multi: skip range check in pathfinder and switch for custom htlc payments

This commit is contained in:
ziggie
2025-08-02 17:34:23 +02:00
committed by Oliver Gugger
parent 9aa70e41c8
commit 97c4012753
4 changed files with 122 additions and 46 deletions

View File

@@ -3372,36 +3372,20 @@ func (l *channelLink) canSendHtlc(policy models.ForwardingPolicy,
heightNow uint32, originalScid lnwire.ShortChannelID,
customRecords lnwire.CustomRecords) *LinkError {
// As our first sanity check, we'll ensure that the passed HTLC isn't
// too small for the next hop. If so, then we'll cancel the HTLC
// directly.
if amt < policy.MinHTLCOut {
l.log.Warnf("outgoing htlc(%x) is too small: min_htlc=%v, "+
"htlc_value=%v", payHash[:], policy.MinHTLCOut,
amt)
var (
auxBandwidth OptionalBandwidth
// As part of the returned error, we'll send our latest routing
// policy so the sending node obtains the most up to date data.
cb := func(upd *lnwire.ChannelUpdate1) lnwire.FailureMessage {
return lnwire.NewAmountBelowMinimum(amt, *upd)
}
failure := l.createFailureWithUpdate(false, originalScid, cb)
return NewLinkError(failure)
}
// externalErr is an error that is returned by the aux traffic
// shaper.
externalErr error
)
// Next, ensure that the passed HTLC isn't too large. If so, we'll
// cancel the HTLC directly.
if policy.MaxHTLC != 0 && amt > policy.MaxHTLC {
l.log.Warnf("outgoing htlc(%x) is too large: max_htlc=%v, "+
"htlc_value=%v", payHash[:], policy.MaxHTLC, amt)
// As part of the returned error, we'll send our latest routing
// policy so the sending node obtains the most up-to-date data.
cb := func(upd *lnwire.ChannelUpdate1) lnwire.FailureMessage {
return lnwire.NewTemporaryChannelFailure(upd)
}
failure := l.createFailureWithUpdate(false, originalScid, cb)
return NewDetailedLinkError(failure, OutgoingFailureHTLCExceedsMax)
// Validate HTLC amount against policy limits.
linkErr := l.validateHtlcAmount(
policy, payHash, amt, originalScid, customRecords,
)
if linkErr != nil {
return linkErr
}
// We want to avoid offering an HTLC which will expire in the near
@@ -3416,6 +3400,7 @@ func (l *channelLink) canSendHtlc(policy models.ForwardingPolicy,
return lnwire.NewExpiryTooSoon(*upd)
}
failure := l.createFailureWithUpdate(false, originalScid, cb)
return NewLinkError(failure)
}
@@ -3431,7 +3416,8 @@ func (l *channelLink) canSendHtlc(policy models.ForwardingPolicy,
// We now check the available bandwidth to see if this HTLC can be
// forwarded.
availableBandwidth := l.Bandwidth()
auxBandwidth, err := fn.MapOptionZ(
auxBandwidth, externalErr = fn.MapOptionZ(
l.cfg.AuxTrafficShaper,
func(ts AuxTrafficShaper) fn.Result[OptionalBandwidth] {
var htlcBlob fn.Option[tlv.Blob]
@@ -3449,8 +3435,10 @@ func (l *channelLink) canSendHtlc(policy models.ForwardingPolicy,
return l.AuxBandwidth(amt, originalScid, htlcBlob, ts)
},
).Unpack()
if err != nil {
l.log.Errorf("Unable to determine aux bandwidth: %v", err)
if externalErr != nil {
l.log.Errorf("Unable to determine aux bandwidth: %v",
externalErr)
return NewLinkError(&lnwire.FailTemporaryNodeFailure{})
}
@@ -3470,6 +3458,7 @@ func (l *channelLink) canSendHtlc(policy models.ForwardingPolicy,
return lnwire.NewTemporaryChannelFailure(upd)
}
failure := l.createFailureWithUpdate(false, originalScid, cb)
return NewDetailedLinkError(
failure, OutgoingFailureInsufficientBalance,
)
@@ -4579,3 +4568,71 @@ func (l *channelLink) CommitmentCustomBlob() fn.Option[tlv.Blob] {
return l.channel.LocalCommitmentBlob()
}
// validateHtlcAmount checks if the HTLC amount is within the policy's
// minimum and maximum limits. Returns a LinkError if validation fails.
func (l *channelLink) validateHtlcAmount(policy models.ForwardingPolicy,
payHash [32]byte, amt lnwire.MilliSatoshi,
originalScid lnwire.ShortChannelID,
customRecords lnwire.CustomRecords) *LinkError {
// In case we are dealing with a custom HTLC, we don't need to validate
// the HTLC constraints.
//
// NOTE: Custom HTLCs are only locally sourced and will use custom
// channels which are not routable channels and should have their policy
// not restricted in the first place. However to be sure we skip this
// check otherwise we might end up in a loop of sending to the same
// route again and again because link errors are not persisted in
// mission control.
if fn.MapOptionZ(
l.cfg.AuxTrafficShaper,
func(ts AuxTrafficShaper) bool {
return ts.IsCustomHTLC(customRecords)
},
) {
l.log.Debugf("skipping htlc amount policy validation for " +
"custom htlc")
return nil
}
// As our first sanity check, we'll ensure that the passed HTLC isn't
// too small for the next hop. If so, then we'll cancel the HTLC
// directly.
if amt < policy.MinHTLCOut {
l.log.Warnf("outgoing htlc(%x) is too small: min_htlc=%v, "+
"htlc_value=%v", payHash[:], policy.MinHTLCOut,
amt)
// As part of the returned error, we'll send our latest routing
// policy so the sending node obtains the most up to date data.
cb := func(upd *lnwire.ChannelUpdate1) lnwire.FailureMessage {
return lnwire.NewAmountBelowMinimum(amt, *upd)
}
failure := l.createFailureWithUpdate(false, originalScid, cb)
return NewLinkError(failure)
}
// Next, ensure that the passed HTLC isn't too large. If so, we'll
// cancel the HTLC directly.
if policy.MaxHTLC != 0 && amt > policy.MaxHTLC {
l.log.Warnf("outgoing htlc(%x) is too large: max_htlc=%v, "+
"htlc_value=%v", payHash[:], policy.MaxHTLC, amt)
// As part of the returned error, we'll send our latest routing
// policy so the sending node obtains the most up-to-date data.
cb := func(upd *lnwire.ChannelUpdate1) lnwire.FailureMessage {
return lnwire.NewTemporaryChannelFailure(upd)
}
failure := l.createFailureWithUpdate(false, originalScid, cb)
return NewDetailedLinkError(
failure, OutgoingFailureHTLCExceedsMax,
)
}
return nil
}

