2019-08-05 01:44:38 -07:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.lnd;
|
2019-11-27 05:04:23 -08:00
|
|
|
inherit (config) nix-bitcoin-services;
|
2019-08-05 01:44:38 -07:00
|
|
|
configFile = pkgs.writeText "lnd.conf" ''
|
|
|
|
datadir=${cfg.dataDir}
|
2019-08-22 16:38:27 -07:00
|
|
|
logdir=${cfg.dataDir}/logs
|
2019-08-05 01:44:38 -07:00
|
|
|
bitcoin.mainnet=1
|
|
|
|
tlscertpath=/secrets/lnd_cert
|
|
|
|
tlskeypath=/secrets/lnd_key
|
|
|
|
|
2019-11-27 05:04:43 -08:00
|
|
|
rpclisten=localhost:${toString cfg.rpcPort}
|
|
|
|
|
2019-08-05 01:44:38 -07:00
|
|
|
bitcoin.active=1
|
|
|
|
bitcoin.node=bitcoind
|
|
|
|
|
|
|
|
tor.active=true
|
|
|
|
tor.v3=true
|
|
|
|
tor.streamisolation=true
|
2019-08-22 16:38:27 -07:00
|
|
|
tor.privatekeypath=${cfg.dataDir}/v3_onion_private_key
|
2019-08-05 01:44:38 -07:00
|
|
|
|
|
|
|
bitcoind.rpcuser=${config.services.bitcoind.rpcuser}
|
|
|
|
bitcoind.zmqpubrawblock=${config.services.bitcoind.zmqpubrawblock}
|
|
|
|
bitcoind.zmqpubrawtx=${config.services.bitcoind.zmqpubrawtx}
|
|
|
|
|
|
|
|
${cfg.extraConfig}
|
|
|
|
'';
|
|
|
|
in {
|
|
|
|
|
|
|
|
options.services.lnd = {
|
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
If enabled, the LND service will be installed.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
dataDir = mkOption {
|
|
|
|
type = types.path;
|
|
|
|
default = "/var/lib/lnd";
|
|
|
|
description = "The data directory for LND.";
|
|
|
|
};
|
2019-11-27 05:04:43 -08:00
|
|
|
rpcPort = mkOption {
|
|
|
|
type = types.ints.u16;
|
|
|
|
default = 10009;
|
|
|
|
description = "Port on which to listen for gRPC connections.";
|
|
|
|
};
|
2019-08-05 01:44:38 -07:00
|
|
|
extraConfig = mkOption {
|
|
|
|
type = types.lines;
|
|
|
|
default = "";
|
|
|
|
example = ''
|
|
|
|
autopilot.active=1
|
|
|
|
'';
|
|
|
|
description = "Additional configurations to be appended to <filename>lnd.conf</filename>.";
|
|
|
|
};
|
2019-11-27 05:04:34 -08:00
|
|
|
cli = mkOption {
|
|
|
|
readOnly = true;
|
|
|
|
default = pkgs.writeScriptBin "lncli"
|
|
|
|
# Switch user because lnd makes datadir contents readable by user only
|
|
|
|
''
|
|
|
|
exec sudo -u lnd ${pkgs.nix-bitcoin.lnd}/bin/lncli --tlscertpath /secrets/lnd_cert \
|
|
|
|
--macaroonpath '${cfg.dataDir}/chain/bitcoin/mainnet/admin.macaroon' "$@"
|
|
|
|
'';
|
|
|
|
description = "Binary to connect with the lnd instance.";
|
|
|
|
};
|
2019-08-05 01:44:38 -07:00
|
|
|
enforceTor = nix-bitcoin-services.enforceTor;
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
users.users.lnd = {
|
|
|
|
description = "LND User";
|
|
|
|
group = "lnd";
|
2019-11-27 05:04:19 -08:00
|
|
|
extraGroups = [ "bitcoinrpc" ];
|
2019-08-05 01:44:38 -07:00
|
|
|
home = cfg.dataDir;
|
|
|
|
};
|
2019-11-27 05:04:15 -08:00
|
|
|
users.groups.lnd = {};
|
2019-08-05 01:44:38 -07:00
|
|
|
|
|
|
|
systemd.services.lnd = {
|
|
|
|
description = "Run LND";
|
2019-11-27 05:04:21 -08:00
|
|
|
path = [ pkgs.nix-bitcoin.bitcoind ];
|
