You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- JSON-RPC: `fundchannel_complete` new parameter `withhold` for zero-conf channels (default false). ([#8546])
17
17
- Plugins: `xpay` will now wait if it suspects a payment failure is due to a height disagreement with the final node. ([#8645])
18
18
- Tools: `lightning-hsmtool` now supports hsm_secret files using a 12-word mnemonic. ([#8400])
19
+
- Tools: `lightningd-downgrade` can downgrade your database from v25.12 to v25.09 if something goes wrong. ([#8702])
19
20
- JSON-RPC: `askrene-bias-node`: an RPC command to set a bias on node's outgoing or incoming channels. ([#8608])
20
21
- JSON-RPC: `listpeerchannels``funding` object `withheld` flag, and `listclosedchannels``funding_withheld` flags, indicating fundchannel_complete was called with the `withheld` parameter true. ([#8546])
21
22
- JSON-RPC: `psbt` field in `funding` in listpeerchannels, and `funding_psbt` in listclosedchannels. ([#8546])
@@ -58,9 +59,11 @@ Note: You should always set `allow-deprecated-apis=false` to test for changes.
58
59
59
60
### Fixed
60
61
62
+
- lightningd: we could miss tx spends which happened in the past blocks when we restarted. ([#8735])
61
63
- lightningd: multiple significant speedups for large nodes, especially preventing "freezes" under exceptionally high load. ([#8677])
62
64
- `xpay` will not try to send too many HTLCs through unknown channels (6, as that is Phoenix's limit) unless it has no choice ([#8537])
63
65
- `xpay` fixed clash with simultaneous payments via routehints and blinded paths. ([#8685])
66
+
-`xpay`: error messages no longer incorrectly label intermediate channels as "the invoice's route hint". ([#8741])
64
67
- JSON-RPC: `signpsbt` no longer crashes if asked to sign an already-signed PSBT with taproot paths. ([#8546])
65
68
- Offers: require peers for blinded paths to have `option_onion_messages`, due to reports of LND not forwarding our blinded payments correctly. ([#8682])
66
69
- Protocol: we now re-transmit unseen funding transactions on startup, for more robustness. ([#8546])
@@ -93,6 +96,10 @@ Note: You should always set `allow-deprecated-apis=false` to test for changes.
93
96
- Splicing: Fixed crash when we splice a channel which hasn't been announced yet. ([#8555])
94
97
- JSON-RPC: `cancelrecurringinvoice` command to send new "don't expect any more invoice requests" msg to recurring bolt12 invoices. ([#8398])
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Core Lightning (previously c-lightning) is a lightweight, highly customizable an
11
11
* [Sending and Receiving Payments](#sending-and-receiving-payments)
12
12
* [Configuration File](#configuration-file)
13
13
*[Further Information](#further-information)
14
-
*[FAQ](doc/FAQ.md)
14
+
*[FAQ](doc/node-operators-guide/faq.md)
15
15
*[Pruning](#pruning)
16
16
*[HD wallet encryption](#hd-wallet-encryption)
17
17
* [Developers](#developers)
@@ -198,7 +198,7 @@ If the two blockheights drift apart it might be necessary to intervene.
198
198
199
199
### HD wallet encryption
200
200
201
-
You can encrypt the `hsm_secret` content (which is used to derive the HD wallet's master key) by passing the `--encrypted-hsm` startup argument, or by using the `hsmtool` (which you can find in the `tool/` directory at the root of this repo) with the `encrypt` method. You can unencrypt an encrypted `hsm_secret` using the `hsmtool` with the `decrypt` method.
201
+
You can encrypt the `hsm_secret` content (which is used to derive the HD wallet's master key) by passing the `--encrypted-hsm` startup argument, or by using the `lightning-hsmtool` (which you can find in the `tool/` directory at the root of this repo) with the `encrypt` method. You can unencrypt an encrypted `hsm_secret` using the `lightning-hsmtool` with the `decrypt` method.
202
202
203
203
If you encrypt your `hsm_secret`, you will have to pass the `--encrypted-hsm` startup option to `lightningd`. Once your `hsm_secret` is encrypted, you __will not__ be able to access your funds without your password, so please beware with your password management. Also, beware of not feeling too safe with an encrypted `hsm_secret`: unlike for `bitcoind` where the wallet encryption can restrict the usage of some RPC command, `lightningd` always needs to access keys from the wallet which is thus __not locked__ (yet), even with an encrypted BIP32 master seed.
Copy file name to clipboardExpand all lines: contrib/msggen/msggen/schema.json
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -7472,7 +7472,7 @@
7472
7472
"Value to be decoded:",
7473
7473
" * a *bolt11* or *bolt12* string (optionally prefixed by `lightning:` or `LIGHTNING:`) as specified by the BOLT 11 and BOLT 12 specifications.",
7474
7474
" * a *rune* as created by lightning-commando-rune(7).",
7475
-
" * an *emergency_recover* string generated by hsmtool like `lightning-hsmtool getemergencyrecover <path/to/emergency.recover>`. It holds `emergency.recover` contents and starts with `clnemerg1`."
7475
+
" * an *emergency_recover* string generated by lightning-hsmtool like `lightning-hsmtool getemergencyrecover <path/to/emergency.recover>`. It holds `emergency.recover` contents and starts with `clnemerg1`."
7476
7476
]
7477
7477
}
7478
7478
}
@@ -30511,7 +30511,7 @@
30511
30511
"description": [
30512
30512
"The **recover** RPC command wipes your node and restarts it with the `--recover` option. This is only permitted if the node is unused: no channels, no bitcoin addresses issued (you can use `check` to see if recovery is possible).",
30513
30513
"",
30514
-
"*hsmsecret* is either a codex32 secret starting with \"cl1\" as returned by `hsmtool getcodexsecret`, or a raw 64 character hex string.",
30514
+
"*hsmsecret* is either a codex32 secret starting with \"cl1\" as returned by `lightning-hsmtool getcodexsecret`, or a raw 64 character hex string.",
30515
30515
"",
30516
30516
"NOTE: this command only currently works with the `sqlite3` database backend."
30517
30517
],
@@ -30524,7 +30524,7 @@
30524
30524
"hsmsecret": {
30525
30525
"type": "string",
30526
30526
"description": [
30527
-
"Either a codex32 secret starting with `cl1` as returned by `hsmtool getcodexsecret`, or a raw 64 character hex string."
30527
+
"Either a codex32 secret starting with `cl1` as returned by `lightning-hsmtool getcodexsecret`, or a raw 64 character hex string."
0 commit comments