//------------------------------------------------------------------------------ /* This file is part of rippled: https://github.com/ripple/rippled Copyright (c) 2012, 2013 Ripple Labs Inc. Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ //============================================================================== #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include namespace ripple { // VFALCO TODO Move the function definitions into the class declaration class ApplicationImp : public Application, public BasicApp { private: class io_latency_sampler { private: beast::insight::Event m_event; beast::Journal m_journal; beast::io_latency_probe m_probe; std::atomic lastSample_; public: io_latency_sampler( beast::insight::Event ev, beast::Journal journal, std::chrono::milliseconds interval, boost::asio::io_service& ios) : m_event(ev) , m_journal(journal) , m_probe(interval, ios) , lastSample_{} { } void start() { m_probe.sample(std::ref(*this)); } template void operator()(Duration const& elapsed) { using namespace std::chrono; auto const lastSample = ceil(elapsed); lastSample_ = lastSample; if (lastSample >= 10ms) m_event.notify(lastSample); if (lastSample >= 500ms) { JLOG(m_journal.warn()) << "io_service latency = " << lastSample.count(); } } std::chrono::milliseconds get() const { return lastSample_.load(); } void cancel() { m_probe.cancel(); } void cancel_async() { m_probe.cancel_async(); } }; public: std::unique_ptr config_; std::unique_ptr logs_; std::unique_ptr timeKeeper_; std::unique_ptr datagram_monitor_; std::uint64_t const instanceCookie_; beast::Journal m_journal; std::unique_ptr perfLog_; Application::MutexType m_masterMutex; // Required by the SHAMapStore TransactionMaster m_txMaster; std::unique_ptr m_collectorManager; std::unique_ptr m_jobQueue; NodeStoreScheduler m_nodeStoreScheduler; std::unique_ptr m_shaMapStore; PendingSaves pendingSaves_; std::optional openLedger_; NodeCache m_tempNodeCache; CachedSLEs cachedSLEs_; std::pair nodeIdentity_; ValidatorKeys const validatorKeys_; std::unique_ptr m_resourceManager; std::unique_ptr m_nodeStore; NodeFamily nodeFamily_; std::unique_ptr shardStore_; std::unique_ptr shardFamily_; std::unique_ptr shardArchiveHandler_; // VFALCO TODO Make OrderBookDB abstract OrderBookDB m_orderBookDB; std::unique_ptr m_pathRequests; std::unique_ptr m_ledgerMaster; std::unique_ptr ledgerCleaner_; std::unique_ptr m_inboundLedgers; std::unique_ptr m_inboundTransactions; std::unique_ptr m_ledgerReplayer; TaggedCache m_acceptedLedgerCache; std::unique_ptr m_networkOPs; std::unique_ptr cluster_; std::unique_ptr peerReservations_; std::unique_ptr validatorManifests_; std::unique_ptr publisherManifests_; std::unique_ptr validators_; std::unique_ptr validatorSites_; std::unique_ptr serverHandler_; std::unique_ptr m_amendmentTable; std::unique_ptr mFeeTrack; std::unique_ptr hashRouter_; RCLValidations mValidations; std::unique_ptr m_loadManager; std::unique_ptr txQ_; ClosureCounter waitHandlerCounter_; boost::asio::steady_timer sweepTimer_; boost::asio::steady_timer entropyTimer_; std::unique_ptr mRelationalDatabase; std::unique_ptr mWalletDB; std::unique_ptr overlay_; boost::asio::signal_set m_signals; // Once we get C++20, we could use `std::atomic_flag` for `isTimeToStop` // and eliminate the need for the condition variable and the mutex. std::condition_variable stoppingCondition_; mutable std::mutex stoppingMutex_; std::atomic isTimeToStop = false; std::atomic checkSigs_; std::unique_ptr m_resolver; io_latency_sampler m_io_latency_sampler; std::unique_ptr grpcServer_; std::unique_ptr reportingETL_; //-------------------------------------------------------------------------- static std::size_t numberOfThreads(Config const& config) { #if RIPPLE_SINGLE_IO_SERVICE_THREAD return 1; #else if (config.IO_WORKERS > 0) return config.IO_WORKERS; auto const cores = std::thread::hardware_concurrency(); // Use a single thread when running on under-provisioned systems // or if we are configured to use minimal resources. if ((cores == 1) || ((config.NODE_SIZE == 0) && (cores == 2))) return 1; // Otherwise, prefer two threads. return 2; #endif } //-------------------------------------------------------------------------- ApplicationImp( std::unique_ptr config, std::unique_ptr logs, std::unique_ptr timeKeeper) : BasicApp(numberOfThreads(*config)) , config_(std::move(config)) , logs_(std::move(logs)) , timeKeeper_(std::move(timeKeeper)) , instanceCookie_( 1 + rand_int( crypto_prng(), std::numeric_limits::max() - 1)) , m_journal(logs_->journal("Application")) // PerfLog must be started before any other threads are launched. , perfLog_(perf::make_PerfLog( perf::setup_PerfLog( config_->section("perf"), config_->CONFIG_DIR), *this, logs_->journal("PerfLog"), [this] { signalStop(); })) , m_txMaster(*this) , m_collectorManager(make_CollectorManager( config_->section(SECTION_INSIGHT), logs_->journal("Collector"))) , m_jobQueue(std::make_unique( [](std::unique_ptr const& config) { if (config->standalone() && !config->reporting() && !config->FORCE_MULTI_THREAD) return 1; if (config->WORKERS) return config->WORKERS; auto count = static_cast(std::thread::hardware_concurrency()); // Be more aggressive about the number of threads to use // for the job queue if the server is configured as "large" // or "huge" if there are enough cores. if (config->NODE_SIZE >= 4 && count >= 16) count = 6 + std::min(count, 8); else if (config->NODE_SIZE >= 3 && count >= 8) count = 4 + std::min(count, 6); else count = 2 + std::min(count, 4); return count; }(config_), m_collectorManager->group("jobq"), logs_->journal("JobQueue"), *logs_, *perfLog_)) , m_nodeStoreScheduler(*m_jobQueue) , m_shaMapStore(make_SHAMapStore( *this, m_nodeStoreScheduler, logs_->journal("SHAMapStore"))) , m_tempNodeCache( "NodeCache", 16384, std::chrono::seconds{90}, stopwatch(), logs_->journal("TaggedCache")) , cachedSLEs_( "Cached