2018-02-20 21:59:09 +01:00
|
|
|
#include <bitcoin/pubkey.h>
|
2018-07-24 08:18:58 +02:00
|
|
|
#include <ccan/err/err.h>
|
|
|
|
#include <ccan/fdpass/fdpass.h>
|
2018-02-20 21:59:09 +01:00
|
|
|
#include <ccan/list/list.h>
|
|
|
|
#include <ccan/tal/str/str.h>
|
2018-07-24 08:18:58 +02:00
|
|
|
#include <common/features.h>
|
2018-02-20 21:59:09 +01:00
|
|
|
#include <common/wireaddr.h>
|
2018-07-24 08:18:58 +02:00
|
|
|
#include <connectd/gen_connect_wire.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <hsmd/capabilities.h>
|
|
|
|
#include <hsmd/gen_hsm_client_wire.h>
|
|
|
|
#include <lightningd/channel.h>
|
2018-02-20 21:59:09 +01:00
|
|
|
#include <lightningd/connect_control.h>
|
2018-03-16 04:45:08 +01:00
|
|
|
#include <lightningd/json.h>
|
2018-02-20 21:59:09 +01:00
|
|
|
#include <lightningd/jsonrpc.h>
|
2018-05-24 23:40:18 +02:00
|
|
|
#include <lightningd/jsonrpc_errors.h>
|
2018-02-20 21:59:09 +01:00
|
|
|
#include <lightningd/lightningd.h>
|
|
|
|
#include <lightningd/log.h>
|
2018-07-24 08:18:58 +02:00
|
|
|
#include <lightningd/opening_control.h>
|
2018-07-16 22:48:38 +02:00
|
|
|
#include <lightningd/param.h>
|
2018-07-24 08:18:58 +02:00
|
|
|
#include <lightningd/peer_control.h>
|
2018-02-20 21:59:09 +01:00
|
|
|
#include <lightningd/subd.h>
|
2018-07-24 08:18:58 +02:00
|
|
|
#include <wire/gen_peer_wire.h>
|
|
|
|
#include <wire/wire_sync.h>
|
2018-02-20 21:59:09 +01:00
|
|
|
|
|
|
|
struct connect {
|
|
|
|
struct list_node list;
|
|
|
|
struct pubkey id;
|
|
|
|
struct command *cmd;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void destroy_connect(struct connect *c)
|
|
|
|
{
|
|
|
|
list_del(&c->list);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct connect *new_connect(struct lightningd *ld,
|
|
|
|
const struct pubkey *id,
|
|
|
|
struct command *cmd)
|
|
|
|
{
|
|
|
|
struct connect *c = tal(cmd, struct connect);
|
|
|
|
c->id = *id;
|
|
|
|
c->cmd = cmd;
|
2018-04-26 06:50:58 +02:00
|
|
|
list_add_tail(&ld->connects, &c->list);
|
2018-02-20 21:59:09 +01:00
|
|
|
tal_add_destructor(c, destroy_connect);
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
2018-04-26 06:50:58 +02:00
|
|
|
/* Finds first command which matches. */
|
|
|
|
static struct connect *find_connect(struct lightningd *ld,
|
|
|
|
const struct pubkey *id)
|
2018-02-20 21:59:09 +01:00
|
|
|
{
|
2018-04-26 06:50:58 +02:00
|
|
|
struct connect *i;
|
2018-02-20 21:59:09 +01:00
|
|
|
|
2018-04-26 06:50:58 +02:00
|
|
|
list_for_each(&ld->connects, i, list) {
|
2018-02-20 21:59:09 +01:00
|
|
|
if (pubkey_eq(&i->id, id))
|
2018-04-26 06:50:58 +02:00
|
|
|
return i;
|
2018-02-20 21:59:09 +01:00
|
|
|
}
|
2018-04-26 06:50:58 +02:00
|
|
|
return NULL;
|
2018-02-20 21:59:09 +01:00
