2015-12-26 09:09:17 +03:00
package main
2016-02-23 05:24:56 +03:00
import (
2016-03-23 04:44:17 +03:00
"fmt"
2017-04-01 17:02:50 +03:00
"io/ioutil"
2016-12-15 05:11:31 +03:00
"net"
2016-03-22 23:30:54 +03:00
"os"
"path/filepath"
2017-04-01 17:02:50 +03:00
"regexp"
2016-03-23 04:44:17 +03:00
"sort"
2016-06-21 07:42:07 +03:00
"strconv"
2016-03-23 04:44:17 +03:00
"strings"
2017-05-18 21:48:59 +03:00
"time"
2016-03-22 23:30:54 +03:00
2016-06-21 07:42:07 +03:00
flags "github.com/btcsuite/go-flags"
2016-12-15 05:11:31 +03:00
"github.com/lightningnetwork/lnd/brontide"
"github.com/lightningnetwork/lnd/lnwire"
"github.com/roasbeef/btcd/btcec"
2016-05-15 17:17:44 +03:00
"github.com/roasbeef/btcutil"
2016-02-23 05:24:56 +03:00
)
const (
2016-10-15 16:45:51 +03:00
defaultConfigFilename = "lnd.conf"
defaultDataDirname = "data"
2017-07-26 02:22:06 +03:00
defaultTLSCertFilename = "tls.cert"
defaultTLSKeyFilename = "tls.key"
2017-08-18 04:50:57 +03:00
defaultAdminMacFilename = "admin.macaroon"
defaultReadMacFilename = "readonly.macaroon"
2016-10-15 16:45:51 +03:00
defaultLogLevel = "info"
defaultLogDirname = "logs"
defaultLogFilename = "lnd.log"
defaultRPCPort = 10009
2017-06-10 04:19:14 +03:00
defaultRESTPort = 8080
2017-03-30 07:16:16 +03:00
defaultPeerPort = 5656
2016-10-15 16:45:51 +03:00
defaultRPCHost = "localhost"
defaultMaxPendingChannels = 1
2017-07-31 06:21:45 +03:00
defaultNumChanConfs = 1
2016-02-23 05:24:56 +03:00
)
var (
2017-08-18 04:50:57 +03:00
lndHomeDir = btcutil . AppDataDir ( "lnd" , false )
defaultConfigFile = filepath . Join ( lndHomeDir , defaultConfigFilename )
defaultDataDir = filepath . Join ( lndHomeDir , defaultDataDirname )
defaultTLSCertPath = filepath . Join ( lndHomeDir , defaultTLSCertFilename )
defaultTLSKeyPath = filepath . Join ( lndHomeDir , defaultTLSKeyFilename )
defaultAdminMacPath = filepath . Join ( lndHomeDir , defaultAdminMacFilename )
defaultReadMacPath = filepath . Join ( lndHomeDir , defaultReadMacFilename )
defaultLogDir = filepath . Join ( lndHomeDir , defaultLogDirname )
2016-03-23 04:44:17 +03:00
2017-05-03 05:23:24 +03:00
btcdHomeDir = btcutil . AppDataDir ( "btcd" , false )
defaultBtcdRPCCertFile = filepath . Join ( btcdHomeDir , "rpc.cert" )
ltcdHomeDir = btcutil . AppDataDir ( "ltcd" , false )
defaultLtcdRPCCertFile = filepath . Join ( ltcdHomeDir , "rpc.cert" )
2016-02-23 05:24:56 +03:00
)
2017-05-03 05:23:24 +03:00
type chainConfig struct {
2017-08-11 07:26:48 +03:00
Active bool ` long:"active" description:"If the chain should be active or not." `
2017-05-03 05:23:24 +03:00
ChainDir string ` long:"chaindir" description:"The directory to store the chains's data within." `
RPCHost string ` long:"rpchost" description:"The daemon's rpc listening address. If a port is omitted, then the default port for the selected chain parameters will be used." `
RPCUser string ` long:"rpcuser" description:"Username for RPC connections" `
RPCPass string ` long:"rpcpass" default-mask:"-" description:"Password for RPC connections" `
RPCCert string ` long:"rpccert" description:"File containing the daemon's certificate file" `
RawRPCCert string ` long:"rawrpccert" description:"The raw bytes of the daemon's PEM-encoded certificate chain which will be used to authenticate the RPC connection." `
TestNet3 bool ` long:"testnet" description:"Use the test network" `
SimNet bool ` long:"simnet" description:"Use the simulation test network" `
2017-07-12 02:54:43 +03:00
