]> Cypherpunks.ru repositories - goircd.git/blob - goircd.go
Remove signal processor for password reloading and use pointers to strings
[goircd.git] / goircd.go
1 /*
2 goircd -- minimalistic simple Internet Relay Chat (IRC) server
3 Copyright (C) 2014 Sergey Matveev <stargrave@stargrave.org>
4
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program.  If not, see <http://www.gnu.org/licenses/>.
17 */
18 package main
19
20 import (
21         "crypto/tls"
22         "flag"
23         "io/ioutil"
24         "log"
25         "net"
26         "path"
27         "path/filepath"
28         "strings"
29 )
30
31 var (
32         version   string
33         hostname  = flag.String("hostname", "localhost", "Hostname")
34         bind      = flag.String("bind", ":6667", "Address to bind to")
35         motd      = flag.String("motd", "", "Path to MOTD file")
36         logdir    = flag.String("logdir", "", "Absolute path to directory for logs")
37         statedir  = flag.String("statedir", "", "Absolute path to directory for states")
38         passwords = flag.String("passwords", "", "Optional path to passwords file")
39
40         tlsBind = flag.String("tlsbind", "", "TLS address to bind to")
41         tlsPEM  = flag.String("tlspem", "", "Path to TLS certificat+key PEM file")
42
43         verbose = flag.Bool("v", false, "Enable verbose logging.")
44 )
45
46 func listenerLoop(sock net.Listener, events chan<- ClientEvent) {
47         for {
48                 conn, err := sock.Accept()
49                 if err != nil {
50                         log.Println("Error during accepting connection", err)
51                         continue
52                 }
53                 client := NewClient(hostname, conn)
54                 go client.Processor(events)
55         }
56 }
57
58 func Run() {
59         events := make(chan ClientEvent)
60         log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile)
61
62         logSink := make(chan LogEvent)
63         if *logdir == "" {
64                 // Dummy logger
65                 go func() {
66                         for _ = range logSink {
67                         }
68                 }()
69         } else {
70                 if !path.IsAbs(*logdir) {
71                         log.Fatalln("Need absolute path for logdir")
72                         return
73                 }
74                 go Logger(*logdir, logSink)
75                 log.Println(*logdir, "logger initialized")
76         }
77
78         stateSink := make(chan StateEvent)
79         daemon := NewDaemon(version, hostname, motd, passwords, logSink, stateSink)
80         daemon.Verbose = *verbose
81         log.Println("goircd " + daemon.version + " is starting")
82         if *statedir == "" {
83                 // Dummy statekeeper
84                 go func() {
85                         for _ = range stateSink {
86                         }
87                 }()
88         } else {
89                 if !path.IsAbs(*statedir) {
90                         log.Fatalln("Need absolute path for statedir")
91                 }
92                 states, err := filepath.Glob(path.Join(*statedir, "#*"))
93                 if err != nil {
94                         log.Fatalln("Can not read statedir", err)
95                 }
96                 for _, state := range states {
97                         buf, err := ioutil.ReadFile(state)
98                         if err != nil {
99                                 log.Fatalf("Can not read state %s: %v", state, err)
100                         }
101                         room, _ := daemon.RoomRegister(path.Base(state))
102                         contents := strings.Split(string(buf), "\n")
103                         if len(contents) < 2 {
104                                 log.Printf("State corrupted for %s: %q", room.name, contents)
105                         } else {
106                                 room.topic = contents[0]
107                                 room.key = contents[1]
108                                 log.Println("Loaded state for room", room.name)
109                         }
110                 }
111                 go StateKeeper(*statedir, stateSink)
112                 log.Println(*statedir, "statekeeper initialized")
113         }
114
115         if *bind != "" {
116                 listener, err := net.Listen("tcp", *bind)
117                 if err != nil {
118                         log.Fatalf("Can not listen on %s: %v", *bind, err)
119                 }
120                 log.Println("Raw listening on", *bind)
121                 go listenerLoop(listener, events)
122         }
123         if *tlsBind != "" {
124                 cert, err := tls.LoadX509KeyPair(*tlsPEM, *tlsPEM)
125                 if err != nil {
126                         log.Fatalf("Could not load TLS keys from %s: %s", *tlsPEM, err)
127                 }
128                 config := tls.Config{Certificates: []tls.Certificate{cert}}
129                 listenerTLS, err := tls.Listen("tcp", *tlsBind, &config)
130                 if err != nil {
131                         log.Fatalf("Can not listen on %s: %v", *tlsBind, err)
132                 }
133                 log.Println("TLS listening on", *tlsBind)
134                 go listenerLoop(listenerTLS, events)
135         }
136
137         daemon.Processor(events)
138 }
139
140 func main() {
141         flag.Parse()
142         Run()
143 }