2020-01-03 13:01:31 +00:00
|
|
|
package loopd
|
2019-03-06 20:13:50 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-09-03 11:25:59 +00:00
|
|
|
"crypto/tls"
|
2019-05-03 08:17:26 +00:00
|
|
|
"errors"
|
2019-03-06 20:13:50 +00:00
|
|
|
"fmt"
|
|
|
|
"net"
|
2019-03-12 22:35:53 +00:00
|
|
|
"net/http"
|
2020-09-03 11:26:00 +00:00
|
|
|
"strings"
|
2019-03-06 20:13:50 +00:00
|
|
|
"sync"
|
2020-05-15 10:17:59 +00:00
|
|
|
"sync/atomic"
|
2023-09-28 11:16:01 +00:00
|
|
|
"time"
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2021-04-26 13:35:20 +00:00
|
|
|
"github.com/coreos/bbolt"
|
2021-07-29 11:32:53 +00:00
|
|
|
proxy "github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
|
2020-06-17 20:25:57 +00:00
|
|
|
"github.com/lightninglabs/lndclient"
|
2019-03-07 04:32:24 +00:00
|
|
|
"github.com/lightninglabs/loop"
|
2022-06-14 13:12:22 +00:00
|
|
|
"github.com/lightninglabs/loop/loopd/perms"
|
2022-01-13 12:12:19 +00:00
|
|
|
"github.com/lightninglabs/loop/loopdb"
|
2019-03-06 23:53:17 +00:00
|
|
|
"github.com/lightninglabs/loop/looprpc"
|
2020-01-31 12:57:21 +00:00
|
|
|
"github.com/lightningnetwork/lnd/lntypes"
|
2020-09-03 12:35:41 +00:00
|
|
|
"github.com/lightningnetwork/lnd/macaroons"
|
2019-03-06 20:13:50 +00:00
|
|
|
"google.golang.org/grpc"
|
2021-07-29 11:32:53 +00:00
|
|
|
"google.golang.org/protobuf/encoding/protojson"
|
2020-09-03 12:35:43 +00:00
|
|
|
"gopkg.in/macaroon-bakery.v2/bakery"
|
2019-03-06 20:13:50 +00:00
|
|
|
)
|
|
|
|
|
2020-01-31 12:57:26 +00:00
|
|
|
var (
|
|
|
|
// maxMsgRecvSize is the largest message our REST proxy will receive. We
|
|
|
|
// set this to 200MiB atm.
|
|
|
|
maxMsgRecvSize = grpc.MaxCallRecvMsgSize(1 * 1024 * 1024 * 200)
|
2020-05-15 10:17:59 +00:00
|
|
|
|
|
|
|
// errOnlyStartOnce is the error that is returned if the daemon is
|
|
|
|
// started more than once.
|
|
|
|
errOnlyStartOnce = fmt.Errorf("daemon can only be started once")
|
2020-01-31 12:57:26 +00:00
|
|
|
)
|
|
|
|
|
2021-11-12 09:14:47 +00:00
|
|
|
// ListenerCfg holds closures used to retrieve listeners for the gRPC services.
|
|
|
|
type ListenerCfg struct {
|
2020-09-03 11:25:59 +00:00
|
|
|
// grpcListener returns a TLS listener to use for the gRPC server, based
|
|
|
|
// on the passed TLS configuration.
|
|
|
|
grpcListener func(*tls.Config) (net.Listener, error)
|
2020-01-03 13:01:31 +00:00
|
|
|
|
2020-09-03 11:25:59 +00:00
|
|
|
// restListener returns a TLS listener to use for the REST proxy, based
|
|
|
|
// on the passed TLS configuration.
|
|
|
|
restListener func(*tls.Config) (net.Listener, error)
|
2020-01-03 13:01:32 +00:00
|
|
|
|
|
|
|
// getLnd returns a grpc connection to an lnd instance.
|
2020-06-17 20:25:57 +00:00
|
|
|
getLnd func(lndclient.Network, *lndConfig) (*lndclient.GrpcLndServices,
|
|
|
|
error)
|
2020-01-03 13:01:31 +00:00
|
|
|
}
|
|
|
|
|
2020-05-15 10:17:58 +00:00
|
|
|
// Daemon is the struct that holds one instance of the loop client daemon.
|
|
|
|
type Daemon struct {
|
2020-05-15 10:17:59 +00:00
|
|
|
// To be used atomically. Declared first to optimize struct alignment.
|
|
|
|
started int32
|
|
|
|
|
2020-05-15 10:17:58 +00:00
|
|
|
// swapClientServer is the embedded RPC server that satisfies the client
|
|
|
|
// RPC interface. We embed this struct so the Daemon itself can be
|
|
|
|
// registered to an existing grpc.Server to run as a subserver in the
|
|
|
|
// same process.
