        req.Config.HopProbability,
3✔
1071
                                ),
3✔
1072
                                AprioriWeight:    float64(req.Config.Weight),
3✔
1073
                                CapacityFraction: routing.DefaultCapacityFraction, //nolint:ll
3✔
1074
                        }
3✔
1075
                }
3✔
1076

1077
                estimator, err := routing.NewAprioriEstimator(aprioriConfig)
3✔
1078
                if err != nil {
3✔
1079
                        return nil, err
3✔
1080
                }
3✔
1081
                mcCfg.Estimator = estimator
3✔
1082

3✔
1083
        case MissionControlConfig_BIMODAL:
3✔
1084
                cfg, ok := req.Config.
3✔
1085
                        EstimatorConfig.(*MissionControlConfig_Bimodal)
3✔
1086
                if !ok {
3✔
1087
                        return nil, fmt.Errorf("bimodal estimator requested " +
3✔
1088
                                "but corresponding config not set")
1089
                }
1090
                bCfg := cfg.Bimodal
3✔
1091

3✔
UNCOV
1092
                bimodalConfig := routing.BimodalConfig{
×
UNCOV
1093
                        BimodalDecayTime: time.Duration(
×
1094
                                bCfg.DecayTime,
3✔
1095
                        ) * time.Second,
1096
                        BimodalScaleMsat:  lnwire.MilliSatoshi(bCfg.ScaleMsat),
3✔
1097
                        BimodalNodeWeight: bCfg.NodeWeight,
3✔
1098
                }
3✔
1099

3✔
UNCOV
1100
                estimator, err := routing.NewBimodalEstimator(bimodalConfig)
×
UNCOV
1101
                if err != nil {
×
1102
                        return nil, err
×
1103
                }
3✔
1104
                mcCfg.Estimator = estimator
3✔
1105

3✔
1106
        default:
3✔
1107
                return nil, fmt.Errorf("unknown estimator type %v",
3✔
1108
                        req.Config.Model)
3✔
1109
        }
3✔
1110

3✔
1111
        return &SetMissionControlConfigResponse{},
3✔
1112
                s.cfg.RouterBackend.MissionControl.SetConfig(mcCfg)
3✔
1113
}
3✔
1114

3✔
1115
// QueryMissionControl exposes the internal mission control state to callers. It
1116
// is a development feature.
1117
func (s *Server) QueryMissionControl(_ context.Context,
3✔
1118
        _ *QueryMissionControlRequest) (*QueryMissionControlResponse, error) {
1119

×
1120
        snapshot := s.cfg.RouterBackend.MissionControl.GetHistorySnapshot()
×
1121

×
1122
        rpcPairs := make([]*PairHistory, 0, len(snapshot.Pairs))
1123
        for _, p := range snapshot.Pairs {
1124
                // Prevent binding to loop variable.
3✔
1125
                pair := p
3✔
1126

1127
                rpcPair := PairHistory{
1128
                        NodeFrom: pair.Pair.From[:],
1129
                        NodeTo:   pair.Pair.To[:],
1130
                        History:  toRPCPairData(&pair.TimedPairResult),
1131
                }
×
1132

×
1133
                rpcPairs = append(rpcPairs, &rpcPair)
×
1134
        }
×
1135

1136
        response := QueryMissionControlResponse{
×
1137
                Pairs: rpcPairs,
×
1138
        }
×
1139

×
1140
        return &response, nil
×
1141
}
1142

1143
// toRPCPairData marshalls mission control pair data to the rpc struct.
UNCOV
1144
func toRPCPairData(data *routing.TimedPairResult) *PairData {
×
UNCOV
1145
        rpcData := PairData{
×
UNCOV
1146
                FailAmtSat:     int64(data.FailAmt.ToSatoshis()),
×
UNCOV
1147
                FailAmtMsat:    int64(data.FailAmt),
×
1148
                SuccessAmtSat:  int64(data.SuccessAmt.ToSatoshis()),
UNCOV
1149
                SuccessAmtMsat: int64(data.SuccessAmt),
×
UNCOV
1150
        }
×
UNCOV
1151

