#include "gossip_control.h" #include "hsm_control.h" #include "lightningd.h" #include "peer_control.h" #include "subd.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include char *bitcoin_datadir; struct backtrace_state *backtrace_state; int pid_fd; static struct lightningd *new_lightningd(const tal_t *ctx) { struct lightningd *ld = tal(ctx, struct lightningd); #if DEVELOPER ld->dev_debug_subdaemon = NULL; ld->dev_disconnect_fd = -1; ld->dev_hsm_seed = NULL; ld->dev_subdaemon_fail = false; ld->no_reconnect = false; if (getenv("LIGHTNINGD_DEV_MEMLEAK")) memleak_init(ld, backtrace_state); #endif list_head_init(&ld->peers); htlc_in_map_init(&ld->htlcs_in); htlc_out_map_init(&ld->htlcs_out); ld->log_book = new_log_book(20*1024*1024, LOG_INFORM); ld->log = new_log(ld, ld->log_book, "lightningd(%u):", (int)getpid()); ld->logfile = NULL; ld->alias = NULL; ld->rgb = NULL; list_head_init(&ld->connects); list_head_init(&ld->sendpay_commands); ld->wireaddrs = tal_arr(ld, struct wireaddr, 0); ld->portnum = DEFAULT_PORT; timers_init(&ld->timers, time_mono()); ld->topology = new_topology(ld, ld->log); ld->debug_subdaemon_io = NULL; ld->daemon = false; ld->pidfile = NULL; return ld; } static const char *daemons[] = { "lightning_channeld", "lightning_closingd", "lightning_gossipd", "lightning_hsmd", "lightning_onchaind", "lightning_openingd" }; /* Check we can run them, and check their versions */ void test_daemons(const struct lightningd *ld) { size_t i; const tal_t *ctx = tal_tmpctx(ld); for (i = 0; i < ARRAY_SIZE(daemons); i++) { int outfd; const char *dpath = path_join(ctx, ld->daemon_dir, daemons[i]); const char *verstring; pid_t pid = pipecmd(&outfd, NULL, &outfd, dpath, "--version", NULL); log_debug(ld->log, "testing %s", dpath); if (pid == -1) err(1, "Could not run %s", dpath); verstring = grab_fd(ctx, outfd); if (!verstring) err(1, "Could not get output from %s", dpath); if (!strstarts(verstring, version()) || verstring[strlen(version())] != '\n') errx(1, "%s: bad version '%s'", daemons[i], verstring); } tal_free(ctx); } /* Check if all daemons exist in specified directory. */ static bool has_all_daemons(const char* daemon_dir) { size_t i; bool missing_daemon = false; const tal_t *tmpctx = tal_tmpctx(NULL); for (i = 0; i < ARRAY_SIZE(daemons); ++i) { if (!path_is_file(path_join(tmpctx, daemon_dir, daemons[i]))) { missing_daemon = true; break; } } tal_free(tmpctx); return !missing_daemon; } static const char *find_my_path(const tal_t *ctx, const char *argv0) { char *me, *tmpctx = tal_tmpctx(ctx); if (strchr(argv0, PATH_SEP)) { const char *path; /* Absolute paths are easy. */ if (strstarts(argv0, PATH_SEP_STR)) path = argv0; /* It contains a '/', it's relative to current dir. */ else path = path_join(tmpctx, path_cwd(tmpctx), argv0); me = path_canon(ctx, path); if (!me || access(me, X_OK) != 0) errx(1, "I cannot find myself at %s based on my name %s", path, argv0); } else { /* No /, search path */ char **pathdirs; const char *pathenv = getenv("PATH"); size_t i; if (!pathenv) errx(1, "Cannot find myself: no $PATH set"); pathdirs = tal_strsplit(tmpctx, pathenv, ":", STR_NO_EMPTY); me = NULL; for (i = 0; pathdirs[i]; i++) { /* This returns NULL if it doesn't exist. */ me = path_canon(ctx, path_join(tmpctx, pathdirs[i], argv0)); if (me && access(me, X_OK) == 0) break; /* Nope, try again. */ me = tal_free(me); } if (!me) errx(1, "Cannot find %s in $PATH", argv0); } tal_free(tmpctx); return path_dirname(ctx, take(me)); } static const char *find_my_pkglibexec_path(const tal_t *ctx, const char *my_path TAKES) { const char *pkglibexecdir; pkglibexecdir = path_join(ctx, my_path, BINTOPKGLIBEXECDIR); return path_simplify(ctx, take(pkglibexecdir)); } /* Determine the correct daemon dir. */ static const char *find_daemon_dir(const tal_t *ctx, const char *argv0) { const char *my_path = find_my_path(ctx, argv0); if (has_all_daemons(my_path)) return my_path; return find_my_pkglibexec_path(ctx, take(my_path)); } static void shutdown_subdaemons(struct lightningd *ld) { struct peer *p; db_begin_transaction(ld->wallet->db); /* Let everyone shutdown cleanly. */ close(ld->hsm_fd); subd_shutdown(ld->gossip, 10); free_htlcs(ld, NULL); while ((p = list_top(&ld->peers, struct peer, list)) != NULL) { struct channel *c; while ((c = list_top(&p->channels, struct channel, list)) != NULL) { /* Removes itself from list as we free it */ tal_free(c); } /* Removes itself from list as we free it */ tal_free(p); } db_commit_transaction(ld->wallet->db); } const struct chainparams *get_chainparams(const struct lightningd *ld) { return ld->topology->bitcoind->chainparams; } static void init_txfilter(struct wallet *w, struct txfilter *filter) { struct ext_key ext; u64 bip32_max_index; bip32_max_index = db_get_intvar(w->db, "bip32_max_index", 0); for (u64 i = 0; i <= bip32_max_index; i++) { if (bip32_key_from_parent(w->bip32_base, i, BIP32_FLAG_KEY_PUBLIC, &ext) != WALLY_OK) { abort(); } txfilter_add_derkey(filter, ext.pub_key); } } static void daemonize_but_keep_dir(struct lightningd *ld) { /* daemonize moves us into /, but we want to be here */ const char *cwd = path_cwd(NULL); db_close_for_fork(ld->wallet->db); if (!cwd) fatal("Could not get current directory: %s", strerror(errno)); if (!daemonize()) fatal("Could not become a daemon: %s", strerror(errno)); /* Move back: important, since lightning dir may be relative! */ if (chdir(cwd) != 0) fatal("Could not return to directory %s: %s", cwd, strerror(errno)); db_reopen_after_fork(ld->wallet->db); tal_free(cwd); } static void pidfile_create(const struct lightningd *ld) { char *pid; const tal_t *tmpctx = tal_tmpctx(NULL); /* Create PID file */ pid_fd = open(ld->pidfile, O_WRONLY|O_CREAT, 0640); if (pid_fd < 0) err(1, "Failed to open PID file"); /* Lock PID file */ if (lockf(pid_fd, F_TLOCK, 0) < 0) /* Problem locking file */ err(1, "lightningd already running? Error locking PID file"); /* Get current PID and write to PID fie */ pid = tal_fmt(tmpctx, "%d\n", getpid()); write_all(pid_fd, pid, strlen(pid)); tal_free(tmpctx); } int main(int argc, char *argv[]) { struct lightningd *ld; bool newdir; u32 first_blocknum; err_set_progname(argv[0]); #if DEVELOPER /* Suppresses backtrace (breaks valgrind) */ if (!getenv("LIGHTNINGD_DEV_NO_BACKTRACE")) #endif backtrace_state = backtrace_create_state(argv[0], 0, NULL, NULL); ld = new_lightningd(NULL); secp256k1_ctx = secp256k1_context_create(SECP256K1_CONTEXT_VERIFY | SECP256K1_CONTEXT_SIGN); io_poll_override(debug_poll); /* Figure out where our daemons are first. */ ld->daemon_dir = find_daemon_dir(ld, argv[0]); if (!ld->daemon_dir) errx(1, "Could not find daemons"); register_opts(ld); /* Handle options and config; move to .lightningd */ newdir = handle_opts(ld, argc, argv); /* Create PID file */ pidfile_create(ld); /* Ignore SIGPIPE: we look at our write return values*/ signal(SIGPIPE, SIG_IGN); /* Make sure we can reach other daemons, and versions match. */ test_daemons(ld); /* Initialize wallet, now that we are in the correct directory */ ld->wallet = wallet_new(ld, ld->log, &ld->timers); ld->owned_txfilter = txfilter_new(ld); ld->topology->wallet = ld->wallet; /* Set up HSM. */ hsm_init(ld, newdir); /* Now we know our ID, we can set our color/alias if not already. */ setup_color_and_alias(ld); /* Everything is within a transaction. */ db_begin_transaction(ld->wallet->db); if (!wallet_network_check(ld->wallet, get_chainparams(ld))) errx(1, "Wallet network check failed."); /* Initialize the transaction filter with our pubkeys. */ init_txfilter(ld->wallet, ld->owned_txfilter); /* Check invoices loaded from the database */ if (!wallet_invoice_load(ld->wallet)) { fatal("Could not load invoices from the database"); } /* Set up gossip daemon. */ gossip_init(ld); /* Load peers from database */ if (!wallet_channels_load_active(ld, ld->wallet)) fatal("Could not load channels from the database"); /* TODO(cdecker) Move this into common location for initialization */ struct peer *peer; list_for_each(&ld->peers, peer, list) { struct channel *channel; list_for_each(&peer->channels, channel, list) { if (!wallet_htlcs_load_for_channel(ld->wallet, channel, &ld->htlcs_in, &ld->htlcs_out)) { fatal("could not load htlcs for channel"); } } } if (!wallet_htlcs_reconnect(ld->wallet, &ld->htlcs_in, &ld->htlcs_out)) fatal("could not reconnect htlcs loaded from wallet, wallet may be inconsistent."); /* Worst case, scan back to the first lightning deployment */ first_blocknum = wallet_first_blocknum(ld->wallet, get_chainparams(ld) ->when_lightning_became_cool); db_commit_transaction(ld->wallet->db); /* Initialize block topology (does its own transaction) */ setup_topology(ld->topology, &ld->timers, ld->config.poll_time, first_blocknum); /* Create RPC socket (if any) */ setup_jsonrpc(ld, ld->rpc_filename); /* Now we're about to start, become daemon if desired. */ if (ld->daemon) daemonize_but_keep_dir(ld); /* Mark ourselves live. */ log_info(ld->log, "Server started with public key %s, alias %s (color #%s) and lightningd %s", type_to_string(ltmp, struct pubkey, &ld->id), ld->alias, tal_hex(ltmp, ld->rgb), version()); /* Start the peers. */ activate_peers(ld); /* Now kick off topology update, now peers have watches. */ begin_topology(ld->topology); /* Activate crash log now we're not reporting startup failures. */ crashlog_activate(argv[0], ld->log); for (;;) { struct timer *expired; void *v = io_loop(&ld->timers, &expired); /* We use io_break(dstate) to shut down. */ if (v == ld) break; if (expired) { db_begin_transaction(ld->wallet->db); timer_expired(ld, expired); db_commit_transaction(ld->wallet->db); } } shutdown_subdaemons(ld); close(pid_fd); remove(ld->pidfile); tal_free(ld); opt_free_table(); #if DEVELOPER memleak_cleanup(); #endif take_cleanup(); secp256k1_context_destroy(secp256k1_ctx); return 0; }