|
|
|
|
swapClientServer
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// ErrChan is an error channel that users of the Daemon struct must use
|
|
|
|
// to detect runtime errors and also whether a shutdown is fully
|
|
|
|
// completed.
|
|
|
|
ErrChan chan error
|
|
|
|
|
|
|
|
cfg *Config
|
2021-11-12 09:14:47 +00:00
|
|
|
listenerCfg *ListenerCfg
|
2020-05-15 10:17:59 +00:00
|
|
|
internalErrChan chan error
|
|
|
|
|
|
|
|
lnd *lndclient.GrpcLndServices
|
|
|
|
clientCleanup func()
|
2020-05-15 10:17:58 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
wg sync.WaitGroup
|
|
|
|
quit chan struct{}
|
|
|
|
stopOnce sync.Once
|
|
|
|
|
|
|
|
mainCtx context.Context
|
|
|
|
mainCtxCancel func()
|
|
|
|
|
|
|
|
grpcServer *grpc.Server
|
|
|
|
grpcListener net.Listener
|
|
|
|
restServer *http.Server
|
|
|
|
restListener net.Listener
|
|
|
|
restCtxCancel func()
|
2020-09-03 12:35:41 +00:00
|
|
|
|
2022-01-13 12:12:19 +00:00
|
|
|
macaroonService *lndclient.MacaroonService
|
2020-05-15 10:17:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// New creates a new instance of the loop client daemon.
|
2021-11-12 09:14:47 +00:00
|
|
|
func New(config *Config, lisCfg *ListenerCfg) *Daemon {
|
2020-05-15 10:17:58 +00:00
|
|
|
return &Daemon{
|
2020-05-15 10:17:59 +00:00
|
|
|
// We send exactly one error on this channel if something goes
|
|
|
|
// wrong at runtime. Or a nil value if the shutdown was
|
|
|
|
// successful. But in case nobody's listening, we don't want to
|
2023-08-10 12:51:38 +00:00
|
|
|
// block on it, so we buffer it.
|
2020-05-15 10:17:59 +00:00
|
|
|
ErrChan: make(chan error, 1),
|
|
|
|
|
|
|
|
quit: make(chan struct{}),
|
2020-05-15 10:17:58 +00:00
|
|
|
cfg: config,
|
|
|
|
listenerCfg: lisCfg,
|
2020-05-15 10:17:59 +00:00
|
|
|
|
2020-10-12 11:34:55 +00:00
|
|
|
// We have 4 goroutines that could potentially send an error.
|
2020-05-15 10:17:59 +00:00
|
|
|
// We react on the first error but in case more than one exits
|
|
|
|
// with an error we don't want them to block.
|
2020-10-12 11:34:55 +00:00
|
|
|
internalErrChan: make(chan error, 4),
|
2020-05-15 10:17:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// Start starts loopd in daemon mode. It will listen for grpc connections,
|
2019-03-06 20:13:50 +00:00
|
|
|
// execute commands and pass back swap status information.
|
2020-05-15 10:17:59 +00:00
|
|
|
func (d *Daemon) Start() error {
|
|
|
|
// There should be no reason to start the daemon twice. Therefore return
|
2020-05-15 10:18:05 +00:00
|
|
|
// an error if that's tried. This is mostly to guard against Start and
|
|
|
|
// StartAsSubserver both being called.
|
2020-05-15 10:17:59 +00:00
|
|
|
if atomic.AddInt32(&d.started, 1) != 1 {
|
|
|
|
return errOnlyStartOnce
|
|
|
|
}
|
|
|
|
|
2020-06-17 20:25:57 +00:00
|
|
|
network := lndclient.Network(d.cfg.Network)
|
|
|
|
|
2020-05-15 10:17:58 +00:00
|
|
|
var err error
|
2020-06-17 20:25:57 +00:00
|
|
|
d.lnd, err = d.listenerCfg.getLnd(network, d.cfg.Lnd)
|
2019-03-06 20:13:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-03-22 04:53:50 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// With lnd connected, initialize everything else, such as the swap
|
|
|
|
// server client, the swap client RPC server instance and our main swap
|
|
|
|
// and error handlers. If this fails, then nothing has been started yet
|
|
|
|
// and we can just return the error.
|
2021-09-27 21:14:56 +00:00
|
|
|
err = d.initialize(true)
|
2021-04-26 13:35:20 +00:00
|
|
|
if errors.Is(err, bbolt.ErrTimeout) {
|
|
|
|
// We're trying to be started as a standalone Loop daemon, most
|
|
|
|
// likely LiT is already running and blocking the DB
|
2023-08-10 12:51:38 +00:00
|
|
|
return fmt.Errorf("%v: make sure no other loop daemon process "+
|
|
|
|
"(standalone or embedded in lightning-terminal) is"+
|
|
|
|
"running", err)
|
2021-04-26 13:35:20 +00:00
|
|
|
}
|
2019-03-06 20:13:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// If we get here, we already have started several goroutines. So if
|
|
|
|
// anything goes wrong now, we need to cleanly shut down again.
|
|
|
|
startErr := d.startWebServers()
|
|
|
|
if startErr != nil {
|
|
|
|
log.Errorf("Error while starting daemon: %v", err)
|
|
|
|
d.Stop()
|
|
|
|
stopErr := <-d.ErrChan
|
|
|
|
if stopErr != nil {
|
|
|
|
log.Errorf("Error while stopping daemon: %v", stopErr)
|
|
|
|
}
|
|
|
|
return startErr
|
2019-03-06 20:13:50 +00:00
|
|
|
}
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
return nil
|
|
|
|
}
|
2019-03-12 15:10:37 +00:00
|
|
|
|
2020-05-15 10:18:05 +00:00
|
|
|
// StartAsSubserver is an alternative to Start where the RPC server does not
|
|
|
|
// create its own gRPC server but registers to an existing one. The same goes
|
|
|
|
// for REST (if enabled), instead of creating an own mux and HTTP server, we
|
|
|
|
// register to an existing one.
|
2021-09-27 21:14:56 +00:00
|
|
|
func (d *Daemon) StartAsSubserver(lndGrpc *lndclient.GrpcLndServices,
|
2022-01-17 14:11:04 +00:00
|
|
|
withMacaroonService bool) error {
|
2021-09-27 21:14:56 +00:00
|
|
|
|
2023-08-10 12:51:38 +00:00
|
|
|
// There should be no reason to start the daemon twice. Therefore,
|
|
|
|
// return an error if that's tried. This is mostly to guard against
|
|
|
|
// Start and StartAsSubserver both being called.
|
2020-05-15 10:18:05 +00:00
|
|
|
if atomic.AddInt32(&d.started, 1) != 1 {
|
|
|
|
return errOnlyStartOnce
|
|
|
|
}
|
|
|
|
|
|
|
|
// When starting as a subserver, we get passed in an already established
|
|
|
|
// connection to lnd that might be shared among other subservers.
|
|
|
|
d.lnd = lndGrpc
|
|
|
|
|
|
|
|
// With lnd already pre-connected, initialize everything else, such as
|
|
|
|
// the swap server client, the RPC server instance and our main swap
|
2023-08-10 12:51:38 +00:00
|
|
|
// handlers. If this fails, then nothing has been started yet, and we
|
|
|
|
// can just return the error.
|
2022-01-17 14:11:04 +00:00
|
|
|
err := d.initialize(withMacaroonService)
|
2021-04-26 13:35:20 +00:00
|
|
|
if errors.Is(err, bbolt.ErrTimeout) {
|
|
|
|
// We're trying to be started inside LiT so there most likely is
|
|
|
|
// another standalone Loop process blocking the DB.
|
|
|
|
return fmt.Errorf("%v: make sure no other loop daemon "+
|
|
|
|
"process is running", err)
|
|
|
|
}
|
|
|
|
return err
|
2020-05-15 10:18:05 +00:00
|
|
|
}
|
|
|
|
|
2020-09-03 12:35:43 +00:00
|
|
|
// ValidateMacaroon extracts the macaroon from the context's gRPC metadata,
|
|
|
|
// checks its signature, makes sure all specified permissions for the called
|
|
|
|
// method are contained within and finally ensures all caveat conditions are
|
|
|
|
// met. A non-nil error is returned if any of the checks fail. This method is
|
|
|
|
// needed to enable loopd running as an external subserver in the same process
|
|
|
|
// as lnd but still validate its own macaroons.
|
|
|
|
func (d *Daemon) ValidateMacaroon(ctx context.Context,
|
|
|
|
requiredPermissions []bakery.Op, fullMethod string) error {
|
|
|
|
|
2022-01-13 12:12:19 +00:00
|
|
|
if d.macaroonService == nil {
|
|
|
|
return fmt.Errorf("macaroon service has not been initialised")
|
|
|
|
}
|
|
|
|
|
2020-09-03 12:35:43 +00:00
|
|
|
// Delegate the call to loop's own macaroon validator service.
|
|
|
|
return d.macaroonService.ValidateMacaroon(
|
|
|
|
ctx, requiredPermissions, fullMethod,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// startWebServers starts the gRPC and REST servers in goroutines.
|
|
|
|
func (d *Daemon) startWebServers() error {
|
|
|
|
var err error
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// With our client created, let's now finish setting up and start our
|
2020-09-03 12:35:41 +00:00
|
|
|
// RPC server. First we add the security interceptor to our gRPC server
|
|
|
|
// options that checks the macaroons for validity.
|
2022-01-13 12:12:19 +00:00
|
|
|
unaryInterceptor, streamInterceptor, err := d.macaroonService.Interceptors()
|
2021-05-17 10:18:00 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error with macaroon interceptor: %v", err)
|
|
|
|
}
|
2022-01-13 12:12:19 +00:00
|
|
|
d.grpcServer = grpc.NewServer(
|
|
|
|
grpc.UnaryInterceptor(unaryInterceptor),
|
|
|
|
grpc.StreamInterceptor(streamInterceptor),
|
|
|
|
)
|
2020-05-15 10:17:59 +00:00
|
|
|
looprpc.RegisterSwapClientServer(d.grpcServer, d)
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2020-10-15 11:49:05 +00:00
|
|
|
// Register our debug server if it is compiled in.
|
|
|
|
d.registerDebugServer()
|
|
|
|
|
2019-03-12 22:35:53 +00:00
|
|
|
// Next, start the gRPC server listening for HTTP/2 connections.
|
2019-10-28 16:06:07 +00:00
|
|
|
log.Infof("Starting gRPC listener")
|
2020-09-03 11:26:00 +00:00
|
|
|
serverTLSCfg, restClientCreds, err := getTLSConfig(d.cfg)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("could not create gRPC server options: %v",
|
|
|
|
err)
|
|
|
|
}
|
|
|
|
d.grpcListener, err = d.listenerCfg.grpcListener(serverTLSCfg)
|
2019-03-06 20:13:50 +00:00
|
|
|
if err != nil {
|
2020-05-15 10:17:59 +00:00
|
|
|
return fmt.Errorf("RPC server unable to listen on %s: %v",
|
|
|
|
d.cfg.RPCListen, err)
|
2019-03-06 20:13:50 +00:00
|
|
|
}
|
2019-03-12 22:35:53 +00:00
|
|
|
|
2020-01-31 12:57:24 +00:00
|
|
|
// The default JSON marshaler of the REST proxy only sets OrigName to
|
|
|
|
// true, which instructs it to use the same field names as specified in
|
|
|
|
// the proto file and not switch to camel case. What we also want is
|
|
|
|
// that the marshaler prints all values, even if they are falsey.
|
|
|
|
customMarshalerOption := proxy.WithMarshalerOption(
|
|
|
|
proxy.MIMEWildcard, &proxy.JSONPb{
|
2021-07-29 11:32:53 +00:00
|
|
|
MarshalOptions: protojson.MarshalOptions{
|
|
|
|
UseProtoNames: true,
|
|
|
|
EmitUnpopulated: true,
|
|
|
|
},
|
2020-01-31 12:57:24 +00:00
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2019-03-12 22:35:53 +00:00
|
|
|
// We'll also create and start an accompanying proxy to serve clients
|
|
|
|
// through REST.
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
2020-05-15 10:17:59 +00:00
|
|
|
d.restCtxCancel = cancel
|
2020-01-31 12:57:24 +00:00
|
|
|
mux := proxy.NewServeMux(customMarshalerOption)
|
2020-02-06 10:48:09 +00:00
|
|
|
var restHandler http.Handler = mux
|
2020-05-15 10:17:58 +00:00
|
|
|
if d.cfg.CORSOrigin != "" {
|
|
|
|
restHandler = allowCORS(restHandler, d.cfg.CORSOrigin)
|
2020-02-06 10:48:09 +00:00
|
|
|
}
|
2020-01-31 12:57:26 +00:00
|
|
|
proxyOpts := []grpc.DialOption{
|
2020-09-03 11:26:00 +00:00
|
|
|
grpc.WithTransportCredentials(*restClientCreds),
|
2020-01-31 12:57:26 +00:00
|
|
|
grpc.WithDefaultCallOptions(maxMsgRecvSize),
|
|
|
|
}
|
2020-09-03 11:26:00 +00:00
|
|
|
|
|
|
|
// With TLS enabled by default, we cannot call 0.0.0.0 internally from
|
|
|
|
// the REST proxy as that IP address isn't in the cert. We need to
|
|
|
|
// rewrite it to the loopback address.
|
|
|
|
restProxyDest := d.cfg.RPCListen
|
|
|
|
switch {
|
|
|
|
case strings.Contains(restProxyDest, "0.0.0.0"):
|
|
|
|
restProxyDest = strings.Replace(
|
|
|
|
restProxyDest, "0.0.0.0", "127.0.0.1", 1,
|
|
|
|
)
|
|
|
|
|
|
|
|
case strings.Contains(restProxyDest, "[::]"):
|
|
|
|
restProxyDest = strings.Replace(
|
|
|
|
restProxyDest, "[::]", "[::1]", 1,
|
|
|
|
)
|
|
|
|
}
|
2019-03-12 22:35:53 +00:00
|
|
|
err = looprpc.RegisterSwapClientHandlerFromEndpoint(
|
2020-09-03 11:26:00 +00:00
|
|
|
ctx, mux, restProxyDest, proxyOpts,
|
2019-03-12 22:35:53 +00:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-09-03 11:26:00 +00:00
|
|
|
d.restListener, err = d.listenerCfg.restListener(serverTLSCfg)
|
2019-03-12 22:35:53 +00:00
|
|
|
if err != nil {
|
2020-05-15 10:17:59 +00:00
|
|
|
return fmt.Errorf("REST proxy unable to listen on %s: %v",
|
|
|
|
d.cfg.RESTListen, err)
|
2019-03-12 22:35:53 +00:00
|
|
|
}
|
2020-01-03 13:01:31 +00:00
|
|
|
|
2020-01-03 13:01:32 +00:00
|
|
|
// A nil listener indicates REST is disabled.
|
2020-05-15 10:17:59 +00:00
|
|
|
if d.restListener != nil {
|
2020-01-03 13:01:32 +00:00
|
|
|
log.Infof("Starting REST proxy listener")
|
|
|
|
|
2023-09-28 11:16:01 +00:00
|
|
|
d.restServer = &http.Server{
|
|
|
|
Handler: restHandler,
|
|
|
|
ReadHeaderTimeout: 5 * time.Second,
|
|
|
|
}
|
2020-01-03 13:01:32 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
d.wg.Add(1)
|
2020-01-03 13:01:32 +00:00
|
|
|
go func() {
|
2020-05-15 10:17:59 +00:00
|
|
|
defer d.wg.Done()
|
|
|
|
|
|
|
|
log.Infof("REST proxy listening on %s",
|
|
|
|
d.restListener.Addr())
|
|
|
|
err := d.restServer.Serve(d.restListener)
|
2020-01-03 13:01:32 +00:00
|
|
|
// ErrServerClosed is always returned when the proxy is
|
|
|
|
// shut down, so don't log it.
|
|
|
|
if err != nil && err != http.ErrServerClosed {
|
2020-05-15 10:17:59 +00:00
|
|
|
// Notify the main error handler goroutine that
|
|
|
|
// we exited unexpectedly here. We don't have to
|
|
|
|
// worry about blocking as the internal error
|
|
|
|
// channel is sufficiently buffered.
|
|
|
|
d.internalErrChan <- err
|
2020-01-03 13:01:32 +00:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
} else {
|
|
|
|
log.Infof("REST proxy disabled")
|
|
|
|
}
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// Start the grpc server.
|
|
|
|
d.wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer d.wg.Done()
|
|
|
|
|
|
|
|
log.Infof("RPC server listening on %s", d.grpcListener.Addr())
|
|
|
|
err = d.grpcServer.Serve(d.grpcListener)
|
|
|
|
if err != nil && err != grpc.ErrServerStopped {
|
|
|
|
// Notify the main error handler goroutine that
|
|
|
|
// we exited unexpectedly here. We don't have to
|
|
|
|
// worry about blocking as the internal error
|
|
|
|
// channel is sufficiently buffered.
|
|
|
|
d.internalErrChan <- err
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// initialize creates and initializes an instance of the swap server client,
|
|
|
|
// the swap client RPC server instance and our main swap and error handlers. If
|
|
|
|
// this method fails with an error then no goroutine was started yet and no
|
|
|
|
// cleanup is necessary. If it succeeds, then goroutines have been spawned.
|
2022-01-17 14:11:04 +00:00
|
|
|
func (d *Daemon) initialize(withMacaroonService bool) error {
|
2022-05-14 15:47:15 +00:00
|
|
|
if d.cfg.EnableExperimental {
|
|
|
|
loopdb.EnableExperimentalProtocol()
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Infof("Protocol version: %v", loopdb.CurrentProtocolVersion())
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// If no swap server is specified, use the default addresses for mainnet
|
|
|
|
// and testnet.
|
2020-06-15 09:04:37 +00:00
|
|
|
if d.cfg.Server.Host == "" {
|
2020-05-15 10:17:59 +00:00
|
|
|
// TODO(wilmer): Use onion service addresses when proxy is
|
|
|
|
// active.
|
|
|
|
switch d.cfg.Network {
|
|
|
|
case "mainnet":
|
2020-06-15 09:04:37 +00:00
|
|
|
d.cfg.Server.Host = mainnetServer
|
2020-05-15 10:17:59 +00:00
|
|
|
case "testnet":
|
2020-06-15 09:04:37 +00:00
|
|
|
d.cfg.Server.Host = testnetServer
|
2020-05-15 10:17:59 +00:00
|
|
|
default:
|
|
|
|
return errors.New("no swap server address specified")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-10 12:51:38 +00:00
|
|
|
// Both the client RPC server and the swap server client should stop
|
|
|
|
// on main context cancel. So we create it early and pass it down.
|
2023-05-19 13:09:08 +00:00
|
|
|
d.mainCtx, d.mainCtxCancel = context.WithCancel(context.Background())
|
|
|
|
|
2020-06-15 09:04:37 +00:00
|
|
|
log.Infof("Swap server address: %v", d.cfg.Server.Host)
|
2020-05-15 10:17:59 +00:00
|
|
|
|
2023-05-19 13:09:08 +00:00
|
|
|
// Check if we need to migrate the database.
|
|
|
|
if needSqlMigration(d.cfg) {
|
|
|
|
log.Infof("Boltdb found, running migration")
|
|
|
|
|
|
|
|
err := migrateBoltdb(d.mainCtx, d.cfg)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to migrate boltdb: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Infof("Successfully migrated boltdb")
|
|
|
|
}
|
|
|
|
|
2023-10-12 15:04:09 +00:00
|
|
|
// Now that we know where the database will live, we'll go ahead and
|
|
|
|
// open up the default implementation of it.
|
|
|
|
chainParams, err := lndclient.Network(d.cfg.Network).ChainParams()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
swapDb, _, err := openDatabase(d.cfg, chainParams)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// Create an instance of the loop client library.
|
2023-10-12 15:04:09 +00:00
|
|
|
swapClient, clientCleanup, err := getClient(
|
|
|
|
d.cfg, swapDb, &d.lnd.LndServices,
|
|
|
|
)
|
2020-05-15 10:17:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
d.clientCleanup = clientCleanup
|
|
|
|
|
2022-01-13 12:12:19 +00:00
|
|
|
// Add our debug permissions to our main set of required permissions
|
|
|
|
// if compiled in.
|
|
|
|
for endpoint, perm := range debugRequiredPermissions {
|
2022-06-14 13:12:22 +00:00
|
|
|
perms.RequiredPermissions[endpoint] = perm
|
2022-01-13 12:12:19 +00:00
|
|
|
}
|
|
|
|
|
2023-01-09 15:36:52 +00:00
|
|
|
rks, db, err := lndclient.NewBoltMacaroonStore(
|
2023-03-15 21:04:59 +00:00
|
|
|
d.cfg.DataDir, "macaroons.db", loopdb.DefaultLoopDBTimeout,
|
2023-01-09 15:36:52 +00:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cleanupMacaroonStore := func() {
|
|
|
|
err := db.Close()
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Error closing macaroon store: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-17 14:11:04 +00:00
|
|
|
if withMacaroonService {
|
2022-01-13 12:12:19 +00:00
|
|
|
// Start the macaroon service and let it create its default
|
|
|
|
// macaroon in case it doesn't exist yet.
|
|
|
|
d.macaroonService, err = lndclient.NewMacaroonService(
|
|
|
|
&lndclient.MacaroonServiceConfig{
|
2023-01-09 15:36:52 +00:00
|
|
|
RootKeyStore: rks,
|
2022-01-13 12:12:19 +00:00
|
|
|
MacaroonLocation: loopMacaroonLocation,
|
|
|
|
MacaroonPath: d.cfg.MacaroonPath,
|
|
|
|
Checkers: []macaroons.Checker{
|
|
|
|
macaroons.IPLockChecker,
|
|
|
|
},
|
2022-06-14 13:12:22 +00:00
|
|
|
RequiredPerms: perms.RequiredPermissions,
|
2022-01-13 12:12:19 +00:00
|
|
|
DBPassword: macDbDefaultPw,
|
|
|
|
LndClient: &d.lnd.LndServices,
|
|
|
|
EphemeralKey: lndclient.SharedKeyNUMS,
|
|
|
|
KeyLocator: lndclient.SharedKeyLocator,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
if err != nil {
|
2023-01-09 15:36:52 +00:00
|
|
|
cleanupMacaroonStore()
|
2022-01-13 12:12:19 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = d.macaroonService.Start(); err != nil {
|
|
|
|
// The client is the only thing we started yet, so if we
|
|
|
|
// clean up its connection now, nothing else needs to be
|
|
|
|
// shut down at this point.
|
2023-01-09 15:36:52 +00:00
|
|
|
cleanupMacaroonStore()
|
2022-01-13 12:12:19 +00:00
|
|
|
clientCleanup()
|
|
|
|
return err
|
|
|
|
}
|
2020-09-03 12:35:41 +00:00
|
|
|
}
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// Now finally fully initialize the swap client RPC server instance.