2019-08-05 01:44:38 -07:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
requires = [ "bitcoind.service" ];
|
|
|
|
after = [ "bitcoind.service" ];
|
|
|
|
preStart = ''
|
|
|
|
mkdir -m 0770 -p ${cfg.dataDir}
|
|
|
|
cp ${configFile} ${cfg.dataDir}/lnd.conf
|
|
|
|
chown -R 'lnd:lnd' '${cfg.dataDir}'
|
|
|
|
chmod u=rw,g=r,o= ${cfg.dataDir}/lnd.conf
|
|
|
|
echo "bitcoind.rpcpass=$(cat /secrets/bitcoin-rpcpassword)" >> '${cfg.dataDir}/lnd.conf'
|
|
|
|
'';
|
|
|
|
serviceConfig = {
|
|
|
|
PermissionsStartOnly = "true";
|
2019-11-27 05:04:21 -08:00
|
|
|
ExecStart = "${pkgs.nix-bitcoin.lnd}/bin/lnd --configfile=${cfg.dataDir}/lnd.conf";
|
2019-08-05 01:44:38 -07:00
|
|
|
User = "lnd";
|
|
|
|
Restart = "on-failure";
|
|
|
|
RestartSec = "10s";
|
|
|
|
} // nix-bitcoin-services.defaultHardening
|
|
|
|
// (if cfg.enforceTor
|
|
|
|
then nix-bitcoin-services.allowTor
|
|
|
|
else nix-bitcoin-services.allowAnyIP
|
|
|
|
) // nix-bitcoin-services.allowAnyProtocol; # For ZMQ
|
2019-11-27 05:04:39 -08:00
|
|
|
postStart = ''
|
|
|
|
umask 377
|
|
|
|
|
2019-11-27 05:04:41 -08:00
|
|
|
attempts=50
|
|
|
|
while ! { exec 3>/dev/tcp/127.0.0.1/8080 && exec 3>&-; } &>/dev/null; do
|
|
|
|
((attempts-- == 0)) && { echo "lnd REST service unreachable"; exit 1; }
|
|
|
|
sleep 0.1
|
|
|
|
done
|
2019-11-27 05:04:39 -08:00
|
|
|
|
2019-11-27 05:04:40 -08:00
|
|
|
if [[ ! -f /secrets/lnd-seed-mnemonic ]]; then
|
2019-11-27 05:04:39 -08:00
|
|
|
echo Creating lnd seed
|
|
|
|
|
|
|
|
${pkgs.curl}/bin/curl -s \
|
2019-11-27 05:04:40 -08:00
|
|
|
--cacert /secrets/lnd_cert \
|
|
|
|
-X GET https://127.0.0.1:8080/v1/genseed | ${pkgs.jq}/bin/jq -c '.cipher_seed_mnemonic' > /secrets/lnd-seed-mnemonic
|
2019-11-27 05:04:39 -08:00
|
|
|
fi
|
|
|
|
|
2019-11-27 05:04:40 -08:00
|
|
|
if [[ ! -f ${cfg.dataDir}/chain/bitcoin/mainnet/wallet.db ]]; then
|
2019-11-27 05:04:39 -08:00
|
|
|
echo Creating lnd wallet
|
|
|
|
|
2019-11-27 05:04:42 -08:00
|
|
|
${pkgs.curl}/bin/curl -s --output /dev/null --show-error \
|
2019-11-27 05:04:40 -08:00
|
|
|
--cacert /secrets/lnd_cert \
|
2019-11-27 05:04:42 -08:00
|
|
|
-X POST -d "{\"wallet_password\": \"$(cat /secrets/lnd-wallet-password | tr -d '\n' | base64 -w0)\", \
|
2019-11-27 05:04:40 -08:00
|
|
|
\"cipher_seed_mnemonic\": $(cat /secrets/lnd-seed-mnemonic | tr -d '\n')}" \
|
|
|
|
https://127.0.0.1:8080/v1/initwallet
|
2019-11-27 05:04:39 -08:00
|
|
|
else
|
|
|
|
echo Unlocking lnd wallet
|
|
|
|
|
|
|
|
${pkgs.curl}/bin/curl -s \
|
2019-11-27 05:04:40 -08:00
|
|
|
-H "Grpc-Metadata-macaroon: $(${pkgs.xxd}/bin/xxd -ps -u -c 99999 ${cfg.dataDir}/chain/bitcoin/mainnet/admin.macaroon)" \
|
|
|
|
--cacert /secrets/lnd_cert \
|
|
|
|
-X POST \
|
|
|
|
-d "{\"wallet_password\": \"$(cat /secrets/lnd-wallet-password | tr -d '\n' | base64 -w0)\"}" \
|
|
|
|
https://127.0.0.1:8080/v1/unlockwallet
|
2019-11-27 05:04:39 -08:00
|
|
|
fi
|
|
|
|
'';
|
2019-08-05 01:44:38 -07:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|