Skip to content

Conversation

@hieblmi
Copy link
Collaborator

@hieblmi hieblmi commented Nov 12, 2025

This PR a new rpc for withdrawals via psbts,

rpc ServerPsbtWithdrawDeposits (ServerPsbtWithdrawRequest)
        returns (ServerPsbtWithdrawResponse);

@hieblmi hieblmi marked this pull request as draft November 12, 2025 13:56
@gemini-code-assist
Copy link

Summary of Changes

Hello @hieblmi, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request enhances the static address withdrawal mechanism by integrating Partially Signed Bitcoin Transactions (PSBTs). It introduces a new RPC for PSBT-based withdrawals and refactors several core utility functions into a dedicated package, streamlining the process of cooperative transaction signing and improving modularity within the codebase.

Highlights

  • New RPC for PSBT Withdrawals: A new RPC endpoint, ServerPsbtWithdrawDeposits, has been introduced to facilitate withdrawals using Partially Signed Bitcoin Transactions (PSBTs). This allows the client to construct the withdrawal transaction and the server to provide its signature.
  • Code Refactoring to staticutil Package: Common utility functions related to Musig2 session creation, toPrevOuts conversion, and withdrawal transaction value calculations have been refactored into a new staticaddr/staticutil package. This improves code organization and reusability across the static address components.
  • PSBT Integration in Withdrawal Process: The withdrawal transaction creation and signing flow has been updated to leverage PSBTs. The client now sends an unsigned PSBT to the server, which then signs it and returns the necessary signing information, allowing for a more flexible and standardized multi-party signing process.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a new RPC endpoint for PSBT-based withdrawals, ServerPsbtWithdrawDeposits, which enhances the flexibility and security of the withdrawal process by allowing the client to construct the transaction and the server to provide only the necessary signatures. The changes involve significant refactoring, moving common utility functions to a new staticutil package, and updating the withdrawal manager to use the new PSBT flow. The introduction of staticutil improves code organization and reusability. Overall, the changes are well-structured and align with best practices for handling Bitcoin transactions.

Comment on lines +580 to +593
// Do some sanity checks.
txHash := withdrawalTx.TxHash()
if !bytes.Equal(txHash.CloneBytes(), sigResp.Txid) {
return nil, nil, errors.New("txid doesn't match")
}

// Next we'll get our sweep tx signatures.
prevOutFetcher := txscript.NewMultiPrevOutFetcher(prevOuts)
_, err = m.signMusig2Tx(
ctx, prevOutFetcher, outpoints, m.cfg.Signer, withdrawalTx,
withdrawalSessions, coopServerNonces,
)
if err != nil {
return nil, err
if len(sigResp.SigningInfo) != len(deposits) {
return nil, nil, errors.New("invalid number of " +
"deposit signatures")

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

critical

Adding sanity checks for the returned txid and the length of SigningInfo from the server is a critical security and correctness measure. It ensures that the server's response matches the client's expectations and prevents potential manipulation or errors.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is your point? The checks are in place. Do you suggest additional checks?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I propose to check not only the length, but also that they have the same elements (1:1 matching). That each deposit got one record in sigResp.SigningInfo.

Please also add a test checking this situation.

@hieblmi hieblmi force-pushed the withdraw-psbt branch 4 times, most recently from 94c5f92 to e387361 Compare November 17, 2025 07:01
@hieblmi hieblmi self-assigned this Nov 17, 2025
@hieblmi hieblmi marked this pull request as ready for review November 17, 2025 10:03
@hieblmi hieblmi force-pushed the withdraw-psbt branch 7 times, most recently from edc5090 to 97d8733 Compare November 19, 2025 07:28

message ServerPsbtWithdrawRequest {
// The withdrawal psbt.
bytes withdrawal_psbt = 1;
Copy link
Collaborator Author

@hieblmi hieblmi Nov 20, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: comment that txscript.SigHashDefault will be enforced by default.

@lightninglabs-deploy
Copy link

@hieblmi, remember to re-request review from reviewers when ready

Copy link
Collaborator

@starius starius left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! 🚀
Added several comments.

Comment on lines +580 to +593
// Do some sanity checks.
txHash := withdrawalTx.TxHash()
if !bytes.Equal(txHash.CloneBytes(), sigResp.Txid) {
return nil, nil, errors.New("txid doesn't match")
}

// Next we'll get our sweep tx signatures.
prevOutFetcher := txscript.NewMultiPrevOutFetcher(prevOuts)
_, err = m.signMusig2Tx(
ctx, prevOutFetcher, outpoints, m.cfg.Signer, withdrawalTx,
withdrawalSessions, coopServerNonces,
)
if err != nil {
return nil, err
if len(sigResp.SigningInfo) != len(deposits) {
return nil, nil, errors.New("invalid number of " +
"deposit signatures")
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I propose to check not only the length, but also that they have the same elements (1:1 matching). That each deposit got one record in sigResp.SigningInfo.

Please also add a test checking this situation.


// ToWireOutpoints converts lnrpc.OutPoint protos into wire.OutPoint structs so
// they can be consumed by lower level transaction building code.
func ToWireOutpoints(outpoints []*lnrpc.OutPoint) ([]wire.OutPoint, error) {
Copy link
Collaborator

@starius starius Nov 28, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This function is not used and not tested.

// selects the deposits that are needed to cover the amount requested without
// leaving a dust change. It returns an error if the sum of deposits minus dust
// is less than the requested amount.
func SelectDeposits(deposits []*deposit.Deposit, amount int64) (
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The function is not used and not tested.

Comment on lines +514 to +522
addrParams, err := m.cfg.AddressManager.GetStaticAddressParameters(ctx)
if err != nil {
return nil, nil, err
}

staticAddress, err := m.cfg.AddressManager.GetStaticAddress(ctx)
if err != nil {
return nil, nil, err
}
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This makes two DB queries. It could be one: staticAddress can be built from addrParams. We can factor out a function from address.Manager.GetStaticAddress which converts params to address. Or just merge two methods GetStaticAddressParameters and GetStaticAddress together and return both things at once.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I totally agree. These methods will be removed in the follow-up PR for multi addresses so i think we can leave them for now.


// CreateMusig2Session creates a musig2 session for the deposit.
func CreateMusig2Session(ctx context.Context,
signer lndclient.SignerClient, addrParams *address.Parameters,
Copy link
Collaborator

@starius starius Nov 28, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Idea: can we move address.Parameters to script package and reuse it and this function.

// transaction.
func (m *Manager) signMusig2Tx(ctx context.Context,
prevOutFetcher *txscript.MultiPrevOutFetcher, outpoints []wire.OutPoint,
prevOutFetcher *txscript.MultiPrevOutFetcher,
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add tests for signMusig2Tx.

When sigInfo is missing an entry for one of the deposits, the call should error (no partial return). Build a dummy tx with two inputs, provide sessions for both, but only one SigningInfo entry; expect error.

When sigInfo has all expected keys but one maps to the wrong index (mismatched depositsToIdx), ensure it errors.


case *btcutil.AddressTaproot:
weightEstimator.AddP2TROutput()
func CalculateWithdrawalTxValaues(deposits []*deposit.Deposit,
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo: "Valaues"

func CalculateWithdrawalTxValaues(deposits []*deposit.Deposit,
localAmount btcutil.Amount, feeRate chainfee.SatPerKWeight,
withdrawalAddress btcutil.Address,
commitmentType lnrpc.CommitmentType) (btcutil.Amount, btcutil.Amount,
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add a table test for CalculateWithdrawalTxValues covering: insufficient funds after dust/fee, negative change, and min-channel-size guard.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants