2026 lines
83 KiB
C
2026 lines
83 KiB
C
|
|
|
|
#define _GNU_SOURCE
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <signal.h>
|
|
#include <time.h>
|
|
#include <pthread.h>
|
|
#include <sqlite3.h>
|
|
#include <libwebsockets.h>
|
|
#include <errno.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
|
|
// Include nostr_core_lib for Nostr functionality
|
|
#include "../nostr_core_lib/cjson/cJSON.h"
|
|
#include "../nostr_core_lib/nostr_core/nostr_core.h"
|
|
#include "../nostr_core_lib/nostr_core/nip013.h" // NIP-13: Proof of Work
|
|
#include "../nostr_core_lib/nostr_core/nip019.h" // NIP-19: bech32-encoded entities
|
|
#include "config.h" // Configuration management system
|
|
#include "sql_schema.h" // Embedded database schema
|
|
#include "websockets.h" // WebSocket protocol implementation
|
|
#include "subscriptions.h" // Subscription management system
|
|
#include "debug.h" // Debug system
|
|
|
|
// Forward declarations for unified request validator
|
|
int nostr_validate_unified_request(const char* json_string, size_t json_length);
|
|
int ginxsom_request_validator_init(const char* db_path, const char* app_name);
|
|
void ginxsom_request_validator_cleanup(void);
|
|
|
|
// Forward declarations for NIP-42 functions from request_validator.c
|
|
int nostr_nip42_generate_challenge(char *challenge_buffer, size_t buffer_size);
|
|
int nostr_nip42_verify_auth_event(cJSON *event, const char *challenge_id,
|
|
const char *relay_url, int time_tolerance_seconds);
|
|
|
|
// Color constants for logging
|
|
#define RED "\033[31m"
|
|
#define GREEN "\033[32m"
|
|
#define YELLOW "\033[33m"
|
|
#define BLUE "\033[34m"
|
|
#define BOLD "\033[1m"
|
|
#define RESET "\033[0m"
|
|
|
|
// Global state
|
|
sqlite3* g_db = NULL; // Non-static so config.c can access it
|
|
int g_server_running = 1; // Non-static so websockets.c can access it
|
|
volatile sig_atomic_t g_shutdown_flag = 0; // Non-static so config.c can access it for restart functionality
|
|
int g_restart_requested = 0; // Non-static so config.c can access it for restart functionality
|
|
struct lws_context *ws_context = NULL; // Non-static so websockets.c can access it
|
|
|
|
// NIP-11 relay information structure
|
|
struct relay_info {
|
|
char name[RELAY_NAME_MAX_LENGTH];
|
|
char description[RELAY_DESCRIPTION_MAX_LENGTH];
|
|
char banner[RELAY_URL_MAX_LENGTH];
|
|
char icon[RELAY_URL_MAX_LENGTH];
|
|
char pubkey[RELAY_PUBKEY_MAX_LENGTH];
|
|
char contact[RELAY_CONTACT_MAX_LENGTH];
|
|
char software[RELAY_URL_MAX_LENGTH];
|
|
char version[64];
|
|
char privacy_policy[RELAY_URL_MAX_LENGTH];
|
|
char terms_of_service[RELAY_URL_MAX_LENGTH];
|
|
cJSON* supported_nips; // Array of supported NIP numbers
|
|
cJSON* limitation; // Server limitations object
|
|
cJSON* retention; // Event retention policies array
|
|
cJSON* relay_countries; // Array of country codes
|
|
cJSON* language_tags; // Array of language tags
|
|
cJSON* tags; // Array of content tags
|
|
char posting_policy[RELAY_URL_MAX_LENGTH];
|
|
cJSON* fees; // Payment fee structure
|
|
char payments_url[RELAY_URL_MAX_LENGTH];
|
|
};
|
|
|
|
// NIP-40 Expiration configuration (now in nip040.c)
|
|
extern struct expiration_config g_expiration_config;
|
|
|
|
// Global subscription manager instance (defined in websockets.c)
|
|
extern subscription_manager_t g_subscription_manager;
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
// DATA STRUCTURES
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
// Forward declaration for subscription manager configuration
|
|
void update_subscription_manager_config(void);
|
|
|
|
// Forward declarations for subscription database logging
|
|
void log_subscription_created(const subscription_t* sub);
|
|
void log_subscription_closed(const char* sub_id, const char* client_ip, const char* reason);
|
|
void log_subscription_disconnected(const char* client_ip);
|
|
void log_event_broadcast(const char* event_id, const char* sub_id, const char* client_ip);
|
|
void update_subscription_events_sent(const char* sub_id, int events_sent);
|
|
|
|
// Forward declarations for NIP-01 event handling
|
|
const char* extract_d_tag_value(cJSON* tags);
|
|
int check_and_handle_replaceable_event(int kind, const char* pubkey, long created_at);
|
|
int check_and_handle_addressable_event(int kind, const char* pubkey, const char* d_tag_value, long created_at);
|
|
int handle_event_message(cJSON* event, char* error_message, size_t error_size);
|
|
|
|
// Forward declaration for unified validation
|
|
int nostr_validate_unified_request(const char* json_string, size_t json_length);
|
|
|
|
// Forward declaration for admin event processing (kind 23456)
|
|
int process_admin_event_in_config(cJSON* event, char* error_message, size_t error_size, struct lws* wsi);
|
|
|
|
// Forward declaration for NIP-45 COUNT message handling
|
|
int handle_count_message(const char* sub_id, cJSON* filters, struct lws *wsi, struct per_session_data *pss);
|
|
|
|
// Parameter binding helpers for SQL queries
|
|
static void add_bind_param(char*** params, int* count, int* capacity, const char* value) {
|
|
if (*count >= *capacity) {
|
|
*capacity = *capacity == 0 ? 16 : *capacity * 2;
|
|
*params = realloc(*params, *capacity * sizeof(char*));
|
|
}
|
|
(*params)[(*count)++] = strdup(value);
|
|
}
|
|
|
|
static void free_bind_params(char** params, int count) {
|
|
for (int i = 0; i < count; i++) {
|
|
free(params[i]);
|
|
}
|
|
free(params);
|
|
}
|
|
|
|
// Forward declaration for enhanced admin event authorization
|
|
int is_authorized_admin_event(cJSON* event, char* error_message, size_t error_size);
|
|
|
|
// Forward declaration for NOTICE message support
|
|
void send_notice_message(struct lws* wsi, const char* message);
|
|
|
|
// Forward declarations for NIP-42 authentication functions
|
|
void send_nip42_auth_challenge(struct lws* wsi, struct per_session_data* pss);
|
|
void handle_nip42_auth_signed_event(struct lws* wsi, struct per_session_data* pss, cJSON* auth_event);
|
|
void handle_nip42_auth_challenge_response(struct lws* wsi, struct per_session_data* pss, const char* challenge);
|
|
|
|
// Forward declarations for NIP-09 deletion request handling
|
|
int handle_deletion_request(cJSON* event, char* error_message, size_t error_size);
|
|
int delete_events_by_id(const char* requester_pubkey, cJSON* event_ids);
|
|
int delete_events_by_address(const char* requester_pubkey, cJSON* addresses, long deletion_timestamp);
|
|
int mark_event_as_deleted(const char* event_id, const char* deletion_event_id, const char* reason);
|
|
|
|
// Forward declaration for database functions
|
|
int store_event(cJSON* event);
|
|
|
|
// Forward declarations for NIP-11 relay information handling
|
|
void init_relay_info();
|
|
void cleanup_relay_info();
|
|
cJSON* generate_relay_info_json();
|
|
int handle_nip11_http_request(struct lws* wsi, const char* accept_header);
|
|
|
|
// Forward declaration for WebSocket relay server
|
|
int start_websocket_relay(int port_override, int strict_port);
|
|
|
|
|
|
// Forward declarations for NIP-13 PoW handling (now in nip013.c)
|
|
void init_pow_config();
|
|
int validate_event_pow(cJSON* event, char* error_message, size_t error_size);
|
|
|
|
// Forward declarations for NIP-40 expiration handling (now in nip040.c)
|
|
void init_expiration_config();
|
|
long extract_expiration_timestamp(cJSON* tags);
|
|
int is_event_expired(cJSON* event, time_t current_time);
|
|
int validate_event_expiration(cJSON* event, char* error_message, size_t error_size);
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
// LOGGING FUNCTIONS
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
// Logging functions - REMOVED (replaced by debug system in debug.c)
|
|
|
|
// Update subscription manager configuration from config system
|
|
void update_subscription_manager_config(void) {
|
|
g_subscription_manager.max_subscriptions_per_client = get_config_int("max_subscriptions_per_client", MAX_SUBSCRIPTIONS_PER_CLIENT);
|
|
g_subscription_manager.max_total_subscriptions = get_config_int("max_total_subscriptions", MAX_TOTAL_SUBSCRIPTIONS);
|
|
|
|
char config_msg[256];
|
|
snprintf(config_msg, sizeof(config_msg),
|
|
"Subscription limits: max_per_client=%d, max_total=%d",
|
|
g_subscription_manager.max_subscriptions_per_client,
|
|
g_subscription_manager.max_total_subscriptions);
|
|
}
|
|
|
|
// Signal handler for graceful shutdown
|
|
void signal_handler(int sig) {
|
|
if (sig == SIGINT || sig == SIGTERM) {
|
|
g_server_running = 0;
|
|
}
|
|
}
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
// NOTICE MESSAGE SUPPORT
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
// Send NOTICE message to client (NIP-01)
|
|
void send_notice_message(struct lws* wsi, const char* message) {
|
|
if (!wsi || !message) return;
|
|
|
|
cJSON* notice_msg = cJSON_CreateArray();
|
|
cJSON_AddItemToArray(notice_msg, cJSON_CreateString("NOTICE"));
|
|
cJSON_AddItemToArray(notice_msg, cJSON_CreateString(message));
|
|
|
|
char* msg_str = cJSON_Print(notice_msg);
|
|
if (msg_str) {
|
|
size_t msg_len = strlen(msg_str);
|
|
unsigned char* buf = malloc(LWS_PRE + msg_len);
|
|
if (buf) {
|
|
memcpy(buf + LWS_PRE, msg_str, msg_len);
|
|
lws_write(wsi, buf + LWS_PRE, msg_len, LWS_WRITE_TEXT);
|
|
free(buf);
|
|
}
|
|
free(msg_str);
|
|
}
|
|
|
|
cJSON_Delete(notice_msg);
|
|
}
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
// DATABASE FUNCTIONS
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
// Clean up stale SQLite WAL files that may cause lock issues after unclean shutdown
|
|
static void cleanup_stale_wal_files(const char* db_path) {
|
|
if (!db_path) return;
|
|
|
|
// Check if database file exists
|
|
if (access(db_path, F_OK) != 0) {
|
|
return; // Database doesn't exist yet, nothing to clean
|
|
}
|
|
|
|
// Build paths for WAL and SHM files
|
|
char wal_path[1024];
|
|
char shm_path[1024];
|
|
snprintf(wal_path, sizeof(wal_path), "%s-wal", db_path);
|
|
snprintf(shm_path, sizeof(shm_path), "%s-shm", db_path);
|
|
|
|
// Check if WAL or SHM files exist
|
|
int has_wal = (access(wal_path, F_OK) == 0);
|
|
int has_shm = (access(shm_path, F_OK) == 0);
|
|
|
|
if (has_wal || has_shm) {
|
|
DEBUG_WARN("Detected stale SQLite WAL files from previous unclean shutdown");
|
|
|
|
// Try to remove WAL file
|
|
if (has_wal) {
|
|
if (unlink(wal_path) == 0) {
|
|
DEBUG_INFO("Removed stale WAL file");
|
|
} else {
|
|
char error_msg[256];
|
|
snprintf(error_msg, sizeof(error_msg), "Failed to remove WAL file: %s", strerror(errno));
|
|
DEBUG_WARN(error_msg);
|
|
}
|
|
}
|
|
|
|
// Try to remove SHM file
|
|
if (has_shm) {
|
|
if (unlink(shm_path) == 0) {
|
|
DEBUG_INFO("Removed stale SHM file");
|
|
} else {
|
|
char error_msg[256];
|
|
snprintf(error_msg, sizeof(error_msg), "Failed to remove SHM file: %s", strerror(errno));
|
|
DEBUG_WARN(error_msg);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Initialize database connection and schema
|
|
int init_database(const char* database_path_override) {
|
|
DEBUG_TRACE("Entering init_database()");
|
|
|
|
// Priority 1: Command line database path override
|
|
const char* db_path = database_path_override;
|
|
|
|
// Priority 2: Configuration system (if available)
|
|
if (!db_path) {
|
|
db_path = get_config_value("database_path");
|
|
}
|
|
|
|
// Priority 3: Default path
|
|
if (!db_path) {
|
|
db_path = DEFAULT_DATABASE_PATH;
|
|
}
|
|
|
|
DEBUG_LOG("Initializing database: %s", db_path);
|
|
|
|
// Clean up stale WAL files before opening database
|
|
cleanup_stale_wal_files(db_path);
|
|
|
|
int rc = sqlite3_open(db_path, &g_db);
|
|
if (rc != SQLITE_OK) {
|
|
DEBUG_ERROR("Cannot open database");
|
|
DEBUG_TRACE("Exiting init_database() - failed to open database");
|
|
return -1;
|
|
}
|
|
|
|
// DEBUG_GUARD_START
|
|
if (g_debug_level >= DEBUG_LEVEL_DEBUG) {
|
|
// Check config table row count immediately after database open
|
|
sqlite3_stmt* stmt;
|
|
if (sqlite3_prepare_v2(g_db, "SELECT COUNT(*) FROM config", -1, &stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
int row_count = sqlite3_column_int(stmt, 0);
|
|
DEBUG_LOG("Config table row count immediately after sqlite3_open(): %d", row_count);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
} else {
|
|
DEBUG_LOG("Config table does not exist yet (first-time startup)");
|
|
}
|
|
}
|
|
// DEBUG_GUARD_END
|
|
|
|
// Check if database is already initialized by looking for the events table
|
|
const char* check_sql = "SELECT name FROM sqlite_master WHERE type='table' AND name='events'";
|
|
sqlite3_stmt* check_stmt;
|
|
rc = sqlite3_prepare_v2(g_db, check_sql, -1, &check_stmt, NULL);
|
|
if (rc == SQLITE_OK) {
|
|
int has_events_table = (sqlite3_step(check_stmt) == SQLITE_ROW);
|
|
sqlite3_finalize(check_stmt);
|
|
|
|
if (has_events_table) {
|
|
// Check existing schema version and migrate if needed
|
|
const char* version_sql = "SELECT value FROM schema_info WHERE key = 'version'";
|
|
sqlite3_stmt* version_stmt;
|
|
const char* db_version = NULL;
|
|
int needs_migration = 0;
|
|
|
|
if (sqlite3_prepare_v2(g_db, version_sql, -1, &version_stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(version_stmt) == SQLITE_ROW) {
|
|
db_version = (char*)sqlite3_column_text(version_stmt, 0);
|
|
|
|
// Check if migration is needed
|
|
if (!db_version || strcmp(db_version, "5") == 0) {
|
|
needs_migration = 1;
|
|
} else if (strcmp(db_version, "6") == 0) {
|
|
// Database is already at current schema version v6
|
|
} else if (strcmp(db_version, EMBEDDED_SCHEMA_VERSION) == 0) {
|
|
// Database is at current schema version
|
|
} else {
|
|
char warning_msg[256];
|
|
snprintf(warning_msg, sizeof(warning_msg), "Unknown database schema version: %s", db_version);
|
|
DEBUG_WARN(warning_msg);
|
|
}
|
|
} else {
|
|
needs_migration = 1;
|
|
}
|
|
sqlite3_finalize(version_stmt);
|
|
} else {
|
|
needs_migration = 1;
|
|
}
|
|
|
|
// Perform migration if needed
|
|
if (needs_migration) {
|
|
// Check if auth_rules table already exists
|
|
const char* check_auth_rules_sql = "SELECT name FROM sqlite_master WHERE type='table' AND name='auth_rules'";
|
|
sqlite3_stmt* check_stmt;
|
|
int has_auth_rules = 0;
|
|
|
|
if (sqlite3_prepare_v2(g_db, check_auth_rules_sql, -1, &check_stmt, NULL) == SQLITE_OK) {
|
|
has_auth_rules = (sqlite3_step(check_stmt) == SQLITE_ROW);
|
|
sqlite3_finalize(check_stmt);
|
|
}
|
|
|
|
if (!has_auth_rules) {
|
|
// Add auth_rules table matching sql_schema.h
|
|
const char* create_auth_rules_sql =
|
|
"CREATE TABLE IF NOT EXISTS auth_rules ("
|
|
" id INTEGER PRIMARY KEY AUTOINCREMENT,"
|
|
" rule_type TEXT NOT NULL CHECK (rule_type IN ('whitelist', 'blacklist', 'rate_limit', 'auth_required')),"
|
|
" pattern_type TEXT NOT NULL CHECK (pattern_type IN ('pubkey', 'kind', 'ip', 'global')),"
|
|
" pattern_value TEXT,"
|
|
" action TEXT NOT NULL CHECK (action IN ('allow', 'deny', 'require_auth', 'rate_limit')),"
|
|
" parameters TEXT,"
|
|
" active INTEGER NOT NULL DEFAULT 1,"
|
|
" created_at INTEGER NOT NULL DEFAULT (strftime('%s', 'now')),"
|
|
" updated_at INTEGER NOT NULL DEFAULT (strftime('%s', 'now'))"
|
|
");";
|
|
|
|
char* error_msg = NULL;
|
|
int rc = sqlite3_exec(g_db, create_auth_rules_sql, NULL, NULL, &error_msg);
|
|
if (rc != SQLITE_OK) {
|
|
char error_log[512];
|
|
snprintf(error_log, sizeof(error_log), "Failed to create auth_rules table: %s",
|
|
error_msg ? error_msg : "unknown error");
|
|
DEBUG_ERROR(error_log);
|
|
if (error_msg) sqlite3_free(error_msg);
|
|
return -1;
|
|
}
|
|
|
|
// Add indexes for auth_rules table
|
|
const char* create_auth_rules_indexes_sql =
|
|
"CREATE INDEX IF NOT EXISTS idx_auth_rules_pattern ON auth_rules(pattern_type, pattern_value);"
|
|
"CREATE INDEX IF NOT EXISTS idx_auth_rules_type ON auth_rules(rule_type);"
|
|
"CREATE INDEX IF NOT EXISTS idx_auth_rules_active ON auth_rules(active);";
|
|
|
|
char* index_error_msg = NULL;
|
|
int index_rc = sqlite3_exec(g_db, create_auth_rules_indexes_sql, NULL, NULL, &index_error_msg);
|
|
if (index_rc != SQLITE_OK) {
|
|
char index_error_log[512];
|
|
snprintf(index_error_log, sizeof(index_error_log), "Failed to create auth_rules indexes: %s",
|
|
index_error_msg ? index_error_msg : "unknown error");
|
|
DEBUG_ERROR(index_error_log);
|
|
if (index_error_msg) sqlite3_free(index_error_msg);
|
|
return -1;
|
|
}
|
|
} else {
|
|
// auth_rules table already exists, skipping creation
|
|
}
|
|
|
|
// Update schema version to v6
|
|
const char* update_version_sql =
|
|
"INSERT OR REPLACE INTO schema_info (key, value, updated_at) "
|
|
"VALUES ('version', '6', strftime('%s', 'now'))";
|
|
|
|
char* error_msg = NULL;
|
|
int rc = sqlite3_exec(g_db, update_version_sql, NULL, NULL, &error_msg);
|
|
if (rc != SQLITE_OK) {
|
|
char error_log[512];
|
|
snprintf(error_log, sizeof(error_log), "Failed to update schema version: %s",
|
|
error_msg ? error_msg : "unknown error");
|
|
DEBUG_ERROR(error_log);
|
|
if (error_msg) sqlite3_free(error_msg);
|
|
return -1;
|
|
}
|
|
|
|
}
|
|
} else {
|
|
// Initialize database schema using embedded SQL
|
|
|
|
// Execute the embedded schema SQL
|
|
char* error_msg = NULL;
|
|
rc = sqlite3_exec(g_db, EMBEDDED_SCHEMA_SQL, NULL, NULL, &error_msg);
|
|
if (rc != SQLITE_OK) {
|
|
char error_log[512];
|
|
snprintf(error_log, sizeof(error_log), "Failed to initialize database schema: %s",
|
|
error_msg ? error_msg : "unknown error");
|
|
DEBUG_ERROR(error_log);
|
|
if (error_msg) {
|
|
sqlite3_free(error_msg);
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
}
|
|
} else {
|
|
DEBUG_ERROR("Failed to check existing database schema");
|
|
return -1;
|
|
}
|
|
|
|
// Enable WAL mode for better concurrency and crash recovery
|
|
char* wal_error = NULL;
|
|
rc = sqlite3_exec(g_db, "PRAGMA journal_mode=WAL;", NULL, NULL, &wal_error);
|
|
if (rc != SQLITE_OK) {
|
|
char error_msg[256];
|
|
snprintf(error_msg, sizeof(error_msg), "Failed to enable WAL mode: %s",
|
|
wal_error ? wal_error : "unknown error");
|
|
DEBUG_WARN(error_msg);
|
|
if (wal_error) sqlite3_free(wal_error);
|
|
// Continue anyway - WAL mode is optional
|
|
} else {
|
|
DEBUG_LOG("SQLite WAL mode enabled");
|
|
}
|
|
|
|
DEBUG_TRACE("Exiting init_database() - success");
|
|
return 0;
|
|
}
|
|
|
|
// Close database connection with proper WAL checkpoint
|
|
void close_database() {
|
|
DEBUG_TRACE("Entering close_database()");
|
|
|
|
if (g_db) {
|
|
// Perform WAL checkpoint to minimize stale files on next startup
|
|
DEBUG_LOG("Performing WAL checkpoint before database close");
|
|
char* checkpoint_error = NULL;
|
|
int rc = sqlite3_exec(g_db, "PRAGMA wal_checkpoint(TRUNCATE);", NULL, NULL, &checkpoint_error);
|
|
if (rc != SQLITE_OK) {
|
|
char error_msg[256];
|
|
snprintf(error_msg, sizeof(error_msg), "WAL checkpoint warning: %s",
|
|
checkpoint_error ? checkpoint_error : "unknown error");
|
|
DEBUG_WARN(error_msg);
|
|
if (checkpoint_error) sqlite3_free(checkpoint_error);
|
|
}
|
|
|
|
sqlite3_close(g_db);
|
|
g_db = NULL;
|
|
DEBUG_LOG("Database connection closed");
|
|
}
|
|
|
|
DEBUG_TRACE("Exiting close_database()");
|
|
}
|
|
|
|
// Event type classification
|
|
typedef enum {
|
|
EVENT_TYPE_REGULAR,
|
|
EVENT_TYPE_REPLACEABLE,
|
|
EVENT_TYPE_EPHEMERAL,
|
|
EVENT_TYPE_ADDRESSABLE,
|
|
EVENT_TYPE_UNKNOWN
|
|
} event_type_t;
|
|
|
|
event_type_t classify_event_kind(int kind) {
|
|
if ((kind >= 1000 && kind < 10000) ||
|
|
(kind >= 4 && kind < 45) ||
|
|
kind == 1 || kind == 2) {
|
|
return EVENT_TYPE_REGULAR;
|
|
}
|
|
if ((kind >= 10000 && kind < 20000) ||
|
|
kind == 0 || kind == 3) {
|
|
return EVENT_TYPE_REPLACEABLE;
|
|
}
|
|
if (kind >= 20000 && kind < 30000) {
|
|
return EVENT_TYPE_EPHEMERAL;
|
|
}
|
|
if (kind >= 30000 && kind < 40000) {
|
|
return EVENT_TYPE_ADDRESSABLE;
|
|
}
|
|
return EVENT_TYPE_UNKNOWN;
|
|
}
|
|
|
|
const char* event_type_to_string(event_type_t type) {
|
|
switch (type) {
|
|
case EVENT_TYPE_REGULAR: return "regular";
|
|
case EVENT_TYPE_REPLACEABLE: return "replaceable";
|
|
case EVENT_TYPE_EPHEMERAL: return "ephemeral";
|
|
case EVENT_TYPE_ADDRESSABLE: return "addressable";
|
|
default: return "unknown";
|
|
}
|
|
}
|
|
|
|
// Helper function to extract d tag value from tags array
|
|
const char* extract_d_tag_value(cJSON* tags) {
|
|
if (!tags || !cJSON_IsArray(tags)) {
|
|
return NULL;
|
|
}
|
|
|
|
cJSON* tag = NULL;
|
|
cJSON_ArrayForEach(tag, tags) {
|
|
if (cJSON_IsArray(tag) && cJSON_GetArraySize(tag) >= 2) {
|
|
cJSON* tag_name = cJSON_GetArrayItem(tag, 0);
|
|
cJSON* tag_value = cJSON_GetArrayItem(tag, 1);
|
|
|
|
if (cJSON_IsString(tag_name) && cJSON_IsString(tag_value)) {
|
|
const char* name = cJSON_GetStringValue(tag_name);
|
|
if (name && strcmp(name, "d") == 0) {
|
|
return cJSON_GetStringValue(tag_value);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Check and handle replaceable events according to NIP-01
|
|
int check_and_handle_replaceable_event(int kind, const char* pubkey, long created_at) {
|
|
if (!g_db || !pubkey) return 0;
|
|
|
|
const char* sql =
|
|
"SELECT created_at FROM events WHERE kind = ? AND pubkey = ? ORDER BY created_at DESC LIMIT 1";
|
|
|
|
sqlite3_stmt* stmt;
|
|
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
|
if (rc != SQLITE_OK) {
|
|
return 0; // Allow storage on DB error
|
|
}
|
|
|
|
sqlite3_bind_int(stmt, 1, kind);
|
|
sqlite3_bind_text(stmt, 2, pubkey, -1, SQLITE_STATIC);
|
|
|
|
int result = 0;
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
long existing_created_at = sqlite3_column_int64(stmt, 0);
|
|
if (created_at <= existing_created_at) {
|
|
result = -1; // Older or same timestamp, reject
|
|
} else {
|
|
// Delete older versions
|
|
const char* delete_sql = "DELETE FROM events WHERE kind = ? AND pubkey = ? AND created_at < ?";
|
|
sqlite3_stmt* delete_stmt;
|
|
if (sqlite3_prepare_v2(g_db, delete_sql, -1, &delete_stmt, NULL) == SQLITE_OK) {
|
|
sqlite3_bind_int(delete_stmt, 1, kind);
|
|
sqlite3_bind_text(delete_stmt, 2, pubkey, -1, SQLITE_STATIC);
|
|
sqlite3_bind_int64(delete_stmt, 3, created_at);
|
|
sqlite3_step(delete_stmt);
|
|
sqlite3_finalize(delete_stmt);
|
|
}
|
|
}
|
|
}
|
|
|
|
sqlite3_finalize(stmt);
|
|
return result;
|
|
}
|
|
|
|
// Check and handle addressable events according to NIP-01
|
|
int check_and_handle_addressable_event(int kind, const char* pubkey, const char* d_tag_value, long created_at) {
|
|
if (!g_db || !pubkey) return 0;
|
|
|
|
// If no d tag, treat as regular replaceable
|
|
if (!d_tag_value) {
|
|
return check_and_handle_replaceable_event(kind, pubkey, created_at);
|
|
}
|
|
|
|
const char* sql =
|
|
"SELECT created_at FROM events WHERE kind = ? AND pubkey = ? AND json_extract(tags, '$[*][1]') = ? "
|
|
"AND json_extract(tags, '$[*][0]') = 'd' ORDER BY created_at DESC LIMIT 1";
|
|
|
|
sqlite3_stmt* stmt;
|
|
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
|
if (rc != SQLITE_OK) {
|
|
return 0; // Allow storage on DB error
|
|
}
|
|
|
|
sqlite3_bind_int(stmt, 1, kind);
|
|
sqlite3_bind_text(stmt, 2, pubkey, -1, SQLITE_STATIC);
|
|
sqlite3_bind_text(stmt, 3, d_tag_value, -1, SQLITE_STATIC);
|
|
|
|
int result = 0;
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
long existing_created_at = sqlite3_column_int64(stmt, 0);
|
|
if (created_at <= existing_created_at) {
|
|
result = -1; // Older or same timestamp, reject
|
|
} else {
|
|
// Delete older versions with same kind, pubkey, and d tag
|
|
const char* delete_sql =
|
|
"DELETE FROM events WHERE kind = ? AND pubkey = ? AND created_at < ? "
|
|
"AND json_extract(tags, '$[*][1]') = ? AND json_extract(tags, '$[*][0]') = 'd'";
|
|
sqlite3_stmt* delete_stmt;
|
|
if (sqlite3_prepare_v2(g_db, delete_sql, -1, &delete_stmt, NULL) == SQLITE_OK) {
|
|
sqlite3_bind_int(delete_stmt, 1, kind);
|
|
sqlite3_bind_text(delete_stmt, 2, pubkey, -1, SQLITE_STATIC);
|
|
sqlite3_bind_int64(delete_stmt, 3, created_at);
|
|
sqlite3_bind_text(delete_stmt, 4, d_tag_value, -1, SQLITE_STATIC);
|
|
sqlite3_step(delete_stmt);
|
|
sqlite3_finalize(delete_stmt);
|
|
}
|
|
}
|
|
}
|
|
|
|
sqlite3_finalize(stmt);
|
|
return result;
|
|
}
|
|
|
|
// Store event in database
|
|
int store_event(cJSON* event) {
|
|
if (!g_db || !event) {
|
|
return -1;
|
|
}
|
|
|
|
// Extract event fields
|
|
cJSON* id = cJSON_GetObjectItem(event, "id");
|
|
cJSON* pubkey = cJSON_GetObjectItem(event, "pubkey");
|
|
cJSON* created_at = cJSON_GetObjectItem(event, "created_at");
|
|
cJSON* kind = cJSON_GetObjectItem(event, "kind");
|
|
cJSON* content = cJSON_GetObjectItem(event, "content");
|
|
cJSON* sig = cJSON_GetObjectItem(event, "sig");
|
|
cJSON* tags = cJSON_GetObjectItem(event, "tags");
|
|
|
|
if (!id || !pubkey || !created_at || !kind || !content || !sig) {
|
|
DEBUG_ERROR("Invalid event - missing required fields");
|
|
return -1;
|
|
}
|
|
|
|
// Classify event type
|
|
event_type_t type = classify_event_kind((int)cJSON_GetNumberValue(kind));
|
|
|
|
// Serialize tags to JSON (use empty array if no tags)
|
|
char* tags_json = NULL;
|
|
if (tags && cJSON_IsArray(tags)) {
|
|
tags_json = cJSON_Print(tags);
|
|
} else {
|
|
tags_json = strdup("[]");
|
|
}
|
|
|
|
if (!tags_json) {
|
|
DEBUG_ERROR("Failed to serialize tags to JSON");
|
|
return -1;
|
|
}
|
|
|
|
// Prepare SQL statement for event insertion
|
|
const char* sql =
|
|
"INSERT INTO events (id, pubkey, created_at, kind, event_type, content, sig, tags) "
|
|
"VALUES (?, ?, ?, ?, ?, ?, ?, ?)";
|
|
|
|
sqlite3_stmt* stmt;
|
|
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
|
if (rc != SQLITE_OK) {
|
|
DEBUG_ERROR("Failed to prepare event insert statement");
|
|
free(tags_json);
|
|
return -1;
|
|
}
|
|
|
|
// Bind parameters
|
|
sqlite3_bind_text(stmt, 1, cJSON_GetStringValue(id), -1, SQLITE_STATIC);
|
|
sqlite3_bind_text(stmt, 2, cJSON_GetStringValue(pubkey), -1, SQLITE_STATIC);
|
|
sqlite3_bind_int64(stmt, 3, (sqlite3_int64)cJSON_GetNumberValue(created_at));
|
|
sqlite3_bind_int(stmt, 4, (int)cJSON_GetNumberValue(kind));
|
|
sqlite3_bind_text(stmt, 5, event_type_to_string(type), -1, SQLITE_STATIC);
|
|
sqlite3_bind_text(stmt, 6, cJSON_GetStringValue(content), -1, SQLITE_STATIC);
|
|
sqlite3_bind_text(stmt, 7, cJSON_GetStringValue(sig), -1, SQLITE_STATIC);
|
|
sqlite3_bind_text(stmt, 8, tags_json, -1, SQLITE_TRANSIENT);
|
|
|
|
// Execute statement
|
|
rc = sqlite3_step(stmt);
|
|
sqlite3_finalize(stmt);
|
|
|
|
if (rc != SQLITE_DONE) {
|
|
if (rc == SQLITE_CONSTRAINT) {
|
|
DEBUG_WARN("Event already exists in database");
|
|
free(tags_json);
|
|
return 0; // Not an error, just duplicate
|
|
}
|
|
char error_msg[256];
|
|
snprintf(error_msg, sizeof(error_msg), "Failed to insert event: %s", sqlite3_errmsg(g_db));
|
|
DEBUG_ERROR(error_msg);
|
|
free(tags_json);
|
|
return -1;
|
|
}
|
|
|
|
free(tags_json);
|
|
return 0;
|
|
}
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
// EVENT STORAGE AND RETRIEVAL
