2019-05-24 06:49:04 +03:00
|
|
|
package wtdb
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"math"
|
|
|
|
"net"
|
kvdb: add timeout options for bbolt (#4787)
* mod: bump btcwallet version to accept db timeout
* btcwallet: add DBTimeOut in config
* kvdb: add database timeout option for bbolt
This commit adds a DBTimeout option in bbolt config. The relevant
functions walletdb.Open/Create are updated to use this config. In
addition, the bolt compacter also applies the new timeout option.
* channeldb: add DBTimeout in db options
This commit adds the DBTimeout option for channeldb. A new unit
test file is created to test the default options. In addition,
the params used in kvdb.Create inside channeldb_test is updated
with a DefaultDBTimeout value.
* contractcourt+routing: use DBTimeout in kvdb
This commit touches multiple test files in contractcourt and routing.
The call of function kvdb.Create and kvdb.Open are now updated with
the new param DBTimeout, using the default value kvdb.DefaultDBTimeout.
* lncfg: add DBTimeout option in db config
The DBTimeout option is added to db config. A new unit test is
added to check the default DB config is created as expected.
* migration: add DBTimeout param in kvdb.Create/kvdb.Open
* keychain: update tests to use DBTimeout param
* htlcswitch+chainreg: add DBTimeout option
* macaroons: support DBTimeout config in creation
This commit adds the DBTimeout during the creation of macaroons.db.
The usage of kvdb.Create and kvdb.Open in its tests are updated with
a timeout value using kvdb.DefaultDBTimeout.
* walletunlocker: add dbTimeout option in UnlockerService
This commit adds a new param, dbTimeout, during the creation of
UnlockerService. This param is then passed to wallet.NewLoader
inside various service calls, specifying a timeout value to be
used when opening the bbolt. In addition, the macaroonService
is also called with this dbTimeout param.
* watchtower/wtdb: add dbTimeout param during creation
This commit adds the dbTimeout param for the creation of both
watchtower.db and wtclient.db.
* multi: add db timeout param for walletdb.Create
This commit adds the db timeout param for the function call
walletdb.Create. It touches only the test files found in chainntnfs,
lnwallet, and routing.
* lnd: pass DBTimeout config to relevant services
This commit enables lnd to pass the DBTimeout config to the following
services/config/functions,
- chainControlConfig
- walletunlocker
- wallet.NewLoader
- macaroons
- watchtower
In addition, the usage of wallet.Create is updated too.
* sample-config: add dbtimeout option
2020-12-08 02:31:49 +03:00
|
|
|
"time"
|
2019-05-24 06:49:04 +03:00
|
|
|
|
2019-06-08 03:45:11 +03:00
|
|
|
"github.com/btcsuite/btcd/btcec"
|
2020-01-10 05:45:04 +03:00
|
|
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
2019-05-24 06:49:04 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnwire"
|
2020-12-02 00:03:18 +03:00
|
|
|
"github.com/lightningnetwork/lnd/watchtower/blob"
|
2019-05-24 06:49:04 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// clientDBName is the filename of client database.
|
|
|
|
clientDBName = "wtclient.db"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// cSessionKeyIndexBkt is a top-level bucket storing:
|
|
|
|
// tower-id -> reserved-session-key-index (uint32).
|
|
|
|
cSessionKeyIndexBkt = []byte("client-session-key-index-bucket")
|
|
|
|
|
|
|
|
// cChanSummaryBkt is a top-level bucket storing:
|
|
|
|
// channel-id -> encoded ClientChanSummary.
|
|
|
|
cChanSummaryBkt = []byte("client-channel-summary-bucket")
|
|
|
|
|
|
|
|
// cSessionBkt is a top-level bucket storing:
|
|
|
|
// session-id => cSessionBody -> encoded ClientSessionBody
|
|
|
|
// => cSessionCommits => seqnum -> encoded CommittedUpdate
|
|
|
|
// => cSessionAcks => seqnum -> encoded BackupID
|
|
|
|
cSessionBkt = []byte("client-session-bucket")
|
|
|
|
|
|
|
|
// cSessionBody is a sub-bucket of cSessionBkt storing only the body of
|
|
|
|
// the ClientSession.
|
|
|
|
cSessionBody = []byte("client-session-body")
|
|
|
|
|
|
|
|
// cSessionBody is a sub-bucket of cSessionBkt storing:
|
|
|
|
// seqnum -> encoded CommittedUpdate.
|
|
|
|
cSessionCommits = []byte("client-session-commits")
|
|
|
|
|
|
|
|
// cSessionAcks is a sub-bucket of cSessionBkt storing:
|
|
|
|
// seqnum -> encoded BackupID.
|
|
|
|
cSessionAcks = []byte("client-session-acks")
|
|
|
|
|
|
|
|
// cTowerBkt is a top-level bucket storing:
|
|
|
|
// tower-id -> encoded Tower.
|
|
|
|
cTowerBkt = []byte("client-tower-bucket")
|
|
|
|
|
|
|
|
// cTowerIndexBkt is a top-level bucket storing:
|
|
|
|
// tower-pubkey -> tower-id.
|
|
|
|
cTowerIndexBkt = []byte("client-tower-index-bucket")
|
|
|
|
|
|
|
|
// ErrTowerNotFound signals that the target tower was not found in the
|
|
|
|
// database.
|
|
|
|
ErrTowerNotFound = errors.New("tower not found")
|
|
|
|
|
2019-06-08 03:45:11 +03:00
|
|
|
// ErrTowerUnackedUpdates is an error returned when we attempt to mark a
|
|
|
|
// tower's sessions as inactive, but one of its sessions has unacked
|
|
|
|
// updates.
|
|
|
|
ErrTowerUnackedUpdates = errors.New("tower has unacked updates")
|
|
|
|
|
2019-05-24 06:49:04 +03:00
|
|
|
// ErrCorruptClientSession signals that the client session's on-disk
|
|
|
|
// structure deviates from what is expected.
|
|
|
|
ErrCorruptClientSession = errors.New("client session corrupted")
|
|
|
|
|
|
|
|
// ErrClientSessionAlreadyExists signals an attempt to reinsert a client
|
|
|
|
// session that has already been created.
|
|
|
|
ErrClientSessionAlreadyExists = errors.New(
|
|
|
|
"client session already exists",
|
|
|
|
)
|
|
|
|
|
|
|
|
// ErrChannelAlreadyRegistered signals a duplicate attempt to register a
|
|
|
|
// channel with the client database.
|
|
|
|
ErrChannelAlreadyRegistered = errors.New("channel already registered")
|
|
|
|
|
|
|
|
// ErrChannelNotRegistered signals a channel has not yet been registered
|
|
|
|
// in the client database.
|
|
|
|
ErrChannelNotRegistered = errors.New("channel not registered")
|
|
|
|
|
|
|
|
// ErrClientSessionNotFound signals that the requested client session
|
|
|
|
// was not found in the database.
|
|
|
|
ErrClientSessionNotFound = errors.New("client session not found")
|
|
|
|
|
|
|
|
// ErrUpdateAlreadyCommitted signals that the chosen sequence number has
|
|
|
|
// already been committed to an update with a different breach hint.
