Skip to content

Commit 8f1dc54

Browse files
authored
Merge pull request #2973 from valentinewallace/2024-03-om-mailbox
Support intercepting onion messages for offline peers
2 parents 33b9ba5 + a5ada64 commit 8f1dc54

File tree

4 files changed

+285
-16
lines changed

4 files changed

+285
-16
lines changed

lightning/src/events/mod.rs

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1141,6 +1141,30 @@ pub enum Event {
11411141
///
11421142
/// [`ChannelHandshakeConfig::negotiate_anchors_zero_fee_htlc_tx`]: crate::util::config::ChannelHandshakeConfig::negotiate_anchors_zero_fee_htlc_tx
11431143
BumpTransaction(BumpTransactionEvent),
1144+
/// We received an onion message that is intended to be forwarded to a peer
1145+
/// that is currently offline. This event will only be generated if the
1146+
/// `OnionMessenger` was initialized with
1147+
/// [`OnionMessenger::new_with_offline_peer_interception`], see its docs.
1148+
///
1149+
/// [`OnionMessenger::new_with_offline_peer_interception`]: crate::onion_message::messenger::OnionMessenger::new_with_offline_peer_interception
1150+
OnionMessageIntercepted {
1151+
/// The node id of the offline peer.
1152+
peer_node_id: PublicKey,
1153+
/// The onion message intended to be forwarded to `peer_node_id`.
1154+
message: msgs::OnionMessage,
1155+
},
1156+
/// Indicates that an onion message supporting peer has come online and it may
1157+
/// be time to forward any onion messages that were previously intercepted for
1158+
/// them. This event will only be generated if the `OnionMessenger` was
1159+
/// initialized with
1160+
/// [`OnionMessenger::new_with_offline_peer_interception`], see its docs.
1161+
///
1162+
/// [`OnionMessenger::new_with_offline_peer_interception`]: crate::onion_message::messenger::OnionMessenger::new_with_offline_peer_interception
1163+
OnionMessagePeerConnected {
1164+
/// The node id of the peer we just connected to, who advertises support for
1165+
/// onion messages.
1166+
peer_node_id: PublicKey,
1167+
}
11441168
}
11451169

11461170
impl Writeable for Event {
@@ -1404,6 +1428,19 @@ impl Writeable for Event {
14041428
35u8.write(writer)?;
14051429
// Never write ConnectionNeeded events as buffered onion messages aren't serialized.
14061430
},
1431+
&Event::OnionMessageIntercepted { ref peer_node_id, ref message } => {
1432+
37u8.write(writer)?;
1433+
write_tlv_fields!(writer, {
1434+
(0, peer_node_id, required),
1435+
(2, message, required),
1436+
});
1437+
},
1438+
&Event::OnionMessagePeerConnected { ref peer_node_id } => {
1439+
39u8.write(writer)?;
1440+
write_tlv_fields!(writer, {
1441+
(0, peer_node_id, required),
1442+
});
1443+
}
14071444
// Note that, going forward, all new events must only write data inside of
14081445
// `write_tlv_fields`. Versions 0.0.101+ will ignore odd-numbered events that write
14091446
// data via `write_tlv_fields`.
@@ -1814,6 +1851,29 @@ impl MaybeReadable for Event {
18141851
},
18151852
// Note that we do not write a length-prefixed TLV for ConnectionNeeded events.
18161853
35u8 => Ok(None),
1854+
37u8 => {
1855+
let mut f = || {
1856+
_init_and_read_len_prefixed_tlv_fields!(reader, {
1857+
(0, peer_node_id, required),
1858+
(2, message, required),
1859+
});
1860+
Ok(Some(Event::OnionMessageIntercepted {
1861+
peer_node_id: peer_node_id.0.unwrap(), message: message.0.unwrap()
1862+
}))
1863+
};
1864+
f()
1865+
},
1866+
39u8 => {
1867+
let mut f = || {
1868+
_init_and_read_len_prefixed_tlv_fields!(reader, {
1869+
(0, peer_node_id, required),
1870+
});
1871+
Ok(Some(Event::OnionMessagePeerConnected {
1872+
peer_node_id: peer_node_id.0.unwrap()
1873+
}))
1874+
};
1875+
f()
1876+
},
18171877
// Versions prior to 0.0.100 did not ignore odd types, instead returning InvalidValue.
18181878
// Version 0.0.100 failed to properly ignore odd types, possibly resulting in corrupt
18191879
// reads.

lightning/src/onion_message/functional_tests.rs

Lines changed: 119 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,17 @@ struct MessengerNode {
5959
>>
6060
}
6161

