lightninglabs / taproot-assets

A layer 1 daemon, for the Taproot Assets Protocol specification, written in Go (golang)
MIT License
460 stars 110 forks source link

Server shuts down on ACK #238

Closed HolmesDomain closed 1 year ago

HolmesDomain commented 1 year ago

My taro daemon server goes down after sending an asset and getting an ACK from them.

Scenario: Alice mints and sends a taro asset to Bob. When Bob receives the new asset, Alice shuts down on ACK/acknowledgement. See log below.

Environment: GNU/Linux OS

Scripts

alias tarocli-frank='/root/go/bin/tarocli --rpcserver=localhost:10031 --tlscertpath=/mnt/efs/development/taro-dir/frank/tls.cert --macaroonpath=/mnt/efs/development/taro-dir/frank/data/regtest/admin.macaroon'
alias tarocli-gerald='/root/go/bin/tarocli --rpcserver=localhost:10032 --tlscertpath=/mnt/efs/development/taro-dir/gerald/tls.cert --macaroonpath=/mnt/efs/development/taro-dir/gerald/data/regtest/admin.macaroon'
nohup /root/go/bin/tarod --network=regtest --debuglevel=debug --tarodir=/mnt/efs/development/taro-dir/gerald --rpclisten=127.0.0.1:10032 --restlisten=localhost:8091 --lnd.host=localhost:10008 --lnd.macaroonpath=/mnt/data/lightning-network/lightning-chain-dir/gerald/data/chain/bitcoin/regtest/admin.macaroon --lnd.tlspath=/root/.lnd/tls.cert &

Logs

2023-01-19 16:40:44.345 [DBG] GRDN: Inspecting tx a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41 for Taro address outputs
2023-01-19 16:40:44.350 [INF] FRTR: Outbound parcel now pending for d75957c3941e16a544e80d999f734890ebf213be64f119a887f42a3aba5302ee:02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0, delivering notification
2023-01-19 16:40:44.350 [INF] FRTR: Waiting for confirmation of transfer_txid=a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41
2023-01-19 16:45:20.681 [DBG] GRDN: Inspecting tx a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41 for Taro address outputs
2023-01-19 16:45:20.705 [DBG] FRTR: Got chain confirmation: a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41
2023-01-19 16:45:20.715 [INF] FRTR: Importing receiver proof into local Proof Archive
2023-01-19 16:45:20.742 [DBG] FRTR: Updated proofs for sender and receiver (new_len=2)
2023-01-19 16:45:20.742 [INF] FRTR: Marking parcel (txid=a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41) as confirmed!
2023-01-19 16:45:20.742 [INF] PROF: Attempting to deliver receiver proof for send of asset_id=d75957c3941e16a544e80d999f734890ebf213be64f119a887f42a3aba5302ee, amt=50
2023-01-19 16:45:20.742 [INF] PROF: Creating sender mailbox w/ sid=a6cc5ec4fa034d9744beb9f588b7c45e62b5d4dcdee24bb8b33d838e7503d02501ca9ed15de4937b2369ed32e0dd48d45af357c6152bd23cf5ff12da1916ffc7
2023-01-19 16:45:20.745 [INF] PROF: Sending receiver proof via sid=a6cc5ec4fa034d9744beb9f588b7c45e62b5d4dcdee24bb8b33d838e7503d02501ca9ed15de4937b2369ed32e0dd48d45af357c6152bd23cf5ff12da1916ffc7
2023-01-19 16:45:20.745 [INF] PROF: Creating receiver mailbox w/ sid=a6cc5ec4fa034d9744beb9f588b7c45e62b5d4dcdee24bb8b33d838e7503d02501ca9ed15de4937b2369ed32e0dd48d45af357c6152bd23cf5ff12da1916ffc6
2023-01-19 16:45:20.746 [INF] PROF: Waiting for receiver ACK via sid=a6cc5ec4fa034d9744beb9f588b7c45e62b5d4dcdee24bb8b33d838e7503d02501ca9ed15de4937b2369ed32e0dd48d45af357c6152bd23cf5ff12da1916ffc6
2023-01-19 16:45:20.749 [INF] PROF: Received ACK from receiver! Cleaning up mailboxes...

Extended Logs

2023-01-19 16:40:28.144 [INF] FRTR: Received to send request to: d75957c3941e16a544e80d999f734890ebf213be64f119a887f42a3aba5302ee:02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0
2023-01-19 16:40:28.144 [INF] FRTR: ChainPorter advancing from state=SendStateInitializing to state=SendStateBroadcast
2023-01-19 16:40:28.156 [INF] FRTR: Selected 1 possible asset inputs for send to 02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0
2023-01-19 16:40:28.156 [DBG] TARO: Deriving new key for fam_family=219
2023-01-19 16:40:28.161 [DBG] TARO: Deriving new key for fam_family=219
2023-01-19 16:40:28.166 [INF] FRTR: Generating Taro witnesses for send to: 02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0
2023-01-19 16:40:28.170 [INF] FRTR: Constructing new Taro commitments for send to: 02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0
2023-01-19 16:40:28.171 [WRN] FRTR: unable to advance state machine: unable to fund psbt: unable to fund psbt: rpc error: code = Unknown desc = wallet couldn't fund PSBT: error creating funding TX: insufficient funds available to construct transaction
2023-01-19 16:40:28.171 [ERR] RPCS: [/tarorpc.Taro/SendAsset]: unable to fund psbt: unable to fund psbt: rpc error: code = Unknown desc = wallet couldn't fund PSBT: error creating funding TX: insufficient funds available to construct transaction
2023-01-19 16:40:40.824 [DBG] GRDN: Inspecting tx bddfe69f146b6ca1687cbbe2ebf2560e49cc13d33de34206410bc55eee30f313 for Taro address outputs
2023-01-19 16:40:40.848 [DBG] GRDN: Got chain confirmation: bddfe69f146b6ca1687cbbe2ebf2560e49cc13d33de34206410bc55eee30f313
2023-01-19 16:40:40.848 [INF] GRDN: MintingBatch(022ecca14c9cf0fadf4ccf8d425a5cfb75015f8867fe654253472cc507b2657dc6): confirmed at block(hash=0bf43583126bd922b8aa38a9162195cf618f1f30a026fcdbee80639489f6cc50, height=2248)
2023-01-19 16:40:40.848 [INF] GRDN: BatchCaretaker(022ecca14c9cf0fadf4ccf8d425a5cfb75015f8867fe654253472cc507b2657dc6), advancing from state=BatchStateConfirmed to state=BatchStateFinalized
2023-01-19 16:40:40.963 [INF] GRDN: BatchCaretaker(022ecca14c9cf0fadf4ccf8d425a5cfb75015f8867fe654253472cc507b2657dc6): transition states: BatchStateConfirmed -> BatchStateFinalized
2023-01-19 16:40:40.963 [INF] GRDN: BatchCaretaker(022ecca14c9cf0fadf4ccf8d425a5cfb75015f8867fe654253472cc507b2657dc6): transition states: BatchStateFinalized -> BatchStateFinalized
2023-01-19 16:40:41.051 [INF] GRDN: ChainCaretaker(022ecca14c9cf0fadf4ccf8d425a5cfb75015f8867fe654253472cc507b2657dc6) has finished
2023-01-19 16:40:44.238 [INF] FRTR: New asset shipment request to addr: (*tarofreighter.AssetParcel)(0xc00000e0d8)({
 Dest: (*address.Taro)(0xc000251680)({
  ChainParams: (*address.ChainParams)(0xc000125f50)({
   Params: (*chaincfg.Params)(0x2352be0)({
    Name: (string) (len=7) "regtest",
    Net: (wire.BitcoinNet) TestNet,
    DefaultPort: (string) (len=5) "18444",
    DNSSeeds: ([]chaincfg.DNSSeed) {
    },
    GenesisBlock: (*wire.MsgBlock)(0x234eda0)({
     Header: (wire.BlockHeader) {
      Version: (int32) 1,
      PrevBlock: (chainhash.Hash) (len=32 cap=32) 0000000000000000000000000000000000000000000000000000000000000000,
      MerkleRoot: (chainhash.Hash) (len=32 cap=32) 4a5e1e4baab89f3a32518a88c31bc87f618f76673e2cc77ab2127b7afdeda33b,
      Timestamp: (time.Time) 2011-02-02 23:16:42 +0000 UTC,
      Bits: (uint32) 545259519,
      Nonce: (uint32) 2
     },
     Transactions: ([]*wire.MsgTx) (len=1 cap=1) {
