Skip to main content

radicle_node/
runtime.rs

1pub mod handle;
2pub mod thread;
3
4use std::fmt::Debug;
5use std::path::PathBuf;
6use std::{fs, io, net};
7
8#[cfg(unix)]
9use std::os::unix::net::UnixListener;
10#[cfg(windows)]
11use uds_windows::UnixListener;
12
13use crossbeam_channel as chan;
14use cyphernet::Ecdh;
15use radicle::cob::migrate;
16use radicle::crypto;
17use radicle::node::device::Device;
18use radicle_fetch::FetchLimit;
19use radicle_signals::Signal;
20use thiserror::Error;
21
22use radicle::node;
23use radicle::node::address;
24use radicle::node::address::Store as _;
25use radicle::node::notifications;
26use radicle::node::policy::config as policy;
27use radicle::node::Event;
28use radicle::node::UserAgent;
29use radicle::profile::Home;
30use radicle::{cob, git, storage, Storage};
31
32use crate::control;
33use crate::node::{routing, NodeId};
34use crate::reactor;
35use crate::reactor::Reactor;
36use crate::service::gossip;
37use crate::wire::Wire;
38use crate::worker;
39use crate::{service, LocalTime};
40
41pub use handle::Error as HandleError;
42pub use handle::Handle;
43pub use node::events::Emitter;
44
45/// Maximum pending worker tasks allowed.
46pub const MAX_PENDING_TASKS: usize = 1024;
47
48/// A client error.
49#[derive(Error, Debug)]
50pub enum Error {
51    /// A routing database error.
52    #[error("routing database error: {0}")]
53    Routing(#[from] routing::Error),
54    /// A cobs cache database error.
55    #[error("cobs cache database error: {0}")]
56    CobsCache(#[from] cob::cache::Error),
57    /// A node database error.
58    #[error("node database error: {0}")]
59    Database(#[from] node::db::Error),
60    /// A storage error.
61    #[error("storage error: {0}")]
62    Storage(#[from] storage::Error),
63    /// A policies database error.
64    #[error("policies database error: {0}")]
65    Policy(#[from] policy::Error),
66    /// A notifications database error.
67    #[error("notifications database error: {0}")]
68    Notifications(#[from] notifications::Error),
69    /// A gossip database error.
70    #[error("gossip database error: {0}")]
71    Gossip(#[from] gossip::Error),
72    /// An address database error.
73    #[error("address database error: {0}")]
74    Address(#[from] address::Error),
75    /// A service error.
76    #[error("service error: {0}")]
77    Service(Box<service::Error>),
78    /// An I/O error.
79    #[error("i/o error: {0}")]
80    Io(#[from] io::Error),
81    /// A control socket error.
82    #[error("control socket error: {0}")]
83    Control(#[from] control::Error),
84    /// Another node is already running.
85    #[error(
86        "another node appears to be running; \
87        if this isn't the case, delete the socket file at '{0}' \
88        and restart the node"
89    )]
90    AlreadyRunning(PathBuf),
91    /// A git version error.
92    #[error("git version error: {0}")]
93    GitVersion(#[from] git::VersionError),
94}
95
96impl From<service::Error> for Error {
97    fn from(e: service::Error) -> Self {
98        Self::Service(Box::new(e))
99    }
100}
101
102/// Wraps a [`UnixListener`] but tracks its origin.
103pub enum ControlSocket {
104    /// The listener was created by binding to it.
105    Bound(UnixListener, PathBuf),
106    /// The listener was received via socket activation.
107    Received(UnixListener),
108}
109
110/// Holds join handles to the client threads, as well as a client handle.
111pub struct Runtime {
112    pub id: NodeId,
113    pub home: Home,
114    pub control: ControlSocket,
115    pub handle: Handle,
116    pub storage: Storage,
117    pub reactor: Reactor,
118    pub pool: worker::Pool,
119    pub local_addrs: Vec<net::SocketAddr>,
120    pub signals: chan::Receiver<Signal>,
121}
122
123impl Runtime {
124    /// Initialize the runtime.
125    ///
126    /// This function spawns threads.
127    pub fn init<G>(
128        home: Home,
129        config: radicle::node::Config,
130        listen: Vec<net::SocketAddr>,
131        signals: chan::Receiver<Signal>,
132        signer: Device<G>,
133    ) -> Result<Runtime, Error>
134    where
135        G: crypto::signature::Signer<crypto::Signature>
136            + Ecdh<Pk = NodeId>
137            + Clone
138            + Debug
139            + 'static,
140    {
141        let id = *signer.public_key();
142        let alias = config.alias.clone();
143        let network = config.network;
144        let rng = fastrand::Rng::new();
145        let clock = LocalTime::now();
146        let timestamp = clock.into();
147        let storage = Storage::open(home.storage(), git::UserInfo { alias, key: id })?;
148        let policy = config.seeding_policy.into();
149
150        for (key, _) in &config.extra {
151            log::warn!(target: "node", "Unused or deprecated configuration attribute {key:?}");
152        }
153
154        log::info!(target: "node", "Opening policy database..");
155        let policies = home.policies_mut()?;
156        let policies = policy::Config::new(policy, policies);
157        let notifications = home.notifications_mut()?;
158        let mut cobs_cache = cob::cache::Store::open(home.cobs().join(cob::cache::COBS_DB_FILE))?;
159
160        match cobs_cache.check_version() {
161            Ok(()) => {}
162            Err(cob::cache::Error::OutOfDate) => {
163                log::info!(target: "node", "Migrating COBs cache..");
164                let version = cobs_cache.migrate(migrate::log)?;
165                log::info!(target: "node", "Migration of COBs cache complete (version={version})..");
166            }
167            Err(e) => return Err(e.into()),
168        }
169
170        log::info!(target: "node", "Default seeding policy set to '{}'", &policy);
171        log::info!(target: "node", "Initializing service ({network:?})..");
172
173        let announcement = service::gossip::node(&config, timestamp)
174            .solve(Default::default())
175            .expect("Runtime::init: unable to solve proof-of-work puzzle");
176
177        log::info!(target: "node", "Opening node database..");
178        let db = home
179            .database_mut()?
180            .journal_mode(node::db::JournalMode::default())?
181            .init(
182                &id,
183                announcement.features,
184                &announcement.alias,
185                &announcement.agent,
186                announcement.timestamp,
187                announcement.addresses.iter(),
188            )?;
189        let mut stores: service::Stores<_> = db.clone().into();
190
191        if config.connect.is_empty() && stores.addresses().is_empty()? {
192            log::info!(target: "node", "Address book is empty. Adding bootstrap nodes..");
193
194            for (alias, version, addrs) in config.network.bootstrap() {
195                for addr in addrs {
196                    let (id, addr) = addr.into();
197
198                    stores.addresses_mut().insert(
199                        &id,
200                        version,
201                        radicle::node::Features::SEED,
202                        &alias,
203                        0,
204                        &UserAgent::default(),
205                        clock.into(),
206                        [node::KnownAddress::new(addr, address::Source::Bootstrap)],
207                    )?;
208                }
209            }
210            log::info!(target: "node", "{} nodes added to address book", stores.addresses().len()?);
211        }
212
213        let emitter: Emitter<Event> = Default::default();
214        let mut service = service::Service::new(
215            config.clone(),
216            stores,
217            storage.clone(),
218            policies,
219            signer.clone(),
220            rng,
221            announcement,
222            emitter.clone(),
223        );
224        service.initialize(clock)?;
225
226        let (worker_send, worker_recv) = chan::bounded::<worker::Task>(MAX_PENDING_TASKS);
227        let mut wire = Wire::new(service, worker_send, signer.clone());
228        let mut local_addrs = Vec::new();
229
230        for addr in listen {
231            let listener = reactor::Listener::bind(addr)?;
232            let local_addr = listener.local_addr();
233
234            local_addrs.push(local_addr);
235            wire.listen(listener);
236        }
237        let reactor = Reactor::new(wire, thread::name(&id, "service"))?;
238        let handle = Handle::new(home.clone(), reactor.controller(), emitter);
239
240        let nid = *signer.public_key();
241        let fetch = worker::FetchConfig {
242            limit: FetchLimit::default(),
243            local: nid,
244            expiry: worker::garbage::Expiry::default(),
245        };
246        let pool = worker::Pool::with(
247            worker_recv,
248            nid,
249            handle.clone(),
250            notifications,
251            cobs_cache,
252            db,
253            worker::Config {
254                capacity: config.workers.into(),
255                storage: storage.clone(),
256                fetch,
257                policy,
258                policies_db: home.node().join(node::POLICIES_DB_FILE),
259            },
260        )?;
261        let control = Self::bind(home.socket())?;
262
263        Ok(Runtime {
264            id,
265            home,
266            control,
267            storage,
268            reactor,
269            handle,
270            pool,
271            signals,
272            local_addrs,
273        })
274    }
275
276    pub fn run(self) -> Result<(), Error> {
277        let home = self.home;
278        let (listener, remove) = match self.control {
279            ControlSocket::Bound(listener, path) => (listener, Some(path)),
280            ControlSocket::Received(listener) => (listener, None),
281        };
282
283        log::info!(target: "node", "Running node {} in {}..", self.id, home.path().display());
284
285        thread::spawn(&self.id, "control", {
286            let handle = self.handle.clone();
287            || control::listen(listener, handle)
288        });
289
290        let _signals = thread::spawn(&self.id, "signals", move || loop {
291            use radicle::node::Handle as _;
292
293            match self.signals.recv() {
294                Ok(Signal::Terminate | Signal::Interrupt) => {
295                    log::info!(target: "node", "Termination signal received; shutting down..");
296                    self.handle.shutdown().ok();
297                    break;
298                }
299                Ok(Signal::Hangup) => {
300                    log::debug!(target: "node", "Hangup signal (SIGHUP) received; ignoring..");
301                }
302                Ok(Signal::WindowChanged) => {}
303                Err(e) => {
304                    log::warn!(target: "node", "Signal notifications channel error: {e}");
305                    break;
306                }
307            }
308        });
309
310        self.pool.run().unwrap();
311        self.reactor.join().unwrap();
312
313        // Nb. We don't join the control thread here, as we have no way of notifying it that the
314        // node is shutting down.
315
316        // Remove control socket file, but don't freak out if it's not there anymore.
317        remove.map(|path| fs::remove_file(path).ok());
318
319        log::debug!(target: "node", "Node shutdown completed for {}", self.id);
320
321        Ok(())
322    }
323
324    #[cfg(all(feature = "systemd", target_os = "linux"))]
325    fn receive_listener() -> Option<UnixListener> {
326        let fd = match radicle_systemd::listen::fd("control") {
327            Ok(Some(fd)) => fd,
328            Ok(None) => return None,
329            Err(err) => {
330                log::error!(target: "node", "Error receiving listener from systemd: {err}");
331                return None;
332            }
333        };
334
335        let socket: socket2::Socket = unsafe { std::os::fd::FromRawFd::from_raw_fd(fd) };
336
337        let domain = match socket.domain() {
338            Ok(domain) => domain,
339            Err(err) => {
340                log::error!(target: "node", "Error receiving listener from systemd when inspecting domain of socket: {err}");
341                return None;
342            }
343        };
344
345        if domain != socket2::Domain::UNIX {
346            log::error!(target: "node", "Dropping listener received from systemd: Domain is not AF_UNIX.");
347            return None;
348        }
349
350        Some(UnixListener::from(socket))
351    }
352
353    fn bind(path: PathBuf) -> Result<ControlSocket, Error> {
354        #[cfg(all(feature = "systemd", target_os = "linux"))]
355        {
356            if let Some(listener) = Self::receive_listener() {
357                log::info!(target: "node", "Received control socket.");
358                return Ok(ControlSocket::Received(listener));
359            }
360        }
361
362        log::info!(target: "node", "Binding control socket {}..", &path.display());
363        match UnixListener::bind(&path) {
364            Ok(sock) => Ok(ControlSocket::Bound(sock, path)),
365            Err(err) if err.kind() == io::ErrorKind::AddrInUse => Err(Error::AlreadyRunning(path)),
366            Err(err) => Err(err.into()),
367        }
368    }
369}