62+
impl Drop for MessengerNode {
63+
fn drop(&mut self) {
64+
#[cfg(feature = "std")] {
65+
if std::thread::panicking() {
66+
return;
67+
}
68+
}
69+
assert!(release_events(self).is_empty());
70+
}
71+
}
72+
6273
struct TestOffersMessageHandler {}
6374

6475
impl OffersMessageHandler for TestOffersMessageHandler {
@@ -162,22 +173,41 @@ impl CustomOnionMessageHandler for TestCustomMessageHandler {
162173
}
163174

164175
fn create_nodes(num_messengers: u8) -> Vec<MessengerNode> {
165-
let secrets = (1..=num_messengers)
176+
let cfgs = (1..=num_messengers)
166177
.into_iter()
167-
.map(|i| SecretKey::from_slice(&[i; 32]).unwrap())
178+
.map(|_| MessengerCfg::new())
168179
.collect();
169-
create_nodes_using_secrets(secrets)
180+
create_nodes_using_cfgs(cfgs)
170181
}
171182

172-
fn create_nodes_using_secrets(secrets: Vec<SecretKey>) -> Vec<MessengerNode> {
183+
struct MessengerCfg {
184+
secret_override: Option<SecretKey>,
185+
intercept_offline_peer_oms: bool,
186+
}
187+
impl MessengerCfg {
188+
fn new() -> Self {
189+
Self { secret_override: None, intercept_offline_peer_oms: false }
190+
}
191+
fn with_node_secret(mut self, secret: SecretKey) -> Self {
192+
self.secret_override = Some(secret);
193+
self
194+
}
195+
fn with_offline_peer_interception(mut self) -> Self {
196+
self.intercept_offline_peer_oms = true;
197+
self
198+
}
199+
}
200+
201+
fn create_nodes_using_cfgs(cfgs: Vec<MessengerCfg>) -> Vec<MessengerNode> {
173202
let gossip_logger = Arc::new(test_utils::TestLogger::with_id("gossip".to_string()));
174203
let network_graph = Arc::new(NetworkGraph::new(Network::Testnet, gossip_logger.clone()));
175204
let gossip_sync = Arc::new(
176205
P2PGossipSync::new(network_graph.clone(), None, gossip_logger)
177206
);
178207

179208
let mut nodes = Vec::new();
180-
for (i, secret_key) in secrets.into_iter().enumerate() {
209+
for (i, cfg) in cfgs.into_iter().enumerate() {
210+
let secret_key = cfg.secret_override.unwrap_or(SecretKey::from_slice(&[(i + 1) as u8; 32]).unwrap());
181211
let logger = Arc::new(test_utils::TestLogger::with_id(format!("node {}", i)));
182212
let seed = [i as u8; 32];
183213
let entropy_source = Arc::new(test_utils::TestKeysInterface::new(&seed, Network::Testnet));
@@ -189,14 +219,24 @@ fn create_nodes_using_secrets(secrets: Vec<SecretKey>) -> Vec<MessengerNode> {
189219
);
190220
let offers_message_handler = Arc::new(TestOffersMessageHandler {});
191221
let custom_message_handler = Arc::new(TestCustomMessageHandler::new());
222+
let messenger = if cfg.intercept_offline_peer_oms {
223+
OnionMessenger::new_with_offline_peer_interception(
224+
entropy_source.clone(), node_signer.clone(), logger.clone(),
225+
node_id_lookup, message_router, offers_message_handler,
226+
custom_message_handler.clone()
227+
)
228+
} else {
229+
OnionMessenger::new(
230+
entropy_source.clone(), node_signer.clone(), logger.clone(),
231+
node_id_lookup, message_router, offers_message_handler,
232+
custom_message_handler.clone()
233+
)
234+
};
192235
nodes.push(MessengerNode {
193236
privkey: secret_key,
194237
node_id: node_signer.get_node_id(Recipient::Node).unwrap(),
195-
entropy_source: entropy_source.clone(),
196-
messenger: OnionMessenger::new(
197-
entropy_source, node_signer, logger.clone(), node_id_lookup, message_router,
198-
offers_message_handler, custom_message_handler.clone()
199-
),
238+
entropy_source,
239+
messenger,
200240
custom_message_handler,
201241
gossip_sync: gossip_sync.clone(),
202242
});
@@ -369,11 +409,10 @@ fn we_are_intro_node() {
369409

370410
#[test]
371411
fn invalid_blinded_path_error() {
372-
// Make sure we error as expected if a provided blinded path has 0 or 1 hops.
412+
// Make sure we error as expected if a provided blinded path has 0 hops.
373413
let nodes = create_nodes(3);
374414
let test_msg = TestCustomMessage::Response;
375415

