source: code/trunk/cmd/soju/main.go@ 449

Last change on this file since 449 was 449, checked in by contact, 4 years ago

Add support for graceful shutdown

Closes: https://todo.sr.ht/~emersion/soju/45

File size: 4.5 KB
RevLine 
[98]1package main
2
3import (
4 "crypto/tls"
5 "flag"
6 "log"
7 "net"
[323]8 "net/http"
[317]9 "net/url"
[449]10 "os"
11 "os/signal"
[317]12 "strings"
[449]13 "syscall"
[98]14
[418]15 "github.com/pires/go-proxyproto"
16
[98]17 "git.sr.ht/~emersion/soju"
18 "git.sr.ht/~emersion/soju/config"
19)
20
21func main() {
[317]22 var listen, configPath string
[98]23 var debug bool
[317]24 flag.StringVar(&listen, "listen", "", "listening address")
[98]25 flag.StringVar(&configPath, "config", "", "path to configuration file")
26 flag.BoolVar(&debug, "debug", false, "enable debug logging")
27 flag.Parse()
28
29 var cfg *config.Server
30 if configPath != "" {
31 var err error
32 cfg, err = config.Load(configPath)
33 if err != nil {
34 log.Fatalf("failed to load config file: %v", err)
35 }
36 } else {
37 cfg = config.Defaults()
38 }
39
[317]40 if listen != "" {
41 cfg.Listen = append(cfg.Listen, listen)
[98]42 }
[317]43 if len(cfg.Listen) == 0 {
44 cfg.Listen = []string{":6697"}
45 }
[98]46
47 db, err := soju.OpenSQLDB(cfg.SQLDriver, cfg.SQLSource)
48 if err != nil {
49 log.Fatalf("failed to open database: %v", err)
50 }
51
[317]52 var tlsCfg *tls.Config
[98]53 if cfg.TLS != nil {
54 cert, err := tls.LoadX509KeyPair(cfg.TLS.CertPath, cfg.TLS.KeyPath)
55 if err != nil {
56 log.Fatalf("failed to load TLS certificate and key: %v", err)
57 }
[317]58 tlsCfg = &tls.Config{Certificates: []tls.Certificate{cert}}
[98]59 }
60
61 srv := soju.NewServer(db)
62 // TODO: load from config/DB
63 srv.Hostname = cfg.Hostname
[178]64 srv.LogPath = cfg.LogPath
[323]65 srv.HTTPOrigins = cfg.HTTPOrigins
[417]66 srv.AcceptProxyIPs = cfg.AcceptProxyIPs
[98]67 srv.Debug = debug
68
[317]69 for _, listen := range cfg.Listen {
70 listenURI := listen
71 if !strings.Contains(listenURI, ":/") {
72 // This is a raw domain name, make it an URL with an empty scheme
73 listenURI = "//" + listenURI
[98]74 }
[317]75 u, err := url.Parse(listenURI)
76 if err != nil {
77 log.Fatalf("failed to parse listen URI %q: %v", listen, err)
78 }
79
80 switch u.Scheme {
81 case "ircs", "":
82 if tlsCfg == nil {
83 log.Fatalf("failed to listen on %q: missing TLS configuration", listen)
84 }
85 host := u.Host
86 if _, _, err := net.SplitHostPort(host); err != nil {
87 host = host + ":6697"
88 }
89 ln, err := tls.Listen("tcp", host, tlsCfg)
90 if err != nil {
91 log.Fatalf("failed to start TLS listener on %q: %v", listen, err)
92 }
[418]93 ln = proxyProtoListener(ln, srv)
[317]94 go func() {
[449]95 if err := srv.Serve(ln); err != nil {
96 log.Printf("serving %q: %v", listen, err)
97 }
[317]98 }()
99 case "irc+insecure":
100 host := u.Host
101 if _, _, err := net.SplitHostPort(host); err != nil {
102 host = host + ":6667"
103 }
104 ln, err := net.Listen("tcp", host)
105 if err != nil {
106 log.Fatalf("failed to start listener on %q: %v", listen, err)
107 }
[418]108 ln = proxyProtoListener(ln, srv)
[317]109 go func() {
[449]110 if err := srv.Serve(ln); err != nil {
111 log.Printf("serving %q: %v", listen, err)
112 }
[317]113 }()
[323]114 case "wss":
115 addr := u.Host
116 if _, _, err := net.SplitHostPort(addr); err != nil {
117 addr = addr + ":https"
118 }
119 httpSrv := http.Server{
120 Addr: addr,
121 TLSConfig: tlsCfg,
122 Handler: srv,
123 }
124 go func() {
[449]125 if err := httpSrv.ListenAndServeTLS("", ""); err != nil {
126 log.Fatalf("serving %q: %v", listen, err)
127 }
[323]128 }()
129 case "ws+insecure":
130 addr := u.Host
131 if _, _, err := net.SplitHostPort(addr); err != nil {
132 addr = addr + ":http"
133 }
134 httpSrv := http.Server{
135 Addr: addr,
136 Handler: srv,
137 }
138 go func() {
[449]139 if err := httpSrv.ListenAndServe(); err != nil {
140 log.Fatalf("serving %q: %v", listen, err)
141 }
[323]142 }()
[385]143 case "ident":
144 if srv.Identd == nil {
145 srv.Identd = soju.NewIdentd()
146 }
147
148 host := u.Host
149 if _, _, err := net.SplitHostPort(host); err != nil {
150 host = host + ":113"
151 }
152 ln, err := net.Listen("tcp", host)
153 if err != nil {
154 log.Fatalf("failed to start listener on %q: %v", listen, err)
155 }
[418]156 ln = proxyProtoListener(ln, srv)
[385]157 go func() {
[449]158 if err := srv.Identd.Serve(ln); err != nil {
159 log.Printf("serving %q: %v", listen, err)
160 }
[385]161 }()
[317]162 default:
163 log.Fatalf("failed to listen on %q: unsupported scheme", listen)
164 }
165
166 log.Printf("server listening on %q", listen)
167 }
[449]168
169 sigCh := make(chan os.Signal, 1)
170 signal.Notify(sigCh, syscall.SIGINT, syscall.SIGTERM)
171
172 if err := srv.Start(); err != nil {
173 log.Fatal(err)
174 }
175
176 <-sigCh
177 log.Print("shutting down server")
178 srv.Shutdown()
[98]179}
[418]180
181func proxyProtoListener(ln net.Listener, srv *soju.Server) net.Listener {
182 return &proxyproto.Listener{
183 Listener: ln,
184 Policy: func(upstream net.Addr) (proxyproto.Policy, error) {
185 tcpAddr, ok := upstream.(*net.TCPAddr)
186 if !ok {
187 return proxyproto.IGNORE, nil
188 }
189 if srv.AcceptProxyIPs.Contains(tcpAddr.IP) {
190 return proxyproto.USE, nil
191 }
192 return proxyproto.IGNORE, nil
193 },
194 }
195}
Note: See TracBrowser for help on using the repository browser.