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
cJSON* retrieve_event(const char* event_id) {
|
|
if (!g_db || !event_id) {
|
|
return NULL;
|
|
}
|
|
|
|
const char* sql =
|
|
"SELECT id, pubkey, created_at, kind, content, sig, tags FROM events WHERE id = ?";
|
|
|
|
sqlite3_stmt* stmt;
|
|
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
|
if (rc != SQLITE_OK) {
|
|
return NULL;
|
|
}
|
|
|
|
sqlite3_bind_text(stmt, 1, event_id, -1, SQLITE_STATIC);
|
|
|
|
cJSON* event = NULL;
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
event = cJSON_CreateObject();
|
|
|
|
cJSON_AddStringToObject(event, "id", (char*)sqlite3_column_text(stmt, 0));
|
|
cJSON_AddStringToObject(event, "pubkey", (char*)sqlite3_column_text(stmt, 1));
|
|
cJSON_AddNumberToObject(event, "created_at", sqlite3_column_int64(stmt, 2));
|
|
cJSON_AddNumberToObject(event, "kind", sqlite3_column_int(stmt, 3));
|
|
cJSON_AddStringToObject(event, "content", (char*)sqlite3_column_text(stmt, 4));
|
|
cJSON_AddStringToObject(event, "sig", (char*)sqlite3_column_text(stmt, 5));
|
|
|
|
// Parse tags JSON
|
|
const char* tags_json = (char*)sqlite3_column_text(stmt, 6);
|
|
if (tags_json) {
|
|
cJSON* tags = cJSON_Parse(tags_json);
|
|
if (tags) {
|
|
cJSON_AddItemToObject(event, "tags", tags);
|
|
} else {
|
|
cJSON_AddItemToObject(event, "tags", cJSON_CreateArray());
|
|
}
|
|
} else {
|
|
cJSON_AddItemToObject(event, "tags", cJSON_CreateArray());
|
|
}
|
|
}
|
|
|
|
sqlite3_finalize(stmt);
|
|
return event;
|
|
}
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
// SUBSCRIPTION HANDLERS
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
int handle_req_message(const char* sub_id, cJSON* filters, struct lws *wsi, struct per_session_data *pss) {
|
|
if (!cJSON_IsArray(filters)) {
|
|
DEBUG_ERROR("REQ filters is not an array");
|
|
return 0;
|
|
}
|
|
|
|
// EARLY SUBSCRIPTION LIMIT CHECK - Check limits BEFORE any processing
|
|
if (pss) {
|
|
time_t current_time = time(NULL);
|
|
|
|
// Check if client is currently rate limited due to excessive failed attempts
|
|
if (pss->rate_limit_until > current_time) {
|
|
char rate_limit_msg[256];
|
|
int remaining_seconds = (int)(pss->rate_limit_until - current_time);
|
|
snprintf(rate_limit_msg, sizeof(rate_limit_msg),
|
|
"Rate limited due to excessive failed subscription attempts. Try again in %d seconds.", remaining_seconds);
|
|
|
|
// Send CLOSED notice for rate limiting
|
|
cJSON* closed_msg = cJSON_CreateArray();
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString("CLOSED"));
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString(sub_id));
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString("error: rate limited"));
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString(rate_limit_msg));
|
|
|
|
char* closed_str = cJSON_Print(closed_msg);
|
|
if (closed_str) {
|
|
size_t closed_len = strlen(closed_str);
|
|
unsigned char* buf = malloc(LWS_PRE + closed_len);
|
|
if (buf) {
|
|
memcpy(buf + LWS_PRE, closed_str, closed_len);
|
|
lws_write(wsi, buf + LWS_PRE, closed_len, LWS_WRITE_TEXT);
|
|
free(buf);
|
|
}
|
|
free(closed_str);
|
|
}
|
|
cJSON_Delete(closed_msg);
|
|
|
|
// Update rate limiting counters
|
|
pss->failed_subscription_attempts++;
|
|
pss->last_failed_attempt = current_time;
|
|
|
|
return 0;
|
|
}
|
|
|
|
// Check session subscription limits
|
|
if (pss->subscription_count >= g_subscription_manager.max_subscriptions_per_client) {
|
|
DEBUG_ERROR("Maximum subscriptions per client exceeded");
|
|
|
|
// Update rate limiting counters for failed attempt
|
|
pss->failed_subscription_attempts++;
|
|
pss->last_failed_attempt = current_time;
|
|
pss->consecutive_failures++;
|
|
|
|
// Implement progressive backoff: 1s, 5s, 30s, 300s (5min) based on consecutive failures
|
|
int backoff_seconds = 1;
|
|
if (pss->consecutive_failures >= 10) backoff_seconds = 300; // 5 minutes
|
|
else if (pss->consecutive_failures >= 5) backoff_seconds = 30; // 30 seconds
|
|
else if (pss->consecutive_failures >= 3) backoff_seconds = 5; // 5 seconds
|
|
|
|
pss->rate_limit_until = current_time + backoff_seconds;
|
|
|
|
// Send CLOSED notice with backoff information
|
|
cJSON* closed_msg = cJSON_CreateArray();
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString("CLOSED"));
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString(sub_id));
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString("error: too many subscriptions"));
|
|
|
|
char backoff_msg[256];
|
|
snprintf(backoff_msg, sizeof(backoff_msg),
|
|
"Maximum subscriptions per client exceeded. Backoff for %d seconds.", backoff_seconds);
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString(backoff_msg));
|
|
|
|
char* closed_str = cJSON_Print(closed_msg);
|
|
if (closed_str) {
|
|
size_t closed_len = strlen(closed_str);
|
|
unsigned char* buf = malloc(LWS_PRE + closed_len);
|
|
if (buf) {
|
|
memcpy(buf + LWS_PRE, closed_str, closed_len);
|
|
lws_write(wsi, buf + LWS_PRE, closed_len, LWS_WRITE_TEXT);
|
|
free(buf);
|
|
}
|
|
free(closed_str);
|
|
}
|
|
cJSON_Delete(closed_msg);
|
|
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
// Parameter binding helpers
|
|
char** bind_params = NULL;
|
|
int bind_param_count = 0;
|
|
int bind_param_capacity = 0;
|
|
|
|
// Check for kind 33334 configuration event requests BEFORE creating subscription
|
|
int config_events_sent = 0;
|
|
int has_config_request = 0;
|
|
|
|
// Check if any filter requests kind 33334 (configuration events)
|
|
for (int i = 0; i < cJSON_GetArraySize(filters); i++) {
|
|
cJSON* filter = cJSON_GetArrayItem(filters, i);
|
|
if (filter && cJSON_IsObject(filter)) {
|
|
if (req_filter_requests_config_events(filter)) {
|
|
has_config_request = 1;
|
|
|
|
// Generate synthetic config event for this subscription
|
|
cJSON* filters_array = cJSON_CreateArray();
|
|
cJSON_AddItemToArray(filters_array, cJSON_Duplicate(filter, 1));
|
|
|
|
cJSON* event_msg = generate_synthetic_config_event_for_subscription(sub_id, filters_array);
|
|
|
|
if (event_msg) {
|
|
char* msg_str = cJSON_Print(event_msg);
|
|
if (msg_str) {
|
|
size_t msg_len = strlen(msg_str);
|
|
unsigned char* buf = malloc(LWS_PRE + msg_len);
|
|
if (buf) {
|
|
memcpy(buf + LWS_PRE, msg_str, msg_len);
|
|
lws_write(wsi, buf + LWS_PRE, msg_len, LWS_WRITE_TEXT);
|
|
config_events_sent++;
|
|
free(buf);
|
|
}
|
|
free(msg_str);
|
|
}
|
|
cJSON_Delete(event_msg);
|
|
}
|
|
|
|
cJSON_Delete(filters_array);
|
|
|
|
break; // Only generate once per subscription
|
|
}
|
|
}
|
|
}
|
|
|
|
// If only config events were requested, we can return early after sending EOSE
|
|
// But still create the subscription for future config updates
|
|
|
|
// Create persistent subscription
|
|
subscription_t* subscription = create_subscription(sub_id, wsi, filters, pss ? pss->client_ip : "unknown");
|
|
if (!subscription) {
|
|
DEBUG_ERROR("Failed to create subscription");
|
|
return has_config_request ? config_events_sent : 0;
|
|
}
|
|
|
|
// Add to global manager
|
|
if (add_subscription_to_manager(subscription) != 0) {
|
|
DEBUG_ERROR("Failed to add subscription to global manager");
|
|
free_subscription(subscription);
|
|
|
|
// Send CLOSED notice
|
|
cJSON* closed_msg = cJSON_CreateArray();
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString("CLOSED"));
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString(sub_id));
|
|
cJSON_AddItemToArray(closed_msg, cJSON_CreateString("error: subscription limit reached"));
|
|
|
|
char* closed_str = cJSON_Print(closed_msg);
|
|
if (closed_str) {
|
|
size_t closed_len = strlen(closed_str);
|
|
unsigned char* buf = malloc(LWS_PRE + closed_len);
|
|
if (buf) {
|
|
memcpy(buf + LWS_PRE, closed_str, closed_len);
|
|
lws_write(wsi, buf + LWS_PRE, closed_len, LWS_WRITE_TEXT);
|
|
free(buf);
|
|
}
|
|
free(closed_str);
|
|
}
|
|
cJSON_Delete(closed_msg);
|
|
|
|
// Update rate limiting counters for failed attempt (global limit reached)
|
|
if (pss) {
|
|
time_t current_time = time(NULL);
|
|
pss->failed_subscription_attempts++;
|
|
pss->last_failed_attempt = current_time;
|
|
pss->consecutive_failures++;
|
|
}
|
|
|
|
return has_config_request ? config_events_sent : 0;
|
|
}
|
|
|
|
// Add to session's subscription list (if session data available)
|
|
if (pss) {
|
|
pthread_mutex_lock(&pss->session_lock);
|
|
subscription->session_next = pss->subscriptions;
|
|
pss->subscriptions = subscription;
|
|
pss->subscription_count++;
|
|
pthread_mutex_unlock(&pss->session_lock);
|
|
}
|
|
|
|
int events_sent = config_events_sent; // Start with synthetic config events
|
|
|
|
// Process each filter in the array
|
|
for (int i = 0; i < cJSON_GetArraySize(filters); i++) {
|
|
cJSON* filter = cJSON_GetArrayItem(filters, i);
|
|
if (!filter || !cJSON_IsObject(filter)) {
|
|
DEBUG_WARN("Invalid filter object");
|
|
continue;
|
|
}
|
|
|
|
// Reset bind params for this filter
|
|
free_bind_params(bind_params, bind_param_count);
|
|
bind_params = NULL;