|
|
|
}
|
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
static void connectd_connect_result(struct lightningd *ld, const u8 *msg)
|
2018-02-20 21:59:09 +01:00
|
|
|
{
|
|
|
|
struct pubkey id;
|
2018-04-26 06:50:58 +02:00
|
|
|
bool connected;
|
|
|
|
char *err;
|
|
|
|
struct connect *c;
|
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
if (!fromwire_connectctl_connect_to_peer_result(tmpctx, msg,
|
2018-04-26 06:50:58 +02:00
|
|
|
&id,
|
|
|
|
&connected,
|
|
|
|
&err))
|
2018-07-24 08:18:58 +02:00
|
|
|
fatal("Connect gave bad CONNECTCTL_CONNECT_TO_PEER_RESULT message %s",
|
2018-04-26 06:50:58 +02:00
|
|
|
tal_hex(msg, msg));
|
2018-02-20 21:59:09 +01:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
|
2018-04-26 06:51:02 +02:00
|
|
|
/* We can have multiple connect commands: complete them all */
|
|
|
|
while ((c = find_connect(ld, &id)) != NULL) {
|
|
|
|
if (connected) {
|
|
|
|
struct json_result *response = new_json_result(c->cmd);
|
|
|
|
json_object_start(response, NULL);
|
|
|
|
json_add_pubkey(response, "id", &id);
|
|
|
|
json_object_end(response);
|
|
|
|
command_success(c->cmd, response);
|
|
|
|
} else {
|
2018-05-24 23:40:18 +02:00
|
|
|
command_fail(c->cmd, LIGHTNINGD, "%s", err);
|
2018-04-26 06:51:02 +02:00
|
|
|
}
|
|
|
|
/* They delete themselves from list */
|
2018-04-26 06:50:58 +02:00
|
|
|
}
|
2018-02-20 21:59:09 +01:00
|
|
|
}
|
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
static void json_connect(struct command *cmd,
|
|
|
|
const char *buffer, const jsmntok_t *params)
|
|
|
|
{
|
2018-07-16 22:48:38 +02:00
|
|
|
const jsmntok_t *hosttok, *porttok;
|
|
|
|
jsmntok_t *idtok;
|
2018-02-20 21:59:09 +01:00
|
|
|
struct pubkey id;
|
|
|
|
char *id_str;
|
|
|
|
char *atptr;
|
|
|
|
char *ataddr = NULL;
|
|
|
|
const char *name;
|
2018-05-07 06:29:21 +02:00
|
|
|
struct wireaddr_internal addr;
|
2018-02-20 21:59:09 +01:00
|
|
|
u8 *msg;
|
2018-02-25 03:30:33 +01:00
|
|
|
const char *err_msg;
|
2018-02-20 21:59:09 +01:00
|
|
|
|
2018-07-16 22:48:38 +02:00
|
|
|
if (!param(cmd, buffer, params,
|
|
|
|
p_req("id", json_tok_tok, (const jsmntok_t **) &idtok),
|
|
|
|
p_opt_tok("host", &hosttok),
|
|
|
|
p_opt_tok("port", &porttok),
|
|
|
|
NULL))
|
2018-02-20 21:59:09 +01:00
|
|
|
return;
|
|
|
|
|
|
|
|
/* Check for id@addrport form */
|
|
|
|
id_str = tal_strndup(cmd, buffer + idtok->start,
|
|
|
|
idtok->end - idtok->start);
|
|
|
|
atptr = strchr(id_str, '@');
|
|
|
|
if (atptr) {
|
2018-03-25 21:51:11 +02:00
|
|
|
int atidx = atptr - id_str;
|
2018-02-20 21:59:09 +01:00
|
|
|
ataddr = tal_strdup(cmd, atptr + 1);
|
|
|
|
/* Cut id. */
|
|
|
|
idtok->end = idtok->start + atidx;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!json_tok_pubkey(buffer, idtok, &id)) {