|
|
|
|
d.swapClientServer = swapClientServer{
|
2023-05-24 10:39:33 +00:00
|
|
|
config: d.cfg,
|
2020-10-15 11:49:05 +00:00
|
|
|
network: lndclient.Network(d.cfg.Network),
|
2023-10-12 15:04:09 +00:00
|
|
|
impl: swapClient,
|
|
|
|
liquidityMgr: getLiquidityManager(swapClient),
|
2020-09-01 07:58:08 +00:00
|
|
|
lnd: &d.lnd.LndServices,
|
|
|
|
swaps: make(map[lntypes.Hash]loop.SwapInfo),
|
|
|
|
subscribers: make(map[int]chan<- interface{}),
|
|
|
|
statusChan: make(chan loop.SwapInfo),
|
|
|
|
mainCtx: d.mainCtx,
|
2020-05-15 10:17:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Retrieve all currently existing swaps from the database.
|
2023-05-16 15:40:52 +00:00
|
|
|
swapsList, err := d.impl.FetchSwaps(d.mainCtx)
|
2020-05-15 10:17:59 +00:00
|
|
|
if err != nil {
|
2022-01-13 12:12:19 +00:00
|
|
|
if d.macaroonService == nil {
|
2023-01-09 15:36:52 +00:00
|
|
|
cleanupMacaroonStore()
|
2022-01-13 12:12:19 +00:00
|
|
|
clientCleanup()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-09-03 12:35:41 +00:00
|
|
|
// The client and the macaroon service are the only things we
|
|
|
|
// started yet, so if we clean that up now, nothing else needs
|
|
|
|
// to be shut down at this point.
|
2022-01-13 12:12:19 +00:00
|
|
|
if err := d.macaroonService.Stop(); err != nil {
|
2020-09-03 12:35:41 +00:00
|
|
|
log.Errorf("Error shutting down macaroon service: %v",
|
|
|
|
err)
|
|
|
|
}
|
2023-01-09 15:36:52 +00:00
|
|
|
cleanupMacaroonStore()
|
2020-05-15 10:17:59 +00:00
|
|
|
clientCleanup()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, s := range swapsList {
|
|
|
|
d.swaps[s.SwapHash] = *s
|
|
|
|
}
|
2019-03-06 20:13:50 +00:00
|
|
|
|
|
|
|
// Start the swap client itself.
|
2020-05-15 10:17:59 +00:00
|
|
|
d.wg.Add(1)
|
2019-03-06 20:13:50 +00:00
|
|
|
go func() {
|
2020-05-15 10:17:59 +00:00
|
|
|
defer d.wg.Done()
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2019-10-28 16:06:07 +00:00
|
|
|
log.Infof("Starting swap client")
|
2020-05-15 10:17:59 +00:00
|
|
|
err := d.impl.Run(d.mainCtx, d.statusChan)
|
2019-03-06 20:13:50 +00:00
|
|
|
if err != nil {
|
2020-05-15 10:17:59 +00:00
|
|
|
// Notify the main error handler goroutine that
|
|
|
|
// we exited unexpectedly here. We don't have to
|
|
|
|
// worry about blocking as the internal error
|
|
|
|
// channel is sufficiently buffered.
|
|
|
|
d.internalErrChan <- err
|
2019-03-06 20:13:50 +00:00
|
|
|
}
|
2019-10-28 16:06:07 +00:00
|
|
|
log.Infof("Swap client stopped")
|
2019-03-06 20:13:50 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
// Start a goroutine that broadcasts swap updates to clients.
|
2020-05-15 10:17:59 +00:00
|
|
|
d.wg.Add(1)
|
2019-03-06 20:13:50 +00:00
|
|
|
go func() {
|
2020-05-15 10:17:59 +00:00
|
|
|
defer d.wg.Done()
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2019-10-28 16:06:07 +00:00
|
|
|
log.Infof("Waiting for updates")
|
2020-05-15 10:17:59 +00:00
|
|
|
d.processStatusUpdates(d.mainCtx)
|
2019-03-06 20:13:50 +00:00
|
|
|
}()
|
|
|
|
|
2020-10-12 11:34:55 +00:00
|
|
|
d.wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer d.wg.Done()
|
|
|
|
|
|
|
|
log.Info("Starting liquidity manager")
|
|
|
|
err := d.liquidityMgr.Run(d.mainCtx)
|
2023-11-15 09:20:11 +00:00
|
|
|
if err != nil && !errors.Is(err, context.Canceled) {
|
2020-10-12 11:34:55 +00:00
|
|
|
d.internalErrChan <- err
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Info("Liquidity manager stopped")
|
|
|
|
}()
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// Last, start our internal error handler. This will return exactly one
|
|
|
|
// error or nil on the main error channel to inform the caller that
|
|
|
|
// something went wrong or that shutdown is complete. We don't add to
|
|
|
|
// the wait group here because this goroutine will itself wait for the
|
|
|
|
// stop to complete and signal its completion through the main error
|
|
|
|
// channel.
