2015-12-30 05:31:03 +03:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2017-08-18 04:51:33 +03:00
|
|
|
"io/ioutil"
|
2015-12-30 05:31:03 +03:00
|
|
|
"os"
|
2017-07-26 02:22:06 +03:00
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
2017-08-18 04:51:33 +03:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"gopkg.in/macaroon-bakery.v1/bakery/checkers"
|
|
|
|
"gopkg.in/macaroon.v1"
|
2015-12-30 05:31:03 +03:00
|
|
|
|
2016-01-16 21:45:54 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnrpc"
|
2017-08-18 04:51:33 +03:00
|
|
|
"github.com/lightningnetwork/lnd/macaroons"
|
2017-07-26 02:22:06 +03:00
|
|
|
"github.com/roasbeef/btcutil"
|
2016-07-26 20:42:35 +03:00
|
|
|
"github.com/urfave/cli"
|
2015-12-30 05:31:03 +03:00
|
|
|
|
|
|
|
"google.golang.org/grpc"
|
2017-07-26 02:22:06 +03:00
|
|
|
"google.golang.org/grpc/credentials"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2017-08-18 04:51:33 +03:00
|
|
|
defaultTLSCertFilename = "tls.cert"
|
|
|
|
defaultMacaroonFilename = "admin.macaroon"
|
2017-07-26 02:22:06 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2017-08-18 04:51:33 +03:00
|
|
|
lndHomeDir = btcutil.AppDataDir("lnd", false)
|
|
|
|
defaultTLSCertPath = filepath.Join(lndHomeDir, defaultTLSCertFilename)
|
|
|
|
defaultMacaroonPath = filepath.Join(lndHomeDir, defaultMacaroonFilename)
|
2015-12-30 05:31:03 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
func fatal(err error) {
|
|
|
|
fmt.Fprintf(os.Stderr, "[lncli] %v\n", err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
|
2017-01-30 01:51:30 +03:00
|
|
|
func getClient(ctx *cli.Context) (lnrpc.LightningClient, func()) {
|
2015-12-30 05:31:03 +03:00
|
|
|
conn := getClientConn(ctx)
|
2017-01-30 01:51:30 +03:00
|
|
|
|
|
|
|
cleanUp := func() {
|
|
|
|
conn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
return lnrpc.NewLightningClient(conn), cleanUp
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func getClientConn(ctx *cli.Context) *grpc.ClientConn {
|
2017-08-18 04:51:33 +03:00
|
|
|
// Load the specified TLS certificate and build transport credentials
|
|
|
|
// with it.
|
|
|
|
tlsCertPath := cleanAndExpandPath(ctx.GlobalString("tlscertpath"))
|
|
|
|
creds, err := credentials.NewClientTLSFromFile(tlsCertPath, "")
|
|
|
|
if err != nil {
|
2017-07-26 02:22:06 +03:00
|
|
|
fatal(err)
|
|
|
|
}
|
2017-08-18 04:51:33 +03:00
|
|
|
|
|
|
|
// Create a dial options array.
|
|
|
|
opts := []grpc.DialOption{
|
|
|
|
grpc.WithTransportCredentials(creds),
|
2017-07-26 02:22:06 +03:00
|
|
|
}
|
2017-08-18 04:51:33 +03:00
|
|
|
|
|
|
|
// Only process macaroon credentials if --no-macaroons isn't set.
|
|
|
|
if !ctx.GlobalBool("no-macaroons") {
|
|
|
|
// Load the specified macaroon file.
|
|
|
|
macPath := cleanAndExpandPath(ctx.GlobalString("macaroonpath"))
|
|
|
|
macBytes, err := ioutil.ReadFile(macPath)
|
|
|
|
if err != nil {
|
|
|
|
fatal(err)
|
|
|
|
}
|
|
|
|
mac := &macaroon.Macaroon{}
|
|
|
|
if err = mac.UnmarshalBinary(macBytes); err != nil {
|
|
|
|
fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We add a time-based constraint to prevent replay of the
|
|
|
|
// macaroon. It's good for 60 seconds by default to make up for
|
|
|
|
// any discrepancy between client and server clocks, but leaking
|
|
|
|
// the macaroon before it becomes invalid makes it possible for
|
|
|
|
// an attacker to reuse the macaroon. In addition, the validity
|
|
|
|
// time of the macaroon is extended by the time the server clock
|
|
|
|
// is behind the client clock, or shortened by the time the
|
|
|
|
// server clock is ahead of the client clock (or invalid
|
|
|
|
// altogether if, in the latter case, this time is more than 60
|
|
|
|
// seconds).
|
|
|
|
// TODO(aakselrod): add better anti-replay protection.
|
|
|
|
macaroonTimeout := time.Duration(ctx.GlobalInt64("macaroontimeout"))
|
|
|
|
requestTimeout := time.Now().Add(time.Second * macaroonTimeout)
|
|
|
|
timeCaveat := checkers.TimeBeforeCaveat(requestTimeout)
|
|
|
|
mac.AddFirstPartyCaveat(timeCaveat.Condition)
|
|
|
|
|
|
|
|
// Now we append the macaroon credentials to the dial options.
|
|
|
|
opts = append(
|
|
|
|
opts,
|
|
|
|
grpc.WithPerRPCCredentials(
|
|
|
|
macaroons.NewMacaroonCredential(mac)),
|
|
|
|
)
|
2017-07-26 02:22:06 +03:00
|
|
|
}
|
2015-12-30 05:31:03 +03:00
|
|
|
|
|
|
|
conn, err := grpc.Dial(ctx.GlobalString("rpcserver"), opts...)
|
|
|
|
if err != nil {
|
|
|
|
fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return conn
|
|
|
|
}
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
app := cli.NewApp()
|
|
|
|
app.Name = "lncli"
|
2017-04-12 07:18:48 +03:00
|
|
|
app.Version = "0.2"
|
2016-12-28 02:45:10 +03:00
|
|
|
app.Usage = "control plane for your Lightning Network Daemon (lnd)"
|
2015-12-30 05:31:03 +03:00
|
|
|
app.Flags = []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "rpcserver",
|
2016-03-23 04:47:10 +03:00
|
|
|
Value: "localhost:10009",
|
2016-01-16 21:45:54 +03:00
|
|
|
Usage: "host:port of ln daemon",
|
2015-12-30 05:31:03 +03:00
|
|
|
},
|
2017-07-26 02:22:06 +03:00
|
|
|
cli.StringFlag{
|
|
|
|
Name: "tlscertpath",
|
|
|
|
Value: defaultTLSCertPath,
|
|
|
|
Usage: "path to TLS certificate",
|
|
|
|
},
|
2017-08-18 04:51:33 +03:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "no-macaroons",
|
|
|
|
Usage: "disable macaroon authentication",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "macaroonpath",
|
|
|
|
Value: defaultMacaroonPath,
|
|
|
|
Usage: "path to macaroon file",
|
|
|
|
},
|
|
|
|
cli.Int64Flag{
|
|
|
|
Name: "macaroontimeout",
|
|
|
|
Value: 60,
|
|
|
|
Usage: "anti-replay macaroon validity time in seconds",
|
|
|
|
},
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
|
|
|
app.Commands = []cli.Command{
|
2017-02-24 16:32:33 +03:00
|
|
|
newAddressCommand,
|
|
|
|
sendManyCommand,
|
|
|
|
sendCoinsCommand,
|
|
|
|
connectCommand,
|
2017-05-06 01:54:25 +03:00
|
|
|
disconnectCommand,
|
2017-02-24 16:32:33 +03:00
|
|
|
openChannelCommand,
|
|
|
|
closeChannelCommand,
|
|
|
|
listPeersCommand,
|
|
|
|
walletBalanceCommand,
|
|
|
|
channelBalanceCommand,
|
|
|
|
getInfoCommand,
|
|
|
|
pendingChannelsCommand,
|
|
|
|
sendPaymentCommand,
|
|
|
|
addInvoiceCommand,
|
|
|
|
lookupInvoiceCommand,
|
|
|
|
listInvoicesCommand,
|
|
|
|
listChannelsCommand,
|
|
|
|
listPaymentsCommand,
|
|
|
|
describeGraphCommand,
|
|
|
|
getChanInfoCommand,
|
|
|
|
getNodeInfoCommand,
|
2017-03-21 05:01:57 +03:00
|
|
|
queryRoutesCommand,
|
2017-02-24 16:32:33 +03:00
|
|
|
getNetworkInfoCommand,
|
|
|
|
debugLevelCommand,
|
|
|
|
decodePayReqComamnd,
|
2017-03-09 07:44:32 +03:00
|
|
|
listChainTxnsCommand,
|
2017-05-12 00:55:56 +03:00
|
|
|
stopCommand,
|
2017-04-20 05:33:09 +03:00
|
|
|
signMessageCommand,
|
|
|
|
verifyMessageCommand,
|
2015-12-30 05:31:03 +03:00
|
|
|
}
|
2016-01-17 06:10:29 +03:00
|
|
|
|
2015-12-30 05:31:03 +03:00
|
|
|
if err := app.Run(os.Args); err != nil {
|
|
|
|
fatal(err)
|
|
|
|
}
|
|
|
|
}
|
2017-07-26 02:22:06 +03:00
|
|
|
|
|
|
|
// cleanAndExpandPath expands environment variables and leading ~ in the
|
|
|
|
// passed path, cleans the result, and returns it.
|
|
|
|
// This function is taken from https://github.com/btcsuite/btcd
|
|
|
|
func cleanAndExpandPath(path string) string {
|
|
|
|
// Expand initial ~ to OS specific home directory.
|
|
|
|
if strings.HasPrefix(path, "~") {
|
|
|
|
homeDir := filepath.Dir(lndHomeDir)
|
|
|
|
path = strings.Replace(path, "~", homeDir, 1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// NOTE: The os.ExpandEnv doesn't work with Windows-style %VARIABLE%,
|
|
|
|
// but the variables can still be expanded via POSIX-style $VARIABLE.
|
|
|
|
return filepath.Clean(os.ExpandEnv(path))
|
|
|
|
}
|