Compare commits
3 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
54b91af76c | ||
|
|
6d9b4efb7e | ||
|
|
6f51f445b7 |
3
.gitignore
vendored
3
.gitignore
vendored
@@ -2,5 +2,8 @@ nostr_core_lib/
|
|||||||
nips/
|
nips/
|
||||||
build/
|
build/
|
||||||
relay.log
|
relay.log
|
||||||
|
relay.pid
|
||||||
Trash/
|
Trash/
|
||||||
src/version.h
|
src/version.h
|
||||||
|
dev-config/
|
||||||
|
db/
|
||||||
|
|||||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -32,24 +32,42 @@ if [ "$HELP" = true ]; then
|
|||||||
echo "Usage: $0 [OPTIONS]"
|
echo "Usage: $0 [OPTIONS]"
|
||||||
echo ""
|
echo ""
|
||||||
echo "Options:"
|
echo "Options:"
|
||||||
echo " --preserve-config Keep existing configuration file (don't regenerate)"
|
echo " --preserve-config, -p Keep existing configuration file (don't regenerate)"
|
||||||
echo " --help, -h Show this help message"
|
echo " --help, -h Show this help message"
|
||||||
echo ""
|
echo ""
|
||||||
|
echo "Development Setup:"
|
||||||
|
echo " Uses local config directory: ./dev-config/"
|
||||||
|
echo " This avoids conflicts with production instances using ~/.config/c-relay/"
|
||||||
|
echo ""
|
||||||
echo "Default behavior: Automatically regenerates configuration file on each build"
|
echo "Default behavior: Automatically regenerates configuration file on each build"
|
||||||
echo " for development purposes"
|
echo " for development purposes"
|
||||||
exit 0
|
exit 0
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Handle configuration file regeneration
|
# Handle configuration file and database regeneration
|
||||||
CONFIG_FILE="$HOME/.config/c-relay/c_relay_config_event.json"
|
# Use local development config directory to avoid conflicts with production
|
||||||
if [ "$PRESERVE_CONFIG" = false ] && [ -f "$CONFIG_FILE" ]; then
|
DEV_CONFIG_DIR="./dev-config"
|
||||||
echo "Removing old configuration file to trigger regeneration..."
|
CONFIG_FILE="$DEV_CONFIG_DIR/c_relay_config_event.json"
|
||||||
rm -f "$CONFIG_FILE"
|
DB_FILE="./db/c_nostr_relay.db"
|
||||||
echo "✓ Configuration file removed - will be regenerated with latest database values"
|
|
||||||
elif [ "$PRESERVE_CONFIG" = true ] && [ -f "$CONFIG_FILE" ]; then
|
# Create development config directory if it doesn't exist
|
||||||
echo "Preserving existing configuration file as requested"
|
mkdir -p "$DEV_CONFIG_DIR"
|
||||||
elif [ ! -f "$CONFIG_FILE" ]; then
|
|
||||||
echo "No existing configuration file found - will generate new one"
|
if [ "$PRESERVE_CONFIG" = false ]; then
|
||||||
|
if [ -f "$CONFIG_FILE" ]; then
|
||||||
|
echo "Removing old development configuration file to trigger regeneration..."
|
||||||
|
rm -f "$CONFIG_FILE"
|
||||||
|
echo "✓ Development configuration file removed - will be regenerated with new keys"
|
||||||
|
fi
|
||||||
|
if [ -f "$DB_FILE" ]; then
|
||||||
|
echo "Removing old database to trigger fresh key generation..."
|
||||||
|
rm -f "$DB_FILE"* # Remove db file and any WAL/SHM files
|
||||||
|
echo "✓ Database removed - will be recreated with embedded schema and new keys"
|
||||||
|
fi
|
||||||
|
elif [ "$PRESERVE_CONFIG" = true ]; then
|
||||||
|
echo "Preserving existing development configuration and database as requested"
|
||||||
|
else
|
||||||
|
echo "No existing development configuration or database found - will generate fresh setup"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Build the project first
|
# Build the project first
|
||||||
@@ -107,18 +125,16 @@ fi
|
|||||||
# Clean up PID file
|
# Clean up PID file
|
||||||
rm -f relay.pid
|
rm -f relay.pid
|
||||||
|
|
||||||
# Initialize database if needed
|
# Database initialization is now handled automatically by the relay
|
||||||
if [ ! -f "./db/c_nostr_relay.db" ]; then
|
# when it starts up with embedded schema
|
||||||
echo "Initializing database..."
|
echo "Database will be initialized automatically on startup if needed"
|
||||||
./db/init.sh --force >/dev/null 2>&1
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Start relay in background with output redirection
|
# Start relay in background with output redirection
|
||||||
echo "Starting relay server..."
|
echo "Starting relay server..."
|
||||||
echo "Debug: Current processes: $(ps aux | grep 'c_relay_' | grep -v grep || echo 'None')"
|
echo "Debug: Current processes: $(ps aux | grep 'c_relay_' | grep -v grep || echo 'None')"
|
||||||
|
|
||||||
# Start relay in background and capture its PID
|
# Start relay in background and capture its PID with development config directory
|
||||||
$BINARY_PATH > relay.log 2>&1 &
|
$BINARY_PATH --config-dir "$DEV_CONFIG_DIR" > relay.log 2>&1 &
|
||||||
RELAY_PID=$!
|
RELAY_PID=$!
|
||||||
|
|
||||||
echo "Started with PID: $RELAY_PID"
|
echo "Started with PID: $RELAY_PID"
|
||||||
@@ -137,24 +153,25 @@ if ps -p "$RELAY_PID" >/dev/null 2>&1; then
|
|||||||
# Save PID for debugging
|
# Save PID for debugging
|
||||||
echo $RELAY_PID > relay.pid
|
echo $RELAY_PID > relay.pid
|
||||||
|
|
||||||
# Check if a new private key was generated and display it
|
# Check if new keys were generated and display them
|
||||||
sleep 1 # Give relay time to write initial logs
|
sleep 1 # Give relay time to write initial logs
|
||||||
if grep -q "GENERATED RELAY ADMIN PRIVATE KEY" relay.log 2>/dev/null; then
|
if grep -q "GENERATED RELAY KEYPAIRS" relay.log 2>/dev/null; then
|
||||||
echo "=== IMPORTANT: NEW ADMIN PRIVATE KEY GENERATED ==="
|
echo "=== IMPORTANT: NEW KEYPAIRS GENERATED ==="
|
||||||
echo ""
|
echo ""
|
||||||
# Extract and display the private key section from the log
|
# Extract and display the keypairs section from the log
|
||||||
grep -A 8 -B 2 "GENERATED RELAY ADMIN PRIVATE KEY" relay.log | head -n 12
|
grep -A 12 -B 2 "GENERATED RELAY KEYPAIRS" relay.log | head -n 16
|
||||||
echo ""
|
echo ""
|
||||||
echo "⚠️ SAVE THIS PRIVATE KEY SECURELY - IT CONTROLS YOUR RELAY!"
|
echo "⚠️ SAVE THESE PRIVATE KEYS SECURELY - THEY CONTROL YOUR RELAY!"
|
||||||
echo "⚠️ This key is also logged in relay.log for reference"
|
echo "⚠️ These keys are also logged in relay.log for reference"
|
||||||
echo ""
|
echo ""
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "=== Relay server running in background ==="
|
echo "=== Relay server running in background ==="
|
||||||
|
echo "Development config: $DEV_CONFIG_DIR/"
|
||||||
echo "To kill relay: pkill -f 'c_relay_'"
|
echo "To kill relay: pkill -f 'c_relay_'"
|
||||||
echo "To check status: ps aux | grep c_relay_"
|
echo "To check status: ps aux | grep c_relay_"
|
||||||
echo "To view logs: tail -f relay.log"
|
echo "To view logs: tail -f relay.log"
|
||||||
echo "Binary: $BINARY_PATH"
|
echo "Binary: $BINARY_PATH --config-dir $DEV_CONFIG_DIR"
|
||||||
echo "Ready for Nostr client connections!"
|
echo "Ready for Nostr client connections!"