      (*wire.MsgTx)(0x234c600)({
       Version: (int32) 1,
       TxIn: ([]*wire.TxIn) (len=1 cap=1) {
        (*wire.TxIn)(0x234ddc0)({
         PreviousOutPoint: (wire.OutPoint) 0000000000000000000000000000000000000000000000000000000000000000:4294967295,
         SignatureScript: ([]uint8) (len=77 cap=77) {
          00000000  04 ff ff 00 1d 01 04 45  54 68 65 20 54 69 6d 65  |.......EThe Time|
          00000010  73 20 30 33 2f 4a 61 6e  2f 32 30 30 39 20 43 68  |s 03/Jan/2009 Ch|
          00000020  61 6e 63 65 6c 6c 6f 72  20 6f 6e 20 62 72 69 6e  |ancellor on brin|
          00000030  6b 20 6f 66 20 73 65 63  6f 6e 64 20 62 61 69 6c  |k of second bail|
          00000040  6f 75 74 20 66 6f 72 20  62 61 6e 6b 73           |out for banks|
         },
         Witness: (wire.TxWitness) <nil>,
         Sequence: (uint32) 4294967295
        })
       },
       TxOut: ([]*wire.TxOut) (len=1 cap=1) {
        (*wire.TxOut)(0x2344da0)({
         Value: (int64) 5000000000,
         PkScript: ([]uint8) (len=67 cap=67) {
          00000000  41 04 67 8a fd b0 fe 55  48 27 19 67 f1 a6 71 30  |A.g....UH'.g..q0|
          00000010  b7 10 5c d6 a8 28 e0 39  09 a6 79 62 e0 ea 1f 61  |..\..(.9..yb...a|
          00000020  de b6 49 f6 bc 3f 4c ef  38 c4 f3 55 04 e5 1e c1  |..I..?L.8..U....|
          00000030  12 de 5c 38 4d f7 ba 0b  8d 57 8a 4c 70 2b 6b f1  |..\8M....W.Lp+k.|
          00000040  1d 5f ac                                          |._.|
         }
        })
       },
       LockTime: (uint32) 0
      })
     }
    }),
    GenesisHash: (*chainhash.Hash)(0x22253e0)((len=32 cap=32) 0f9188f13cb7b2c71f2a335e3a4fc328bf5beb436012afca590b1a11466e2206),
    PowLimit: (*big.Int)(0xc00014a540)(57896044618658097711785492504343953926634992332820282019728792003956564819967),
    PowLimitBits: (uint32) 545259519,
    BIP0034Height: (int32) 100000000,
    BIP0065Height: (int32) 1351,
    BIP0066Height: (int32) 1251,
    CoinbaseMaturity: (uint16) 100,
    SubsidyReductionInterval: (int32) 150,
    TargetTimespan: (time.Duration) 336h0m0s,
    TargetTimePerBlock: (time.Duration) 10m0s,
    RetargetAdjustmentFactor: (int64) 4,
    ReduceMinDifficulty: (bool) true,
    MinDiffReductionTime: (time.Duration) 20m0s,
    GenerateSupported: (bool) true,
    Checkpoints: ([]chaincfg.Checkpoint) <nil>,
    RuleChangeActivationThreshold: (uint32) 108,
    MinerConfirmationWindow: (uint32) 144,
    Deployments: ([5]chaincfg.ConsensusDeployment) (len=5 cap=5) {
     (chaincfg.ConsensusDeployment) {
      BitNumber: (uint8) 28,
      MinActivationHeight: (uint32) 0,
      CustomActivationThreshold: (uint32) 0,
      DeploymentStarter: (*chaincfg.MedianTimeDeploymentStarter)(0xc000118f90)({
       blockClock: (chaincfg.BlockClock) <nil>,
       startTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      }),
      DeploymentEnder: (*chaincfg.MedianTimeDeploymentEnder)(0xc000118fc0)({
       blockClock: (chaincfg.BlockClock) <nil>,
       endTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      })
     },
     (chaincfg.ConsensusDeployment) {
      BitNumber: (uint8) 22,
      MinActivationHeight: (uint32) 600,
      CustomActivationThreshold: (uint32) 72,
      DeploymentStarter: (*chaincfg.MedianTimeDeploymentStarter)(0xc000118ff0)({
       blockClock: (chaincfg.BlockClock) <nil>,
       startTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      }),