SLEs", 0, std::chrono::minutes(1), stopwatch(), logs_->journal("CachedSLEs")) , validatorKeys_(*config_, m_journal) , m_resourceManager(Resource::make_Manager( m_collectorManager->collector(), logs_->journal("Resource"))) , m_nodeStore(m_shaMapStore->makeNodeStore( config_->PREFETCH_WORKERS > 0 ? config_->PREFETCH_WORKERS : 4)) , nodeFamily_(*this, *m_collectorManager) // The shard store is optional and make_ShardStore can return null. , shardStore_(make_ShardStore( *this, m_nodeStoreScheduler, 4, logs_->journal("ShardStore"))) , m_orderBookDB(*this) , m_pathRequests(std::make_unique( *this, logs_->journal("PathRequest"), m_collectorManager->collector())) , m_ledgerMaster(std::make_unique( *this, stopwatch(), m_collectorManager->collector(), logs_->journal("LedgerMaster"))) , ledgerCleaner_( make_LedgerCleaner(*this, logs_->journal("LedgerCleaner"))) // VFALCO NOTE must come before NetworkOPs to prevent a crash due // to dependencies in the destructor. // , m_inboundLedgers(make_InboundLedgers( *this, stopwatch(), m_collectorManager->collector())) , m_inboundTransactions(make_InboundTransactions( *this, m_collectorManager->collector(), [this](std::shared_ptr const& set, bool fromAcquire) { gotTXSet(set, fromAcquire); })) , m_ledgerReplayer(std::make_unique( *this, *m_inboundLedgers, make_PeerSetBuilder(*this))) , m_acceptedLedgerCache( "AcceptedLedger", 4, std::chrono::minutes{1}, stopwatch(), logs_->journal("TaggedCache")) , m_networkOPs(make_NetworkOPs( *this, stopwatch(), config_->standalone(), config_->NETWORK_QUORUM, config_->START_VALID, *m_jobQueue, *m_ledgerMaster, validatorKeys_, get_io_service(), logs_->journal("NetworkOPs"), m_collectorManager->collector())) , cluster_(std::make_unique(logs_->journal("Overlay"))) , peerReservations_(std::make_unique( logs_->journal("PeerReservationTable"))) , validatorManifests_( std::make_unique(logs_->journal("ManifestCache"))) , publisherManifests_( std::make_unique(logs_->journal("ManifestCache"))) , validators_(std::make_unique( *validatorManifests_, *publisherManifests_, *timeKeeper_, config_->legacy("database_path"), logs_->journal("ValidatorList"), config_->VALIDATION_QUORUM)) , validatorSites_(std::make_unique(*this)) , serverHandler_(make_ServerHandler( *this, get_io_service(), *m_jobQueue, *m_networkOPs, *m_resourceManager, *m_collectorManager)) , mFeeTrack( std::make_unique(logs_->journal("LoadManager"))) , hashRouter_(std::make_unique( stopwatch(), HashRouter::getDefaultHoldTime())) , mValidations( ValidationParms(), stopwatch(), *this, logs_->journal("Validations")) , m_loadManager(make_LoadManager(*this, logs_->journal("LoadManager"))) , txQ_( std::make_unique(setup_TxQ(*config_), logs_->journal("TxQ"))) , sweepTimer_(get_io_service()) , entropyTimer_(get_io_service()) , m_signals(get_io_service()) , checkSigs_(true) , m_resolver( ResolverAsio::New(get_io_service(), logs_->journal("Resolver"))) , m_io_latency_sampler( m_collectorManager->collector()->make_event("ios_latency"), logs_->journal("Application"), std::chrono::milliseconds(100), get_io_service()) , grpcServer_(std::make_unique(*this)) , reportingETL_( config_->reporting() ? std::make_unique(*this) : nullptr) { initAccountIdCache(config_->getValueFor(SizedItem::accountIdCacheSize)); add(m_resourceManager.get()); // // VFALCO - READ THIS! // // Do not start threads, open sockets, or do any sort of "real work" // inside the constructor. Put it in start instead. Or if you must, // put it in setup (but everything in setup should be moved to start // anyway. // // The reason is that the unit tests require an Application object to // be created. But we don't actually start all the threads, sockets, // and services when running the unit tests. Therefore anything which // needs to be stopped will not get stopped correctly if it is // started in this constructor. // add(ledgerCleaner_.get()); } //-------------------------------------------------------------------------- bool setup(boost::program_options::variables_map const& cmdline) override; void start(bool withTimers) override; void run() override; void signalStop(std::string msg = "") override; bool checkSigs() const override; void checkSigs(bool) override; bool isStopping() const override; int fdRequired() const override; //-------------------------------------------------------------------------- std::uint64_t instanceID() const override { return instanceCookie_; } Logs& logs() override { return *logs_; } Config& config() override { return *config_; } CollectorManager& getCollectorManager() override { return *m_collectorManager; } Family& getNodeFamily() override { return nodeFamily_; } // The shard store is an optional feature. If the sever is configured for // shards, this function will return a valid pointer, otherwise a nullptr. Family* getShardFamily() override { return shardFamily_.get(); } TimeKeeper& timeKeeper() override { return *timeKeeper_; } JobQueue& getJobQueue() override { return *m_jobQueue; } std::pair const& nodeIdentity() override { return nodeIdentity_; } PublicKey const& getValidationPublicKey() const override { return validatorKeys_.publicKey; } NetworkOPs& getOPs() override { return *m_networkOPs; } boost::asio::io_service& getIOService() override { return get_io_service(); } std::chrono::milliseconds getIOLatency() override { return m_io_latency_sampler.get(); } LedgerMaster& getLedgerMaster() override { return *m_ledgerMaster; } LedgerCleaner& getLedgerCleaner() override { return *ledgerCleaner_; } LedgerReplayer& getLedgerReplayer() override { return *m_ledgerReplayer; } InboundLedgers& getInboundLedgers() override { return *m_inboundLedgers; } InboundTransactions& getInboundTransactions() override { return *m_inboundTransactions; } TaggedCache& getAcceptedLedgerCache() override { return m_acceptedLedgerCache; } void gotTXSet(std::shared_ptr