|
10 | 10 | //! Tests for asynchronous signing. These tests verify that the channel state machine behaves
|
11 | 11 | //! properly with a signer implementation that asynchronously derives signatures.
|
12 | 12 |
|
13 |
| -use crate::events::{MessageSendEvent, MessageSendEventsProvider}; |
| 13 | +use crate::events::{Event, MessageSendEvent, MessageSendEventsProvider}; |
14 | 14 | use crate::ln::functional_test_utils::*;
|
15 | 15 | use crate::ln::msgs::ChannelMessageHandler;
|
16 | 16 | use crate::ln::channelmanager::{PaymentId, RecipientOnionFields};
|
@@ -189,6 +189,112 @@ fn test_async_commitment_signature_for_commitment_signed() {
|
189 | 189 | };
|
190 | 190 | }
|
191 | 191 |
|
| 192 | +#[test] |
| 193 | +fn test_async_commitment_signature_for_funding_signed_0conf() { |
| 194 | + // Simulate acquiring the signature for `funding_signed` asynchronously for a zero-conf channel. |
| 195 | + let mut manually_accept_config = test_default_channel_config(); |
| 196 | + manually_accept_config.manually_accept_inbound_channels = true; |
| 197 | + |
| 198 | + let chanmon_cfgs = create_chanmon_cfgs(2); |
| 199 | + let node_cfgs = create_node_cfgs(2, &chanmon_cfgs); |
| 200 | + let node_chanmgrs = create_node_chanmgrs(2, &node_cfgs, &[None, Some(manually_accept_config)]); |
| 201 | + let nodes = create_network(2, &node_cfgs, &node_chanmgrs); |
| 202 | + |
| 203 | + // nodes[0] --- open_channel --> nodes[1] |
| 204 | + nodes[0].node.create_channel(nodes[1].node.get_our_node_id(), 100000, 10001, 42, None).unwrap(); |
| 205 | + let open_channel = get_event_msg!(nodes[0], MessageSendEvent::SendOpenChannel, nodes[1].node.get_our_node_id()); |
| 206 | + |
| 207 | + nodes[1].node.handle_open_channel(&nodes[0].node.get_our_node_id(), &open_channel); |
| 208 | + |
| 209 | + { |
| 210 | + let events = nodes[1].node.get_and_clear_pending_events(); |
| 211 | + assert_eq!(events.len(), 1, "Expected one event, got {}", events.len()); |
| 212 | + match &events[0] { |
| 213 | + Event::OpenChannelRequest { temporary_channel_id, .. } => { |
| 214 | + nodes[1].node.accept_inbound_channel_from_trusted_peer_0conf( |
| 215 | + temporary_channel_id, &nodes[0].node.get_our_node_id(), 0) |
| 216 | + .expect("Unable to accept inbound zero-conf channel"); |
| 217 | + }, |
| 218 | + ev => panic!("Expected OpenChannelRequest, not {:?}", ev) |
| 219 | + } |
| 220 | + } |
| 221 | + |
| 222 | + // nodes[0] <-- accept_channel --- nodes[1] |
| 223 | + let accept_channel = get_event_msg!(nodes[1], MessageSendEvent::SendAcceptChannel, nodes[0].node.get_our_node_id()); |
| 224 | + assert_eq!(accept_channel.minimum_depth, 0, "Expected minimum depth of 0"); |
| 225 | + nodes[0].node.handle_accept_channel(&nodes[1].node.get_our_node_id(), &accept_channel); |
| 226 | + |
| 227 | + // nodes[0] --- funding_created --> nodes[1] |
| 228 | + let (temporary_channel_id, tx, _) = create_funding_transaction(&nodes[0], &nodes[1].node.get_our_node_id(), 100000, 42); |
| 229 | + nodes[0].node.funding_transaction_generated(&temporary_channel_id, &nodes[1].node.get_our_node_id(), tx.clone()).unwrap(); |
| 230 | + check_added_monitors(&nodes[0], 0); |
| 231 | + |
| 232 | + let mut funding_created_msg = get_event_msg!(nodes[0], MessageSendEvent::SendFundingCreated, nodes[1].node.get_our_node_id()); |
| 233 | + |
| 234 | + // Now let's make node[1]'s signer be unavailable while handling the `funding_created`. It should |
| 235 | + // *not* broadcast a `funding_signed`... |
| 236 | + nodes[1].set_channel_signer_available(&nodes[0].node.get_our_node_id(), &temporary_channel_id, false); |
