2020-03-13 17:05:28 +01:00
package lncfg
import (
2020-05-25 18:08:58 +02:00
"context"
2020-03-13 17:05:28 +01:00
"fmt"
2023-01-13 16:55:02 +02:00
"path/filepath"
2020-11-24 16:40:54 -08:00
"time"
2020-03-13 17:05:28 +01:00
2023-01-13 16:55:02 +02:00
"github.com/btcsuite/btclog"
2021-04-26 19:08:11 +02:00
"github.com/lightningnetwork/lnd/kvdb"
"github.com/lightningnetwork/lnd/kvdb/etcd"
2021-07-13 12:08:36 +02:00
"github.com/lightningnetwork/lnd/kvdb/postgres"
2022-12-15 18:15:48 +02:00
"github.com/lightningnetwork/lnd/kvdb/sqlbase"
2022-12-15 18:19:29 +02:00
"github.com/lightningnetwork/lnd/kvdb/sqlite"
2023-01-13 16:55:02 +02:00
"github.com/lightningnetwork/lnd/lnrpc"
2021-08-03 09:57:35 +02:00
"github.com/lightningnetwork/lnd/lnwallet/btcwallet"
2020-03-13 17:05:28 +01:00
)
const (
2022-09-30 14:17:15 +02:00
ChannelDBName = "channel.db"
MacaroonDBName = "macaroons.db"
DecayedLogDbName = "sphinxreplay.db"
TowerClientDBName = "wtclient.db"
TowerServerDBName = "watchtower.db"
WalletDBName = "wallet.db"
2021-08-03 09:57:28 +02:00
2022-12-15 18:19:29 +02:00
SqliteChannelDBName = "channel.sqlite"
SqliteChainDBName = "chain.sqlite"
SqliteNeutrinoDBName = "neutrino.sqlite"
SqliteTowerDBName = "watchtower.sqlite"
2020-11-24 16:40:54 -08:00
BoltBackend = "bolt"
EtcdBackend = "etcd"
2021-07-13 12:08:36 +02:00
PostgresBackend = "postgres"
2022-12-15 18:19:29 +02:00
SqliteBackend = "sqlite"
2020-11-24 16:40:54 -08:00
DefaultBatchCommitInterval = 500 * time . Millisecond
2021-08-03 09:57:28 +02:00
2021-11-17 09:45:45 +01:00
defaultPostgresMaxConnections = 50
2022-12-15 18:19:29 +02:00
defaultSqliteMaxConnections = 2
defaultSqliteBusyTimeout = 5 * time . Second
2021-11-17 09:45:45 +01:00
2021-08-03 09:57:28 +02:00
// NSChannelDB is the namespace name that we use for the combined graph
// and channel state DB.
NSChannelDB = "channeldb"
2021-08-03 09:57:30 +02:00
// NSMacaroonDB is the namespace name that we use for the macaroon DB.
NSMacaroonDB = "macaroondb"
2021-08-03 09:57:32 +02:00
// NSDecayedLogDB is the namespace name that we use for the sphinx
// replay a.k.a. decayed log DB.
NSDecayedLogDB = "decayedlogdb"
2021-08-03 09:57:33 +02:00
// NSTowerClientDB is the namespace name that we use for the watchtower
// client DB.
NSTowerClientDB = "towerclientdb"
// NSTowerServerDB is the namespace name that we use for the watchtower
// server DB.
NSTowerServerDB = "towerserverdb"
2021-08-03 09:57:36 +02:00
// NSWalletDB is the namespace name that we use for the wallet DB.
NSWalletDB = "walletdb"
2022-12-15 18:19:29 +02:00
// NSNeutrinoDB is the namespace name that we use for the neutrino DB.
NSNeutrinoDB = "neutrinodb"
2020-03-13 17:05:28 +01:00
)
// DB holds database configuration for LND.
2022-10-20 16:48:19 +08:00
//
2022-11-18 07:01:42 +08:00
//nolint:lll
2020-03-13 17:05:28 +01:00
type DB struct {
Backend string ` long:"backend" description:"The selected database backend." `
2020-11-24 16:40:54 -08:00
BatchCommitInterval time . Duration ` long:"batch-commit-interval" description:"The maximum duration the channel graph batch schedulers will wait before attempting to commit a batch of pending updates. This can be tradeoff database contenion for commit latency." `
2021-02-09 20:19:31 +01:00
Etcd * etcd . Config ` group:"etcd" namespace:"etcd" description:"Etcd settings." `
2020-03-13 17:05:28 +01:00
2020-05-15 16:59:37 +02:00
Bolt * kvdb . BoltConfig ` group:"bolt" namespace:"bolt" description:"Bolt settings." `
2021-07-13 12:08:36 +02:00
Postgres * postgres . Config ` group:"postgres" namespace:"postgres" description:"Postgres settings." `
2021-10-21 13:55:18 +02:00
2022-12-15 18:19:29 +02:00
Sqlite * sqlite . Config ` group:"sqlite" namespace:"sqlite" description:"Sqlite settings." `
2021-10-21 13:55:18 +02:00
NoGraphCache bool ` long:"no-graph-cache" description:"Don't use the in-memory graph cache for path finding. Much slower but uses less RAM. Can only be used with a bolt database backend." `
2022-04-28 06:53:46 +08:00
PruneRevocation bool ` long:"prune-revocation" description:"Run the optional migration that prunes the revocation logs to save disk space." `
2023-02-10 10:13:34 +02:00
NoRevLogAmtData bool ` long:"no-rev-log-amt-data" description:"If set, the to-local and to-remote output amounts of revoked commitment transactions will not be stored in the revocation log. Note that once this data is lost, a watchtower client will not be able to back up the revoked state." `
2020-03-13 17:05:28 +01:00
}
2021-08-03 09:57:22 +02:00
// DefaultDB creates and returns a new default DB config.
2020-03-13 17:05:28 +01:00
func DefaultDB ( ) * DB {
return & DB {
2020-11-24 16:40:54 -08:00
Backend : BoltBackend ,
BatchCommitInterval : DefaultBatchCommitInterval ,
2020-11-09 10:21:23 +01:00
Bolt : & kvdb . BoltConfig {
2021-07-15 21:42:05 +02:00
NoFreelistSync : true ,
2020-11-09 10:21:23 +01:00
AutoCompactMinAge : kvdb . DefaultBoltAutoCompactMinAge ,
kvdb: add timeout options for bbolt (#4787)
* mod: bump btcwallet version to accept db timeout
* btcwallet: add DBTimeOut in config
* kvdb: add database timeout option for bbolt
This commit adds a DBTimeout option in bbolt config. The relevant
functions walletdb.Open/Create are updated to use this config. In
addition, the bolt compacter also applies the new timeout option.
* channeldb: add DBTimeout in db options
This commit adds the DBTimeout option for channeldb. A new unit
test file is created to test the default options. In addition,
the params used in kvdb.Create inside channeldb_test is updated
with a DefaultDBTimeout value.
* contractcourt+routing: use DBTimeout in kvdb
This commit touches multiple test files in contractcourt and routing.
The call of function kvdb.Create and kvdb.Open are now updated with
the new param DBTimeout, using the default value kvdb.DefaultDBTimeout.
* lncfg: add DBTimeout option in db config
The DBTimeout option is added to db config. A new unit test is
added to check the default DB config is created as expected.
* migration: add DBTimeout param in kvdb.Create/kvdb.Open
* keychain: update tests to use DBTimeout param
* htlcswitch+chainreg: add DBTimeout option
* macaroons: support DBTimeout config in creation
This commit adds the DBTimeout during the creation of macaroons.db.
The usage of kvdb.Create and kvdb.Open in its tests are updated with
a timeout value using kvdb.DefaultDBTimeout.
* walletunlocker: add dbTimeout option in UnlockerService
This commit adds a new param, dbTimeout, during the creation of
UnlockerService. This param is then passed to wallet.NewLoader
inside various service calls, specifying a timeout value to be
used when opening the bbolt. In addition, the macaroonService
is also called with this dbTimeout param.
* watchtower/wtdb: add dbTimeout param during creation
This commit adds the dbTimeout param for the creation of both
watchtower.db and wtclient.db.
* multi: add db timeout param for walletdb.Create
This commit adds the db timeout param for the function call
walletdb.Create. It touches only the test files found in chainntnfs,
lnwallet, and routing.
* lnd: pass DBTimeout config to relevant services
This commit enables lnd to pass the DBTimeout config to the following
services/config/functions,
- chainControlConfig
- walletunlocker
- wallet.NewLoader
- macaroons
- watchtower
In addition, the usage of wallet.Create is updated too.
* sample-config: add dbtimeout option
2020-12-08 07:31:49 +08:00
DBTimeout : kvdb . DefaultDBTimeout ,
2020-11-09 10:21:23 +01:00
} ,
2021-12-02 20:55:05 +01:00
Etcd : & etcd . Config {
// Allow at most 32 MiB messages by default.
MaxMsgSize : 32768 * 1024 ,
} ,
2021-11-17 09:45:45 +01:00
Postgres : & postgres . Config {
MaxConnections : defaultPostgresMaxConnections ,
} ,
2022-12-15 18:19:29 +02:00
Sqlite : & sqlite . Config {
MaxConnections : defaultSqliteMaxConnections ,
BusyTimeout : defaultSqliteBusyTimeout ,
} ,
2020-03-13 17:05:28 +01:00
}
}
// Validate validates the DB config.
func ( db * DB ) Validate ( ) error {
switch db . Backend {
2022-12-15 18:19:29 +02:00
case BoltBackend , SqliteBackend :
2021-07-13 12:08:36 +02:00
case PostgresBackend :
if db . Postgres . Dsn == "" {
return fmt . Errorf ( "postgres dsn must be set" )
}
2020-03-13 17:05:28 +01:00
2020-08-04 15:34:29 -07:00
case EtcdBackend :
2020-06-18 21:42:59 +02:00
if ! db . Etcd . Embedded && db . Etcd . Host == "" {
2020-03-13 17:05:28 +01:00
return fmt . Errorf ( "etcd host must be set" )
}
default :
2022-12-15 18:19:29 +02:00
return fmt . Errorf ( "unknown backend, must be either '%v', " +
"'%v', '%v' or '%v'" , BoltBackend , EtcdBackend ,
PostgresBackend , SqliteBackend )
2021-10-21 13:55:18 +02:00
}
// The path finding uses a manual read transaction that's open for a
// potentially long time. That works fine with the locking model of
// bbolt but can lead to locks or rolled back transactions with etcd or
// postgres. And since we already have a smaller memory footprint for
// remote database setups (due to not needing to memory-map the bbolt DB
// files), we can keep the graph in memory instead. But for mobile
// devices the tradeoff between a smaller memory footprint and the
// longer time needed for path finding might be a desirable one.
if db . NoGraphCache && db . Backend != BoltBackend {
return fmt . Errorf ( "cannot use no-graph-cache with database " +
"backend '%v'" , db . Backend )
2020-03-13 17:05:28 +01:00
}
return nil
}
2021-02-09 17:44:43 +01:00
// Init should be called upon start to pre-initialize database access dependent
// on configuration.
func ( db * DB ) Init ( ctx context . Context , dbPath string ) error {
// Start embedded etcd server if requested.
2021-11-17 09:45:45 +01:00
switch {
case db . Backend == EtcdBackend && db . Etcd . Embedded :
2021-02-09 17:44:43 +01:00
cfg , _ , err := kvdb . StartEtcdTestBackend (
dbPath , db . Etcd . EmbeddedClientPort ,
2021-09-08 15:10:11 +02:00
db . Etcd . EmbeddedPeerPort , db . Etcd . EmbeddedLogFile ,
2021-02-09 17:44:43 +01:00
)
if err != nil {
return err
}
// Override the original config with the config for
// the embedded instance.
db . Etcd = cfg
2021-11-17 09:45:45 +01:00
case db . Backend == PostgresBackend :
2022-12-15 18:15:48 +02:00
sqlbase . Init ( db . Postgres . MaxConnections )
2022-12-15 18:19:29 +02:00
case db . Backend == SqliteBackend :
sqlbase . Init ( db . Sqlite . MaxConnections )
2021-02-09 17:44:43 +01:00
}
return nil
}
2020-05-06 20:48:05 -07:00
// DatabaseBackends is a two-tuple that holds the set of active database
2021-08-03 09:57:26 +02:00
// backends for the daemon. The two backends we expose are the graph database
// backend, and the channel state backend.
2020-05-06 20:48:05 -07:00
type DatabaseBackends struct {
2021-08-03 09:57:26 +02:00
// GraphDB points to the database backend that contains the less
// critical data that is accessed often, such as the channel graph and
// chain height hints.
GraphDB kvdb . Backend
// ChanStateDB points to a possibly networked replicated backend that
// contains the critical channel state related data.
ChanStateDB kvdb . Backend
2021-08-03 09:57:27 +02:00
// HeightHintDB points to a possibly networked replicated backend that
// contains the chain height hint related data.
HeightHintDB kvdb . Backend
2021-08-03 09:57:28 +02:00
2021-08-03 09:57:30 +02:00
// MacaroonDB points to a database backend that stores the macaroon root
// keys.
MacaroonDB kvdb . Backend
2021-08-03 09:57:32 +02:00
// DecayedLogDB points to a database backend that stores the decayed log
// data.
DecayedLogDB kvdb . Backend
2021-08-03 09:57:33 +02:00
// TowerClientDB points to a database backend that stores the watchtower
// client data. This might be nil if the watchtower client is disabled.
TowerClientDB kvdb . Backend
// TowerServerDB points to a database backend that stores the watchtower
// server data. This might be nil if the watchtower server is disabled.
TowerServerDB kvdb . Backend
2021-08-03 09:57:35 +02:00
// WalletDB is an option that instructs the wallet loader where to load
// the underlying wallet database from.
WalletDB btcwallet . LoaderOption
2021-08-03 09:57:28 +02:00
// Remote indicates whether the database backends are remote, possibly
2022-12-15 18:19:29 +02:00
// replicated instances or local bbolt or sqlite backed databases.
2021-08-03 09:57:28 +02:00
Remote bool
// CloseFuncs is a map of close functions for each of the initialized
// DB backends keyed by their namespace name.
CloseFuncs map [ string ] func ( ) error
2020-05-06 20:48:05 -07:00
}
2021-08-03 09:57:26 +02:00
// GetBackends returns a set of kvdb.Backends as set in the DB config.
2021-08-03 09:57:30 +02:00
func ( db * DB ) GetBackends ( ctx context . Context , chanDBPath ,
2021-08-03 09:57:33 +02:00
walletDBPath , towerServerDBPath string , towerClientEnabled ,
2023-01-13 16:55:02 +02:00
towerServerEnabled bool , logger btclog . Logger ) ( * DatabaseBackends ,
error ) {
2020-05-06 20:48:05 -07:00
2021-08-03 09:57:28 +02:00
// We keep track of all the kvdb backends we actually open and return a
// reference to their close function so they can be cleaned up properly
// on error or shutdown.
closeFuncs := make ( map [ string ] func ( ) error )
2020-05-20 14:04:34 +02:00
2021-08-03 09:57:30 +02:00
// If we need to return early because of an error, we invoke any close
// function that has been initialized so far.
returnEarly := true
defer func ( ) {
if ! returnEarly {
return
}
for _ , closeFunc := range closeFuncs {
_ = closeFunc ( )
}
} ( )
2021-07-13 12:08:36 +02:00
switch db . Backend {
case EtcdBackend :
2021-08-03 09:57:36 +02:00
// As long as the graph data, channel state and height hint
// cache are all still in the channel.db file in bolt, we
// replicate the same behavior here and use the same etcd
// backend for those three sub DBs. But we namespace it properly
// to make such a split even easier in the future. This will
// break lnd for users that ran on etcd with 0.13.x since that
// code used the root namespace. We assume that nobody used etcd
// for mainnet just yet since that feature was clearly marked as
// experimental in 0.13.x.
2021-08-03 09:57:28 +02:00
etcdBackend , err := kvdb . Open (
2021-08-03 09:57:36 +02:00
kvdb . EtcdBackendName , ctx ,
db . Etcd . CloneWithSubNamespace ( NSChannelDB ) ,
2021-02-09 17:44:43 +01:00
)
2020-05-06 20:48:05 -07:00
if err != nil {
2024-02-26 11:19:38 +00:00
return nil , fmt . Errorf ( "error opening etcd DB: %w" , err )
2020-05-06 20:48:05 -07:00
}
2021-08-03 09:57:28 +02:00
closeFuncs [ NSChannelDB ] = etcdBackend . Close
2021-08-03 09:57:36 +02:00
etcdMacaroonBackend , err := kvdb . Open (
kvdb . EtcdBackendName , ctx ,
db . Etcd . CloneWithSubNamespace ( NSMacaroonDB ) ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening etcd macaroon " +
"DB: %v" , err )
}
closeFuncs [ NSMacaroonDB ] = etcdMacaroonBackend . Close
etcdDecayedLogBackend , err := kvdb . Open (
kvdb . EtcdBackendName , ctx ,
db . Etcd . CloneWithSubNamespace ( NSDecayedLogDB ) ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening etcd decayed " +
"log DB: %v" , err )
}
closeFuncs [ NSDecayedLogDB ] = etcdDecayedLogBackend . Close
etcdTowerClientBackend , err := kvdb . Open (
kvdb . EtcdBackendName , ctx ,
db . Etcd . CloneWithSubNamespace ( NSTowerClientDB ) ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening etcd tower " +
"client DB: %v" , err )
}
closeFuncs [ NSTowerClientDB ] = etcdTowerClientBackend . Close
etcdTowerServerBackend , err := kvdb . Open (
kvdb . EtcdBackendName , ctx ,
db . Etcd . CloneWithSubNamespace ( NSTowerServerDB ) ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening etcd tower " +
"server DB: %v" , err )
}
closeFuncs [ NSTowerServerDB ] = etcdTowerServerBackend . Close
etcdWalletBackend , err := kvdb . Open (
kvdb . EtcdBackendName , ctx ,
db . Etcd .