×
UNCOV
1152
        if !data.FailTime.IsZero() {
×
UNCOV
1153
                rpcData.FailTime = data.FailTime.Unix()
×
1154
        }
1155

1156
        if !data.SuccessTime.IsZero() {
1157
                rpcData.SuccessTime = data.SuccessTime.Unix()
3✔
1158
        }
3✔
1159

3✔
1160
        return &rpcData
3✔
1161
}
3✔
1162

3✔
1163
// XImportMissionControl imports the state provided to our internal mission
3✔
1164
// control. Only entries that are fresher than our existing state will be used.
3✔
1165
func (s *Server) XImportMissionControl(_ context.Context,
6✔
1166
        req *XImportMissionControlRequest) (*XImportMissionControlResponse,
3✔
1167
        error) {
3✔
1168

1169
        if len(req.Pairs) == 0 {
3✔
1170
                return nil, errors.New("at least one pair required for import")
×
1171
        }
×
1172

1173
        snapshot := &routing.MissionControlSnapshot{
3✔
1174
                Pairs: make(
1175
                        []routing.MissionControlPairSnapshot, len(req.Pairs),
1176
                ),
1177
        }
1178

1179
        for i, pairResult := range req.Pairs {
1180
                pairSnapshot, err := toPairSnapshot(pairResult)
3✔
1181
                if err != nil {
3✔
1182
                        return nil, err
3✔
UNCOV
1183
                }
×
1184

1185
                snapshot.Pairs[i] = *pairSnapshot
1186
        }
3✔
1187

3✔
1188
        err := s.cfg.RouterBackend.MissionControl.ImportHistory(
3✔
1189
                snapshot, req.Force,
3✔
1190
        )
3✔
1191
        if err != nil {
3✔
1192
                return nil, err
6✔
1193
        }
3✔
1194

6✔
1195
        return &XImportMissionControlResponse{}, nil
3✔
1196
}
3✔
1197

1198
func toPairSnapshot(pairResult *PairHistory) (*routing.MissionControlPairSnapshot,
3✔
1199
        error) {
1200

1201
        from, err := route.NewVertexFromBytes(pairResult.NodeFrom)
3✔
1202
        if err != nil {
3✔
1203
                return nil, err
3✔
1204
        }
3✔
1205

UNCOV
1206
        to, err := route.NewVertexFromBytes(pairResult.NodeTo)
×
1207
        if err != nil {
1208
                return nil, err
3✔
1209
        }
1210

1211
        pairPrefix := fmt.Sprintf("pair: %v -> %v:", from, to)
1212

3✔
1213
        if from == to {
3✔
1214
                return nil, fmt.Errorf("%v source and destination node must "+
3✔
1215
                        "differ", pairPrefix)
3✔
1216
        }
×
1217

1218
        failAmt, failTime, err := getPair(
1219
                lnwire.MilliSatoshi(pairResult.History.FailAmtMsat),
3✔
1220
                btcutil.Amount(pairResult.History.FailAmtSat),
3✔
UNCOV
1221
                pairResult.History.FailTime,
×
UNCOV
1222
                true,
×
1223
        )
1224
        if err != nil {
3✔
1225
                return nil, fmt.Errorf("%v invalid failure: %w", pairPrefix,
3✔
1226
                        err)
3✔
UNCOV
1227
        }
×
1228

UNCOV
1229
        successAmt, successTime, err := getPair(
×
1230
                lnwire.MilliSatoshi(pairResult.History.SuccessAmtMsat),
1231
                btcutil.Amount(pairResult.History.SuccessAmtSat),
3✔
1232
                pairResult.History.SuccessTime,
3✔
1233
                false,
3✔
1234
        )
3✔
1235
        if err != nil {
3✔
1236
                return nil, fmt.Errorf("%v invalid success: %w", pairPrefix,
3✔
1237
                        err)
6✔
1238
        }
3✔
1239

3✔
1240
        if successAmt == 0 && failAmt == 0 {
3✔
1241
                return nil, fmt.Errorf("%v: either success or failure result "+
1242
                        "required", pairPrefix)
3✔
1243
        }
3✔
1244