| 237 | + nodes[1].node.handle_funding_created(&nodes[0].node.get_our_node_id(), &funding_created_msg); |
| 238 | + check_added_monitors(&nodes[1], 1); |
| 239 | + |
| 240 | + { |
| 241 | + let events = nodes[1].node.get_and_clear_pending_msg_events(); |
| 242 | + let n = events.len(); |
| 243 | + assert_eq!(n, 0, "expected no events generated from nodes[1], found {}", n); |
| 244 | + } |
| 245 | + |
| 246 | + // Now re-enable the signer and simulate a retry. The temporary_channel_id won't work anymore so |
| 247 | + // we have to dig out the real channel ID. |
| 248 | + let chan_id = { |
| 249 | + let per_peer_state = nodes[1].node.per_peer_state.read().unwrap(); |
| 250 | + let chan_lock = per_peer_state.get(&nodes[0].node.get_our_node_id()).unwrap().lock().unwrap(); |
| 251 | + let chan_ids = chan_lock.channel_by_id.keys().collect::<Vec<_>>(); |
| 252 | + let n = chan_ids.len(); |
| 253 | + assert_eq!(n, 1, "expected one channel, not {}", n); |
| 254 | + *chan_ids[0] |
| 255 | + }; |
| 256 | + |
| 257 | + // At this point, we basically expect the channel to open like a normal zero-conf channel. |
| 258 | + nodes[1].set_channel_signer_available(&nodes[0].node.get_our_node_id(), &chan_id, true); |
| 259 | + nodes[1].node.signer_unblocked(Some((nodes[0].node.get_our_node_id(), chan_id))); |
| 260 | + |
| 261 | + let (funding_signed, channel_ready_1) = { |
| 262 | + let events = nodes[1].node.get_and_clear_pending_msg_events(); |
| 263 | + assert_eq!(events.len(), 2); |
| 264 | + let funding_signed = match &events[0] { |
| 265 | + MessageSendEvent::SendFundingSigned { msg, .. } => msg.clone(), |
| 266 | + ev => panic!("Expected SendFundingSigned, not {:?}", ev) |
| 267 | + }; |
| 268 | + let channel_ready = match &events[1] { |
| 269 | + MessageSendEvent::SendChannelReady { msg, .. } => msg.clone(), |
| 270 | + ev => panic!("Expected SendChannelReady, not {:?}", ev) |
| 271 | + }; |
| 272 | + (funding_signed, channel_ready) |
| 273 | + }; |
| 274 | + |
| 275 | + nodes[0].node.handle_funding_signed(&nodes[1].node.get_our_node_id(), &funding_signed); |
| 276 | + expect_channel_pending_event(&nodes[0], &nodes[1].node.get_our_node_id()); |
| 277 | + expect_channel_pending_event(&nodes[1], &nodes[0].node.get_our_node_id()); |
| 278 | + check_added_monitors(&nodes[0], 1); |
| 279 | + |
| 280 | + let channel_ready_0 = get_event_msg!(nodes[0], MessageSendEvent::SendChannelReady, nodes[1].node.get_our_node_id()); |
| 281 | + |
| 282 | + nodes[0].node.handle_channel_ready(&nodes[1].node.get_our_node_id(), &channel_ready_1); |
| 283 | + expect_channel_ready_event(&nodes[0], &nodes[1].node.get_our_node_id()); |
| 284 | + |
| 285 | + nodes[1].node.handle_channel_ready(&nodes[0].node.get_our_node_id(), &channel_ready_0); |
| 286 | + expect_channel_ready_event(&nodes[1], &nodes[0].node.get_our_node_id()); |
| 287 | + |
| 288 | + let channel_update_0 = get_event_msg!(nodes[0], MessageSendEvent::SendChannelUpdate, nodes[1].node.get_our_node_id()); |
| 289 | + let channel_update_1 = get_event_msg!(nodes[1], MessageSendEvent::SendChannelUpdate, nodes[0].node.get_our_node_id()); |
| 290 | + |
| 291 | + nodes[0].node.handle_channel_update(&nodes[1].node.get_our_node_id(), &channel_update_1); |
| 292 | + nodes[1].node.handle_channel_update(&nodes[0].node.get_our_node_id(), &channel_update_0); |
| 293 | + |
| 294 | + assert_eq!(nodes[0].node.list_usable_channels().len(), 1); |
| 295 | + assert_eq!(nodes[1].node.list_usable_channels().len(), 1); |
| 296 | +} |
| 297 | + |
192 | 298 | #[test]
|
193 | 299 | fn test_async_commitment_signature_for_peer_disconnect() {
|
194 | 300 | let chanmon_cfgs = create_chanmon_cfgs(2);
|
|
0 commit comments