View File

@@ -24,9 +24,9 @@ type bandwidthHints interface {
availableChanBandwidth(channelID uint64,
amount lnwire.MilliSatoshi) (lnwire.MilliSatoshi, bool)
// firstHopCustomBlob returns the custom blob for the first hop of the
// payment, if available.
firstHopCustomBlob() fn.Option[tlv.Blob]
// isCustomHTLCPayment returns true if this payment is a custom payment.
// For custom payments policy checks might not be needed.
isCustomHTLCPayment() bool
}
// getLinkQuery is the function signature used to lookup a link.
@@ -205,8 +205,27 @@ func (b *bandwidthManager) availableChanBandwidth(channelID uint64,
return bandwidth, true
}
// firstHopCustomBlob returns the custom blob for the first hop of the payment,
// if available.
func (b *bandwidthManager) firstHopCustomBlob() fn.Option[tlv.Blob] {
return b.firstHopBlob
// isCustomHTLCPayment returns true if this payment is a custom payment.
// For custom payments policy checks might not be needed.
func (b *bandwidthManager) isCustomHTLCPayment() bool {
var isCustomHTLCPayment bool
b.firstHopBlob.WhenSome(func(blob tlv.Blob) {
customRecords, err := lnwire.ParseCustomRecords(blob)
if err != nil {
log.Warnf("failed to parse custom records when "+
"checking if payment is custom: %v", err)
return
}
isCustomHTLCPayment = fn.MapOptionZ(
b.trafficShaper,
func(s htlcswitch.AuxTrafficShaper) bool {
return s.IsCustomHTLC(customRecords)
},
)
})
return isCustomHTLCPayment
}

View File

@@ -11,7 +11,6 @@ import (
"github.com/lightningnetwork/lnd/kvdb"
"github.com/lightningnetwork/lnd/lnwire"
"github.com/lightningnetwork/lnd/routing/route"
"github.com/lightningnetwork/lnd/tlv"
"github.com/lightningnetwork/lnd/zpay32"
"github.com/stretchr/testify/require"
)
@@ -36,8 +35,8 @@ func (m *mockBandwidthHints) availableChanBandwidth(channelID uint64,
return balance, ok
}
func (m *mockBandwidthHints) firstHopCustomBlob() fn.Option[tlv.Blob] {
return fn.None[tlv.Blob]()
func (m *mockBandwidthHints) isCustomHTLCPayment() bool {
return false
}
// integratedRoutingContext defines the context in which integrated routing

View File

@@ -251,12 +251,13 @@ func (u *edgeUnifier) getEdgeLocal(netAmtReceived lnwire.MilliSatoshi,
// Add inbound fee to get to the amount that is sent over the
// local channel.
amt := netAmtReceived + lnwire.MilliSatoshi(inboundFee)
// Check valid amount range for the channel. We skip this test
// for payments with custom HTLC data, as the amount sent on
// the BTC layer may differ from the amount that is actually
// forwarded in custom channels.
if bandwidthHints.firstHopCustomBlob().IsNone() &&
// for payments with custom htlc data we skip the amount range
// check because the amt of the payment does not relate to the
// actual amount carried by the HTLC but instead in encoded in
// the blob data.
if !bandwidthHints.isCustomHTLCPayment() &&
!edge.amtInRange(amt) {
log.Debugf("Amount %v not in range for edge %v",