source: code/trunk/cmd/soju/main.go@ 417

Last change on this file since 417 was 417, checked in by contact, 5 years ago

Set Server.AcceptProxyIPs

File size: 3.4 KB
RevLine 
[98]1package main
2
3import (
4 "crypto/tls"
5 "flag"
6 "log"
7 "net"
[323]8 "net/http"
[317]9 "net/url"
10 "strings"
[98]11
12 "git.sr.ht/~emersion/soju"
13 "git.sr.ht/~emersion/soju/config"
14)
15
16func main() {
[317]17 var listen, configPath string
[98]18 var debug bool
[317]19 flag.StringVar(&listen, "listen", "", "listening address")
[98]20 flag.StringVar(&configPath, "config", "", "path to configuration file")
21 flag.BoolVar(&debug, "debug", false, "enable debug logging")
22 flag.Parse()
23
24 var cfg *config.Server
25 if configPath != "" {
26 var err error
27 cfg, err = config.Load(configPath)
28 if err != nil {
29 log.Fatalf("failed to load config file: %v", err)
30 }
31 } else {
32 cfg = config.Defaults()
33 }
34
[317]35 if listen != "" {
36 cfg.Listen = append(cfg.Listen, listen)
[98]37 }
[317]38 if len(cfg.Listen) == 0 {
39 cfg.Listen = []string{":6697"}
40 }
[98]41
42 db, err := soju.OpenSQLDB(cfg.SQLDriver, cfg.SQLSource)
43 if err != nil {
44 log.Fatalf("failed to open database: %v", err)
45 }
46
[317]47 var tlsCfg *tls.Config
[98]48 if cfg.TLS != nil {
49 cert, err := tls.LoadX509KeyPair(cfg.TLS.CertPath, cfg.TLS.KeyPath)
50 if err != nil {
51 log.Fatalf("failed to load TLS certificate and key: %v", err)
52 }
[317]53 tlsCfg = &tls.Config{Certificates: []tls.Certificate{cert}}
[98]54 }
55
56 srv := soju.NewServer(db)
57 // TODO: load from config/DB
58 srv.Hostname = cfg.Hostname
[178]59 srv.LogPath = cfg.LogPath
[323]60 srv.HTTPOrigins = cfg.HTTPOrigins
[417]61 srv.AcceptProxyIPs = cfg.AcceptProxyIPs
[98]62 srv.Debug = debug
63
[317]64 for _, listen := range cfg.Listen {
65 listenURI := listen
66 if !strings.Contains(listenURI, ":/") {
67 // This is a raw domain name, make it an URL with an empty scheme
68 listenURI = "//" + listenURI
[98]69 }
[317]70 u, err := url.Parse(listenURI)
71 if err != nil {
72 log.Fatalf("failed to parse listen URI %q: %v", listen, err)
73 }
74
75 switch u.Scheme {
76 case "ircs", "":
77 if tlsCfg == nil {
78 log.Fatalf("failed to listen on %q: missing TLS configuration", listen)
79 }
80 host := u.Host
81 if _, _, err := net.SplitHostPort(host); err != nil {
82 host = host + ":6697"
83 }
84 ln, err := tls.Listen("tcp", host, tlsCfg)
85 if err != nil {
86 log.Fatalf("failed to start TLS listener on %q: %v", listen, err)
87 }
88 go func() {
89 log.Fatal(srv.Serve(ln))
90 }()
91 case "irc+insecure":
92 host := u.Host
93 if _, _, err := net.SplitHostPort(host); err != nil {
94 host = host + ":6667"
95 }
96 ln, err := net.Listen("tcp", host)
97 if err != nil {
98 log.Fatalf("failed to start listener on %q: %v", listen, err)
99 }
100 go func() {
101 log.Fatal(srv.Serve(ln))
102 }()
[323]103 case "wss":
104 addr := u.Host
105 if _, _, err := net.SplitHostPort(addr); err != nil {
106 addr = addr + ":https"
107 }
108 httpSrv := http.Server{
109 Addr: addr,
110 TLSConfig: tlsCfg,
111 Handler: srv,
112 }
113 go func() {
114 log.Fatal(httpSrv.ListenAndServeTLS("", ""))
115 }()
116 case "ws+insecure":
117 addr := u.Host
118 if _, _, err := net.SplitHostPort(addr); err != nil {
119 addr = addr + ":http"
120 }
121 httpSrv := http.Server{
122 Addr: addr,
123 Handler: srv,
124 }
125 go func() {
126 log.Fatal(httpSrv.ListenAndServe())
127 }()
[385]128 case "ident":
129 if srv.Identd == nil {
130 srv.Identd = soju.NewIdentd()
131 }
132
133 host := u.Host
134 if _, _, err := net.SplitHostPort(host); err != nil {
135 host = host + ":113"
136 }
137 ln, err := net.Listen("tcp", host)
138 if err != nil {
139 log.Fatalf("failed to start listener on %q: %v", listen, err)
140 }
141 go func() {
142 log.Fatal(srv.Identd.Serve(ln))
143 }()
[317]144 default:
145 log.Fatalf("failed to listen on %q: unsupported scheme", listen)
146 }
147
148 log.Printf("server listening on %q", listen)
149 }
150 log.Fatal(srv.Run())
[98]151}
Note: See TracBrowser for help on using the repository browser.