376-
// 0 hops
377416
let secp_ctx = Secp256k1::new();
378417
let mut blinded_path = BlindedPath::new_for_message(&[nodes[1].node_id, nodes[2].node_id], &*nodes[2].entropy_source, &secp_ctx).unwrap();
379418
blinded_path.blinded_hops.clear();
@@ -549,18 +588,83 @@ fn drops_buffered_messages_waiting_for_peer_connection() {
549588
assert!(nodes[0].messenger.next_onion_message_for_peer(nodes[1].node_id).is_none());
550589
}
551590

591+
#[test]
592+
fn intercept_offline_peer_oms() {
593+
// Ensure that if OnionMessenger is initialized with
594+
// new_with_offline_peer_interception, we will intercept OMs for offline
595+
// peers, generate the right events, and forward OMs when they are re-injected
596+
// by the user.
597+
let node_cfgs = vec![MessengerCfg::new(), MessengerCfg::new().with_offline_peer_interception(), MessengerCfg::new()];
598+
let mut nodes = create_nodes_using_cfgs(node_cfgs);
599+
600+
let peer_conn_evs = release_events(&nodes[1]);
601+
assert_eq!(peer_conn_evs.len(), 2);
602+
for (i, ev) in peer_conn_evs.iter().enumerate() {
603+
match ev {
604+
Event::OnionMessagePeerConnected { peer_node_id } => {
605+
let node_idx = if i == 0 { 0 } else { 2 };
606+
assert_eq!(peer_node_id, &nodes[node_idx].node_id);
607+
},
608+
_ => panic!()
609+
}
610+
}
611+
612+
let message = TestCustomMessage::Response;
613+
let secp_ctx = Secp256k1::new();
614+
let blinded_path = BlindedPath::new_for_message(
615+
&[nodes[1].node_id, nodes[2].node_id], &*nodes[2].entropy_source, &secp_ctx
616+
).unwrap();
617+
let destination = Destination::BlindedPath(blinded_path);
618+
619+
// Disconnect the peers to ensure we intercept the OM.
620+
disconnect_peers(&nodes[1], &nodes[2]);
621+
nodes[0].messenger.send_onion_message(message, destination, None).unwrap();
622+
let mut final_node_vec = nodes.split_off(2);
623+
pass_along_path(&nodes);
624+
625+
let mut events = release_events(&nodes[1]);
626+
assert_eq!(events.len(), 1);
627+
let onion_message = match events.remove(0) {
628+
Event::OnionMessageIntercepted { peer_node_id, message } => {
629+
assert_eq!(peer_node_id, final_node_vec[0].node_id);
630+
message
631+
},
632+
_ => panic!()
633+
};
634+
635+
// Ensure that we'll refuse to forward the re-injected OM until after the
636+
// outbound peer comes back online.
637+
let err = nodes[1].messenger.forward_onion_message(onion_message.clone(), &final_node_vec[0].node_id).unwrap_err();
638+
assert_eq!(err, SendError::InvalidFirstHop(final_node_vec[0].node_id));
639+
640+
connect_peers(&nodes[1], &final_node_vec[0]);
641+
let peer_conn_ev = release_events(&nodes[1]);
642+
assert_eq!(peer_conn_ev.len(), 1);
643+
match peer_conn_ev[0] {
644+
Event::OnionMessagePeerConnected { peer_node_id } => {
645+
assert_eq!(peer_node_id, final_node_vec[0].node_id);
646+
},
647+
_ => panic!()
648+
}
649+
650+
nodes[1].messenger.forward_onion_message(onion_message, &final_node_vec[0].node_id).unwrap();
651+
final_node_vec[0].custom_message_handler.expect_message(TestCustomMessage::Response);
652+
pass_along_path(&vec![nodes.remove(1), final_node_vec.remove(0)]);
653+
}
654+
552655
#[test]
553656
fn spec_test_vector() {
554-
let secret_keys = [
657+
let node_cfgs = [
555658
"4141414141414141414141414141414141414141414141414141414141414141", // Alice
556659
"4242424242424242424242424242424242424242424242424242424242424242", // Bob
557660
"4343434343434343434343434343434343434343434343434343434343434343", // Carol
558661
"4444444444444444444444444444444444444444444444444444444444444444", // Dave
559662
]
560663
.iter()
561-
.map(|secret| SecretKey::from_slice(&<Vec<u8>>::from_hex(secret).unwrap()).unwrap())
664+
.map(|secret_hex| SecretKey::from_slice(&<Vec<u8>>::from_hex(secret_hex).unwrap()).unwrap())
665+
.map(|secret| MessengerCfg::new().with_node_secret(secret))
562666
.collect();
563-
let nodes = create_nodes_using_secrets(secret_keys);
667+
let nodes = create_nodes_using_cfgs(node_cfgs);
564668

565669
// Hardcode the sender->Alice onion message, because it includes an unknown TLV of type 1, which
566670
// LDK doesn't support constructing.

0 commit comments

Comments
 (0)