|
2019-03-06 20:13:50 +00:00
|
|
|
go func() {
|
2020-05-15 10:17:59 +00:00
|
|
|
var runtimeErr error
|
|
|
|
|
|
|
|
// There are only two ways this goroutine can exit. Either there
|
|
|
|
// is an internal error or the caller requests shutdown. In both
|
|
|
|
// cases we wait for the stop to complete before we signal the
|
|
|
|
// caller that we're done.
|
|
|
|
select {
|
|
|
|
case runtimeErr = <-d.internalErrChan:
|
|
|
|
log.Errorf("Runtime error in daemon, shutting down: "+
|
|
|
|
"%v", runtimeErr)
|
|
|
|
|
|
|
|
case <-d.quit:
|
2020-01-03 13:01:32 +00:00
|
|
|
}
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// We need to shutdown before sending the error on the channel,
|
|
|
|
// otherwise a caller might exit the process too early.
|
|
|
|
d.stop()
|
2023-01-09 15:36:52 +00:00
|
|
|
cleanupMacaroonStore()
|
2020-05-15 10:17:59 +00:00
|
|
|
log.Info("Daemon exited")
|
|
|
|
|
|
|
|
// The caller expects exactly one message. So we send the error
|
|
|
|
// even if it's nil because we cleanly shut down.
|
|
|
|
d.ErrChan <- runtimeErr
|
2019-03-06 20:13:50 +00:00
|
|
|
}()
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
return nil
|
|
|
|
}
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// Stop tries to gracefully shut down the daemon. A caller needs to wait for a
|
|
|
|
// message on the main error channel indicating that the shutdown is completed.
|
|
|
|
func (d *Daemon) Stop() {
|
|
|
|
d.stopOnce.Do(func() {
|
|
|
|
close(d.quit)
|
|
|
|
})
|
|
|
|
}
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// stop does the actual shutdown and blocks until all goroutines have exit.
|
|
|
|
func (d *Daemon) stop() {
|
|
|
|
// First of all, we can cancel the main context that all event handlers
|
|
|
|
// are using. This should stop all swap activity and all event handlers
|
|
|
|
// should exit.
|
|
|
|
if d.mainCtxCancel != nil {
|
|
|
|
d.mainCtxCancel()
|
|
|
|
}
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// As there is no swap activity anymore, we can forcefully shutdown the
|
|
|
|
// gRPC and HTTP servers now.
|
|
|
|
log.Infof("Stopping gRPC server")
|
|
|
|
if d.grpcServer != nil {
|
|
|
|
d.grpcServer.Stop()
|
|
|
|
}
|
|
|
|
log.Infof("Stopping REST server")
|
|
|
|
if d.restServer != nil {
|
|
|
|
// Don't return the error here, we first want to give everything
|
|
|
|
// else a chance to shut down cleanly.
|
|
|
|
err := d.restServer.Close()
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Error stopping REST server: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if d.restCtxCancel != nil {
|
|
|
|
d.restCtxCancel()
|
2019-03-06 20:13:50 +00:00
|
|
|
}
|
|
|
|
|
2022-01-13 12:12:19 +00:00
|
|
|
if d.macaroonService != nil {
|
|
|
|
err := d.macaroonService.Stop()
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Error stopping macaroon service: %v", err)
|
|
|
|
}
|
2020-09-03 12:35:41 +00:00
|
|
|
}
|
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// Next, shut down the connections to lnd and the swap server.
|
|
|
|
if d.lnd != nil {
|
|
|
|
d.lnd.Close()
|
|
|
|
}
|
|
|
|
if d.clientCleanup != nil {
|
|
|
|
d.clientCleanup()
|
|
|
|
}
|
2019-03-06 20:13:50 +00:00
|
|
|
|
2020-05-15 10:17:59 +00:00
|
|
|
// Everything should be shutting down now, wait for completion.
|
|
|
|
d.wg.Wait()
|
2019-03-06 20:13:50 +00:00
|
|
|
}
|
2020-02-06 10:48:09 +00:00
|
|
|
|
|
|
|
// allowCORS wraps the given http.Handler with a function that adds the
|
|
|
|
// Access-Control-Allow-Origin header to the response.
|
|
|
|
func allowCORS(handler http.Handler, origin string) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("Access-Control-Allow-Origin", origin)
|
|
|
|
handler.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|