const& set, bool fromAcquire) { if (set) m_networkOPs->mapComplete(set, fromAcquire); } TransactionMaster& getMasterTransaction() override { return m_txMaster; } perf::PerfLog& getPerfLog() override { return *perfLog_; } NodeCache& getTempNodeCache() override { return m_tempNodeCache; } NodeStore::Database& getNodeStore() override { return *m_nodeStore; } // The shard store is an optional feature. If the sever is configured for // shards, this function will return a valid pointer, otherwise a nullptr. NodeStore::DatabaseShard* getShardStore() override { return shardStore_.get(); } RPC::ShardArchiveHandler* getShardArchiveHandler(bool tryRecovery) override { static std::mutex handlerMutex; std::lock_guard lock(handlerMutex); // After constructing the handler, try to // initialize it. Log on error; set the // member variable on success. auto initAndSet = [this](std::unique_ptr&& handler) { if (!handler) return false; if (!handler->init()) { JLOG(m_journal.error()) << "Failed to initialize ShardArchiveHandler."; return false; } shardArchiveHandler_ = std::move(handler); return true; }; // Need to resume based on state from a previous // run. if (tryRecovery) { if (shardArchiveHandler_ != nullptr) { JLOG(m_journal.error()) << "ShardArchiveHandler already created at startup."; return nullptr; } auto handler = RPC::ShardArchiveHandler::tryMakeRecoveryHandler(*this); if (!initAndSet(std::move(handler))) return nullptr; } // Construct the ShardArchiveHandler if (shardArchiveHandler_ == nullptr) { auto handler = RPC::ShardArchiveHandler::makeShardArchiveHandler(*this); if (!initAndSet(std::move(handler))) return nullptr; } return shardArchiveHandler_.get(); } Application::MutexType& getMasterMutex() override { return m_masterMutex; } LoadManager& getLoadManager() override { return *m_loadManager; } Resource::Manager& getResourceManager() override { return *m_resourceManager; } OrderBookDB& getOrderBookDB() override { return m_orderBookDB; } PathRequests& getPathRequests() override { return *m_pathRequests; } CachedSLEs& cachedSLEs() override { return cachedSLEs_; } AmendmentTable& getAmendmentTable() override { return *m_amendmentTable; } LoadFeeTrack& getFeeTrack() override { return *mFeeTrack; } HashRouter& getHashRouter() override { return *hashRouter_; } RCLValidations& getValidations() override { return mValidations; } ValidatorList& validators() override { return *validators_; } ValidatorSite& validatorSites() override { return *validatorSites_; } ManifestCache& validatorManifests() override { return *validatorManifests_; } ManifestCache& publisherManifests() override { return *publisherManifests_; } Cluster& cluster() override { return *cluster_; } PeerReservationTable& peerReservations() override { return *peerReservations_; } SHAMapStore& getSHAMapStore() override { return *m_shaMapStore; } PendingSaves& pendingSaves() override { return pendingSaves_; } OpenLedger& openLedger() override { if (config_->reporting()) Throw(); return *openLedger_; } OpenLedger const& openLedger() const override { if (config_->reporting()) Throw(); return *openLedger_; } Overlay& overlay() override { assert(overlay_); return *overlay_; } TxQ& getTxQ() override { assert(txQ_.get() != nullptr); return *txQ_; } RelationalDatabase& getRelationalDatabase() override { assert(mRelationalDatabase.get() != nullptr); return *mRelationalDatabase; } DatabaseCon& getWalletDB() override { assert(mWalletDB.get() != nullptr); return *mWalletDB; } ReportingETL& getReportingETL() override { assert(reportingETL_.get() != nullptr); return *reportingETL_; } bool serverOkay(std::string& reason) override; beast::Journal journal(std::string const& name) override; //-------------------------------------------------------------------------- bool initRelationalDatabase() { assert(mWalletDB.get() == nullptr); try { mRelationalDatabase = RelationalDatabase::init(*this, *config_, *m_jobQueue); // wallet database auto setup = setup_DatabaseCon(*config_, m_journal); setup.useGlobalPragma = false; mWalletDB = makeWalletDB(setup); } catch (std::exception const& e) { JLOG(m_journal.fatal()) << "Failed to initialize SQL databases: " << e.what(); return false; } return true; } bool initNodeStore() { if (config_->doImport) { auto j = logs_->journal("NodeObject"); NodeStore::DummyScheduler dummyScheduler; std::unique_ptr source = NodeStore::Manager::instance().make_Database( megabytes(config_->getValueFor( SizedItem::burstSize, std::nullopt)), dummyScheduler, 0, config_->section(ConfigSection::importNodeDatabase()), j); JLOG(j.warn()) << "Starting node import from '" << source->getName() << "' to '" << m_nodeStore->getName() << "'."; using namespace std::chrono; auto const start = steady_clock::now(); m_nodeStore->importDatabase(*source); auto const elapsed = duration_cast(steady_clock::now() - start); JLOG(j.warn()) << "Node import from '" << source->getName() << "' took " << elapsed.count() << " seconds."; } return true; } //-------------------------------------------------------------------------- // // PropertyStream // void onWrite(beast::PropertyStream::Map& stream) override { } //-------------------------------------------------------------------------- void setSweepTimer() { // Only start the timer if waitHandlerCounter_ is not yet joined. if (auto optionalCountedHandler = waitHandlerCounter_.wrap( [this](boost::system::error_code const& e) { if (e.value() == boost::system::errc::success) { m_jobQueue->addJob( jtSWEEP, "sweep", [this]() { doSweep(); }); } // Recover as best we can if an unexpected error occurs. if (e.value() != boost::system::errc::success && e.value() != boost::asio::error::operation_aborted) { // Try again later and hope for the best. JLOG(m_journal.error()) << "Sweep timer got error '" << e.message() << "'. Restarting timer."; setSweepTimer(); } })) { using namespace