|
2018-05-24 23:40:18 +02:00
|
|
|
command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"id %.*s not valid",
|
2018-02-20 21:59:09 +01:00
|
|
|
idtok->end - idtok->start,
|
|
|
|
buffer + idtok->start);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (hosttok && ataddr) {
|
2018-05-24 23:40:18 +02:00
|
|
|
command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
2018-02-20 21:59:09 +01:00
|
|
|
"Can't specify host as both xxx@yyy "
|
|
|
|
"and separate argument");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get parseable host if provided somehow */
|
|
|
|
if (hosttok)
|
|
|
|
name = tal_strndup(cmd, buffer + hosttok->start,
|
|
|
|
hosttok->end - hosttok->start);
|
|
|
|
else if (ataddr)
|
|
|
|
name = ataddr;
|
|
|
|
else
|
|
|
|
name = NULL;
|
|
|
|
|
|
|
|
/* Port without host name? */
|
|
|
|
if (porttok && !name) {
|
2018-05-24 23:40:18 +02:00
|
|
|
command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"Can't specify port without host");
|
2018-02-20 21:59:09 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Was there parseable host name? */
|
|
|
|
if (name) {
|
2018-05-07 06:29:21 +02:00
|
|
|
u32 port;
|
2018-02-20 21:59:09 +01:00
|
|
|
/* Is there a port? */
|
|
|
|
if (porttok) {
|
2018-05-07 06:29:21 +02:00
|
|
|
if (!json_tok_number(buffer, porttok, &port) || !port) {
|
2018-05-24 23:40:18 +02:00
|
|
|
command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"Port %.*s not valid",
|
2018-02-20 21:59:09 +01:00
|
|
|
porttok->end - porttok->start,
|
|
|
|
buffer + porttok->start);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else {
|
2018-05-07 06:29:21 +02:00
|
|
|
port = DEFAULT_PORT;
|
2018-02-20 21:59:09 +01:00
|
|
|
}
|
2018-05-07 06:29:22 +02:00
|
|
|
if (!parse_wireaddr_internal(name, &addr, port, false,
|
2018-05-10 01:18:24 +02:00
|
|
|
!cmd->ld->use_proxy_always
|
|
|
|
&& !cmd->ld->pure_tor_setup,
|
2018-05-10 05:44:23 +02:00
|
|
|
true,
|
2018-05-07 06:29:22 +02:00
|
|
|
&err_msg)) {
|
2018-05-24 23:40:18 +02:00
|
|
|
command_fail(cmd, LIGHTNINGD, "Host %s:%u not valid: %s",
|
2018-05-07 06:29:21 +02:00
|
|
|
name, port, err_msg ? err_msg : "port is 0");
|
2018-02-20 21:59:09 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Tell it about the address. */
|
2018-07-24 08:18:58 +02:00
|
|
|
msg = towire_connectctl_peer_addrhint(cmd, &id, &addr);
|
2018-07-24 08:18:58 +02:00
|
|
|
subd_send_msg(cmd->ld->connectd, take(msg));
|
2018-02-20 21:59:09 +01:00
|
|
|
}
|
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
/* If there isn't already a connect command, tell connectd */
|
2018-04-26 06:51:02 +02:00
|
|
|
if (!find_connect(cmd->ld, &id)) {
|