|
||||||
else
|
else
|
||||||
echo "ERROR: Relay failed to start"
|
echo "ERROR: Relay failed to start"
|
||||||
|
|||||||
328
src/config.c
328
src/config.c
@@ -34,15 +34,37 @@ int init_configuration_system(void) {
|
|||||||
memset(&g_config_manager, 0, sizeof(config_manager_t));
|
memset(&g_config_manager, 0, sizeof(config_manager_t));
|
||||||
g_config_manager.db = g_db;
|
g_config_manager.db = g_db;
|
||||||
|
|
||||||
// Get XDG configuration directory
|
// Check for command line config file override first
|
||||||
if (get_xdg_config_dir(g_config_manager.config_dir_path, sizeof(g_config_manager.config_dir_path)) != 0) {
|
const char* config_file_override = getenv(CONFIG_FILE_OVERRIDE_ENV);
|
||||||
log_error("Failed to determine XDG configuration directory");
|
if (config_file_override && strlen(config_file_override) > 0) {
|
||||||
return -1;
|
// Use specific config file override
|
||||||
}
|
strncpy(g_config_manager.config_file_path, config_file_override,
|
||||||
|
sizeof(g_config_manager.config_file_path) - 1);
|
||||||
|
g_config_manager.config_file_path[sizeof(g_config_manager.config_file_path) - 1] = '\0';
|
||||||
|
|
||||||
// Build configuration file path
|
// Extract directory from file path for config_dir_path
|
||||||
snprintf(g_config_manager.config_file_path, sizeof(g_config_manager.config_file_path),
|
char* last_slash = strrchr(g_config_manager.config_file_path, '/');
|
||||||
"%s/%s", g_config_manager.config_dir_path, CONFIG_FILE_NAME);
|
if (last_slash) {
|
||||||
|
size_t dir_len = last_slash - g_config_manager.config_file_path;
|
||||||
|
strncpy(g_config_manager.config_dir_path, g_config_manager.config_file_path, dir_len);
|
||||||
|
g_config_manager.config_dir_path[dir_len] = '\0';
|
||||||
|
} else {
|
||||||
|
// File in current directory
|
||||||
|
strcpy(g_config_manager.config_dir_path, ".");
|
||||||
|
}
|
||||||
|
|
||||||
|
log_info("Using configuration file from command line override");
|
||||||
|
} else {
|
||||||
|
// Get XDG configuration directory (with --config-dir override support)
|
||||||
|
if (get_xdg_config_dir(g_config_manager.config_dir_path, sizeof(g_config_manager.config_dir_path)) != 0) {
|
||||||
|
log_error("Failed to determine configuration directory");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build configuration file path
|
||||||
|
snprintf(g_config_manager.config_file_path, sizeof(g_config_manager.config_file_path),
|
||||||
|
"%s/%s", g_config_manager.config_dir_path, CONFIG_FILE_NAME);
|
||||||
|
}
|
||||||
|
|
||||||
log_info("Configuration directory: %s");
|
log_info("Configuration directory: %s");
|
||||||
printf(" %s\n", g_config_manager.config_dir_path);
|
printf(" %s\n", g_config_manager.config_dir_path);
|
||||||
@@ -154,7 +176,7 @@ int init_config_database_statements(void) {
|
|||||||
log_info("Initializing configuration database statements...");
|
log_info("Initializing configuration database statements...");
|
||||||
|
|
||||||
// Prepare statement for getting configuration values
|
// Prepare statement for getting configuration values
|
||||||
const char* get_sql = "SELECT value FROM server_config WHERE key = ?";
|
const char* get_sql = "SELECT value FROM config WHERE key = ?";
|
||||||
int rc = sqlite3_prepare_v2(g_db, get_sql, -1, &g_config_manager.get_config_stmt, NULL);
|
int rc = sqlite3_prepare_v2(g_db, get_sql, -1, &g_config_manager.get_config_stmt, NULL);
|
||||||
if (rc != SQLITE_OK) {
|
if (rc != SQLITE_OK) {
|
||||||
log_error("Failed to prepare get_config statement");
|
log_error("Failed to prepare get_config statement");
|
||||||
@@ -162,7 +184,7 @@ int init_config_database_statements(void) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Prepare statement for setting configuration values
|
// Prepare statement for setting configuration values
|
||||||
const char* set_sql = "INSERT OR REPLACE INTO server_config (key, value, updated_at) VALUES (?, ?, strftime('%s', 'now'))";
|
const char* set_sql = "INSERT OR REPLACE INTO config (key, value, updated_at) VALUES (?, ?, strftime('%s', 'now'))";
|
||||||
rc = sqlite3_prepare_v2(g_db, set_sql, -1, &g_config_manager.set_config_stmt, NULL);
|
rc = sqlite3_prepare_v2(g_db, set_sql, -1, &g_config_manager.set_config_stmt, NULL);
|
||||||
if (rc != SQLITE_OK) {
|
if (rc != SQLITE_OK) {
|
||||||
log_error("Failed to prepare set_config statement");
|
log_error("Failed to prepare set_config statement");
|
||||||
@@ -242,7 +264,7 @@ int load_config_from_database(void) {
|
|||||||
// Database configuration is already populated by schema defaults
|
// Database configuration is already populated by schema defaults
|
||||||
// This function validates that the configuration tables exist and are accessible
|
// This function validates that the configuration tables exist and are accessible
|
||||||
|
|
||||||
const char* test_sql = "SELECT COUNT(*) FROM server_config WHERE config_type IN ('system', 'user')";
|
const char* test_sql = "SELECT COUNT(*) FROM config WHERE config_type IN ('system', 'user')";
|
||||||
sqlite3_stmt* test_stmt;
|
sqlite3_stmt* test_stmt;
|
||||||
|
|
||||||
int rc = sqlite3_prepare_v2(g_db, test_sql, -1, &test_stmt, NULL);
|
int rc = sqlite3_prepare_v2(g_db, test_sql, -1, &test_stmt, NULL);
|
||||||
@@ -273,13 +295,22 @@ int load_config_from_database(void) {
|
|||||||
// ================================
|
// ================================
|
||||||
|
|
||||||
int get_xdg_config_dir(char* path, size_t path_size) {
|
int get_xdg_config_dir(char* path, size_t path_size) {
|
||||||
const char* xdg_config_home = getenv("XDG_CONFIG_HOME");
|
// Priority 1: Command line --config-dir override
|
||||||
|
const char* config_dir_override = getenv(CONFIG_DIR_OVERRIDE_ENV);
|
||||||
|
if (config_dir_override && strlen(config_dir_override) > 0) {
|
||||||
|
strncpy(path, config_dir_override, path_size - 1);
|
||||||
|
path[path_size - 1] = '\0';
|
||||||
|
log_info("Using config directory from command line override");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Priority 2: XDG_CONFIG_HOME environment variable
|
||||||
|
const char* xdg_config_home = getenv("XDG_CONFIG_HOME");
|
||||||
if (xdg_config_home && strlen(xdg_config_home) > 0) {
|
if (xdg_config_home && strlen(xdg_config_home) > 0) {
|
||||||
// Use XDG_CONFIG_HOME if set
|
// Use XDG_CONFIG_HOME if set
|
||||||
snprintf(path, path_size, "%s/%s", xdg_config_home, CONFIG_XDG_DIR_NAME);
|
snprintf(path, path_size, "%s/%s", xdg_config_home, CONFIG_XDG_DIR_NAME);
|
||||||
} else {
|
} else {
|
||||||
// Fall back to ~/.config
|
// Priority 3: Fall back to ~/.config
|
||||||
const char* home = getenv("HOME");
|
const char* home = getenv("HOME");
|
||||||
if (!home) {
|
if (!home) {
|
||||||
log_error("Neither XDG_CONFIG_HOME nor HOME environment variable is set");
|
log_error("Neither XDG_CONFIG_HOME nor HOME environment variable is set");
|
||||||
@@ -677,7 +708,7 @@ int config_requires_restart(const char* key) {
|
|||||||
if (!key) return 0;
|
if (!key) return 0;
|
||||||
|
|
||||||
// Check database for requires_restart flag
|
// Check database for requires_restart flag
|
||||||
const char* sql = "SELECT requires_restart FROM server_config WHERE key = ?";
|
const char* sql = "SELECT requires_restart FROM config WHERE key = ?";
|
||||||
sqlite3_stmt* stmt;
|
sqlite3_stmt* stmt;
|
||||||
|
|
||||||
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
||||||
@@ -735,6 +766,7 @@ cJSON* create_config_nostr_event(const char* privkey_hex) {
|
|||||||
{"relay_description", "High-performance C Nostr relay with SQLite storage"},
|
{"relay_description", "High-performance C Nostr relay with SQLite storage"},
|
||||||
{"relay_contact", ""},
|
{"relay_contact", ""},
|
||||||
{"relay_pubkey", ""},
|
{"relay_pubkey", ""},
|
||||||
|
{"relay_privkey", ""},
|
||||||
{"relay_software", "https://git.laantungir.net/laantungir/c-relay.git"},
|
{"relay_software", "https://git.laantungir.net/laantungir/c-relay.git"},
|
||||||
{"relay_version", VERSION},
|
{"relay_version", VERSION},
|
||||||
|
|
||||||
@@ -767,7 +799,7 @@ cJSON* create_config_nostr_event(const char* privkey_hex) {
|
|||||||
int defaults_count = sizeof(defaults) / sizeof(defaults[0]);
|
int defaults_count = sizeof(defaults) / sizeof(defaults[0]);
|
||||||
|
|
||||||
// First try to load from database, fall back to defaults
|
// First try to load from database, fall back to defaults
|
||||||
const char* sql = "SELECT key, value FROM server_config WHERE config_type IN ('system', 'user') ORDER BY key";
|
const char* sql = "SELECT key, value FROM config WHERE config_type IN ('system', 'user') ORDER BY key";
|
||||||
sqlite3_stmt* stmt;
|
sqlite3_stmt* stmt;
|
||||||
|
|
||||||
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
||||||
@@ -901,6 +933,56 @@ int write_config_event_to_file(const cJSON* event) {
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Helper function to generate random private key
|
||||||
|
int generate_random_private_key(char* privkey_hex, size_t buffer_size) {
|
||||||
|
if (!privkey_hex || buffer_size < 65) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
FILE* urandom = fopen("/dev/urandom", "rb");
|
||||||
|
if (!urandom) {
|
||||||
|
log_error("Failed to open /dev/urandom for key generation");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
unsigned char privkey_bytes[32];
|
||||||
|
if (fread(privkey_bytes, 1, 32, urandom) != 32) {
|
||||||
|
log_error("Failed to read random bytes for private key");
|
||||||
|
fclose(urandom);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
fclose(urandom);
|
||||||
|
|
||||||
|
// Convert to hex
|
||||||
|
nostr_bytes_to_hex(privkey_bytes, 32, privkey_hex);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Helper function to derive public key from private key
|
||||||
|
int derive_public_key(const char* privkey_hex, char* pubkey_hex, size_t buffer_size) {
|
||||||
|
if (!privkey_hex || !pubkey_hex || buffer_size < 65) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert hex private key to bytes
|
||||||
|
unsigned char privkey_bytes[32];
|
||||||
|
if (nostr_hex_to_bytes(privkey_hex, privkey_bytes, 32) != 0) {
|
||||||
|
log_error("Failed to convert private key from hex");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Generate corresponding public key
|
||||||
|
unsigned char pubkey_bytes[32];
|
||||||
|
if (nostr_ec_public_key_from_private_key(privkey_bytes, pubkey_bytes) == 0) {
|
||||||
|
nostr_bytes_to_hex(pubkey_bytes, 32, pubkey_hex);
|
||||||
|
return 0;
|
||||||
|
} else {
|
||||||
|
log_error("Failed to derive public key from private key");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
int generate_config_file_if_missing(void) {
|
int generate_config_file_if_missing(void) {
|
||||||
// Check if config file already exists
|
// Check if config file already exists
|
||||||
if (config_file_exists()) {
|
if (config_file_exists()) {
|
||||||
@@ -910,84 +992,170 @@ int generate_config_file_if_missing(void) {
|
|||||||
|
|
||||||
log_info("Generating missing configuration file...");
|
log_info("Generating missing configuration file...");
|
||||||
|
|
||||||
// Get private key from environment variable or generate random one
|
// Generate or get admin private key for configuration signing
|
||||||
char privkey_hex[65];
|
char admin_privkey_hex[65];
|
||||||
const char* env_privkey = getenv(CONFIG_PRIVKEY_ENV);
|
const char* env_admin_privkey = getenv(CONFIG_ADMIN_PRIVKEY_ENV);
|
||||||
|
|
||||||
if (env_privkey && strlen(env_privkey) == 64) {
|
if (env_admin_privkey && strlen(env_admin_privkey) == 64) {
|
||||||
// Use provided private key
|
// Use provided admin private key
|
||||||
strncpy(privkey_hex, env_privkey, sizeof(privkey_hex) - 1);
|
strncpy(admin_privkey_hex, env_admin_privkey, sizeof(admin_privkey_hex) - 1);
|
||||||
privkey_hex[sizeof(privkey_hex) - 1] = '\0';
|
admin_privkey_hex[sizeof(admin_privkey_hex) - 1] = '\0';
|
||||||
log_info("Using private key from environment variable");
|
log_info("Using admin private key from environment variable");
|
||||||
} else {
|
} else {
|
||||||
// Generate random private key manually (nostr_core_lib doesn't have a key generation function)
|
// Generate random admin private key
|
||||||
FILE* urandom = fopen("/dev/urandom", "rb");
|
if (generate_random_private_key(admin_privkey_hex, sizeof(admin_privkey_hex)) != 0) {
|
||||||
if (!urandom) {
|
log_error("Failed to generate admin private key");
|
||||||
log_error("Failed to open /dev/urandom for key generation");
|
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
log_info("Generated random admin private key for configuration signing");
|
||||||
unsigned char privkey_bytes[32];
|
|
||||||
if (fread(privkey_bytes, 1, 32, urandom) != 32) {
|
|
||||||
log_error("Failed to read random bytes for private key");
|
|
||||||
fclose(urandom);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
fclose(urandom);
|
|
||||||
|
|
||||||
// Convert to hex
|
|
||||||
nostr_bytes_to_hex(privkey_bytes, 32, privkey_hex);
|
|
||||||
|
|
||||||
// Generate corresponding public key
|
|
||||||
char pubkey_hex[65];
|
|
||||||
unsigned char pubkey_bytes[32];
|
|
||||||
if (nostr_ec_public_key_from_private_key(privkey_bytes, pubkey_bytes) == 0) {
|
|
||||||
nostr_bytes_to_hex(pubkey_bytes, 32, pubkey_hex);
|
|
||||||
} else {
|
|
||||||
log_error("Failed to derive public key from private key");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
log_info("Generated random private key for configuration signing");
|
|
||||||
|
|
||||||
// Print the generated private key prominently for the administrator
|
|
||||||
printf("\n");
|
|
||||||
printf("=================================================================\n");
|
|
||||||
printf("IMPORTANT: GENERATED RELAY ADMIN PRIVATE KEY\n");
|
|
||||||
printf("=================================================================\n");
|
|
||||||
printf("Private Key: %s\n", privkey_hex);
|
|
||||||
printf("Public Key: %s\n", pubkey_hex);
|
|
||||||
printf("\nSAVE THIS PRIVATE KEY SECURELY - IT CONTROLS YOUR RELAY!\n");
|
|
||||||
printf("\nTo use this key in future sessions:\n");
|
|
||||||
printf(" export %s=%s\n", CONFIG_PRIVKEY_ENV, privkey_hex);
|
|
||||||
printf("=================================================================\n");
|
|
||||||
printf("\n");
|
|
||||||
|
|
||||||
char warning_msg[256];
|
|
||||||
snprintf(warning_msg, sizeof(warning_msg),
|
|
||||||
"To use a specific private key, set the %s environment variable", CONFIG_PRIVKEY_ENV);
|
|
||||||
log_warning(warning_msg);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create Nostr event
|
// Generate or get relay private key for relay identity
|
||||||
cJSON* event = create_config_nostr_event(privkey_hex);
|
char relay_privkey_hex[65];
|
||||||
if (!event) {
|
const char* env_relay_privkey = getenv(CONFIG_RELAY_PRIVKEY_ENV);
|
||||||
log_error("Failed to create configuration event");
|
|
||||||
|
if (env_relay_privkey && strlen(env_relay_privkey) == 64) {
|
||||||
|
// Use provided relay private key
|
||||||
|
strncpy(relay_privkey_hex, env_relay_privkey, sizeof(relay_privkey_hex) - 1);
|
||||||
|
relay_privkey_hex[sizeof(relay_privkey_hex) - 1] = '\0';
|
||||||
|
log_info("Using relay private key from environment variable");
|
||||||
|
} else {
|
||||||
|
// Generate random relay private key
|
||||||
|
if (generate_random_private_key(relay_privkey_hex, sizeof(relay_privkey_hex)) != 0) {
|
||||||
|
log_error("Failed to generate relay private key");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
log_info("Generated random relay private key for relay identity");
|
||||||
|
}
|
||||||
|
|
||||||
|
// Derive public keys from private keys
|
||||||
|
char admin_pubkey_hex[65];
|
||||||
|
char relay_pubkey_hex[65];
|
||||||
|
|
||||||
|
if (derive_public_key(admin_privkey_hex, admin_pubkey_hex, sizeof(admin_pubkey_hex)) != 0) {
|
||||||
|
log_error("Failed to derive admin public key");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Extract and store the admin public key in database configuration
|
if (derive_public_key(relay_privkey_hex, relay_pubkey_hex, sizeof(relay_pubkey_hex)) != 0) {
|
||||||
cJSON* pubkey_obj = cJSON_GetObjectItem(event, "pubkey");
|
log_error("Failed to derive relay public key");
|
||||||
if (pubkey_obj && cJSON_IsString(pubkey_obj)) {
|
return -1;
|
||||||
const char* admin_pubkey = cJSON_GetStringValue(pubkey_obj);
|
}
|
||||||
if (set_database_config("admin_pubkey", admin_pubkey, "system") == 0) {
|
|
||||||
log_info("Stored admin public key in configuration database");
|
// Display both keypairs prominently for the administrator
|
||||||
printf(" Admin Public Key: %s\n", admin_pubkey);
|
printf("\n");
|
||||||
|
printf("=================================================================\n");
|
||||||
|
printf("IMPORTANT: GENERATED RELAY KEYPAIRS\n");
|
||||||
|
printf("=================================================================\n");
|
||||||
|
printf("ADMIN KEYS (for configuration signing):\n");
|
||||||
|
printf(" Private Key: %s\n", admin_privkey_hex);
|
||||||
|
printf(" Public Key: %s\n", admin_pubkey_hex);
|
||||||
|
printf("\nRELAY KEYS (for relay identity):\n");
|
||||||
|
printf(" Private Key: %s\n", relay_privkey_hex);
|
||||||
|
printf(" Public Key: %s\n", relay_pubkey_hex);
|
||||||
|
printf("\nSAVE THESE PRIVATE KEYS SECURELY!\n");
|
||||||
|
printf("\nTo use specific keys in future sessions:\n");
|
||||||
|
printf(" export %s=%s\n", CONFIG_ADMIN_PRIVKEY_ENV, admin_privkey_hex);
|
||||||
|
printf(" export %s=%s\n", CONFIG_RELAY_PRIVKEY_ENV, relay_privkey_hex);
|
||||||
|
printf("=================================================================\n");
|
||||||
|
printf("\n");
|
||||||
|
|
||||||
|
// Default configuration values (same as in create_config_nostr_event)
|
||||||
|
typedef struct {
|
||||||
|
const char* key;
|
||||||
|
const char* value;
|
||||||
|
} default_config_t;
|
||||||
|
|
||||||
|
static const default_config_t defaults[] = {
|
||||||
|
// Administrative settings
|
||||||
|
{"admin_enabled", "false"},
|
||||||
|
|
||||||
|
// Server core settings
|
||||||
|
{"relay_port", "8888"},
|
||||||
|
{"database_path", "db/c_nostr_relay.db"},
|
||||||
|
{"max_connections", "100"},
|
||||||
|
|
||||||
|
// NIP-11 Relay Information
|
||||||
|
{"relay_name", "C Nostr Relay"},
|
||||||
|
{"relay_description", "High-performance C Nostr relay with SQLite storage"},
|
||||||
|
{"relay_contact", ""},
|
||||||
|
{"relay_software", "https://git.laantungir.net/laantungir/c-relay.git"},
|
||||||
|
{"relay_version", VERSION},
|
||||||
|
|
||||||
|
// NIP-13 Proof of Work
|
||||||
|
{"pow_enabled", "true"},
|
||||||
|
{"pow_min_difficulty", "0"},
|
||||||
|
{"pow_mode", "basic"},
|
||||||
|
|
||||||
|
// NIP-40 Expiration Timestamp
|
||||||
|
{"expiration_enabled", "true"},
|
||||||
|
{"expiration_strict", "true"},
|
||||||
|
{"expiration_filter", "true"},
|
||||||
|
{"expiration_grace_period", "300"},
|
||||||
|
|
||||||
|
// Subscription limits
|
||||||
|
{"max_subscriptions_per_client", "25"},
|
||||||
|
{"max_total_subscriptions", "5000"},
|
||||||
|
{"max_filters_per_subscription", "10"},
|
||||||
|
|
||||||
|
// Event processing limits
|
||||||
|
{"max_event_tags", "100"},
|
||||||
|
{"max_content_length", "8196"},
|
||||||
|
{"max_message_length", "16384"},
|
||||||
|
|
||||||
|
// Performance settings
|
||||||
|
{"default_limit", "500"},
|
||||||
|
{"max_limit", "5000"}
|
||||||
|
};
|
||||||
|
|
||||||
|
int defaults_count = sizeof(defaults) / sizeof(defaults[0]);
|
||||||
|
|
||||||
|
// Store all three keys and all default configuration values in database
|
||||||
|
if (set_database_config("admin_pubkey", admin_pubkey_hex, "system") == 0) {
|
||||||
|
log_info("Stored admin public key in configuration database");
|
||||||
|
} else {
|
||||||
|
log_warning("Failed to store admin public key in database");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (set_database_config("relay_privkey", relay_privkey_hex, "system") == 0) {
|
||||||
|
log_info("Stored relay private key in configuration database");
|
||||||
|
} else {
|
||||||
|
log_warning("Failed to store relay private key in database");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (set_database_config("relay_pubkey", relay_pubkey_hex, "system") == 0) {
|
||||||
|
log_info("Stored relay public key in configuration database");
|
||||||
|
} else {
|
||||||
|
log_warning("Failed to store relay public key in database");
|
||||||
|
}
|
||||||
|
|
||||||
|
// Store all default configuration values
|
||||||
|
log_info("Storing default configuration values in database...");
|
||||||
|
int stored_count = 0;
|
||||||
|
for (int i = 0; i < defaults_count; i++) {
|
||||||
|
if (set_database_config(defaults[i].key, defaults[i].value, "system") == 0) {
|
||||||
|
stored_count++;
|
||||||
} else {
|
} else {
|
||||||
log_warning("Failed to store admin public key in database");
|
log_warning("Failed to store default configuration");
|
||||||
|
printf(" Key: %s, Value: %s\n", defaults[i].key, defaults[i].value);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (stored_count == defaults_count) {
|
||||||
|
log_success("All default configuration values stored successfully");
|
||||||
|
printf(" Stored %d configuration entries\n", stored_count);
|
||||||
|
} else {
|
||||||
|
log_warning("Some default configuration values failed to store");
|
||||||
|
printf(" Stored %d of %d configuration entries\n", stored_count, defaults_count);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create Nostr event using admin private key for signing
|
||||||
|
cJSON* event = create_config_nostr_event(admin_privkey_hex);
|
||||||
|
if (!event) {
|
||||||
|
log_error("Failed to create configuration event");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
// Write to file
|
// Write to file
|
||||||
int result = write_config_event_to_file(event);
|
int result = write_config_event_to_file(event);
