2021-12-04 12:23:56 +01:00
# include "config.h"
2017-10-23 07:05:28 +02:00
# include <ccan/array_size/array_size.h>
2023-05-30 06:28:18 +02:00
# include <ccan/cast/cast.h>
2017-01-04 03:52:29 +01:00
# include <ccan/err/err.h>
2022-01-03 19:45:35 +01:00
# include <ccan/json_escape/json_escape.h>
2018-01-29 01:30:15 +01:00
# include <ccan/mem/mem.h>
2023-07-31 01:33:33 +02:00
# include <ccan/noerr/noerr.h>
2017-01-04 03:52:29 +01:00
# include <ccan/opt/opt.h>
2018-01-29 01:30:15 +01:00
# include <ccan/opt/private.h>
2023-07-31 01:33:33 +02:00
# include <ccan/read_write_all/read_write_all.h>
2019-07-16 23:40:14 +02:00
# include <ccan/str/hex/hex.h>
2023-07-31 01:33:33 +02:00
# include <ccan/tal/grab_file/grab_file.h>
2018-02-16 03:00:41 +01:00
# include <ccan/tal/path/path.h>
2017-01-04 03:52:29 +01:00
# include <ccan/tal/str/str.h>
2023-07-31 01:33:33 +02:00
# include <common/codex32.h>
2021-09-16 07:00:42 +02:00
# include <common/configdir.h>
2023-06-01 08:42:37 +02:00
# include <common/configvar.h>
2019-08-29 03:01:55 +02:00
# include <common/features.h>
2021-01-03 12:32:43 +01:00
# include <common/hsm_encryption.h>
2018-12-08 01:39:28 +01:00
# include <common/json_command.h>
2022-07-04 05:49:38 +02:00
# include <common/json_param.h>
2021-09-16 07:00:42 +02:00
# include <common/type_to_string.h>
2017-08-28 18:02:01 +02:00
# include <common/version.h>
2017-10-23 06:17:38 +02:00
# include <common/wireaddr.h>
2021-09-16 07:00:42 +02:00
# include <dirent.h>
2017-01-04 03:52:29 +01:00
# include <errno.h>
2023-07-31 01:33:33 +02:00
# include <fcntl.h>
2023-06-26 01:19:21 +02:00
# include <hsmd/hsmd_wiregen.h>
2017-08-28 18:04:01 +02:00
# include <lightningd/chaintopology.h>
2023-06-26 01:19:21 +02:00
# include <lightningd/hsm_control.h>
2017-08-28 18:04:01 +02:00
# include <lightningd/options.h>
2018-09-20 13:46:50 +02:00
# include <lightningd/plugin.h>
2017-10-06 13:57:29 +02:00
# include <lightningd/subd.h>
2017-01-04 03:52:29 +01:00
# include <sys/stat.h>
2019-08-01 08:20:43 +02:00
# include <sys/wait.h>
2017-01-04 03:52:29 +01:00
/* FIXME: Put into ccan/time. */
# define TIME_FROM_SEC(sec) { { .tv_nsec = 0, .tv_sec = sec } }
# define TIME_FROM_MSEC(msec) \
{ { . tv_nsec = ( ( msec ) % 1000 ) * 1000000 , . tv_sec = ( msec ) / 1000 } }
2018-03-18 13:22:21 +01:00
static char * opt_set_u64 ( const char * arg , u64 * u )
{
char * endp ;
unsigned long long l ;
assert ( arg ! = NULL ) ;
/* This is how the manpage says to do it. Yech. */
errno = 0 ;
l = strtoull ( arg , & endp , 0 ) ;
if ( * endp | | ! arg [ 0 ] )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is not a number " , arg ) ;
2018-03-18 13:22:21 +01:00
* u = l ;
if ( errno | | * u ! = l )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is out of range " , arg ) ;
2018-03-18 13:22:21 +01:00
return NULL ;
}
2017-01-04 03:52:29 +01:00
static char * opt_set_u32 ( const char * arg , u32 * u )
{
char * endp ;
unsigned long l ;
2018-03-01 11:32:38 +01:00
assert ( arg ! = NULL ) ;
2017-01-04 03:52:29 +01:00
/* This is how the manpage says to do it. Yech. */
errno = 0 ;
l = strtoul ( arg , & endp , 0 ) ;
if ( * endp | | ! arg [ 0 ] )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is not a number " , arg ) ;
2017-01-04 03:52:29 +01:00
* u = l ;
if ( errno | | * u ! = l )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is out of range " , arg ) ;
2017-01-04 03:52:29 +01:00
return NULL ;
}
static char * opt_set_s32 ( const char * arg , s32 * u )
{
char * endp ;
long l ;
2018-03-01 11:32:38 +01:00
assert ( arg ! = NULL ) ;
2017-01-04 03:52:29 +01:00
/* This is how the manpage says to do it. Yech. */
errno = 0 ;
l = strtol ( arg , & endp , 0 ) ;
if ( * endp | | ! arg [ 0 ] )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is not a number " , arg ) ;
2017-01-04 03:52:29 +01:00
* u = l ;
if ( errno | | * u ! = l )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is out of range " , arg ) ;
2017-01-04 03:52:29 +01:00
return NULL ;
}
2022-12-20 17:44:45 +01:00
char * opt_set_autobool_arg ( const char * arg , enum opt_autobool * b )
{
if ( ! strcasecmp ( arg , " yes " ) | |
! strcasecmp ( arg , " true " ) ) {
* b = OPT_AUTOBOOL_TRUE ;
return NULL ;
}
if ( ! strcasecmp ( arg , " no " ) | |
! strcasecmp ( arg , " false " ) ) {
* b = OPT_AUTOBOOL_FALSE ;
return NULL ;
}
if ( ! strcasecmp ( arg , " auto " ) | |
! strcasecmp ( arg , " default " ) ) {
* b = OPT_AUTOBOOL_AUTO ;
return NULL ;
}
return opt_invalid_argument ( arg ) ;
}
2023-06-01 06:16:21 +02:00
bool opt_show_autobool ( char * buf , size_t len , const enum opt_autobool * b )
2022-12-20 17:44:45 +01:00
{
switch ( * b ) {
case OPT_AUTOBOOL_TRUE :
2023-06-01 06:16:21 +02:00
strncpy ( buf , " true " , len ) ;
return true ;
2022-12-20 17:44:45 +01:00
case OPT_AUTOBOOL_FALSE :
2023-06-01 06:16:21 +02:00
strncpy ( buf , " false " , len ) ;
return true ;
2022-12-20 17:44:45 +01:00
case OPT_AUTOBOOL_AUTO :
2023-06-01 06:16:21 +02:00
strncpy ( buf , " auto " , len ) ;
return true ;
2022-12-20 17:44:45 +01:00
}
2023-06-01 06:16:21 +02:00
abort ( ) ;
2022-12-20 17:44:45 +01:00
}
2020-01-24 03:20:45 +01:00
static char * opt_set_mode ( const char * arg , mode_t * m )
{
char * endp ;
long l ;
assert ( arg ! = NULL ) ;
/* Ensure length, and starts with 0. */
if ( strlen ( arg ) ! = 4 | | arg [ 0 ] ! = ' 0 ' )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is not a file mode " , arg ) ;
2020-01-24 03:20:45 +01:00
/* strtol, manpage, yech. */
errno = 0 ;
l = strtol ( arg , & endp , 8 ) ; /* Octal. */
if ( errno | | * endp )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is not a file mode " , arg ) ;
2020-01-24 03:20:45 +01:00
* m = l ;
/* Range check not needed, previous strlen checks ensures only
* 9 - bit , which fits mode_t ( unless your Unix is seriously borked ) .
*/
return NULL ;
}
2021-07-08 04:47:03 +02:00
static char * opt_force_feerates ( const char * arg , struct lightningd * ld )
{
char * * vals = tal_strsplit ( tmpctx , arg , " / " , STR_EMPTY_OK ) ;
size_t n ;
/* vals has NULL at end, enum feerate is 0 based */
if ( tal_count ( vals ) - 1 > FEERATE_PENALTY + 1 )
return " Too many values " ;
if ( ! ld - > force_feerates )
ld - > force_feerates = tal_arr ( ld , u32 , FEERATE_PENALTY + 1 ) ;
n = 0 ;
for ( size_t i = 0 ; i < tal_count ( ld - > force_feerates ) ; i + + ) {
char * err = opt_set_u32 ( vals [ n ] , & ld - > force_feerates [ i ] ) ;
if ( err )
return err ;
fprintf ( stderr , " Set feerate %zu based on val %zu \n " , i , n ) ;
if ( vals [ n + 1 ] )
n + + ;
}
return NULL ;
}
static char * fmt_force_feerates ( const tal_t * ctx , const u32 * force_feerates )
{
char * ret ;
size_t last ;
if ( ! force_feerates )
return NULL ;
ret = tal_fmt ( ctx , " %i " , force_feerates [ 0 ] ) ;
last = 0 ;
for ( size_t i = 1 ; i < tal_count ( force_feerates ) ; i + + ) {
if ( force_feerates [ i ] = = force_feerates [ i - 1 ] )
continue ;
/* Different? Catchup! */
for ( size_t j = last + 1 ; j < = i ; j + + )
tal_append_fmt ( & ret , " /%i " , force_feerates [ j ] ) ;
last = i ;
}
return ret ;
}
2023-06-02 04:36:04 +02:00
static char * opt_add_accept_htlc_tlv ( const char * arg ,
u64 * * accept_extra_tlv_types )
{
size_t n = tal_count ( * accept_extra_tlv_types ) ;
tal_resize ( accept_extra_tlv_types , n + 1 ) ;
return opt_set_u64 ( arg , & ( * accept_extra_tlv_types ) [ n ] ) ;
}
2021-06-17 11:52:50 +02:00
static char * opt_set_accept_extra_tlv_types ( const char * arg ,
2022-09-21 06:09:51 +02:00
struct lightningd * ld )
2021-06-17 11:52:50 +02:00
{
2023-06-02 04:36:04 +02:00
char * ret , * * elements = tal_strsplit ( tmpctx , arg , " , " , STR_NO_EMPTY ) ;
2023-07-06 09:36:50 +02:00
if ( ! ld - > deprecated_apis )
2023-06-02 04:36:04 +02:00
return " Please use --accept-htlc-tlv-type multiple times " ;
2021-06-17 11:52:50 +02:00
for ( int i = 0 ; elements [ i ] ! = NULL ; i + + ) {
2023-06-02 04:36:04 +02:00
ret = opt_add_accept_htlc_tlv ( elements [ i ] ,
& ld - > accept_extra_tlv_types ) ;
if ( ret )
return ret ;
2021-06-17 11:52:50 +02:00
}
return NULL ;
}
2022-01-01 14:05:58 +01:00
/* Returns the number of wireaddr types already announced */
static size_t num_announced_types ( enum wire_addr_type type , struct lightningd * ld )
{
size_t num = 0 ;
for ( size_t i = 0 ; i < tal_count ( ld - > proposed_wireaddr ) ; i + + ) {
if ( ld - > proposed_wireaddr [ i ] . itype ! = ADDR_INTERNAL_WIREADDR )
continue ;
2023-05-30 06:28:18 +02:00
if ( ld - > proposed_wireaddr [ i ] . u . wireaddr . wireaddr . type ! = type )
2022-01-01 14:05:58 +01:00
continue ;
if ( ld - > proposed_listen_announce [ i ] & ADDR_ANNOUNCE )
num + + ;
}
return num ;
}
2018-05-07 06:28:12 +02:00
static char * opt_add_addr_withtype ( const char * arg ,
struct lightningd * ld ,
2023-05-30 06:28:18 +02:00
enum addr_listen_announce ala )
2017-10-11 12:04:50 +02:00
{
2018-02-25 03:30:33 +01:00
char const * err_msg ;
2019-01-15 04:51:27 +01:00
struct wireaddr_internal wi ;
2023-05-30 06:28:18 +02:00
bool dns_lookup_ok ;
2021-10-01 13:47:29 +02:00
char * address ;
u16 port ;
2017-10-23 06:15:38 +02:00
2018-03-01 11:32:38 +01:00
assert ( arg ! = NULL ) ;
2023-05-30 06:28:18 +02:00
dns_lookup_ok = ! ld - > always_use_proxy & & ld - > config . use_dns ;
/* Deprecated announce-addr-dns: autodetect DNS addresses. */
if ( ld - > announce_dns & & ( ala = = ADDR_ANNOUNCE )
& & separate_address_and_port ( tmpctx , arg , & address , & port )
& & is_dnsaddr ( address ) ) {
log_unusual ( ld - > log , " Adding dns prefix to %s! " , arg ) ;
arg = tal_fmt ( tmpctx , " dns:%s " , arg ) ;
}
err_msg = parse_wireaddr_internal ( tmpctx , arg , ld - > portnum ,
dns_lookup_ok , & wi ) ;
if ( err_msg )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Unable to parse address '%s': %s " , arg , err_msg ) ;
2023-05-30 06:28:18 +02:00
/* Check they didn't specify some weird type! */
switch ( wi . itype ) {
case ADDR_INTERNAL_WIREADDR :
2023-05-30 06:28:18 +02:00
switch ( wi . u . wireaddr . wireaddr . type ) {
2023-05-30 06:28:18 +02:00
case ADDR_TYPE_IPV4 :
case ADDR_TYPE_IPV6 :
2023-05-30 06:28:18 +02:00
if ( ( ala & ADDR_ANNOUNCE ) & & wi . u . allproto . is_websocket )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx ,
2023-05-30 06:28:18 +02:00
" Cannot announce websocket address, use --bind-addr=%s " , arg ) ;
2023-05-30 06:28:18 +02:00
/* These can be either bind or announce */
2023-05-30 06:28:18 +02:00
break ;
2023-05-30 06:28:18 +02:00
case ADDR_TYPE_TOR_V2_REMOVED :
/* Can't happen any more */
abort ( ) ;
case ADDR_TYPE_TOR_V3 :
switch ( ala ) {
case ADDR_LISTEN :
2023-07-06 09:36:50 +02:00
if ( ! ld - > deprecated_apis )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx ,
2023-05-30 06:28:18 +02:00
" Don't use --bind-addr=%s, use --announce-addr=%s " ,
arg , arg ) ;
2023-05-30 06:28:18 +02:00
log_unusual ( ld - > log ,
" You used `--bind-addr=%s` option with an .onion address, "
" You are lucky in this node live some wizards and "
" fairies, we have done this for you and don't announce, Be as hidden as wished " ,
arg ) ;
/* And we ignore it */
return NULL ;
case ADDR_LISTEN_AND_ANNOUNCE :
2023-07-06 09:36:50 +02:00
if ( ! ld - > deprecated_apis )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx ,
2023-05-30 06:28:18 +02:00
" Don't use --addr=%s, use --announce-addr=%s " ,
arg , arg ) ;
2023-05-30 06:28:18 +02:00
log_unusual ( ld - > log ,
" You used `--addr=%s` option with an .onion address, "
" You are lucky in this node live some wizards and "
" fairies, we have done this for you and don't announce, Be as hidden as wished " ,
arg ) ;
ala = ADDR_LISTEN ;
break ;
case ADDR_ANNOUNCE :
break ;
}
break ;
case ADDR_TYPE_DNS :
/* Can only announce this */
switch ( ala ) {
case ADDR_ANNOUNCE :
break ;
case ADDR_LISTEN :
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx ,
2023-05-30 06:28:18 +02:00
" Cannot use dns: prefix with --bind-addr, use --bind-addr=%s " , arg + strlen ( " dns: " ) ) ;
case ADDR_LISTEN_AND_ANNOUNCE :
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx ,
2023-05-30 06:28:18 +02:00
" Cannot use dns: prefix with --addr, use --bind-addr=%s and --addr=%s " ,
arg + strlen ( " dns: " ) ,
arg ) ;
}
/* BOLT-hostnames #7:
* The origin node :
* . . .
* - MUST NOT announce more than one ` type 5 ` DNS hostname .
*/
if ( num_announced_types ( ADDR_TYPE_DNS , ld ) > 0 )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Only one DNS can be announced " ) ;
2023-05-30 06:28:18 +02:00
break ;
}
2023-05-30 06:28:18 +02:00
break ;
case ADDR_INTERNAL_SOCKNAME :
switch ( ala ) {
case ADDR_ANNOUNCE :
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx ,
2023-05-30 06:28:18 +02:00
" Cannot announce sockets, try --bind-addr=%s " , arg ) ;
case ADDR_LISTEN_AND_ANNOUNCE :
2023-07-06 09:36:50 +02:00
if ( ! ld - > deprecated_apis )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Don't use --addr=%s, use --bind-addr=%s " ,
2023-05-30 06:28:18 +02:00
arg , arg ) ;
2023-05-30 06:28:18 +02:00
ala = ADDR_LISTEN ;
/* Fall thru */
case ADDR_LISTEN :
break ;
}
break ;
case ADDR_INTERNAL_AUTOTOR :
case ADDR_INTERNAL_STATICTOR :
/* We turn --announce-addr into --addr */
switch ( ala ) {
case ADDR_ANNOUNCE :
ala = ADDR_LISTEN_AND_ANNOUNCE ;
break ;
case ADDR_LISTEN_AND_ANNOUNCE :
case ADDR_LISTEN :
break ;
2021-10-01 13:47:29 +02:00
}
2023-05-30 06:28:18 +02:00
break ;
case ADDR_INTERNAL_ALLPROTO :
/* You can only bind to wildcard, and optionally announce */
switch ( ala ) {
case ADDR_ANNOUNCE :
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Cannot use wildcard address '%s' " , arg ) ;
2023-05-30 06:28:18 +02:00
case ADDR_LISTEN_AND_ANNOUNCE :
2023-05-30 06:28:18 +02:00
if ( wi . u . allproto . is_websocket )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx ,
2023-05-30 06:28:18 +02:00
" Cannot announce websocket address, use --bind-addr=%s " , arg ) ;
/* fall thru */
2023-05-30 06:28:18 +02:00
case ADDR_LISTEN :
break ;
}
break ;
case ADDR_INTERNAL_FORPROXY :
/* You can't use these addresses here at all: this means we've
* suppressed DNS and given a string - style name */
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Cannot resolve address '%s' (not using DNS!) " , arg) ;
2018-01-26 18:48:14 +01:00
}
2021-11-10 01:27:41 +01:00
2023-05-30 06:28:18 +02:00
/* Sanity check for exact duplicates. */
for ( size_t i = 0 ; i < tal_count ( ld - > proposed_wireaddr ) ; i + + ) {
/* Only compare announce vs announce and bind vs bind */
if ( ( ld - > proposed_listen_announce [ i ] & ala ) = = 0 )
continue ;
if ( wireaddr_internal_eq ( & ld - > proposed_wireaddr [ i ] , & wi ) )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Duplicate %s address %s " ,
2023-05-30 06:28:18 +02:00
ala & ADDR_ANNOUNCE ? " announce " : " listen " ,
type_to_string ( tmpctx , struct wireaddr_internal , & wi ) ) ;
2021-11-10 01:27:41 +01:00
}
2021-09-15 16:19:06 +02:00
2023-05-30 06:28:18 +02:00
tal_arr_expand ( & ld - > proposed_listen_announce , ala ) ;
tal_arr_expand ( & ld - > proposed_wireaddr , wi ) ;
2018-01-26 18:48:14 +01:00
return NULL ;
2017-10-11 12:04:50 +02:00
2017-05-08 15:15:29 +02:00
}
2018-05-07 06:28:12 +02:00
static char * opt_add_announce_addr ( const char * arg , struct lightningd * ld )
{
2023-05-30 06:28:18 +02:00
return opt_add_addr_withtype ( arg , ld , ADDR_ANNOUNCE ) ;
2018-05-07 06:28:12 +02:00
}
2019-09-24 08:40:17 +02:00
static char * opt_add_addr ( const char * arg , struct lightningd * ld )
{
2023-05-30 06:28:18 +02:00
return opt_add_addr_withtype ( arg , ld , ADDR_LISTEN_AND_ANNOUNCE ) ;
}
static char * opt_add_bind_addr ( const char * arg , struct lightningd * ld )
{
return opt_add_addr_withtype ( arg , ld , ADDR_LISTEN ) ;
2019-09-24 08:40:17 +02:00
}
2020-02-04 01:14:13 +01:00
static char * opt_subdaemon ( const char * arg , struct lightningd * ld )
{
char * subdaemon ;
char * sdpath ;
/* example arg: "hsmd:remote_hsmd" */
size_t colonoff = strcspn ( arg , " : " ) ;
if ( ! arg [ colonoff ] )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " argument must contain ':' " ) ;
2020-02-04 01:14:13 +01:00
subdaemon = tal_strndup ( ld , arg , colonoff ) ;
if ( ! is_subdaemon ( subdaemon ) )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " \" %s \" is not a subdaemon " , subdaemon ) ;
2020-02-04 01:14:13 +01:00
/* Make the value a tal-child of the subdaemon */
sdpath = tal_strdup ( subdaemon , arg + colonoff + 1 ) ;
/* Remove any preexisting alt subdaemon mapping (and
* implicitly , the sdpath ) . */
tal_free ( strmap_del ( & ld - > alt_subdaemons , subdaemon , NULL ) ) ;
strmap_add ( & ld - > alt_subdaemons , subdaemon , sdpath ) ;
return NULL ;
}
2023-06-01 06:16:21 +02:00
static bool opt_show_u64 ( char * buf , size_t len , const u64 * u )
2018-03-18 13:22:21 +01:00
{
2023-06-01 06:16:21 +02:00
snprintf ( buf , len , " % " PRIu64 , * u ) ;
return true ;
2018-03-18 13:22:21 +01:00
}
2023-06-01 06:16:21 +02:00
static bool opt_show_u32 ( char * buf , size_t len , const u32 * u )
2017-01-04 03:52:29 +01:00
{
2023-06-01 06:16:21 +02:00
snprintf ( buf , len , " % " PRIu32 , * u ) ;
return true ;
2017-01-04 03:52:29 +01:00
}
2023-06-01 06:16:21 +02:00
static bool opt_show_s32 ( char * buf , size_t len , const s32 * u )
2017-01-04 03:52:29 +01:00
{
2023-06-01 06:16:21 +02:00
snprintf ( buf , len , " % " PRIi32 , * u ) ;
return true ;
2017-01-04 03:52:29 +01:00
}
2023-06-01 06:16:21 +02:00
static bool opt_show_mode ( char * buf , size_t len , const mode_t * m )
2020-01-24 03:20:45 +01:00
{
2023-06-02 04:36:04 +02:00
snprintf ( buf , len , " %04o " , ( int ) * m ) ;
2023-06-01 06:16:21 +02:00
return true ;
2020-01-24 03:20:45 +01:00
}
2023-06-01 08:42:30 +02:00
static bool opt_show_rgb ( char * buf , size_t len , const struct lightningd * ld )
{
/* Can happen with -h! */
if ( ! ld - > rgb )
return false ;
/* This is always set; if not by arg, then by default */
hex_encode ( ld - > rgb , 3 , buf , len ) ;
return true ;
}
2017-10-23 07:05:28 +02:00
static char * opt_set_rgb ( const char * arg , struct lightningd * ld )
{
2018-03-01 11:32:38 +01:00
assert ( arg ! = NULL ) ;
2017-10-23 07:05:28 +02:00
ld - > rgb = tal_free ( ld - > rgb ) ;
/* BOLT #7:
*
2018-06-28 04:01:21 +02:00
* - Note : the first byte of ` rgb_color ` is the red value , the second
* byte is the green value , and the last byte is the blue value .
2018-06-17 12:13:44 +02:00
*/
2017-10-23 07:05:28 +02:00
ld - > rgb = tal_hexdata ( ld , arg , strlen ( arg ) ) ;
2018-07-28 08:00:16 +02:00
if ( ! ld - > rgb | | tal_count ( ld - > rgb ) ! = 3 )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " rgb '%s' is not six hex digits " , arg ) ;
2017-10-23 07:05:28 +02:00
return NULL ;
}
2023-06-01 08:42:30 +02:00
static bool opt_show_alias ( char * buf , size_t len , const struct lightningd * ld )
{
/* Can happen with -h! */
if ( ! ld - > alias )
return false ;
strncpy ( buf , cast_signed ( const char * , ld - > alias ) , len ) ;
return true ;
}
2017-10-23 07:05:28 +02:00
static char * opt_set_alias ( const char * arg , struct lightningd * ld )
{
2018-03-01 11:32:38 +01:00
assert ( arg ! = NULL ) ;
2017-10-23 07:05:28 +02:00
ld - > alias = tal_free ( ld - > alias ) ;
/* BOLT #7:
*
2019-07-16 01:20:37 +02:00
* * [ ` 32 * byte ` : ` alias ` ]
2017-10-23 07:05:28 +02:00
* . . .
2018-06-17 12:13:44 +02:00
* - MUST set ` alias ` to a valid UTF - 8 string , with any
* ` alias ` trailing - bytes equal to 0.
2017-10-23 07:05:28 +02:00
*/
if ( strlen ( arg ) > 32 )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Alias '%s' is over 32 characters " , arg ) ;
2017-11-24 14:43:31 +01:00
ld - > alias = tal_arrz ( ld , u8 , 33 ) ;
strncpy ( ( char * ) ld - > alias , arg , 32 ) ;
2017-10-23 07:05:28 +02:00
return NULL ;
}
2018-02-22 10:42:58 +01:00
static char * opt_set_offline ( struct lightningd * ld )
{
2018-05-07 05:44:40 +02:00
ld - > reconnect = false ;
ld - > listen = false ;
2023-07-31 01:33:33 +02:00
log_info ( ld - > log , " Started in offline mode! " ) ;
2018-02-22 10:42:58 +01:00
return NULL ;
}
2018-05-10 01:18:24 +02:00
static char * opt_add_proxy_addr ( const char * arg , struct lightningd * ld )
2018-05-10 01:18:19 +02:00
{
2018-05-15 12:19:59 +02:00
bool needed_dns = false ;
2023-05-30 06:28:18 +02:00
const char * err ;
2018-05-10 01:18:24 +02:00
tal_free ( ld - > proxyaddr ) ;
2018-05-10 01:18:19 +02:00
2018-05-10 01:18:23 +02:00
/* We use a tal_arr here, so we can marshal it to gossipd */
2018-05-10 01:18:24 +02:00
ld - > proxyaddr = tal_arr ( ld , struct wireaddr , 1 ) ;
2018-05-10 01:18:23 +02:00
2023-05-30 06:28:18 +02:00
err = parse_wireaddr ( tmpctx , arg , 9050 ,
ld - > always_use_proxy ? & needed_dns : NULL ,
ld - > proxyaddr ) ;
return cast_const ( char * , err ) ;
2018-05-10 01:18:19 +02:00
}
2018-09-20 13:46:50 +02:00
static char * opt_add_plugin ( const char * arg , struct lightningd * ld )
{
2022-06-15 07:47:57 +02:00
struct plugin * p ;
2020-05-05 03:15:21 +02:00
if ( plugin_blacklisted ( ld - > plugins , arg ) ) {
log_info ( ld - > log , " %s: disabled via disable-plugin " , arg ) ;
return NULL ;
}
2022-06-15 07:47:57 +02:00
p = plugin_register ( ld - > plugins , arg , NULL , false , NULL , NULL ) ;
if ( ! p )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Failed to register %s: %s " , arg , strerror ( errno ) ) ;
2018-09-20 13:46:50 +02:00
return NULL ;
}
2018-12-04 04:04:14 +01:00
static char * opt_disable_plugin ( const char * arg , struct lightningd * ld )
{
2020-05-05 03:15:21 +02:00
plugin_blacklist ( ld - > plugins , arg ) ;
return NULL ;
2018-12-04 04:04:14 +01:00
}
2018-12-03 10:26:29 +01:00
static char * opt_add_plugin_dir ( const char * arg , struct lightningd * ld )
{
2018-12-04 04:04:14 +01:00
return add_plugin_dir ( ld - > plugins , arg , false ) ;
}
static char * opt_clear_plugins ( struct lightningd * ld )
{
clear_plugins ( ld - > plugins ) ;
2023-06-02 04:36:04 +02:00
/* Remove from configvars too! */
for ( size_t i = 0 ; i < tal_count ( ld - > configvars ) ; i + + ) {
if ( streq ( ld - > configvars [ i ] - > optvar , " plugin " )
| | streq ( ld - > configvars [ i ] - > optvar , " plugin-dir " ) )
ld - > configvars [ i ] - > overridden = true ;
}
2018-12-04 04:04:14 +01:00
return NULL ;
2018-12-03 10:26:29 +01:00
}
2020-07-29 13:24:07 +02:00
static char * opt_important_plugin ( const char * arg , struct lightningd * ld )
{
2022-06-15 07:47:57 +02:00
struct plugin * p ;
2020-07-29 13:24:07 +02:00
if ( plugin_blacklisted ( ld - > plugins , arg ) ) {
log_info ( ld - > log , " %s: disabled via disable-plugin " , arg ) ;
return NULL ;
}
2022-06-15 07:47:57 +02:00
p = plugin_register ( ld - > plugins , arg , NULL , true , NULL , NULL ) ;
if ( ! p )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Failed to register %s: %s " , arg , strerror ( errno ) ) ;
2020-07-29 13:24:07 +02:00
return NULL ;
}
2022-06-26 06:43:01 +02:00
/* Test code looks in logs, so we print prompts to log as well as stdout */
static void prompt ( struct lightningd * ld , const char * str )
{
printf ( " %s \n " , str ) ;
log_debug ( ld - > log , " PROMPT: %s " , str ) ;
/* If we don't flush we might end up being buffered and we might seem
* to hang while we wait for the password . */
fflush ( stdout ) ;
}
2019-10-03 16:32:38 +02:00
/* Prompt the user to enter a password, from which will be derived the key used
* for ` hsm_secret ` encryption .