2018-07-24 08:18:58 +02:00
|
|
|
msg = towire_connectctl_connect_to_peer(NULL, &id);
|
2018-07-24 08:18:58 +02:00
|
|
|
subd_send_msg(cmd->ld->connectd, take(msg));
|
2018-04-26 06:51:02 +02:00
|
|
|
}
|
2018-07-24 08:18:58 +02:00
|
|
|
/* Leave this here for connect_connect_result */
|
2018-02-20 21:59:09 +01:00
|
|
|
new_connect(cmd->ld, &id, cmd);
|
|
|
|
command_still_pending(cmd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct json_command connect_command = {
|
|
|
|
"connect",
|
|
|
|
json_connect,
|
|
|
|
"Connect to {id} at {host} (which can end in ':port' if not default). "
|
|
|
|
"{id} can also be of the form id@host"
|
|
|
|
};
|
|
|
|
AUTODATA(json_command, &connect_command);
|
2018-07-24 08:18:58 +02:00
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
static void peer_please_disconnect(struct lightningd *ld, const u8 *msg)
|
|
|
|
{
|
|
|
|
struct pubkey id;
|
|
|
|
struct channel *c;
|
|
|
|
struct uncommitted_channel *uc;
|
|
|
|
|
|
|
|
if (!fromwire_connect_reconnected(msg, &id))
|
|
|
|
fatal("Bad msg %s from connectd", tal_hex(tmpctx, msg));
|
|
|
|
|
|
|
|
c = active_channel_by_id(ld, &id, &uc);
|
|
|
|
if (uc)
|
|
|
|
kill_uncommitted_channel(uc, "Reconnected");
|
|
|
|
else if (c)
|
|
|
|
channel_fail_transient(c, "Reconnected");
|
|
|
|
}
|
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
static void peer_nongossip(struct subd *connectd, const u8 *msg,
|
|
|
|
int peer_fd, int gossip_fd)
|
|
|
|
{
|
|
|
|
struct pubkey id;
|
|
|
|
struct crypto_state cs;
|
|
|
|
struct wireaddr_internal addr;
|
|
|
|
u8 *gfeatures, *lfeatures, *in_pkt;
|
|
|
|
|
|
|
|
if (!fromwire_connect_peer_nongossip(msg, msg,
|
|
|
|
&id, &addr, &cs,
|
|
|
|
&gfeatures,
|
|
|
|
&lfeatures,
|
|
|
|
&in_pkt))
|
|
|
|
fatal("Connectd gave bad CONNECT_PEER_NONGOSSIP message %s",
|
|
|
|
tal_hex(msg, msg));
|
|
|
|
|
|
|
|
/* We already checked the features when it first connected. */
|
|
|
|
if (!features_supported(gfeatures, lfeatures)) {
|
|
|
|
log_unusual(connectd->log,
|
|
|
|
"Connectd gave unsupported features %s/%s",
|
|
|
|
tal_hex(msg, gfeatures),
|
|
|
|
tal_hex(msg, lfeatures));
|
|
|
|
close(peer_fd);
|
|
|
|
close(gossip_fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
peer_sent_nongossip(connectd->ld, &id, &addr, &cs,
|
|
|
|
gfeatures, lfeatures,
|
|
|
|
peer_fd, gossip_fd, in_pkt);
|
|
|
|
}
|
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
static unsigned connectd_msg(struct subd *connectd, const u8 *msg, const int *fds)
|
|
|
|
{
|
2018-07-24 08:18:58 +02:00
|
|
|
enum connect_wire_type t = fromwire_peektype(msg);
|
|
|
|
|
|
|
|
switch (t) {
|
|
|
|
/* These are messages we send, not them. */
|
|
|
|
case WIRE_CONNECTCTL_INIT:
|
|
|
|