|
||||||
cJSON_Delete(event);
|
cJSON_Delete(event);
|
||||||
|
|||||||
11
src/config.h
11
src/config.h
@@ -12,7 +12,10 @@
|
|||||||
#define CONFIG_DESCRIPTION_MAX_LENGTH 256
|
#define CONFIG_DESCRIPTION_MAX_LENGTH 256
|
||||||
#define CONFIG_XDG_DIR_NAME "c-relay"
|
#define CONFIG_XDG_DIR_NAME "c-relay"
|
||||||
#define CONFIG_FILE_NAME "c_relay_config_event.json"
|
#define CONFIG_FILE_NAME "c_relay_config_event.json"
|
||||||
#define CONFIG_PRIVKEY_ENV "C_RELAY_CONFIG_PRIVKEY"
|
#define CONFIG_ADMIN_PRIVKEY_ENV "C_RELAY_ADMIN_PRIVKEY"
|
||||||
|
#define CONFIG_RELAY_PRIVKEY_ENV "C_RELAY_PRIVKEY"
|
||||||
|
#define CONFIG_DIR_OVERRIDE_ENV "C_RELAY_CONFIG_DIR_OVERRIDE"
|
||||||
|
#define CONFIG_FILE_OVERRIDE_ENV "C_RELAY_CONFIG_FILE_OVERRIDE"
|
||||||
#define NOSTR_PUBKEY_HEX_LENGTH 64
|
#define NOSTR_PUBKEY_HEX_LENGTH 64
|
||||||
#define NOSTR_PRIVKEY_HEX_LENGTH 64
|
#define NOSTR_PRIVKEY_HEX_LENGTH 64
|
||||||
#define NOSTR_EVENT_ID_HEX_LENGTH 64
|
#define NOSTR_EVENT_ID_HEX_LENGTH 64
|
||||||
@@ -220,4 +223,10 @@ int sign_nostr_event(const cJSON* event, const char* privkey_hex, char* signatur
|
|||||||
// Write configuration event to file
|
// Write configuration event to file
|
||||||
int write_config_event_to_file(const cJSON* event);
|
int write_config_event_to_file(const cJSON* event);
|
||||||
|
|
||||||
|
// Helper function to generate random private key
|
||||||
|
int generate_random_private_key(char* privkey_hex, size_t buffer_size);
|
||||||
|
|
||||||
|
// Helper function to derive public key from private key
|
||||||
|
int derive_public_key(const char* privkey_hex, char* pubkey_hex, size_t buffer_size);
|
||||||
|
|
||||||
#endif // CONFIG_H
|
#endif // CONFIG_H
|
||||||
72
src/main.c
72
src/main.c
@@ -1941,8 +1941,15 @@ int validate_event_expiration(cJSON* event, char* error_message, size_t error_si
|
|||||||
|
|
||||||
// Initialize database connection and schema
|
// Initialize database connection and schema
|
||||||
int init_database() {
|
int init_database() {
|
||||||
// Use configurable database path, falling back to default
|
// Priority 1: Command line database path override
|
||||||
const char* db_path = get_config_value("database_path");
|
const char* db_path = getenv("C_RELAY_DATABASE_PATH_OVERRIDE");
|
||||||
|
|
||||||
|
// Priority 2: Configuration system (if available)
|
||||||
|
if (!db_path) {
|
||||||
|
db_path = get_config_value("database_path");
|
||||||
|
}
|
||||||
|
|
||||||
|
// Priority 3: Default path
|
||||||
if (!db_path) {
|
if (!db_path) {
|
||||||
db_path = DEFAULT_DATABASE_PATH;
|
db_path = DEFAULT_DATABASE_PATH;
|
||||||
}
|
}
|
||||||
@@ -3012,13 +3019,26 @@ void print_usage(const char* program_name) {
|
|||||||
printf("C Nostr Relay Server\n");
|
printf("C Nostr Relay Server\n");
|
||||||
printf("\n");
|
printf("\n");
|
||||||
printf("Options:\n");
|
printf("Options:\n");
|
||||||
printf(" -p, --port PORT Listen port (default: %d)\n", DEFAULT_PORT);
|
printf(" -p, --port PORT Listen port (default: %d)\n", DEFAULT_PORT);
|
||||||
printf(" -h, --help Show this help message\n");
|
printf(" -c, --config FILE Configuration file path\n");
|
||||||
|
printf(" -d, --config-dir DIR Configuration directory path\n");
|
||||||
|
printf(" -D, --database-path PATH Database file path (default: %s)\n", DEFAULT_DATABASE_PATH);
|
||||||
|
printf(" -h, --help Show this help message\n");
|
||||||
|
printf("\n");
|
||||||
|
printf("Examples:\n");
|
||||||
|
printf(" %s --config /path/to/config.json\n", program_name);
|
||||||
|
printf(" %s --config-dir ~/.config/c-relay-dev\n", program_name);
|
||||||
|
printf(" %s --port 9999 --config-dir /etc/c-relay\n", program_name);
|
||||||
|
printf(" %s --database-path /var/lib/c-relay/relay.db\n", program_name);
|
||||||
|
printf(" %s --database-path ./test.db --port 7777\n", program_name);
|
||||||
printf("\n");
|
printf("\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
int main(int argc, char* argv[]) {
|
int main(int argc, char* argv[]) {
|
||||||
int port = DEFAULT_PORT;
|
int port = DEFAULT_PORT;
|
||||||
|
char* config_dir_override = NULL;
|
||||||
|
char* config_file_override = NULL;
|
||||||
|
char* database_path_override = NULL;
|
||||||
|
|
||||||
// Parse command line arguments
|
// Parse command line arguments
|
||||||
for (int i = 1; i < argc; i++) {
|
for (int i = 1; i < argc; i++) {
|
||||||
@@ -3042,6 +3062,27 @@ int main(int argc, char* argv[]) {
|
|||||||
log_error("Port argument requires a value");
|
log_error("Port argument requires a value");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
} else if (strcmp(argv[i], "-c") == 0 || strcmp(argv[i], "--config") == 0) {
|
||||||
|
if (i + 1 < argc) {
|
||||||
|
config_file_override = argv[++i];
|
||||||
|
} else {
|
||||||
|
log_error("Config file argument requires a value");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
} else if (strcmp(argv[i], "-d") == 0 || strcmp(argv[i], "--config-dir") == 0) {
|
||||||
|
if (i + 1 < argc) {
|
||||||
|
config_dir_override = argv[++i];
|
||||||
|
} else {
|
||||||
|
log_error("Config directory argument requires a value");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
} else if (strcmp(argv[i], "-D") == 0 || strcmp(argv[i], "--database-path") == 0) {
|
||||||
|
if (i + 1 < argc) {
|
||||||
|
database_path_override = argv[++i];
|
||||||
|
} else {
|
||||||
|
log_error("Database path argument requires a value");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
log_error("Unknown argument");
|
log_error("Unknown argument");
|
||||||
print_usage(argv[0]);
|
print_usage(argv[0]);
|
||||||
@@ -3049,18 +3090,41 @@ int main(int argc, char* argv[]) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Store config overrides in global variables for configuration system access
|
||||||
|
if (config_dir_override) {
|
||||||
|
setenv("C_RELAY_CONFIG_DIR_OVERRIDE", config_dir_override, 1);
|
||||||
|
}
|
||||||
|
if (config_file_override) {
|
||||||
|
setenv("C_RELAY_CONFIG_FILE_OVERRIDE", config_file_override, 1);
|
||||||
|
}
|
||||||
|
|
||||||
// Set up signal handlers
|
// Set up signal handlers
|
||||||
signal(SIGINT, signal_handler);
|
signal(SIGINT, signal_handler);
|
||||||
signal(SIGTERM, signal_handler);
|
signal(SIGTERM, signal_handler);
|
||||||
|
|
||||||
printf(BLUE BOLD "=== C Nostr Relay Server ===" RESET "\n");
|
printf(BLUE BOLD "=== C Nostr Relay Server ===" RESET "\n");
|
||||||
|
|
||||||
|
// Apply database path override BEFORE any database operations
|
||||||
|
if (database_path_override) {
|
||||||
|
log_info("Database path override specified from command line");
|
||||||
|
printf(" Override path: %s\n", database_path_override);
|
||||||
|
// Set environment variable so init_database can use the correct path
|
||||||
|
setenv("C_RELAY_DATABASE_PATH_OVERRIDE", database_path_override, 1);
|
||||||
|
}
|
||||||
|
|
||||||
// Initialize database FIRST (required for configuration system)
|
// Initialize database FIRST (required for configuration system)
|
||||||
if (init_database() != 0) {
|
if (init_database() != 0) {
|
||||||
log_error("Failed to initialize database");
|
log_error("Failed to initialize database");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Store database path override in configuration if specified
|
||||||
|