* The algorithm used to derive the key is Argon2 ( id ) , to which libsodium
* defaults . However argon2id - specific constants are used in case someone runs it
* with a libsodium version which default constants differs ( typically < 1.0 .9 ) .
*/
static char * opt_set_hsm_password ( struct lightningd * ld )
{
2021-12-14 22:57:21 +01:00
char * passwd , * passwd_confirmation , * err_msg ;
2022-03-10 22:26:20 +01:00
int is_encrypted ;
is_encrypted = is_hsm_secret_encrypted ( " hsm_secret " ) ;
2022-11-20 21:42:17 +01:00
/* While lightningd is performing the first initialization
* this check is always true because the file does not exist .
*
* Maybe the is_hsm_secret_encrypted is performing a not useful
* check at this stage , but the hsm is a delicate part ,
* so it is a good information to have inside the log . */
2022-03-10 22:26:20 +01:00
if ( is_encrypted = = - 1 )
2022-11-20 21:42:17 +01:00
log_info ( ld - > log , " 'hsm_secret' does not exist (%s) " ,
strerror ( errno ) ) ;
2019-10-03 16:32:38 +02:00
2022-06-26 06:43:01 +02:00
prompt ( ld , " The hsm_secret is encrypted with a password. In order to "
" decrypt it and start the node you must provide the password. " ) ;
prompt ( ld , " Enter hsm_secret password: " ) ;
2021-12-14 22:57:21 +01:00
passwd = read_stdin_pass_with_exit_code ( & err_msg , & opt_exitcode ) ;
2021-01-03 14:54:13 +01:00
if ( ! passwd )
2021-12-14 22:57:21 +01:00
return err_msg ;
2022-03-10 22:26:20 +01:00
if ( ! is_encrypted ) {
2022-06-26 06:43:01 +02:00
prompt ( ld , " Confirm hsm_secret password: " ) ;
2022-03-10 22:26:20 +01:00
fflush ( stdout ) ;
passwd_confirmation = read_stdin_pass_with_exit_code ( & err_msg , & opt_exitcode ) ;
if ( ! passwd_confirmation )
return err_msg ;
if ( ! streq ( passwd , passwd_confirmation ) ) {
2022-07-20 04:29:25 +02:00
opt_exitcode = EXITCODE_HSM_BAD_PASSWORD ;
2022-03-10 22:26:20 +01:00
return " Passwords confirmation mismatch. " ;
}
free ( passwd_confirmation ) ;
2022-03-10 21:30:39 +01:00
}
2022-06-26 06:43:01 +02:00
prompt ( ld , " " ) ;
2019-10-03 16:32:38 +02:00
2021-01-03 12:32:43 +01:00
ld - > config . keypass = tal ( NULL , struct secret ) ;
2021-12-14 22:57:21 +01:00
opt_exitcode = hsm_secret_encryption_key_with_exitcode ( passwd , ld - > config . keypass , & err_msg ) ;
if ( opt_exitcode > 0 )
return err_msg ;
2021-01-03 12:32:43 +01:00
ld - > encrypted_hsm = true ;
2019-10-03 16:32:38 +02:00
free ( passwd ) ;
2021-01-03 12:32:43 +01:00
2019-10-03 16:32:38 +02:00
return NULL ;
}
2017-10-24 04:06:14 +02:00
# if DEVELOPER
2019-07-16 23:40:14 +02:00
static char * opt_force_privkey ( const char * optarg , struct lightningd * ld )
{
tal_free ( ld - > dev_force_privkey ) ;
ld - > dev_force_privkey = tal ( ld , struct privkey ) ;
if ( ! hex_decode ( optarg , strlen ( optarg ) ,
ld - > dev_force_privkey , sizeof ( * ld - > dev_force_privkey ) ) )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Unable to parse privkey '%s' " , optarg ) ;
2019-07-16 23:40:14 +02:00
return NULL ;
}
2019-07-16 23:41:14 +02:00
static char * opt_force_bip32_seed ( const char * optarg , struct lightningd * ld )
{
tal_free ( ld - > dev_force_bip32_seed ) ;
ld - > dev_force_bip32_seed = tal ( ld , struct secret ) ;
if ( ! hex_decode ( optarg , strlen ( optarg ) ,
ld - > dev_force_bip32_seed ,
sizeof ( * ld - > dev_force_bip32_seed ) ) )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Unable to parse secret '%s' " , optarg ) ;
2019-07-16 23:41:14 +02:00
return NULL ;
}
2019-11-01 18:01:54 +01:00
static char * opt_force_tmp_channel_id ( const char * optarg , struct lightningd * ld )
{
tal_free ( ld - > dev_force_tmp_channel_id ) ;
ld - > dev_force_tmp_channel_id = tal ( ld , struct channel_id ) ;
if ( ! hex_decode ( optarg , strlen ( optarg ) ,
ld - > dev_force_tmp_channel_id ,
sizeof ( * ld - > dev_force_tmp_channel_id ) ) )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Unable to parse channel id '%s' " , optarg ) ;
2019-11-01 18:01:54 +01:00
return NULL ;
}
2019-07-16 23:45:14 +02:00
static char * opt_force_channel_secrets ( const char * optarg ,
struct lightningd * ld )
{
char * * strs ;
tal_free ( ld - > dev_force_channel_secrets ) ;
tal_free ( ld - > dev_force_channel_secrets_shaseed ) ;
ld - > dev_force_channel_secrets = tal ( ld , struct secrets ) ;
ld - > dev_force_channel_secrets_shaseed = tal ( ld , struct sha256 ) ;
strs = tal_strsplit ( tmpctx , optarg , " / " , STR_EMPTY_OK ) ;
if ( tal_count ( strs ) ! = 7 ) /* Last is NULL */
return " Expected 6 hex secrets separated by / " ;
if ( ! hex_decode ( strs [ 0 ] , strlen ( strs [ 0 ] ) ,
& ld - > dev_force_channel_secrets - > funding_privkey ,
sizeof ( ld - > dev_force_channel_secrets - > funding_privkey ) )
| | ! hex_decode ( strs [ 1 ] , strlen ( strs [ 1 ] ) ,
& ld - > dev_force_channel_secrets - > revocation_basepoint_secret ,
sizeof ( ld - > dev_force_channel_secrets - > revocation_basepoint_secret ) )
| | ! hex_decode ( strs [ 2 ] , strlen ( strs [ 2 ] ) ,
& ld - > dev_force_channel_secrets - > payment_basepoint_secret ,
sizeof ( ld - > dev_force_channel_secrets - > payment_basepoint_secret ) )
| | ! hex_decode ( strs [ 3 ] , strlen ( strs [ 3 ] ) ,
& ld - > dev_force_channel_secrets - > delayed_payment_basepoint_secret ,
sizeof ( ld - > dev_force_channel_secrets - > delayed_payment_basepoint_secret ) )
| | ! hex_decode ( strs [ 4 ] , strlen ( strs [ 4 ] ) ,
& ld - > dev_force_channel_secrets - > htlc_basepoint_secret ,
sizeof ( ld - > dev_force_channel_secrets - > htlc_basepoint_secret ) )
| | ! hex_decode ( strs [ 5 ] , strlen ( strs [ 5 ] ) ,
ld - > dev_force_channel_secrets_shaseed ,
sizeof ( * ld - > dev_force_channel_secrets_shaseed ) ) )
return " Expected 6 hex secrets separated by / " ;
return NULL ;
}
2020-08-25 05:23:28 +02:00
static char * opt_force_featureset ( const char * optarg ,
struct lightningd * ld )
{
char * * parts = tal_strsplit ( tmpctx , optarg , " / " , STR_EMPTY_OK ) ;
2022-02-18 16:41:05 +01:00
if ( tal_count ( parts ) ! = NUM_FEATURE_PLACE + 1 ) {
2020-10-22 20:20:29 +02:00
if ( ! strstarts ( optarg , " - " ) & & ! strstarts ( optarg , " + " ) )
2022-11-09 03:32:00 +01:00
return " Expected 8 feature sets (init/globalinit/ "
" node_announce/channel/bolt11/b12offer/b12invreq/b12inv) each terminated by / "
2022-02-18 16:41:05 +01:00
" OR +/-<single_bit_num> " ;
2020-10-22 20:20:29 +02:00
char * endp ;
long int n = strtol ( optarg + 1 , & endp , 10 ) ;
const struct feature_set * f ;
if ( * endp | | endp = = optarg + 1 )
return " Invalid feature number " ;
f = feature_set_for_feature ( NULL , n ) ;
if ( strstarts ( optarg , " - " )
& & ! feature_set_sub ( ld - > our_features , take ( f ) ) )
return " Feature unknown " ;
if ( strstarts ( optarg , " + " )
& & ! feature_set_or ( ld - > our_features , take ( f ) ) )
return " Feature already flagged-on " ;
return NULL ;
}
2020-08-25 05:23:28 +02:00
for ( size_t i = 0 ; parts [ i ] ; i + + ) {
char * * bits = tal_strsplit ( tmpctx , parts [ i ] , " , " , STR_EMPTY_OK ) ;
tal_resize ( & ld - > our_features - > bits [ i ] , 0 ) ;
for ( size_t j = 0 ; bits [ j ] ; j + + ) {
char * endp ;
long int n = strtol ( bits [ j ] , & endp , 10 ) ;
if ( * endp | | endp = = bits [ j ] )
return " Invalid bitnumber " ;
set_feature_bit ( & ld - > our_features - > bits [ i ] , n ) ;
}
}
return NULL ;
}
2017-08-28 18:09:01 +02:00
static void dev_register_opts ( struct lightningd * ld )
2017-01-04 03:52:29 +01:00
{
2019-07-25 08:39:40 +02:00
/* We might want to debug plugins, which are started before normal
* option parsing */
2023-06-01 08:42:49 +02:00
clnopt_witharg ( " --dev-debugger=<subprocess> " , OPT_EARLY | OPT_DEV ,
opt_set_charp , NULL ,
& ld - > dev_debug_subprocess ,
" Invoke gdb at start of <subprocess> " ) ;
clnopt_noarg ( " --dev-no-plugin-checksum " , OPT_EARLY | OPT_DEV ,
opt_set_bool ,
& ld - > dev_no_plugin_checksum ,
" Don't checksum plugins to detect changes " ) ;
clnopt_noarg ( " --dev-builtin-plugins-unimportant " , OPT_EARLY | OPT_DEV ,
opt_set_bool ,
& ld - > plugins - > dev_builtin_plugins_unimportant ,
" Make builtin plugins unimportant so you can plugin stop them. " ) ;
clnopt_noarg ( " --dev-no-reconnect " , OPT_DEV ,
opt_set_invbool ,
& ld - > reconnect ,
" Disable automatic reconnect-attempts by this node, but accept incoming " ) ;
clnopt_noarg ( " --dev-fast-reconnect " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_fast_reconnect ,
" Make max default reconnect delay 3 (not 300) seconds " ) ;
clnopt_noarg ( " --dev-fail-on-subdaemon-fail " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_subdaemon_fail , opt_hidden ) ;
clnopt_witharg ( " --dev-disconnect=<filename> " , OPT_DEV ,
opt_subd_dev_disconnect ,
NULL , ld , " File containing disconnection points " ) ;
clnopt_noarg ( " --dev-allow-localhost " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_allow_localhost ,
" Announce and allow announcments for localhost address " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --dev-bitcoind-poll " , OPT_DEV | OPT_SHOWINT ,
2023-06-01 08:42:49 +02:00
opt_set_u32 , opt_show_u32 ,
& ld - > topology - > poll_seconds ,
" Time between polling for new transactions " ) ;
clnopt_noarg ( " --dev-fast-gossip " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_fast_gossip ,
" Make gossip broadcast 1 second, etc " ) ;
clnopt_noarg ( " --dev-fast-gossip-prune " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_fast_gossip_prune ,
" Make gossip pruning 30 seconds " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --dev-gossip-time " , OPT_DEV | OPT_SHOWINT ,
2023-06-01 08:42:49 +02:00
opt_set_u32 , opt_show_u32 ,
& ld - > dev_gossip_time ,
" UNIX time to override gossipd to use. " ) ;
clnopt_witharg ( " --dev-force-privkey " , OPT_DEV ,
opt_force_privkey , NULL , ld ,
" Force HSM to use this as node private key " ) ;
clnopt_witharg ( " --dev-force-bip32-seed " , OPT_DEV ,
opt_force_bip32_seed , NULL , ld ,
" Force HSM to use this as bip32 seed " ) ;
clnopt_witharg ( " --dev-force-channel-secrets " , OPT_DEV ,
opt_force_channel_secrets , NULL , ld ,
" Force HSM to use these for all per-channel secrets " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --dev-max-funding-unconfirmed-blocks " ,
OPT_DEV | OPT_SHOWINT ,
2023-06-01 08:42:49 +02:00
opt_set_u32 , opt_show_u32 ,
& ld - > dev_max_funding_unconfirmed ,
" Maximum number of blocks we wait for a channel "
" funding transaction to confirm, if we are the "
" fundee. " ) ;
clnopt_witharg ( " --dev-force-tmp-channel-id " , OPT_DEV ,
opt_force_tmp_channel_id , NULL , ld ,
" Force the temporary channel id, instead of random " ) ;
clnopt_noarg ( " --dev-no-htlc-timeout " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_no_htlc_timeout ,
" Don't kill channeld if HTLCs not confirmed within 30 seconds " ) ;
clnopt_noarg ( " --dev-fail-process-onionpacket " , OPT_DEV ,
opt_set_bool ,
& dev_fail_process_onionpacket ,
" Force all processing of onion packets to fail " ) ;
clnopt_noarg ( " --dev-no-version-checks " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_no_version_checks ,
" Skip calling subdaemons with --version on startup " ) ;
clnopt_witharg ( " --dev-force-features " , OPT_DEV ,
opt_force_featureset , NULL , ld ,
" Force the init/globalinit/node_announce/channel/bolt11/ features, each comma-separated bitnumbers OR a single +/-<bitnumber> " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --dev-timeout-secs " , OPT_DEV | OPT_SHOWINT ,
2023-06-01 08:42:49 +02:00
opt_set_u32 , opt_show_u32 ,
& ld - > config . connection_timeout_secs ,
" Seconds to timeout if we don't receive INIT from peer " ) ;