std::chrono; sweepTimer_.expires_from_now( seconds{config_->SWEEP_INTERVAL.value_or( config_->getValueFor(SizedItem::sweepInterval))}); sweepTimer_.async_wait(std::move(*optionalCountedHandler)); } } void setEntropyTimer() { // Only start the timer if waitHandlerCounter_ is not yet joined. if (auto optionalCountedHandler = waitHandlerCounter_.wrap( [this](boost::system::error_code const& e) { if (e.value() == boost::system::errc::success) { crypto_prng().mix_entropy(); setEntropyTimer(); } // Recover as best we can if an unexpected error occurs. if (e.value() != boost::system::errc::success && e.value() != boost::asio::error::operation_aborted) { // Try again later and hope for the best. JLOG(m_journal.error()) << "Entropy timer got error '" << e.message() << "'. Restarting timer."; setEntropyTimer(); } })) { using namespace std::chrono_literals; entropyTimer_.expires_from_now(5min); entropyTimer_.async_wait(std::move(*optionalCountedHandler)); } } void doSweep() { if (!config_->standalone() && !getRelationalDatabase().transactionDbHasSpace(*config_)) { signalStop(); } // VFALCO NOTE Does the order of calls matter? // VFALCO TODO fix the dependency inversion using an observer, // have listeners register for "onSweep ()" notification. nodeFamily_.sweep(); if (shardFamily_) shardFamily_->sweep(); getMasterTransaction().sweep(); getNodeStore().sweep(); if (shardStore_) shardStore_->sweep(); getLedgerMaster().sweep(); getTempNodeCache().sweep(); getValidations().expire(m_journal); getInboundLedgers().sweep(); getLedgerReplayer().sweep(); m_acceptedLedgerCache.sweep(); cachedSLEs_.sweep(); #ifdef RIPPLED_REPORTING if (auto pg = dynamic_cast(&*mRelationalDatabase)) pg->sweep(); #endif // Set timer to do another sweep later. setSweepTimer(); } LedgerIndex getMaxDisallowedLedger() override { return maxDisallowedLedger_; } private: // For a newly-started validator, this is the greatest persisted ledger // and new validations must be greater than this. std::atomic maxDisallowedLedger_{0}; bool nodeToShards(); void startGenesisLedger(); std::shared_ptr getLastFullLedger(); std::shared_ptr loadLedgerFromFile(std::string const& ledgerID); std::shared_ptr loadLedgerFromJson(std::string const& jsonValue); bool loadOldLedger( std::string const& ledgerID, bool replay, bool isFilename, bool isJson); void setMaxDisallowedLedger(); }; //------------------------------------------------------------------------------ // TODO Break this up into smaller, more digestible initialization segments. bool ApplicationImp::setup(boost::program_options::variables_map const& cmdline) { // We want to intercept CTRL-C and the standard termination signal SIGTERM // and terminate the process. This handler will NEVER be invoked twice. // // Note that async_wait is "one-shot": for each call, the handler will be // invoked exactly once, either when one of the registered signals in the // signal set occurs or the signal set is cancelled. Subsequent signals are // effectively ignored (technically, they are queued up, waiting for a call // to async_wait). m_signals.add(SIGINT); m_signals.add(SIGTERM); m_signals.async_wait( [this](boost::system::error_code const& ec, int signum) { // Indicates the signal handler has been aborted; do nothing if (ec == boost::asio::error::operation_aborted) return; JLOG(m_journal.info()) << "Received signal " << signum; if (signum == SIGTERM || signum == SIGINT) signalStop(); }); auto debug_log = config_->getDebugLogFile(); if (!debug_log.empty()) { // Let debug messages go to the file but only WARNING or higher to // regular output (unless verbose) if (!logs_->open(debug_log)) std::cerr << "Can't open log file " << debug_log << '\n'; using namespace beast::severities; if (logs_->threshold() > kDebug) logs_->threshold(kDebug); } JLOG(m_journal.info()) << "Process starting: " << BuildInfo::getFullVersionString() << ", Instance Cookie: " << instanceCookie_; if (numberOfThreads(*config_) < 2) { JLOG(m_journal.warn()) << "Limited to a single I/O service thread by " "system configuration."; } // Optionally turn off logging to console. logs_->silent(config_->silent()); if (!config_->standalone()) timeKeeper_->run(config_->SNTP_SERVERS); if (!initRelationalDatabase() || !initNodeStore()) return false; if (shardStore_) { shardFamily_ = std::make_unique(*this, *m_collectorManager); if (!shardStore_->init()) return false; } if (!peerReservations_->load(getWalletDB())) { JLOG(m_journal.fatal()) << "Cannot find peer reservations!"; return false; } if (validatorKeys_.publicKey.size()) setMaxDisallowedLedger(); // Configure the amendments the server supports { auto const supported = []() { auto const& amendments = detail::supportedAmendments(); std::vector supported; supported.reserve(amendments.size()); for (auto const& [a, vote] : amendments) { auto const f = ripple::getRegisteredFeature(a); assert(f); if (f) supported.emplace_back(a, *f, vote); } return supported; }(); Section const& downVoted = config_->section(SECTION_VETO_AMENDMENTS); Section const& upVoted = config_->section(SECTION_AMENDMENTS); m_amendmentTable = make_AmendmentTable( *this, config().AMENDMENT_MAJORITY_TIME, supported, upVoted, downVoted, logs_->journal("Amendments")); } Pathfinder::initPathTable(); auto const startUp = config_->START_UP; JLOG(m_journal.debug()) << "startUp: " << startUp; if (!config_->reporting()) { if (startUp == Config::FRESH) { JLOG(m_journal.info()) << "Starting new Ledger"; startGenesisLedger(); } else if ( startUp == Config::LOAD || startUp == Config::LOAD_FILE || startUp == Config::REPLAY || startUp == Config::LOAD_JSON) { JLOG(m_journal.info()) << "Loading specified Ledger"; if (!loadOldLedger( config_->START_LEDGER, startUp == Config::REPLAY, startUp == Config::LOAD_FILE, startUp == Config::LOAD_JSON)) { JLOG(m_journal.error()) << "The specified ledger could not be loaded."; if (config_->FAST_LOAD) { // Fall back to syncing from the network, such as // when there's no existing data. startGenesisLedger(); } else { return false; } } } else if (startUp == Config::NETWORK) { // This should probably become the default once we have a stable // network. if (!config_->standalone()) m_networkOPs->setNeedNetworkLedger(); startGenesisLedger(); } else { startGenesisLedger(); } } if (!config().reporting()) m_orderBookDB.setup(getLedgerMaster().getCurrentLedger()); nodeIdentity_ = getNodeIdentity(*this, cmdline); if (!cluster_->load(config().section(SECTION_CLUSTER_NODES))) { JLOG(m_journal.fatal()) << "Invalid entry in cluster configuration."; return false; } if (!config().reporting()) { { if (validatorKeys_.configInvalid()) return false; if (!validatorManifests_->load( getWalletDB(), "ValidatorManifests", validatorKeys_.manifest, config() .section(SECTION_VALIDATOR_KEY_REVOCATION) .values())) { JLOG(m_journal.fatal()) << "Invalid configured validator manifest."; return false; } publisherManifests_->load(getWalletDB(), "PublisherManifests"); // Setup trusted validators if (!validators_->load( validatorKeys_.publicKey, config().section(SECTION_VALIDATORS).values(), config().section(SECTION_VALIDATOR_LIST_KEYS).values())) { JLOG(m_journal.fatal()) << "Invalid entry in validator configuration."; return false; } } if (!validatorSites_->load( config().section(SECTION_VALIDATOR_LIST_SITES).values())) { JLOG(m_journal.fatal()) << "Invalid entry in [" << SECTION_VALIDATOR_LIST_SITES << "]"; return false; } } if (config_->IMPORT_VL_KEYS.empty()) { JLOG(m_journal.warn()) << "[import_vl_keys] section not specified validators file. " << "Will attempt to use keys from ledger."; } //---------------------------------------------------------------------- // // Server // //---------------------------------------------------------------------- // VFALCO NOTE Unfortunately, in stand-alone mode some code still // foolishly calls overlay(). When this is fixed we can // move the instantiation inside a conditional: // // if (!config_.standalone()) if (!config_->reporting()) { overlay_ = make_Overlay( *this, setup_Overlay(*config_), *serverHandler_, *m_resourceManager, *m_resolver, get_io_service(), *config_, m_collectorManager->collector()); add(*overlay_); // add to PropertyStream } if (!config_->standalone()) { // NodeStore import into the ShardStore requires the SQLite database if (config_->nodeToShard && !nodeToShards()) return false; } // start first consensus round if (!config_->reporting() && !m_networkOPs->beginConsensus( m_ledgerMaster->getClosedLedger()->info().hash)) { JLOG(m_journal.fatal()) << "Unable to start consensus"; return false; } { try { auto setup = setup_ServerHandler( *config_, beast::logstream{m_journal.error()}); setup.makeContexts(); serverHandler_->setup(setup, m_journal); } catch (std::exception const& e) { if (auto stream = m_journal.fatal()) { stream << "Unable to setup server handler"; if (std::strlen(e.what()) > 0) stream << ": " << e.what(); } return false; } } // Begin connecting to network. if (!config_->standalone()) { // Should this message be here, conceptually? In theory this sort // of message, if displayed, should be displayed from PeerFinder. if (config_->PEER_PRIVATE && config_->IPS_FIXED.empty()) { JLOG(m_journal.warn()) << "No outbound peer connections will be made"; } // VFALCO NOTE the state timer resets the deadlock detector. // m_networkOPs->setStateTimer(); } else { JLOG(m_journal.warn()) << "Running in standalone mode"; m_networkOPs->setStandAlone(); } if (config_->canSign()) { JLOG(m_journal.warn()) << "*** The server is configured to allow the " "'sign' and 'sign_for'"; JLOG(m_journal.warn()) << "*** commands. These commands have security " "implications and have"; JLOG(m_journal.warn()) << "*** been deprecated. They will be removed " "in a future release of"; JLOG(m_journal.warn()) << "*** rippled."; JLOG(m_journal.warn()) << "*** If you do not use them to sign " "transactions please edit your"; JLOG(m_journal.warn()) << "*** configuration file and remove the [enable_signing] stanza."; JLOG(m_journal.warn()) << "*** If you do use them to sign transactions " "please migrate to a"; JLOG(m_journal.warn()) << "*** standalone signing solution as soon as possible."; } // // Execute start up rpc commands. // for (auto cmd : config_->section(SECTION_RPC_STARTUP).lines()) { Json::Reader jrReader; Json::Value jvCommand; if (!jrReader.parse(cmd, jvCommand)) { JLOG(m_journal.fatal()) << "Couldn't parse entry in [" << SECTION_RPC_STARTUP << "]: '" << cmd; } if (!config_->quiet()) { JLOG(m_journal.fatal()) << "Startup RPC: " << jvCommand << std::endl; } Resource::Charge loadType = Resource::feeReferenceRPC; Resource::Consumer c; RPC::JsonContext context{ {journal("RPCHandler"), *this, loadType, getOPs(), getLedgerMaster(), c, Role::ADMIN, {}, {}, RPC::apiMaximumSupportedVersion}, jvCommand}; Json::Value jvResult; RPC::doCommand(context, jvResult); if (!config_->quiet()) { JLOG(m_journal.fatal()) << "Result: " << jvResult << std::endl; } } RPC::ShardArchiveHandler* shardArchiveHandler = nullptr; if (shardStore_) { try { // Create a ShardArchiveHandler if recovery // is needed (there's a state database left // over from a previous run). auto handler = getShardArchiveHandler(true); // Recovery is needed. if (handler) shardArchiveHandler = handler; } catch (std::exception const& e) { JLOG(m_journal.fatal()) << "Exception when starting ShardArchiveHandler from " "state database: " << e.what(); return false; } } if (shardArchiveHandler && !shardArchiveHandler->start()) { JLOG(m_journal.fatal()) << "Failed to start ShardArchiveHandler."; return false; } validatorSites_->start(); if (reportingETL_) reportingETL_->start(); // Datagram monitor if applicable if (!config_->standalone() && !config_->DATAGRAM_MONITOR.empty()) { datagram_monitor_ = std::make_unique(*this); if (datagram_monitor_) datagram_monitor_->start(); } return true; } void ApplicationImp::start(bool withTimers) { JLOG(m_journal.info()) << "Application starting. Version is " << BuildInfo::getVersionString(); if (withTimers) { setSweepTimer(); setEntropyTimer(); } m_io_latency_sampler.start(); m_resolver->start(); m_loadManager->start(); m_shaMapStore->start(); if (overlay_) overlay_->start(); grpcServer_->start(); ledgerCleaner_->start(); perfLog_->start(); } void ApplicationImp::run() { if (!config_->standalone()) { // VFALCO NOTE This seems unnecessary. If we properly refactor the load // manager then the deadlock detector can just always be // "armed" // getLoadManager().activateDeadlockDetector(); } { std::unique_lock lk{stoppingMutex_}; stoppingCondition_.wait(lk, [this] { return isTimeToStop.load(); }); } JLOG(m_journal.debug()) << "Application stopping"; m_io_latency_sampler.cancel_async(); // VFALCO Enormous hack, we have to force the probe to cancel // before we stop the io_service queue or else it never // unblocks in its destructor. The fix is to make all // io_objects gracefully handle exit so that we can // naturally return from io_service::run() instead of // forcing a call to io_service::stop() m_io_latency_sampler.cancel(); m_resolver->stop_async(); // NIKB This is a hack - we need to wait for the resolver to // stop. before we stop the io_server_queue or weird // things will happen. m_resolver->stop(); { boost::system::error_code ec; sweepTimer_.cancel(ec); if (ec) { JLOG(m_journal.error()) << "Application: sweepTimer cancel error: " << ec.message(); } ec.clear(); entropyTimer_.cancel(ec); if (ec) { JLOG(m_journal.error()) << "Application: entropyTimer cancel error: " << ec.message(); } } // Make sure that any waitHandlers pending in our timers are done // before we declare ourselves stopped. using namespace std::chrono_literals; waitHandlerCounter_.join("Application", 1s, m_journal); mValidations.flush(); validatorSites_->stop(); // TODO Store manifests in manifests.sqlite instead of wallet.db validatorManifests_->save( getWalletDB(), "ValidatorManifests", [this](PublicKey const& pubKey) { return validators().listed(pubKey); }); publisherManifests_->save( getWalletDB(), "PublisherManifests", [this](PublicKey const& pubKey) { return validators().trustedPublisher(pubKey); }); // The order of these stop calls is delicate. // Re-ordering them risks undefined behavior. m_loadManager->stop(); m_shaMapStore->stop(); m_jobQueue->stop(); if (shardArchiveHandler_) shardArchiveHandler_->stop(); if (overlay_) overlay_->stop(); if (shardStore_) shardStore_->stop(); grpcServer_->stop(); m_networkOPs->stop(); serverHandler_->stop(); m_ledgerReplayer->stop(); m_inboundTransactions->stop(); m_inboundLedgers->stop(); ledgerCleaner_->stop(); if (reportingETL_) reportingETL_->stop(); if (auto pg = dynamic_cast(&*mRelationalDatabase)) pg->stop(); m_nodeStore->stop(); perfLog_->stop(); JLOG(m_journal.info()) << "Done."; } void ApplicationImp::signalStop(std::string msg) { if (!isTimeToStop.exchange(true)) { if (msg.empty()) JLOG(m_journal.warn()) << "Server stopping"; else JLOG(m_journal.warn()) << "Server stopping: " << msg; stoppingCondition_.notify_all(); } } bool ApplicationImp::checkSigs() const { return checkSigs_; } void ApplicationImp::checkSigs(bool check) { checkSigs_ = check; } bool ApplicationImp::isStopping() const { return isTimeToStop.load(); } int ApplicationImp::fdRequired() const { // Standard handles, config file, misc I/O etc: int needed = 128; // 2x the configured peer limit for peer connections: if (overlay_) needed += 2 * overlay_->limit(); // the number of fds needed by the backend (internally // doubled if online delete is enabled). needed += std::max(5, m_shaMapStore->fdRequired()); if (shardStore_) needed += shardStore_->fdRequired(); // One fd per incoming connection a port can accept, or // if no limit is set, assume it'll handle 256 clients. for (auto const& p : serverHandler_->setup().ports) needed += std::max(256, p.limit); // The minimum number of file descriptors we need is 1024: return std::max(1024, needed); } //------------------------------------------------------------------------------ void ApplicationImp::startGenesisLedger() { std::vector const initialAmendments = (config_->START_UP == Config::FRESH) ? m_amendmentTable->getDesired() : std::vector{}; std::shared_ptr const genesis = std::make_shared( create_genesis, *config_, initialAmendments, nodeFamily_); m_ledgerMaster->storeLedger(genesis); auto const next = std::make_shared(*genesis, timeKeeper().closeTime()); next->updateSkipList(); assert(next->read(keylet::fees())); next->setImmutable(); openLedger_.emplace(next, cachedSLEs_, logs_->journal("OpenLedger")); m_ledgerMaster->storeLedger(next); m_ledgerMaster->switchLCL(next); // XahauGenesis must be activated via an enable amendment pseudo txn, // otherwise it does nothing so rather than add it directly to the // amendments table, here is its activation on the first open ledger. for (auto const& a : initialAmendments) { if (a == featureXahauGenesis) { STTx amendTx(ttAMENDMENT, [&](auto& obj) { obj.setAccountID(sfAccount, AccountID()); obj.setFieldH256(sfAmendment, featureXahauGenesis); obj.setFieldU32( sfLedgerSequence, openLedger_->current()->info().seq); }); auto txID = amendTx.getTransactionID(); auto s = std::make_shared(); amendTx.add(*s); forceValidity(getHashRouter(), txID, Validity::SigGoodOnly); openLedger_->modify([&txID, &s](OpenView& view, beast::Journal j) { view.rawTxInsert(txID, std::move(s), nullptr); return true; }); break; } } } std::shared_ptr ApplicationImp::getLastFullLedger() { auto j = journal("Ledger"); try { auto const [ledger, seq, hash] = getLatestLedger(*this); if (!ledger) return ledger; assert(ledger->read(keylet::fees())); ledger->setImmutable(); if (getLedgerMaster().haveLedger(seq)) ledger->setValidated(); if (ledger->info().hash == hash) { JLOG(j.trace()) << "Loaded ledger: " << hash; return ledger; } if (auto stream = j.error()) { stream << "Failed on ledger"; Json::Value p; addJson(p, {*ledger, nullptr, LedgerFill::full}); stream << p; } return {}; } catch (SHAMapMissingNode const& mn) { JLOG(j.warn()) << "Ledger in database: " << mn.what(); return {}; } } std::shared_ptr ApplicationImp::loadLedgerFromFile(std::string const& name) { try { std::ifstream ledgerFile(name, std::ios::in); if (!ledgerFile) { JLOG(m_journal.fatal()) << "Unable to open file '" << name << "'"; return nullptr; } Json::Reader reader; Json::Value jLedger; if (!reader.parse(ledgerFile, jLedger)) { JLOG(m_journal.fatal()) << "Unable to parse ledger JSON"; return nullptr; } std::reference_wrapper ledger(jLedger); // accept a wrapped ledger if (ledger.get().isMember("result")) ledger = ledger.get()["result"]; if (ledger.get().isMember("ledger")) ledger = ledger.get()["ledger"]; std::uint32_t seq = 1; auto closeTime = timeKeeper().closeTime(); using namespace std::chrono_literals; auto closeTimeResolution = 30s; bool closeTimeEstimated = false; std::uint64_t totalDrops = 0; if (ledger.get().isMember("accountState")) { if (ledger.get().isMember(jss::ledger_index)) { seq = ledger.get()[jss::ledger_index].asUInt(); } if (ledger.get().isMember("close_time")) { using tp = NetClock::time_point; using d = tp::duration; closeTime = tp{d{ledger.get()["close_time"].asUInt()}}; } if (ledger.get().isMember("close_time_resolution")) { using namespace std::chrono; closeTimeResolution = seconds{ledger.get()["close_time_resolution"].asUInt()}; } if (ledger.get().isMember("close_time_estimated")) { closeTimeEstimated = ledger.get()["close_time_estimated"].asBool(); } if (ledger.get().isMember("total_coins")) { totalDrops = beast::lexicalCastThrow( ledger.get()["total_coins"].asString()); } ledger = ledger.get()["accountState"]; } if (!ledger.get().isArrayOrNull()) { JLOG(m_journal.fatal()) << "State nodes must be an array"; return nullptr; } auto loadLedger = std::make_shared(seq, closeTime, *config_, nodeFamily_); loadLedger->setTotalDrops(totalDrops); for (Json::UInt index = 0; index < ledger.get().size(); ++index) { Json::Value& entry = ledger.get()[index]; if (!entry.isObjectOrNull()) { JLOG(m_journal.fatal()) << "Invalid entry in ledger"; return nullptr; } uint256 uIndex; if (!uIndex.parseHex(entry[jss::index].asString())) { JLOG(m_journal.fatal()) << "Invalid entry in ledger"; return nullptr; } entry.removeMember(jss::index); STParsedJSONObject stp("sle", ledger.get()[index]); if (!stp.object || uIndex.isZero()) { JLOG(m_journal.fatal()) << "Invalid entry in ledger"; return nullptr; } // VFALCO TODO This is the only place that // constructor is used, try to remove it STLedgerEntry sle(*stp.object, uIndex); if (!loadLedger->addSLE(sle)) { JLOG(m_journal.fatal()) << "Couldn't add serialized ledger: " << uIndex; return nullptr; } } loadLedger->stateMap().flushDirty(hotACCOUNT_NODE); assert(loadLedger->read(keylet::fees())); loadLedger->setAccepted( closeTime, closeTimeResolution, !closeTimeEstimated); return loadLedger; } catch (std::exception const& x) { JLOG(m_journal.fatal()) << "Ledger contains invalid data: " << x.what(); return nullptr; } } std::shared_ptr ApplicationImp::loadLedgerFromJson(std::string const& jsonValue) { try { Json::Reader reader; Json::Value jLedger; if (!reader.parse(jsonValue, jLedger)) { JLOG(m_journal.fatal()) << "Unable to parse ledger JSON"; return nullptr; } std::reference_wrapper ledger(jLedger); // accept a wrapped ledger if (ledger.get().isMember("result")) ledger = ledger.get()["result"]; if (ledger.get().isMember("ledger")) ledger = ledger.get()["ledger"]; std::uint32_t seq = 1; auto closeTime = timeKeeper().closeTime(); using namespace std::chrono_literals; auto closeTimeResolution = 30s; bool closeTimeEstimated = false; std::uint64_t totalDrops = 0; if (ledger.get().isMember("accountState")) { if (ledger.get().isMember(jss::ledger_index)) { seq = ledger.get()[jss::ledger_index].asUInt(); } if (ledger.get().isMember("close_time")) { using tp = NetClock::time_point; using d = tp::duration; closeTime = tp{d{ledger.get()["close_time"].asUInt()}}; } if (ledger.get().isMember("close_time_resolution")) { using namespace std::chrono; closeTimeResolution = seconds{ledger.get()["close_time_resolution"].asUInt()}; } if (ledger.get().isMember("close_time_estimated")) { closeTimeEstimated = ledger.get()["close_time_estimated"].asBool(); } if (ledger.get().isMember("total_coins")) { totalDrops = beast::lexicalCastThrow( ledger.get()["total_coins"].asString()); } ledger = ledger.get()["accountState"]; } if (!ledger.get().isArrayOrNull()) { JLOG(m_journal.fatal()) << "State nodes must be an array"; return nullptr; } auto loadLedger = std::make_shared(seq, closeTime, *config_, nodeFamily_); loadLedger->setTotalDrops(totalDrops); for (Json::UInt index = 0; index < ledger.get().size(); ++index) { Json::Value& entry = ledger.get()[index]; if (!entry.isObjectOrNull()) { JLOG(m_journal.fatal()) << "Invalid entry in ledger"; return nullptr; } uint256 uIndex; if (!uIndex.parseHex(entry[jss::index].asString())) { JLOG(m_journal.fatal()) << "Invalid entry in ledger"; return nullptr; } entry.removeMember(jss::index); STParsedJSONObject stp("sle", ledger.get()[index]); if (!stp.object || uIndex.isZero()) { JLOG(m_journal.fatal()) << "Invalid entry in ledger"; return nullptr; } // VFALCO TODO This is the only place that // constructor is used, try to remove it STLedgerEntry sle(*stp.object, uIndex); if (!loadLedger->addSLE(sle)) { JLOG(m_journal.fatal()) << "Couldn't add serialized ledger: " << uIndex; return nullptr; } } loadLedger->stateMap().flushDirty(hotACCOUNT_NODE); assert(loadLedger->read(keylet::fees())); loadLedger->setAccepted( closeTime, closeTimeResolution, !closeTimeEstimated); return loadLedger; } catch (std::exception const& x) { JLOG(m_journal.fatal()) << "Ledger contains invalid data: " << x.what(); return nullptr; } } bool ApplicationImp::loadOldLedger( std::string const& ledgerID, bool replay, bool isFileName, bool isJson) { try { std::shared_ptr loadLedger, replayLedger; if (isJson) { if (!ledgerID.empty()) loadLedger = loadLedgerFromJson(ledgerID); } else if (isFileName) { if (!ledgerID.empty()) loadLedger = loadLedgerFromFile(ledgerID); } else if (ledgerID.length() == 64) { uint256 hash; if (hash.parseHex(ledgerID)) { loadLedger = loadByHash(hash, *this); if (!loadLedger) { // Try to build the ledger from the back end auto il = std::make_shared( *this, hash, 0, InboundLedger::Reason::GENERIC, stopwatch(), make_DummyPeerSet(*this)); if (il->checkLocal()) loadLedger = il->getLedger(); } } } else if (ledgerID.empty() || boost::iequals(ledgerID, "latest")) { loadLedger = getLastFullLedger(); } else { // assume by sequence std::uint32_t index; if (beast::lexicalCastChecked(index, ledgerID)) loadLedger = loadByIndex(index, *this); } if (!loadLedger) return false; if (replay) { // Replay a ledger close with same prior ledger and transactions // this ledger holds the transactions we want to replay replayLedger = loadLedger; JLOG(m_journal.info()) << "Loading parent ledger"; loadLedger = loadByHash(replayLedger->info().parentHash, *this); if (!loadLedger) { JLOG(m_journal.info()) << "Loading parent ledger from node store"; // Try to build the ledger from the back end auto il = std::make_shared( *this, replayLedger->info().parentHash, 0, InboundLedger::Reason::GENERIC, stopwatch(), make_DummyPeerSet(*this)); if (il->checkLocal()) loadLedger = il->getLedger(); if (!loadLedger) { JLOG(m_journal.fatal()) << "Replay ledger missing/damaged"; assert(false); return false; } } } using namespace std::chrono_literals; using namespace date; static constexpr NetClock::time_point ledgerWarnTimePoint{ sys_days{January / 1 / 2000} - sys_days{January / 1 / 2000}}; if (loadLedger->info().closeTime < ledgerWarnTimePoint) { JLOG(m_journal.fatal()) << "\n\n*** WARNING ***\n" "You are replaying a ledger from before " << to_string(ledgerWarnTimePoint) << " UTC.\n" "This replay will not handle your ledger as it was " "originally " "handled.\nConsider running an earlier version of rippled " "to " "get the older rules.\n*** CONTINUING ***\n"; } JLOG(m_journal.info()) << "Loading ledger " << loadLedger->info().hash << " seq:" << loadLedger->info().seq; if (loadLedger->info().accountHash.isZero()) { JLOG(m_journal.fatal()) << "Ledger is empty."; assert(false); return false; } if (!loadLedger->walkLedger(journal("Ledger"), true)) { JLOG(m_journal.fatal()) << "Ledger is missing nodes."; assert(false); return false; } if (!loadLedger->assertSensible(journal("Ledger"))) { JLOG(m_journal.fatal()) << "Ledger is not sensible."; assert(false); return false; } m_ledgerMaster->setLedgerRangePresent( loadLedger->info().seq, loadLedger->info().seq); m_ledgerMaster->switchLCL(loadLedger); loadLedger->setValidated(); m_ledgerMaster->setFullLedger(loadLedger, true, false); openLedger_.emplace( loadLedger, cachedSLEs_, logs_->journal("OpenLedger")); if (replay) { // inject transaction(s) from the replayLedger into our open ledger // and build replay structure auto replayData = std::make_unique(loadLedger, replayLedger); for (auto const& [_, tx] : replayData->orderedTxns()) { (void)_; auto txID = tx->getTransactionID(); auto s = std::make_shared(); tx->add(*s); forceValidity(getHashRouter(), txID, Validity::SigGoodOnly); openLedger_->modify( [&txID, &s](OpenView& view, beast::Journal j) { view.rawTxInsert(txID, std::move(s), nullptr); return true; }); } m_ledgerMaster->takeReplay(std::move(replayData)); } } catch (SHAMapMissingNode const& mn) { JLOG(m_journal.fatal()) << "While loading specified ledger: " << mn.what(); return false; } catch (boost::bad_lexical_cast&) { JLOG(m_journal.fatal()) << "Ledger specified '" << ledgerID << "' is not valid"; return false; } return true; } bool ApplicationImp::serverOkay(std::string& reason) { if (!config().ELB_SUPPORT) return true; if (isStopping()) { reason = "Server is shutting down"; return false; } if (getOPs().isNeedNetworkLedger()) { reason = "Not synchronized with network yet"; return false; } if (getOPs().isAmendmentBlocked()) { reason = "Server version too old"; return false; } if (getOPs().isUNLBlocked()) { reason = "No valid validator list available"; return false; } if (getOPs().getOperatingMode() < OperatingMode::SYNCING) { reason = "Not synchronized with network"; return false; } if (!getLedgerMaster().isCaughtUp(reason)) return false; if (getFeeTrack().isLoadedLocal()) { reason = "Too much load"; return false; } return true; } beast::Journal ApplicationImp::journal(std::string const& name) { return logs_->journal(name); } bool ApplicationImp::nodeToShards() { assert(overlay_); assert(!config_->standalone()); if (config_->section(ConfigSection::shardDatabase()).empty()) { JLOG(m_journal.fatal()) << "The [shard_db] configuration setting must be set"; return false; } if (!shardStore_) { JLOG(m_journal.fatal()) << "Invalid [shard_db] configuration"; return false; } shardStore_->importDatabase(getNodeStore()); return true; } void ApplicationImp::setMaxDisallowedLedger() { auto seq = getRelationalDatabase().getMaxLedgerSeq(); if (seq) maxDisallowedLedger_ = *seq; JLOG(m_journal.trace()) << "Max persisted ledger is " << maxDisallowedLedger_; } //------------------------------------------------------------------------------ Application::Application() : beast::PropertyStream::Source("app") { } //------------------------------------------------------------------------------ std::unique_ptr make_Application( std::unique_ptr config, std::unique_ptr logs, std::unique_ptr timeKeeper) { return std::make_unique( std::move(config), std::move(logs), std::move(timeKeeper)); } } // namespace ripple