if (database_path_override) {
|
||||||
|
if (set_database_config("database_path", database_path_override, "command_line") != 0) {
|
||||||
|
log_warning("Failed to store database path override in configuration");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Initialize nostr library BEFORE configuration system
|
// Initialize nostr library BEFORE configuration system
|
||||||
// (required for Nostr event generation in config files)
|
// (required for Nostr event generation in config files)
|
||||||
if (nostr_init() != 0) {
|
if (nostr_init() != 0) {
|
||||||
|
|||||||
@@ -197,7 +197,7 @@ AND subscription_id NOT IN (\n\
|
|||||||
-- ================================\n\
|
-- ================================\n\
|
||||||
\n\
|
\n\
|
||||||
-- Core server configuration table\n\
|
-- Core server configuration table\n\
|
||||||
CREATE TABLE server_config (\n\
|
CREATE TABLE config (\n\
|
||||||
key TEXT PRIMARY KEY, -- Configuration key (unique identifier)\n\
|
key TEXT PRIMARY KEY, -- Configuration key (unique identifier)\n\
|
||||||
value TEXT NOT NULL, -- Configuration value (stored as string)\n\
|
value TEXT NOT NULL, -- Configuration value (stored as string)\n\
|
||||||
description TEXT, -- Human-readable description\n\
|
description TEXT, -- Human-readable description\n\
|
||||||
@@ -219,7 +219,7 @@ CREATE TABLE config_history (\n\
|
|||||||
changed_by TEXT DEFAULT 'system', -- Who made the change (system/admin/user)\n\
|
changed_by TEXT DEFAULT 'system', -- Who made the change (system/admin/user)\n\
|
||||||
change_reason TEXT, -- Optional reason for change\n\
|
change_reason TEXT, -- Optional reason for change\n\
|
||||||
changed_at INTEGER NOT NULL DEFAULT (strftime('%s', 'now')),\n\
|
changed_at INTEGER NOT NULL DEFAULT (strftime('%s', 'now')),\n\
|
||||||
FOREIGN KEY (config_key) REFERENCES server_config(key)\n\
|
FOREIGN KEY (config_key) REFERENCES config(key)\n\
|
||||||
);\n\
|
);\n\
|
||||||
\n\
|
\n\
|
||||||
-- Configuration validation errors log\n\
|
-- Configuration validation errors log\n\
|
||||||
@@ -244,8 +244,8 @@ CREATE TABLE config_file_cache (\n\
|
|||||||
);\n\
|
);\n\
|
||||||
\n\
|
\n\
|
||||||
-- Performance indexes for configuration tables\n\
|
-- Performance indexes for configuration tables\n\
|
||||||
CREATE INDEX idx_server_config_type ON server_config(config_type);\n\
|
CREATE INDEX idx_config_type ON config(config_type);\n\
|
||||||
CREATE INDEX idx_server_config_updated ON server_config(updated_at DESC);\n\
|
CREATE INDEX idx_config_updated ON config(updated_at DESC);\n\
|
||||||
CREATE INDEX idx_config_history_key ON config_history(config_key);\n\
|
CREATE INDEX idx_config_history_key ON config_history(config_key);\n\
|
||||||
CREATE INDEX idx_config_history_time ON config_history(changed_at DESC);\n\
|
CREATE INDEX idx_config_history_time ON config_history(changed_at DESC);\n\
|
||||||
CREATE INDEX idx_config_validation_key ON config_validation_log(config_key);\n\
|
CREATE INDEX idx_config_validation_key ON config_validation_log(config_key);\n\
|
||||||
@@ -253,14 +253,14 @@ CREATE INDEX idx_config_validation_time ON config_validation_log(attempted_at DE
|
|||||||
\n\
|
\n\
|
||||||
-- Trigger to update timestamp on configuration changes\n\
|
-- Trigger to update timestamp on configuration changes\n\
|
||||||
CREATE TRIGGER update_config_timestamp\n\
|
CREATE TRIGGER update_config_timestamp\n\
|
||||||
AFTER UPDATE ON server_config\n\
|
AFTER UPDATE ON config\n\
|
||||||
BEGIN\n\
|
BEGIN\n\
|
||||||
UPDATE server_config SET updated_at = strftime('%s', 'now') WHERE key = NEW.key;\n\
|
UPDATE config SET updated_at = strftime('%s', 'now') WHERE key = NEW.key;\n\
|
||||||
END;\n\
|
END;\n\
|
||||||
\n\
|
\n\
|
||||||
-- Trigger to log configuration changes to history\n\
|
-- Trigger to log configuration changes to history\n\
|
||||||
CREATE TRIGGER log_config_changes\n\
|
CREATE TRIGGER log_config_changes\n\
|
||||||
AFTER UPDATE ON server_config\n\
|
AFTER UPDATE ON config\n\
|
||||||
WHEN OLD.value != NEW.value\n\
|
WHEN OLD.value != NEW.value\n\
|
||||||
BEGIN\n\
|
BEGIN\n\
|
||||||
INSERT INTO config_history (config_key, old_value, new_value, changed_by, change_reason)\n\
|
INSERT INTO config_history (config_key, old_value, new_value, changed_by, change_reason)\n\
|
||||||
@@ -277,7 +277,7 @@ SELECT\n\
|
|||||||
data_type,\n\
|
data_type,\n\
|
||||||
requires_restart,\n\
|
requires_restart,\n\
|
||||||
updated_at\n\
|
updated_at\n\
|
||||||
FROM server_config\n\
|
FROM config\n\
|
||||||
WHERE config_type IN ('system', 'user')\n\
|
WHERE config_type IN ('system', 'user')\n\
|
||||||
ORDER BY config_type, key;\n\
|
ORDER BY config_type, key;\n\
|
||||||
\n\
|
\n\
|
||||||
@@ -288,7 +288,7 @@ SELECT\n\
|
|||||||
value,\n\
|
value,\n\
|
||||||
description,\n\
|
description,\n\
|
||||||
updated_at\n\
|
updated_at\n\
|
||||||
FROM server_config\n\
|
FROM config\n\
|
||||||
WHERE config_type = 'runtime'\n\
|
WHERE config_type = 'runtime'\n\
|
||||||
ORDER BY key;\n\
|
ORDER BY key;\n\
|
||||||
\n\
|
\n\
|
||||||
@@ -303,7 +303,7 @@ SELECT\n\
|
|||||||
ch.change_reason,\n\
|
ch.change_reason,\n\
|
||||||
ch.changed_at\n\
|
ch.changed_at\n\
|
||||||
FROM config_history ch\n\
|
FROM config_history ch\n\
|
||||||
JOIN server_config sc ON ch.config_key = sc.key\n\
|
JOIN config sc ON ch.config_key = sc.key\n\
|
||||||
ORDER BY ch.changed_at DESC\n\
|
ORDER BY ch.changed_at DESC\n\
|
||||||
LIMIT 50;\n\
|
LIMIT 50;\n\
|
||||||
\n\
|
\n\
|
||||||
|
|||||||
217
systemd/README.md
Normal file
217
systemd/README.md
Normal file
@@ -0,0 +1,217 @@
|
|||||||
|
# C-Relay Systemd Service
|
||||||
|
|
||||||
|
This directory contains files for running C-Relay as a Linux systemd service.
|
||||||
|
|
||||||
|
## Files
|
||||||
|
|
||||||
|
- **`c-relay.service`** - Systemd service unit file
|
||||||
|
- **`install-systemd.sh`** - Installation script (run as root)
|
||||||
|
- **`uninstall-systemd.sh`** - Uninstallation script (run as root)
|
||||||
|
- **`README.md`** - This documentation file
|
||||||
|
|
||||||
|
## Quick Start
|
||||||
|
|
||||||
|
### 1. Build the relay
|
||||||
|
```bash
|
||||||
|
# From the project root directory
|
||||||
|
make
|
||||||
|
```
|
||||||
|
|
||||||
|
### 2. Install as systemd service
|
||||||
|
```bash
|
||||||
|
# Run the installation script as root
|
||||||
|
sudo ./systemd/install-systemd.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
### 3. Start the service
|
||||||
|
```bash
|
||||||
|
sudo systemctl start c-relay
|
||||||
|
```
|
||||||
|
|
||||||
|
### 4. Check status
|
||||||
|
```bash
|
||||||
|
sudo systemctl status c-relay
|
||||||
|
```
|
||||||
|
|
||||||
|
## Service Details
|
||||||
|
|
||||||
|
### Installation Location
|
||||||
|
- **Binary**: `/opt/c-relay/c_relay_x86`
|
||||||
|
- **Database**: `/opt/c-relay/db/`
|
||||||
|
- **Service File**: `/etc/systemd/system/c-relay.service`
|
||||||
|
|
||||||
|
### User Account
|
||||||
|
- **User**: `c-relay` (system user, no shell access)
|
||||||
|
- **Group**: `c-relay`
|
||||||
|
- **Home Directory**: `/opt/c-relay`
|
||||||
|
|
||||||
|
### Network Configuration
|
||||||
|
- **Default Port**: 8888
|
||||||
|
- **Default Host**: 127.0.0.1 (localhost only)
|
||||||
|
- **WebSocket Endpoint**: `ws://127.0.0.1:8888`
|
||||||
|
|
||||||
|
## Configuration
|