clnopt_noarg ( " --dev-no-modern-onion " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_ignore_modern_onion ,
" Ignore modern onion messages " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --dev-disable-commit-after " , OPT_DEV | OPT_SHOWINT ,
2023-06-01 08:42:49 +02:00
opt_set_intval , opt_show_intval ,
& ld - > dev_disable_commit ,
" Disable commit timer after this many commits " ) ;
clnopt_noarg ( " --dev-no-ping-timer " , OPT_DEV ,
opt_set_bool ,
& ld - > dev_no_ping_timer ,
" Don't hang up if we don't get a ping response " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --dev-onion-reply-length " , OPT_DEV | OPT_SHOWINT ,
2023-06-01 08:42:49 +02:00
opt_set_uintval ,
opt_show_uintval ,
& dev_onion_reply_length ,
" Send onion errors of custom length " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --dev-max-fee-multiplier " , OPT_DEV | OPT_SHOWINT ,
2023-06-01 08:42:49 +02:00
opt_set_uintval ,
opt_show_uintval ,
& ld - > config . max_fee_multiplier ,
" Allow the fee proposed by the remote end to "
" be up to multiplier times higher than our "
" own. Small values will cause channels to be "
" closed more often due to fee fluctuations, "
" large values may result in large fees. " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --dev-allowdustreserve " , OPT_DEV | OPT_SHOWBOOL ,
2023-06-01 08:42:49 +02:00
opt_set_bool_arg , opt_show_bool ,
& ld - > config . allowdustreserve ,
" If true, we allow the `fundchannel` RPC command and the `openchannel` plugin hook to set a reserve that is below the dust limit. " ) ;
2019-07-16 23:41:14 +02:00
}
2019-07-25 08:39:40 +02:00
# endif /* DEVELOPER */
2017-01-04 03:52:29 +01:00
static const struct config testnet_config = {
/* 6 blocks to catch cheating attempts. */
. locktime_blocks = 6 ,
2018-06-11 13:43:30 +02:00
/* They can have up to 14 days, maximumu value that lnd will ask for by default. */
/* FIXME Convince lnd to use more reasonable defaults... */
2018-06-15 15:35:55 +02:00
. locktime_max = 14 * 24 * 6 ,
2017-01-04 03:52:29 +01:00
/* We're fairly trusting, under normal circumstances. */
. anchor_confirms = 1 ,
2019-07-27 19:45:22 +02:00
/* Testnet blockspace is free. */
. max_concurrent_htlcs = 483 ,
2022-03-26 14:31:26 +01:00
/* channel defaults for htlc min/max values */
. htlc_minimum_msat = AMOUNT_MSAT ( 0 ) ,
. htlc_maximum_msat = AMOUNT_MSAT ( - 1ULL ) , /* no limit */
2021-09-28 21:03:08 +02:00
/* Max amount of dust allowed per channel (50ksat) */
. max_dust_htlc_exposure_msat = AMOUNT_MSAT ( 50000000 ) ,
2017-10-23 06:16:57 +02:00
/* Be aggressive on testnet. */
. cltv_expiry_delta = 6 ,
2018-06-08 08:02:52 +02:00
. cltv_final = 10 ,
2017-10-23 06:16:57 +02:00
2017-01-04 03:52:29 +01:00
/* Send commit 10msec after receiving; almost immediately. */
2018-05-17 06:46:22 +02:00
. commit_time_ms = 10 ,
2017-01-04 03:52:29 +01:00
/* Allow dust payments */
. fee_base = 1 ,
/* Take 0.001% */
. fee_per_satoshi = 10 ,
2018-01-16 10:24:46 +01:00
/* Testnet sucks */
. ignore_fee_limits = true ,
2018-04-18 15:23:15 +02:00
/* Rescan 5 hours of blocks on testnet, it's reorg happy */
. rescan = 30 ,
2018-06-11 19:50:37 +02:00
2018-06-20 13:11:25 +02:00
. use_dns = true ,
2019-04-03 10:20:38 +02:00
2022-12-20 17:49:03 +01:00
/* Excplicitly turns 'on' or 'off' IP discovery feature. */
. ip_discovery = OPT_AUTOBOOL_AUTO ,
2022-03-26 14:31:26 +01:00
2022-12-21 11:41:04 +01:00
/* Public TCP port assumed for IP discovery. Defaults to chainparams. */
. ip_discovery_port = 0 ,
2019-04-15 22:48:10 +02:00
/* Sets min_effective_htlc_capacity - at 1000$/BTC this is 10ct */
. min_capacity_sat = 10000 ,
2019-09-25 13:05:14 +02:00
2020-09-11 08:48:12 +02:00
/* 1 minute should be enough for anyone! */
. connection_timeout_secs = 60 ,
2021-01-13 09:58:38 +01:00
2023-05-22 02:51:44 +02:00
. exp_offers = false ,
2022-06-22 15:31:27 +02:00
. allowdustreserve = false ,
2023-01-11 23:43:51 +01:00
. require_confirmed_inputs = false ,
2023-04-07 06:39:05 +02:00
. max_fee_multiplier = 10 ,
. commit_fee_percent = 100 ,
2017-01-04 03:52:29 +01:00
} ;
/* aka. "Dude, where's my coins?" */
static const struct config mainnet_config = {
/* ~one day to catch cheating attempts. */
. locktime_blocks = 6 * 24 ,
2018-06-11 13:43:30 +02:00
/* They can have up to 14 days, maximumu value that lnd will ask for by default. */
/* FIXME Convince lnd to use more reasonable defaults... */
2018-06-15 15:35:55 +02:00
. locktime_max = 14 * 24 * 6 ,
2017-01-04 03:52:29 +01:00
/* We're fairly trusting, under normal circumstances. */
. anchor_confirms = 3 ,
2019-07-27 19:45:22 +02:00
/* While up to 483 htlcs are possible we do 30 by default (as eclair does) to save blockspace */
. max_concurrent_htlcs = 30 ,
2022-03-26 14:31:26 +01:00
/* defaults for htlc min/max values */
. htlc_minimum_msat = AMOUNT_MSAT ( 0 ) ,
. htlc_maximum_msat = AMOUNT_MSAT ( - 1ULL ) , /* no limit */
2021-09-28 21:03:08 +02:00
/* Max amount of dust allowed per channel (50ksat) */
. max_dust_htlc_exposure_msat = AMOUNT_MSAT ( 50000000 ) ,
2017-10-23 06:16:57 +02:00
/* BOLT #2:
*
2018-06-17 12:13:44 +02:00
* 1. the ` cltv_expiry_delta ` for channels , ` 3 R + 2 G + 2 S ` : if in doubt , a
2020-08-20 08:50:47 +02:00
* ` cltv_expiry_delta ` of at least 34 is reasonable ( R = 2 , G = 2 , S = 12 )
2018-06-17 12:13:44 +02:00
*/
2020-08-20 08:50:47 +02:00
/* R = 2, G = 2, S = 12 */
. cltv_expiry_delta = 34 ,
2017-10-23 06:16:57 +02:00
/* BOLT #2:
*
2018-06-17 12:13:44 +02:00
* 4. the minimum ` cltv_expiry ` accepted for terminal payments : the
* worst case for the terminal node C is ` 2 R + G + S ` blocks */
2020-08-20 08:50:47 +02:00
. cltv_final = 18 ,
2017-10-23 06:16:57 +02:00
2017-01-04 03:52:29 +01:00
/* Send commit 10msec after receiving; almost immediately. */
2018-05-17 06:46:22 +02:00
. commit_time_ms = 10 ,
2017-01-04 03:52:29 +01:00
/* Discourage dust payments */
2018-01-19 15:59:20 +01:00
. fee_base = 1000 ,
2017-01-04 03:52:29 +01:00
/* Take 0.001% */
. fee_per_satoshi = 10 ,
2018-01-16 10:24:46 +01:00
/* Mainnet should have more stable fees */
. ignore_fee_limits = false ,
2018-04-18 15:23:15 +02:00
/* Rescan 2.5 hours of blocks on startup, it's not so reorg happy */
. rescan = 15 ,
2018-06-11 19:50:37 +02:00
2018-06-20 13:11:25 +02:00
. use_dns = true ,
2019-04-03 10:20:38 +02:00
2022-12-20 17:49:03 +01:00
/* Excplicitly turns 'on' or 'off' IP discovery feature. */
. ip_discovery = OPT_AUTOBOOL_AUTO ,
2022-03-26 14:31:26 +01:00
2022-12-21 11:41:04 +01:00
/* Public TCP port assumed for IP discovery. Defaults to chainparams. */
. ip_discovery_port = 0 ,
2019-04-15 22:48:10 +02:00
/* Sets min_effective_htlc_capacity - at 1000$/BTC this is 10ct */
. min_capacity_sat = 10000 ,
2019-09-25 13:05:14 +02:00
2020-09-11 08:48:12 +02:00
/* 1 minute should be enough for anyone! */
. connection_timeout_secs = 60 ,
2021-01-13 09:58:38 +01:00
2023-05-22 02:51:44 +02:00
. exp_offers = false ,
2022-06-22 15:31:27 +02:00
. allowdustreserve = false ,
2023-01-11 23:43:51 +01:00
. require_confirmed_inputs = false ,
2023-04-07 06:39:05 +02:00
. max_fee_multiplier = 10 ,
. commit_fee_percent = 100 ,
2017-01-04 03:52:29 +01:00
} ;
2017-08-28 18:09:01 +02:00
static void check_config ( struct lightningd * ld )
2017-01-04 03:52:29 +01:00
{
2019-07-27 19:45:22 +02:00
/* BOLT #2:
*
* The receiving node MUST fail the channel if :
* . . .
* - ` max_accepted_htlcs ` is greater than 483.
*/
if ( ld - > config . max_concurrent_htlcs < 1 | | ld - > config . max_concurrent_htlcs > 483 )
fatal ( " --max-concurrent-htlcs value must be between 1 and 483 it is: %u " ,
ld - > config . max_concurrent_htlcs ) ;
2017-08-28 18:09:01 +02:00
if ( ld - > config . anchor_confirms = = 0 )
2017-01-04 03:52:29 +01:00
fatal ( " anchor-confirms must be greater than zero " ) ;
2018-05-10 01:18:23 +02:00
2021-08-18 12:52:21 +02:00
if ( ld - > always_use_proxy & & ! ld - > proxyaddr )
2018-05-10 01:18:24 +02:00
fatal ( " --always-use-proxy needs --proxy " ) ;
2021-01-25 02:12:23 +01:00
2022-06-26 06:25:01 +02:00
if ( ld - > daemon_parent_fd ! = - 1 & & ! ld - > logfiles )
2021-01-25 02:12:23 +01:00
fatal ( " --daemon needs --log-file " ) ;
2017-01-04 03:52:29 +01:00
}
2018-09-03 02:42:27 +02:00
static char * test_subdaemons_and_exit ( struct lightningd * ld )
2018-01-03 12:05:44 +01:00
{
2018-09-03 02:42:27 +02:00
test_subdaemons ( ld ) ;
2018-01-03 12:05:44 +01:00
exit ( 0 ) ;
return NULL ;
}
2019-08-29 03:01:55 +02:00
static char * list_features_and_exit ( struct lightningd * ld )
{
2020-04-03 02:03:59 +02:00
const char * * features = list_supported_features ( tmpctx , ld - > our_features ) ;
2019-08-29 03:01:55 +02:00
for ( size_t i = 0 ; i < tal_count ( features ) ; i + + )
printf ( " %s \n " , features [ i ] ) ;
2021-09-10 04:14:23 +02:00
printf ( " supports_open_accept_channel_type \n " ) ;
2019-08-29 03:01:55 +02:00
exit ( 0 ) ;
}
2018-08-11 10:31:26 +02:00
static char * opt_lightningd_usage ( struct lightningd * ld )
{
char * extra = tal_fmt ( NULL , " \n A bitcoin lightning daemon (default "
2019-10-15 12:58:30 +02:00
" values shown for network: %s). " , chainparams - > network_name ) ;
2018-08-11 10:31:26 +02:00
opt_usage_and_exit ( extra ) ;
tal_free ( extra ) ;
2018-08-01 02:53:20 +02:00
return NULL ;
}
2019-08-01 08:20:43 +02:00
static char * opt_start_daemon ( struct lightningd * ld )
{
int fds [ 2 ] ;
int exitcode , pid ;
/* Already a daemon? OK. */
if ( ld - > daemon_parent_fd ! = - 1 )
return NULL ;
if ( pipe ( fds ) ! = 0 )
err ( 1 , " Creating pipe to talk to --daemon " ) ;
pid = fork ( ) ;
if ( pid = = - 1 )
err ( 1 , " Fork failed for --daemon " ) ;
if ( pid = = 0 ) {
/* Child returns, continues as normal. */
close ( fds [ 0 ] ) ;
ld - > daemon_parent_fd = fds [ 1 ] ;
return NULL ;
}
/* OK, we are the parent. We exit with status told to us by
* child . */
close ( fds [ 1 ] ) ;
if ( read ( fds [ 0 ] , & exitcode , sizeof ( exitcode ) ) = = sizeof ( exitcode ) )
_exit ( exitcode ) ;
/* It died before writing exitcode (presumably 0), so we grab it */
waitpid ( pid , & exitcode , 0 ) ;
if ( WIFEXITED ( exitcode ) )
_exit ( WEXITSTATUS ( exitcode ) ) ;
errx ( 1 , " Died with signal %u " , WTERMSIG ( exitcode ) ) ;
}
2023-06-01 08:42:30 +02:00
static bool opt_show_msat ( char * buf , size_t len , const struct amount_msat * msat )
{
opt_show_u64 ( buf , len , & msat - > millisatoshis /* Raw: option output */ ) ;
return true ;
}
2021-09-28 21:03:08 +02:00
static char * opt_set_msat ( const char * arg , struct amount_msat * amt )
{
if ( ! parse_amount_msat ( amt , arg , strlen ( arg ) ) )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " Unable to parse millisatoshi '%s' " , arg ) ;
2021-09-28 21:03:08 +02:00
return NULL ;
}
2023-06-29 02:14:09 +02:00
static char * opt_set_sat ( const char * arg , struct amount_sat * sat )
{
struct amount_msat msat ;
if ( ! parse_amount_msat ( & msat , arg , strlen ( arg ) ) )
return tal_fmt ( NULL , " Unable to parse millisatoshi '%s' " , arg ) ;
if ( ! amount_msat_to_sat ( sat , msat ) )
return tal_fmt ( NULL , " '%s' is not a whole number of sats " , arg ) ;
return NULL ;
}
2023-06-29 02:14:10 +02:00
static char * opt_set_sat_nondust ( const char * arg , struct amount_sat * sat )
{
char * ret = opt_set_sat ( arg , sat ) ;
if ( ret )
return ret ;
if ( amount_sat_less ( * sat , chainparams - > dust_limit ) )
return tal_fmt ( tmpctx , " Option must be over dust limit! " ) ;
return NULL ;
}
2023-06-29 02:14:09 +02:00
static bool opt_show_sat ( char * buf , size_t len , const struct amount_sat * sat )
{
struct amount_msat msat ;
if ( ! amount_sat_to_msat ( & msat , * sat ) )