      DeploymentEnder: (*chaincfg.MedianTimeDeploymentEnder)(0xc000119020)({
       blockClock: (chaincfg.BlockClock) <nil>,
       endTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      })
     },
     (chaincfg.ConsensusDeployment) {
      BitNumber: (uint8) 0,
      MinActivationHeight: (uint32) 0,
      CustomActivationThreshold: (uint32) 0,
      DeploymentStarter: (*chaincfg.MedianTimeDeploymentStarter)(0xc000119050)({
       blockClock: (chaincfg.BlockClock) <nil>,
       startTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      }),
      DeploymentEnder: (*chaincfg.MedianTimeDeploymentEnder)(0xc000119080)({
       blockClock: (chaincfg.BlockClock) <nil>,
       endTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      })
     },
     (chaincfg.ConsensusDeployment) {
      BitNumber: (uint8) 1,
      MinActivationHeight: (uint32) 0,
      CustomActivationThreshold: (uint32) 0,
      DeploymentStarter: (*chaincfg.MedianTimeDeploymentStarter)(0xc0001190b0)({
       blockClock: (chaincfg.BlockClock) <nil>,
       startTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      }),
      DeploymentEnder: (*chaincfg.MedianTimeDeploymentEnder)(0xc0001190e0)({
       blockClock: (chaincfg.BlockClock) <nil>,
       endTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      })
     },
     (chaincfg.ConsensusDeployment) {
      BitNumber: (uint8) 2,
      MinActivationHeight: (uint32) 0,
      CustomActivationThreshold: (uint32) 108,
      DeploymentStarter: (*chaincfg.MedianTimeDeploymentStarter)(0xc000119110)({
       blockClock: (chaincfg.BlockClock) <nil>,
       startTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      }),
      DeploymentEnder: (*chaincfg.MedianTimeDeploymentEnder)(0xc000119140)({
       blockClock: (chaincfg.BlockClock) <nil>,
       endTime: (time.Time) 0001-01-01 00:00:00 +0000 UTC
      })
     }
    },
    RelayNonStdTxs: (bool) true,
    Bech32HRPSegwit: (string) (len=4) "bcrt",
    PubKeyHashAddrID: (uint8) 111,
    ScriptHashAddrID: (uint8) 196,
    PrivateKeyID: (uint8) 239,
    WitnessPubKeyHashAddrID: (uint8) 0,
    WitnessScriptHashAddrID: (uint8) 0,
    HDPrivateKeyID: ([4]uint8) (len=4 cap=4) {
     00000000  04 35 83 94                                       |.5..|
    },
    HDPublicKeyID: ([4]uint8) (len=4 cap=4) {
     00000000  04 35 87 cf                                       |.5..|
    },
    HDCoinType: (uint32) 1
   }),
   TaroHRP: (string) (len=6) "tarort"
  }),
  Version: (asset.Version) 0,
  Genesis: (asset.Genesis) {
   FirstPrevOut: (wire.OutPoint) 3d27e2864b0eb6974a78faa628be04e9a4f1904ff9fbf0d717fae2ea1cd72036:2,
   Tag: (string) (len=5) "ACoin",
   Metadata: ([]uint8) (len=5 cap=5) {
    00000000  41 43 6f 69 6e                                    |ACoin|
   },
   OutputIndex: (uint32) 0,
   Type: (asset.Type) Normal
  },
  GroupKey: (*secp256k1.PublicKey)(<nil>),
  ScriptKey: (secp256k1.PublicKey) {
   x: (secp256k1.FieldVal) abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0,
   y: (secp256k1.FieldVal) a67f86ac1fea9f4ee2b79efa44ecf091d2bcfce0ef7841998a15b326764c606c
  },
  InternalKey: (secp256k1.PublicKey) {
   x: (secp256k1.FieldVal) 06fe4dea4b4558a0bb4b11a4d4b234d41a9076e87c9294fadc0fa14bc9f369ff,
   y: (secp256k1.FieldVal) 5b39e1c88d29cee410d33aa4827060008de1b4878eabee37fc52d0675f8b40b3
  },
  Amount: (uint64) 50
 }),
 respChan: (chan *tarofreighter.PendingParcel) (cap=1) 0xc0000db0e0,
 errChan: (chan error) (cap=1) 0xc0000db080
})