||||||
|
|
||||||
|
### Environment Variables
|
||||||
|
Edit `/etc/systemd/system/c-relay.service` to configure:
|
||||||
|
|
||||||
|
```ini
|
||||||
|
Environment=C_RELAY_CONFIG_PRIVKEY=your_private_key_here
|
||||||
|
Environment=C_RELAY_PORT=8888
|
||||||
|
Environment=C_RELAY_HOST=0.0.0.0
|
||||||
|
```
|
||||||
|
|
||||||
|
After editing, reload and restart:
|
||||||
|
```bash
|
||||||
|
sudo systemctl daemon-reload
|
||||||
|
sudo systemctl restart c-relay
|
||||||
|
```
|
||||||
|
|
||||||
|
### Security Settings
|
||||||
|
The service runs with enhanced security:
|
||||||
|
- Runs as unprivileged `c-relay` user
|
||||||
|
- No new privileges allowed
|
||||||
|
- Protected system directories
|
||||||
|
- Private temporary directory
|
||||||
|
- Limited file access (only `/opt/c-relay/db` writable)
|
||||||
|
- Network restrictions to IPv4/IPv6 only
|
||||||
|
|
||||||
|
## Service Management
|
||||||
|
|
||||||
|
### Basic Commands
|
||||||
|
```bash
|
||||||
|
# Start service
|
||||||
|
sudo systemctl start c-relay
|
||||||
|
|
||||||
|
# Stop service
|
||||||
|
sudo systemctl stop c-relay
|
||||||
|
|
||||||
|
# Restart service
|
||||||
|
sudo systemctl restart c-relay
|
||||||
|
|
||||||
|
# Enable auto-start on boot
|
||||||
|
sudo systemctl enable c-relay
|
||||||
|
|
||||||
|
# Disable auto-start on boot
|
||||||
|
sudo systemctl disable c-relay
|
||||||
|
|
||||||
|
# Check service status
|
||||||
|
sudo systemctl status c-relay
|
||||||
|
|
||||||
|
# View logs (live)
|
||||||
|
sudo journalctl -u c-relay -f
|
||||||
|
|
||||||
|
# View logs (last 100 lines)
|
||||||
|
sudo journalctl -u c-relay -n 100
|
||||||
|
```
|
||||||
|
|
||||||
|
### Log Management
|
||||||
|
Logs are handled by systemd's journal:
|
||||||
|
```bash
|
||||||
|
# View all logs
|
||||||
|
sudo journalctl -u c-relay
|
||||||
|
|
||||||
|
# View logs from today
|
||||||
|
sudo journalctl -u c-relay --since today
|
||||||
|
|
||||||
|
# View logs with timestamps
|
||||||
|
sudo journalctl -u c-relay --since "1 hour ago" --no-pager
|
||||||
|
```
|
||||||
|
|
||||||
|
## Database Management
|
||||||
|
|
||||||
|
The database is automatically created on first run. Location: `/opt/c-relay/db/c_nostr_relay.db`
|
||||||
|
|
||||||
|
### Backup Database
|
||||||
|
```bash
|
||||||
|
sudo cp /opt/c-relay/db/c_nostr_relay.db /opt/c-relay/db/backup-$(date +%Y%m%d).db
|
||||||
|
```
|
||||||
|
|
||||||
|
### Reset Database
|
||||||
|
```bash
|
||||||
|
sudo systemctl stop c-relay
|
||||||
|
sudo rm /opt/c-relay/db/c_nostr_relay.db*
|
||||||
|
sudo systemctl start c-relay
|
||||||
|
```
|
||||||
|
|
||||||
|
## Updating the Service
|
||||||
|
|
||||||
|
### Update Binary
|
||||||
|
1. Build new version: `make`
|
||||||
|
2. Stop service: `sudo systemctl stop c-relay`
|
||||||
|
3. Replace binary: `sudo cp build/c_relay_x86 /opt/c-relay/`
|
||||||
|
4. Set permissions: `sudo chown c-relay:c-relay /opt/c-relay/c_relay_x86`
|
||||||
|
5. Start service: `sudo systemctl start c-relay`
|
||||||
|
|
||||||
|
### Update Service File
|
||||||
|
1. Stop service: `sudo systemctl stop c-relay`
|
||||||
|
2. Copy new service file: `sudo cp systemd/c-relay.service /etc/systemd/system/`
|
||||||
|
3. Reload systemd: `sudo systemctl daemon-reload`
|
||||||
|
4. Start service: `sudo systemctl start c-relay`
|
||||||
|
|
||||||
|
## Uninstallation
|
||||||
|
|
||||||
|
Run the uninstall script to completely remove the service:
|
||||||
|
```bash
|
||||||
|
sudo ./systemd/uninstall-systemd.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
This will:
|
||||||
|
- Stop and disable the service
|
||||||
|
- Remove the systemd service file
|
||||||
|
- Optionally remove the installation directory
|
||||||
|
- Optionally remove the `c-relay` user account
|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
|
### Service Won't Start
|
||||||
|
```bash
|
||||||
|
# Check detailed status
|
||||||
|
sudo systemctl status c-relay -l
|
||||||
|
|
||||||
|
# Check logs for errors
|
||||||
|
sudo journalctl -u c-relay --no-pager -l
|
||||||
|
```
|
||||||
|
|
||||||
|
### Permission Issues
|
||||||
|
```bash
|
||||||
|
# Fix ownership of installation directory
|
||||||
|
sudo chown -R c-relay:c-relay /opt/c-relay
|
||||||
|
|
||||||
|
# Ensure binary is executable
|
||||||
|
sudo chmod +x /opt/c-relay/c_relay_x86
|
||||||
|
```
|
||||||
|
|
||||||
|
### Port Already in Use
|
||||||
|
```bash
|
||||||
|
# Check what's using port 8888
|
||||||
|
sudo netstat -tulpn | grep :8888
|
||||||
|
|
||||||
|
# Or with ss command
|
||||||
|
sudo ss -tulpn | grep :8888
|
||||||
|
```
|
||||||
|
|
||||||
|
### Database Issues
|
||||||
|
```bash
|
||||||
|
# Check database file permissions
|
||||||
|
ls -la /opt/c-relay/db/
|
||||||
|
|
||||||
|
# Check database integrity
|
||||||
|
sudo -u c-relay sqlite3 /opt/c-relay/db/c_nostr_relay.db "PRAGMA integrity_check;"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Custom Configuration
|
||||||
|
|
||||||
|
For advanced configurations, you can:
|
||||||
|
1. Modify the service file for different ports or settings
|
||||||
|
2. Use environment files: `/etc/systemd/system/c-relay.service.d/override.conf`
|
||||||
|
3. Configure log rotation with journald settings
|
||||||
|
4. Set up reverse proxy (nginx/apache) for HTTPS support
|
||||||
|
|
||||||
|
## Security Considerations
|
||||||
|
|
||||||
|
- The service runs as a non-root user with minimal privileges
|
||||||
|
- Database directory is only writable by the c-relay user
|
||||||
|
- Consider firewall rules for the relay port
|
||||||
|
- For internet-facing relays, use reverse proxy with SSL/TLS
|
||||||
|
- Monitor logs for suspicious activity
|
||||||
43
systemd/c-relay.service
Normal file
43
systemd/c-relay.service
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=C Nostr Relay Server
|
||||||
|
Documentation=https://github.com/your-repo/c-relay
|
||||||
|
After=network.target
|
||||||
|
Wants=network-online.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
User=c-relay
|
||||||
|
Group=c-relay
|
||||||
|
WorkingDirectory=/opt/c-relay
|
||||||
|
ExecStart=/opt/c-relay/c_relay_x86
|
||||||
|
Restart=always
|
||||||
|
RestartSec=5
|
||||||
|
StandardOutput=journal
|
||||||
|
StandardError=journal
|
||||||
|
SyslogIdentifier=c-relay
|
||||||
|
|
||||||
|
# Security settings
|
||||||
|
NoNewPrivileges=true
|
||||||
|
ProtectSystem=strict
|
||||||
|
ProtectHome=true
|
||||||
|
ReadWritePaths=/opt/c-relay/db
|
||||||
|
PrivateTmp=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
|
||||||
|
# Network security
|
||||||
|
PrivateNetwork=false
|
||||||
|
RestrictAddressFamilies=AF_INET AF_INET6
|
||||||
|
|
||||||
|
# Resource limits
|
||||||
|
LimitNOFILE=65536
|
||||||
|
LimitNPROC=4096
|
||||||
|
|
||||||
|
# Environment variables (optional)
|
||||||
|
Environment=C_RELAY_CONFIG_PRIVKEY=
|
||||||
|
Environment=C_RELAY_PORT=8888
|
||||||
|
Environment=C_RELAY_HOST=127.0.0.1
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
92
systemd/install-systemd.sh
Executable file
92
systemd/install-systemd.sh
Executable file
@@ -0,0 +1,92 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# C-Relay Systemd Service Installation Script
|
||||||
|
# This script installs the C-Relay as a systemd service
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