|
|
bind_param_count = 0;
|
|
bind_param_capacity = 0;
|
|
|
|
// Build SQL query based on filter - exclude ephemeral events (kinds 20000-29999) from historical queries
|
|
char sql[1024] = "SELECT id, pubkey, created_at, kind, content, sig, tags FROM events WHERE 1=1 AND (kind < 20000 OR kind >= 30000)";
|
|
char* sql_ptr = sql + strlen(sql);
|
|
int remaining = sizeof(sql) - strlen(sql);
|
|
|
|
// Note: Expiration filtering will be done at application level
|
|
// after retrieving events to ensure compatibility with all SQLite versions
|
|
|
|
// Handle kinds filter
|
|
cJSON* kinds = cJSON_GetObjectItem(filter, "kinds");
|
|
if (kinds && cJSON_IsArray(kinds)) {
|
|
int kind_count = cJSON_GetArraySize(kinds);
|
|
if (kind_count > 0) {
|
|
snprintf(sql_ptr, remaining, " AND kind IN (");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
|
|
for (int k = 0; k < kind_count; k++) {
|
|
cJSON* kind = cJSON_GetArrayItem(kinds, k);
|
|
if (cJSON_IsNumber(kind)) {
|
|
if (k > 0) {
|
|
snprintf(sql_ptr, remaining, ",");
|
|
sql_ptr++;
|
|
remaining--;
|
|
}
|
|
snprintf(sql_ptr, remaining, "%d", (int)cJSON_GetNumberValue(kind));
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
}
|
|
}
|
|
snprintf(sql_ptr, remaining, ")");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
}
|
|
}
|
|
|
|
// Handle authors filter
|
|
cJSON* authors = cJSON_GetObjectItem(filter, "authors");
|
|
if (authors && cJSON_IsArray(authors)) {
|
|
int author_count = 0;
|
|
// Count valid authors
|
|
for (int a = 0; a < cJSON_GetArraySize(authors); a++) {
|
|
cJSON* author = cJSON_GetArrayItem(authors, a);
|
|
if (cJSON_IsString(author)) {
|
|
author_count++;
|
|
}
|
|
}
|
|
if (author_count > 0) {
|
|
snprintf(sql_ptr, remaining, " AND pubkey IN (");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
|
|
for (int a = 0; a < author_count; a++) {
|
|
if (a > 0) {
|
|
snprintf(sql_ptr, remaining, ",");
|
|
sql_ptr++;
|
|
remaining--;
|
|
}
|
|
snprintf(sql_ptr, remaining, "?");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
}
|
|
snprintf(sql_ptr, remaining, ")");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
|
|
// Add author values to bind params
|
|
for (int a = 0; a < cJSON_GetArraySize(authors); a++) {
|
|
cJSON* author = cJSON_GetArrayItem(authors, a);
|
|
if (cJSON_IsString(author)) {
|
|
add_bind_param(&bind_params, &bind_param_count, &bind_param_capacity, cJSON_GetStringValue(author));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Handle ids filter
|
|
cJSON* ids = cJSON_GetObjectItem(filter, "ids");
|
|
if (ids && cJSON_IsArray(ids)) {
|
|
int id_count = 0;
|
|
// Count valid ids
|
|
for (int i = 0; i < cJSON_GetArraySize(ids); i++) {
|
|
cJSON* id = cJSON_GetArrayItem(ids, i);
|
|
if (cJSON_IsString(id)) {
|
|
id_count++;
|
|
}
|
|
}
|
|
if (id_count > 0) {
|
|
snprintf(sql_ptr, remaining, " AND id IN (");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
|
|
for (int i = 0; i < id_count; i++) {
|
|
if (i > 0) {
|
|
snprintf(sql_ptr, remaining, ",");
|
|
sql_ptr++;
|
|
remaining--;
|
|
}
|
|
snprintf(sql_ptr, remaining, "?");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
}
|
|
snprintf(sql_ptr, remaining, ")");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
|
|
// Add id values to bind params
|
|
for (int i = 0; i < cJSON_GetArraySize(ids); i++) {
|
|
cJSON* id = cJSON_GetArrayItem(ids, i);
|
|
if (cJSON_IsString(id)) {
|
|
add_bind_param(&bind_params, &bind_param_count, &bind_param_capacity, cJSON_GetStringValue(id));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Handle tag filters (#e, #p, #t, etc.)
|
|
cJSON* filter_item = NULL;
|
|
cJSON_ArrayForEach(filter_item, filter) {
|
|
const char* filter_key = filter_item->string;
|
|
if (filter_key && filter_key[0] == '#' && strlen(filter_key) > 1) {
|
|
// This is a tag filter like "#e", "#p", etc.
|
|
const char* tag_name = filter_key + 1; // Get the tag name (e, p, t, type, etc.)
|
|
|
|
if (cJSON_IsArray(filter_item)) {
|
|
int tag_value_count = 0;
|
|
// Count valid tag values
|
|
for (int i = 0; i < cJSON_GetArraySize(filter_item); i++) {
|
|
cJSON* tag_value = cJSON_GetArrayItem(filter_item, i);
|
|
if (cJSON_IsString(tag_value)) {
|
|
tag_value_count++;
|
|
}
|
|
}
|
|
if (tag_value_count > 0) {
|
|
// Use EXISTS with parameterized query
|
|
snprintf(sql_ptr, remaining, " AND EXISTS (SELECT 1 FROM json_each(json(tags)) WHERE json_extract(value, '$[0]') = ? AND json_extract(value, '$[1]') IN (");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
|
|
for (int i = 0; i < tag_value_count; i++) {
|
|
if (i > 0) {
|
|
snprintf(sql_ptr, remaining, ",");
|
|
sql_ptr++;
|
|
remaining--;
|
|
}
|
|
snprintf(sql_ptr, remaining, "?");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
}
|
|
snprintf(sql_ptr, remaining, "))");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
|
|
// Add tag name and values to bind params
|
|
add_bind_param(&bind_params, &bind_param_count, &bind_param_capacity, tag_name);
|
|
for (int i = 0; i < cJSON_GetArraySize(filter_item); i++) {
|
|
cJSON* tag_value = cJSON_GetArrayItem(filter_item, i);
|
|
if (cJSON_IsString(tag_value)) {
|
|
add_bind_param(&bind_params, &bind_param_count, &bind_param_capacity, cJSON_GetStringValue(tag_value));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Handle search filter (NIP-50)
|
|
cJSON* search = cJSON_GetObjectItem(filter, "search");
|
|
if (search && cJSON_IsString(search)) {
|
|
const char* search_term = cJSON_GetStringValue(search);
|
|
if (search_term && strlen(search_term) > 0) {
|
|
// Search in both content and tag values using LIKE
|
|
// Escape single quotes in search term for SQL safety
|
|
char escaped_search[256];
|
|
size_t escaped_len = 0;
|
|
for (size_t i = 0; search_term[i] && escaped_len < sizeof(escaped_search) - 1; i++) {
|
|
if (search_term[i] == '\'') {
|
|
escaped_search[escaped_len++] = '\'';
|
|
escaped_search[escaped_len++] = '\'';
|
|
} else {
|
|
escaped_search[escaped_len++] = search_term[i];
|
|
}
|
|
}
|
|
escaped_search[escaped_len] = '\0';
|
|
|
|
// Add search conditions for content and tags
|
|
// Use tags LIKE to search within the JSON string representation of tags
|
|
snprintf(sql_ptr, remaining, " AND (content LIKE '%%%s%%' OR tags LIKE '%%\"%s\"%%')",
|
|
escaped_search, escaped_search);
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
}
|
|
}
|
|
|
|
// Handle since filter
|
|
cJSON* since = cJSON_GetObjectItem(filter, "since");
|
|
if (since && cJSON_IsNumber(since)) {
|
|
snprintf(sql_ptr, remaining, " AND created_at >= %ld", (long)cJSON_GetNumberValue(since));
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
}
|
|
|
|
// Handle until filter
|
|
cJSON* until = cJSON_GetObjectItem(filter, "until");
|
|
if (until && cJSON_IsNumber(until)) {
|
|
snprintf(sql_ptr, remaining, " AND created_at <= %ld", (long)cJSON_GetNumberValue(until));
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
}
|
|
|
|
// Add ordering and limit
|
|
snprintf(sql_ptr, remaining, " ORDER BY created_at DESC");
|
|
sql_ptr += strlen(sql_ptr);
|
|
remaining = sizeof(sql) - strlen(sql);
|
|
|
|
// Handle limit filter
|
|
cJSON* limit = cJSON_GetObjectItem(filter, "limit");
|
|
if (limit && cJSON_IsNumber(limit)) {
|
|
int limit_val = (int)cJSON_GetNumberValue(limit);
|
|
if (limit_val > 0 && limit_val <= 5000) {
|
|
snprintf(sql_ptr, remaining, " LIMIT %d", limit_val);
|
|
}
|
|
} else {
|
|
// Default limit to prevent excessive queries
|
|
snprintf(sql_ptr, remaining, " LIMIT 500");
|
|
}
|
|
|
|
// Execute query and send events
|
|
sqlite3_stmt* stmt;
|
|
int rc = sqlite3_prepare_v2(g_db, sql, -1, &stmt, NULL);
|
|
if (rc != SQLITE_OK) {
|
|
char error_msg[256];
|
|
snprintf(error_msg, sizeof(error_msg), "Failed to prepare subscription query: %s", sqlite3_errmsg(g_db));
|
|
DEBUG_ERROR(error_msg);
|
|
continue;
|
|
}
|
|
|
|
// Bind parameters
|
|
for (int i = 0; i < bind_param_count; i++) {
|
|
sqlite3_bind_text(stmt, i + 1, bind_params[i], -1, SQLITE_TRANSIENT);
|
|
}
|
|
|
|
int row_count = 0;
|
|
while (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
row_count++;
|
|
|
|
// Build event JSON
|
|
cJSON* event = cJSON_CreateObject();
|
|
cJSON_AddStringToObject(event, "id", (char*)sqlite3_column_text(stmt, 0));
|
|
cJSON_AddStringToObject(event, "pubkey", (char*)sqlite3_column_text(stmt, 1));
|
|
cJSON_AddNumberToObject(event, "created_at", sqlite3_column_int64(stmt, 2));
|
|
cJSON_AddNumberToObject(event, "kind", sqlite3_column_int(stmt, 3));
|
|
cJSON_AddStringToObject(event, "content", (char*)sqlite3_column_text(stmt, 4));
|
|
cJSON_AddStringToObject(event, "sig", (char*)sqlite3_column_text(stmt, 5));
|
|
|
|
// Parse tags JSON
|
|
const char* tags_json = (char*)sqlite3_column_text(stmt, 6);
|
|
cJSON* tags = NULL;
|
|
if (tags_json) {
|
|
tags = cJSON_Parse(tags_json);
|
|
}
|
|
if (!tags) {
|
|
tags = cJSON_CreateArray();
|
|
}
|
|
cJSON_AddItemToObject(event, "tags", tags);
|
|
|
|