2023-01-19 16:40:44.238 [INF] FRTR: Received to send request to: d75957c3941e16a544e80d999f734890ebf213be64f119a887f42a3aba5302ee:02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0
2023-01-19 16:40:44.239 [INF] FRTR: ChainPorter advancing from state=SendStateInitializing to state=SendStateBroadcast
2023-01-19 16:40:44.249 [INF] FRTR: Selected 1 possible asset inputs for send to 02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0
2023-01-19 16:40:44.249 [DBG] TARO: Deriving new key for fam_family=219
2023-01-19 16:40:44.254 [DBG] TARO: Deriving new key for fam_family=219
2023-01-19 16:40:44.259 [INF] FRTR: Generating Taro witnesses for send to: 02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0
2023-01-19 16:40:44.263 [INF] FRTR: Constructing new Taro commitments for send to: 02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0
2023-01-19 16:40:44.273 [INF] FRTR: Received funded PSBT packet: (*psbt.Packet)(0xc0008b1540)({
 UnsignedTx: (*wire.MsgTx)(0xc00085b680)({
  Version: (int32) 2,
  TxIn: ([]*wire.TxIn) (len=1 cap=1) {
   (*wire.TxIn)(0xc0004fc660)({
    PreviousOutPoint: (wire.OutPoint) bddfe69f146b6ca1687cbbe2ebf2560e49cc13d33de34206410bc55eee30f313:1,
    SignatureScript: ([]uint8) {
    },
    Witness: (wire.TxWitness) <nil>,
    Sequence: (uint32) 4294967295
   })
  },
  TxOut: ([]*wire.TxOut) (len=3 cap=3) {
   (*wire.TxOut)(0xc0004fc6c0)({
    Value: (int64) 1000,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
     00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
     00000020  00 00                                             |..|
    }
   }),
   (*wire.TxOut)(0xc0004fc6e0)({
    Value: (int64) 1000,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
     00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
     00000020  00 00                                             |..|
    }
   }),
   (*wire.TxOut)(0xc000308f20)({
    Value: (int64) 99740691,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  51 20 4c 48 30 bc 91 af  ae 0c 5e c5 c7 58 48 53  |Q LH0.....^..XHS|
     00000010  c3 79 5b 80 b8 0b 22 50  44 a3 21 23 16 8c 24 48  |.y[..."PD.!#..$H|
     00000020  4f 31                                             |O1|
    }
   })
  },
  LockTime: (uint32) 0
 }),
 Inputs: ([]psbt.PInput) (len=1 cap=1) {
  (psbt.PInput) {
   NonWitnessUtxo: (*wire.MsgTx)(<nil>),
   WitnessUtxo: (*wire.TxOut)(0xc000308ee0)({
    Value: (int64) 99751591,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  51 20 43 62 95 db 4f 73  55 a5 8a 67 5c 6b 27 1f  |Q Cb..OsU..g\k'.|
     00000010  b0 68 01 6c 47 ee 70 b8  c5 da 95 73 9c 67 89 a1  |.h.lG.p....s.g..|
     00000020  0b 6a                                             |.j|
    }
   }),
   PartialSigs: ([]*psbt.PartialSig) <nil>,
   SighashType: (txscript.SigHashType) 0,
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) (len=1 cap=1) {
    (*psbt.Bip32Derivation)(0xc00085b6c0)({
     PubKey: ([]uint8) (len=33 cap=33) {
      00000000  02 29 13 f6 79 e5 22 90  56 34 ea 4e c4 c4 be fd  |.)..y.".V4.N....|
      00000010  9b 67 df 3b fd b2 6e 21  b3 3b 75 69 2b a1 ce b1  |.g.;..n!.;ui+...|
      00000020  65                                                |e|
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147483734,
      (uint32) 2147483648,
      (uint32) 2147483648,
      (uint32) 1,
      (uint32) 8
     }
    })
   },
   FinalScriptSig: ([]uint8) <nil>,
   FinalScriptWitness: ([]uint8) <nil>,
   TaprootKeySpendSig: ([]uint8) <nil>,
   TaprootScriptSpendSig: ([]*psbt.TaprootScriptSpendSig) <nil>,
   TaprootLeafScript: ([]*psbt.TaprootTapLeafScript) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) (len=1 cap=1) {
    (*psbt.TaprootBip32Derivation)(0xc0008b14a0)({
     XOnlyPubKey: ([]uint8) (len=32 cap=32) {
      00000000  29 13 f6 79 e5 22 90 56  34 ea 4e c4 c4 be fd 9b  |)..y.".V4.N.....|
      00000010  67 df 3b fd b2 6e 21 b3  3b 75 69 2b a1 ce b1 65  |g.;..n!.;ui+...e|
     },
     LeafHashes: ([][]uint8) {
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147483734,
      (uint32) 2147483648,
      (uint32) 2147483648,
      (uint32) 1,
      (uint32) 8
     }
    })
   },
   TaprootInternalKey: ([]uint8) <nil>,
   TaprootMerkleRoot: ([]uint8) <nil>,
   Unknowns: ([]*psbt.Unknown) <nil>
  }
 },
 Outputs: ([]psbt.POutput) (len=3 cap=3) {
  (psbt.POutput) {
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) <nil>,
   TaprootInternalKey: ([]uint8) <nil>,
   TaprootTapTree: ([]uint8) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) <nil>
  },
  (psbt.POutput) {
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) <nil>,
   TaprootInternalKey: ([]uint8) <nil>,
   TaprootTapTree: ([]uint8) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) <nil>
  },
  (psbt.POutput) {
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) (len=1 cap=1) {
    (*psbt.Bip32Derivation)(0xc00085b700)({
     PubKey: ([]uint8) (len=33 cap=33) {
      00000000  02 5d c7 31 ae ac c5 7a  07 98 e1 74 0f 71 3c ab  |.].1...z...t.q<.|
      00000010  09 cc e0 76 1c 92 7c cf  a9 15 23 ef d5 94 c7 15  |...v..|...#.....|
      00000020  49                                                |I|
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147483734,
      (uint32) 2147483648,
      (uint32) 2147483648,
      (uint32) 1,
      (uint32) 9
     }
    })
   },
   TaprootInternalKey: ([]uint8) (len=32 cap=32) {
    00000000  5d c7 31 ae ac c5 7a 07  98 e1 74 0f 71 3c ab 09  |].1...z...t.q<..|
    00000010  cc e0 76 1c 92 7c cf a9  15 23 ef d5 94 c7 15 49  |..v..|...#.....I|
   },
   TaprootTapTree: ([]uint8) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) (len=1 cap=1) {
    (*psbt.TaprootBip32Derivation)(0xc0008b14f0)({
     XOnlyPubKey: ([]uint8) (len=32 cap=32) {
      00000000  5d c7 31 ae ac c5 7a 07  98 e1 74 0f 71 3c ab 09  |].1...z...t.q<..|
      00000010  cc e0 76 1c 92 7c cf a9  15 23 ef d5 94 c7 15 49  |..v..|...#.....I|
     },
     LeafHashes: ([][]uint8) {
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147483734,
      (uint32) 2147483648,
      (uint32) 2147483648,
      (uint32) 1,
      (uint32) 9
     }
    })
   }
  }
 },
 Unknowns: ([]psbt.Unknown) <nil>
})