# Configuration
|
||||||
|
INSTALL_DIR="/opt/c-relay"
|
||||||
|
SERVICE_NAME="c-relay"
|
||||||
|
SERVICE_FILE="c-relay.service"
|
||||||
|
BINARY_NAME="c_relay_x86"
|
||||||
|
|
||||||
|
# Colors for output
|
||||||
|
RED='\033[0;31m'
|
||||||
|
GREEN='\033[0;32m'
|
||||||
|
YELLOW='\033[1;33m'
|
||||||
|
NC='\033[0m' # No Color
|
||||||
|
|
||||||
|
echo -e "${GREEN}=== C-Relay Systemd Service Installation ===${NC}"
|
||||||
|
|
||||||
|
# Check if running as root
|
||||||
|
if [[ $EUID -ne 0 ]]; then
|
||||||
|
echo -e "${RED}Error: This script must be run as root${NC}"
|
||||||
|
echo "Usage: sudo ./install-systemd.sh"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Check if binary exists (script is in systemd/ subdirectory)
|
||||||
|
if [ ! -f "../build/$BINARY_NAME" ]; then
|
||||||
|
echo -e "${RED}Error: Binary ../build/$BINARY_NAME not found${NC}"
|
||||||
|
echo "Please run 'make' from the project root directory first"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Check if service file exists
|
||||||
|
if [ ! -f "$SERVICE_FILE" ]; then
|
||||||
|
echo -e "${RED}Error: Service file $SERVICE_FILE not found${NC}"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Create c-relay user if it doesn't exist
|
||||||
|
if ! id "c-relay" &>/dev/null; then
|
||||||
|
echo -e "${YELLOW}Creating c-relay user...${NC}"
|
||||||
|
useradd --system --shell /bin/false --home-dir $INSTALL_DIR --create-home c-relay
|
||||||
|
else
|
||||||
|
echo -e "${GREEN}User c-relay already exists${NC}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Create installation directory
|
||||||
|
echo -e "${YELLOW}Creating installation directory...${NC}"
|
||||||
|
mkdir -p $INSTALL_DIR
|
||||||
|
mkdir -p $INSTALL_DIR/db
|
||||||
|
|
||||||
|
# Copy binary
|
||||||
|
echo -e "${YELLOW}Installing binary...${NC}"
|
||||||
|
cp ../build/$BINARY_NAME $INSTALL_DIR/
|
||||||
|
chmod +x $INSTALL_DIR/$BINARY_NAME
|
||||||
|
|
||||||
|
# Set permissions
|
||||||
|
echo -e "${YELLOW}Setting permissions...${NC}"
|
||||||
|
chown -R c-relay:c-relay $INSTALL_DIR
|
||||||
|
|
||||||
|
# Install systemd service
|
||||||
|
echo -e "${YELLOW}Installing systemd service...${NC}"
|
||||||
|
cp $SERVICE_FILE /etc/systemd/system/
|
||||||
|
systemctl daemon-reload
|
||||||
|
|
||||||
|
# Enable service
|
||||||
|
echo -e "${YELLOW}Enabling service...${NC}"
|
||||||
|
systemctl enable $SERVICE_NAME
|
||||||
|
|
||||||
|
echo -e "${GREEN}=== Installation Complete ===${NC}"
|
||||||
|
echo
|
||||||
|
echo -e "${GREEN}Next steps:${NC}"
|
||||||
|
echo "1. Configure environment variables in /etc/systemd/system/$SERVICE_FILE if needed"
|
||||||
|
echo "2. Start the service: sudo systemctl start $SERVICE_NAME"
|
||||||
|
echo "3. Check status: sudo systemctl status $SERVICE_NAME"
|
||||||
|
echo "4. View logs: sudo journalctl -u $SERVICE_NAME -f"
|
||||||
|
echo
|
||||||
|
echo -e "${GREEN}Service commands:${NC}"
|
||||||
|
echo " Start: sudo systemctl start $SERVICE_NAME"
|
||||||
|
echo " Stop: sudo systemctl stop $SERVICE_NAME"
|
||||||
|
echo " Restart: sudo systemctl restart $SERVICE_NAME"
|
||||||
|
echo " Status: sudo systemctl status $SERVICE_NAME"
|
||||||
|
echo " Logs: sudo journalctl -u $SERVICE_NAME"
|
||||||
|
echo
|
||||||
|
echo -e "${GREEN}Installation directory: $INSTALL_DIR${NC}"
|
||||||
|
echo -e "${GREEN}Service file: /etc/systemd/system/$SERVICE_FILE${NC}"
|
||||||
|
echo
|
||||||
|
echo -e "${YELLOW}Note: The relay will run on port 8888 by default${NC}"
|
||||||
|
echo -e "${YELLOW}Database will be created automatically in $INSTALL_DIR/db/${NC}"
|
||||||
86
systemd/uninstall-systemd.sh
Executable file
86
systemd/uninstall-systemd.sh
Executable file
@@ -0,0 +1,86 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# C-Relay Systemd Service Uninstallation Script
|
||||||
|
# This script removes the C-Relay systemd service
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
# Configuration
|
||||||
|
INSTALL_DIR="/opt/c-relay"
|
||||||
|
SERVICE_NAME="c-relay"
|
||||||
|
SERVICE_FILE="c-relay.service"
|
||||||
|
|
||||||
|
# Colors for output
|
||||||
|
RED='\033[0;31m'
|
||||||
|
GREEN='\033[0;32m'
|
||||||
|
YELLOW='\033[1;33m'
|
||||||
|
NC='\033[0m' # No Color
|
||||||
|
|
||||||
|
echo -e "${GREEN}=== C-Relay Systemd Service Uninstallation ===${NC}"
|
||||||
|
|
||||||
|
# Check if running as root
|
||||||
|
if [[ $EUID -ne 0 ]]; then
|
||||||
|
echo -e "${RED}Error: This script must be run as root${NC}"
|
||||||
|
echo "Usage: sudo ./uninstall-systemd.sh"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Stop service if running
|
||||||
|
echo -e "${YELLOW}Stopping service...${NC}"
|
||||||
|
if systemctl is-active --quiet $SERVICE_NAME; then
|
||||||
|
systemctl stop $SERVICE_NAME
|
||||||
|
echo -e "${GREEN}Service stopped${NC}"
|
||||||
|
else
|
||||||
|
echo -e "${GREEN}Service was not running${NC}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Disable service if enabled
|
||||||
|
echo -e "${YELLOW}Disabling service...${NC}"
|
||||||
|
if systemctl is-enabled --quiet $SERVICE_NAME; then
|
||||||
|
systemctl disable $SERVICE_NAME
|
||||||
|
echo -e "${GREEN}Service disabled${NC}"
|
||||||
|
else
|
||||||
|
echo -e "${GREEN}Service was not enabled${NC}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Remove systemd service file
|
||||||
|
echo -e "${YELLOW}Removing service file...${NC}"
|
||||||
|
if [ -f "/etc/systemd/system/$SERVICE_FILE" ]; then
|
||||||
|
rm /etc/systemd/system/$SERVICE_FILE
|
||||||
|
systemctl daemon-reload
|
||||||
|
echo -e "${GREEN}Service file removed${NC}"
|
||||||
|
else
|
||||||
|
echo -e "${GREEN}Service file was not found${NC}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Ask about removing installation directory
|
||||||
|
echo
|
||||||
|
echo -e "${YELLOW}Do you want to remove the installation directory $INSTALL_DIR? (y/N)${NC}"
|
||||||
|
read -r response
|
||||||
|
if [[ "$response" =~ ^([yY][eE][sS]|[yY])$ ]]; then
|
||||||
|
echo -e "${YELLOW}Removing installation directory...${NC}"
|
||||||
|
rm -rf $INSTALL_DIR
|
||||||
|
echo -e "${GREEN}Installation directory removed${NC}"
|
||||||
|
else
|
||||||
|
echo -e "${GREEN}Installation directory preserved${NC}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Ask about removing c-relay user
|
||||||
|
echo
|
||||||
|
echo -e "${YELLOW}Do you want to remove the c-relay user? (y/N)${NC}"
|
||||||
|
read -r response
|
||||||
|
if [[ "$response" =~ ^([yY][eE][sS]|[yY])$ ]]; then
|
||||||
|
echo -e "${YELLOW}Removing c-relay user...${NC}"
|
||||||
|
if id "c-relay" &>/dev/null; then
|
||||||
|
userdel c-relay
|
||||||
|
echo -e "${GREEN}User c-relay removed${NC}"
|
||||||
|
else
|
||||||
|
echo -e "${GREEN}User c-relay was not found${NC}"
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
echo -e "${GREEN}User c-relay preserved${NC}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo
|
||||||
|
echo -e "${GREEN}=== Uninstallation Complete ===${NC}"
|
||||||
|
echo -e "${GREEN}C-Relay systemd service has been removed${NC}"
|
||||||
BIN
test_db.db-shm
Normal file
BIN
test_db.db-shm
Normal file
Binary file not shown.
BIN
test_db.db-wal
Normal file
BIN
test_db.db-wal
Normal file
Binary file not shown.
Reference in New Issue
Block a user