kvdb: add timeout options for bbolt (#4787)
* mod: bump btcwallet version to accept db timeout * btcwallet: add DBTimeOut in config * kvdb: add database timeout option for bbolt This commit adds a DBTimeout option in bbolt config. The relevant functions walletdb.Open/Create are updated to use this config. In addition, the bolt compacter also applies the new timeout option. * channeldb: add DBTimeout in db options This commit adds the DBTimeout option for channeldb. A new unit test file is created to test the default options. In addition, the params used in kvdb.Create inside channeldb_test is updated with a DefaultDBTimeout value. * contractcourt+routing: use DBTimeout in kvdb This commit touches multiple test files in contractcourt and routing. The call of function kvdb.Create and kvdb.Open are now updated with the new param DBTimeout, using the default value kvdb.DefaultDBTimeout. * lncfg: add DBTimeout option in db config The DBTimeout option is added to db config. A new unit test is added to check the default DB config is created as expected. * migration: add DBTimeout param in kvdb.Create/kvdb.Open * keychain: update tests to use DBTimeout param * htlcswitch+chainreg: add DBTimeout option * macaroons: support DBTimeout config in creation This commit adds the DBTimeout during the creation of macaroons.db. The usage of kvdb.Create and kvdb.Open in its tests are updated with a timeout value using kvdb.DefaultDBTimeout. * walletunlocker: add dbTimeout option in UnlockerService This commit adds a new param, dbTimeout, during the creation of UnlockerService. This param is then passed to wallet.NewLoader inside various service calls, specifying a timeout value to be used when opening the bbolt. In addition, the macaroonService is also called with this dbTimeout param. * watchtower/wtdb: add dbTimeout param during creation This commit adds the dbTimeout param for the creation of both watchtower.db and wtclient.db. * multi: add db timeout param for walletdb.Create This commit adds the db timeout param for the function call walletdb.Create. It touches only the test files found in chainntnfs, lnwallet, and routing. * lnd: pass DBTimeout config to relevant services This commit enables lnd to pass the DBTimeout config to the following services/config/functions, - chainControlConfig - walletunlocker - wallet.NewLoader - macaroons - watchtower In addition, the usage of wallet.Create is updated too. * sample-config: add dbtimeout option
This commit is contained in:
parent
125dbbf0da
commit
582b164c46
@ -24,6 +24,7 @@ import (
|
|||||||
"github.com/btcsuite/btcwallet/chain"
|
"github.com/btcsuite/btcwallet/chain"
|
||||||
"github.com/btcsuite/btcwallet/walletdb"
|
"github.com/btcsuite/btcwallet/walletdb"
|
||||||
"github.com/lightninglabs/neutrino"
|
"github.com/lightninglabs/neutrino"
|
||||||
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@ -268,7 +269,9 @@ func NewNeutrinoBackend(t *testing.T, minerAddr string) (*neutrino.ChainService,
|
|||||||
}
|
}
|
||||||
|
|
||||||
dbName := filepath.Join(spvDir, "neutrino.db")
|
dbName := filepath.Join(spvDir, "neutrino.db")
|
||||||
spvDatabase, err := walletdb.Create("bdb", dbName, true)
|
spvDatabase, err := walletdb.Create(
|
||||||
|
"bdb", dbName, true, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
os.RemoveAll(spvDir)
|
os.RemoveAll(spvDir)
|
||||||
t.Fatalf("unable to create walletdb: %v", err)
|
t.Fatalf("unable to create walletdb: %v", err)
|
||||||
|
@ -101,6 +101,10 @@ type Config struct {
|
|||||||
// FeeURL defines the URL for fee estimation we will use. This field is
|
// FeeURL defines the URL for fee estimation we will use. This field is
|
||||||
// optional.
|
// optional.
|
||||||
FeeURL string
|
FeeURL string
|
||||||
|
|
||||||
|
// DBTimeOut specifies the timeout value to use when opening the wallet
|
||||||
|
// database.
|
||||||
|
DBTimeOut time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -273,6 +277,7 @@ func NewChainControl(cfg *Config) (*ChainControl, error) {
|
|||||||
NetParams: cfg.ActiveNetParams.Params,
|
NetParams: cfg.ActiveNetParams.Params,
|
||||||
CoinType: cfg.ActiveNetParams.CoinType,
|
CoinType: cfg.ActiveNetParams.CoinType,
|
||||||
Wallet: cfg.Wallet,
|
Wallet: cfg.Wallet,
|
||||||
|
DBTimeOut: cfg.DBTimeOut,
|
||||||
}
|
}
|
||||||
|
|
||||||
var err error
|
var err error
|
||||||
|
@ -244,6 +244,7 @@ func Open(dbPath string, modifiers ...OptionModifier) (*DB, error) {
|
|||||||
NoFreelistSync: opts.NoFreelistSync,
|
NoFreelistSync: opts.NoFreelistSync,
|
||||||
AutoCompact: opts.AutoCompact,
|
AutoCompact: opts.AutoCompact,
|
||||||
AutoCompactMinAge: opts.AutoCompactMinAge,
|
AutoCompactMinAge: opts.AutoCompactMinAge,
|
||||||
|
DBTimeout: opts.DBTimeout,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -808,7 +808,9 @@ func makeFwdPkgDB(t *testing.T, path string) kvdb.Backend { // nolint:unparam
|
|||||||
path = filepath.Join(path, "fwdpkg.db")
|
path = filepath.Join(path, "fwdpkg.db")
|
||||||
}
|
}
|
||||||
|
|
||||||
bdb, err := kvdb.Create(kvdb.BoltBackendName, path, true)
|
bdb, err := kvdb.Create(
|
||||||
|
kvdb.BoltBackendName, path, true, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unable to open boltdb: %v", err)
|
t.Fatalf("unable to open boltdb: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -64,6 +64,10 @@ type BoltBackendConfig struct {
|
|||||||
// since a bolt database file was last compacted for the compaction to
|
// since a bolt database file was last compacted for the compaction to
|
||||||
// be considered again.
|
// be considered again.
|
||||||
AutoCompactMinAge time.Duration
|
AutoCompactMinAge time.Duration
|
||||||
|
|
||||||
|
// DBTimeout specifies the timeout value to use when opening the wallet
|
||||||
|
// database.
|
||||||
|
DBTimeout time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetBoltBackend opens (or creates if doesn't exits) a bbolt backed database
|
// GetBoltBackend opens (or creates if doesn't exits) a bbolt backed database
|
||||||
@ -79,7 +83,10 @@ func GetBoltBackend(cfg *BoltBackendConfig) (Backend, error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return Create(BoltBackendName, dbFilePath, cfg.NoFreelistSync)
|
return Create(
|
||||||
|
BoltBackendName, dbFilePath,
|
||||||
|
cfg.NoFreelistSync, cfg.DBTimeout,
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
// This is an existing database. We might want to compact it on startup
|
// This is an existing database. We might want to compact it on startup
|
||||||
@ -90,7 +97,10 @@ func GetBoltBackend(cfg *BoltBackendConfig) (Backend, error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return Open(BoltBackendName, dbFilePath, cfg.NoFreelistSync)
|
return Open(
|
||||||
|
BoltBackendName, dbFilePath,
|
||||||
|
cfg.NoFreelistSync, cfg.DBTimeout,
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
// compactAndSwap will attempt to write a new temporary DB file to disk with
|
// compactAndSwap will attempt to write a new temporary DB file to disk with
|
||||||
@ -156,8 +166,9 @@ func compactAndSwap(cfg *BoltBackendConfig) error {
|
|||||||
_ = os.Remove(tempDestFilePath)
|
_ = os.Remove(tempDestFilePath)
|
||||||
}()
|
}()
|
||||||
c := &compacter{
|
c := &compacter{
|
||||||
srcPath: sourceFilePath,
|
srcPath: sourceFilePath,
|
||||||
dstPath: tempDestFilePath,
|
dstPath: tempDestFilePath,
|
||||||
|
dbTimeout: cfg.DBTimeout,
|
||||||
}
|
}
|
||||||
initialSize, newSize, err := c.execute()
|
initialSize, newSize, err := c.execute()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -235,6 +246,7 @@ func GetTestBackend(path, name string) (Backend, func(), error) {
|
|||||||
DBPath: path,
|
DBPath: path,
|
||||||
DBFileName: name,
|
DBFileName: name,
|
||||||
NoFreelistSync: true,
|
NoFreelistSync: true,
|
||||||
|
DBTimeout: DefaultDBTimeout,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
|
@ -8,6 +8,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
"path"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/lightningnetwork/lnd/healthcheck"
|
"github.com/lightningnetwork/lnd/healthcheck"
|
||||||
"go.etcd.io/bbolt"
|
"go.etcd.io/bbolt"
|
||||||
@ -38,6 +39,9 @@ type compacter struct {
|
|||||||
srcPath string
|
srcPath string
|
||||||
dstPath string
|
dstPath string
|
||||||
txMaxSize int64
|
txMaxSize int64
|
||||||
|
|
||||||
|
// dbTimeout specifies the timeout value used when opening the db.
|
||||||
|
dbTimeout time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
// execute opens the source and destination databases and then compacts the
|
// execute opens the source and destination databases and then compacts the
|
||||||
@ -79,6 +83,7 @@ func (cmd *compacter) execute() (int64, int64, error) {
|
|||||||
// possible freelist sync problems.
|
// possible freelist sync problems.
|
||||||
src, err := bbolt.Open(cmd.srcPath, 0444, &bbolt.Options{
|
src, err := bbolt.Open(cmd.srcPath, 0444, &bbolt.Options{
|
||||||
ReadOnly: true,
|
ReadOnly: true,
|
||||||
|
Timeout: cmd.dbTimeout,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, 0, fmt.Errorf("error opening source database: %v",
|
return 0, 0, fmt.Errorf("error opening source database: %v",
|
||||||
@ -91,7 +96,9 @@ func (cmd *compacter) execute() (int64, int64, error) {
|
|||||||
}()
|
}()
|
||||||
|
|
||||||
// Open destination database.
|
// Open destination database.
|
||||||
dst, err := bbolt.Open(cmd.dstPath, fi.Mode(), nil)
|
dst, err := bbolt.Open(cmd.dstPath, fi.Mode(), &bbolt.Options{
|
||||||
|
Timeout: cmd.dbTimeout,
|
||||||
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, 0, fmt.Errorf("error opening destination database: "+
|
return 0, 0, fmt.Errorf("error opening destination database: "+
|
||||||
"%v", err)
|
"%v", err)
|
||||||
|
@ -17,6 +17,10 @@ const (
|
|||||||
// have passed since a bolt database file was last compacted for the
|
// have passed since a bolt database file was last compacted for the
|
||||||
// compaction to be considered again.
|
// compaction to be considered again.
|
||||||
DefaultBoltAutoCompactMinAge = time.Hour * 24 * 7
|
DefaultBoltAutoCompactMinAge = time.Hour * 24 * 7
|
||||||
|
|
||||||
|
// DefaultDBTimeout specifies the default timeout value when opening
|
||||||
|
// the bbolt database.
|
||||||
|
DefaultDBTimeout = time.Second * 60
|
||||||
)
|
)
|
||||||
|
|
||||||
// BoltConfig holds bolt configuration.
|
// BoltConfig holds bolt configuration.
|
||||||
@ -26,6 +30,8 @@ type BoltConfig struct {
|
|||||||
AutoCompact bool `long:"auto-compact" description:"Whether the databases used within lnd should automatically be compacted on every startup (and if the database has the configured minimum age). This is disabled by default because it requires additional disk space to be available during the compaction that is freed afterwards. In general compaction leads to smaller database files."`
|
AutoCompact bool `long:"auto-compact" description:"Whether the databases used within lnd should automatically be compacted on every startup (and if the database has the configured minimum age). This is disabled by default because it requires additional disk space to be available during the compaction that is freed afterwards. In general compaction leads to smaller database files."`
|
||||||
|
|
||||||
AutoCompactMinAge time.Duration `long:"auto-compact-min-age" description:"How long ago the last compaction of a database file must be for it to be considered for auto compaction again. Can be set to 0 to compact on every startup."`
|
AutoCompactMinAge time.Duration `long:"auto-compact-min-age" description:"How long ago the last compaction of a database file must be for it to be considered for auto compaction again. Can be set to 0 to compact on every startup."`
|
||||||
|
|
||||||
|
DBTimeout time.Duration `long:"dbtimeout" description:"Specify the timeout value used when opening the database."`
|
||||||
}
|
}
|
||||||
|
|
||||||
// EtcdConfig holds etcd configuration.
|
// EtcdConfig holds etcd configuration.
|
||||||
|
@ -55,7 +55,10 @@ func Open(dbPath string, modifiers ...OptionModifier) (*DB, error) {
|
|||||||
|
|
||||||
// Specify bbolt freelist options to reduce heap pressure in case the
|
// Specify bbolt freelist options to reduce heap pressure in case the
|
||||||
// freelist grows to be very large.
|
// freelist grows to be very large.
|
||||||
bdb, err := kvdb.Open(kvdb.BoltBackendName, path, opts.NoFreelistSync)
|
bdb, err := kvdb.Open(
|
||||||
|
kvdb.BoltBackendName, path,
|
||||||
|
opts.NoFreelistSync, opts.DBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@ -84,7 +87,9 @@ func createChannelDB(dbPath string) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
path := filepath.Join(dbPath, dbName)
|
path := filepath.Join(dbPath, dbName)
|
||||||
bdb, err := kvdb.Create(kvdb.BoltBackendName, path, false)
|
bdb, err := kvdb.Create(
|
||||||
|
kvdb.BoltBackendName, path, false, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -1,5 +1,7 @@
|
|||||||
package migration_01_to_11
|
package migration_01_to_11
|
||||||
|
|
||||||
|
import "time"
|
||||||
|
|
||||||
const (
|
const (
|
||||||
// DefaultRejectCacheSize is the default number of rejectCacheEntries to
|
// DefaultRejectCacheSize is the default number of rejectCacheEntries to
|
||||||
// cache for use in the rejection cache of incoming gossip traffic. This
|
// cache for use in the rejection cache of incoming gossip traffic. This
|
||||||
@ -10,6 +12,10 @@ const (
|
|||||||
// in order to reply to gossip queries. This produces a cache size of
|
// in order to reply to gossip queries. This produces a cache size of
|
||||||
// around 40MB.
|
// around 40MB.
|
||||||
DefaultChannelCacheSize = 20000
|
DefaultChannelCacheSize = 20000
|
||||||
|
|
||||||
|
// DefaultDBTimeout specifies the default timeout value when opening
|
||||||
|
// the bbolt database.
|
||||||
|
DefaultDBTimeout = time.Second * 60
|
||||||
)
|
)
|
||||||
|
|
||||||
// Options holds parameters for tuning and customizing a channeldb.DB.
|
// Options holds parameters for tuning and customizing a channeldb.DB.
|
||||||
@ -26,6 +32,10 @@ type Options struct {
|
|||||||
// freelist to disk, resulting in improved performance at the expense of
|
// freelist to disk, resulting in improved performance at the expense of
|
||||||
// increased startup time.
|
// increased startup time.
|
||||||
NoFreelistSync bool
|
NoFreelistSync bool
|
||||||
|
|
||||||
|
// DBTimeout specifies the timeout value to use when opening the wallet
|
||||||
|
// database.
|
||||||
|
DBTimeout time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
// DefaultOptions returns an Options populated with default values.
|
// DefaultOptions returns an Options populated with default values.
|
||||||
@ -34,6 +44,7 @@ func DefaultOptions() Options {
|
|||||||
RejectCacheSize: DefaultRejectCacheSize,
|
RejectCacheSize: DefaultRejectCacheSize,
|
||||||
ChannelCacheSize: DefaultChannelCacheSize,
|
ChannelCacheSize: DefaultChannelCacheSize,
|
||||||
NoFreelistSync: true,
|
NoFreelistSync: true,
|
||||||
|
DBTimeout: DefaultDBTimeout,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,7 +20,9 @@ func MakeDB() (kvdb.Backend, func(), error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
dbPath := file.Name()
|
dbPath := file.Name()
|
||||||
db, err := kvdb.Open(kvdb.BoltBackendName, dbPath, true)
|
db, err := kvdb.Open(
|
||||||
|
kvdb.BoltBackendName, dbPath, true, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -50,6 +50,7 @@ func DefaultOptions() Options {
|
|||||||
NoFreelistSync: true,
|
NoFreelistSync: true,
|
||||||
AutoCompact: false,
|
AutoCompact: false,
|
||||||
AutoCompactMinAge: kvdb.DefaultBoltAutoCompactMinAge,
|
AutoCompactMinAge: kvdb.DefaultBoltAutoCompactMinAge,
|
||||||
|
DBTimeout: kvdb.DefaultDBTimeout,
|
||||||
},
|
},
|
||||||
RejectCacheSize: DefaultRejectCacheSize,
|
RejectCacheSize: DefaultRejectCacheSize,
|
||||||
ChannelCacheSize: DefaultChannelCacheSize,
|
ChannelCacheSize: DefaultChannelCacheSize,
|
||||||
|
28
channeldb/options_test.go
Normal file
28
channeldb/options_test.go
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
package channeldb_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/lightningnetwork/lnd/channeldb"
|
||||||
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TestDefaultOptions tests the default options are created as intended.
|
||||||
|
func TestDefaultOptions(t *testing.T) {
|
||||||
|
|
||||||
|
opts := channeldb.DefaultOptions()
|
||||||
|
|
||||||
|
require.True(t, opts.NoFreelistSync)
|
||||||
|
require.False(t, opts.AutoCompact)
|
||||||
|
require.Equal(
|
||||||
|
t, kvdb.DefaultBoltAutoCompactMinAge, opts.AutoCompactMinAge,
|
||||||
|
)
|
||||||
|
require.Equal(t, kvdb.DefaultDBTimeout, opts.DBTimeout)
|
||||||
|
require.Equal(
|
||||||
|
t, channeldb.DefaultRejectCacheSize, opts.RejectCacheSize,
|
||||||
|
)
|
||||||
|
require.Equal(
|
||||||
|
t, channeldb.DefaultChannelCacheSize, opts.ChannelCacheSize,
|
||||||
|
)
|
||||||
|
}
|
@ -112,7 +112,10 @@ func makeTestDB() (kvdb.Backend, func(), error) {
|
|||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
db, err := kvdb.Create(kvdb.BoltBackendName, tempDirName+"/test.db", true)
|
db, err := kvdb.Create(
|
||||||
|
kvdb.BoltBackendName, tempDirName+"/test.db", true,
|
||||||
|
kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -392,7 +392,10 @@ func createTestChannelArbitrator(t *testing.T, log ArbitratorLog,
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
dbPath := filepath.Join(dbDir, "testdb")
|
dbPath := filepath.Join(dbDir, "testdb")
|
||||||
db, err := kvdb.Create(kvdb.BoltBackendName, dbPath, true)
|
db, err := kvdb.Create(
|
||||||
|
kvdb.BoltBackendName, dbPath, true,
|
||||||
|
kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
4
go.mod
4
go.mod
@ -9,10 +9,10 @@ require (
|
|||||||
github.com/btcsuite/btclog v0.0.0-20170628155309-84c8d2346e9f
|
github.com/btcsuite/btclog v0.0.0-20170628155309-84c8d2346e9f
|
||||||
github.com/btcsuite/btcutil v1.0.2
|
github.com/btcsuite/btcutil v1.0.2
|
||||||
github.com/btcsuite/btcutil/psbt v1.0.3-0.20200826194809-5f93e33af2b0
|
github.com/btcsuite/btcutil/psbt v1.0.3-0.20200826194809-5f93e33af2b0
|
||||||
github.com/btcsuite/btcwallet v0.11.1-0.20201104022105-a6f3888450e4
|
github.com/btcsuite/btcwallet v0.11.1-0.20201119022810-664f77ded195
|
||||||
github.com/btcsuite/btcwallet/wallet/txauthor v1.0.0
|
github.com/btcsuite/btcwallet/wallet/txauthor v1.0.0
|
||||||
github.com/btcsuite/btcwallet/wallet/txrules v1.0.0
|
github.com/btcsuite/btcwallet/wallet/txrules v1.0.0
|
||||||
github.com/btcsuite/btcwallet/walletdb v1.3.3
|
github.com/btcsuite/btcwallet/walletdb v1.3.4-0.20201106155705-08308c81eda0
|
||||||
github.com/btcsuite/btcwallet/wtxmgr v1.2.0
|
github.com/btcsuite/btcwallet/wtxmgr v1.2.0
|
||||||
github.com/coreos/etcd v3.3.22+incompatible
|
github.com/coreos/etcd v3.3.22+incompatible
|
||||||
github.com/coreos/go-semver v0.3.0 // indirect
|
github.com/coreos/go-semver v0.3.0 // indirect
|
||||||
|
4
go.sum
4
go.sum
@ -39,6 +39,8 @@ github.com/btcsuite/btcutil/psbt v1.0.3-0.20200826194809-5f93e33af2b0 h1:3Zumkyl
|
|||||||
github.com/btcsuite/btcutil/psbt v1.0.3-0.20200826194809-5f93e33af2b0/go.mod h1:LVveMu4VaNSkIRTZu2+ut0HDBRuYjqGocxDMNS1KuGQ=
|
github.com/btcsuite/btcutil/psbt v1.0.3-0.20200826194809-5f93e33af2b0/go.mod h1:LVveMu4VaNSkIRTZu2+ut0HDBRuYjqGocxDMNS1KuGQ=
|
||||||
github.com/btcsuite/btcwallet v0.11.1-0.20201104022105-a6f3888450e4 h1:iipg6ldTL0y69KLicrd0gLhY/yErB0rG4a84uQbu7ao=
|
github.com/btcsuite/btcwallet v0.11.1-0.20201104022105-a6f3888450e4 h1:iipg6ldTL0y69KLicrd0gLhY/yErB0rG4a84uQbu7ao=
|
||||||
github.com/btcsuite/btcwallet v0.11.1-0.20201104022105-a6f3888450e4/go.mod h1:owv9oZqM0HnUW+ByF7VqOgfs2eb0ooiePW/+Tl/i/Nk=
|
github.com/btcsuite/btcwallet v0.11.1-0.20201104022105-a6f3888450e4/go.mod h1:owv9oZqM0HnUW+ByF7VqOgfs2eb0ooiePW/+Tl/i/Nk=
|
||||||
|
github.com/btcsuite/btcwallet v0.11.1-0.20201119022810-664f77ded195 h1:QjMLhLVZlpMjgWH5FK0dvwcXAhO2/80g4opgUDa9mAQ=
|
||||||
|
github.com/btcsuite/btcwallet v0.11.1-0.20201119022810-664f77ded195/go.mod h1:owv9oZqM0HnUW+ByF7VqOgfs2eb0ooiePW/+Tl/i/Nk=
|
||||||
github.com/btcsuite/btcwallet/wallet/txauthor v1.0.0 h1:KGHMW5sd7yDdDMkCZ/JpP0KltolFsQcB973brBnfj4c=
|
github.com/btcsuite/btcwallet/wallet/txauthor v1.0.0 h1:KGHMW5sd7yDdDMkCZ/JpP0KltolFsQcB973brBnfj4c=
|
||||||
github.com/btcsuite/btcwallet/wallet/txauthor v1.0.0/go.mod h1:VufDts7bd/zs3GV13f/lXc/0lXrPnvxD/NvmpG/FEKU=
|
github.com/btcsuite/btcwallet/wallet/txauthor v1.0.0/go.mod h1:VufDts7bd/zs3GV13f/lXc/0lXrPnvxD/NvmpG/FEKU=
|
||||||
github.com/btcsuite/btcwallet/wallet/txrules v1.0.0 h1:2VsfS0sBedcM5KmDzRMT3+b6xobqWveZGvjb+jFez5w=
|
github.com/btcsuite/btcwallet/wallet/txrules v1.0.0 h1:2VsfS0sBedcM5KmDzRMT3+b6xobqWveZGvjb+jFez5w=
|
||||||
@ -51,6 +53,8 @@ github.com/btcsuite/btcwallet/walletdb v1.3.2 h1:nFnMBVgkqoVOx08Z756oDwNc9sdVgYR
|
|||||||
github.com/btcsuite/btcwallet/walletdb v1.3.2/go.mod h1:GZCMPNpUu5KE3ASoVd+k06p/1OW8OwNGCCaNWRto2cQ=
|
github.com/btcsuite/btcwallet/walletdb v1.3.2/go.mod h1:GZCMPNpUu5KE3ASoVd+k06p/1OW8OwNGCCaNWRto2cQ=
|
||||||
github.com/btcsuite/btcwallet/walletdb v1.3.3 h1:u6e7vRIKBF++cJy+hOHaMGg+88ZTwvpaY27AFvtB668=
|
github.com/btcsuite/btcwallet/walletdb v1.3.3 h1:u6e7vRIKBF++cJy+hOHaMGg+88ZTwvpaY27AFvtB668=
|
||||||
github.com/btcsuite/btcwallet/walletdb v1.3.3/go.mod h1:oJDxAEUHVtnmIIBaa22wSBPTVcs6hUp5NKWmI8xDwwU=
|
github.com/btcsuite/btcwallet/walletdb v1.3.3/go.mod h1:oJDxAEUHVtnmIIBaa22wSBPTVcs6hUp5NKWmI8xDwwU=
|
||||||
|
github.com/btcsuite/btcwallet/walletdb v1.3.4-0.20201106155705-08308c81eda0 h1:1ErPv22GAP5CKfQ1cSv5ROu+mSlDvzUOHpOuSnjVU9g=
|
||||||
|
github.com/btcsuite/btcwallet/walletdb v1.3.4-0.20201106155705-08308c81eda0/go.mod h1:oJDxAEUHVtnmIIBaa22wSBPTVcs6hUp5NKWmI8xDwwU=
|
||||||
github.com/btcsuite/btcwallet/wtxmgr v1.0.0/go.mod h1:vc4gBprll6BP0UJ+AIGDaySoc7MdAmZf8kelfNb8CFY=
|
github.com/btcsuite/btcwallet/wtxmgr v1.0.0/go.mod h1:vc4gBprll6BP0UJ+AIGDaySoc7MdAmZf8kelfNb8CFY=
|
||||||
github.com/btcsuite/btcwallet/wtxmgr v1.2.0 h1:ZUYPsSv8GjF9KK7lboB2OVHF0uYEcHxgrCfFWqPd9NA=
|
github.com/btcsuite/btcwallet/wtxmgr v1.2.0 h1:ZUYPsSv8GjF9KK7lboB2OVHF0uYEcHxgrCfFWqPd9NA=
|
||||||
github.com/btcsuite/btcwallet/wtxmgr v1.2.0/go.mod h1:h8hkcKUE3X7lMPzTUoGnNiw5g7VhGrKEW3KpR2r0VnY=
|
github.com/btcsuite/btcwallet/wtxmgr v1.2.0/go.mod h1:h8hkcKUE3X7lMPzTUoGnNiw5g7VhGrKEW3KpR2r0VnY=
|
||||||
|
@ -73,6 +73,7 @@ func NewDecayedLog(dbPath, dbFileName string, boltCfg *kvdb.BoltConfig,
|
|||||||
NoFreelistSync: true,
|
NoFreelistSync: true,
|
||||||
AutoCompact: boltCfg.AutoCompact,
|
AutoCompact: boltCfg.AutoCompact,
|
||||||
AutoCompactMinAge: boltCfg.AutoCompactMinAge,
|
AutoCompactMinAge: boltCfg.AutoCompactMinAge,
|
||||||
|
DBTimeout: boltCfg.DBTimeout,
|
||||||
}
|
}
|
||||||
|
|
||||||
// Use default path for log database
|
// Use default path for log database
|
||||||
|
@ -42,6 +42,9 @@ var (
|
|||||||
0x4f, 0x2f, 0x6f, 0x25, 0x98, 0xa3, 0xef, 0xb9,
|
0x4f, 0x2f, 0x6f, 0x25, 0x98, 0xa3, 0xef, 0xb9,
|
||||||
0x69, 0x49, 0x18, 0x83, 0x31, 0x98, 0x47, 0x53,
|
0x69, 0x49, 0x18, 0x83, 0x31, 0x98, 0x47, 0x53,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// testDBTimeout is the wallet db timeout value used in this test.
|
||||||
|
testDBTimeout = time.Second * 10
|
||||||
)
|
)
|
||||||
|
|
||||||
func createTestBtcWallet(coinType uint32) (func(), *wallet.Wallet, error) {
|
func createTestBtcWallet(coinType uint32) (func(), *wallet.Wallet, error) {
|
||||||
@ -62,7 +65,9 @@ func createTestBtcWallet(coinType uint32) (func(), *wallet.Wallet, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
loader := wallet.NewLoader(&chaincfg.SimNetParams, tempDir, true, 0)
|
loader := wallet.NewLoader(
|
||||||
|
&chaincfg.SimNetParams, tempDir, true, testDBTimeout, 0,
|
||||||
|
)
|
||||||
|
|
||||||
pass := []byte("test")
|
pass := []byte("test")
|
||||||
|
|
||||||
|
@ -33,6 +33,7 @@ func DefaultDB() *DB {
|
|||||||
BatchCommitInterval: DefaultBatchCommitInterval,
|
BatchCommitInterval: DefaultBatchCommitInterval,
|
||||||
Bolt: &kvdb.BoltConfig{
|
Bolt: &kvdb.BoltConfig{
|
||||||
AutoCompactMinAge: kvdb.DefaultBoltAutoCompactMinAge,
|
AutoCompactMinAge: kvdb.DefaultBoltAutoCompactMinAge,
|
||||||
|
DBTimeout: kvdb.DefaultDBTimeout,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -95,6 +96,7 @@ func (db *DB) GetBackends(ctx context.Context, dbPath string,
|
|||||||
localDB, err = kvdb.GetBoltBackend(&kvdb.BoltBackendConfig{
|
localDB, err = kvdb.GetBoltBackend(&kvdb.BoltBackendConfig{
|
||||||
DBPath: dbPath,
|
DBPath: dbPath,
|
||||||
DBFileName: dbName,
|
DBFileName: dbName,
|
||||||
|
DBTimeout: db.Bolt.DBTimeout,
|
||||||
NoFreelistSync: !db.Bolt.SyncFreelist,
|
NoFreelistSync: !db.Bolt.SyncFreelist,
|
||||||
AutoCompact: db.Bolt.AutoCompact,
|
AutoCompact: db.Bolt.AutoCompact,
|
||||||
AutoCompactMinAge: db.Bolt.AutoCompactMinAge,
|
AutoCompactMinAge: db.Bolt.AutoCompactMinAge,
|
||||||
|
24
lncfg/db_test.go
Normal file
24
lncfg/db_test.go
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
package lncfg_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
|
"github.com/lightningnetwork/lnd/lncfg"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TestDBDefaultConfig tests that the default DB config is created as expected.
|
||||||
|
func TestDBDefaultConfig(t *testing.T) {
|
||||||
|
defaultConfig := lncfg.DefaultDB()
|
||||||
|
|
||||||
|
require.Equal(t, lncfg.BoltBackend, defaultConfig.Backend)
|
||||||
|
require.Equal(
|
||||||
|
t, kvdb.DefaultBoltAutoCompactMinAge,
|
||||||
|
defaultConfig.Bolt.AutoCompactMinAge,
|
||||||
|
)
|
||||||
|
require.Equal(t, kvdb.DefaultDBTimeout, defaultConfig.Bolt.DBTimeout)
|
||||||
|
// Implicitly, the following fields are default to false.
|
||||||
|
require.False(t, defaultConfig.Bolt.AutoCompact)
|
||||||
|
require.False(t, defaultConfig.Bolt.SyncFreelist)
|
||||||
|
}
|
19
lnd.go
19
lnd.go
@ -412,7 +412,7 @@ func Main(cfg *Config, lisCfg ListenerCfg, shutdownChan <-chan struct{}) error {
|
|||||||
// Create the macaroon authentication/authorization service.
|
// Create the macaroon authentication/authorization service.
|
||||||
macaroonService, err = macaroons.NewService(
|
macaroonService, err = macaroons.NewService(
|
||||||
cfg.networkDir, "lnd", walletInitParams.StatelessInit,
|
cfg.networkDir, "lnd", walletInitParams.StatelessInit,
|
||||||
macaroons.IPLockChecker,
|
cfg.DB.Bolt.DBTimeout, macaroons.IPLockChecker,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err := fmt.Errorf("unable to set up macaroon "+
|
err := fmt.Errorf("unable to set up macaroon "+
|
||||||
@ -522,6 +522,7 @@ func Main(cfg *Config, lisCfg ListenerCfg, shutdownChan <-chan struct{}) error {
|
|||||||
Birthday: walletInitParams.Birthday,
|
Birthday: walletInitParams.Birthday,
|
||||||
RecoveryWindow: walletInitParams.RecoveryWindow,
|
RecoveryWindow: walletInitParams.RecoveryWindow,
|
||||||
Wallet: walletInitParams.Wallet,
|
Wallet: walletInitParams.Wallet,
|
||||||
|
DBTimeOut: cfg.DB.Bolt.DBTimeout,
|
||||||
NeutrinoCS: neutrinoCS,
|
NeutrinoCS: neutrinoCS,
|
||||||
ActiveNetParams: cfg.ActiveNetParams,
|
ActiveNetParams: cfg.ActiveNetParams,
|
||||||
FeeURL: cfg.FeeURL,
|
FeeURL: cfg.FeeURL,
|
||||||
@ -564,7 +565,9 @@ func Main(cfg *Config, lisCfg ListenerCfg, shutdownChan <-chan struct{}) error {
|
|||||||
var towerClientDB *wtdb.ClientDB
|
var towerClientDB *wtdb.ClientDB
|
||||||
if cfg.WtClient.Active {
|
if cfg.WtClient.Active {
|
||||||
var err error
|
var err error
|
||||||
towerClientDB, err = wtdb.OpenClientDB(cfg.localDatabaseDir())
|
towerClientDB, err = wtdb.OpenClientDB(
|
||||||
|
cfg.localDatabaseDir(), cfg.DB.Bolt.DBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err := fmt.Errorf("unable to open watchtower client "+
|
err := fmt.Errorf("unable to open watchtower client "+
|
||||||
"database: %v", err)
|
"database: %v", err)
|
||||||
@ -605,7 +608,9 @@ func Main(cfg *Config, lisCfg ListenerCfg, shutdownChan <-chan struct{}) error {
|
|||||||
lncfg.NormalizeNetwork(cfg.ActiveNetParams.Name),
|
lncfg.NormalizeNetwork(cfg.ActiveNetParams.Name),
|
||||||
)
|
)
|
||||||
|
|
||||||
towerDB, err := wtdb.OpenTowerDB(towerDBDir)
|
towerDB, err := wtdb.OpenTowerDB(
|
||||||
|
towerDBDir, cfg.DB.Bolt.DBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err := fmt.Errorf("unable to open watchtower "+
|
err := fmt.Errorf("unable to open watchtower "+
|
||||||
"database: %v", err)
|
"database: %v", err)
|
||||||
@ -1140,7 +1145,7 @@ func waitForWalletPassword(cfg *Config, restEndpoints []net.Addr,
|
|||||||
}
|
}
|
||||||
pwService := walletunlocker.New(
|
pwService := walletunlocker.New(
|
||||||
chainConfig.ChainDir, cfg.ActiveNetParams.Params,
|
chainConfig.ChainDir, cfg.ActiveNetParams.Params,
|
||||||
!cfg.SyncFreelist, macaroonFiles,
|
!cfg.SyncFreelist, macaroonFiles, cfg.DB.Bolt.DBTimeout,
|
||||||
)
|
)
|
||||||
|
|
||||||
// Set up a new PasswordService, which will listen for passwords
|
// Set up a new PasswordService, which will listen for passwords
|
||||||
@ -1264,7 +1269,7 @@ func waitForWalletPassword(cfg *Config, restEndpoints []net.Addr,
|
|||||||
)
|
)
|
||||||
loader := wallet.NewLoader(
|
loader := wallet.NewLoader(
|
||||||
cfg.ActiveNetParams.Params, netDir, !cfg.SyncFreelist,
|
cfg.ActiveNetParams.Params, netDir, !cfg.SyncFreelist,
|
||||||
recoveryWindow,
|
cfg.DB.Bolt.DBTimeout, recoveryWindow,
|
||||||
)
|
)
|
||||||
|
|
||||||
// With the seed, we can now use the wallet loader to create
|
// With the seed, we can now use the wallet loader to create
|
||||||
@ -1484,7 +1489,9 @@ func initNeutrinoBackend(cfg *Config, chainDir string) (*neutrino.ChainService,
|
|||||||
}
|
}
|
||||||
|
|
||||||
dbName := filepath.Join(dbPath, "neutrino.db")
|
dbName := filepath.Join(dbPath, "neutrino.db")
|
||||||
db, err := walletdb.Create("bdb", dbName, !cfg.SyncFreelist)
|
db, err := walletdb.Create(
|
||||||
|
"bdb", dbName, !cfg.SyncFreelist, cfg.DB.Bolt.DBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, fmt.Errorf("unable to create neutrino "+
|
return nil, nil, fmt.Errorf("unable to create neutrino "+
|
||||||
"database: %v", err)
|
"database: %v", err)
|
||||||
|
@ -98,7 +98,7 @@ func New(cfg Config) (*BtcWallet, error) {
|
|||||||
}
|
}
|
||||||
loader := base.NewLoader(
|
loader := base.NewLoader(
|
||||||
cfg.NetParams, netDir, cfg.NoFreelistSync,
|
cfg.NetParams, netDir, cfg.NoFreelistSync,
|
||||||
cfg.RecoveryWindow,
|
cfg.DBTimeOut, cfg.RecoveryWindow,
|
||||||
)
|
)
|
||||||
walletExists, err := loader.WalletExists()
|
walletExists, err := loader.WalletExists()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -80,6 +80,10 @@ type Config struct {
|
|||||||
// freelist to disk, resulting in improved performance at the expense of
|
// freelist to disk, resulting in improved performance at the expense of
|
||||||
// increased startup time.
|
// increased startup time.
|
||||||
NoFreelistSync bool
|
NoFreelistSync bool
|
||||||
|
|
||||||
|
// DBTimeOut specifies the timeout value to use when opening the wallet
|
||||||
|
// database.
|
||||||
|
DBTimeOut time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
// NetworkDir returns the directory name of a network directory to hold wallet
|
// NetworkDir returns the directory name of a network directory to hold wallet
|
||||||
|
@ -3212,6 +3212,7 @@ func runTests(t *testing.T, walletDriver *lnwallet.WalletDriver,
|
|||||||
// instance, and initialize a btcwallet driver for it.
|
// instance, and initialize a btcwallet driver for it.
|
||||||
aliceDB, err := walletdb.Create(
|
aliceDB, err := walletdb.Create(
|
||||||
"bdb", tempTestDirAlice+"/neutrino.db", true,
|
"bdb", tempTestDirAlice+"/neutrino.db", true,
|
||||||
|
kvdb.DefaultDBTimeout,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unable to create DB: %v", err)
|
t.Fatalf("unable to create DB: %v", err)
|
||||||
@ -3240,6 +3241,7 @@ func runTests(t *testing.T, walletDriver *lnwallet.WalletDriver,
|
|||||||
// instance, and initialize a btcwallet driver for it.
|
// instance, and initialize a btcwallet driver for it.
|
||||||
bobDB, err := walletdb.Create(
|
bobDB, err := walletdb.Create(
|
||||||
"bdb", tempTestDirBob+"/neutrino.db", true,
|
"bdb", tempTestDirBob+"/neutrino.db", true,
|
||||||
|
kvdb.DefaultDBTimeout,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unable to create DB: %v", err)
|
t.Fatalf("unable to create DB: %v", err)
|
||||||
|
@ -6,6 +6,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
"path"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
"google.golang.org/grpc"
|
"google.golang.org/grpc"
|
||||||
@ -76,7 +77,7 @@ type Service struct {
|
|||||||
// such as those for `allow`, `time-before`, `declared`, and `error` caveats
|
// such as those for `allow`, `time-before`, `declared`, and `error` caveats
|
||||||
// are registered automatically and don't need to be added.
|
// are registered automatically and don't need to be added.
|
||||||
func NewService(dir, location string, statelessInit bool,
|
func NewService(dir, location string, statelessInit bool,
|
||||||
checks ...Checker) (*Service, error) {
|
dbTimeout time.Duration, checks ...Checker) (*Service, error) {
|
||||||
|
|
||||||
// Ensure that the path to the directory exists.
|
// Ensure that the path to the directory exists.
|
||||||
if _, err := os.Stat(dir); os.IsNotExist(err) {
|
if _, err := os.Stat(dir); os.IsNotExist(err) {
|
||||||
@ -89,6 +90,7 @@ func NewService(dir, location string, statelessInit bool,
|
|||||||
// and all generated macaroons+caveats.
|
// and all generated macaroons+caveats.
|
||||||
macaroonDB, err := kvdb.Create(
|
macaroonDB, err := kvdb.Create(
|
||||||
kvdb.BoltBackendName, path.Join(dir, DBFilename), true,
|
kvdb.BoltBackendName, path.Join(dir, DBFilename), true,
|
||||||
|
dbTimeout,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -40,6 +40,7 @@ func setupTestRootKeyStorage(t *testing.T) string {
|
|||||||
}
|
}
|
||||||
db, err := kvdb.Create(
|
db, err := kvdb.Create(
|
||||||
kvdb.BoltBackendName, path.Join(tempDir, "macaroons.db"), true,
|
kvdb.BoltBackendName, path.Join(tempDir, "macaroons.db"), true,
|
||||||
|
kvdb.DefaultDBTimeout,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Error opening store DB: %v", err)
|
t.Fatalf("Error opening store DB: %v", err)
|
||||||
@ -67,7 +68,8 @@ func TestNewService(t *testing.T) {
|
|||||||
// Second, create the new service instance, unlock it and pass in a
|
// Second, create the new service instance, unlock it and pass in a
|
||||||
// checker that we expect it to add to the bakery.
|
// checker that we expect it to add to the bakery.
|
||||||
service, err := macaroons.NewService(
|
service, err := macaroons.NewService(
|
||||||
tempDir, "lnd", false, macaroons.IPLockChecker,
|
tempDir, "lnd", false, kvdb.DefaultDBTimeout,
|
||||||
|
macaroons.IPLockChecker,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Error creating new service: %v", err)
|
t.Fatalf("Error creating new service: %v", err)
|
||||||
@ -118,7 +120,8 @@ func TestValidateMacaroon(t *testing.T) {
|
|||||||
tempDir := setupTestRootKeyStorage(t)
|
tempDir := setupTestRootKeyStorage(t)
|
||||||
defer os.RemoveAll(tempDir)
|
defer os.RemoveAll(tempDir)
|
||||||
service, err := macaroons.NewService(
|
service, err := macaroons.NewService(
|
||||||
tempDir, "lnd", false, macaroons.IPLockChecker,
|
tempDir, "lnd", false, kvdb.DefaultDBTimeout,
|
||||||
|
macaroons.IPLockChecker,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Error creating new service: %v", err)
|
t.Fatalf("Error creating new service: %v", err)
|
||||||
@ -178,7 +181,8 @@ func TestListMacaroonIDs(t *testing.T) {
|
|||||||
// Second, create the new service instance, unlock it and pass in a
|
// Second, create the new service instance, unlock it and pass in a
|
||||||
// checker that we expect it to add to the bakery.
|
// checker that we expect it to add to the bakery.
|
||||||
service, err := macaroons.NewService(
|
service, err := macaroons.NewService(
|
||||||
tempDir, "lnd", false, macaroons.IPLockChecker,
|
tempDir, "lnd", false, kvdb.DefaultDBTimeout,
|
||||||
|
macaroons.IPLockChecker,
|
||||||
)
|
)
|
||||||
require.NoError(t, err, "Error creating new service")
|
require.NoError(t, err, "Error creating new service")
|
||||||
defer service.Close()
|
defer service.Close()
|
||||||
@ -210,7 +214,8 @@ func TestDeleteMacaroonID(t *testing.T) {
|
|||||||
// Second, create the new service instance, unlock it and pass in a
|
// Second, create the new service instance, unlock it and pass in a
|
||||||
// checker that we expect it to add to the bakery.
|
// checker that we expect it to add to the bakery.
|
||||||
service, err := macaroons.NewService(
|
service, err := macaroons.NewService(
|
||||||
tempDir, "lnd", false, macaroons.IPLockChecker,
|
tempDir, "lnd", false, kvdb.DefaultDBTimeout,
|
||||||
|
macaroons.IPLockChecker,
|
||||||
)
|
)
|
||||||
require.NoError(t, err, "Error creating new service")
|
require.NoError(t, err, "Error creating new service")
|
||||||
defer service.Close()
|
defer service.Close()
|
||||||
|
@ -42,6 +42,7 @@ func openTestStore(t *testing.T, tempDir string) (func(),
|
|||||||
|
|
||||||
db, err := kvdb.Create(
|
db, err := kvdb.Create(
|
||||||
kvdb.BoltBackendName, path.Join(tempDir, "weks.db"), true,
|
kvdb.BoltBackendName, path.Join(tempDir, "weks.db"), true,
|
||||||
|
kvdb.DefaultDBTimeout,
|
||||||
)
|
)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
@ -27,6 +27,7 @@ import (
|
|||||||
|
|
||||||
"github.com/lightninglabs/neutrino"
|
"github.com/lightninglabs/neutrino"
|
||||||
"github.com/lightningnetwork/lnd/channeldb"
|
"github.com/lightningnetwork/lnd/channeldb"
|
||||||
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@ -846,7 +847,9 @@ var interfaceImpls = []struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
dbName := filepath.Join(spvDir, "neutrino.db")
|
dbName := filepath.Join(spvDir, "neutrino.db")
|
||||||
spvDatabase, err := walletdb.Create("bdb", dbName, true)
|
spvDatabase, err := walletdb.Create(
|
||||||
|
"bdb", dbName, true, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -105,7 +105,9 @@ func (c *integratedRoutingContext) testPayment(maxParts uint32) ([]htlcAttempt,
|
|||||||
dbPath := file.Name()
|
dbPath := file.Name()
|
||||||
defer os.Remove(dbPath)
|
defer os.Remove(dbPath)
|
||||||
|
|
||||||
db, err := kvdb.Open(kvdb.BoltBackendName, dbPath, true)
|
db, err := kvdb.Open(
|
||||||
|
kvdb.BoltBackendName, dbPath, true, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.t.Fatal(err)
|
c.t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
@ -31,7 +31,9 @@ func TestMissionControlStore(t *testing.T) {
|
|||||||
|
|
||||||
dbPath := file.Name()
|
dbPath := file.Name()
|
||||||
|
|
||||||
db, err := kvdb.Create(kvdb.BoltBackendName, dbPath, true)
|
db, err := kvdb.Create(
|
||||||
|
kvdb.BoltBackendName, dbPath, true, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
@ -63,7 +63,9 @@ func createMcTestContext(t *testing.T) *mcTestContext {
|
|||||||
|
|
||||||
ctx.dbPath = file.Name()
|
ctx.dbPath = file.Name()
|
||||||
|
|
||||||
ctx.db, err = kvdb.Open(kvdb.BoltBackendName, ctx.dbPath, true)
|
ctx.db, err = kvdb.Open(
|
||||||
|
kvdb.BoltBackendName, ctx.dbPath, true, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
@ -991,3 +991,6 @@ litecoin.node=ltcd
|
|||||||
; considered for auto compaction again. Can be set to 0 to compact on every
|
; considered for auto compaction again. Can be set to 0 to compact on every
|
||||||
; startup. (default: 168h)
|
; startup. (default: 168h)
|
||||||
; db.bolt.auto-compact-min-age=0
|
; db.bolt.auto-compact-min-age=0
|
||||||
|
|
||||||
|
; Specify the timeout to be used when opening the database.
|
||||||
|
; db.bolt.dbtimeout=60s
|
||||||
|
@ -129,11 +129,15 @@ type UnlockerService struct {
|
|||||||
// different access permissions. These might not exist in a stateless
|
// different access permissions. These might not exist in a stateless
|
||||||
// initialization of lnd.
|
// initialization of lnd.
|
||||||
macaroonFiles []string
|
macaroonFiles []string
|
||||||
|
|
||||||
|
// dbTimeout specifies the timeout value to use when opening the wallet
|
||||||
|
// database.
|
||||||
|
dbTimeout time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
// New creates and returns a new UnlockerService.
|
// New creates and returns a new UnlockerService.
|
||||||
func New(chainDir string, params *chaincfg.Params, noFreelistSync bool,
|
func New(chainDir string, params *chaincfg.Params, noFreelistSync bool,
|
||||||
macaroonFiles []string) *UnlockerService {
|
macaroonFiles []string, dbTimeout time.Duration) *UnlockerService {
|
||||||
|
|
||||||
return &UnlockerService{
|
return &UnlockerService{
|
||||||
InitMsgs: make(chan *WalletInitMsg, 1),
|
InitMsgs: make(chan *WalletInitMsg, 1),
|
||||||
@ -145,6 +149,7 @@ func New(chainDir string, params *chaincfg.Params, noFreelistSync bool,
|
|||||||
chainDir: chainDir,
|
chainDir: chainDir,
|
||||||
netParams: params,
|
netParams: params,
|
||||||
macaroonFiles: macaroonFiles,
|
macaroonFiles: macaroonFiles,
|
||||||
|
dbTimeout: dbTimeout,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -162,7 +167,9 @@ func (u *UnlockerService) GenSeed(_ context.Context,
|
|||||||
// Before we start, we'll ensure that the wallet hasn't already created
|
// Before we start, we'll ensure that the wallet hasn't already created
|
||||||
// so we don't show a *new* seed to the user if one already exists.
|
// so we don't show a *new* seed to the user if one already exists.
|
||||||
netDir := btcwallet.NetworkDir(u.chainDir, u.netParams)
|
netDir := btcwallet.NetworkDir(u.chainDir, u.netParams)
|
||||||
loader := wallet.NewLoader(u.netParams, netDir, u.noFreelistSync, 0)
|
loader := wallet.NewLoader(
|
||||||
|
u.netParams, netDir, u.noFreelistSync, u.dbTimeout, 0,
|
||||||
|
)
|
||||||
walletExists, err := loader.WalletExists()
|
walletExists, err := loader.WalletExists()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -292,7 +299,8 @@ func (u *UnlockerService) InitWallet(ctx context.Context,
|
|||||||
// wallet's files so we can check if the wallet already exists.
|
// wallet's files so we can check if the wallet already exists.
|
||||||
netDir := btcwallet.NetworkDir(u.chainDir, u.netParams)
|
netDir := btcwallet.NetworkDir(u.chainDir, u.netParams)
|
||||||
loader := wallet.NewLoader(
|
loader := wallet.NewLoader(
|
||||||
u.netParams, netDir, u.noFreelistSync, uint32(recoveryWindow),
|
u.netParams, netDir, u.noFreelistSync,
|
||||||
|
u.dbTimeout, uint32(recoveryWindow),
|
||||||
)
|
)
|
||||||
|
|
||||||
walletExists, err := loader.WalletExists()
|
walletExists, err := loader.WalletExists()
|
||||||
@ -368,7 +376,8 @@ func (u *UnlockerService) UnlockWallet(ctx context.Context,
|
|||||||
|
|
||||||
netDir := btcwallet.NetworkDir(u.chainDir, u.netParams)
|
netDir := btcwallet.NetworkDir(u.chainDir, u.netParams)
|
||||||
loader := wallet.NewLoader(
|
loader := wallet.NewLoader(
|
||||||
u.netParams, netDir, u.noFreelistSync, recoveryWindow,
|
u.netParams, netDir, u.noFreelistSync,
|
||||||
|
u.dbTimeout, recoveryWindow,
|
||||||
)
|
)
|
||||||
|
|
||||||
// Check if wallet already exists.
|
// Check if wallet already exists.
|
||||||
@ -435,7 +444,9 @@ func (u *UnlockerService) ChangePassword(ctx context.Context,
|
|||||||
in *lnrpc.ChangePasswordRequest) (*lnrpc.ChangePasswordResponse, error) {
|
in *lnrpc.ChangePasswordRequest) (*lnrpc.ChangePasswordResponse, error) {
|
||||||
|
|
||||||
netDir := btcwallet.NetworkDir(u.chainDir, u.netParams)
|
netDir := btcwallet.NetworkDir(u.chainDir, u.netParams)
|
||||||
loader := wallet.NewLoader(u.netParams, netDir, u.noFreelistSync, 0)
|
loader := wallet.NewLoader(
|
||||||
|
u.netParams, netDir, u.noFreelistSync, u.dbTimeout, 0,
|
||||||
|
)
|
||||||
|
|
||||||
// First, we'll make sure the wallet exists for the specific chain and
|
// First, we'll make sure the wallet exists for the specific chain and
|
||||||
// network.
|
// network.
|
||||||
@ -513,7 +524,7 @@ func (u *UnlockerService) ChangePassword(ctx context.Context,
|
|||||||
// Attempt to open the macaroon DB, unlock it and then change
|
// Attempt to open the macaroon DB, unlock it and then change
|
||||||
// the passphrase.
|
// the passphrase.
|
||||||
macaroonService, err := macaroons.NewService(
|
macaroonService, err := macaroons.NewService(
|
||||||
netDir, "lnd", in.StatelessInit,
|
netDir, "lnd", in.StatelessInit, u.dbTimeout,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -69,7 +69,9 @@ func createTestWalletWithPw(t *testing.T, pubPw, privPw []byte, dir string,
|
|||||||
|
|
||||||
// Create a new test wallet that uses fast scrypt as KDF.
|
// Create a new test wallet that uses fast scrypt as KDF.
|
||||||
netDir := btcwallet.NetworkDir(dir, netParams)
|
netDir := btcwallet.NetworkDir(dir, netParams)
|
||||||
loader := wallet.NewLoader(netParams, netDir, true, 0)
|
loader := wallet.NewLoader(
|
||||||
|
netParams, netDir, true, kvdb.DefaultDBTimeout, 0,
|
||||||
|
)
|
||||||
_, err := loader.CreateNewWallet(
|
_, err := loader.CreateNewWallet(
|
||||||
pubPw, privPw, testSeed, time.Time{},
|
pubPw, privPw, testSeed, time.Time{},
|
||||||
)
|
)
|
||||||
@ -105,7 +107,7 @@ func openOrCreateTestMacStore(tempDir string, pw *[]byte,
|
|||||||
}
|
}
|
||||||
db, err := kvdb.Create(
|
db, err := kvdb.Create(
|
||||||
kvdb.BoltBackendName, path.Join(netDir, macaroons.DBFilename),
|
kvdb.BoltBackendName, path.Join(netDir, macaroons.DBFilename),
|
||||||
true,
|
true, kvdb.DefaultDBTimeout,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -144,7 +146,9 @@ func TestGenSeed(t *testing.T) {
|
|||||||
_ = os.RemoveAll(testDir)
|
_ = os.RemoveAll(testDir)
|
||||||
}()
|
}()
|
||||||
|
|
||||||
service := walletunlocker.New(testDir, testNetParams, true, nil)
|
service := walletunlocker.New(
|
||||||
|
testDir, testNetParams, true, nil, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
|
|
||||||
// Now that the service has been created, we'll ask it to generate a
|
// Now that the service has been created, we'll ask it to generate a
|
||||||
// new seed for us given a test passphrase.
|
// new seed for us given a test passphrase.
|
||||||
@ -179,7 +183,9 @@ func TestGenSeedGenerateEntropy(t *testing.T) {
|
|||||||
defer func() {
|
defer func() {
|
||||||
_ = os.RemoveAll(testDir)
|
_ = os.RemoveAll(testDir)
|
||||||
}()
|
}()
|
||||||
service := walletunlocker.New(testDir, testNetParams, true, nil)
|
service := walletunlocker.New(
|
||||||
|
testDir, testNetParams, true, nil, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
|
|
||||||
// Now that the service has been created, we'll ask it to generate a
|
// Now that the service has been created, we'll ask it to generate a
|
||||||
// new seed for us given a test passphrase. Note that we don't actually
|
// new seed for us given a test passphrase. Note that we don't actually
|
||||||
@ -213,7 +219,9 @@ func TestGenSeedInvalidEntropy(t *testing.T) {
|
|||||||
defer func() {
|
defer func() {
|
||||||
_ = os.RemoveAll(testDir)
|
_ = os.RemoveAll(testDir)
|
||||||
}()
|
}()
|
||||||
service := walletunlocker.New(testDir, testNetParams, true, nil)
|
service := walletunlocker.New(
|
||||||
|
testDir, testNetParams, true, nil, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
|
|
||||||
// Now that the service has been created, we'll ask it to generate a
|
// Now that the service has been created, we'll ask it to generate a
|
||||||
// new seed for us given a test passphrase. However, we'll be using an
|
// new seed for us given a test passphrase. However, we'll be using an
|
||||||
@ -244,7 +252,9 @@ func TestInitWallet(t *testing.T) {
|
|||||||
}()
|
}()
|
||||||
|
|
||||||
// Create new UnlockerService.
|
// Create new UnlockerService.
|
||||||
service := walletunlocker.New(testDir, testNetParams, true, nil)
|
service := walletunlocker.New(
|
||||||
|
testDir, testNetParams, true, nil, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
|
|
||||||
// Once we have the unlocker service created, we'll now instantiate a
|
// Once we have the unlocker service created, we'll now instantiate a
|
||||||
// new cipher seed and its mnemonic.
|
// new cipher seed and its mnemonic.
|
||||||
@ -330,7 +340,9 @@ func TestCreateWalletInvalidEntropy(t *testing.T) {
|
|||||||
}()
|
}()
|
||||||
|
|
||||||
// Create new UnlockerService.
|
// Create new UnlockerService.
|
||||||
service := walletunlocker.New(testDir, testNetParams, true, nil)
|
service := walletunlocker.New(
|
||||||
|
testDir, testNetParams, true, nil, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
|
|
||||||
// We'll attempt to init the wallet with an invalid cipher seed and
|
// We'll attempt to init the wallet with an invalid cipher seed and
|
||||||
// passphrase.
|
// passphrase.
|
||||||
@ -359,7 +371,9 @@ func TestUnlockWallet(t *testing.T) {
|
|||||||
}()
|
}()
|
||||||
|
|
||||||
// Create new UnlockerService.
|
// Create new UnlockerService.
|
||||||
service := walletunlocker.New(testDir, testNetParams, true, nil)
|
service := walletunlocker.New(
|
||||||
|
testDir, testNetParams, true, nil, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
|
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
req := &lnrpc.UnlockWalletRequest{
|
req := &lnrpc.UnlockWalletRequest{
|
||||||
@ -448,7 +462,9 @@ func TestChangeWalletPasswordNewRootkey(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Create a new UnlockerService with our temp files.
|
// Create a new UnlockerService with our temp files.
|
||||||
service := walletunlocker.New(testDir, testNetParams, true, tempFiles)
|
service := walletunlocker.New(
|
||||||
|
testDir, testNetParams, true, tempFiles, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
|
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
newPassword := []byte("hunter2???")
|
newPassword := []byte("hunter2???")
|
||||||
@ -558,7 +574,7 @@ func TestChangeWalletPasswordStateless(t *testing.T) {
|
|||||||
// Create a new UnlockerService with our temp files.
|
// Create a new UnlockerService with our temp files.
|
||||||
service := walletunlocker.New(testDir, testNetParams, true, []string{
|
service := walletunlocker.New(testDir, testNetParams, true, []string{
|
||||||
tempMacFile, nonExistingFile,
|
tempMacFile, nonExistingFile,
|
||||||
})
|
}, kvdb.DefaultDBTimeout)
|
||||||
|
|
||||||
// Create a wallet we can try to unlock. We use the default password
|
// Create a wallet we can try to unlock. We use the default password
|
||||||
// so we can check that the unlocker service defaults to this when
|
// so we can check that the unlocker service defaults to this when
|
||||||
|
@ -6,6 +6,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"math"
|
"math"
|
||||||
"net"
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/btcsuite/btcd/btcec"
|
"github.com/btcsuite/btcd/btcec"
|
||||||
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
@ -129,8 +130,10 @@ type ClientDB struct {
|
|||||||
// migrations will be applied before returning. Any attempt to open a database
|
// migrations will be applied before returning. Any attempt to open a database
|
||||||
// with a version number higher that the latest version will fail to prevent
|
// with a version number higher that the latest version will fail to prevent
|
||||||
// accidental reversion.
|
// accidental reversion.
|
||||||
func OpenClientDB(dbPath string) (*ClientDB, error) {
|
func OpenClientDB(dbPath string, dbTimeout time.Duration) (*ClientDB, error) {
|
||||||
bdb, firstInit, err := createDBIfNotExist(dbPath, clientDBName)
|
bdb, firstInit, err := createDBIfNotExist(
|
||||||
|
dbPath, clientDBName, dbTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -11,6 +11,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/btcsuite/btcd/btcec"
|
"github.com/btcsuite/btcd/btcec"
|
||||||
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
"github.com/lightningnetwork/lnd/lnwire"
|
"github.com/lightningnetwork/lnd/lnwire"
|
||||||
"github.com/lightningnetwork/lnd/watchtower/blob"
|
"github.com/lightningnetwork/lnd/watchtower/blob"
|
||||||
"github.com/lightningnetwork/lnd/watchtower/wtclient"
|
"github.com/lightningnetwork/lnd/watchtower/wtclient"
|
||||||
@ -783,7 +784,9 @@ func TestClientDB(t *testing.T) {
|
|||||||
err)
|
err)
|
||||||
}
|
}
|
||||||
|
|
||||||
db, err := wtdb.OpenClientDB(path)
|
db, err := wtdb.OpenClientDB(
|
||||||
|
path, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
os.RemoveAll(path)
|
os.RemoveAll(path)
|
||||||
t.Fatalf("unable to open db: %v", err)
|
t.Fatalf("unable to open db: %v", err)
|
||||||
@ -806,14 +809,18 @@ func TestClientDB(t *testing.T) {
|
|||||||
err)
|
err)
|
||||||
}
|
}
|
||||||
|
|
||||||
db, err := wtdb.OpenClientDB(path)
|
db, err := wtdb.OpenClientDB(
|
||||||
|
path, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
os.RemoveAll(path)
|
os.RemoveAll(path)
|
||||||
t.Fatalf("unable to open db: %v", err)
|
t.Fatalf("unable to open db: %v", err)
|
||||||
}
|
}
|
||||||
db.Close()
|
db.Close()
|
||||||
|
|
||||||
db, err = wtdb.OpenClientDB(path)
|
db, err = wtdb.OpenClientDB(
|
||||||
|
path, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
os.RemoveAll(path)
|
os.RemoveAll(path)
|
||||||
t.Fatalf("unable to reopen db: %v", err)
|
t.Fatalf("unable to reopen db: %v", err)
|
||||||
|
@ -5,6 +5,7 @@ import (
|
|||||||
"errors"
|
"errors"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
)
|
)
|
||||||
@ -49,7 +50,9 @@ func fileExists(path string) bool {
|
|||||||
// one doesn't exist. The boolean returned indicates if the database did not
|
// one doesn't exist. The boolean returned indicates if the database did not
|
||||||
// exist before, or if it has been created but no version metadata exists within
|
// exist before, or if it has been created but no version metadata exists within
|
||||||
// it.
|
// it.
|
||||||
func createDBIfNotExist(dbPath, name string) (kvdb.Backend, bool, error) {
|
func createDBIfNotExist(dbPath, name string,
|
||||||
|
dbTimeout time.Duration) (kvdb.Backend, bool, error) {
|
||||||
|
|
||||||
path := filepath.Join(dbPath, name)
|
path := filepath.Join(dbPath, name)
|
||||||
|
|
||||||
// If the database file doesn't exist, this indicates we much initialize
|
// If the database file doesn't exist, this indicates we much initialize
|
||||||
@ -65,7 +68,9 @@ func createDBIfNotExist(dbPath, name string) (kvdb.Backend, bool, error) {
|
|||||||
|
|
||||||
// Specify bbolt freelist options to reduce heap pressure in case the
|
// Specify bbolt freelist options to reduce heap pressure in case the
|
||||||
// freelist grows to be very large.
|
// freelist grows to be very large.
|
||||||
bdb, err := kvdb.Create(kvdb.BoltBackendName, path, true)
|
bdb, err := kvdb.Create(
|
||||||
|
kvdb.BoltBackendName, path, true, dbTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, false, err
|
return nil, false, err
|
||||||
}
|
}
|
||||||
|
@ -3,6 +3,7 @@ package wtdb
|
|||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"errors"
|
"errors"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/btcsuite/btcd/chaincfg/chainhash"
|
"github.com/btcsuite/btcd/chaincfg/chainhash"
|
||||||
"github.com/lightningnetwork/lnd/chainntnfs"
|
"github.com/lightningnetwork/lnd/chainntnfs"
|
||||||
@ -66,8 +67,10 @@ type TowerDB struct {
|
|||||||
// migrations will be applied before returning. Any attempt to open a database
|
// migrations will be applied before returning. Any attempt to open a database
|
||||||
// with a version number higher that the latest version will fail to prevent
|
// with a version number higher that the latest version will fail to prevent
|
||||||
// accidental reversion.
|
// accidental reversion.
|
||||||
func OpenTowerDB(dbPath string) (*TowerDB, error) {
|
func OpenTowerDB(dbPath string, dbTimeout time.Duration) (*TowerDB, error) {
|
||||||
bdb, firstInit, err := createDBIfNotExist(dbPath, towerDBName)
|
bdb, firstInit, err := createDBIfNotExist(
|
||||||
|
dbPath, towerDBName, dbTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -10,6 +10,7 @@ import (
|
|||||||
|
|
||||||
"github.com/btcsuite/btcd/chaincfg/chainhash"
|
"github.com/btcsuite/btcd/chaincfg/chainhash"
|
||||||
"github.com/lightningnetwork/lnd/chainntnfs"
|
"github.com/lightningnetwork/lnd/chainntnfs"
|
||||||
|
"github.com/lightningnetwork/lnd/channeldb/kvdb"
|
||||||
"github.com/lightningnetwork/lnd/watchtower"
|
"github.com/lightningnetwork/lnd/watchtower"
|
||||||
"github.com/lightningnetwork/lnd/watchtower/blob"
|
"github.com/lightningnetwork/lnd/watchtower/blob"
|
||||||
"github.com/lightningnetwork/lnd/watchtower/wtdb"
|
"github.com/lightningnetwork/lnd/watchtower/wtdb"
|
||||||
@ -642,7 +643,9 @@ func TestTowerDB(t *testing.T) {
|
|||||||
err)
|
err)
|
||||||
}
|
}
|
||||||
|
|
||||||
db, err := wtdb.OpenTowerDB(path)
|
db, err := wtdb.OpenTowerDB(
|
||||||
|
path, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
os.RemoveAll(path)
|
os.RemoveAll(path)
|
||||||
t.Fatalf("unable to open db: %v", err)
|
t.Fatalf("unable to open db: %v", err)
|
||||||
@ -665,7 +668,9 @@ func TestTowerDB(t *testing.T) {
|
|||||||
err)
|
err)
|
||||||
}
|
}
|
||||||
|
|
||||||
db, err := wtdb.OpenTowerDB(path)
|
db, err := wtdb.OpenTowerDB(
|
||||||
|
path, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
os.RemoveAll(path)
|
os.RemoveAll(path)
|
||||||
t.Fatalf("unable to open db: %v", err)
|
t.Fatalf("unable to open db: %v", err)
|
||||||
@ -675,7 +680,9 @@ func TestTowerDB(t *testing.T) {
|
|||||||
// Open the db again, ensuring we test a
|
// Open the db again, ensuring we test a
|
||||||
// different path during open and that all
|
// different path during open and that all
|
||||||
// buckets remain initialized.
|
// buckets remain initialized.
|
||||||
db, err = wtdb.OpenTowerDB(path)
|
db, err = wtdb.OpenTowerDB(
|
||||||
|
path, kvdb.DefaultDBTimeout,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
os.RemoveAll(path)
|
os.RemoveAll(path)
|
||||||
t.Fatalf("unable to open db: %v", err)
|
t.Fatalf("unable to open db: %v", err)
|
||||||
|
Loading…
Reference in New Issue
Block a user