2023-01-19 16:40:44.274 [INF] FRTR: Adjusting send pkt by delta of 2825 from 9900 sats to 12725 sats
2023-01-19 16:40:44.276 [DBG] FRTR: Got signed PSBT: (*psbt.Packet)(0xc0005114f0)({
 UnsignedTx: (*wire.MsgTx)(0xc000719900)({
  Version: (int32) 2,
  TxIn: ([]*wire.TxIn) (len=2 cap=2) {
   (*wire.TxIn)(0xc0001912c0)({
    PreviousOutPoint: (wire.OutPoint) bddfe69f146b6ca1687cbbe2ebf2560e49cc13d33de34206410bc55eee30f313:1,
    SignatureScript: ([]uint8) {
    },
    Witness: (wire.TxWitness) <nil>,
    Sequence: (uint32) 4294967295
   }),
   (*wire.TxIn)(0xc000191320)({
    PreviousOutPoint: (wire.OutPoint) bddfe69f146b6ca1687cbbe2ebf2560e49cc13d33de34206410bc55eee30f313:0,
    SignatureScript: ([]uint8) {
    },
    Witness: (wire.TxWitness) <nil>,
    Sequence: (uint32) 0
   })
  },
  TxOut: ([]*wire.TxOut) (len=3 cap=3) {
   (*wire.TxOut)(0xc00085e360)({
    Value: (int64) 1000,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  51 20 7f cb 50 45 b1 0f  22 dd f8 67 76 53 c2 74  |Q ..PE.."..gvS.t|
     00000010  bc 42 10 48 95 69 5d 2f  be 26 e6 ba 37 fa a2 e5  |.B.H.i]/.&..7...|
     00000020  18 0e                                             |..|
    }
   }),
   (*wire.TxOut)(0xc00085e380)({
    Value: (int64) 1000,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  51 20 9b db 28 14 cd 15  1b 2e dc 1f 81 70 d5 ea  |Q ..(........p..|
     00000010  2c ab 75 dc 31 91 01 27  b6 17 19 2f 6a 7f ee 9e  |,.u.1..'.../j...|
     00000020  77 14                                             |w.|
    }
   }),
   (*wire.TxOut)(0xc00085e3a0)({
    Value: (int64) 99737866,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  51 20 4c 48 30 bc 91 af  ae 0c 5e c5 c7 58 48 53  |Q LH0.....^..XHS|
     00000010  c3 79 5b 80 b8 0b 22 50  44 a3 21 23 16 8c 24 48  |.y[..."PD.!#..$H|
     00000020  4f 31                                             |O1|
    }
   })
  },
  LockTime: (uint32) 0
 }),
 Inputs: ([]psbt.PInput) (len=2 cap=2) {
  (psbt.PInput) {
   NonWitnessUtxo: (*wire.MsgTx)(<nil>),
   WitnessUtxo: (*wire.TxOut)(0xc0006a6640)({
    Value: (int64) 99751591,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  51 20 43 62 95 db 4f 73  55 a5 8a 67 5c 6b 27 1f  |Q Cb..OsU..g\k'.|
     00000010  b0 68 01 6c 47 ee 70 b8  c5 da 95 73 9c 67 89 a1  |.h.lG.p....s.g..|
     00000020  0b 6a                                             |.j|
    }
   }),
   PartialSigs: ([]*psbt.PartialSig) <nil>,
   SighashType: (txscript.SigHashType) 0,
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) (len=1 cap=1) {
    (*psbt.Bip32Derivation)(0xc000719940)({
     PubKey: ([]uint8) (len=33 cap=33) {
      00000000  02 29 13 f6 79 e5 22 90  56 34 ea 4e c4 c4 be fd  |.)..y.".V4.N....|
      00000010  9b 67 df 3b fd b2 6e 21  b3 3b 75 69 2b a1 ce b1  |.g.;..n!.;ui+...|
      00000020  65                                                |e|
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147483734,
      (uint32) 2147483648,
      (uint32) 2147483648,
      (uint32) 1,
      (uint32) 8
     }
    })
   },
   FinalScriptSig: ([]uint8) <nil>,
   FinalScriptWitness: ([]uint8) <nil>,
   TaprootKeySpendSig: ([]uint8) (len=64 cap=64) {
    00000000  49 fa 71 c2 5d 95 aa a6  6a 1c ca a3 17 7a 66 00  |I.q.]...j....zf.|
    00000010  78 5b 90 1d 45 23 ed a3  98 4c f9 a2 70 9c 32 24  |x[..E#...L..p.2$|
    00000020  0c 9a ff e3 1d df 09 68  2d 03 e5 ea dd 58 9f 52  |.......h-....X.R|
    00000030  b6 7c ad a1 69 d2 cf 6e  2c 04 43 b6 fd 3d 3e 05  |.|..i..n,.C..=>.|
   },
   TaprootScriptSpendSig: ([]*psbt.TaprootScriptSpendSig) <nil>,
   TaprootLeafScript: ([]*psbt.TaprootTapLeafScript) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) (len=1 cap=1) {
    (*psbt.TaprootBip32Derivation)(0xc000511400)({
     XOnlyPubKey: ([]uint8) (len=32 cap=32) {
      00000000  29 13 f6 79 e5 22 90 56  34 ea 4e c4 c4 be fd 9b  |)..y.".V4.N.....|
      00000010  67 df 3b fd b2 6e 21 b3  3b 75 69 2b a1 ce b1 65  |g.;..n!.;ui+...e|
     },
     LeafHashes: ([][]uint8) {
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147483734,
      (uint32) 2147483648,
      (uint32) 2147483648,
      (uint32) 1,
      (uint32) 8
     }
    })
   },
   TaprootInternalKey: ([]uint8) <nil>,
   TaprootMerkleRoot: ([]uint8) <nil>,
   Unknowns: ([]*psbt.Unknown) <nil>
  },
  (psbt.PInput) {
   NonWitnessUtxo: (*wire.MsgTx)(<nil>),
   WitnessUtxo: (*wire.TxOut)(0xc0006a6680)({
    Value: (int64) 1000,
