-
Notifications
You must be signed in to change notification settings - Fork 385
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow configuring different max fee rate from peer #2643
Conversation
c4a95ed
to
06a9c8f
Compare
Codecov ReportAttention:
❗ Your organization needs to install the Codecov GitHub app to enable full functionality. Additional details and impacted files@@ Coverage Diff @@
## main #2643 +/- ##
==========================================
- Coverage 89.02% 88.95% -0.07%
==========================================
Files 112 112
Lines 87168 87224 +56
Branches 87168 87224 +56
==========================================
- Hits 77605 77594 -11
- Misses 7327 7389 +62
- Partials 2236 2241 +5
☔ View full report in Codecov by Sentry. |
d811028
to
c7622bb
Compare
This API is a bit awkward cause it doesn't apply to anchor channels, and no limit will be applied to anchor channels at all once Bitcoin Core ships package relay. More generally - I'm kinda surprised you hit this? If you're regularly seeing a peer set a feerate we think is too high we can probably just increase the default limit somewhat - like you say its generally not malicious, though there is risk if we let it float too high. |
Still happening too unfortunately. Bitcoin core has very terrible fee rate estimates that don't reflect reality. Does LDK use the high priority rate for anything else? I guess we're going to have to either fix CLN or crank up the range that LDK will allow. It's not acceptable to have massive force closures amongst all of our users whenever fee rates temporarily have a disagreement. That should be another issue in itself. |
For added context, we're using mempool.space's fastest fee target for our High Priority and we had a user get this error this morning.
Right now our only way to prevent every user getting force closed is just jacking up our |
Increasing your |
You can just overwrite the function when you implement the trait, the current implementation will just be the default if the user doesn't implement it. |
Then we can't have it changing on the mempool, would just be a hard coded value. |
We could do a multiplier on the queried |
That could work |
c7622bb
to
07c7a67
Compare
Changed to be a part of |
ad32c8b
to
4adb7da
Compare
4adb7da
to
0182349
Compare
I'd very much rather do #2659 over adding more config settings and more indirection. |
Closing in favor of #2660 |
We've run into issues a few times where channels will get force closed because CLN's fee estimator isn't as good as ours so the fee rate will be too high, resulting in a force close. It'd be nice if we'd have the ability to be able to increase this limit because generally this isn't malicious, just different views of the mempool.
Alternatively would be nice if we can have an option to just deactivate this channel instead of closing it