// Check expiration filtering (NIP-40) at application level
|
|
int expiration_enabled = get_config_bool("expiration_enabled", 1);
|
|
int filter_responses = get_config_bool("expiration_filter", 1);
|
|
|
|
if (expiration_enabled && filter_responses) {
|
|
time_t current_time = time(NULL);
|
|
if (is_event_expired(event, current_time)) {
|
|
// Skip this expired event
|
|
cJSON_Delete(event);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
// Send EVENT message
|
|
cJSON* event_msg = cJSON_CreateArray();
|
|
cJSON_AddItemToArray(event_msg, cJSON_CreateString("EVENT"));
|
|
cJSON_AddItemToArray(event_msg, cJSON_CreateString(sub_id));
|
|
cJSON_AddItemToArray(event_msg, event);
|
|
|
|
char* msg_str = cJSON_Print(event_msg);
|
|
if (msg_str) {
|
|
size_t msg_len = strlen(msg_str);
|
|
unsigned char* buf = malloc(LWS_PRE + msg_len);
|
|
if (buf) {
|
|
memcpy(buf + LWS_PRE, msg_str, msg_len);
|
|
lws_write(wsi, buf + LWS_PRE, msg_len, LWS_WRITE_TEXT);
|
|
free(buf);
|
|
}
|
|
free(msg_str);
|
|
}
|
|
|
|
cJSON_Delete(event_msg);
|
|
events_sent++;
|
|
}
|
|
|
|
sqlite3_finalize(stmt);
|
|
}
|
|
|
|
// Cleanup bind params
|
|
free_bind_params(bind_params, bind_param_count);
|
|
|
|
return events_sent;
|
|
}
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
// ADMIN EVENT AUTHORIZATION
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
// Enhanced admin event authorization function
|
|
int is_authorized_admin_event(cJSON* event, char* error_buffer, size_t error_buffer_size) {
|
|
if (!event || !error_buffer) {
|
|
if (error_buffer && error_buffer_size > 0) {
|
|
snprintf(error_buffer, error_buffer_size, "Invalid parameters for admin authorization");
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
|
|
// Step 1: Verify event kind is admin type
|
|
cJSON *kind_json = cJSON_GetObjectItem(event, "kind");
|
|
if (!kind_json || !cJSON_IsNumber(kind_json)) {
|
|
snprintf(error_buffer, error_buffer_size, "Missing or invalid event kind");
|
|
return -1;
|
|
}
|
|
|
|
int event_kind = kind_json->valueint;
|
|
if (event_kind != 23456) {
|
|
snprintf(error_buffer, error_buffer_size, "Event kind %d is not an admin event type", event_kind);
|
|
return -1;
|
|
}
|
|
|
|
// Step 2: Check if event targets this relay (look for 'p' tag with our relay pubkey)
|
|
cJSON *tags = cJSON_GetObjectItem(event, "tags");
|
|
if (!tags || !cJSON_IsArray(tags)) {
|
|
// No tags array - treat as regular event for different relay
|
|
snprintf(error_buffer, error_buffer_size, "Admin event not targeting this relay (no tags)");
|
|
return -1;
|
|
}
|
|
|
|
int targets_this_relay = 0;
|
|
cJSON *tag;
|
|
cJSON_ArrayForEach(tag, tags) {
|
|
if (cJSON_IsArray(tag)) {
|
|
cJSON *tag_name = cJSON_GetArrayItem(tag, 0);
|
|
cJSON *tag_value = cJSON_GetArrayItem(tag, 1);
|
|
|
|
if (tag_name && cJSON_IsString(tag_name) &&
|
|
tag_value && cJSON_IsString(tag_value) &&
|
|
strcmp(tag_name->valuestring, "p") == 0) {
|
|
|
|
// Compare with our relay pubkey
|
|
const char* relay_pubkey = get_config_value("relay_pubkey");
|
|
if (relay_pubkey && strcmp(tag_value->valuestring, relay_pubkey) == 0) {
|
|
targets_this_relay = 1;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!targets_this_relay) {
|
|
// Admin event for different relay - not an error, just not for us
|
|
snprintf(error_buffer, error_buffer_size, "Admin event not targeting this relay");
|
|
return -1;
|
|
}
|
|
|
|
// Step 3: Verify admin signature authorization
|
|
cJSON *pubkey_json = cJSON_GetObjectItem(event, "pubkey");
|
|
if (!pubkey_json || !cJSON_IsString(pubkey_json)) {
|
|
DEBUG_WARN("Unauthorized admin event attempt: missing or invalid pubkey");
|
|
snprintf(error_buffer, error_buffer_size, "Unauthorized admin event attempt: missing pubkey");
|
|
return -1;
|
|
}
|
|
|
|
// Get admin pubkey from configuration
|
|
const char* admin_pubkey = get_config_value("admin_pubkey");
|
|
if (!admin_pubkey || strlen(admin_pubkey) == 0) {
|
|
DEBUG_WARN("Unauthorized admin event attempt: no admin pubkey configured");
|
|
snprintf(error_buffer, error_buffer_size, "Unauthorized admin event attempt: no admin configured");
|
|
return -1;
|
|
}
|
|
|
|
// Compare pubkeys
|
|
if (strcmp(pubkey_json->valuestring, admin_pubkey) != 0) {
|
|
DEBUG_WARN("Unauthorized admin event attempt: pubkey mismatch");
|
|
char warning_msg[256];
|
|
snprintf(warning_msg, sizeof(warning_msg),
|
|
"Unauthorized admin event attempt from pubkey: %.32s...", pubkey_json->valuestring);
|
|
DEBUG_WARN(warning_msg);
|
|
DEBUG_INFO("DEBUG: Pubkey comparison failed - event pubkey != admin pubkey");
|
|
snprintf(error_buffer, error_buffer_size, "Unauthorized admin event attempt: invalid admin pubkey");
|
|
return -1;
|
|
}
|
|
|
|
|
|
// Step 4: Verify event signature
|
|
if (nostr_verify_event_signature(event) != 0) {
|
|
DEBUG_WARN("Unauthorized admin event attempt: invalid signature");
|
|
snprintf(error_buffer, error_buffer_size, "Unauthorized admin event attempt: signature verification failed");
|
|
return -1;
|
|
}
|
|
|
|
|
|
// All checks passed - authorized admin event
|
|
return 0;
|
|
}
|
|
|
|
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
// MAIN PROGRAM
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
// Print usage information
|
|
void print_usage(const char* program_name) {
|
|
printf("Usage: %s [OPTIONS]\n", program_name);
|
|
printf("\n");
|
|
printf("C Nostr Relay Server - Event-Based Configuration\n");
|
|
printf("\n");
|
|
printf("Options:\n");
|
|
printf(" -h, --help Show this help message\n");
|
|
printf(" -v, --version Show version information\n");
|
|
printf(" -p, --port PORT Override relay port (first-time startup only)\n");
|
|
printf(" --strict-port Fail if exact port is unavailable (no port increment)\n");
|
|
printf(" -a, --admin-pubkey KEY Override admin public key (64-char hex or npub)\n");
|
|
printf(" -r, --relay-privkey KEY Override relay private key (64-char hex or nsec)\n");
|
|
printf(" --debug-level=N Set debug output level (0-5, default: 0)\n");
|
|
printf(" 0=none, 1=errors, 2=warnings, 3=info, 4=debug, 5=trace\n");
|
|
printf("\n");
|
|
printf("Configuration:\n");
|
|
printf(" This relay uses event-based configuration stored in the database.\n");
|
|
printf(" On first startup, keys are automatically generated and printed once.\n");
|
|
printf(" Command line options like --port only apply during first-time setup.\n");
|
|
printf(" After initial setup, all configuration is managed via database events.\n");
|
|
printf(" Database file: <relay_pubkey>.db (created automatically)\n");
|
|
printf("\n");
|
|
printf("Port Binding:\n");
|
|
printf(" Default: Try up to 10 consecutive ports if requested port is busy\n");
|
|
printf(" --strict-port: Fail immediately if exact requested port is unavailable\n");
|
|
printf("\n");
|
|
printf("Examples:\n");
|
|
printf(" %s # Start relay (auto-configure on first run)\n", program_name);
|
|
printf(" %s -p 8080 # First-time setup with port 8080\n", program_name);
|
|
printf(" %s --port 9000 # First-time setup with port 9000\n", program_name);
|
|
printf(" %s --strict-port # Fail if default port 8888 is unavailable\n", program_name);
|
|
printf(" %s -p 8080 --strict-port # Fail if port 8080 is unavailable\n", program_name);
|
|
printf(" %s --help # Show this help\n", program_name);
|
|
printf(" %s --version # Show version info\n", program_name);
|
|
printf("\n");
|
|
}
|
|
|
|
// Print version information
|
|
void print_version() {
|
|
printf("C Nostr Relay Server v1.0.0\n");
|
|
printf("Event-based configuration system\n");
|
|
printf("Built with nostr_core_lib integration\n");
|
|
printf("\n");
|
|
}
|
|
|
|
int main(int argc, char* argv[]) {
|
|
// Initialize CLI options structure
|
|
cli_options_t cli_options = {
|
|
.port_override = -1, // -1 = not set
|
|
.admin_pubkey_override = {0}, // Empty string = not set
|
|
.relay_privkey_override = {0}, // Empty string = not set
|
|
.strict_port = 0, // 0 = allow port increment (default)
|
|
.debug_level = 0 // 0 = no debug output (default)
|
|
};
|
|
|
|
// Parse command line arguments
|
|
for (int i = 1; i < argc; i++) {
|
|
if (strcmp(argv[i], "-h") == 0 || strcmp(argv[i], "--help") == 0) {
|
|
print_usage(argv[0]);
|
|
return 0;
|
|
} else if (strcmp(argv[i], "-v") == 0 || strcmp(argv[i], "--version") == 0) {
|
|
print_version();
|
|
return 0;
|
|
} else if (strcmp(argv[i], "-p") == 0 || strcmp(argv[i], "--port") == 0) {
|
|
// Port override option
|
|
if (i + 1 >= argc) {
|
|
DEBUG_ERROR("Port option requires a value. Use --help for usage information.");
|
|
print_usage(argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
// Parse port number
|
|
char* endptr;
|
|
long port = strtol(argv[i + 1], &endptr, 10);
|
|
|
|
if (endptr == argv[i + 1] || *endptr != '\0' || port < 1 || port > 65535) {
|
|
DEBUG_ERROR("Invalid port number. Port must be between 1 and 65535.");
|
|
print_usage(argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
cli_options.port_override = (int)port;
