]> Cypherpunks.ru repositories - govpn.git/blob - src/cypherpunks.ru/govpn/cmd/govpn-server/main.go
go vet/lint
[govpn.git] / src / cypherpunks.ru / govpn / cmd / govpn-server / main.go
1 /*
2 GoVPN -- simple secure free software virtual private network daemon
3 Copyright (C) 2014-2017 Sergey Matveev <stargrave@stargrave.org>
4
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program.  If not, see <http://www.gnu.org/licenses/>.
17 */
18
19 // Simple secure, DPI/censorship-resistant free software VPN daemon.
20 package main
21
22 import (
23         "flag"
24         "fmt"
25         "log"
26         "net"
27         "os"
28         "os/signal"
29         "time"
30
31         "cypherpunks.ru/govpn"
32 )
33
34 var (
35         bindAddr = flag.String("bind", "[::]:1194", "Bind to address")
36         proto    = flag.String("proto", "udp", "Protocol to use: udp, tcp or all")
37         confPath = flag.String("conf", "peers.yaml", "Path to configuration YAML")
38         stats    = flag.String("stats", "", "Enable stats retrieving on host:port")
39         proxy    = flag.String("proxy", "", "Enable HTTP proxy on host:port")
40         egdPath  = flag.String("egd", "", "Optional path to EGD socket")
41         syslog   = flag.Bool("syslog", false, "Enable logging to syslog")
42         version  = flag.Bool("version", false, "Print version information")
43         warranty = flag.Bool("warranty", false, "Print warranty information")
44 )
45
46 func main() {
47         flag.Parse()
48         if *warranty {
49                 fmt.Println(govpn.Warranty)
50                 return
51         }
52         if *version {
53                 fmt.Println(govpn.VersionGet())
54                 return
55         }
56         timeout := time.Second * time.Duration(govpn.TimeoutDefault)
57         log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile)
58         log.Println(govpn.VersionGet())
59
60         confInit()
61         knownPeers = govpn.KnownPeers(make(map[string]**govpn.Peer))
62
63         if *egdPath != "" {
64                 log.Println("Using", *egdPath, "EGD")
65                 govpn.EGDInit(*egdPath)
66         }
67
68         if *syslog {
69                 govpn.SyslogEnable()
70         }
71
72         switch *proto {
73         case "udp":
74                 startUDP()
75         case "tcp":
76                 startTCP()
77         case "all":
78                 startUDP()
79                 startTCP()
80         default:
81                 log.Fatalln("Unknown protocol specified")
82         }
83
84         termSignal := make(chan os.Signal, 1)
85         signal.Notify(termSignal, os.Interrupt, os.Kill)
86
87         hsHeartbeat := time.Tick(timeout)
88         go func() { <-hsHeartbeat }()
89
90         if *stats != "" {
91                 log.Println("Stats are going to listen on", *stats)
92                 statsPort, err := net.Listen("tcp", *stats)
93                 if err != nil {
94                         log.Fatalln("Can not listen on stats port:", err)
95                 }
96                 go govpn.StatsProcessor(statsPort, &knownPeers)
97         }
98         if *proxy != "" {
99                 go proxyStart()
100         }
101         govpn.BothPrintf(`[started bind="%s"]`, *bindAddr)
102
103         var needsDeletion bool
104 MainCycle:
105         for {
106                 select {
107                 case <-termSignal:
108                         govpn.BothPrintf(`[terminating bind="%s"]`, *bindAddr)
109                         for _, ps := range peers {
110                                 govpn.ScriptCall(
111                                         confs[*ps.peer.ID].Down,
112                                         ps.tap.Name,
113                                         ps.peer.Addr,
114                                 )
115                         }
116                         break MainCycle
117                 case <-hsHeartbeat:
118                         now := time.Now()
119                         hsLock.Lock()
120                         for addr, hs := range handshakes {
121                                 if hs.LastPing.Add(timeout).Before(now) {
122                                         govpn.Printf(`[handshake-delete bind="%s" addr="%s"]`, *bindAddr, addr)
123                                         hs.Zero()
124                                         delete(handshakes, addr)
125                                 }
126                         }
127                         peersLock.Lock()
128                         peersByIDLock.Lock()
129                         kpLock.Lock()
130                         for addr, ps := range peers {
131                                 ps.peer.BusyR.Lock()
132                                 needsDeletion = ps.peer.LastPing.Add(timeout).Before(now)
133                                 ps.peer.BusyR.Unlock()
134                                 if needsDeletion {
135                                         govpn.Printf(`[peer-delete bind="%s" peer="%s"]`, *bindAddr, ps.peer)
136                                         delete(peers, addr)
137                                         delete(knownPeers, addr)
138                                         delete(peersByID, *ps.peer.ID)
139                                         go govpn.ScriptCall(
140                                                 confs[*ps.peer.ID].Down,
141                                                 ps.tap.Name,
142                                                 ps.peer.Addr,
143                                         )
144                                         ps.terminator <- struct{}{}
145                                 }
146                         }
147                         hsLock.Unlock()
148                         peersLock.Unlock()
149                         peersByIDLock.Unlock()
150                         kpLock.Unlock()
151                 }
152         }
153 }