3✔
1245
        pair := routing.NewDirectedNodePair(from, to)
3✔
1246

3✔
1247
        result := &routing.TimedPairResult{
3✔
1248
                FailAmt:     failAmt,
3✔
UNCOV
1249
                FailTime:    failTime,
×
UNCOV
1250
                SuccessAmt:  successAmt,
×
UNCOV
1251
                SuccessTime: successTime,
×
1252
        }
1253

3✔
UNCOV
1254
        return &routing.MissionControlPairSnapshot{
×
UNCOV
1255
                Pair:            pair,
×
UNCOV
1256
                TimedPairResult: *result,
×
1257
        }, nil
1258
}
3✔
1259

3✔
1260
// getPair validates the values provided for a mission control result and
3✔
1261
// returns the msat amount and timestamp for it. `isFailure` can be used to
3✔
1262
// default values to 0 instead of returning an error.
3✔
1263
func getPair(amtMsat lnwire.MilliSatoshi, amtSat btcutil.Amount,
3✔
1264
        timestamp int64, isFailure bool) (lnwire.MilliSatoshi, time.Time,
3✔
1265
        error) {
3✔
1266

3✔
1267
        amt, err := getMsatPairValue(amtMsat, amtSat)
3✔
1268
        if err != nil {
3✔
1269
                return 0, time.Time{}, err
3✔
1270
        }
3✔
1271

1272
        var (
1273
                timeSet   = timestamp != 0
1274
                amountSet = amt != 0
1275
        )
1276

1277
        switch {
1278
        // If a timestamp and amount if provided, return those values.
3✔
1279
        case timeSet && amountSet:
3✔
1280
                return amt, time.Unix(timestamp, 0), nil
3✔
1281

6✔
1282
        // Return an error if it does have a timestamp without an amount, and
3✔
1283
        // it's not expected to be a failure.
3✔
1284
        case !isFailure && timeSet && !amountSet:
1285
                return 0, time.Time{}, errors.New("non-zero timestamp " +
3✔
1286
                        "requires non-zero amount for success pairs")
3✔
1287

3✔
1288
        // Return an error if it does have an amount without a timestamp, and
3✔
1289
        // it's not expected to be a failure.
3✔
1290
        case !isFailure && !timeSet && amountSet:
3✔
1291
                return 0, time.Time{}, errors.New("non-zero amount for " +
1292
                        "success pairs requires non-zero timestamp")
3✔
1293

3✔
1294
        default:
1295
                return 0, time.Time{}, nil
1296
        }
1297
}
1298

1299
// getMsatPairValue checks the msat and sat values set for a pair and ensures
1300
// that the values provided are either the same, or only a single value is set.
1301
func getMsatPairValue(msatValue lnwire.MilliSatoshi,
1302
        satValue btcutil.Amount) (lnwire.MilliSatoshi, error) {
UNCOV
1303

×
UNCOV
1304
        // If our msat value converted to sats equals our sat value, we just
×
UNCOV
1305
        // return the msat value, since the values are the same.
×
1306
        if msatValue.ToSatoshis() == satValue {
1307
                return msatValue, nil
3✔
1308
        }
3✔
1309

1310
        // If we have no msatValue, we can just return our state value even if
1311
        // it is zero, because it's impossible that we have mismatched values.
1312
        if msatValue == 0 {
1313
                return lnwire.MilliSatoshi(satValue * 1000), nil
1314
        }
1315

3✔
1316
        // Likewise, we can just use msat value if we have no sat value set.
3✔
1317
        if satValue == 0 {
3✔
1318
                return msatValue, nil
3✔
1319
        }
6✔
1320

3✔
1321
        // If our values are non-zero but not equal, we have invalid amounts
3✔
1322
        // set, so we fail.
1323
        return 0, fmt.Errorf("msat: %v and sat: %v values not equal", msatValue,
1324
                satValue)
1325
}
3✔
1326

1327
// TrackPaymentV2 returns a stream of payment state updates. The stream is
1328
// closed when the payment completes.
1329
func (s *Server) TrackPaymentV2(request *TrackPaymentRequest,
1330
        stream Router_TrackPaymentV2Server) error {
3✔
UNCOV
1331

×
UNCOV
1332
        payHash, err := lntypes.MakeHash(request.PaymentHash)
×
1333
        if err != nil {
1334
                return err
1335
        }
1336

3✔
1337
        log.Debugf("TrackPayment called for payment %v", payHash)
3✔
1338

1339
        // Make the subscription.
1340
        sub, err := s.subscribePayment(payHash)
1341
        if err != nil {
1342
                return err
1343
        }
3✔
1344

3✔
1345
        return s.trackPayment(sub, payHash, stream, request.NoInflightUpdates)
3✔
1346
}
3✔
1347

1348
// subscribePayment subscribes to the payment updates for the given payment
1349
// hash.
1350
func (s *Server) subscribePayment(identifier lntypes.Hash) (
3✔
1351
        routing.ControlTowerSubscriber, error) {
3✔
1352

3✔
1353
        // Make the subscription.
3✔
1354
        router := s.cfg.RouterBackend
3✔
UNCOV
1355
        sub, err := router.Tower.SubscribePayment(identifier)
×
UNCOV
1356

×
1357
        switch {
1358
        case errors.Is(err, channeldb.ErrPaymentNotInitiated):
3✔
1359
                return nil, status.Error(codes.NotFound, err.Error())
1360

1361
        case err != nil:
1362
                return nil, err
1363
        }
1364

3✔
1365
        return sub, nil
3✔
1366
}
3✔
1367

3✔
1368
// trackPayment writes payment status updates to the provided stream.
3✔
1369
func (s *Server) trackPayment(subscription routing.ControlTowerSubscriber,
3✔
1370
        identifier lntypes.Hash, stream Router_TrackPaymentV2Server,
3✔
UNCOV
1371
        noInflightUpdates bool) error {
×
UNCOV
1372

×
1373
        err := s.trackPaymentStream(
UNCOV
1374
                stream.Context(), subscription, noInflightUpdates, stream.Send,
×
UNCOV
1375
        )
×
1376
        switch {
1377
        case err == nil:
1378
                return nil
3✔
1379

1380
        // If the context is canceled, we don't return an error.
1381
        case errors.Is(err, context.Canceled):
1382
                log.Infof("Payment stream %v canceled", identifier)
1383

1384
                return nil
3✔
1385

3✔
1386
        default:
3✔
1387
        }
3✔
1388

3✔
1389
        // Otherwise, we will log and return the error as the stream has
3✔
1390
        // received an error from the payment lifecycle.
3✔
1391
        log.Errorf("TrackPayment got error for payment %v: %v", identifier, err)
3✔
1392

1393
        return err
1394
}
3✔
1395

3✔
1396
// TrackPayments returns a stream of payment state updates.
3✔
1397
func (s *Server) TrackPayments(request *TrackPaymentsRequest,
3✔
1398
        stream Router_TrackPaymentsServer) error {
3✔
1399

3✔
1400
        log.Debug("TrackPayments called")
3✔
1401

3✔
1402
        router := s.cfg.RouterBackend
3✔
1403

3✔
1404
        // Subscribe to payments.
3✔
1405
        subscription, err := router.Tower.SubscribeAllPayments()
3✔
1406
        if err != nil {
3✔
1407
                return err
1408
        }
1409

1410
        // Stream updates to the client.
1411
        err = s.trackPaymentStream(
6✔
1412
                stream.Context(), subscription, request.NoInflightUpdates,
6✔
1413
                stream.Send,
6✔
1414
        )
6✔
1415

6✔
1416
        if errors.Is(err, context.Canceled) {
9✔
1417
                log.Debugf("TrackPayments payment stream canceled.")
6✔
1418
        }
6✔
1419

3✔
1420
        return err
3✔
1421
}
1422

1423
// trackPaymentStream streams payment updates to the client.
1424
func (s *Server) trackPaymentStream(context context.Context,
3✔
1425
        subscription routing.ControlTowerSubscriber, noInflightUpdates bool,
3✔
1426
        send func(*lnrpc.Payment) error) error {
6✔
1427