    PkScript: ([]uint8) (len=34 cap=34) {
     00000000  51 20 bd 11 22 81 4e c7  23 d9 41 1b 1c 28 d6 c6  |Q ..".N.#.A..(..|
     00000010  1c de 0f 80 c1 b6 02 db  ba 0b b5 5b e5 93 3b 99  |...........[..;.|
     00000020  09 3b                                             |.;|
    }
   }),
   PartialSigs: ([]*psbt.PartialSig) <nil>,
   SighashType: (txscript.SigHashType) 0,
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) (len=1 cap=1) {
    (*psbt.Bip32Derivation)(0xc000719980)({
     PubKey: ([]uint8) (len=33 cap=33) {
      00000000  02 2e cc a1 4c 9c f0 fa  df 4c cf 8d 42 5a 5c fb  |....L....L..BZ\.|
      00000010  75 01 5f 88 67 fe 65 42  53 47 2c c5 07 b2 65 7d  |u._.g.eBSG,...e}|
      00000020  c6                                                |.|
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147484665,
      (uint32) 2147483649,
      (uint32) 2147483867,
      (uint32) 0,
      (uint32) 11
     }
    })
   },
   FinalScriptSig: ([]uint8) <nil>,
   FinalScriptWitness: ([]uint8) <nil>,
   TaprootKeySpendSig: ([]uint8) (len=64 cap=64) {
    00000000  c1 26 93 a8 ab e3 bb e0  1c 8d 67 a4 e6 2e fc 9c  |.&........g.....|
    00000010  35 74 0b cb 42 1e 6d 7d  9e 80 6f ff 7c 49 c1 ea  |5t..B.m}..o.|I..|
    00000020  84 67 de 57 10 94 c5 3e  db a2 4f 2d 0f 92 44 ee  |.g.W...>..O-..D.|
    00000030  70 98 53 28 3c b4 e8 0b  82 07 b5 36 e8 92 1c c1  |p.S(<......6....|
   },
   TaprootScriptSpendSig: ([]*psbt.TaprootScriptSpendSig) <nil>,
   TaprootLeafScript: ([]*psbt.TaprootTapLeafScript) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) (len=1 cap=1) {
    (*psbt.TaprootBip32Derivation)(0xc000511450)({
     XOnlyPubKey: ([]uint8) (len=32 cap=32) {
      00000000  2e cc a1 4c 9c f0 fa df  4c cf 8d 42 5a 5c fb 75  |...L....L..BZ\.u|
      00000010  01 5f 88 67 fe 65 42 53  47 2c c5 07 b2 65 7d c6  |._.g.eBSG,...e}.|
     },
     LeafHashes: ([][]uint8) {
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147484665,
      (uint32) 2147483649,
      (uint32) 2147483867,
      (uint32) 0,
      (uint32) 11
     }
    })
   },
   TaprootInternalKey: ([]uint8) <nil>,
   TaprootMerkleRoot: ([]uint8) (len=32 cap=32) {
    00000000  02 c9 06 43 f6 a2 7f 65  cc bc 08 8f 48 b5 a6 8c  |...C...e....H...|
    00000010  30 af ea 9a 43 af 1f 82  4a a8 ee b8 8b f0 7a 64  |0...C...J.....zd|
   },
   Unknowns: ([]*psbt.Unknown) <nil>
  }
 },
 Outputs: ([]psbt.POutput) (len=3 cap=3) {
  (psbt.POutput) {
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) <nil>,
   TaprootInternalKey: ([]uint8) <nil>,
   TaprootTapTree: ([]uint8) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) <nil>
  },
  (psbt.POutput) {
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) <nil>,
   TaprootInternalKey: ([]uint8) <nil>,
   TaprootTapTree: ([]uint8) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) <nil>
  },
  (psbt.POutput) {
   RedeemScript: ([]uint8) <nil>,
   WitnessScript: ([]uint8) <nil>,
   Bip32Derivation: ([]*psbt.Bip32Derivation) (len=1 cap=1) {
    (*psbt.Bip32Derivation)(0xc0007199c0)({
     PubKey: ([]uint8) (len=33 cap=33) {
      00000000  02 5d c7 31 ae ac c5 7a  07 98 e1 74 0f 71 3c ab  |.].1...z...t.q<.|
      00000010  09 cc e0 76 1c 92 7c cf  a9 15 23 ef d5 94 c7 15  |...v..|...#.....|
      00000020  49                                                |I|
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147483734,
      (uint32) 2147483648,
      (uint32) 2147483648,
      (uint32) 1,
      (uint32) 9
     }
    })
   },
   TaprootInternalKey: ([]uint8) (len=32 cap=32) {
    00000000  5d c7 31 ae ac c5 7a 07  98 e1 74 0f 71 3c ab 09  |].1...z...t.q<..|
    00000010  cc e0 76 1c 92 7c cf a9  15 23 ef d5 94 c7 15 49  |..v..|...#.....I|
   },
   TaprootTapTree: ([]uint8) <nil>,
   TaprootBip32Derivation: ([]*psbt.TaprootBip32Derivation) (len=1 cap=1) {
    (*psbt.TaprootBip32Derivation)(0xc0005114a0)({
     XOnlyPubKey: ([]uint8) (len=32 cap=32) {
      00000000  5d c7 31 ae ac c5 7a 07  98 e1 74 0f 71 3c ab 09  |].1...z...t.q<..|
      00000010  cc e0 76 1c 92 7c cf a9  15 23 ef d5 94 c7 15 49  |..v..|...#.....I|
     },
     LeafHashes: ([][]uint8) {
     },
     MasterKeyFingerprint: (uint32) 0,
     Bip32Path: ([]uint32) (len=5 cap=8) {
      (uint32) 2147483734,
      (uint32) 2147483648,
      (uint32) 2147483648,
      (uint32) 1,
      (uint32) 9
     }
    })
   }
  }
 },
 Unknowns: ([]psbt.Unknown) <nil>
})