case WIRE_CONNECTCTL_ACTIVATE:
|
|
|
|
case WIRE_CONNECT_GETPEERS_REQUEST:
|
|
|
|
case WIRE_CONNECTCTL_PEER_ADDRHINT:
|
|
|
|
case WIRE_CONNECTCTL_CONNECT_TO_PEER:
|
|
|
|
case WIRE_CONNECTCTL_PEER_IMPORTANT:
|
|
|
|
case WIRE_CONNECTCTL_RELEASE_PEER:
|
|
|
|
case WIRE_CONNECTCTL_HAND_BACK_PEER:
|
|
|
|
case WIRE_CONNECTCTL_PEER_DISCONNECTED:
|
|
|
|
case WIRE_CONNECTCTL_PEER_DISCONNECT:
|
|
|
|
/* This is a reply, so never gets through to here. */
|
|
|
|
case WIRE_CONNECTCTL_INIT_REPLY:
|
|
|
|
case WIRE_CONNECTCTL_ACTIVATE_REPLY:
|
|
|
|
case WIRE_CONNECT_GETPEERS_REPLY:
|
|
|
|
case WIRE_CONNECTCTL_RELEASE_PEER_REPLY:
|
|
|
|
case WIRE_CONNECTCTL_RELEASE_PEER_REPLYFAIL:
|
|
|
|
case WIRE_CONNECTCTL_PEER_DISCONNECT_REPLY:
|
|
|
|
case WIRE_CONNECTCTL_PEER_DISCONNECT_REPLYFAIL:
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WIRE_CONNECT_RECONNECTED:
|
2018-07-24 08:18:58 +02:00
|
|
|
peer_please_disconnect(connectd->ld, msg);
|
2018-07-24 08:18:58 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case WIRE_CONNECT_PEER_CONNECTED:
|
|
|
|
if (tal_count(fds) != 2)
|
|
|
|
return 2;
|
|
|
|
peer_connected(connectd->ld, msg, fds[0], fds[1]);
|
|
|
|
break;
|
|
|
|
case WIRE_CONNECT_PEER_NONGOSSIP:
|
|
|
|
if (tal_count(fds) != 2)
|
|
|
|
return 2;
|
|
|
|
peer_nongossip(connectd, msg, fds[0], fds[1]);
|
|
|
|
break;
|
|
|
|
case WIRE_CONNECTCTL_CONNECT_TO_PEER_RESULT:
|
|
|
|
connectd_connect_result(connectd->ld, msg);
|
|
|
|
break;
|
2018-07-24 08:18:58 +02:00
|
|
|
}
|
2018-07-24 08:18:58 +02:00
|
|
|
return 0;
|
2018-07-24 08:18:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void connect_init_done(struct subd *connectd,
|
|
|
|
const u8 *reply,
|
|
|
|
const int *fds UNUSED,
|
|
|
|
void *unused UNUSED)
|
|
|
|
{
|
|
|
|
struct lightningd *ld = connectd->ld;
|
|
|
|
|
|
|
|
if (!fromwire_connectctl_init_reply(ld, reply,
|
|
|
|
&ld->binding,
|
|
|
|
&ld->announcable))
|
|
|
|
fatal("Bad connectctl_activate_reply: %s",
|
|
|
|
tal_hex(reply, reply));
|
|
|
|
|
|
|
|
/* Break out of loop, so we can begin */
|
|
|
|
io_break(connectd);
|
|
|
|
}
|
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
int connectd_init(struct lightningd *ld)
|
|
|
|
{
|
|
|
|
int fds[2];
|
2018-07-24 08:18:58 +02:00
|
|
|
u8 *msg;
|
|
|
|
int hsmfd;
|
|
|
|
u64 capabilities = HSM_CAP_ECDH;
|
|
|
|
struct wireaddr_internal *wireaddrs = ld->proposed_wireaddr;
|
|
|
|
enum addr_listen_announce *listen_announce = ld->proposed_listen_announce;
|
|
|
|
bool allow_localhost = false;
|
|
|
|
#if DEVELOPER
|
|
|
|
if (ld->dev_allow_localhost)
|
|
|
|
allow_localhost = true;
|
|
|
|
#endif
|
2018-07-24 08:18:58 +02:00
|
|
|
|
|
|
|
if (socketpair(AF_LOCAL, SOCK_STREAM, 0, fds) != 0)