6✔
1428
        defer subscription.Close()
6✔
1429

9✔
1430
        // Stream updates back to the client.
6✔
1431
        for {
13✔
1432
                select {
7✔
1433
                case item, ok := <-subscription.Updates():
7✔
1434
                        if !ok {
4✔
1435
                                // No more payment updates.
1436
                                return nil
1437
                        }
1438
                        result := item.(*channeldb.MPPayment)
4✔
1439

7✔
1440
                        log.Tracef("Payment %v updated to state %v",
7✔
1441
                                result.Info.PaymentIdentifier, result.Status)
7✔
1442

7✔
1443
                        // Skip in-flight updates unless requested.
7✔
1444
                        if noInflightUpdates {
12✔
1445
                                if result.Status == channeldb.StatusInitiated {
5✔
1446
                                        continue
3✔
1447
                                }
6✔
1448
                                if result.Status == channeldb.StatusInFlight {
6✔
1449
                                        continue
4✔
1450
                                }
3✔
1451
                        }
3✔
1452

3✔
1453
                        rpcPayment, err := s.cfg.RouterBackend.MarshallPayment(
6✔
1454
                                result,
6✔
1455
                        )
6✔
1456
                        if err != nil {
6✔
1457
                                return err
6✔
1458
                        }
6✔
1459

3✔
1460
                        // Send event to the client.
1461
                        err = send(rpcPayment)
9✔
1462
                        if err != nil {
6✔
1463
                                return err
1464
                        }
1465

1466
                case <-s.quit:
3✔
1467
                        return errServerShuttingDown
3✔
1468

3✔
1469
                case <-context.Done():
6✔
1470
                        return context.Err()
3✔
1471
                }
1472
        }
1473
}
1474

3✔
1475
// BuildRoute builds a route from a list of hop addresses.
3✔
1476
func (s *Server) BuildRoute(_ context.Context,
UNCOV
1477
        req *BuildRouteRequest) (*BuildRouteResponse, error) {
×
1478

UNCOV
1479
        if len(req.HopPubkeys) == 0 {
×
1480
                return nil, errors.New("no hops specified")
×
1481
        }
1482

3✔
1483
        // Unmarshall hop list.
3✔
1484
        hops := make([]route.Vertex, len(req.HopPubkeys))
1485
        for i, pubkeyBytes := range req.HopPubkeys {
1486
                pubkey, err := route.NewVertexFromBytes(pubkeyBytes)
1487
                if err != nil {
1488
                        return nil, err
1489
                }
1490
                hops[i] = pubkey
3✔
1491
        }
3✔
1492

3✔
1493
        // Prepare BuildRoute call parameters from rpc request.
UNCOV
1494
        var amt fn.Option[lnwire.MilliSatoshi]
×
1495
        if req.AmtMsat != 0 {
1496
                rpcAmt := lnwire.MilliSatoshi(req.AmtMsat)
1497
                amt = fn.Some(rpcAmt)
3✔
1498
        }
6✔
1499

3✔
1500
        var outgoingChan *uint64
3✔
UNCOV
1501
        if req.OutgoingChanId != 0 {
×
1502
                outgoingChan = &req.OutgoingChanId
×
1503
        }
3✔
1504

1505
        var payAddr fn.Option[[32]byte]
1506
        if len(req.PaymentAddr) != 0 {
1507
                var backingPayAddr [32]byte
3✔
1508
                copy(backingPayAddr[:], req.PaymentAddr)
6✔
1509

3✔
1510
                payAddr = fn.Some(backingPayAddr)
3✔
1511
        }
3✔
1512

1513
        if req.FinalCltvDelta == 0 {
3✔
1514
                req.FinalCltvDelta = int32(
3✔
1515
                        s.cfg.RouterBackend.DefaultFinalCltvDelta,
×
1516
                )
×
1517
        }
1518

3✔
1519
        var firstHopBlob fn.Option[[]byte]
6✔
1520
        if len(req.FirstHopCustomRecords) > 0 {
3✔
1521
                firstHopRecords := lnwire.CustomRecords(
3✔
1522
                        req.FirstHopCustomRecords,
3✔
1523
                )
3✔
1524
                if err := firstHopRecords.Validate(); err != nil {
3✔
1525
                        return nil, err
1526
                }
3✔
1527