|
|
i++; // Skip the port argument
|
|
|
|
char port_msg[128];
|
|
snprintf(port_msg, sizeof(port_msg), "Port override specified: %d", cli_options.port_override);
|
|
} else if (strcmp(argv[i], "-a") == 0 || strcmp(argv[i], "--admin-pubkey") == 0) {
|
|
// Admin public key override option
|
|
if (i + 1 >= argc) {
|
|
DEBUG_ERROR("Admin pubkey option requires a value. Use --help for usage information.");
|
|
print_usage(argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
const char* input_key = argv[i + 1];
|
|
char decoded_key[65] = {0}; // Buffer for decoded hex key
|
|
|
|
// Try to decode the input as either hex or npub format
|
|
unsigned char pubkey_bytes[32];
|
|
if (nostr_decode_npub(input_key, pubkey_bytes) == NOSTR_SUCCESS) {
|
|
// Convert bytes back to hex string
|
|
char* hex_ptr = decoded_key;
|
|
for (int j = 0; j < 32; j++) {
|
|
sprintf(hex_ptr, "%02x", pubkey_bytes[j]);
|
|
hex_ptr += 2;
|
|
}
|
|
} else {
|
|
DEBUG_ERROR("Invalid admin public key format. Must be 64 hex characters or valid npub format.");
|
|
print_usage(argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
strncpy(cli_options.admin_pubkey_override, decoded_key, sizeof(cli_options.admin_pubkey_override) - 1);
|
|
cli_options.admin_pubkey_override[sizeof(cli_options.admin_pubkey_override) - 1] = '\0';
|
|
i++; // Skip the key argument
|
|
|
|
} else if (strcmp(argv[i], "-r") == 0 || strcmp(argv[i], "--relay-privkey") == 0) {
|
|
// Relay private key override option
|
|
if (i + 1 >= argc) {
|
|
DEBUG_ERROR("Relay privkey option requires a value. Use --help for usage information.");
|
|
print_usage(argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
const char* input_key = argv[i + 1];
|
|
char decoded_key[65] = {0}; // Buffer for decoded hex key
|
|
|
|
// Try to decode the input as either hex or nsec format
|
|
unsigned char privkey_bytes[32];
|
|
if (nostr_decode_nsec(input_key, privkey_bytes) == NOSTR_SUCCESS) {
|
|
// Convert bytes back to hex string
|
|
char* hex_ptr = decoded_key;
|
|
for (int j = 0; j < 32; j++) {
|
|
sprintf(hex_ptr, "%02x", privkey_bytes[j]);
|
|
hex_ptr += 2;
|
|
}
|
|
} else {
|
|
DEBUG_ERROR("Invalid relay private key format. Must be 64 hex characters or valid nsec format.");
|
|
print_usage(argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
strncpy(cli_options.relay_privkey_override, decoded_key, sizeof(cli_options.relay_privkey_override) - 1);
|
|
cli_options.relay_privkey_override[sizeof(cli_options.relay_privkey_override) - 1] = '\0';
|
|
i++; // Skip the key argument
|
|
|
|
} else if (strcmp(argv[i], "--strict-port") == 0) {
|
|
// Strict port mode option
|
|
cli_options.strict_port = 1;
|
|
} else if (strncmp(argv[i], "--debug-level=", 14) == 0) {
|
|
// Debug level option
|
|
char* endptr;
|
|
int debug_level = (int)strtol(argv[i] + 14, &endptr, 10);
|
|
|
|
if (endptr == argv[i] + 14 || *endptr != '\0' || debug_level < 0 || debug_level > 5) {
|
|
DEBUG_ERROR("Invalid debug level. Debug level must be between 0 and 5.");
|
|
print_usage(argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
cli_options.debug_level = debug_level;
|
|
} else {
|
|
DEBUG_ERROR("Unknown argument. Use --help for usage information.");
|
|
print_usage(argv[0]);
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
// Initialize debug system
|
|
debug_init(cli_options.debug_level);
|
|
|
|
// Set up signal handlers
|
|
signal(SIGINT, signal_handler);
|
|
signal(SIGTERM, signal_handler);
|
|
|
|
printf(BLUE BOLD "=== C Nostr Relay Server ===" RESET "\n");
|
|
|
|
|
|
DEBUG_TRACE("Starting main initialization sequence");
|
|
|
|
// Initialize nostr library FIRST (required for key generation and event creation)
|
|
if (nostr_init() != 0) {
|
|
DEBUG_ERROR("Failed to initialize nostr library");
|
|
return 1;
|
|
}
|
|
|
|
DEBUG_LOG("Nostr library initialized");
|
|
|
|
// Check if this is first-time startup or existing relay
|
|
if (is_first_time_startup()) {
|
|
DEBUG_LOG("First-time startup detected");
|
|
|
|
// Initialize event-based configuration system
|
|
if (init_configuration_system(NULL, NULL) != 0) {
|
|
DEBUG_ERROR("Failed to initialize event-based configuration system");
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
|
|
// Run first-time startup sequence (generates keys, sets up database path, but doesn't store private key yet)
|
|
char admin_pubkey[65] = {0};
|
|
char relay_pubkey[65] = {0};
|
|
char relay_privkey[65] = {0};
|
|
if (first_time_startup_sequence(&cli_options, admin_pubkey, relay_pubkey, relay_privkey) != 0) {
|
|
DEBUG_ERROR("Failed to complete first-time startup sequence");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
|
|
// Initialize database with the generated relay pubkey
|
|
DEBUG_TRACE("Initializing database for first-time startup");
|
|
if (init_database(g_database_path) != 0) {
|
|
DEBUG_ERROR("Failed to initialize database after first-time setup");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
DEBUG_LOG("Database initialized for first-time startup");
|
|
|
|
// DEBUG_GUARD_START
|
|
if (g_debug_level >= DEBUG_LEVEL_DEBUG) {
|
|
sqlite3_stmt* stmt;
|
|
if (sqlite3_prepare_v2(g_db, "SELECT COUNT(*) FROM config", -1, &stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
int row_count = sqlite3_column_int(stmt, 0);
|
|
DEBUG_LOG("Config table row count after init_database() (first-time): %d", row_count);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
}
|
|
}
|
|
// DEBUG_GUARD_END
|
|
|
|
// Now that database is available, populate the complete config table atomically
|
|
// BUG FIX: Use the pubkeys returned from first_time_startup_sequence instead of trying to read from empty database
|
|
DEBUG_LOG("Using pubkeys from first-time startup sequence for config population");
|
|
DEBUG_LOG("admin_pubkey from startup: %s", admin_pubkey);
|
|
DEBUG_LOG("relay_pubkey from startup: %s", relay_pubkey);
|
|
|
|
if (populate_all_config_values_atomic(admin_pubkey, relay_pubkey) != 0) {
|
|
DEBUG_ERROR("Failed to populate complete config table");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
// Apply CLI overrides atomically (after complete config table exists)
|
|
if (apply_cli_overrides_atomic(&cli_options) != 0) {
|
|
DEBUG_ERROR("Failed to apply CLI overrides");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
// Now that database is available, store the relay private key securely
|
|
if (relay_privkey[0] != '\0') {
|
|
if (store_relay_private_key(relay_privkey) != 0) {
|
|
DEBUG_ERROR("Failed to store relay private key securely after database initialization");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
} else {
|
|
DEBUG_ERROR("Relay private key not available from first-time startup");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
// COMMENTED OUT: Old incremental config building code replaced by unified startup sequence
|
|
// The new first_time_startup_sequence() function handles all config creation atomically
|
|
/*
|
|
// Handle configuration setup after database is initialized
|
|
// Always populate defaults directly in config table (abandoning legacy event signing)
|
|
|
|
// Populate default config values in table
|
|
if (populate_default_config_values() != 0) {
|
|
DEBUG_ERROR("Failed to populate default config values");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
// DEBUG_GUARD_START
|
|
if (g_debug_level >= DEBUG_LEVEL_DEBUG) {
|
|
sqlite3_stmt* stmt;
|
|
if (sqlite3_prepare_v2(g_db, "SELECT COUNT(*) FROM config", -1, &stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
int row_count = sqlite3_column_int(stmt, 0);
|
|
DEBUG_LOG("Config table row count after populate_default_config_values(): %d", row_count);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
}
|
|
}
|
|
// DEBUG_GUARD_END
|
|
|
|
// Apply CLI overrides now that database is available
|
|
if (cli_options.port_override > 0) {
|
|
char port_str[16];
|
|
snprintf(port_str, sizeof(port_str), "%d", cli_options.port_override);
|
|
if (update_config_in_table("relay_port", port_str) != 0) {
|
|
DEBUG_ERROR("Failed to update relay port override in config table");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
printf(" Port: %d (overriding default)\n", cli_options.port_override);
|
|
}
|
|
|
|
// Add pubkeys to config table (single authoritative call)
|
|
if (add_pubkeys_to_config_table() != 0) {
|
|
DEBUG_ERROR("Failed to add pubkeys to config table");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
// DEBUG_GUARD_START
|
|
if (g_debug_level >= DEBUG_LEVEL_DEBUG) {
|
|
sqlite3_stmt* stmt;
|
|
if (sqlite3_prepare_v2(g_db, "SELECT COUNT(*) FROM config", -1, &stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
int row_count = sqlite3_column_int(stmt, 0);
|
|
DEBUG_LOG("Config table row count after add_pubkeys_to_config_table() (first-time): %d", row_count);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
}
|
|
}
|
|
// DEBUG_GUARD_END
|
|
*/
|
|
} else {
|
|
