-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handle Results of waiting for timelocks to expire #705
Conversation
8c18f05
to
ed722e2
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice. Can we either remove this TODO or do something else about it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Needs a changelog entry.
@rishflab please take this one over |
ed722e2
to
52f4e2f
Compare
bors r+ |
705: Handle Results of waiting for timelocks to expire r=rishflab a=da-kami Fixes an issue where the CLI is transitioning into a `CancelTimelockExpired` state but the timelock is actually not expired yet. This happened because watching for confirmations errored and the error was not handled but the same behaviour as reaching the cancel timelock height was applied. For now this PR will fail the execution in case of the block height watching logic failing. Eventually there should be a more resilient strategy that includes retries. Co-authored-by: Daniel Karzel <daniel@comit.network> Co-authored-by: rishflab <rishflab@hotmail.com>
Build failed: |
@rishflab one of the tests in bors failed. Could take this opportunity to fixup the commits now that we have to retrigger anyway. |
im on it. It was Monero again |
c7480f8
to
8c0a827
Compare
Probably a failure when interacting with the electrum node to get script status updates
Bob was timing out if the encrypted signature could not be sent in 60 seconds. This behaviour is unnecessary because we are racing against the cancel timelock anyway. By timing out before this, we remove the opportunity for bob and alice to re-establish a connection.
8c0a827
to
af50c65
Compare
Thanks for improving the commits! |
bors r+ |
We were not thorough enough in PR #705 and there were some remaining unhandled errors.
We were not thorough enough in PR #705 and there were some remaining unhandled errors.
We were not thorough enough in PR #705 and there were some remaining unhandled errors.
We were not thorough enough in PR #705 and there were some remaining unhandled errors.
We were not thorough enough in PR #705 and there were some remaining unhandled errors.
We were not thorough enough in PR #705 and there were some remaining unhandled errors. Co-authored-by: Daniel Karzel <daniel@comit.network>
Fixes an issue where the CLI is transitioning into a
CancelTimelockExpired
state but the timelock is actually not expired yet.This happened because watching for confirmations errored and the error was not handled but the same behaviour as reaching the cancel timelock height was applied.
For now this PR will fail the execution in case of the block height watching logic failing. Eventually there should be a more resilient strategy that includes retries.