CloneWithSubNamespace ( NSWalletDB ) .
CloneWithSingleWriter ( ) ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening etcd macaroon " +
"DB: %v" , err )
}
closeFuncs [ NSWalletDB ] = etcdWalletBackend . Close
2021-08-03 09:57:30 +02:00
returnEarly = false
2022-12-15 18:19:29 +02:00
2021-08-03 09:57:28 +02:00
return & DatabaseBackends {
2021-08-03 09:57:33 +02:00
GraphDB : etcdBackend ,
ChanStateDB : etcdBackend ,
HeightHintDB : etcdBackend ,
2021-08-03 09:57:36 +02:00
MacaroonDB : etcdMacaroonBackend ,
DecayedLogDB : etcdDecayedLogBackend ,
TowerClientDB : etcdTowerClientBackend ,
TowerServerDB : etcdTowerServerBackend ,
2021-08-03 09:57:35 +02:00
// The wallet loader will attempt to use/create the
// wallet in the replicated remote DB if we're running
// in a clustered environment. This will ensure that all
// members of the cluster have access to the same wallet
// state.
WalletDB : btcwallet . LoaderWithExternalWalletDB (
2021-08-03 09:57:36 +02:00
etcdWalletBackend ,
2021-08-03 09:57:35 +02:00
) ,
Remote : true ,
CloseFuncs : closeFuncs ,
2021-08-03 09:57:28 +02:00
} , nil
2021-07-13 12:08:36 +02:00
case PostgresBackend :
postgresBackend , err := kvdb . Open (
kvdb . PostgresBackendName , ctx ,
db . Postgres , NSChannelDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening postgres graph " +
"DB: %v" , err )
}
closeFuncs [ NSChannelDB ] = postgresBackend . Close
postgresMacaroonBackend , err := kvdb . Open (
kvdb . PostgresBackendName , ctx ,
db . Postgres , NSMacaroonDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening postgres " +
"macaroon DB: %v" , err )
}
closeFuncs [ NSMacaroonDB ] = postgresMacaroonBackend . Close
postgresDecayedLogBackend , err := kvdb . Open (
kvdb . PostgresBackendName , ctx ,
db . Postgres , NSDecayedLogDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening postgres " +
"decayed log DB: %v" , err )
}
closeFuncs [ NSDecayedLogDB ] = postgresDecayedLogBackend . Close
postgresTowerClientBackend , err := kvdb . Open (
kvdb . PostgresBackendName , ctx ,
db . Postgres , NSTowerClientDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening postgres tower " +
"client DB: %v" , err )
}
closeFuncs [ NSTowerClientDB ] = postgresTowerClientBackend . Close
postgresTowerServerBackend , err := kvdb . Open (
kvdb . PostgresBackendName , ctx ,
db . Postgres , NSTowerServerDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening postgres tower " +
"server DB: %v" , err )
}
closeFuncs [ NSTowerServerDB ] = postgresTowerServerBackend . Close
postgresWalletBackend , err := kvdb . Open (
kvdb . PostgresBackendName , ctx ,
db . Postgres , NSWalletDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening postgres macaroon " +
"DB: %v" , err )
}
closeFuncs [ NSWalletDB ] = postgresWalletBackend . Close
2023-01-13 16:55:02 +02:00
// Warn if the user is trying to switch over to a Postgres DB
// while there is a wallet or channel bbolt DB still present.
warnExistingBoltDBs (
logger , "postgres" , walletDBPath , WalletDBName ,
)
warnExistingBoltDBs (
logger , "postgres" , chanDBPath , ChannelDBName ,
)
2021-07-13 12:08:36 +02:00
returnEarly = false
2022-12-15 18:19:29 +02:00
2021-07-13 12:08:36 +02:00
return & DatabaseBackends {
GraphDB : postgresBackend ,
ChanStateDB : postgresBackend ,
HeightHintDB : postgresBackend ,
MacaroonDB : postgresMacaroonBackend ,
DecayedLogDB : postgresDecayedLogBackend ,
TowerClientDB : postgresTowerClientBackend ,
TowerServerDB : postgresTowerServerBackend ,
// The wallet loader will attempt to use/create the
// wallet in the replicated remote DB if we're running
// in a clustered environment. This will ensure that all
// members of the cluster have access to the same wallet
// state.