RegTest bool ` long:"regtest" description:"Use the regression test network" `
2017-05-03 05:23:24 +03:00
}
2017-06-06 01:44:18 +03:00
type neutrinoConfig struct {
2017-08-11 07:26:48 +03:00
Active bool ` long:"active" description:"If SPV mode should be active or not." `
2017-05-18 21:48:59 +03:00
AddPeers [ ] string ` short:"a" long:"addpeer" description:"Add a peer to connect with at startup" `
ConnectPeers [ ] string ` long:"connect" description:"Connect only to the specified peers at startup" `
MaxPeers int ` long:"maxpeers" description:"Max number of inbound and outbound peers" `
BanDuration time . Duration ` long:"banduration" description:"How long to ban misbehaving peers. Valid time units are { s, m, h}. Minimum 1 second" `
BanThreshold uint32 ` long:"banthreshold" description:"Maximum allowed ban score before disconnecting and banning misbehaving peers." `
}
2017-08-11 07:26:48 +03:00
type autoPilotConfig struct {
// TODO(roasbeef): add
Active bool ` long:"active" description:"If the autopilot agent should be active or not." `
MaxChannels int ` long:"maxchannels" description:"The maximum number of channels that should be created" `
Allocation float64 ` long:"allocation" description:"The percentage of total funds that should be committed to automatic channel establishment" `
}
2016-06-21 07:42:07 +03:00
// config defines the configuration options for lnd.
2016-03-23 04:44:17 +03:00
//
// See loadConfig for further details regarding the configuration
// loading+parsing process.
2016-02-23 05:24:56 +03:00
type config struct {
2016-03-23 04:44:17 +03:00
ShowVersion bool ` short:"V" long:"version" description:"Display version information and exit" `
2017-08-18 04:50:57 +03:00
ConfigFile string ` long:"C" long:"configfile" description:"Path to configuration file" `
DataDir string ` short:"b" long:"datadir" description:"The directory to store lnd's data within" `
TLSCertPath string ` long:"tlscertpath" description:"Path to TLS certificate for lnd's RPC and REST services" `
TLSKeyPath string ` long:"tlskeypath" description:"Path to TLS private key for lnd's RPC and REST services" `
NoMacaroons bool ` long:"no-macaroons" description:"Disable macaroon authentication" `
AdminMacPath string ` long:"adminmacaroonpath" description:"Path to write the admin macaroon for lnd's RPC and REST services if it doesn't exist" `
ReadMacPath string ` long:"readonlymacaroonpath" description:"Path to write the read-only macaroon for lnd's RPC and REST services if it doesn't exist" `
LogDir string ` long:"logdir" description:"Directory to log output." `
2016-03-23 04:44:17 +03:00
2017-04-04 15:28:05 +03:00
Listeners [ ] string ` long:"listen" description:"Add an interface/port to listen for connections (default all interfaces port: 5656)" `
2016-03-23 04:44:17 +03:00
ExternalIPs [ ] string ` long:"externalip" description:"Add an ip to the list of local addresses we claim to listen on to peers" `
DebugLevel string ` short:"d" long:"debuglevel" description:"Logging level for all subsystems { trace, debug, info, warn, error, critical} -- You may also specify <subsystem>=<level>,<subsystem2>=<level>,... to set the log level for individual subsystems -- Use show to list available subsystems" `
2016-06-21 07:42:07 +03:00
Profile string ` long:"profile" description:"Enable HTTP profiling on given port -- NOTE port must be between 1024 and 65536" `
2017-05-03 05:23:24 +03:00
PeerPort int ` long:"peerport" description:"The port to listen on for incoming p2p connections" `
RPCPort int ` long:"rpcport" description:"The port for the rpc server" `
2017-06-10 04:19:14 +03:00
RESTPort int ` long:"restport" description:"The port for the REST server" `
2017-05-03 05:23:24 +03:00
DebugHTLC bool ` long:"debughtlc" description:"Activate the debug htlc mode. With the debug HTLC mode, all payments sent use a pre-determined R-Hash. Additionally, all HTLCs sent to a node with the debug HTLC R-Hash are immediately settled in the next available state transition." `
MaxPendingChannels int ` long:"maxpendingchannels" description:"The maximum number of incoming pending channels permitted per peer." `
Litecoin * chainConfig ` group:"Litecoin" namespace:"litecoin" `
Bitcoin * chainConfig ` group:"Bitcoin" namespace:"bitcoin" `
2017-05-18 21:48:59 +03:00
2017-07-31 06:21:45 +03:00
DefaultNumChanConfs int ` long:"defaultchanconfs" description:"The default number of confirmations a channel must have before it's considered open." `
2017-06-06 01:44:18 +03:00
NeutrinoMode * neutrinoConfig ` group:"neutrino" namespace:"neutrino" `
2017-08-11 07:26:48 +03:00
Autopilot * autoPilotConfig ` group:"autopilot" namespace:"autopilot" `
2016-02-23 05:24:56 +03:00
}
// loadConfig initializes and parses the config using a config file and command
// line options.
//
// The configuration proceeds as follows:
// 1) Start with a default config with sane settings
// 2) Pre-parse the command line to check for an alternative config file
// 3) Load configuration file overwriting defaults with any specified options
// 4) Parse CLI options and overwrite/add any specified options
func loadConfig ( ) ( * config , error ) {
defaultCfg := config {
2017-07-31 06:21:45 +03:00
ConfigFile : defaultConfigFile ,
DataDir : defaultDataDir ,
DebugLevel : defaultLogLevel ,
2017-07-26 02:22:06 +03:00
TLSCertPath : defaultTLSCertPath ,
TLSKeyPath : defaultTLSKeyPath ,
2017-08-18 04:50:57 +03:00
AdminMacPath : defaultAdminMacPath ,
ReadMacPath : defaultReadMacPath ,
2017-07-31 06:21:45 +03:00
LogDir : defaultLogDir ,
PeerPort : defaultPeerPort ,
RPCPort : defaultRPCPort ,
RESTPort : defaultRESTPort ,
MaxPendingChannels : defaultMaxPendingChannels ,
DefaultNumChanConfs : defaultNumChanConfs ,
2017-05-03 05:23:24 +03:00
Bitcoin : & chainConfig {
2017-05-03 06:28:14 +03:00
RPCHost : defaultRPCHost ,
RPCCert : defaultBtcdRPCCertFile ,
2017-05-03 05:23:24 +03:00
} ,
Litecoin : & chainConfig {
2017-05-03 06:28:14 +03:00
RPCHost : defaultRPCHost ,
RPCCert : defaultLtcdRPCCertFile ,
2017-05-03 05:23:24 +03:00
} ,
2017-08-11 07:26:48 +03:00
Autopilot : & autoPilotConfig {
MaxChannels : 5 ,
Allocation : 0.6 ,
} ,
2016-02-23 05:24:56 +03:00
}
2016-03-23 04:44:17 +03:00
// Pre-parse the command line options to pick up an alternative config
// file.
2016-02-23 05:24:56 +03:00
preCfg := defaultCfg
2016-03-23 04:44:17 +03:00
if _ , err := flags . Parse ( & preCfg ) ; err != nil {
2016-02-23 05:24:56 +03:00
return nil , err
}
2016-03-23 04:44:17 +03:00
// Show the version and exit if the version flag was specified.
appName := filepath . Base ( os . Args [ 0 ] )
appName = strings . TrimSuffix ( appName , filepath . Ext ( appName ) )
usageMessage := fmt . Sprintf ( "Use %s -h to show usage" , appName )
if preCfg . ShowVersion {
fmt . Println ( appName , "version" , version ( ) )
os . Exit ( 0 )
}
// Create the home directory if it doesn't already exist.
funcName := "loadConfig"
if err := os . MkdirAll ( lndHomeDir , 0700 ) ; err != nil {
// Show a nicer error message if it's because a symlink is
// linked to a directory that does not exist (probably because
// it's not mounted).
if e , ok := err . ( * os . PathError ) ; ok && os . IsExist ( err ) {
if link , lerr := os . Readlink ( e . Path ) ; lerr == nil {
str := "is symlink %s -> %s mounted?"
err = fmt . Errorf ( str , e . Path , link )
}
}
str := "%s: Failed to create home directory: %v"
err := fmt . Errorf ( str , funcName , err )
fmt . Fprintln ( os . Stderr , err )
return nil , err
}
// Next, load any additional configuration options from the file.
2017-06-19 17:44:26 +03:00
var configFileError error
2016-02-23 05:24:56 +03:00
cfg := defaultCfg
2016-03-23 04:44:17 +03:00
if err := flags . IniParse ( preCfg . ConfigFile , & cfg ) ; err != nil {
2017-06-19 17:44:26 +03:00
configFileError = err
2016-03-23 04:44:17 +03:00
}
// Finally, parse the remaining command line options again to ensure
// they take precedence.
if _ , err := flags . Parse ( & cfg ) ; err != nil {
return nil , err
}
2017-05-03 05:23:24 +03:00
// At this moment, multiple active chains are not supported.
if cfg . Litecoin . Active && cfg . Bitcoin . Active {
str := "%s: Currently both Bitcoin and Litecoin cannot be " +
"active together"
2016-03-23 04:44:17 +03:00
err := fmt . Errorf ( str , funcName )
2016-02-23 05:24:56 +03:00
return nil , err
}
2016-03-23 04:44:17 +03:00
2017-05-18 21:48:59 +03:00
// The SPV mode implemented currently doesn't support Litecoin, so the
// two modes are incompatible.
2017-06-06 01:44:18 +03:00
if cfg . NeutrinoMode . Active && cfg . Litecoin . Active {
2017-05-18 21:48:59 +03:00
str := "%s: The light client mode currently supported does " +
"not yet support execution on the Litecoin network"
err := fmt . Errorf ( str , funcName )
return nil , err
}
2017-05-03 05:23:24 +03:00
if cfg . Litecoin . Active {
if cfg . Litecoin . SimNet {
str := "%s: simnet mode for litecoin not currently supported"
return nil , fmt . Errorf ( str , funcName )
}
// The litecoin chain is the current active chain. However
// throuhgout the codebase we required chiancfg.Params. So as a
// temporary hack, we'll mutate the default net params for
// bitcoin with the litecoin specific informat.ion
paramCopy := bitcoinTestNetParams
applyLitecoinParams ( & paramCopy )
activeNetParams = paramCopy
2017-06-06 01:44:18 +03:00
if ! cfg . NeutrinoMode . Active {
2017-05-18 21:48:59 +03:00
// Attempt to parse out the RPC credentials for the
// litecoin chain if the information wasn't specified
err := parseRPCParams ( cfg . Litecoin , litecoinChain , funcName )
if err != nil {
err := fmt . Errorf ( "unable to load RPC credentials for " +
"ltcd: %v" , err )
return nil , err
}
2017-05-03 05:23:24 +03:00
}
2017-05-18 21:48:59 +03:00
2017-05-03 06:28:14 +03:00
cfg . Litecoin . ChainDir = filepath . Join ( cfg . DataDir , litecoinChain . String ( ) )
2017-05-03 05:23:24 +03:00
// Finally we'll register the litecoin chain as our current
// primary chain.
registeredChains . RegisterPrimaryChain ( litecoinChain )
}
if cfg . Bitcoin . Active {
// Multiple networks can't be selected simultaneously. Count
// number of network flags passed; assign active network params
// while we're at it.
numNets := 0
if cfg . Bitcoin . TestNet3 {
numNets ++
activeNetParams = bitcoinTestNetParams
}
2017-07-12 02:54:43 +03:00
if cfg . Bitcoin . RegTest {
numNets ++
activeNetParams = regTestNetParams
}
2017-05-03 05:23:24 +03:00
if cfg . Bitcoin . SimNet {
activeNetParams = bitcoinSimNetParams
}
if numNets > 1 {
str := "%s: The testnet, segnet, and simnet params can't be " +
"used together -- choose one of the three"
err := fmt . Errorf ( str , funcName )
return nil , err
}
2017-06-06 01:44:18 +03:00
if ! cfg . NeutrinoMode . Active {
2017-05-18 21:48:59 +03:00
// If needed, we'll attempt to automatically configure
// the RPC control plan for the target btcd node.
err := parseRPCParams ( cfg . Bitcoin , bitcoinChain , funcName )
if err != nil {
err := fmt . Errorf ( "unable to load RPC credentials for " +
"btcd: %v" , err )
return nil , err
}
2017-05-03 05:23:24 +03:00
}
2017-05-18 21:48:59 +03:00
2017-05-03 06:28:14 +03:00
cfg . Bitcoin . ChainDir = filepath . Join ( cfg . DataDir , bitcoinChain . String ( ) )
2017-05-03 05:23:24 +03:00
// Finally we'll register the bitcoin chain as our current
// primary chain.
registeredChains . RegisterPrimaryChain ( bitcoinChain )
}
2017-01-13 08:01:50 +03:00
// Validate profile port number.
2016-06-21 07:42:07 +03:00
if cfg . Profile != "" {
profilePort , err := strconv . Atoi ( cfg . Profile )
if err != nil || profilePort < 1024 || profilePort > 65535 {
str := "%s: The profile port must be between 1024 and 65535"
err := fmt . Errorf ( str , funcName )
fmt . Fprintln ( os . Stderr , err )
fmt . Fprintln ( os . Stderr , usageMessage )
return nil , err
}
}
2016-03-23 04:44:17 +03:00
// Append the network type to the data directory so it is "namespaced"
2016-06-21 07:42:07 +03:00
// per network. In addition to the block database, there are other
2016-03-23 04:44:17 +03:00
// pieces of data that are saved to disk such as address manager state.
// All data is specific to a network, so namespacing the data directory
// means each individual piece of serialized data does not have to
// worry about changing names per network and such.
2017-05-03 05:23:24 +03:00
// TODO(roasbeef): when we go full multi-chain remove the additional
// namespacing on the target chain.
2016-03-23 04:44:17 +03:00
cfg . DataDir = cleanAndExpandPath ( cfg . DataDir )
cfg . DataDir = filepath . Join ( cfg . DataDir , activeNetParams . Name )
2017-05-03 05:23:24 +03:00
cfg . DataDir = filepath . Join ( cfg . DataDir ,
registeredChains . primaryChain . String ( ) )
2016-03-23 04:44:17 +03:00
// Append the network type to the log directory so it is "namespaced"
// per network in the same fashion as the data directory.
cfg . LogDir = cleanAndExpandPath ( cfg . LogDir )
cfg . LogDir = filepath . Join ( cfg . LogDir , activeNetParams . Name )
2017-05-03 05:23:24 +03:00
cfg . LogDir = filepath . Join ( cfg . LogDir ,
registeredChains . primaryChain . String ( ) )
2016-03-23 04:44:17 +03:00
2017-07-26 02:22:06 +03:00
// Ensure that the paths to the TLS key and certificate files are
// expanded and cleaned.
cfg . TLSCertPath = cleanAndExpandPath ( cfg . TLSCertPath )
cfg . TLSKeyPath = cleanAndExpandPath ( cfg . TLSKeyPath )
2016-03-23 04:44:17 +03:00
// Initialize logging at the default logging level.
2017-06-21 18:07:44 +03:00
initLogRotator ( filepath . Join ( cfg . LogDir , defaultLogFilename ) )
2016-03-23 04:44:17 +03:00
// Parse, validate, and set debug log level(s).
if err := parseAndSetDebugLevels ( cfg . DebugLevel ) ; err != nil {
err := fmt . Errorf ( "%s: %v" , funcName , err . Error ( ) )
fmt . Fprintln ( os . Stderr , err )
fmt . Fprintln ( os . Stderr , usageMessage )
return nil , err
}
2017-06-19 17:44:26 +03:00
// Warn about missing config file only after all other configuration is
// done. This prevents the warning on help messages and invalid
// options. Note this should go directly before the return.
if configFileError != nil {
ltndLog . Warnf ( "%v" , configFileError )
}
2016-03-23 04:44:17 +03:00
return & cfg , nil
}
// cleanAndExpandPath expands environment variables and leading ~ in the
// passed path, cleans the result, and returns it.
2017-07-26 02:22:06 +03:00
// This function is taken from https://github.com/btcsuite/btcd
2016-03-23 04:44:17 +03:00
func cleanAndExpandPath ( path string ) string {
// Expand initial ~ to OS specific home directory.
if strings . HasPrefix ( path , "~" ) {
homeDir := filepath . Dir ( lndHomeDir )
path = strings . Replace ( path , "~" , homeDir , 1 )
}
// NOTE: The os.ExpandEnv doesn't work with Windows-style %VARIABLE%,
2017-01-13 08:01:50 +03:00
// but the variables can still be expanded via POSIX-style $VARIABLE.
2016-03-23 04:44:17 +03:00
return filepath . Clean ( os . ExpandEnv ( path ) )
}
// parseAndSetDebugLevels attempts to parse the specified debug level and set
2016-06-21 07:42:07 +03:00
// the levels accordingly. An appropriate error is returned if anything is
2016-03-23 04:44:17 +03:00
// invalid.
func parseAndSetDebugLevels ( debugLevel string ) error {
// When the specified string doesn't have any delimters, treat it as
// the log level for all subsystems.
if ! strings . Contains ( debugLevel , "," ) && ! strings . Contains ( debugLevel , "=" ) {
// Validate debug log level.
if ! validLogLevel ( debugLevel ) {
str := "The specified debug level [%v] is invalid"
return fmt . Errorf ( str , debugLevel )
}
// Change the logging level for all subsystems.
setLogLevels ( debugLevel )
return nil
}
// Split the specified string into subsystem/level pairs while detecting
// issues and update the log levels accordingly.
for _ , logLevelPair := range strings . Split ( debugLevel , "," ) {
if ! strings . Contains ( logLevelPair , "=" ) {
str := "The specified debug level contains an invalid " +
"subsystem/level pair [%v]"
return fmt . Errorf ( str , logLevelPair )
2016-02-23 05:24:56 +03:00
}
2016-03-23 04:44:17 +03:00
// Extract the specified subsystem and log level.
fields := strings . Split ( logLevelPair , "=" )
subsysID , logLevel := fields [ 0 ] , fields [ 1 ]
// Validate subsystem.
if _ , exists := subsystemLoggers [ subsysID ] ; ! exists {
str := "The specified subsystem [%v] is invalid -- " +
"supported subsytems %v"
return fmt . Errorf ( str , subsysID , supportedSubsystems ( ) )
2016-02-23 05:24:56 +03:00
}
2016-03-23 04:44:17 +03:00
// Validate log level.
if ! validLogLevel ( logLevel ) {
str := "The specified debug level [%v] is invalid"
return fmt . Errorf ( str , logLevel )
}
setLogLevel ( subsysID , logLevel )
2016-02-23 05:24:56 +03:00
}
2016-03-23 04:44:17 +03:00
return nil
}
// validLogLevel returns whether or not logLevel is a valid debug log level.
func validLogLevel ( logLevel string ) bool {
switch logLevel {
case "trace" :
fallthrough
case "debug" :
fallthrough
case "info" :
fallthrough
case "warn" :
fallthrough
case "error" :
fallthrough
case "critical" :
return true
}
return false
}
// supportedSubsystems returns a sorted slice of the supported subsystems for
// logging purposes.
func supportedSubsystems ( ) [ ] string {
// Convert the subsystemLoggers map keys to a slice.
subsystems := make ( [ ] string , 0 , len ( subsystemLoggers ) )
for subsysID := range subsystemLoggers {
subsystems = append ( subsystems , subsysID )
}
// Sort the subsystems for stable display.
sort . Strings ( subsystems )
return subsystems
2016-02-23 05:24:56 +03:00
}
2016-12-15 05:11:31 +03:00
// noiseDial is a factory function which creates a connmgr compliant dialing
// function by returning a closure which includes the server's identity key.
func noiseDial ( idPriv * btcec . PrivateKey ) func ( net . Addr ) ( net . Conn , error ) {
return func ( a net . Addr ) ( net . Conn , error ) {
lnAddr := a . ( * lnwire . NetAddress )
return brontide . Dial ( idPriv , lnAddr )
}
}
2017-04-01 17:02:50 +03:00
2017-05-03 05:23:24 +03:00
func parseRPCParams ( cConfig * chainConfig , net chainCode , funcName string ) error {
// If the rpcuser and rpcpass paramters aren't set, then we'll attempt
// to automatically obtain the properm mcredentials for btcd and set
// them within the configuration.
if cConfig . RPCUser != "" || cConfig . RPCPass != "" {
return nil
}
// If we're in simnet mode, then the running btcd instance won't read
// the RPC credentials from the configuration. So if lnd wasn't
// specified the paramters, then we won't be able to start.
if cConfig . SimNet {
str := "%v: rpcuser and rpcpass must be set to your btcd " +
"node's RPC paramters"
return fmt . Errorf ( str , funcName )
}
daemonName := "btcd"
if net == litecoinChain {
daemonName = "ltcd"
}
fmt . Println ( "Attempting automatic RPC configuration to " + daemonName )
homeDir := btcdHomeDir
if net == litecoinChain {
homeDir = ltcdHomeDir
}
confFile := filepath . Join ( homeDir , fmt . Sprintf ( "%v.conf" , daemonName ) )
rpcUser , rpcPass , err := extractRPCParams ( confFile )
if err != nil {
return fmt . Errorf ( "unable to extract RPC " +
"credentials: %v, cannot start w/o RPC connection" ,
err )
}
fmt . Printf ( "Automatically obtained %v's RPC credentials\n" , daemonName )
cConfig . RPCUser , cConfig . RPCPass = rpcUser , rpcPass
return nil
}
2017-04-01 17:02:50 +03:00
// extractRPCParams attempts to extract the RPC credentials for an existing
// btcd instance. The passed path is expected to be the location of btcd's
// application data directory on the target system.
func extractRPCParams ( btcdConfigPath string ) ( string , string , error ) {
// First, we'll open up the btcd configuration file found at the target
// destination.
btcdConfigFile , err := os . Open ( btcdConfigPath )
if err != nil {
return "" , "" , err
}
defer btcdConfigFile . Close ( )
// With the file open extract the contents of the configuration file so
// we can attempt o locate the RPC credentials.
configContents , err := ioutil . ReadAll ( btcdConfigFile )
if err != nil {
return "" , "" , err
}
// Attempt to locate the RPC user using a regular expression. If we
// don't have a match for our regular expression then we'll exit with
// an error.
rpcUserRegexp , err := regexp . Compile ( ` (?m)^\s*rpcuser=([^\s]+) ` )
if err != nil {
return "" , "" , err
}
userSubmatches := rpcUserRegexp . FindSubmatch ( configContents )
if userSubmatches == nil {
return "" , "" , fmt . Errorf ( "unable to find rpcuser in config" )
}
// Similarly, we'll use another regular expression to find the set
// rpcpass (if any). If we can't find the pass, then we'll exit with an
// error.
rpcPassRegexp , err := regexp . Compile ( ` (?m)^\s*rpcpass=([^\s]+) ` )
if err != nil {
return "" , "" , err
}
passSubmatches := rpcPassRegexp . FindSubmatch ( configContents )
if passSubmatches == nil {
return "" , "" , fmt . Errorf ( "unable to find rpcuser in config" )
}
return string ( userSubmatches [ 1 ] ) , string ( passSubmatches [ 1 ] ) , nil
}