2023-01-19 16:40:44.285 [INF] FRTR: Committing pending parcel to disk
2023-01-19 16:40:44.341 [INF] FRTR: Broadcasting new transfer tx, taro_anchor_output=(*wire.TxOut)(0xc0006a6980)({
 Value: (int64) 1000,
 PkScript: ([]uint8) (len=34 cap=34) {
  00000000  51 20 7f cb 50 45 b1 0f  22 dd f8 67 76 53 c2 74  |Q ..PE.."..gvS.t|
  00000010  bc 42 10 48 95 69 5d 2f  be 26 e6 ba 37 fa a2 e5  |.B.H.i]/.&..7...|
  00000020  18 0e                                             |..|
 }
})

2023-01-19 16:40:44.345 [DBG] GRDN: Inspecting tx a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41 for Taro address outputs
2023-01-19 16:40:44.350 [INF] FRTR: Outbound parcel now pending for d75957c3941e16a544e80d999f734890ebf213be64f119a887f42a3aba5302ee:02abca8a2b5e367a9a6f2ed43e0bd4bb7883463d10a3d2c2d54ae3aff03a14e1b0, delivering notification
2023-01-19 16:40:44.350 [INF] FRTR: Waiting for confirmation of transfer_txid=a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41
2023-01-19 16:45:20.681 [DBG] GRDN: Inspecting tx a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41 for Taro address outputs
2023-01-19 16:45:20.705 [DBG] FRTR: Got chain confirmation: a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41
2023-01-19 16:45:20.715 [INF] FRTR: Importing receiver proof into local Proof Archive
2023-01-19 16:45:20.742 [DBG] FRTR: Updated proofs for sender and receiver (new_len=2)
2023-01-19 16:45:20.742 [INF] FRTR: Marking parcel (txid=a4078985302b99013e0c8f7349f5e9fe0d272e5f0e4d64c8d00d037d5af7bb41) as confirmed!
2023-01-19 16:45:20.742 [INF] PROF: Attempting to deliver receiver proof for send of asset_id=d75957c3941e16a544e80d999f734890ebf213be64f119a887f42a3aba5302ee, amt=50
2023-01-19 16:45:20.742 [INF] PROF: Creating sender mailbox w/ sid=a6cc5ec4fa034d9744beb9f588b7c45e62b5d4dcdee24bb8b33d838e7503d02501ca9ed15de4937b2369ed32e0dd48d45af357c6152bd23cf5ff12da1916ffc7
2023-01-19 16:45:20.745 [INF] PROF: Sending receiver proof via sid=a6cc5ec4fa034d9744beb9f588b7c45e62b5d4dcdee24bb8b33d838e7503d02501ca9ed15de4937b2369ed32e0dd48d45af357c6152bd23cf5ff12da1916ffc7
2023-01-19 16:45:20.745 [INF] PROF: Creating receiver mailbox w/ sid=a6cc5ec4fa034d9744beb9f588b7c45e62b5d4dcdee24bb8b33d838e7503d02501ca9ed15de4937b2369ed32e0dd48d45af357c6152bd23cf5ff12da1916ffc6
2023-01-19 16:45:20.746 [INF] PROF: Waiting for receiver ACK via sid=a6cc5ec4fa034d9744beb9f588b7c45e62b5d4dcdee24bb8b33d838e7503d02501ca9ed15de4937b2369ed32e0dd48d45af357c6152bd23cf5ff12da1916ffc6
2023-01-19 16:45:20.749 [INF] PROF: Received ACK from receiver! Cleaning up mailboxes...
Roasbeef commented 1 year ago

Are you able to capture stderr? There might be something there relevant. Everything up to the last line looks good though.

HolmesDomain commented 1 year ago

Hey, sorry I tore down the environment I was using and was unable to get the stderr in the moment. If I can reproduce the issue in the future I'll try to get that info. You can close if you want and no one else is experiencing this.