WalletDB : btcwallet . LoaderWithExternalWalletDB (
postgresWalletBackend ,
) ,
Remote : true ,
CloseFuncs : closeFuncs ,
} , nil
2022-12-15 18:19:29 +02:00
case SqliteBackend :
// Note that for sqlite, we put kv tables for the channel.db,
// wtclient.db and sphinxreplay.db all in the channel.sqlite db.
// The tables for wallet.db and macaroon.db are in the
// chain.sqlite db and watchtower.db tables are in the
// watchtower.sqlite db. The reason for the multiple sqlite dbs
// is twofold. The first reason is that it maintains the file
// structure that users are used to. The second reason is the
// fact that sqlite only supports one writer at a time which
// would cause deadlocks in the code due to the wallet db often
// being accessed during a write to another db.
sqliteBackend , err := kvdb . Open (
kvdb . SqliteBackendName , ctx , db . Sqlite , chanDBPath ,
SqliteChannelDBName , NSChannelDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening sqlite graph " +
"DB: %v" , err )
}
closeFuncs [ NSChannelDB ] = sqliteBackend . Close
sqliteMacaroonBackend , err := kvdb . Open (
kvdb . SqliteBackendName , ctx , db . Sqlite , walletDBPath ,
SqliteChainDBName , NSMacaroonDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening sqlite " +
"macaroon DB: %v" , err )
}
closeFuncs [ NSMacaroonDB ] = sqliteMacaroonBackend . Close
sqliteDecayedLogBackend , err := kvdb . Open (
kvdb . SqliteBackendName , ctx , db . Sqlite , chanDBPath ,
SqliteChannelDBName , NSDecayedLogDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening sqlite decayed " +
"log DB: %v" , err )
}
closeFuncs [ NSDecayedLogDB ] = sqliteDecayedLogBackend . Close
sqliteTowerClientBackend , err := kvdb . Open (
kvdb . SqliteBackendName , ctx , db . Sqlite , chanDBPath ,
SqliteChannelDBName , NSTowerClientDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening sqlite tower " +
"client DB: %v" , err )
}
closeFuncs [ NSTowerClientDB ] = sqliteTowerClientBackend . Close
sqliteTowerServerBackend , err := kvdb . Open (
kvdb . SqliteBackendName , ctx , db . Sqlite ,
towerServerDBPath , SqliteTowerDBName , NSTowerServerDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening sqlite tower " +
"server DB: %v" , err )
}
closeFuncs [ NSTowerServerDB ] = sqliteTowerServerBackend . Close
sqliteWalletBackend , err := kvdb . Open (
kvdb . SqliteBackendName , ctx , db . Sqlite , walletDBPath ,
SqliteChainDBName , NSWalletDB ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening sqlite macaroon " +
"DB: %v" , err )
}
closeFuncs [ NSWalletDB ] = sqliteWalletBackend . Close
2023-01-13 16:55:02 +02:00
// Warn if the user is trying to switch over to a sqlite DB
// while there is a wallet or channel bbolt DB still present.
warnExistingBoltDBs (
logger , "sqlite" , walletDBPath , WalletDBName ,
)
warnExistingBoltDBs (
logger , "sqlite" , chanDBPath , ChannelDBName ,
)
2022-12-15 18:19:29 +02:00
returnEarly = false
return & DatabaseBackends {
GraphDB : sqliteBackend ,
ChanStateDB : sqliteBackend ,
HeightHintDB : sqliteBackend ,
MacaroonDB : sqliteMacaroonBackend ,
DecayedLogDB : sqliteDecayedLogBackend ,
TowerClientDB : sqliteTowerClientBackend ,
TowerServerDB : sqliteTowerServerBackend ,
// The wallet loader will attempt to use/create the
// wallet in the replicated remote DB if we're running
// in a clustered environment. This will ensure that all
// members of the cluster have access to the same wallet
// state.
WalletDB : btcwallet . LoaderWithExternalWalletDB (
sqliteWalletBackend ,
) ,
CloseFuncs : closeFuncs ,
} , nil
2020-05-06 20:48:05 -07:00
}
2021-08-03 09:57:28 +02:00
// We're using all bbolt based databases by default.
boltBackend , err := kvdb . GetBoltBackend ( & kvdb . BoltBackendConfig {
2021-08-03 09:57:30 +02:00
DBPath : chanDBPath ,
2022-09-30 14:17:15 +02:00
DBFileName : ChannelDBName ,
kvdb: add timeout options for bbolt (#4787)
* mod: bump btcwallet version to accept db timeout
* btcwallet: add DBTimeOut in config
* kvdb: add database timeout option for bbolt
This commit adds a DBTimeout option in bbolt config. The relevant
functions walletdb.Open/Create are updated to use this config. In
addition, the bolt compacter also applies the new timeout option.
