1pub mod handle;
2pub mod thread;
3
4use std::fmt::Debug;
5use std::path::PathBuf;
6use std::{fs, io, net};
7
8#[cfg(unix)]
9use std::os::unix::net::UnixListener;
10#[cfg(windows)]
11use uds_windows::UnixListener;
12
13use crossbeam_channel as chan;
14use cyphernet::Ecdh;
15use radicle::cob::migrate;
16use radicle::crypto;
17use radicle::node::device::Device;
18use radicle_fetch::FetchLimit;
19use radicle_signals::Signal;
20use thiserror::Error;
21
22use radicle::node;
23use radicle::node::address;
24use radicle::node::address::Store as _;
25use radicle::node::notifications;
26use radicle::node::policy::config as policy;
27use radicle::node::Event;
28use radicle::node::UserAgent;
29use radicle::profile::Home;
30use radicle::{cob, git, storage, Storage};
31
32use crate::control;
33use crate::node::{routing, NodeId};
34use crate::reactor;
35use crate::reactor::Reactor;
36use crate::service::gossip;
37use crate::wire::Wire;
38use crate::worker;
39use crate::{service, LocalTime};
40
41pub use handle::Error as HandleError;
42pub use handle::Handle;
43pub use node::events::Emitter;
44
45pub const MAX_PENDING_TASKS: usize = 1024;
47
48#[derive(Error, Debug)]
50pub enum Error {
51 #[error("routing database error: {0}")]
53 Routing(#[from] routing::Error),
54 #[error("cobs cache database error: {0}")]
56 CobsCache(#[from] cob::cache::Error),
57 #[error("node database error: {0}")]
59 Database(#[from] node::db::Error),
60 #[error("storage error: {0}")]
62 Storage(#[from] storage::Error),
63 #[error("policies database error: {0}")]
65 Policy(#[from] policy::Error),
66 #[error("notifications database error: {0}")]
68 Notifications(#[from] notifications::Error),
69 #[error("gossip database error: {0}")]
71 Gossip(#[from] gossip::Error),
72 #[error("address database error: {0}")]
74 Address(#[from] address::Error),
75 #[error("service error: {0}")]
77 Service(Box<service::Error>),
78 #[error("i/o error: {0}")]
80 Io(#[from] io::Error),
81 #[error("control socket error: {0}")]
83 Control(#[from] control::Error),
84 #[error(
86 "another node appears to be running; \
87 if this isn't the case, delete the socket file at '{0}' \
88 and restart the node"
89 )]
90 AlreadyRunning(PathBuf),
91 #[error("git version error: {0}")]
93 GitVersion(#[from] git::VersionError),
94}
95
96impl From<service::Error> for Error {
97 fn from(e: service::Error) -> Self {
98 Self::Service(Box::new(e))
99 }
100}
101
102pub enum ControlSocket {
104 Bound(UnixListener, PathBuf),
106 Received(UnixListener),
108}
109
110pub struct Runtime {
112 pub id: NodeId,
113 pub home: Home,
114 pub control: ControlSocket,
115 pub handle: Handle,
116 pub storage: Storage,
117 pub reactor: Reactor,
118 pub pool: worker::Pool,
119 pub local_addrs: Vec<net::SocketAddr>,
120 pub signals: chan::Receiver<Signal>,
121}
122
123impl Runtime {
124 pub fn init<G>(
128 home: Home,
129 config: radicle::node::Config,
130 listen: Vec<net::SocketAddr>,
131 signals: chan::Receiver<Signal>,
132 signer: Device<G>,
133 ) -> Result<Runtime, Error>
134 where
135 G: crypto::signature::Signer<crypto::Signature>
136 + Ecdh<Pk = NodeId>
137 + Clone
138 + Debug
139 + 'static,
140 {
141 let id = *signer.public_key();
142 let alias = config.alias.clone();
143 let network = config.network;
144 let rng = fastrand::Rng::new();
145 let clock = LocalTime::now();
146 let timestamp = clock.into();
147 let storage = Storage::open(home.storage(), git::UserInfo { alias, key: id })?;
148 let policy = config.seeding_policy.into();
149
150 for (key, _) in &config.extra {
151 log::warn!(target: "node", "Unused or deprecated configuration attribute {key:?}");
152 }
153
154 log::info!(target: "node", "Opening policy database..");
155 let policies = home.policies_mut()?;
156 let policies = policy::Config::new(policy, policies);
157 let notifications = home.notifications_mut()?;
158 let mut cobs_cache = cob::cache::Store::open(home.cobs().join(cob::cache::COBS_DB_FILE))?;
159
160 match cobs_cache.check_version() {
161 Ok(()) => {}
162 Err(cob::cache::Error::OutOfDate) => {
163 log::info!(target: "node", "Migrating COBs cache..");
164 let version = cobs_cache.migrate(migrate::log)?;
165 log::info!(target: "node", "Migration of COBs cache complete (version={version})..");
166 }
167 Err(e) => return Err(e.into()),
168 }
169
170 log::info!(target: "node", "Default seeding policy set to '{}'", &policy);
171 log::info!(target: "node", "Initializing service ({network:?})..");
172
173 let announcement = service::gossip::node(&config, timestamp)
174 .solve(Default::default())
175 .expect("Runtime::init: unable to solve proof-of-work puzzle");
176
177 log::info!(target: "node", "Opening node database..");
178 let db = home
179 .database_mut()?
180 .journal_mode(node::db::JournalMode::default())?