1528
                firstHopData, err := firstHopRecords.Serialize()
×
1529
                if err != nil {
×
1530
                        return nil, err
×
1531
                }
1532
                firstHopBlob = fn.Some(firstHopData)
3✔
1533
        }
3✔
1534

1535
        // Build the route and return it to the caller.
UNCOV
1536
        route, err := s.cfg.Router.BuildRoute(
×
UNCOV
1537
                amt, hops, outgoingChan, req.FinalCltvDelta, payAddr,
×
UNCOV
1538
                firstHopBlob,
×
UNCOV
1539
        )
×
1540
        if err != nil {
1541
                return nil, err
×
1542
        }
×
1543

UNCOV
1544
        rpcRoute, err := s.cfg.RouterBackend.MarshallRoute(route)
×
UNCOV
1545
        if err != nil {
×
1546
                return nil, err
1547
        }
1548

1549
        routeResp := &BuildRouteResponse{
3✔
1550
                Route: rpcRoute,
3✔
1551
        }
3✔
1552

3✔
1553
        return routeResp, nil
3✔
1554
}
1555

1556
// SubscribeHtlcEvents creates a uni-directional stream from the server to
1557
// the client which delivers a stream of htlc events.
3✔
1558
func (s *Server) SubscribeHtlcEvents(_ *SubscribeHtlcEventsRequest,
3✔
UNCOV
1559
        stream Router_SubscribeHtlcEventsServer) error {
×
UNCOV
1560

×
1561
        htlcClient, err := s.cfg.RouterBackend.SubscribeHtlcEvents()
1562
        if err != nil {
3✔
1563
                return err
3✔
1564
        }
3✔
1565
        defer htlcClient.Cancel()
3✔
1566

3✔
1567
        // Send out an initial subscribed event so that the caller knows the
1568
        // point from which new events will be transmitted.
1569
        if err := stream.Send(&HtlcEvent{
1570
                Event: &HtlcEvent_SubscribedEvent{
1571
                        SubscribedEvent: &SubscribedEvent{},
1572
                },
3✔
1573
        }); err != nil {
3✔
1574
                return err
3✔
1575
        }
3✔
1576

UNCOV
1577
        for {
×
1578
                select {
3✔
1579
                case event := <-htlcClient.Updates():
3✔
1580
                        rpcEvent, err := rpcHtlcEvent(event)
3✔
1581
                        if err != nil {
3✔
1582
                                return err
3✔
1583
                        }
3✔
1584

3✔
1585
                        if err := stream.Send(rpcEvent); err != nil {
3✔
1586
                                return err
3✔
1587
                        }
×
1588

1589
                // If the stream's context is cancelled, return an error.
1590
                case <-stream.Context().Done():
6✔
1591
                        log.Debugf("htlc event stream cancelled")
3✔
1592
                        return stream.Context().Err()
3✔
1593

3✔
1594
                // If the subscribe client terminates, exit with an error.
3✔
1595
                case <-htlcClient.Quit():
×
1596
                        return errors.New("htlc event subscription terminated")
×
1597

1598
                // If the server has been signalled to shut down, exit.
3✔
1599
                case <-s.quit:
×
1600
                        return errServerShuttingDown
×
1601
                }
1602
        }
1603
}
3✔
1604

3✔
1605
// HtlcInterceptor is a bidirectional stream for streaming interception
3✔
1606
// requests to the caller.
1607
// Upon connection, it does the following:
1608
// 1. Check if there is already a live stream, if yes it rejects the request.
1609
// 2. Registered a ForwardInterceptor
1610
// 3. Delivers to the caller every √√ and detect his answer.
1611
// It uses a local implementation of holdForwardsStore to keep all the hold
1612
// forwards and find them when manual resolution is later needed.
UNCOV
1613
func (s *Server) HtlcInterceptor(stream Router_HtlcInterceptorServer) error {
×
1614
        // We ensure there is only one interceptor at a time.
1615
        if !atomic.CompareAndSwapInt32(&s.forwardInterceptorActive, 0, 1) {
1616
                return ErrInterceptorAlreadyExists
1617
        }
1618
        defer atomic.CompareAndSwapInt32(&s.forwardInterceptorActive, 1, 0)
1619

