]> Cypherpunks.ru repositories - goircd.git/blob - goircd.go
Ability to listen on raw and TLS sockets simultaneously
[goircd.git] / goircd.go
1 /*
2 goircd -- minimalistic simple Internet Relay Chat (IRC) server
3 Copyright (C) 2014 Sergey Matveev <stargrave@stargrave.org>
4
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program.  If not, see <http://www.gnu.org/licenses/>.
17 */
18 package main
19
20 import (
21         "crypto/tls"
22         "flag"
23         "io/ioutil"
24         "log"
25         "net"
26         "os"
27         "os/signal"
28         "path"
29         "path/filepath"
30         "strings"
31         "syscall"
32 )
33
34 var (
35         version   string
36         hostname  = flag.String("hostname", "localhost", "Hostname")
37         bind      = flag.String("bind", ":6667", "Address to bind to")
38         motd      = flag.String("motd", "", "Path to MOTD file")
39         logdir    = flag.String("logdir", "", "Absolute path to directory for logs")
40         statedir  = flag.String("statedir", "", "Absolute path to directory for states")
41         passwords = flag.String("passwords", "", "Optional path to passwords file")
42
43         tlsBind = flag.String("tlsbind", "", "TLS address to bind to")
44         tlsKey  = flag.String("tlskey", "", "TLS keyfile")
45         tlsCert = flag.String("tlscert", "", "TLS certificate")
46
47         verbose = flag.Bool("v", false, "Enable verbose logging.")
48 )
49
50 func listenerLoop(sock net.Listener, events chan<- ClientEvent) {
51         for {
52                 conn, err := sock.Accept()
53                 if err != nil {
54                         log.Println("Error during accepting connection", err)
55                         continue
56                 }
57                 client := NewClient(*hostname, conn)
58                 go client.Processor(events)
59         }
60 }
61
62 func Run() {
63         events := make(chan ClientEvent)
64         log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile)
65
66         logSink := make(chan LogEvent)
67         if *logdir == "" {
68                 // Dummy logger
69                 go func() {
70                         for _ = range logSink {
71                         }
72                 }()
73         } else {
74                 if !path.IsAbs(*logdir) {
75                         log.Fatalln("Need absolute path for logdir")
76                         return
77                 }
78                 go Logger(*logdir, logSink)
79                 log.Println(*logdir, "logger initialized")
80         }
81
82         stateSink := make(chan StateEvent)
83         daemon := NewDaemon(version, *hostname, *motd, logSink, stateSink)
84         daemon.Verbose = *verbose
85         log.Println("goircd "+daemon.version+" is starting")
86         if *statedir == "" {
87                 // Dummy statekeeper
88                 go func() {
89                         for _ = range stateSink {
90                         }
91                 }()
92         } else {
93                 if !path.IsAbs(*statedir) {
94                         log.Fatalln("Need absolute path for statedir")
95                 }
96                 states, err := filepath.Glob(path.Join(*statedir, "#*"))
97                 if err != nil {
98                         log.Fatalln("Can not read statedir", err)
99                 }
100                 for _, state := range states {
101                         buf, err := ioutil.ReadFile(state)
102                         if err != nil {
103                                 log.Fatalf("Can not read state %s: %v", state, err)
104                         }
105                         room, _ := daemon.RoomRegister(path.Base(state))
106                         contents := strings.Split(string(buf), "\n")
107                         if len(contents) < 2 {
108                                 log.Printf("State corrupted for %s: %q", room.name, contents)
109                         } else {
110                                 room.topic = contents[0]
111                                 room.key = contents[1]
112                                 log.Println("Loaded state for room", room.name)
113                         }
114                 }
115                 go StateKeeper(*statedir, stateSink)
116                 log.Println(*statedir, "statekeeper initialized")
117         }
118
119         if *passwords != "" {
120                 daemon.PasswordsRefresh()
121                 hups := make(chan os.Signal)
122                 signal.Notify(hups, syscall.SIGHUP)
123                 go func() {
124                         for {
125                                 <-hups
126                                 daemon.PasswordsRefresh()
127                         }
128                 }()
129         }
130
131
132         if *bind != "" {
133                 listener, err := net.Listen("tcp", *bind)
134                 if err != nil {
135                         log.Fatalf("Can not listen on %s: %v", *bind, err)
136                 }
137                 log.Println("Raw listening on", *bind)
138                 go listenerLoop(listener, events)
139         }
140         if *tlsBind != "" {
141                 cert, err := tls.LoadX509KeyPair(*tlsCert, *tlsKey)
142                 if err != nil {
143                         log.Fatalf("Could not load TLS keys from %s and %s: %s", *tlsCert, *tlsKey, err)
144                 }
145                 config := tls.Config{Certificates: []tls.Certificate{cert}}
146                 listenerTLS, err := tls.Listen("tcp", *tlsBind, &config)
147                 if err != nil {
148                         log.Fatalf("Can not listen on %s: %v", *tlsBind, err)
149                 }
150                 log.Println("TLS listening on", *tlsBind)
151                 go listenerLoop(listenerTLS, events)
152         }
153
154         daemon.Processor(events)
155 }
156
157 func main() {
158         flag.Parse()
159         Run()
160 }