181 .init(
182 &id,
183 announcement.features,
184 &announcement.alias,
185 &announcement.agent,
186 announcement.timestamp,
187 announcement.addresses.iter(),
188 )?;
189 let mut stores: service::Stores<_> = db.clone().into();
190
191 if config.connect.is_empty() && stores.addresses().is_empty()? {
192 log::info!(target: "node", "Address book is empty. Adding bootstrap nodes..");
193
194 for (alias, version, addrs) in config.network.bootstrap() {
195 for addr in addrs {
196 let (id, addr) = addr.into();
197
198 stores.addresses_mut().insert(
199 &id,
200 version,
201 radicle::node::Features::SEED,
202 &alias,
203 0,
204 &UserAgent::default(),
205 clock.into(),
206 [node::KnownAddress::new(addr, address::Source::Bootstrap)],
207 )?;
208 }
209 }
210 log::info!(target: "node", "{} nodes added to address book", stores.addresses().len()?);
211 }
212
213 let emitter: Emitter<Event> = Default::default();
214 let mut service = service::Service::new(
215 config.clone(),
216 stores,
217 storage.clone(),
218 policies,
219 signer.clone(),
220 rng,
221 announcement,
222 emitter.clone(),
223 );
224 service.initialize(clock)?;
225
226 let (worker_send, worker_recv) = chan::bounded::<worker::Task>(MAX_PENDING_TASKS);
227 let mut wire = Wire::new(service, worker_send, signer.clone());
228 let mut local_addrs = Vec::new();
229
230 for addr in listen {
231 let listener = reactor::Listener::bind(addr)?;
232 let local_addr = listener.local_addr();
233
234 local_addrs.push(local_addr);
235 wire.listen(listener);
236 }
237 let reactor = Reactor::new(wire, thread::name(&id, "service"))?;
238 let handle = Handle::new(home.clone(), reactor.controller(), emitter);
239
240 let nid = *signer.public_key();
241 let fetch = worker::FetchConfig {
242 limit: FetchLimit::default(),
243 local: nid,
244 expiry: worker::garbage::Expiry::default(),
245 };
246 let pool = worker::Pool::with(
247 worker_recv,
248 nid,
249 handle.clone(),
250 notifications,
251 cobs_cache,
252 db,
253 worker::Config {
254 capacity: config.workers.into(),
255 storage: storage.clone(),
256 fetch,
257 policy,
258 policies_db: home.node().join(node::POLICIES_DB_FILE),
259 },
260 )?;
261 let control = Self::bind(home.socket())?;
262
263 Ok(Runtime {
264 id,
265 home,
266 control,
267 storage,
268 reactor,
269 handle,
270 pool,
271 signals,
272 local_addrs,
273 })
274 }
275
276 pub fn run(self) -> Result<(), Error> {
277 let home = self.home;
278 let (listener, remove) = match self.control {
279 ControlSocket::Bound(listener, path) => (listener, Some(path)),
280 ControlSocket::Received(listener) => (listener, None),
281 };
282
283 log::info!(target: "node", "Running node {} in {}..", self.id, home.path().display());
284
285 thread::spawn(&self.id, "control", {
286 let handle = self.handle.clone();
287 || control::listen(listener, handle)
288 });
289
290 let _signals = thread::spawn(&self.id, "signals", move || loop {
291 use radicle::node::Handle as _;
292
293 match self.signals.recv() {
294 Ok(Signal::Terminate | Signal::Interrupt) => {
295 log::info!(target: "node", "Termination signal received; shutting down..");
296 self.handle.shutdown().ok();
297 break;
298 }
299 Ok(Signal::Hangup) => {
300 log::debug!(target: "node", "Hangup signal (SIGHUP) received; ignoring..");
301 }
302 Ok(Signal::WindowChanged) => {}
303 Err(e) => {
304 log::warn!(target: "node", "Signal notifications channel error: {e}");
305 break;
306 }
307 }
308 });
309
310 self.pool.run().unwrap();
311 self.reactor.join().unwrap();
312
313 remove.map(|path| fs::remove_file(path).ok());
318
319 log::debug!(target: "node", "Node shutdown completed for {}", self.id);
320
321 Ok(())
322 }
323
324 #[cfg(all(feature = "systemd", target_os = "linux"))]
325 fn receive_listener() -> Option<UnixListener> {
326 let fd = match radicle_systemd::listen::fd("control") {
327 Ok(Some(fd)) => fd,
328 Ok(None) => return None,
329 Err(err) => {
330 log::error!(target: "node", "Error receiving listener from systemd: {err}");
331 return None;
332 }
333 };
334
335 let socket: socket2::Socket = unsafe { std::os::fd::FromRawFd::from_raw_fd(fd) };
336
337 let domain = match socket.domain() {
338 Ok(domain) => domain,
339 Err(err) => {
340 log::error!(target: "node", "Error receiving listener from systemd when inspecting domain of socket: {err}");
341 return None;
342 }
343 };
344
345 if domain != socket2::Domain::UNIX {
346 log::error!(target: "node", "Dropping listener received from systemd: Domain is not AF_UNIX.");
347 return None;
348 }
349
350 Some(UnixListener::from(socket))
351 }
352
353 fn bind(path: PathBuf) -> Result<ControlSocket, Error> {
354 #[cfg(all(feature = "systemd", target_os = "linux"))]
355 {
356 if let Some(listener) = Self::receive_listener() {
357 log::info!(target: "node", "Received control socket.");
358 return Ok(ControlSocket::Received(listener));
359 }
360 }
361
362 log::info!(target: "node", "Binding control socket {}..", &path.display());
363 match UnixListener::bind(&path) {
364 Ok(sock) => Ok(ControlSocket::Bound(sock, path)),
365 Err(err) if err.kind() == io::ErrorKind::AddrInUse => Err(Error::AlreadyRunning(path)),
366 Err(err) => Err(err.into()),
367 }
368 }
369}