1620
        // Run the forward interceptor.
1621
        return newForwardInterceptor(
1622
                s.cfg.RouterBackend.InterceptableForwarder, stream,
1623
        ).run()
1624
}
1625

1626
// XAddLocalChanAliases is an experimental API that creates a set of new
3✔
1627
// channel SCID alias mappings. The final total set of aliases in the manager
3✔
1628
// after the add operation is returned. This is only a locally stored alias, and
3✔
1629
// will not be communicated to the channel peer via any message. Therefore,
1630
// routing over such an alias will only work if the peer also calls this same
1631
// RPC on their end. If an alias already exists, an error is returned.
3✔
1632
func (s *Server) XAddLocalChanAliases(_ context.Context,
3✔
1633
        in *AddAliasesRequest) (*AddAliasesResponse, error) {
3✔
1634

3✔
1635
        existingAliases := s.cfg.AliasMgr.ListAliases()
3✔
1636

3✔
1637
        // aliasExists checks if the new alias already exists in the alias map.
1638
        aliasExists := func(newAlias uint64,
1639
                baseScid lnwire.ShortChannelID) (bool, error) {
1640

1641
                // First check that we actually have a channel for the given
1642
                // base scid. This should succeed for any channel where the
1643
                // option-scid-alias feature bit was negotiated.
1644
                if _, ok := existingAliases[baseScid]; !ok {
1645
                        return false, fmt.Errorf("base scid %v not found",
1646
                                baseScid)
3✔
1647
                }
3✔
1648

3✔
1649
                for base, aliases := range existingAliases {
3✔
1650
                        for _, alias := range aliases {
3✔
1651
                                exists := alias.ToUint64() == newAlias
3✔
1652

6✔
1653
                                // Trying to add an alias that we already have
3✔
1654
                                // for another channel is wrong.
3✔
1655
                                if exists && base != baseScid {
3✔
1656
                                        return true, fmt.Errorf("%w: alias %v "+
3✔
1657
                                                "already exists for base scid "+
3✔
1658
                                                "%v", ErrAliasAlreadyExists,
×
1659
                                                alias, base)
×
1660
                                }
×
1661

1662
                                if exists {
6✔
1663
                                        return true, nil
6✔
1664
                                }
3✔
1665
                        }
3✔
1666
                }
3✔
1667

3✔
1668
                return false, nil
3✔
1669
        }
1670

UNCOV
1671
        for _, v := range in.AliasMaps {
×
UNCOV
1672
                baseScid := lnwire.NewShortChanIDFromInt(v.BaseScid)
×
UNCOV
1673

×
1674
                for _, rpcAlias := range v.Aliases {
1675
                        // If not, let's add it to the alias manager now.
6✔
1676
                        aliasScid := lnwire.NewShortChanIDFromInt(rpcAlias)
3✔
1677

3✔
1678
                        // But we only add it, if it's a valid alias, as defined
1679
                        // by the BOLT spec.
1680
                        if !aliasmgr.IsAlias(aliasScid) {
1681
                                return nil, fmt.Errorf("%w: SCID alias %v is "+
3✔
1682
                                        "not a valid alias", ErrNoValidAlias,
1683
                                        aliasScid)
1684
                        }
6✔
1685

3✔
1686
                        exists, err := aliasExists(rpcAlias, baseScid)
3✔
1687
                        if err != nil {
6✔
1688
                                return nil, err
3✔
1689
                        }
3✔
1690

3✔
1691
                        // If the alias already exists, we see that as an error.
3✔
1692
                        // This is to avoid "silent" collisions.
3✔
1693
                        if exists {
6✔
1694
                                return nil, fmt.Errorf("%w: SCID alias %v "+
3✔
1695
                                        "already exists", ErrAliasAlreadyExists,
3✔
1696
                                        rpcAlias)
3✔
1697
                        }
3✔
1698