|
|
|
|
fatal("Could not socketpair for connectd<->gossipd");
|
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
msg = towire_hsm_client_hsmfd(tmpctx, &ld->id, 0, capabilities);
|
|
|
|
if (!wire_sync_write(ld->hsm_fd, msg))
|
|
|
|
fatal("Could not write to HSM: %s", strerror(errno));
|
|
|
|
|
|
|
|
msg = wire_sync_read(tmpctx, ld->hsm_fd);
|
|
|
|
if (!fromwire_hsm_client_hsmfd_reply(msg))
|
|
|
|
fatal("Malformed hsmfd response: %s", tal_hex(msg, msg));
|
|
|
|
|
|
|
|
hsmfd = fdpass_recv(ld->hsm_fd);
|
|
|
|
if (hsmfd < 0)
|
|
|
|
fatal("Could not read fd from HSM: %s", strerror(errno));
|
|
|
|
|
|
|
|
ld->connectd = new_global_subd(ld, "lightning_connectd",
|
2018-07-24 08:18:58 +02:00
|
|
|
connect_wire_type_name, connectd_msg,
|
2018-07-24 08:18:58 +02:00
|
|
|
take(&hsmfd), take(&fds[1]), NULL);
|
|
|
|
if (!ld->connectd)
|
|
|
|
err(1, "Could not subdaemon connectd");
|
|
|
|
|
|
|
|
/* If no addr specified, hand wildcard to connectd */
|
|
|
|
if (tal_count(wireaddrs) == 0 && ld->autolisten) {
|
|
|
|
wireaddrs = tal_arrz(tmpctx, struct wireaddr_internal, 1);
|
|
|
|
listen_announce = tal_arr(tmpctx, enum addr_listen_announce, 1);
|
|
|
|
wireaddrs->itype = ADDR_INTERNAL_ALLPROTO;
|
|
|
|
wireaddrs->u.port = ld->portnum;
|
|
|
|
*listen_announce = ADDR_LISTEN_AND_ANNOUNCE;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = towire_connectctl_init(
|
2018-07-24 08:18:58 +02:00
|
|
|
tmpctx, &ld->id,
|
2018-07-24 08:18:58 +02:00
|
|
|
get_offered_global_features(tmpctx),
|
|
|
|
get_offered_local_features(tmpctx), wireaddrs,
|
2018-07-24 08:18:58 +02:00
|
|
|
listen_announce, ld->reconnect,
|
2018-07-24 08:18:58 +02:00
|
|
|
ld->proxyaddr, ld->use_proxy_always || ld->pure_tor_setup,
|
|
|
|
allow_localhost, ld->config.use_dns,
|
|
|
|
ld->tor_service_password ? ld->tor_service_password : "");
|
|
|
|
|
|
|
|
subd_req(ld->connectd, ld->connectd, take(msg), -1, 0,
|
|
|
|
connect_init_done, NULL);
|
|
|
|
|
|
|
|
/* Wait for init_reply */
|
|
|
|
io_loop(NULL, NULL);
|
|
|
|
|
2018-07-24 08:18:58 +02:00
|
|
|
return fds[0];
|
|
|
|
}
|
2018-07-24 08:18:58 +02:00
|
|
|
|
|
|
|
static void connect_activate_done(struct subd *connectd,
|
|
|
|
const u8 *reply UNUSED,
|
|
|
|
const int *fds UNUSED,
|
|
|
|
void *unused UNUSED)
|
|
|
|
{
|
|
|
|
/* Break out of loop, so we can begin */
|
|
|
|
io_break(connectd);
|
|
|
|
}
|
|
|
|
|
|
|
|
void connectd_activate(struct lightningd *ld)
|
|
|
|
{
|
|
|
|
const u8 *msg = towire_connectctl_activate(NULL, ld->listen);
|
|
|
|
|
|
|
|
subd_req(ld->connectd, ld->connectd, take(msg), -1, 0,
|
|
|
|
connect_activate_done, NULL);
|
|
|
|
|
|
|
|
/* Wait for activate_reply */
|
|
|
|
io_loop(NULL, NULL);
|
|
|
|
}
|
|
|
|
|