|
|
|
|
ErrUpdateAlreadyCommitted = errors.New("update already committed")
|
|
|
|
|
|
|
|
// ErrCommitUnorderedUpdate signals the client tried to commit a
|
|
|
|
// sequence number other than the next unallocated sequence number.
|
|
|
|
ErrCommitUnorderedUpdate = errors.New("update seqnum not monotonic")
|
|
|
|
|
|
|
|
// ErrCommittedUpdateNotFound signals that the tower tried to ACK a
|
|
|
|
// sequence number that has not yet been allocated by the client.
|
|
|
|
ErrCommittedUpdateNotFound = errors.New("committed update not found")
|
|
|
|
|
|
|
|
// ErrUnallocatedLastApplied signals that the tower tried to provide a
|
|
|
|
// LastApplied value greater than any allocated sequence number.
|
|
|
|
ErrUnallocatedLastApplied = errors.New("tower echoed last appiled " +
|
|
|
|
"greater than allocated seqnum")
|
|
|
|
|
|
|
|
// ErrNoReservedKeyIndex signals that a client session could not be
|
|
|
|
// created because no session key index was reserved.
|
|
|
|
ErrNoReservedKeyIndex = errors.New("key index not reserved")
|
|
|
|
|
|
|
|
// ErrIncorrectKeyIndex signals that the client session could not be
|
|
|
|
// created because session key index differs from the reserved key
|
|
|
|
// index.
|
|
|
|
ErrIncorrectKeyIndex = errors.New("incorrect key index")
|
2020-11-03 21:27:57 +03:00
|
|
|
|
|
|
|
// ErrLastTowerAddr is an error returned when the last address of a
|
|
|
|
// watchtower is attempted to be removed.
|
|
|
|
ErrLastTowerAddr = errors.New("cannot remove last tower address")
|
2019-05-24 06:49:04 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// ClientDB is single database providing a persistent storage engine for the
|
|
|
|
// wtclient.
|
|
|
|
type ClientDB struct {
|
2020-01-10 05:45:04 +03:00
|
|
|
db kvdb.Backend
|
2019-05-24 06:49:04 +03:00
|
|
|
dbPath string
|
|
|
|
}
|
|
|
|
|
|
|
|
// OpenClientDB opens the client database given the path to the database's
|
|
|
|
// directory. If no such database exists, this method will initialize a fresh
|
|
|
|
// one using the latest version number and bucket structure. If a database
|
|
|
|
// exists but has a lower version number than the current version, any necessary
|
|
|
|
// migrations will be applied before returning. Any attempt to open a database
|
|
|
|
// with a version number higher that the latest version will fail to prevent
|
|
|
|
// accidental reversion.
|
kvdb: add timeout options for bbolt (#4787)
* mod: bump btcwallet version to accept db timeout
* btcwallet: add DBTimeOut in config
* kvdb: add database timeout option for bbolt
This commit adds a DBTimeout option in bbolt config. The relevant
functions walletdb.Open/Create are updated to use this config. In
addition, the bolt compacter also applies the new timeout option.
* channeldb: add DBTimeout in db options
This commit adds the DBTimeout option for channeldb. A new unit
test file is created to test the default options. In addition,
the params used in kvdb.Create inside channeldb_test is updated
with a DefaultDBTimeout value.
* contractcourt+routing: use DBTimeout in kvdb
This commit touches multiple test files in contractcourt and routing.
The call of function kvdb.Create and kvdb.Open are now updated with
the new param DBTimeout, using the default value kvdb.DefaultDBTimeout.
* lncfg: add DBTimeout option in db config
The DBTimeout option is added to db config. A new unit test is
added to check the default DB config is created as expected.
* migration: add DBTimeout param in kvdb.Create/kvdb.Open
* keychain: update tests to use DBTimeout param
* htlcswitch+chainreg: add DBTimeout option
* macaroons: support DBTimeout config in creation
This commit adds the DBTimeout during the creation of macaroons.db.
The usage of kvdb.Create and kvdb.Open in its tests are updated with
a timeout value using kvdb.DefaultDBTimeout.
* walletunlocker: add dbTimeout option in UnlockerService
This commit adds a new param, dbTimeout, during the creation of
UnlockerService. This param is then passed to wallet.NewLoader
inside various service calls, specifying a timeout value to be
used when opening the bbolt. In addition, the macaroonService
is also called with this dbTimeout param.
* watchtower/wtdb: add dbTimeout param during creation
This commit adds the dbTimeout param for the creation of both
watchtower.db and wtclient.db.
* multi: add db timeout param for walletdb.Create
This commit adds the db timeout param for the function call
walletdb.Create. It touches only the test files found in chainntnfs,
lnwallet, and routing.
* lnd: pass DBTimeout config to relevant services
This commit enables lnd to pass the DBTimeout config to the following
services/config/functions,
- chainControlConfig
- walletunlocker
- wallet.NewLoader
- macaroons
- watchtower
In addition, the usage of wallet.Create is updated too.
* sample-config: add dbtimeout option
2020-12-08 02:31:49 +03:00
|
|
|
func OpenClientDB(dbPath string, dbTimeout time.Duration) (*ClientDB, error) {
|
|
|
|
bdb, firstInit, err := createDBIfNotExist(
|
|
|
|
dbPath, clientDBName, dbTimeout,
|
|
|
|
)
|
2019-05-24 06:49:04 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
clientDB := &ClientDB{
|
|
|
|
db: bdb,
|
|
|
|
dbPath: dbPath,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = initOrSyncVersions(clientDB, firstInit, clientDBVersions)
|
|
|
|
if err != nil {
|
|
|
|
bdb.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now that the database version fully consistent with our latest known
|
|
|
|
// version, ensure that all top-level buckets known to this version are
|
|
|
|
// initialized. This allows us to assume their presence throughout all
|
|
|
|
// operations. If an known top-level bucket is expected to exist but is
|
|
|
|
// missing, this will trigger a ErrUninitializedDB error.
|
2020-10-26 16:06:32 +03:00
|
|
|
err = kvdb.Update(clientDB.db, initClientDBBuckets, func() {})
|
2019-05-24 06:49:04 +03:00
|
|
|
if err != nil {
|
|
|
|
bdb.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return clientDB, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// initClientDBBuckets creates all top-level buckets required to handle database
|
|
|
|
// operations required by the latest version.
|
2020-01-10 05:45:04 +03:00
|
|
|
func initClientDBBuckets(tx kvdb.RwTx) error {
|
2019-05-24 06:49:04 +03:00
|
|
|
buckets := [][]byte{
|
|
|
|
cSessionKeyIndexBkt,
|
|
|
|
cChanSummaryBkt,
|
|
|
|
cSessionBkt,
|
|
|
|
cTowerBkt,
|
|
|
|
cTowerIndexBkt,
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, bucket := range buckets {
|
2020-01-10 05:45:04 +03:00
|
|
|
_, err := tx.CreateTopLevelBucket(bucket)
|
2019-05-24 06:49:04 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// bdb returns the backing bbolt.DB instance.
|
|
|
|
//
|
|
|
|
// NOTE: Part of the versionedDB interface.
|
2020-01-10 05:45:04 +03:00
|
|
|
func (c *ClientDB) bdb() kvdb.Backend {
|
2019-05-24 06:49:04 +03:00
|
|
|
return c.db
|
|
|
|
}
|
|
|
|
|
|
|
|
// Version returns the database's current version number.
|
|
|
|
//
|
|
|
|
// NOTE: Part of the versionedDB interface.
|
|
|
|
func (c *ClientDB) Version() (uint32, error) {
|
|
|
|
var version uint32
|
2020-05-07 01:45:50 +03:00
|
|
|
err := kvdb.View(c.db, func(tx kvdb.RTx) error {
|
2019-05-24 06:49:04 +03:00
|
|
|
var err error
|
|
|
|
version, err = getDBVersion(tx)
|
|
|
|
return err
|
2020-10-20 17:18:40 +03:00
|
|
|
}, func() {
|
|
|
|
version = 0
|
2019-05-24 06:49:04 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return version, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close closes the underlying database.
|
|
|
|
func (c *ClientDB) Close() error {
|
|
|
|
return c.db.Close()
|
|
|
|
}
|
|
|
|
|
2019-06-08 03:45:11 +03:00
|
|
|
// CreateTower initialize an address record used to communicate with a
|
|
|
|
// watchtower. Each Tower is assigned a unique ID, that is used to amortize
|
|
|
|
// storage costs of the public key when used by multiple sessions. If the tower
|
|
|
|
// already exists, the address is appended to the list of all addresses used to
|
|
|
|
// that tower previously and its corresponding sessions are marked as active.
|
2019-05-24 06:49:04 +03:00
|
|
|
func (c *ClientDB) CreateTower(lnAddr *lnwire.NetAddress) (*Tower, error) {
|
|
|
|
var towerPubKey [33]byte
|
|
|
|
copy(towerPubKey[:], lnAddr.IdentityKey.SerializeCompressed())
|
|
|
|
|
|
|
|
var tower *Tower
|
2020-01-10 05:45:04 +03:00
|
|
|
err := kvdb.Update(c.db, func(tx kvdb.RwTx) error {
|
|
|
|
towerIndex := tx.ReadWriteBucket(cTowerIndexBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if towerIndex == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
2020-01-10 05:45:04 +03:00
|
|
|
towers := tx.ReadWriteBucket(cTowerBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if towers == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if the tower index already knows of this pubkey.
|
|
|
|
towerIDBytes := towerIndex.Get(towerPubKey[:])
|
|
|
|
if len(towerIDBytes) == 8 {
|
|
|
|
// The tower already exists, deserialize the existing
|
|
|
|
// record.
|
|
|
|
var err error
|
|
|
|
tower, err = getTower(towers, towerIDBytes)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the new address to the existing tower. If the
|
|
|
|
// address is a duplicate, this will result in no
|
|
|
|
// change.
|
|
|
|
tower.AddAddress(lnAddr.Address)
|
2019-06-08 03:45:11 +03:00
|
|
|
|
|
|
|
// If there are any client sessions that correspond to
|
|
|
|
// this tower, we'll mark them as active to ensure we
|
|
|
|
// load them upon restarts.
|
|
|
|
//
|
|
|
|
// TODO(wilmer): with an index of tower -> sessions we
|
|
|
|
// can avoid the linear lookup.
|
2020-01-10 05:45:04 +03:00
|
|
|
sessions := tx.ReadWriteBucket(cSessionBkt)
|
2019-06-08 03:45:11 +03:00
|
|
|
if sessions == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
towerID := TowerIDFromBytes(towerIDBytes)
|
|
|
|
towerSessions, err := listClientSessions(
|
|
|
|
sessions, &towerID,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, session := range towerSessions {
|
|
|
|
err := markSessionStatus(
|
|
|
|
sessions, session, CSessionActive,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2019-05-24 06:49:04 +03:00
|
|
|
} else {
|
|
|
|
// No such tower exists, create a new tower id for our
|
|
|
|
// new tower. The error is unhandled since NextSequence
|
|
|
|
// never fails in an Update.
|
|
|
|
towerID, _ := towerIndex.NextSequence()
|
|
|
|
|
|
|
|
tower = &Tower{
|
|
|
|
ID: TowerID(towerID),
|
|
|
|
IdentityKey: lnAddr.IdentityKey,
|
|
|
|
Addresses: []net.Addr{lnAddr.Address},
|
|
|
|
}
|
|
|
|
|
|
|
|
towerIDBytes = tower.ID.Bytes()
|
|
|
|
|
|
|
|
// Since this tower is new, record the mapping from
|
|
|
|
// tower pubkey to tower id in the tower index.
|
|
|
|
err := towerIndex.Put(towerPubKey[:], towerIDBytes)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Store the new or updated tower under its tower id.
|
|
|
|
return putTower(towers, tower)
|
2020-10-26 16:06:32 +03:00
|
|
|
}, func() {
|
|
|
|
tower = nil
|
2019-05-24 06:49:04 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return tower, nil
|
|
|
|
}
|
|
|
|
|
2019-06-08 03:45:11 +03:00
|
|
|
// RemoveTower modifies a tower's record within the database. If an address is
|
|
|
|
// provided, then _only_ the address record should be removed from the tower's
|
|
|
|
// persisted state. Otherwise, we'll attempt to mark the tower as inactive by
|
|
|
|
// marking all of its sessions inactive. If any of its sessions has unacked
|
|
|
|
// updates, then ErrTowerUnackedUpdates is returned. If the tower doesn't have
|
|
|
|
// any sessions at all, it'll be completely removed from the database.
|
|
|
|
//
|
|
|
|
// NOTE: An error is not returned if the tower doesn't exist.
|
|
|
|
func (c *ClientDB) RemoveTower(pubKey *btcec.PublicKey, addr net.Addr) error {
|
2020-01-10 05:45:04 +03:00
|
|
|
return kvdb.Update(c.db, func(tx kvdb.RwTx) error {
|
|
|
|
towers := tx.ReadWriteBucket(cTowerBkt)
|
2019-06-08 03:45:11 +03:00
|
|
|
if towers == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
2020-01-10 05:45:04 +03:00
|
|
|
towerIndex := tx.ReadWriteBucket(cTowerIndexBkt)
|
2019-06-08 03:45:11 +03:00
|
|
|
if towerIndex == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't return an error if the watchtower doesn't exist to act
|
|
|
|
// as a NOP.
|
|
|
|
pubKeyBytes := pubKey.SerializeCompressed()
|
|
|
|
towerIDBytes := towerIndex.Get(pubKeyBytes)
|
|
|
|
if towerIDBytes == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// If an address is provided, then we should _only_ remove the
|
|
|
|
// address record from the database.
|
|
|
|
if addr != nil {
|
|
|
|
tower, err := getTower(towers, towerIDBytes)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-11-03 21:27:57 +03:00
|
|
|
|
|
|
|
// Towers should always have at least one address saved.
|
2019-06-08 03:45:11 +03:00
|
|
|
tower.RemoveAddress(addr)
|
2020-11-03 21:27:57 +03:00
|
|
|
if len(tower.Addresses) == 0 {
|
|
|
|
return ErrLastTowerAddr
|
|
|
|
}
|
|
|
|
|
2019-06-08 03:45:11 +03:00
|
|
|
return putTower(towers, tower)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, we should attempt to mark the tower's sessions as
|
|
|
|
// inactive.
|
|
|
|
//
|
|
|
|
// TODO(wilmer): with an index of tower -> sessions we can avoid
|
|
|
|
// the linear lookup.
|
2020-01-10 05:45:04 +03:00
|
|
|
sessions := tx.ReadWriteBucket(cSessionBkt)
|
2019-06-08 03:45:11 +03:00
|
|
|
if sessions == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
towerID := TowerIDFromBytes(towerIDBytes)
|
|
|
|
towerSessions, err := listClientSessions(sessions, &towerID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// If it doesn't have any, we can completely remove it from the
|
|
|
|
// database.
|
|
|
|
if len(towerSessions) == 0 {
|
|
|
|
if err := towerIndex.Delete(pubKeyBytes); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return towers.Delete(towerIDBytes)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We'll mark its sessions as inactive as long as they don't
|
|
|
|
// have any pending updates to ensure we don't load them upon
|
|
|
|
// restarts.
|
|
|
|
for _, session := range towerSessions {
|
|
|
|
if len(session.CommittedUpdates) > 0 {
|
|
|
|
return ErrTowerUnackedUpdates
|
|
|
|
}
|
|
|
|
err := markSessionStatus(
|
|
|
|
sessions, session, CSessionInactive,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2020-10-26 16:06:32 +03:00
|
|
|
}, func() {})
|
2019-06-08 03:45:11 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// LoadTowerByID retrieves a tower by its tower ID.
|
|
|
|
func (c *ClientDB) LoadTowerByID(towerID TowerID) (*Tower, error) {
|
2019-05-24 06:49:04 +03:00
|
|
|
var tower *Tower
|
2020-05-07 01:45:50 +03:00
|
|
|
err := kvdb.View(c.db, func(tx kvdb.RTx) error {
|
2020-01-10 05:45:04 +03:00
|
|
|
towers := tx.ReadBucket(cTowerBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if towers == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
tower, err = getTower(towers, towerID.Bytes())
|
|
|
|
return err
|
2020-10-20 17:18:40 +03:00
|
|
|
}, func() {
|
|
|
|
tower = nil
|
2019-05-24 06:49:04 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return tower, nil
|
|
|
|
}
|
|
|
|
|
2019-06-08 03:45:11 +03:00
|
|
|
// LoadTower retrieves a tower by its public key.
|
|
|
|
func (c *ClientDB) LoadTower(pubKey *btcec.PublicKey) (*Tower, error) {
|
|
|
|
var tower *Tower
|
2020-05-07 01:45:50 +03:00
|
|
|
err := kvdb.View(c.db, func(tx kvdb.RTx) error {
|
2020-01-10 05:45:04 +03:00
|
|
|
towers := tx.ReadBucket(cTowerBkt)
|
2019-06-08 03:45:11 +03:00
|
|
|
if towers == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
2020-01-10 05:45:04 +03:00
|
|
|
towerIndex := tx.ReadBucket(cTowerIndexBkt)
|
2019-06-08 03:45:11 +03:00
|
|
|
if towerIndex == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
towerIDBytes := towerIndex.Get(pubKey.SerializeCompressed())
|
|
|
|
if towerIDBytes == nil {
|
|
|
|
return ErrTowerNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
tower, err = getTower(towers, towerIDBytes)
|
|
|
|
return err
|
2020-10-20 17:18:40 +03:00
|
|
|
}, func() {
|
|
|
|
tower = nil
|
2019-06-08 03:45:11 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return tower, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListTowers retrieves the list of towers available within the database.
|
|
|
|
func (c *ClientDB) ListTowers() ([]*Tower, error) {
|
|
|
|
var towers []*Tower
|
2020-05-07 01:45:50 +03:00
|
|
|
err := kvdb.View(c.db, func(tx kvdb.RTx) error {
|
2020-01-10 05:45:04 +03:00
|
|
|
towerBucket := tx.ReadBucket(cTowerBkt)
|
2019-06-08 03:45:11 +03:00
|
|
|
if towerBucket == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
return towerBucket.ForEach(func(towerIDBytes, _ []byte) error {
|
|
|
|
tower, err := getTower(towerBucket, towerIDBytes)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
towers = append(towers, tower)
|
|
|
|
return nil
|
|
|
|
})
|
2020-10-20 17:18:40 +03:00
|
|
|
}, func() {
|
|
|
|
towers = nil
|
2019-06-08 03:45:11 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return towers, nil
|
|
|
|
}
|
|
|
|
|
2019-05-24 06:49:04 +03:00
|
|
|
// NextSessionKeyIndex reserves a new session key derivation index for a
|
|
|
|
// particular tower id. The index is reserved for that tower until
|
|
|
|
// CreateClientSession is invoked for that tower and index, at which point a new
|
|
|
|
// index for that tower can be reserved. Multiple calls to this method before
|
|
|
|
// CreateClientSession is invoked should return the same index.
|
2020-12-02 00:03:18 +03:00
|
|
|
func (c *ClientDB) NextSessionKeyIndex(towerID TowerID,
|
|
|
|
blobType blob.Type) (uint32, error) {
|
|
|
|
|
2019-05-24 06:49:04 +03:00
|
|
|
var index uint32
|
2020-01-10 05:45:04 +03:00
|
|
|
err := kvdb.Update(c.db, func(tx kvdb.RwTx) error {
|
|
|
|
keyIndex := tx.ReadWriteBucket(cSessionKeyIndexBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if keyIndex == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the session key index to see if a key has already been
|
|
|
|
// reserved for this tower. If so, we'll deserialize and return
|
|
|
|
// the index directly.
|
2020-12-02 00:03:18 +03:00
|
|
|
var err error
|
|
|
|
index, err = getSessionKeyIndex(keyIndex, towerID, blobType)
|
|
|
|
if err == nil {
|
2019-05-24 06:49:04 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, generate a new session key index since the node
|
|
|
|
// doesn't already have reserved index. The error is ignored
|
|
|
|
// since NextSequence can't fail inside Update.
|
|
|
|
index64, _ := keyIndex.NextSequence()
|
|
|
|
|
|
|
|
// As a sanity check, assert that the index is still in the
|
|
|
|
// valid range of unhardened pubkeys. In the future, we should
|
|
|
|
// move to only using hardened keys, and this will prevent any
|
|
|
|
// overlap from occurring until then. This also prevents us from
|
|
|
|
// overflowing uint32s.
|
|
|
|
if index64 > math.MaxInt32 {
|
|
|
|
return fmt.Errorf("exhausted session key indexes")
|
|
|
|
}
|
|
|
|
|
2020-12-02 00:03:18 +03:00
|
|
|
// Create the key that will used to be store the reserved index.
|
|
|
|
keyBytes := createSessionKeyIndexKey(towerID, blobType)
|
|
|
|
|
2019-05-24 06:49:04 +03:00
|
|
|
index = uint32(index64)
|
|
|
|
|
|
|
|
var indexBuf [4]byte
|
|
|
|
byteOrder.PutUint32(indexBuf[:], index)
|
|
|
|
|
|
|
|
// Record the reserved session key index under this tower's id.
|
2020-12-02 00:03:18 +03:00
|
|
|
return keyIndex.Put(keyBytes, indexBuf[:])
|
2020-10-26 16:06:32 +03:00
|
|
|
}, func() {
|
|
|
|
index = 0
|
2019-05-24 06:49:04 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return index, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CreateClientSession records a newly negotiated client session in the set of
|
|
|
|
// active sessions. The session can be identified by its SessionID.
|
|
|
|
func (c *ClientDB) CreateClientSession(session *ClientSession) error {
|
2020-01-10 05:45:04 +03:00
|
|
|
return kvdb.Update(c.db, func(tx kvdb.RwTx) error {
|
|
|
|
keyIndexes := tx.ReadWriteBucket(cSessionKeyIndexBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if keyIndexes == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
2020-01-10 05:45:04 +03:00
|
|
|
sessions := tx.ReadWriteBucket(cSessionBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if sessions == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that client session with this session id doesn't
|
|
|
|
// already exist.
|
2020-01-10 05:45:04 +03:00
|
|
|
existingSessionBytes := sessions.NestedReadWriteBucket(session.ID[:])
|
2019-05-24 06:49:04 +03:00
|
|
|
if existingSessionBytes != nil {
|
|
|
|
return ErrClientSessionAlreadyExists
|
|
|
|
}
|
|
|
|
|
2020-12-02 00:03:18 +03:00
|
|
|
towerID := session.TowerID
|
|
|
|
blobType := session.Policy.BlobType
|
|
|
|
|
2019-05-24 06:49:04 +03:00
|
|
|
// Check that this tower has a reserved key index.
|
2020-12-02 00:03:18 +03:00
|
|
|
index, err := getSessionKeyIndex(keyIndexes, towerID, blobType)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2019-05-24 06:49:04 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Assert that the key index of the inserted session matches the
|
|
|
|
// reserved session key index.
|
|
|
|
if index != session.KeyIndex {
|
|
|
|
return ErrIncorrectKeyIndex
|
|
|
|
}
|
|
|
|
|
2020-12-02 00:03:18 +03:00
|
|
|
// Remove the key index reservation. For altruist commit
|
|
|
|
// sessions, we'll also purge under the old legacy key format.
|
|
|
|
key := createSessionKeyIndexKey(towerID, blobType)
|
|
|
|
err = keyIndexes.Delete(key)
|
2019-05-24 06:49:04 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-12-02 00:03:18 +03:00
|
|
|
if blobType == blob.TypeAltruistCommit {
|
|
|
|
err = keyIndexes.Delete(towerID.Bytes())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2019-05-24 06:49:04 +03:00
|
|
|
|
|
|
|
// Finally, write the client session's body in the sessions
|
|
|
|
// bucket.
|
|
|
|
return putClientSessionBody(sessions, session)
|
2020-10-26 16:06:32 +03:00
|
|
|
}, func() {})
|
2019-05-24 06:49:04 +03:00
|
|
|
}
|
|
|
|
|
2020-12-02 00:03:18 +03:00
|
|
|
// createSessionKeyIndexKey returns the indentifier used in the
|
|
|
|
// session-key-index index, created as tower-id||blob-type.
|
|
|
|
//
|
|
|
|
// NOTE: The original serialization only used tower-id, which prevents
|
|
|
|
// concurrent client types from reserving sessions with the same tower.
|
|
|
|
func createSessionKeyIndexKey(towerID TowerID, blobType blob.Type) []byte {
|
|
|
|
towerIDBytes := towerID.Bytes()
|
|
|
|
|
|
|
|
// Session key indexes are stored under as tower-id||blob-type.
|
|
|
|
var keyBytes [6]byte
|
|
|
|
copy(keyBytes[:4], towerIDBytes)
|
|
|
|
byteOrder.PutUint16(keyBytes[4:], uint16(blobType))
|
|
|
|
|
|
|
|
return keyBytes[:]
|
|
|
|
}
|
|
|
|
|
|
|
|
// getSessionKeyIndex is a helper method
|
|
|
|
func getSessionKeyIndex(keyIndexes kvdb.RwBucket, towerID TowerID,
|
|
|
|
blobType blob.Type) (uint32, error) {
|
|
|
|
|
|
|
|
// Session key indexes are store under as tower-id||blob-type. The
|
|
|
|
// original serialization only used tower-id, which prevents concurrent
|
|
|
|
// client types from reserving sessions with the same tower.
|
|
|
|
keyBytes := createSessionKeyIndexKey(towerID, blobType)
|
|
|
|
|
|
|
|
// Retrieve the index using the key bytes. If the key wasn't found, we
|
|
|
|
// will fall back to the legacy format that only uses the tower id, but
|
|
|
|
// _only_ if the blob type is for altruist commit sessions since that
|
|
|
|
// was the only operational session type prior to changing the key
|
|
|
|
// format.
|
|
|
|
keyIndexBytes := keyIndexes.Get(keyBytes)
|
|
|
|
if keyIndexBytes == nil && blobType == blob.TypeAltruistCommit {
|
|
|
|
keyIndexBytes = keyIndexes.Get(towerID.Bytes())
|
|
|
|
}
|
|
|
|
|
|
|
|
// All session key indexes should be serialized uint32's. If no key
|
|
|
|
// index was found, the length of keyIndexBytes will be 0.
|
|
|
|
if len(keyIndexBytes) != 4 {
|
|
|
|
return 0, ErrNoReservedKeyIndex
|
|
|
|
}
|
|
|
|
|
|
|
|
return byteOrder.Uint32(keyIndexBytes), nil
|
|
|
|
}
|
|
|
|
|
2019-06-08 03:44:55 +03:00
|
|
|
// ListClientSessions returns the set of all client sessions known to the db. An
|
|
|
|
// optional tower ID can be used to filter out any client sessions in the
|
|
|
|
// response that do not correspond to this tower.
|
|
|
|
func (c *ClientDB) ListClientSessions(id *TowerID) (map[SessionID]*ClientSession, error) {
|
|
|
|
var clientSessions map[SessionID]*ClientSession
|
2020-05-07 01:45:50 +03:00
|
|
|
err := kvdb.View(c.db, func(tx kvdb.RTx) error {
|
2020-01-10 05:45:04 +03:00
|
|
|
sessions := tx.ReadBucket(cSessionBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if sessions == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
2019-06-08 03:44:55 +03:00
|
|
|
var err error
|
|
|
|
clientSessions, err = listClientSessions(sessions, id)
|
|
|
|
return err
|
2020-10-20 17:18:40 +03:00
|
|
|
}, func() {
|
|
|
|
clientSessions = nil
|
2019-06-08 03:44:55 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-05-24 06:49:04 +03:00
|
|
|
|
2019-06-08 03:44:55 +03:00
|
|
|
return clientSessions, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// listClientSessions returns the set of all client sessions known to the db. An
|
|
|
|
// optional tower ID can be used to filter out any client sessions in the
|
|
|
|
// response that do not correspond to this tower.
|
2020-05-07 01:48:00 +03:00
|
|
|
func listClientSessions(sessions kvdb.RBucket,
|
2019-06-08 03:44:55 +03:00
|
|
|
id *TowerID) (map[SessionID]*ClientSession, error) {
|
2019-05-24 06:49:04 +03:00
|
|
|
|
2019-06-08 03:44:55 +03:00
|
|
|
clientSessions := make(map[SessionID]*ClientSession)
|
|
|
|
err := sessions.ForEach(func(k, _ []byte) error {
|
|
|
|
// We'll load the full client session since the client will need
|
|
|
|
// the CommittedUpdates and AckedUpdates on startup to resume
|
|
|
|
// committed updates and compute the highest known commit height
|
|
|
|
// for each channel.
|
|
|
|
session, err := getClientSession(sessions, k)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-05-24 06:49:04 +03:00
|
|
|
|
2019-06-08 03:44:55 +03:00
|
|
|
// Filter out any sessions that don't correspond to the given
|
|
|
|
// tower if one was set.
|
|
|
|
if id != nil && session.TowerID != *id {
|
2019-05-24 06:49:04 +03:00
|
|
|
return nil
|
2019-06-08 03:44:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
clientSessions[session.ID] = session
|
|
|
|
|
|
|
|
return nil
|
2019-05-24 06:49:04 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return clientSessions, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// FetchChanSummaries loads a mapping from all registered channels to their
|
|
|
|
// channel summaries.
|
|
|
|
func (c *ClientDB) FetchChanSummaries() (ChannelSummaries, error) {
|
2020-10-20 17:18:40 +03:00
|
|
|
var summaries map[lnwire.ChannelID]ClientChanSummary
|
2020-05-07 01:45:50 +03:00
|
|
|
err := kvdb.View(c.db, func(tx kvdb.RTx) error {
|
2020-01-10 05:45:04 +03:00
|
|
|
chanSummaries := tx.ReadBucket(cChanSummaryBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if chanSummaries == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
return chanSummaries.ForEach(func(k, v []byte) error {
|
|
|
|
var chanID lnwire.ChannelID
|
|
|
|
copy(chanID[:], k)
|
|
|
|
|
|
|
|
var summary ClientChanSummary
|
|
|
|
err := summary.Decode(bytes.NewReader(v))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
summaries[chanID] = summary
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
2020-10-20 17:18:40 +03:00
|
|
|
}, func() {
|
|
|
|
summaries = make(map[lnwire.ChannelID]ClientChanSummary)
|
2019-05-24 06:49:04 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return summaries, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterChannel registers a channel for use within the client database. For
|
|
|
|
// now, all that is stored in the channel summary is the sweep pkscript that
|
|
|
|
// we'd like any tower sweeps to pay into. In the future, this will be extended
|
|
|
|
// to contain more info to allow the client efficiently request historical
|
|
|
|
// states to be backed up under the client's active policy.
|
|
|
|
func (c *ClientDB) RegisterChannel(chanID lnwire.ChannelID,
|
|
|
|
sweepPkScript []byte) error {
|
|
|
|
|
2020-01-10 05:45:04 +03:00
|
|
|
return kvdb.Update(c.db, func(tx kvdb.RwTx) error {
|
|
|
|
chanSummaries := tx.ReadWriteBucket(cChanSummaryBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if chanSummaries == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err := getChanSummary(chanSummaries, chanID)
|
|
|
|
switch {
|
|
|
|
|
|
|
|
// Summary already exists.
|
|
|
|
case err == nil:
|
|
|
|
return ErrChannelAlreadyRegistered
|
|
|
|
|
|
|
|
// Channel is not registered, proceed with registration.
|
|
|
|
case err == ErrChannelNotRegistered:
|
|
|
|
|
|
|
|
// Unexpected error.
|
2019-07-24 11:58:13 +03:00
|
|
|
default:
|
2019-05-24 06:49:04 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
summary := ClientChanSummary{
|
|
|
|
SweepPkScript: sweepPkScript,
|
|
|
|
}
|
|
|
|
|
|
|
|
return putChanSummary(chanSummaries, chanID, &summary)
|
2020-10-26 16:06:32 +03:00
|
|
|
}, func() {})
|
2019-05-24 06:49:04 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// MarkBackupIneligible records that the state identified by the (channel id,
|
|
|
|
// commit height) tuple was ineligible for being backed up under the current
|
|
|
|
// policy. This state can be retried later under a different policy.
|
|
|
|
func (c *ClientDB) MarkBackupIneligible(chanID lnwire.ChannelID,
|
|
|
|
commitHeight uint64) error {
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CommitUpdate persists the CommittedUpdate provided in the slot for (session,
|
|
|
|
// seqNum). This allows the client to retransmit this update on startup.
|
|
|
|
func (c *ClientDB) CommitUpdate(id *SessionID,
|
|
|
|
update *CommittedUpdate) (uint16, error) {
|
|
|
|
|
|
|
|
var lastApplied uint16
|
2020-01-10 05:45:04 +03:00
|
|
|
err := kvdb.Update(c.db, func(tx kvdb.RwTx) error {
|
|
|
|
sessions := tx.ReadWriteBucket(cSessionBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if sessions == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
// We'll only load the ClientSession body for performance, since
|
|
|
|
// we primarily need to inspect its SeqNum and TowerLastApplied
|
|
|
|
// fields. The CommittedUpdates will be modified on disk
|
|
|
|
// directly.
|
|
|
|
session, err := getClientSessionBody(sessions, id[:])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Can't fail if the above didn't fail.
|
2020-01-10 05:45:04 +03:00
|
|
|
sessionBkt := sessions.NestedReadWriteBucket(id[:])
|
2019-05-24 06:49:04 +03:00
|
|
|
|
|
|
|
// Ensure the session commits sub-bucket is initialized.
|
|
|
|
sessionCommits, err := sessionBkt.CreateBucketIfNotExists(
|
|
|
|
cSessionCommits,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var seqNumBuf [2]byte
|
|
|
|
byteOrder.PutUint16(seqNumBuf[:], update.SeqNum)
|
|
|
|
|
|
|
|
// Check to see if a committed update already exists for this
|
|
|
|
// sequence number.
|
|
|
|
committedUpdateBytes := sessionCommits.Get(seqNumBuf[:])
|
|
|
|
if committedUpdateBytes != nil {
|
|
|
|
var dbUpdate CommittedUpdate
|
|
|
|
err := dbUpdate.Decode(
|
|
|
|
bytes.NewReader(committedUpdateBytes),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// If an existing committed update has a different hint,
|
|
|
|
// we'll reject this newer update.
|
|
|
|
if dbUpdate.Hint != update.Hint {
|
|
|
|
return ErrUpdateAlreadyCommitted
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, capture the last applied value and
|
|
|
|
// succeed.
|
|
|
|
lastApplied = session.TowerLastApplied
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// There's no committed update for this sequence number, ensure
|
|
|
|
// that we are committing the next unallocated one.
|
|
|
|
if update.SeqNum != session.SeqNum+1 {
|
|
|
|
return ErrCommitUnorderedUpdate
|
|
|
|
}
|
|
|
|
|
|
|
|
// Increment the session's sequence number and store the updated
|
|
|
|
// client session.
|
|
|
|
//
|
|
|
|
// TODO(conner): split out seqnum and last applied own bucket to
|
|
|
|
// eliminate serialization of full struct during CommitUpdate?
|
|
|
|
// Can also read/write directly to byes [:2] without migration.
|
|
|
|
session.SeqNum++
|
|
|
|
err = putClientSessionBody(sessions, session)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Encode and store the committed update in the sessionCommits
|
|
|
|
// sub-bucket under the requested sequence number.
|
|
|
|
var b bytes.Buffer
|
|
|
|
err = update.Encode(&b)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = sessionCommits.Put(seqNumBuf[:], b.Bytes())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, capture the session's last applied value so it can
|
|
|
|
// be sent in the next state update to the tower.
|
|
|
|
lastApplied = session.TowerLastApplied
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
2020-10-26 16:06:32 +03:00
|
|
|
}, func() {
|
|
|
|
lastApplied = 0
|
2019-05-24 06:49:04 +03:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return lastApplied, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// AckUpdate persists an acknowledgment for a given (session, seqnum) pair. This
|
|
|
|
// removes the update from the set of committed updates, and validates the
|
|
|
|
// lastApplied value returned from the tower.
|
|
|
|
func (c *ClientDB) AckUpdate(id *SessionID, seqNum uint16,
|
|
|
|
lastApplied uint16) error {
|
|
|
|
|
2020-01-10 05:45:04 +03:00
|
|
|
return kvdb.Update(c.db, func(tx kvdb.RwTx) error {
|
|
|
|
sessions := tx.ReadWriteBucket(cSessionBkt)
|
2019-05-24 06:49:04 +03:00
|
|
|
if sessions == nil {
|
|
|
|
return ErrUninitializedDB
|
|
|
|
}
|
|
|
|
|
|
|
|
// We'll only load the ClientSession body for performance, since
|
|
|
|
// we primarily need to inspect its SeqNum and TowerLastApplied
|
|
|
|
// fields. The CommittedUpdates and AckedUpdates will be
|
|
|
|
// modified on disk directly.
|
|
|
|
session, err := getClientSessionBody(sessions, id[:])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the tower has acked a sequence number beyond our highest
|
|
|
|
// sequence number, fail.
|
|
|
|
if lastApplied > session.SeqNum {
|
|
|
|
return ErrUnallocatedLastApplied
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the tower acked with a lower sequence number than it gave
|
|
|
|
// us prior, fail.
|
|
|
|
if lastApplied < session.TowerLastApplied {
|
|
|
|
return ErrLastAppliedReversion
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(conner): split out seqnum and last applied own bucket to
|
|
|
|
// eliminate serialization of full struct during AckUpdate? Can
|
|
|
|
// also read/write directly to byes [2:4] without migration.
|
|
|
|
session.TowerLastApplied = lastApplied
|
|
|
|
|
|
|
|
// Write the client session with the updated last applied value.
|
|
|
|
err = putClientSessionBody(sessions, session)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Can't fail because of getClientSession succeeded.
|
2020-01-10 05:45:04 +03:00
|
|
|
sessionBkt := sessions.NestedReadWriteBucket(id[:])
|
2019-05-24 06:49:04 +03:00
|
|
|
|
|
|
|
// If the commits sub-bucket doesn't exist, there can't possibly
|
|
|
|
// be a corresponding committed update to remove.
|
2020-01-10 05:45:04 +03:00
|
|
|
sessionCommits := sessionBkt.NestedReadWriteBucket(cSessionCommits)
|
2019-05-24 06:49:04 +03:00
|
|
|
if sessionCommits == nil {
|
|
|
|
return ErrCommittedUpdateNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
var seqNumBuf [2]byte
|
|
|
|
byteOrder.PutUint16(seqNumBuf[:], seqNum)
|
|
|
|
|
|
|
|
// Assert that a committed update exists for this sequence
|
|
|
|
// number.
|
|
|
|
committedUpdateBytes := sessionCommits.Get(seqNumBuf[:])
|
|
|
|
if committedUpdateBytes == nil {
|
|
|
|
return ErrCommittedUpdateNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
var committedUpdate CommittedUpdate
|
|
|
|
err = committedUpdate.Decode(
|
|
|
|
bytes.NewReader(committedUpdateBytes),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove the corresponding committed update.
|
|
|
|
err = sessionCommits.Delete(seqNumBuf[:])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that the session acks sub-bucket is initialized so we
|
|
|
|
// can insert an entry.
|
|
|
|
sessionAcks, err := sessionBkt.CreateBucketIfNotExists(
|
|
|
|
cSessionAcks,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// The session acks only need to track the backup id of the
|
|
|
|
// update, so we can discard the blob and hint.
|
|
|
|
var b bytes.Buffer
|
|
|
|
err = committedUpdate.BackupID.Encode(&b)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, insert the ack into the sessionAcks sub-bucket.
|
|
|
|
return sessionAcks.Put(seqNumBuf[:], b.Bytes())
|
2020-10-26 16:06:32 +03:00
|
|
|
}, func() {})
|
2019-05-24 06:49:04 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// getClientSessionBody loads the body of a ClientSession from the sessions
|
|
|
|
// bucket corresponding to the serialized session id. This does not deserialize
|
|
|
|
// the CommittedUpdates or AckUpdates associated with the session. If the caller
|
|
|
|
// requires this info, use getClientSession.
|
2020-05-07 01:48:00 +03:00
|
|
|
func getClientSessionBody(sessions kvdb.RBucket,
|
2019-05-24 06:49:04 +03:00
|
|
|
idBytes []byte) (*ClientSession, error) {
|
|
|
|
|
2020-01-10 05:45:04 +03:00
|
|
|
sessionBkt := sessions.NestedReadBucket(idBytes)
|
2019-05-24 06:49:04 +03:00
|
|
|
if sessionBkt == nil {
|
|
|
|
return nil, ErrClientSessionNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should never have a sessionBkt without also having its body.
|
|
|
|
sessionBody := sessionBkt.Get(cSessionBody)
|
|
|
|
if sessionBody == nil {
|
|
|
|
return nil, ErrCorruptClientSession
|
|
|
|
}
|
|
|
|
|
|
|
|
var session ClientSession
|
|
|
|
copy(session.ID[:], idBytes)
|
|
|
|
|
|
|
|
err := session.Decode(bytes.NewReader(sessionBody))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &session, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getClientSession loads the full ClientSession associated with the serialized
|
|
|
|
// session id. This method populates the CommittedUpdates and AckUpdates in
|
|
|
|
// addition to the ClientSession's body.
|
2020-05-07 01:48:00 +03:00
|
|
|
func getClientSession(sessions kvdb.RBucket,
|
2019-05-24 06:49:04 +03:00
|
|
|
idBytes []byte) (*ClientSession, error) {
|
|
|
|
|
|
|
|
session, err := getClientSessionBody(sessions, idBytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the committed updates for this session.
|
|
|
|
commitedUpdates, err := getClientSessionCommits(sessions, idBytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the acked updates for this session.
|
|
|
|
ackedUpdates, err := getClientSessionAcks(sessions, idBytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
session.CommittedUpdates = commitedUpdates
|
|
|
|
session.AckedUpdates = ackedUpdates
|
|
|
|
|
|
|
|
return session, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getClientSessionCommits retrieves all committed updates for the session
|
|
|
|
// identified by the serialized session id.
|
2020-05-07 01:48:00 +03:00
|
|
|
func getClientSessionCommits(sessions kvdb.RBucket,
|
2019-05-24 06:49:04 +03:00
|
|
|
idBytes []byte) ([]CommittedUpdate, error) {
|
|
|
|
|
|
|
|
// Can't fail because client session body has already been read.
|
2020-01-10 05:45:04 +03:00
|
|
|
sessionBkt := sessions.NestedReadBucket(idBytes)
|
2019-05-24 06:49:04 +03:00
|
|
|
|
|
|
|
// Initialize commitedUpdates so that we can return an initialized map
|
|
|
|
// if no committed updates exist.
|
|
|
|
committedUpdates := make([]CommittedUpdate, 0)
|
|
|
|
|
2020-01-10 05:45:04 +03:00
|
|
|
sessionCommits := sessionBkt.NestedReadBucket(cSessionCommits)
|
2019-05-24 06:49:04 +03:00
|
|
|
if sessionCommits == nil {
|
|
|
|
return committedUpdates, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
err := sessionCommits.ForEach(func(k, v []byte) error {
|
|
|
|
var committedUpdate CommittedUpdate
|
|
|
|
err := committedUpdate.Decode(bytes.NewReader(v))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
committedUpdate.SeqNum = byteOrder.Uint16(k)
|
|
|
|
|
|
|
|
committedUpdates = append(committedUpdates, committedUpdate)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return committedUpdates, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getClientSessionAcks retrieves all acked updates for the session identified
|
|
|
|
// by the serialized session id.
|
2020-05-07 01:48:00 +03:00
|
|
|
func getClientSessionAcks(sessions kvdb.RBucket,
|
2019-05-24 06:49:04 +03:00
|
|
|
idBytes []byte) (map[uint16]BackupID, error) {
|
|
|
|
|
|
|
|
// Can't fail because client session body has already been read.
|
2020-01-10 05:45:04 +03:00
|
|
|
sessionBkt := sessions.NestedReadBucket(idBytes)
|
2019-05-24 06:49:04 +03:00
|
|
|
|
|
|
|
// Initialize ackedUpdates so that we can return an initialized map if
|
|
|
|
// no acked updates exist.
|
|
|
|
ackedUpdates := make(map[uint16]BackupID)
|
|
|
|
|
2020-01-10 05:45:04 +03:00
|
|
|
sessionAcks := sessionBkt.NestedReadBucket(cSessionAcks)
|
2019-05-24 06:49:04 +03:00
|
|
|
if sessionAcks == nil {
|
|
|
|
return ackedUpdates, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
err := sessionAcks.ForEach(func(k, v []byte) error {
|
|
|
|
seqNum := byteOrder.Uint16(k)
|
|
|
|
|
|
|
|
var backupID BackupID
|
|
|
|
err := backupID.Decode(bytes.NewReader(v))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
ackedUpdates[seqNum] = backupID
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return ackedUpdates, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// putClientSessionBody stores the body of the ClientSession (everything but the
|
|
|
|
// CommittedUpdates and AckedUpdates).
|
2020-01-10 05:45:04 +03:00
|
|
|
func putClientSessionBody(sessions kvdb.RwBucket,
|
2019-05-24 06:49:04 +03:00
|
|
|
session *ClientSession) error {
|
|
|
|
|
|
|
|
sessionBkt, err := sessions.CreateBucketIfNotExists(session.ID[:])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var b bytes.Buffer
|
|
|
|
err = session.Encode(&b)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return sessionBkt.Put(cSessionBody, b.Bytes())
|
|
|
|
}
|
|
|
|
|
2019-06-08 03:45:11 +03:00
|
|
|
// markSessionStatus updates the persisted state of the session to the new
|
|
|
|
// status.
|
2020-01-10 05:45:04 +03:00
|
|
|
func markSessionStatus(sessions kvdb.RwBucket, session *ClientSession,
|
2019-06-08 03:45:11 +03:00
|
|
|
status CSessionStatus) error {
|
|
|
|
|
|
|
|
session.Status = status
|
|
|
|
return putClientSessionBody(sessions, session)
|
|
|
|
}
|
|
|
|
|
2019-05-24 06:49:04 +03:00
|
|
|
// getChanSummary loads a ClientChanSummary for the passed chanID.
|
2020-05-07 01:48:00 +03:00
|
|
|
func getChanSummary(chanSummaries kvdb.RBucket,
|
2019-05-24 06:49:04 +03:00
|
|
|
chanID lnwire.ChannelID) (*ClientChanSummary, error) {
|
|
|
|
|
|
|
|
chanSummaryBytes := chanSummaries.Get(chanID[:])
|
|
|
|
if chanSummaryBytes == nil {
|
|
|
|
return nil, ErrChannelNotRegistered
|
|
|
|
}
|
|
|
|
|
|
|
|
var summary ClientChanSummary
|
|
|
|
err := summary.Decode(bytes.NewReader(chanSummaryBytes))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &summary, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// putChanSummary stores a ClientChanSummary for the passed chanID.
|
2020-01-10 05:45:04 +03:00
|
|
|
func putChanSummary(chanSummaries kvdb.RwBucket, chanID lnwire.ChannelID,
|
2019-05-24 06:49:04 +03:00
|
|
|
summary *ClientChanSummary) error {
|
|
|
|
|
|
|
|
var b bytes.Buffer
|
|
|
|
err := summary.Encode(&b)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return chanSummaries.Put(chanID[:], b.Bytes())
|
|
|
|
}
|
|
|
|
|
|
|
|
// getTower loads a Tower identified by its serialized tower id.
|
2020-05-07 01:48:00 +03:00
|
|
|
func getTower(towers kvdb.RBucket, id []byte) (*Tower, error) {
|
2019-05-24 06:49:04 +03:00
|
|
|
towerBytes := towers.Get(id)
|
|
|
|
if towerBytes == nil {
|
|
|
|
return nil, ErrTowerNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
var tower Tower
|
|
|
|
err := tower.Decode(bytes.NewReader(towerBytes))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
tower.ID = TowerIDFromBytes(id)
|
|
|
|
|
|
|
|
return &tower, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// putTower stores a Tower identified by its serialized tower id.
|
2020-01-10 05:45:04 +03:00
|
|
|
func putTower(towers kvdb.RwBucket, tower *Tower) error {
|
2019-05-24 06:49:04 +03:00
|
|
|
var b bytes.Buffer
|
|
|
|
err := tower.Encode(&b)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return towers.Put(tower.ID.Bytes(), b.Bytes())
|
|
|
|
}
|