* channeldb: add DBTimeout in db options
This commit adds the DBTimeout option for channeldb. A new unit
test file is created to test the default options. In addition,
the params used in kvdb.Create inside channeldb_test is updated
with a DefaultDBTimeout value.
* contractcourt+routing: use DBTimeout in kvdb
This commit touches multiple test files in contractcourt and routing.
The call of function kvdb.Create and kvdb.Open are now updated with
the new param DBTimeout, using the default value kvdb.DefaultDBTimeout.
* lncfg: add DBTimeout option in db config
The DBTimeout option is added to db config. A new unit test is
added to check the default DB config is created as expected.
* migration: add DBTimeout param in kvdb.Create/kvdb.Open
* keychain: update tests to use DBTimeout param
* htlcswitch+chainreg: add DBTimeout option
* macaroons: support DBTimeout config in creation
This commit adds the DBTimeout during the creation of macaroons.db.
The usage of kvdb.Create and kvdb.Open in its tests are updated with
a timeout value using kvdb.DefaultDBTimeout.
* walletunlocker: add dbTimeout option in UnlockerService
This commit adds a new param, dbTimeout, during the creation of
UnlockerService. This param is then passed to wallet.NewLoader
inside various service calls, specifying a timeout value to be
used when opening the bbolt. In addition, the macaroonService
is also called with this dbTimeout param.
* watchtower/wtdb: add dbTimeout param during creation
This commit adds the dbTimeout param for the creation of both
watchtower.db and wtclient.db.
* multi: add db timeout param for walletdb.Create
This commit adds the db timeout param for the function call
walletdb.Create. It touches only the test files found in chainntnfs,
lnwallet, and routing.
* lnd: pass DBTimeout config to relevant services
This commit enables lnd to pass the DBTimeout config to the following
services/config/functions,
- chainControlConfig
- walletunlocker
- wallet.NewLoader
- macaroons
- watchtower
In addition, the usage of wallet.Create is updated too.
* sample-config: add dbtimeout option
2020-12-08 07:31:49 +08:00
DBTimeout : db . Bolt . DBTimeout ,
2021-07-15 21:42:05 +02:00
NoFreelistSync : db . Bolt . NoFreelistSync ,
2020-11-09 10:21:25 +01:00
AutoCompact : db . Bolt . AutoCompact ,
AutoCompactMinAge : db . Bolt . AutoCompactMinAge ,
} )
2020-05-06 20:48:05 -07:00
if err != nil {
2024-02-26 11:19:38 +00:00
return nil , fmt . Errorf ( "error opening bolt DB: %w" , err )
2020-03-13 17:05:28 +01:00
}
2021-08-03 09:57:28 +02:00
closeFuncs [ NSChannelDB ] = boltBackend . Close
2020-03-13 17:05:28 +01:00
2021-08-03 09:57:30 +02:00
macaroonBackend , err := kvdb . GetBoltBackend ( & kvdb . BoltBackendConfig {
DBPath : walletDBPath ,
2022-09-30 14:17:15 +02:00
DBFileName : MacaroonDBName ,
2021-08-03 09:57:30 +02:00
DBTimeout : db . Bolt . DBTimeout ,
2021-07-15 21:42:05 +02:00
NoFreelistSync : db . Bolt . NoFreelistSync ,
2021-08-03 09:57:30 +02:00
AutoCompact : db . Bolt . AutoCompact ,
AutoCompactMinAge : db . Bolt . AutoCompactMinAge ,
} )
if err != nil {
2024-02-26 11:19:38 +00:00
return nil , fmt . Errorf ( "error opening macaroon DB: %w" , err )
2021-08-03 09:57:30 +02:00
}
closeFuncs [ NSMacaroonDB ] = macaroonBackend . Close
2021-08-03 09:57:32 +02:00
decayedLogBackend , err := kvdb . GetBoltBackend ( & kvdb . BoltBackendConfig {
DBPath : chanDBPath ,
2022-09-30 14:17:15 +02:00
DBFileName : DecayedLogDbName ,
2021-08-03 09:57:32 +02:00
DBTimeout : db . Bolt . DBTimeout ,
2021-07-15 21:42:05 +02:00
NoFreelistSync : db . Bolt . NoFreelistSync ,
2021-08-03 09:57:32 +02:00
AutoCompact : db . Bolt . AutoCompact ,
AutoCompactMinAge : db . Bolt . AutoCompactMinAge ,
} )
if err != nil {
2024-02-26 11:19:38 +00:00
return nil , fmt . Errorf ( "error opening decayed log DB: %w" , err )
2021-08-03 09:57:32 +02:00
}
closeFuncs [ NSDecayedLogDB ] = decayedLogBackend . Close
2021-08-03 09:57:33 +02:00
// The tower client is optional and might not be enabled by the user. We
// handle it being nil properly in the main server.
var towerClientBackend kvdb . Backend
if towerClientEnabled {
towerClientBackend , err = kvdb . GetBoltBackend (
& kvdb . BoltBackendConfig {
DBPath : chanDBPath ,
2022-09-30 14:17:15 +02:00
DBFileName : TowerClientDBName ,
2021-08-03 09:57:33 +02:00
DBTimeout : db . Bolt . DBTimeout ,
2021-07-15 21:42:05 +02:00
NoFreelistSync : db . Bolt . NoFreelistSync ,
2021-08-03 09:57:33 +02:00
AutoCompact : db . Bolt . AutoCompact ,
AutoCompactMinAge : db . Bolt . AutoCompactMinAge ,
} ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening tower client " +
"DB: %v" , err )
}
closeFuncs [ NSTowerClientDB ] = towerClientBackend . Close
}
// The tower server is optional and might not be enabled by the user. We
// handle it being nil properly in the main server.
var towerServerBackend kvdb . Backend
if towerServerEnabled {
towerServerBackend , err = kvdb . GetBoltBackend (
& kvdb . BoltBackendConfig {
DBPath : towerServerDBPath ,
2022-09-30 14:17:15 +02:00
DBFileName : TowerServerDBName ,
2021-08-03 09:57:33 +02:00
DBTimeout : db . Bolt . DBTimeout ,
2021-07-15 21:42:05 +02:00
NoFreelistSync : db . Bolt . NoFreelistSync ,
2021-08-03 09:57:33 +02:00
AutoCompact : db . Bolt . AutoCompact ,
AutoCompactMinAge : db . Bolt . AutoCompactMinAge ,
} ,
)
if err != nil {
return nil , fmt . Errorf ( "error opening tower server " +
"DB: %v" , err )
}
closeFuncs [ NSTowerServerDB ] = towerServerBackend . Close
}
2021-08-03 09:57:30 +02:00
returnEarly = false
2022-12-15 18:19:29 +02:00
2020-05-06 20:48:05 -07:00
return & DatabaseBackends {
2021-08-03 09:57:33 +02:00
GraphDB : boltBackend ,
ChanStateDB : boltBackend ,
HeightHintDB : boltBackend ,
MacaroonDB : macaroonBackend ,
DecayedLogDB : decayedLogBackend ,
TowerClientDB : towerClientBackend ,
TowerServerDB : towerServerBackend ,
2021-08-03 09:57:35 +02:00
// When "running locally", LND will use the bbolt wallet.db to
// store the wallet located in the chain data dir, parametrized
2021-08-03 09:57:36 +02:00
// by the active network. The wallet loader has its own cleanup
// method so we don't need to add anything to our map (in fact
// nothing is opened just yet).
2021-08-03 09:57:35 +02:00
WalletDB : btcwallet . LoaderWithLocalWalletDB (
2021-07-15 21:42:05 +02:00
walletDBPath , db . Bolt . NoFreelistSync , db . Bolt . DBTimeout ,
2021-08-03 09:57:35 +02:00
) ,
CloseFuncs : closeFuncs ,
2020-05-06 20:48:05 -07:00
} , nil
2020-03-13 17:05:28 +01:00
}
2023-01-13 16:55:02 +02:00
// warnExistingBoltDBs checks if there is an existing bbolt database in the
// given location and logs a warning if so.
func warnExistingBoltDBs ( log btclog . Logger , dbType , dir , fileName string ) {
if lnrpc . FileExists ( filepath . Join ( dir , fileName ) ) {
log . Warnf ( "Found existing bbolt database file in %s/%s while " +
"using database type %s. Existing data will NOT be " +
"migrated to %s automatically!" , dir , fileName , dbType ,
dbType )
}
}
2020-03-13 17:05:28 +01:00
// Compile-time constraint to ensure Workers implements the Validator interface.
var _ Validator = ( * DB ) ( nil )