1699
                        err = s.cfg.AliasMgr.AddLocalAlias(
3✔
1700
                                aliasScid, baseScid, false, true,
3✔
UNCOV
1701
                        )
×
UNCOV
1702
                        if err != nil {
×
1703
                                return nil, fmt.Errorf("error adding scid "+
1704
                                        "alias, base_scid=%v, alias_scid=%v: "+
1705
                                        "%w", baseScid, aliasScid, err)
1706
                        }
6✔
1707
                }
3✔
1708
        }
3✔
1709

3✔
1710
        return &AddAliasesResponse{
3✔
1711
                AliasMaps: lnrpc.MarshalAliasMap(s.cfg.AliasMgr.ListAliases()),
1712
        }, nil
3✔
1713
}
3✔
1714

3✔
1715
// XDeleteLocalChanAliases is an experimental API that deletes a set of alias
3✔
1716
// mappings. The final total set of aliases in the manager after the delete
1717
// operation is returned. The deletion will not be communicated to the channel
1718
// peer via any message.
1719
func (s *Server) XDeleteLocalChanAliases(_ context.Context,
1720
        in *DeleteAliasesRequest) (*DeleteAliasesResponse,
1721
        error) {
1722

1723
        for _, v := range in.AliasMaps {
3✔
1724
                baseScid := lnwire.NewShortChanIDFromInt(v.BaseScid)
3✔
1725

3✔
1726
                for _, alias := range v.Aliases {
1727
                        aliasScid := lnwire.NewShortChanIDFromInt(alias)
1728

1729
                        err := s.cfg.AliasMgr.DeleteLocalAlias(
1730
                                aliasScid, baseScid,
1731
                        )
1732
                        if err != nil {
1733
                                return nil, fmt.Errorf("error deleting scid "+
1734
                                        "alias, base_scid=%v, alias_scid=%v: "+
3✔
1735
                                        "%w", baseScid, aliasScid, err)
3✔
1736
                        }
6✔
1737
                }
3✔
1738
        }
3✔
1739

6✔
1740
        return &DeleteAliasesResponse{
3✔
1741
                AliasMaps: lnrpc.MarshalAliasMap(s.cfg.AliasMgr.ListAliases()),
3✔
1742
        }, nil
3✔
1743
}
3✔
1744

3✔
1745
func extractOutPoint(req *UpdateChanStatusRequest) (*wire.OutPoint, error) {
3✔
UNCOV
1746
        chanPoint := req.GetChanPoint()
×
UNCOV
1747
        txid, err := lnrpc.GetChanPointFundingTxid(chanPoint)
×
UNCOV
1748
        if err != nil {
×
1749
                return nil, err
×
1750
        }
1751
        index := chanPoint.OutputIndex
1752
        return wire.NewOutPoint(txid, index), nil
1753
}
3✔
1754

3✔
1755
// UpdateChanStatus allows channel state to be set manually.
3✔
1756
func (s *Server) UpdateChanStatus(_ context.Context,
1757
        req *UpdateChanStatusRequest) (*UpdateChanStatusResponse, error) {
1758

3✔
1759
        outPoint, err := extractOutPoint(req)
3✔
1760
        if err != nil {
3✔
1761
                return nil, err
3✔
1762
        }
×
1763

1764
        action := req.GetAction()
3✔
1765

3✔
1766
        log.Debugf("UpdateChanStatus called for channel(%v) with "+
1767
                "action %v", outPoint, action)
1768

1769
        switch action {
1770
        case ChanStatusAction_ENABLE:
3✔
1771
                err = s.cfg.RouterBackend.SetChannelEnabled(*outPoint)
3✔
1772
        case ChanStatusAction_DISABLE:
3✔
1773
                err = s.cfg.RouterBackend.SetChannelDisabled(*outPoint)
3✔
UNCOV
1774
        case ChanStatusAction_AUTO:
×
UNCOV
1775
                err = s.cfg.RouterBackend.SetChannelAuto(*outPoint)
×
1776
        default:
1777
                err = fmt.Errorf("unrecognized ChannelStatusAction %v", action)
3✔
1778
        }
3✔
1779

3✔
1780
        if err != nil {
3✔
1781
                return nil, err
3✔
1782
        }
3✔
1783
        return &UpdateChanStatusResponse{}, nil
3✔
1784
}
3✔
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc