1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
use std::process;

use clap::{App, Arg};
use log::{error, info, warn};

#[cfg(feature = "postgres")]
use crate::database::postgres;
use crate::database::sled::SledDatabase;
use crate::server::LightningStorageServer;
use crate::server::StorageServer;
use crate::util::{init_secret_key, read_public_key, read_secret_key, setup_logging};
use tonic::transport::{server::ServerTlsConfig, Identity};

pub const SERVER_APP_NAME: &str = "lssd";
#[cfg(feature = "postgres")]
const DATABASES: [&str; 2] = ["sled", "postgres"];
#[cfg(not(feature = "postgres"))]
const DATABASES: [&str; 1] = ["sled"];

fn configure_tls(
    server: tonic::transport::Server,
    matches: &clap::ArgMatches,
    datadir: &std::path::PathBuf,
) -> Result<tonic::transport::Server, Box<dyn std::error::Error>> {
    if !matches.is_present("grpc-tls-key") {
        return Ok(server);
    }

    let mut key_file = datadir.clone();
    key_file.push(matches.value_of("grpc-tls-key").unwrap());
    let key = std::fs::read(key_file).map_err(|_| "could not read key file")?;

    let mut cert_file = datadir.clone();
    cert_file.push(matches.value_of("grpc-tls-certificate").unwrap());
    let cert = std::fs::read(cert_file).map_err(|_| "could not read certificate file")?;

    let identity = Identity::from_pem(cert, key);
    let tls_config = ServerTlsConfig::new().identity(identity);

    let tls_config = match matches.value_of("grpc-tls-authority") {
        None => tls_config,
        Some(p) => {
            let mut ca_file = datadir.clone();
            ca_file.push(p);
            let ca = std::fs::read(ca_file).map_err(|_| "could not read key file")?;
            tls_config.client_ca_root(tonic::transport::Certificate::from_pem(ca))
        }
    };

    Ok(server.tls_config(tls_config)?)
}

#[tokio::main(worker_threads = 2)]
pub async fn start() -> Result<(), Box<dyn std::error::Error>> {
    println!("{} {} starting", SERVER_APP_NAME, process::id());
    let app = App::new(SERVER_APP_NAME)
        .help("Lightning Storage Server with a gRPC interface.")
        .arg(
            Arg::new("interface")
                .help("the interface to listen on (ip v4 or v6)")
                .short('i')
                .long("interface")
                .takes_value(true)
                .value_name("0.0.0.0")
                .default_value("127.0.0.1"),
        )
        .arg(
            Arg::new("port")
                .help("the port to listen")
                .short('p')
                .long("port")
                .takes_value(true)
                .default_value("55551"),
        )
        .arg(
            Arg::new("grpc-tls-certificate")
                .help("Server identity certificate")
                .long("grpc-tls-certificate")
                .takes_value(true)
                .requires("grpc-tls-key"),
        )
        .arg(
            Arg::new("grpc-tls-key")
                .long("grpc-tls-key")
                .help("Server identity key")
                .takes_value(true)
                .requires("grpc-tls-certificate"),
        )
        .arg(
            Arg::new("grpc-tls-authority")
                .long("grpc-tls-authority")
                .help("Certificate authority to verify client certificates (requires TLS to be configured with --grpc-tls-key and --grpc-tls-certificate)")
                .takes_value(true)
                .requires_all(&["grpc-tls-certificate", "grpc-tls-key"]),
        )
        .arg(
            Arg::new("cleardb")
                .help("clear the database on startup")
                .short('c')
                .long("cleardb")
                .takes_value(false),
        )
        .arg(
            Arg::new("datadir")
                .help("data directory")
                .long("datadir")
                .takes_value(true)
                .default_value(".lss"),
        )
        .arg(
            Arg::new("database")
                .long("database")
                .help("specify DB backend")
                .takes_value(true)
                .default_value("sled")
                .possible_values(&DATABASES),
        );
    let matches = app.get_matches();

    setup_logging("lssd", "info");

    let addr =
        format!("{}:{}", matches.value_of("interface").unwrap(), matches.value_of("port").unwrap())
            .parse()?;
    let home_dir = dirs::home_dir().ok_or("home directory not found")?;
    let datadir_opt = matches.value_of("datadir").unwrap();
    let mut datadir = home_dir;
    datadir.push(datadir_opt);

    // ignore failure - we may be already initialized
    let _ = init_secret_key("server_key");
    let secret_key = read_secret_key("server_key")?;
    let public_key = read_public_key("server_key")?;

    let clear_db = matches.is_present("cleardb");

    #[cfg(not(feature = "dangerous_flags"))]
    if clear_db {
        error!("--cleardb is a dangerous flag and is only available with the dangerous-flags compilation feature");
        return Err("flag not available".into());
    }

    let database: Box<dyn crate::database::Database> = match matches.value_of("database") {
        #[cfg(feature = "postgres")]
        Some("postgres") => Box::new(
            if clear_db { postgres::new_and_clear().await } else { postgres::new().await }.unwrap(),
        ),
        Some("sled") => Box::new(
            if clear_db {
                SledDatabase::new_and_clear(datadir.clone()).await
            } else {
                SledDatabase::new(datadir.clone()).await
            }
            .unwrap(),
        ),
        None => panic!("database not specified, even though there is a default value"),
        Some(v) => Err(format!("unsupported option for --database: {}", v))?,
    };

    let server = StorageServer { database, public_key, secret_key };
    let (shutdown_trigger, shutdown_signal) = triggered::trigger();

    ctrlc::set_handler(move || {
        warn!("ctrl-C");
        shutdown_trigger.trigger();
    })
    .expect("Error setting Ctrl-C handler");

    let service = tonic::transport::Server::builder();

    let service = configure_tls(service, &matches, &datadir)?
        .add_service(LightningStorageServer::new(server))
        .serve_with_shutdown(addr, shutdown_signal);
    info!("{} {} ready on {} datadir {}", SERVER_APP_NAME, process::id(), addr, datadir.display());
    service.await?;
    info!("{} {} finished", SERVER_APP_NAME, process::id());
    Ok(())
}