abort ( ) ;
return opt_show_u64 ( buf , len ,
& msat . millisatoshis ) ; /* Raw: show sats number */
}
2020-04-03 02:03:58 +02:00
static char * opt_set_wumbo ( struct lightningd * ld )
{
2020-04-03 02:03:59 +02:00
feature_set_or ( ld - > our_features ,
2020-04-03 02:03:58 +02:00
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_LARGE_CHANNELS ) ) ) ) ;
return NULL ;
}
2021-10-18 02:13:33 +02:00
static char * opt_set_websocket_port ( const char * arg , struct lightningd * ld )
{
u32 port COMPILER_WANTS_INIT ( " 9.3.0 -O2 " ) ;
char * err ;
2023-07-06 09:36:50 +02:00
if ( ! ld - > deprecated_apis )
2023-05-30 06:28:18 +02:00
return " --experimental-websocket-port been deprecated, use --bind=ws:... " ;
2021-10-18 02:13:33 +02:00
err = opt_set_u32 ( arg , & port ) ;
if ( err )
return err ;
ld - > websocket_port = port ;
if ( ld - > websocket_port ! = port )
2023-06-06 02:38:47 +02:00
return tal_fmt ( tmpctx , " '%s' is out of range " , arg ) ;
2021-10-18 02:13:33 +02:00
return NULL ;
}
2020-12-10 01:10:17 +01:00
static char * opt_set_dual_fund ( struct lightningd * ld )
{
2022-10-19 20:35:45 +02:00
/* Dual funding implies static remotkey */
2021-03-12 01:22:50 +01:00
feature_set_or ( ld - > our_features ,
take ( feature_set_for_feature ( NULL ,
2022-10-19 20:35:45 +02:00
OPTIONAL_FEATURE ( OPT_STATIC_REMOTEKEY ) ) ) ) ;
2020-12-10 01:10:17 +01:00
feature_set_or ( ld - > our_features ,
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_DUAL_FUND ) ) ) ) ;
return NULL ;
}
2023-07-27 23:37:52 +02:00
static char * opt_set_splicing ( struct lightningd * ld )
{
/* Splicing requires STFU to be enabled */
feature_set_or ( ld - > our_features ,
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_QUIESCE ) ) ) ) ;
feature_set_or ( ld - > our_features ,
take ( feature_set_for_feature ( NULL ,
2023-08-10 02:20:29 +02:00
OPTIONAL_FEATURE ( OPT_EXPERIMENTAL_SPLICE ) ) ) ) ;
2023-07-27 23:37:52 +02:00
return NULL ;
}
2021-01-13 04:00:20 +01:00
static char * opt_set_onion_messages ( struct lightningd * ld )
{
feature_set_or ( ld - > our_features ,
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_ONION_MESSAGES ) ) ) ) ;
return NULL ;
}
2021-03-15 04:39:44 +01:00
static char * opt_set_shutdown_wrong_funding ( struct lightningd * ld )
{
feature_set_or ( ld - > our_features ,
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_SHUTDOWN_WRONG_FUNDING ) ) ) ) ;
return NULL ;
}
2023-02-05 04:44:00 +01:00
static char * opt_set_peer_storage ( struct lightningd * ld )
{
feature_set_or ( ld - > our_features ,
2023-02-13 15:37:41 +01:00
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_PROVIDE_PEER_BACKUP_STORAGE ) ) ) ) ;
2023-02-05 04:44:00 +01:00
feature_set_or ( ld - > our_features ,
2023-02-13 15:37:41 +01:00
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_WANT_PEER_BACKUP_STORAGE ) ) ) ) ;
2023-02-05 04:44:00 +01:00
return NULL ;
}
2023-05-22 02:51:44 +02:00
static char * opt_set_quiesce ( struct lightningd * ld )
{
feature_set_or ( ld - > our_features ,
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_QUIESCE ) ) ) ) ;
return NULL ;
}
2023-06-26 01:19:21 +02:00
static char * opt_set_anchor_zero_fee_htlc_tx ( struct lightningd * ld )
{
/* Requires static_remotekey, but we always set that */
feature_set_or ( ld - > our_features ,
take ( feature_set_for_feature ( NULL ,
OPTIONAL_FEATURE ( OPT_ANCHORS_ZERO_FEE_HTLC_TX ) ) ) ) ;
return NULL ;
}
2021-01-13 09:58:38 +01:00
static char * opt_set_offers ( struct lightningd * ld )
{
ld - > config . exp_offers = true ;
return opt_set_onion_messages ( ld ) ;
}
2022-08-24 12:05:42 +02:00
static char * opt_set_db_upgrade ( const char * arg , struct lightningd * ld )
{
ld - > db_upgrade_ok = tal ( ld , bool ) ;
return opt_set_bool_arg ( arg , ld - > db_upgrade_ok ) ;
}
2022-12-20 18:28:46 +01:00
static char * opt_disable_ip_discovery ( struct lightningd * ld )
{
log_broken ( ld - > log , " --disable-ip-discovery has been deprecated, use --announce-addr-discovered=false " ) ;
ld - > config . ip_discovery = OPT_AUTOBOOL_FALSE ;
return NULL ;
}
2023-05-30 06:28:18 +02:00
static char * opt_set_announce_dns ( const char * optarg , struct lightningd * ld )
{
2023-07-06 09:36:50 +02:00
if ( ! ld - > deprecated_apis )
2023-05-30 06:28:18 +02:00
return " --announce-addr-dns has been deprecated, use --bind-addr=dns:... " ;
return opt_set_bool_arg ( optarg , & ld - > announce_dns ) ;
}
2023-07-31 01:33:33 +02:00
static char * opt_set_codex32 ( const char * arg , struct lightningd * ld )
{
char * err ;
2023-08-02 04:57:43 +02:00
struct codex32 * parts = codex32_decode ( tmpctx , " cl " , arg , & err ) ;
2023-07-31 01:33:33 +02:00
if ( ! parts ) {
return err ;
}
if ( parts - > type ! = CODEX32_ENCODING_SECRET ) {
return tal_fmt ( tmpctx , " Not a valid codex32 secret! " ) ;
}
codex32: rework.
Firstly, I wanted the results easier to use:
1. Make them always lower case, even if the string was UPPER.
2. Decode the payload for them.
3. Don't give the user any fields they don't need, and make
the field sizes explicit.
Secondly, I wanted to avoid the pattern of "check in one place, assume
in another", in favour of "check on use".
So, I changed the code to lower the string if it needs to at the start,
and then changed the pull functions so we always use them to get data:
this way we should fail clearly and gracefully if we don't have enough data.
I made all the checks explicit, where we assign the fields.
I also addressed the FIXME: I think the array is *often* one shorter,
but not always, so I trim the last byte at the end if needed.
[ Aditya modified the tests to work ]
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2023-07-31 01:37:46 +02:00
if ( tal_bytelen ( parts - > payload ) ! = 32 ) {
2023-07-31 01:33:33 +02:00
return tal_fmt ( tmpctx , " Expected 32 Byte secret: %s " ,
tal_hexstr ( tmpctx ,
codex32: rework.
Firstly, I wanted the results easier to use:
1. Make them always lower case, even if the string was UPPER.
2. Decode the payload for them.
3. Don't give the user any fields they don't need, and make
the field sizes explicit.
Secondly, I wanted to avoid the pattern of "check in one place, assume
in another", in favour of "check on use".
So, I changed the code to lower the string if it needs to at the start,
and then changed the pull functions so we always use them to get data:
this way we should fail clearly and gracefully if we don't have enough data.
I made all the checks explicit, where we assign the fields.
I also addressed the FIXME: I think the array is *often* one shorter,
but not always, so I trim the last byte at the end if needed.
[ Aditya modified the tests to work ]
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2023-07-31 01:37:46 +02:00
parts - > payload ,
tal_bytelen ( parts - > payload ) ) ) ;
2023-07-31 01:33:33 +02:00
}
/* Checks if hsm_secret exists */
int fd = open ( " hsm_secret " , O_CREAT | O_EXCL | O_WRONLY , 0400 ) ;
if ( fd < 0 ) {
/* Don't do anything if the file already exists. */
if ( errno = = EEXIST )
return tal_fmt ( tmpctx , " hsm_secret already exists! " ) ;
return tal_fmt ( tmpctx , " Creating hsm_secret: %s " ,
strerror ( errno ) ) ;
}
codex32: rework.
Firstly, I wanted the results easier to use:
1. Make them always lower case, even if the string was UPPER.
2. Decode the payload for them.
3. Don't give the user any fields they don't need, and make
the field sizes explicit.
Secondly, I wanted to avoid the pattern of "check in one place, assume
in another", in favour of "check on use".
So, I changed the code to lower the string if it needs to at the start,
and then changed the pull functions so we always use them to get data:
this way we should fail clearly and gracefully if we don't have enough data.
I made all the checks explicit, where we assign the fields.
I also addressed the FIXME: I think the array is *often* one shorter,
but not always, so I trim the last byte at the end if needed.
[ Aditya modified the tests to work ]
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2023-07-31 01:37:46 +02:00
if ( ! write_all ( fd , parts - > payload , tal_count ( parts - > payload ) ) ) {
2023-07-31 01:33:33 +02:00
unlink_noerr ( " hsm_secret " ) ;
return tal_fmt ( tmpctx , " Writing HSM: %s " ,
strerror ( errno ) ) ;
}
/*~ fsync (mostly!) ensures that the file has reached the disk. */
if ( fsync ( fd ) ! = 0 ) {
unlink_noerr ( " hsm_secret " ) ;
return tal_fmt ( tmpctx , " fsync: %s " , strerror ( errno ) ) ;
}
/*~ This should never fail if fsync succeeded. But paranoia good, and
* bugs exist . */
if ( close ( fd ) ! = 0 ) {
unlink_noerr ( " hsm_secret " ) ;
return tal_fmt ( tmpctx , " closing: %s " , strerror ( errno ) ) ;
}
/*~ We actually need to sync the *directory itself* to make sure the
* file exists ! You ' re only allowed to open directories read - only in
* modern Unix though . */
fd = open ( " . " , O_RDONLY ) ;
if ( fd < 0 ) {
unlink_noerr ( " hsm_secret " ) ;
return tal_fmt ( tmpctx , " opening: %s " , strerror ( errno ) ) ;
}
if ( fsync ( fd ) ! = 0 ) {
unlink_noerr ( " hsm_secret " ) ;
return tal_fmt ( tmpctx , " fsyncdir: %s " , strerror ( errno ) ) ;
}
close ( fd ) ;
2023-07-31 01:36:33 +02:00
ld - > recover = tal_strdup ( ld , arg ) ;
2023-07-31 01:33:33 +02:00
opt_set_offline ( ld ) ;
2023-07-31 01:33:33 +02:00
return NULL ;
}
2019-07-25 08:37:58 +02:00
static void register_opts ( struct lightningd * ld )
{
2019-07-25 08:39:40 +02:00
/* This happens before plugins started */
2023-06-02 04:36:04 +02:00
clnopt_noarg ( " --test-daemons-only " , OPT_EARLY | OPT_EXITS ,
test_subdaemons_and_exit ,
ld ,
" Test that subdaemons can be run, then exit immediately " ) ;
2023-07-06 09:36:50 +02:00
/* We need to know this even before we talk to plugins */
clnopt_witharg ( " --allow-deprecated-apis " ,
OPT_EARLY | OPT_SHOWBOOL ,
opt_set_bool_arg , opt_show_bool ,
& ld - > deprecated_apis ,
" Enable deprecated options, JSONRPC commands, fields, etc. " ) ;
2019-07-25 08:39:40 +02:00
/* Register plugins as an early args, so we can initialize them and have
* them register more command line options */
2023-06-01 08:42:37 +02:00
clnopt_witharg ( " --plugin " , OPT_MULTI | OPT_EARLY ,
opt_add_plugin , NULL , ld ,
" Add a plugin to be run (can be used multiple times) " ) ;
clnopt_witharg ( " --plugin-dir " , OPT_MULTI | OPT_EARLY ,
opt_add_plugin_dir ,
NULL , ld ,
" Add a directory to load plugins from (can be used multiple times) " ) ;
2019-07-25 08:39:40 +02:00
opt_register_early_noarg ( " --clear-plugins " , opt_clear_plugins ,
ld ,
" Remove all plugins added before this option " ) ;
2023-06-01 08:42:37 +02:00
clnopt_witharg ( " --disable-plugin " , OPT_MULTI | OPT_EARLY ,
opt_disable_plugin ,
NULL , ld ,
" Disable a particular plugin by filename/name " ) ;
2019-07-25 08:39:40 +02:00
2023-06-01 08:42:37 +02:00
clnopt_witharg ( " --important-plugin " , OPT_MULTI | OPT_EARLY ,
opt_important_plugin ,
NULL , ld ,
" Add an important plugin to be run (can be used multiple times). Die if the plugin dies. " ) ;
2020-07-29 13:24:07 +02:00
2019-07-25 08:39:40 +02:00
/* Early, as it suppresses DNS lookups from cmdline too. */
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --always-use-proxy " , OPT_EARLY | OPT_SHOWBOOL ,
opt_set_bool_arg , opt_show_bool ,
& ld - > always_use_proxy , " Use the proxy always " ) ;
2019-07-25 08:39:40 +02:00
2019-08-01 08:20:43 +02:00
/* This immediately makes is a daemon. */
opt_register_early_noarg ( " --daemon " , opt_start_daemon , ld ,
" Run in the background, suppress stdout/stderr " ) ;
2019-11-23 02:45:53 +01:00
opt_register_early_arg ( " --wallet " , opt_set_talstr , NULL ,
& ld - > wallet_dsn ,
" Location of the wallet database. " ) ;
2019-08-01 08:20:43 +02:00
2023-07-31 01:33:33 +02:00
opt_register_early_arg ( " --recover " , opt_set_codex32 , NULL ,
ld ,
" Populate hsm_secret with the given codex32 secret "
" and starts the node in `offline` mode. " ) ;
2020-04-03 02:03:58 +02:00
/* This affects our features, so set early. */
opt_register_early_noarg ( " --large-channels|--wumbo " ,
opt_set_wumbo , ld ,
" Allow channels larger than 0.16777215 BTC " ) ;
2020-12-10 01:10:17 +01:00
opt_register_early_noarg ( " --experimental-dual-fund " ,
opt_set_dual_fund , ld ,
" experimental: Advertise dual-funding "
" and allow peers to establish channels "
2021-03-12 01:19:40 +01:00
" via v2 channel open protocol. " ) ;
2020-12-10 01:10:17 +01:00
2023-07-27 23:37:52 +02:00
opt_register_early_noarg ( " --experimental-splicing " ,
opt_set_splicing , ld ,
" experimental: Enables the ability to resize "
" channels using splicing " ) ;
2021-01-13 04:00:20 +01:00
/* This affects our features, so set early. */
opt_register_early_noarg ( " --experimental-onion-messages " ,
opt_set_onion_messages , ld ,
" EXPERIMENTAL: enable send, receive and relay "
2022-10-17 02:44:38 +02:00
" of onion messages and blinded payments " ) ;
2021-01-13 09:58:38 +01:00
opt_register_early_noarg ( " --experimental-offers " ,
opt_set_offers , ld ,
" EXPERIMENTAL: enable send and receive of offers "
" (also sets experimental-onion-messages) " ) ;
2021-03-15 04:39:44 +01:00
opt_register_early_noarg ( " --experimental-shutdown-wrong-funding " ,
opt_set_shutdown_wrong_funding , ld ,
" EXPERIMENTAL: allow shutdown with alternate txids " ) ;
2023-02-05 04:44:00 +01:00
opt_register_early_noarg ( " --experimental-peer-storage " ,
opt_set_peer_storage , ld ,
" EXPERIMENTAL: enable peer backup storage and restore " ) ;
2023-05-22 02:51:44 +02:00
opt_register_early_noarg ( " --experimental-quiesce " ,
opt_set_quiesce , ld ,
" experimental: Advertise ability to quiesce "
" channels. " ) ;
2023-06-26 01:19:21 +02:00
opt_register_early_noarg ( " --experimental-anchors " ,
opt_set_anchor_zero_fee_htlc_tx , ld ,
" EXPERIMENTAL: enable option_anchors_zero_fee_htlc_tx "
" to open zero-fee-anchor channels " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --announce-addr-dns " , OPT_EARLY | OPT_SHOWBOOL ,
opt_set_bool_arg , opt_show_bool ,
& ld - > announce_dns ,
opt_hidden ) ;
2020-12-10 01:10:17 +01:00
2023-06-02 04:36:04 +02:00
clnopt_noarg ( " --help|-h " , OPT_EXITS ,
opt_lightningd_usage , ld , " Print this message. " ) ;
2023-06-01 08:42:30 +02:00
opt_register_arg ( " --rgb " , opt_set_rgb , opt_show_rgb , ld ,
2017-10-23 07:05:28 +02:00
" RRGGBB hex color for node " ) ;
2023-06-01 08:42:30 +02:00
opt_register_arg ( " --alias " , opt_set_alias , opt_show_alias , ld ,
2017-10-23 07:05:28 +02:00
" Up to 32-byte alias for node " ) ;
2018-01-09 15:45:07 +01:00
2018-02-20 00:00:09 +01:00
opt_register_arg ( " --pid-file=<file> " , opt_set_talstr , opt_show_charp ,
& ld - > pidfile ,
" Specify pid file " ) ;
2018-01-30 15:17:58 +01:00
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --ignore-fee-limits " , OPT_SHOWBOOL ,
opt_set_bool_arg , opt_show_bool ,
& ld - > config . ignore_fee_limits ,
" (DANGEROUS) allow peer to set any feerate " ) ;
clnopt_witharg ( " --watchtime-blocks " , OPT_SHOWINT , opt_set_u32 , opt_show_u32 ,
2019-07-25 08:39:40 +02:00
& ld - > config . locktime_blocks ,
" Blocks before peer can unilaterally spend funds " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --max-locktime-blocks " , OPT_SHOWINT , opt_set_u32 , opt_show_u32 ,
2019-07-25 08:39:40 +02:00
& ld - > config . locktime_max ,
" Maximum blocks funds may be locked for " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --funding-confirms " , OPT_SHOWINT , opt_set_u32 , opt_show_u32 ,
2019-07-25 08:39:40 +02:00
& ld - > config . anchor_confirms ,
" Confirmations required for funding transaction " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --require-confirmed-inputs " , OPT_SHOWBOOL ,
opt_set_bool_arg , opt_show_bool ,
& ld - > config . require_confirmed_inputs ,
" Confirmations required for inputs to funding transaction (v2 opens only) " ) ;
clnopt_witharg ( " --cltv-delta " , OPT_SHOWINT , opt_set_u32 , opt_show_u32 ,
2019-07-25 08:39:40 +02:00
& ld - > config . cltv_expiry_delta ,
" Number of blocks for cltv_expiry_delta " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --cltv-final " , OPT_SHOWINT , opt_set_u32 , opt_show_u32 ,
2019-07-25 08:39:40 +02:00
& ld - > config . cltv_final ,
" Number of blocks for final cltv_expiry " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --commit-time=<millseconds> " , OPT_SHOWINT ,
2019-07-25 08:39:40 +02:00
opt_set_u32 , opt_show_u32 ,
& ld - > config . commit_time_ms ,
" Time after changes before sending out COMMIT " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --fee-base " , OPT_SHOWINT , opt_set_u32 , opt_show_u32 ,
2019-07-25 08:39:40 +02:00
& ld - > config . fee_base ,
" Millisatoshi minimum to charge for HTLC " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --rescan " , OPT_SHOWINT , opt_set_s32 , opt_show_s32 ,
2019-07-25 08:39:40 +02:00
& ld - > config . rescan ,
" Number of blocks to rescan from the current head, or "
" absolute blockheight if negative " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --fee-per-satoshi " , OPT_SHOWINT , opt_set_u32 , opt_show_u32 ,
2019-07-25 08:39:40 +02:00
& ld - > config . fee_per_satoshi ,
" Microsatoshi fee for every satoshi in HTLC " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --htlc-minimum-msat " , OPT_SHOWMSATS ,
opt_set_msat , opt_show_msat ,
& ld - > config . htlc_minimum_msat ,
" The default minimal value an HTLC must carry in order to be forwardable for new channels " ) ;
clnopt_witharg ( " --htlc-maximum-msat " , OPT_SHOWMSATS ,
opt_set_msat , opt_show_msat ,
& ld - > config . htlc_maximum_msat ,
" The default maximal value an HTLC must carry in order to be forwardable for new channel " ) ;
clnopt_witharg ( " --max-concurrent-htlcs " , OPT_SHOWINT , opt_set_u32 , opt_show_u32 ,
2019-07-27 19:45:22 +02:00
& ld - > config . max_concurrent_htlcs ,
" Number of HTLCs one channel can handle concurrently. Should be between 1 and 483 " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --max-dust-htlc-exposure-msat " , OPT_SHOWMSATS ,
opt_set_msat ,
opt_show_msat , & ld - > config . max_dust_htlc_exposure_msat ,
" Max HTLC amount that can be trimmed " ) ;
2023-06-05 16:18:21 +02:00
clnopt_witharg ( " --min-capacity-sat " , OPT_SHOWINT | OPT_DYNAMIC , opt_set_u64 , opt_show_u64 ,
2019-07-25 08:39:40 +02:00
& ld - > config . min_capacity_sat ,
" Minimum capacity in satoshis for accepting channels " ) ;
2023-06-01 08:42:37 +02:00
clnopt_witharg ( " --addr " , OPT_MULTI , opt_add_addr , NULL ,
ld ,
" Set an IP address (v4 or v6) to listen on and announce to the network for incoming connections " ) ;
clnopt_witharg ( " --bind-addr " , OPT_MULTI , opt_add_bind_addr , NULL ,
ld ,
" Set an IP address (v4 or v6) to listen on, but not announce " ) ;
clnopt_witharg ( " --announce-addr " , OPT_MULTI , opt_add_announce_addr , NULL ,
ld ,
" Set an IP address (v4 or v6) or .onion v3 to announce, but not listen on " ) ;
2022-12-20 17:49:03 +01:00
2022-12-20 18:28:46 +01:00
opt_register_noarg ( " --disable-ip-discovery " , opt_disable_ip_discovery , ld , opt_hidden ) ;
2022-12-20 17:49:03 +01:00
opt_register_arg ( " --announce-addr-discovered " , opt_set_autobool_arg , opt_show_autobool ,
& ld - > config . ip_discovery ,
" Explicitly turns IP discovery 'on' or 'off'. " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --announce-addr-discovered-port " , OPT_SHOWINT ,
opt_set_uintval ,
opt_show_uintval , & ld - > config . ip_discovery_port ,
" Sets the public TCP port to use for announcing discovered IPs. " ) ;
2019-07-25 08:39:40 +02:00
opt_register_noarg ( " --offline " , opt_set_offline , ld ,
" Start in offline-mode (do not automatically reconnect and do not accept incoming connections) " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --autolisten " , OPT_SHOWBOOL ,
opt_set_bool_arg , opt_show_bool ,
& ld - > autolisten ,
" If true, listen on default port and announce if it seems to be a public interface " ) ;
2019-07-25 08:39:40 +02:00
opt_register_arg ( " --proxy " , opt_add_proxy_addr , NULL ,
ld , " Set a socks v5 proxy IP address and port " ) ;
opt_register_arg ( " --tor-service-password " , opt_set_talstr , NULL ,
& ld - > tor_service_password ,
" Set a Tor hidden service password " ) ;
2022-09-21 06:09:51 +02:00
opt_register_arg ( " --accept-htlc-tlv-types " ,
2021-06-17 11:52:50 +02:00
opt_set_accept_extra_tlv_types , NULL , ld ,
2023-08-18 08:49:17 +02:00
opt_hidden ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --accept-htlc-tlv-type " , OPT_MULTI | OPT_SHOWINT ,
opt_add_accept_htlc_tlv , NULL ,
& ld - > accept_extra_tlv_types ,
" HTLC TLV type to accept (can be used multiple times) " ) ;
2021-06-17 11:52:50 +02:00
2021-09-21 15:50:57 +02:00
opt_register_early_noarg ( " --disable-dns " , opt_set_invbool , & ld - > config . use_dns ,
" Disable DNS lookups of peers " ) ;
2019-07-25 08:39:40 +02:00
2019-10-03 16:32:38 +02:00
opt_register_noarg ( " --encrypted-hsm " , opt_set_hsm_password , ld ,
2021-12-14 22:57:21 +01:00
" Set the password to encrypt hsm_secret with. If no password is passed through command line, "
" you will be prompted to enter it. " ) ;
2019-10-03 16:32:38 +02:00
2020-01-24 03:20:45 +01:00
opt_register_arg ( " --rpc-file-mode " , & opt_set_mode , & opt_show_mode ,
& ld - > rpc_filemode ,
" Set the file mode (permissions) for the "
" JSON-RPC socket " ) ;
2021-07-08 04:47:03 +02:00
opt_register_arg ( " --force-feerates " ,
opt_force_feerates , NULL , ld ,
" Set testnet/regtest feerates in sats perkw, opening/mutual_close/unlateral_close/delayed_to_us/htlc_resolution/penalty: if fewer specified, last number applies to remainder " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --commit-fee " , OPT_SHOWINT ,
opt_set_u64 , opt_show_u64 , & ld - > config . commit_fee_percent ,
" Percentage of fee to request for their commitment " ) ;
2023-06-29 02:14:09 +02:00
clnopt_witharg ( " --min-emergency-msat " , OPT_SHOWMSATS ,
2023-06-29 02:14:10 +02:00
opt_set_sat_nondust , opt_show_sat , & ld - > emergency_sat ,
2023-06-29 02:14:09 +02:00
" Amount to leave in wallet for spending anchor closes " ) ;
2023-06-01 08:42:37 +02:00
clnopt_witharg ( " --subdaemon " ,
OPT_MULTI ,
opt_subdaemon , NULL ,
ld , " Arg specified as SUBDAEMON:PATH. "
" Specifies an alternate subdaemon binary. "
" If the supplied path is relative the subdaemon "
" binary is found in the working directory. "
" This option may be specified multiple times. "
" For example, "
" --subdaemon=hsmd:remote_signer "
" would use a hypothetical remote signing subdaemon. " ) ;
2020-02-04 01:14:13 +01:00
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --experimental-websocket-port " , OPT_SHOWINT ,
opt_set_websocket_port , NULL ,
ld , opt_hidden ) ;
2023-05-22 02:51:44 +02:00
opt_register_noarg ( " --experimental-upgrade-protocol " ,
opt_set_bool , & ld - > experimental_upgrade_protocol ,
" experimental: allow channel types to be upgraded on reconnect " ) ;
2023-06-02 04:36:04 +02:00
clnopt_witharg ( " --database-upgrade " , OPT_SHOWBOOL ,
opt_set_db_upgrade , NULL ,
ld ,
" Set to true to allow database upgrades even on non-final releases (WARNING: you won't be able to downgrade!) " ) ;
2018-01-29 01:30:15 +01:00
opt_register_logging ( ld ) ;
2017-01-04 03:52:29 +01:00
2017-10-24 04:06:14 +02:00
# if DEVELOPER
2017-08-28 18:09:01 +02:00
dev_register_opts ( ld ) ;
2017-10-24 04:06:14 +02:00
# endif
2017-02-24 06:52:56 +01:00
}
2019-11-23 02:46:57 +01:00
/* We are in ld->config_netdir when this is run! */
static void promote_missing_files ( struct lightningd * ld )
{
# ifdef COMPAT_V073
DIR * d_from ;
struct dirent * d ;
struct stat st ;
/* If hsm_secret already exists, we assume we're ugpraded */
if ( stat ( " hsm_secret " , & st ) = = 0 )
return ;
if ( errno ! = ENOENT )
err ( 1 , " Looking for hsm_secret in lightning dir " ) ;
/* If hsm doesn't exist in basedir, we've nothing to upgrade. */
if ( stat ( path_join ( tmpctx , ld - > config_basedir , " hsm_secret " ) , & st ) ! = 0 )
return ;
d_from = opendir ( ld - > config_basedir ) ;
if ( ! d_from )
err ( 1 , " Opening %s " , ld - > config_basedir ) ;
while ( ( d = readdir ( d_from ) ) ! = NULL ) {
const char * fullname ;
2019-11-23 02:46:58 +01:00
/* Ignore this directory and upper one, and leave
* config and pid files */
2019-11-23 02:46:57 +01:00
if ( streq ( d - > d_name , " . " )
| | streq ( d - > d_name , " .. " )
2019-11-23 02:46:58 +01:00
| | streq ( d - > d_name , " config " )
| | strends ( d - > d_name , " .pid " ) )
2019-11-23 02:46:57 +01:00
continue ;
fullname = path_join ( tmpctx , ld - > config_basedir , d - > d_name ) ;
2020-01-28 04:06:51 +01:00
/* Simply remove rpc file: if they use --rpc-file to place it
* here explicitly it will get recreated , but moving it would
* be confusing as it would be unused . */
if ( streq ( d - > d_name , " lightning-rpc " ) ) {
if ( unlink ( fullname ) ! = 0 )
log_unusual ( ld - > log , " Could not unlink %s: %s " ,
fullname , strerror ( errno ) ) ;
continue ;
}
2019-11-23 02:46:57 +01:00
/* Ignore any directories. */
if ( lstat ( fullname , & st ) ! = 0 )
errx ( 1 , " Could not stat %s " , fullname ) ;
if ( ( st . st_mode & S_IFMT ) = = S_IFDIR )
continue ;
/* Check we don't overwrite something in this dir! */
if ( lstat ( d - > d_name , & st ) ! = - 1 )
errx ( 1 , " Refusing to overwrite %s into %s/ " ,
fullname , ld - > config_netdir ) ;
log_unusual ( ld - > log , " Moving %s into %s/ " ,
d - > d_name , ld - > config_netdir ) ;
if ( rename ( fullname , d - > d_name ) ! = 0 )
err ( 1 , " Could not move %s/%s to %s " ,
ld - > config_basedir , d - > d_name , ld - > config_netdir ) ;
}
closedir ( d_from ) ;
# endif /* COMPAT_V073 */
}
2017-10-23 07:05:28 +02:00
/* Names stolen from https://github.com/ternus/nsaproductgenerator/blob/master/nsa.js */
static const char * codename_adjective [ ]
= { " LOUD " , " RED " , " BLUE " , " GREEN " , " YELLOW " , " IRATE " , " ANGRY " , " PEEVED " ,
" HAPPY " , " SLIMY " , " SLEEPY " , " JUNIOR " , " SLICKER " , " UNITED " , " SOMBER " ,
" BIZARRE " , " ODD " , " WEIRD " , " WRONG " , " LATENT " , " CHILLY " , " STRANGE " , " LOUD " ,
" SILENT " , " HOPPING " , " ORANGE " , " VIOLET " , " VIOLENT " , " LIGHTNING " } ;
static const char * codename_noun [ ]
= { " WHISPER " , " FELONY " , " MOON " , " SUCKER " , " PENGUIN " , " WAFFLE " , " MAESTRO " ,
" NIGHT " , " TRINITY " , " DEITY " , " MONKEY " , " ARK " , " SQUIRREL " , " IRON " , " BOUNCE " ,
" FARM " , " CHEF " , " TROUGH " , " NET " , " TRAWL " , " GLEE " , " WATER " , " SPORK " , " PLOW " ,
" FEED " , " SOUFFLE " , " ROUTE " , " BAGEL " , " MONTANA " , " ANALYST " , " AUTO " , " WATCH " ,
" PHOTO " , " YARD " , " SOURCE " , " MONKEY " , " SEAGULL " , " TOLL " , " SPAWN " , " GOPHER " ,
" CHIPMUNK " , " SET " , " CALENDAR " , " ARTIST " , " CHASER " , " SCAN " , " TOTE " , " BEAM " ,
" ENTOURAGE " , " GENESIS " , " WALK " , " SPATULA " , " RAGE " , " FIRE " , " MASTER " } ;
void setup_color_and_alias ( struct lightningd * ld )
{
if ( ! ld - > rgb )
/* You can't get much red by default */
2019-04-08 11:58:32 +02:00
ld - > rgb = tal_dup_arr ( ld , u8 , ld - > id . k , 3 , 0 ) ;
2017-10-23 07:05:28 +02:00
if ( ! ld - > alias ) {
u64 adjective , noun ;
2018-02-22 11:00:33 +01:00
char * name ;
2017-10-23 07:05:28 +02:00
2019-04-08 11:58:32 +02:00
memcpy ( & adjective , ld - > id . k + 3 , sizeof ( adjective ) ) ;
memcpy ( & noun , ld - > id . k + 3 + sizeof ( adjective ) , sizeof ( noun ) ) ;
2017-10-23 07:05:28 +02:00
noun % = ARRAY_SIZE ( codename_noun ) ;
adjective % = ARRAY_SIZE ( codename_adjective ) ;
2018-02-22 11:00:33 +01:00
/* Only use 32 characters */
2018-09-29 08:34:01 +02:00
name = tal_fmt ( ld , " %s%s " ,
2018-02-22 11:00:33 +01:00
codename_adjective [ adjective ] ,
codename_noun [ noun ] ) ;
# if DEVELOPER
assert ( strlen ( name ) < 32 ) ;
2018-09-29 08:34:01 +02:00
int taillen = 31 - strlen ( name ) ;
2018-02-22 11:00:33 +01:00
if ( taillen > strlen ( version ( ) ) )
taillen = strlen ( version ( ) ) ;
/* Fit as much of end of version() as possible */
2018-09-29 08:34:01 +02:00
tal_append_fmt ( & name , " -%s " ,
2018-02-22 11:00:33 +01:00
version ( ) + strlen ( version ( ) ) - taillen ) ;
# endif
assert ( strlen ( name ) < = 32 ) ;
2017-11-24 14:43:31 +01:00
ld - > alias = tal_arrz ( ld , u8 , 33 ) ;
2018-02-22 11:00:33 +01:00
strcpy ( ( char * ) ld - > alias , name ) ;
tal_free ( name ) ;
2017-10-23 07:05:28 +02:00
}
}
2018-10-31 18:00:44 +01:00
void handle_early_opts ( struct lightningd * ld , int argc , char * argv [ ] )
2017-02-24 06:52:56 +01:00
{
2019-11-23 02:45:53 +01:00
/* Make ccan/opt use tal for allocations */
setup_option_allocators ( ) ;
/*~ List features immediately, before doing anything interesting */
2023-06-02 04:36:04 +02:00
clnopt_noarg ( " --list-features-only " , OPT_EARLY | OPT_EXITS ,
list_features_and_exit ,
ld , " List the features configured, and exit immediately " ) ;
2019-11-23 02:45:53 +01:00
/*~ This does enough parsing to get us the base configuration options */
2023-06-02 04:35:51 +02:00
ld - > configvars = initial_config_opts ( ld , & argc , argv , true ,
& ld - > config_filename ,
& ld - > config_basedir ,
& ld - > config_netdir ,
& ld - > rpc_filename ) ;
if ( argc ! = 1 )
errx ( 1 , " no arguments accepted " ) ;
2019-11-23 02:45:53 +01:00
/* Copy in default config, to be modified by further options */
if ( chainparams - > testnet )
ld - > config = testnet_config ;
else
ld - > config = mainnet_config ;
2019-07-25 08:37:58 +02:00
2022-12-21 11:41:04 +01:00
/* Set the ln_port given from chainparams */
ld - > config . ip_discovery_port = chainparams - > ln_port ;
2019-11-23 02:45:53 +01:00
/* Now we can initialize wallet_dsn */
ld - > wallet_dsn = tal_fmt ( ld , " sqlite3://%s/lightningd.sqlite3 " ,
2019-11-23 02:46:40 +01:00
ld - > config_netdir ) ;
2019-11-23 02:45:53 +01:00
2019-11-23 02:46:58 +01:00
/* Set default PID file name to be per-network (in base dir) */
ld - > pidfile = path_join ( ld , ld - > config_basedir ,
tal_fmt ( tmpctx , " lightningd-%s.pid " ,
chainparams - > network_name ) ) ;
2019-07-25 08:37:58 +02:00
2019-08-03 07:10:41 +02:00
/*~ Move into config dir: this eases path manipulation and also
* gives plugins a good place to store their stuff . */
2019-11-23 02:46:40 +01:00
if ( chdir ( ld - > config_netdir ) ! = 0 ) {
2021-10-17 13:27:20 +02:00
log_info ( ld - > log , " Creating configuration directory %s " ,
2019-11-23 02:46:40 +01:00
ld - > config_netdir ) ;
/* We assume home dir exists, so only create two. */
if ( mkdir ( ld - > config_basedir , 0700 ) ! = 0 & & errno ! = EEXIST )
2019-08-03 07:10:41 +02:00
fatal ( " Could not make directory %s: %s " ,
2019-11-23 02:46:40 +01:00
ld - > config_basedir ,
strerror ( errno ) ) ;
if ( mkdir ( ld - > config_netdir , 0700 ) ! = 0 )
fatal ( " Could not make directory %s: %s " ,
ld - > config_netdir , strerror ( errno ) ) ;
if ( chdir ( ld - > config_netdir ) ! = 0 )
2019-08-03 07:10:41 +02:00
fatal ( " Could not change directory %s: %s " ,
2019-11-23 02:46:40 +01:00
ld - > config_netdir , strerror ( errno ) ) ;
2019-08-03 07:10:41 +02:00
}
2019-11-23 02:46:57 +01:00
/*~ We move files from old locations on first upgrade. */
promote_missing_files ( ld ) ;
2019-07-25 08:37:58 +02:00
/*~ The ccan/opt code requires registration then parsing; we
* mimic this API here , even though they ' re on separate lines . */
register_opts ( ld ) ;
2023-06-02 04:35:51 +02:00
/* Now, first-pass of parsing. But only handle the early
2019-07-25 08:37:58 +02:00
* options ( testnet , plugins etc ) , others may be added on - demand */
2023-06-02 04:35:51 +02:00
parse_configvars_early ( ld - > configvars ) ;
2019-09-09 09:23:11 +02:00
2019-11-18 01:27:17 +01:00
/* Finalize the logging subsystem now. */
logging_options_parsed ( ld - > log_book ) ;
2018-10-31 18:00:44 +01:00
}
2018-10-13 06:09:49 +02:00
2023-06-02 04:35:51 +02:00
void handle_opts ( struct lightningd * ld )
2018-10-31 18:00:44 +01:00
{
2023-06-02 04:35:51 +02:00
/* Now we know all the options, finish parsing and finish
* populating ld - > configvars with cmdline . */
parse_configvars_final ( ld - > configvars , true ) ;
2018-11-20 04:46:08 +01:00
2021-08-18 12:52:21 +02:00
/* We keep a separate variable rather than overriding always_use_proxy,
2018-05-10 01:18:24 +02:00
* so listconfigs shows the correct thing . */
if ( tal_count ( ld - > proposed_wireaddr ) ! = 0
& & all_tor_addresses ( ld - > proposed_wireaddr ) ) {
ld - > pure_tor_setup = true ;
if ( ! ld - > proxyaddr )
log_info ( ld - > log , " Pure Tor setup with no --proxy: "
" you won't be able to make connections out " ) ;
}
2017-08-28 18:09:01 +02:00
check_config ( ld ) ;
2017-01-04 03:52:29 +01:00
}
2018-01-29 01:30:15 +01:00
2018-10-19 03:17:49 +02:00
static void json_add_opt_addrs ( struct json_stream * response ,
2018-05-07 06:28:12 +02:00
const char * name0 ,
2018-05-07 06:29:21 +02:00
const struct wireaddr_internal * wireaddrs ,
2018-05-07 06:28:12 +02:00
const enum addr_listen_announce * listen_announce ,
enum addr_listen_announce ala )
{
for ( size_t i = 0 ; i < tal_count ( wireaddrs ) ; i + + ) {
if ( listen_announce [ i ] ! = ala )
continue ;
json_add_string ( response ,
name0 ,
2018-05-07 06:29:21 +02:00
fmt_wireaddr_internal ( name0 , wireaddrs + i ) ) ;
2018-05-07 06:28:12 +02:00
}
}
2022-06-26 06:25:01 +02:00
static void json_add_opt_log_to_files ( struct json_stream * response ,
const char * name0 ,
const char * * logfiles )
{
for ( size_t i = 0 ; i < tal_count ( logfiles ) ; i + + )
json_add_string ( response , name0 , logfiles [ i ] ) ;
}
2020-02-04 01:14:13 +01:00
struct json_add_opt_alt_subdaemon_args {
const char * name0 ;
struct json_stream * response ;
} ;
static bool json_add_opt_alt_subdaemon ( const char * member ,
const char * value ,
struct json_add_opt_alt_subdaemon_args * argp )
{
json_add_string ( argp - > response ,
argp - > name0 ,
tal_fmt ( argp - > name0 , " %s:%s " , member , value ) ) ;
return true ;
}
static void json_add_opt_subdaemons ( struct json_stream * response ,
const char * name0 ,
alt_subdaemon_map * alt_subdaemons )
{
struct json_add_opt_alt_subdaemon_args args ;
args . name0 = name0 ;
args . response = response ;
strmap_iterate ( alt_subdaemons , json_add_opt_alt_subdaemon , & args ) ;
}
2023-06-02 04:36:04 +02:00
/* Canonicalize value they've given */
2023-06-02 04:36:04 +02:00
bool opt_canon_bool ( const char * val )
2023-06-02 04:36:04 +02:00
{
bool b ;
opt_set_bool_arg ( val , & b ) ;
return b ;
}
2023-06-05 16:17:21 +02:00
void add_config_deprecated ( struct lightningd * ld ,
struct json_stream * response ,
const struct opt_table * opt ,
const char * name , size_t len )
2018-01-29 01:30:15 +01:00
{
lightningd: fix memleak false positive.
json_listconfigs() returns in the middle; the name0 is not always freed.
It will be freed later with the response, but our memleak detection doesn't
know that, and Travis caught it:
Global errors:
E - Node /tmp/ltests-5mfrzh5v/test_hsmtool_secret_decryption_1/lightning-1/ has memory leaks: [
E {
E "backtrace": [
E "ccan/ccan/tal/tal.c:437 (tal_alloc_)",
E "ccan/ccan/tal/tal.c:466 (tal_alloc_arr_)",
E "ccan/ccan/tal/tal.c:794 (tal_dup_)",
E "ccan/ccan/tal/str/str.c:32 (tal_strndup_)",
E "lightningd/options.c:1122 (add_config)",
E "lightningd/options.c:1282 (json_listconfigs)",
E "lightningd/jsonrpc.c:588 (command_exec)",
E "lightningd/jsonrpc.c:679 (rpc_command_hook_callback)",
E "lightningd/plugin_hook.c:123 (plugin_hook_call_)",
E "lightningd/jsonrpc.c:729 (plugin_hook_call_rpc_command)",
E "lightningd/jsonrpc.c:736 (call_rpc_command_hook)",
E "common/timeout.c:39 (timer_expired)",
E "lightningd/io_loop_with_timers.c:32 (io_loop_with_timers)",
E "lightningd/lightningd.c:871 (main)"
E ],
E "label": "lightningd/options.c:1122:char[]",
E "parents": [
E "lightningd/json_stream.c:49:struct json_stream",
E "ccan/ccan/io/io.c:91:struct io_conn",
E "lightningd/lightningd.c:104:struct lightningd"
E ],
E "value": "0x5569ada057a8"
E }
E ]
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2020-01-28 04:53:07 +01:00
char * name0 = tal_strndup ( tmpctx , name , len ) ;
2022-09-21 06:09:51 +02:00
char * answer = NULL ;
2023-06-01 06:16:21 +02:00
char buf [ 4096 + sizeof ( " ... " ) ] ;
2018-01-29 01:30:15 +01:00
2023-06-01 08:42:49 +02:00
/* Ignore dev settings. */
if ( opt - > type & OPT_DEV )
2021-06-16 03:11:17 +02:00
return ;
2023-06-02 04:36:04 +02:00
/* Ignore things which just exit */
if ( opt - > type & OPT_EXITS )
return ;
/* Ignore hidden options (deprecated) */
if ( opt - > desc = = opt_hidden )
return ;
2023-06-02 04:36:04 +02:00
/* We print plugin options under plugins[] or important-plugins[] */
if ( is_plugin_opt ( opt ) )
return ;
2018-01-29 01:30:15 +01:00
if ( opt - > type & OPT_NOARG ) {
2023-06-02 04:36:04 +02:00
if ( opt - > cb = = ( void * ) opt_clear_plugins ) {
/* FIXME: we can't recover this. */
} else if ( is_restricted_ignored ( opt - > cb ) ) {
/* --testnet etc, turned into --network=. */
2018-01-29 01:30:15 +01:00
} else if ( opt - > cb = = ( void * ) opt_set_bool ) {
const bool * b = opt - > u . carg ;
2021-06-16 03:11:17 +02:00
json_add_bool ( response , name0 , * b ) ;
2018-05-07 05:44:40 +02:00
} else if ( opt - > cb = = ( void * ) opt_set_invbool ) {
const bool * b = opt - > u . carg ;
2021-06-16 03:11:17 +02:00
json_add_bool ( response , name0 , ! * b ) ;
2018-05-07 05:44:40 +02:00
} else if ( opt - > cb = = ( void * ) opt_set_offline ) {
2021-06-16 03:11:17 +02:00
json_add_bool ( response , name0 ,
! ld - > reconnect & & ! ld - > listen ) ;
2019-08-01 08:20:43 +02:00
} else if ( opt - > cb = = ( void * ) opt_start_daemon ) {
2021-06-16 03:11:17 +02:00
json_add_bool ( response , name0 ,
ld - > daemon_parent_fd ! = - 1 ) ;
2019-10-03 16:32:38 +02:00
} else if ( opt - > cb = = ( void * ) opt_set_hsm_password ) {
json_add_bool ( response , " encrypted-hsm " , ld - > encrypted_hsm ) ;
2020-04-03 02:03:58 +02:00
} else if ( opt - > cb = = ( void * ) opt_set_wumbo ) {
2020-09-08 07:20:15 +02:00
json_add_bool ( response , name0 ,
2020-04-03 02:03:59 +02:00
feature_offered ( ld - > our_features
- > bits [ INIT_FEATURE ] ,
2020-04-03 02:03:58 +02:00
OPT_LARGE_CHANNELS ) ) ;
2020-12-10 01:10:17 +01:00
} else if ( opt - > cb = = ( void * ) opt_set_dual_fund ) {
json_add_bool ( response , name0 ,
feature_offered ( ld - > our_features
- > bits [ INIT_FEATURE ] ,
OPT_DUAL_FUND ) ) ;
2023-07-27 23:37:52 +02:00
} else if ( opt - > cb = = ( void * ) opt_set_splicing ) {
json_add_bool ( response , name0 ,
feature_offered ( ld - > our_features
- > bits [ INIT_FEATURE ] ,
2023-08-10 02:20:29 +02:00
OPT_EXPERIMENTAL_SPLICE ) ) ;
2021-01-13 04:00:20 +01:00
} else if ( opt - > cb = = ( void * ) opt_set_onion_messages ) {
json_add_bool ( response , name0 ,
feature_offered ( ld - > our_features
- > bits [ INIT_FEATURE ] ,
OPT_ONION_MESSAGES ) ) ;
2021-01-13 09:58:38 +01:00
} else if ( opt - > cb = = ( void * ) opt_set_offers ) {
json_add_bool ( response , name0 , ld - > config . exp_offers ) ;
2021-03-15 04:39:44 +01:00
} else if ( opt - > cb = = ( void * ) opt_set_shutdown_wrong_funding ) {
json_add_bool ( response , name0 ,
feature_offered ( ld - > our_features
- > bits [ INIT_FEATURE ] ,
OPT_SHUTDOWN_WRONG_FUNDING ) ) ;
2023-02-05 04:44:00 +01:00
} else if ( opt - > cb = = ( void * ) opt_set_peer_storage ) {
json_add_bool ( response , name0 ,
feature_offered ( ld - > our_features
- > bits [ INIT_FEATURE ] ,
OPT_PROVIDE_PEER_BACKUP_STORAGE ) ) ;
2023-05-22 02:51:44 +02:00
} else if ( opt - > cb = = ( void * ) opt_set_quiesce ) {
json_add_bool ( response , name0 ,
feature_offered ( ld - > our_features
- > bits [ INIT_FEATURE ] ,
OPT_QUIESCE ) ) ;
2018-01-29 01:30:15 +01:00
}
2023-06-26 00:57:21 +02:00
/* We ignore future additions, since these are deprecated anyway! */
2018-01-29 01:30:15 +01:00
} else if ( opt - > type & OPT_HASARG ) {
2023-06-02 04:36:04 +02:00
if ( opt - > show = = ( void * ) opt_show_charp ) {
2023-06-01 08:42:30 +02:00
if ( * ( char * * ) opt - > u . carg )
/* Don't truncate or quote! */
answer = tal_strdup ( tmpctx ,
* ( char * * ) opt - > u . carg ) ;
2018-05-17 06:46:22 +02:00
} else if ( opt - > show ) {
2023-06-01 06:16:21 +02:00
strcpy ( buf + sizeof ( buf ) - sizeof ( " ... " ) , " ... " ) ;
if ( ! opt - > show ( buf , sizeof ( buf ) - sizeof ( " ... " ) , opt - > u . carg ) )
buf [ 0 ] = ' \0 ' ;
2018-01-29 01:30:15 +01:00
2023-06-02 04:36:04 +02:00
if ( ( opt - > type & OPT_SHOWINT )
| | ( opt - > type & OPT_SHOWMSATS ) ) {
if ( streq ( buf , " " )
| | strspn ( buf , " -0123456789. " ) ! = strlen ( buf ) )
errx ( 1 , " Bad literal for %s: %s " , name0 , buf ) ;
2022-07-04 05:52:35 +02:00
json_add_primitive ( response , name0 , buf ) ;
2018-01-29 01:30:15 +01:00
return ;
2023-06-02 04:36:04 +02:00
} else if ( opt - > type & OPT_SHOWBOOL ) {
/* We allow variants here. Json-ize */
2023-06-02 04:36:04 +02:00
json_add_bool ( response , name0 , opt_canon_bool ( buf ) ) ;
2023-06-02 04:36:04 +02:00
return ;
2018-01-29 01:30:15 +01:00
}
2023-02-06 09:35:36 +01:00
answer = buf ;
2018-01-29 01:30:15 +01:00
} else if ( opt - > cb_arg = = ( void * ) opt_set_talstr
2023-06-01 08:42:30 +02:00
| | opt - > cb_arg = = ( void * ) opt_set_charp ) {
2018-01-29 01:30:15 +01:00
const char * arg = * ( char * * ) opt - > u . carg ;
if ( arg )
answer = tal_fmt ( name0 , " %s " , arg ) ;
} else if ( opt - > cb_arg = = ( void * ) arg_log_to_file ) {
2022-06-26 06:25:01 +02:00
if ( ld - > logfiles )
json_add_opt_log_to_files ( response , name0 , ld - > logfiles ) ;
2018-05-07 05:53:21 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_add_addr ) {
2018-05-07 06:28:12 +02:00
json_add_opt_addrs ( response , name0 ,
2018-05-07 06:29:22 +02:00
ld - > proposed_wireaddr ,
ld - > proposed_listen_announce ,
2018-05-07 06:28:12 +02:00
ADDR_LISTEN_AND_ANNOUNCE ) ;
return ;
} else if ( opt - > cb_arg = = ( void * ) opt_add_bind_addr ) {
json_add_opt_addrs ( response , name0 ,
2018-05-07 06:29:22 +02:00
ld - > proposed_wireaddr ,
ld - > proposed_listen_announce ,
2018-05-07 06:28:12 +02:00
ADDR_LISTEN ) ;
return ;
} else if ( opt - > cb_arg = = ( void * ) opt_add_announce_addr ) {
json_add_opt_addrs ( response , name0 ,
2018-05-07 06:29:22 +02:00
ld - > proposed_wireaddr ,
ld - > proposed_listen_announce ,
2018-05-07 06:28:12 +02:00
ADDR_ANNOUNCE ) ;
2018-01-29 01:30:15 +01:00
return ;
2020-02-04 01:14:13 +01:00
} else if ( opt - > cb_arg = = ( void * ) opt_subdaemon ) {
json_add_opt_subdaemons ( response , name0 ,
& ld - > alt_subdaemons ) ;
return ;
2018-05-10 01:18:24 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_add_proxy_addr ) {
if ( ld - > proxyaddr )
answer = fmt_wireaddr ( name0 , ld - > proxyaddr ) ;
2018-09-20 13:46:50 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_add_plugin ) {
2018-09-20 20:43:55 +02:00
json_add_opt_plugins ( response , ld - > plugins ) ;
2019-11-18 01:27:17 +01:00
} else if ( opt - > cb_arg = = ( void * ) opt_log_level ) {
2023-07-17 09:36:07 +02:00
json_add_opt_log_levels ( response , ld - > log_book ) ;
2020-05-05 03:15:34 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_disable_plugin ) {
json_add_opt_disable_plugins ( response , ld - > plugins ) ;
2021-07-08 04:47:03 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_force_feerates ) {
answer = fmt_force_feerates ( name0 , ld - > force_feerates ) ;
2021-10-18 02:13:33 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_set_websocket_port ) {
if ( ld - > websocket_port )
json_add_u32 ( response , name0 ,
ld - > websocket_port ) ;
return ;
2022-08-24 12:05:42 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_set_db_upgrade ) {
if ( ld - > db_upgrade_ok )
json_add_bool ( response , name0 ,
* ld - > db_upgrade_ok ) ;
return ;
2023-05-30 06:28:18 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_set_announce_dns ) {
json_add_bool ( response , name0 , ld - > announce_dns ) ;
return ;
2020-07-29 13:24:07 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_important_plugin ) {
/* Do nothing, this is already handled by
* opt_add_plugin . */
2023-06-02 04:36:04 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_add_plugin_dir ) {
2018-12-03 10:26:29 +01:00
/* FIXME: We actually treat it as if they specified
2018-12-04 04:04:14 +01:00
* - - plugin for each one , so ignore these */
2023-06-02 04:36:04 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_add_accept_htlc_tlv ) {
/* We ignore this: it's printed below: */
2021-06-17 11:52:50 +02:00
} else if ( opt - > cb_arg = = ( void * ) opt_set_accept_extra_tlv_types ) {
2022-09-21 06:09:51 +02:00
for ( size_t i = 0 ;
i < tal_count ( ld - > accept_extra_tlv_types ) ;
i + + ) {
if ( i = = 0 )
answer = tal_fmt ( name0 , " % " PRIu64 ,
ld - > accept_extra_tlv_types [ i ] ) ;
else
tal_append_fmt ( & answer , " ,% " PRIu64 ,
ld - > accept_extra_tlv_types [ i ] ) ;
}
2021-06-17 11:52:50 +02:00
# if DEVELOPER
} else if ( strstarts ( name , " dev- " ) ) {
/* Ignore dev settings */
# endif
2018-01-29 01:30:15 +01:00
}
2023-06-26 00:57:21 +02:00
/* We ignore future additions, since these are deprecated anyway! */
2018-01-29 01:30:15 +01:00
}
2018-03-26 02:08:15 +02:00
if ( answer ) {
2019-06-12 02:38:54 +02:00
struct json_escape * esc = json_escape ( NULL , answer ) ;
2018-03-26 02:08:15 +02:00
json_add_escaped_string ( response , name0 , take ( esc ) ) ;
}
2018-01-29 01:30:15 +01:00
}
2023-06-05 16:17:21 +02:00
bool is_known_opt_cb_arg ( char * ( * cb_arg ) ( const char * , void * ) )
{
return cb_arg = = ( void * ) opt_set_talstr
| | cb_arg = = ( void * ) opt_add_proxy_addr
| | cb_arg = = ( void * ) opt_force_feerates
| | cb_arg = = ( void * ) opt_set_accept_extra_tlv_types
| | cb_arg = = ( void * ) opt_set_websocket_port
| | cb_arg = = ( void * ) opt_add_plugin
| | cb_arg = = ( void * ) opt_add_plugin_dir
| | cb_arg = = ( void * ) opt_important_plugin
| | cb_arg = = ( void * ) opt_disable_plugin
| | cb_arg = = ( void * ) opt_add_addr
| | cb_arg = = ( void * ) opt_add_bind_addr
| | cb_arg = = ( void * ) opt_add_announce_addr
| | cb_arg = = ( void * ) opt_subdaemon
| | cb_arg = = ( void * ) opt_set_db_upgrade
| | cb_arg = = ( void * ) arg_log_to_file
| | cb_arg = = ( void * ) opt_add_accept_htlc_tlv
2023-07-31 01:33:33 +02:00
| | cb_arg = = ( void * ) opt_set_codex32
2023-06-02 04:36:04 +02:00
# if DEVELOPER
2023-06-05 16:17:21 +02:00
| | cb_arg = = ( void * ) opt_subd_dev_disconnect
| | cb_arg = = ( void * ) opt_force_featureset
| | cb_arg = = ( void * ) opt_force_privkey
| | cb_arg = = ( void * ) opt_force_bip32_seed
| | cb_arg = = ( void * ) opt_force_channel_secrets
| | cb_arg = = ( void * ) opt_force_tmp_channel_id
2023-06-02 04:36:04 +02:00
# endif
2023-06-05 16:17:21 +02:00
;
2018-01-29 01:30:15 +01:00
}