// Find existing database file
|
|
char** existing_files = find_existing_db_files();
|
|
if (!existing_files || !existing_files[0]) {
|
|
DEBUG_ERROR("No existing relay database found");
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
|
|
// Extract relay pubkey from filename
|
|
char* relay_pubkey = extract_pubkey_from_filename(existing_files[0]);
|
|
if (!relay_pubkey) {
|
|
DEBUG_ERROR("Failed to extract relay pubkey from database filename");
|
|
// Free the files array
|
|
for (int i = 0; existing_files[i]; i++) {
|
|
free(existing_files[i]);
|
|
}
|
|
free(existing_files);
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
|
|
// Initialize event-based configuration system
|
|
if (init_configuration_system(NULL, NULL) != 0) {
|
|
DEBUG_ERROR("Failed to initialize event-based configuration system");
|
|
free(relay_pubkey);
|
|
for (int i = 0; existing_files[i]; i++) {
|
|
free(existing_files[i]);
|
|
}
|
|
free(existing_files);
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
|
|
// Setup existing relay (sets database path and loads config)
|
|
if (startup_existing_relay(relay_pubkey, &cli_options) != 0) {
|
|
DEBUG_ERROR("Failed to setup existing relay");
|
|
cleanup_configuration_system();
|
|
free(relay_pubkey);
|
|
for (int i = 0; existing_files[i]; i++) {
|
|
free(existing_files[i]);
|
|
}
|
|
free(existing_files);
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
|
|
// Check config table row count before database initialization
|
|
{
|
|
sqlite3* temp_db = NULL;
|
|
if (sqlite3_open(g_database_path, &temp_db) == SQLITE_OK) {
|
|
sqlite3_stmt* stmt;
|
|
if (sqlite3_prepare_v2(temp_db, "SELECT COUNT(*) FROM config", -1, &stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
int row_count = sqlite3_column_int(stmt, 0);
|
|
printf(" Config table row count before database initialization: %d\n", row_count);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
}
|
|
sqlite3_close(temp_db);
|
|
}
|
|
}
|
|
|
|
// Initialize database with existing database path
|
|
DEBUG_TRACE("Initializing existing database");
|
|
if (init_database(g_database_path) != 0) {
|
|
DEBUG_ERROR("Failed to initialize existing database");
|
|
cleanup_configuration_system();
|
|
free(relay_pubkey);
|
|
for (int i = 0; existing_files[i]; i++) {
|
|
free(existing_files[i]);
|
|
}
|
|
free(existing_files);
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
DEBUG_LOG("Existing database initialized");
|
|
|
|
// DEBUG_GUARD_START
|
|
if (g_debug_level >= DEBUG_LEVEL_DEBUG) {
|
|
sqlite3_stmt* stmt;
|
|
if (sqlite3_prepare_v2(g_db, "SELECT COUNT(*) FROM config", -1, &stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
int row_count = sqlite3_column_int(stmt, 0);
|
|
DEBUG_LOG("Config table row count after init_database(): %d", row_count);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
}
|
|
}
|
|
// DEBUG_GUARD_END
|
|
|
|
// COMMENTED OUT: Old incremental config building code replaced by unified startup sequence
|
|
// The new startup_existing_relay() function handles all config loading atomically
|
|
/*
|
|
// Ensure default configuration values are populated (for any missing keys)
|
|
// This must be done AFTER database initialization
|
|
// COMMENTED OUT: Don't modify existing database config on restart
|
|
// if (populate_default_config_values() != 0) {
|
|
// DEBUG_WARN("Failed to populate default config values for existing relay - continuing");
|
|
// }
|
|
|
|
// Load configuration from database
|
|
cJSON* config_event = load_config_event_from_database(relay_pubkey);
|
|
if (config_event) {
|
|
if (apply_configuration_from_event(config_event) != 0) {
|
|
DEBUG_WARN("Failed to apply configuration from database");
|
|
}
|
|
cJSON_Delete(config_event);
|
|
} else {
|
|
// This is expected for relays using table-based configuration
|
|
// No longer a warning - just informational
|
|
}
|
|
|
|
// DEBUG_GUARD_START
|
|
if (g_debug_level >= DEBUG_LEVEL_DEBUG) {
|
|
sqlite3_stmt* stmt;
|
|
if (sqlite3_prepare_v2(g_db, "SELECT COUNT(*) FROM config", -1, &stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
int row_count = sqlite3_column_int(stmt, 0);
|
|
DEBUG_LOG("Config table row count before checking pubkeys: %d", row_count);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
}
|
|
}
|
|
// DEBUG_GUARD_END
|
|
|
|
// Ensure pubkeys are in config table for existing relay
|
|
// This handles migration from old event-based config to table-based config
|
|
const char* admin_pubkey_from_table = get_config_value_from_table("admin_pubkey");
|
|
const char* relay_pubkey_from_table = get_config_value_from_table("relay_pubkey");
|
|
|
|
int need_to_add_pubkeys = 0;
|
|
|
|
// Check if admin_pubkey is missing or invalid
|
|
if (!admin_pubkey_from_table || strlen(admin_pubkey_from_table) != 64) {
|
|
DEBUG_WARN("Admin pubkey missing or invalid in config table - will regenerate from cache");
|
|
need_to_add_pubkeys = 1;
|
|
}
|
|
if (admin_pubkey_from_table) free((char*)admin_pubkey_from_table);
|
|
|
|
// Check if relay_pubkey is missing or invalid
|
|
if (!relay_pubkey_from_table || strlen(relay_pubkey_from_table) != 64) {
|
|
DEBUG_WARN("Relay pubkey missing or invalid in config table - will regenerate from cache");
|
|
need_to_add_pubkeys = 1;
|
|
}
|
|
if (relay_pubkey_from_table) free((char*)relay_pubkey_from_table);
|
|
|
|
// If either pubkey is missing, call add_pubkeys_to_config_table to populate both
|
|
if (need_to_add_pubkeys) {
|
|
if (add_pubkeys_to_config_table() != 0) {
|
|
DEBUG_ERROR("Failed to add pubkeys to config table for existing relay");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
// DEBUG_GUARD_START
|
|
if (g_debug_level >= DEBUG_LEVEL_DEBUG) {
|
|
sqlite3_stmt* stmt;
|
|
if (sqlite3_prepare_v2(g_db, "SELECT COUNT(*) FROM config", -1, &stmt, NULL) == SQLITE_OK) {
|
|
if (sqlite3_step(stmt) == SQLITE_ROW) {
|
|
int row_count = sqlite3_column_int(stmt, 0);
|
|
DEBUG_LOG("Config table row count after add_pubkeys_to_config_table(): %d", row_count);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
}
|
|
}
|
|
// DEBUG_GUARD_END
|
|
}
|
|
|
|
// Apply CLI overrides for existing relay (port override should work even for existing relays)
|
|
if (cli_options.port_override > 0) {
|
|
char port_str[16];
|
|
snprintf(port_str, sizeof(port_str), "%d", cli_options.port_override);
|
|
if (update_config_in_table("relay_port", port_str) != 0) {
|
|
DEBUG_ERROR("Failed to update relay port override in config table for existing relay");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
printf(" Port: %d (overriding configured port)\n", cli_options.port_override);
|
|
}
|
|
*/
|
|
|
|
// Free memory
|
|
free(relay_pubkey);
|
|
for (int i = 0; existing_files[i]; i++) {
|
|
free(existing_files[i]);
|
|
}
|
|
free(existing_files);
|
|
}
|
|
|
|
// Verify database is now available
|
|
if (!g_db) {
|
|
DEBUG_ERROR("Database not available after initialization");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
return 1;
|
|
}
|
|
|
|
// Configuration system is now fully initialized with event-based approach
|
|
// All configuration is loaded from database events
|
|
|
|
// Initialize unified request validator system
|
|
if (ginxsom_request_validator_init(g_database_path, "c-relay") != 0) {
|
|
DEBUG_ERROR("Failed to initialize unified request validator");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
// Initialize NIP-11 relay information
|
|
init_relay_info();
|
|
|
|
// Initialize NIP-13 PoW configuration
|
|
init_pow_config();
|
|
|
|
// Initialize NIP-40 expiration configuration
|
|
init_expiration_config();
|
|
// Update subscription manager configuration
|
|
update_subscription_manager_config();
|
|
|
|
// Initialize subscription manager mutexes
|
|
if (pthread_mutex_init(&g_subscription_manager.subscriptions_lock, NULL) != 0) {
|
|
DEBUG_ERROR("Failed to initialize subscription manager subscriptions lock");
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
if (pthread_mutex_init(&g_subscription_manager.ip_tracking_lock, NULL) != 0) {
|
|
DEBUG_ERROR("Failed to initialize subscription manager IP tracking lock");
|
|
pthread_mutex_destroy(&g_subscription_manager.subscriptions_lock);
|
|
cleanup_configuration_system();
|
|
nostr_cleanup();
|
|
close_database();
|
|
return 1;
|
|
}
|
|
|
|
|
|
|
|
// Start WebSocket Nostr relay server (port from configuration)
|
|
int result = start_websocket_relay(-1, cli_options.strict_port); // Let config system determine port, pass strict_port flag
|
|
|
|
// Cleanup
|
|
cleanup_relay_info();
|
|
ginxsom_request_validator_cleanup();
|
|
cleanup_configuration_system();
|
|
|
|
// Cleanup subscription manager mutexes
|
|
pthread_mutex_destroy(&g_subscription_manager.subscriptions_lock);
|
|
pthread_mutex_destroy(&g_subscription_manager.ip_tracking_lock);
|
|
|
|
nostr_cleanup();
|
|
close_database();
|
|
|
|
if (result == 0) {
|
|
} else {
|
|
DEBUG_ERROR("Server shutdown with errors");
|
|
}
|
|
|
|
return result;
|
|
} |