[98] | 1 | package main
|
---|
| 2 |
|
---|
| 3 | import (
|
---|
| 4 | "crypto/tls"
|
---|
| 5 | "flag"
|
---|
| 6 | "log"
|
---|
| 7 | "net"
|
---|
[323] | 8 | "net/http"
|
---|
[317] | 9 | "net/url"
|
---|
[449] | 10 | "os"
|
---|
| 11 | "os/signal"
|
---|
[317] | 12 | "strings"
|
---|
[449] | 13 | "syscall"
|
---|
[98] | 14 |
|
---|
[418] | 15 | "github.com/pires/go-proxyproto"
|
---|
| 16 |
|
---|
[98] | 17 | "git.sr.ht/~emersion/soju"
|
---|
| 18 | "git.sr.ht/~emersion/soju/config"
|
---|
| 19 | )
|
---|
| 20 |
|
---|
| 21 | func main() {
|
---|
[317] | 22 | var listen, configPath string
|
---|
[98] | 23 | var debug bool
|
---|
[317] | 24 | flag.StringVar(&listen, "listen", "", "listening address")
|
---|
[98] | 25 | flag.StringVar(&configPath, "config", "", "path to configuration file")
|
---|
| 26 | flag.BoolVar(&debug, "debug", false, "enable debug logging")
|
---|
| 27 | flag.Parse()
|
---|
| 28 |
|
---|
| 29 | var cfg *config.Server
|
---|
| 30 | if configPath != "" {
|
---|
| 31 | var err error
|
---|
| 32 | cfg, err = config.Load(configPath)
|
---|
| 33 | if err != nil {
|
---|
| 34 | log.Fatalf("failed to load config file: %v", err)
|
---|
| 35 | }
|
---|
| 36 | } else {
|
---|
| 37 | cfg = config.Defaults()
|
---|
| 38 | }
|
---|
| 39 |
|
---|
[317] | 40 | if listen != "" {
|
---|
| 41 | cfg.Listen = append(cfg.Listen, listen)
|
---|
[98] | 42 | }
|
---|
[317] | 43 | if len(cfg.Listen) == 0 {
|
---|
| 44 | cfg.Listen = []string{":6697"}
|
---|
| 45 | }
|
---|
[98] | 46 |
|
---|
| 47 | db, err := soju.OpenSQLDB(cfg.SQLDriver, cfg.SQLSource)
|
---|
| 48 | if err != nil {
|
---|
| 49 | log.Fatalf("failed to open database: %v", err)
|
---|
| 50 | }
|
---|
| 51 |
|
---|
[317] | 52 | var tlsCfg *tls.Config
|
---|
[98] | 53 | if cfg.TLS != nil {
|
---|
| 54 | cert, err := tls.LoadX509KeyPair(cfg.TLS.CertPath, cfg.TLS.KeyPath)
|
---|
| 55 | if err != nil {
|
---|
| 56 | log.Fatalf("failed to load TLS certificate and key: %v", err)
|
---|
| 57 | }
|
---|
[455] | 58 | tlsCfg = &tls.Config{
|
---|
| 59 | NextProtos: []string{"irc"},
|
---|
| 60 | Certificates: []tls.Certificate{cert},
|
---|
| 61 | }
|
---|
[98] | 62 | }
|
---|
| 63 |
|
---|
| 64 | srv := soju.NewServer(db)
|
---|
| 65 | // TODO: load from config/DB
|
---|
| 66 | srv.Hostname = cfg.Hostname
|
---|
[178] | 67 | srv.LogPath = cfg.LogPath
|
---|
[323] | 68 | srv.HTTPOrigins = cfg.HTTPOrigins
|
---|
[417] | 69 | srv.AcceptProxyIPs = cfg.AcceptProxyIPs
|
---|
[98] | 70 | srv.Debug = debug
|
---|
| 71 |
|
---|
[317] | 72 | for _, listen := range cfg.Listen {
|
---|
| 73 | listenURI := listen
|
---|
| 74 | if !strings.Contains(listenURI, ":/") {
|
---|
| 75 | // This is a raw domain name, make it an URL with an empty scheme
|
---|
| 76 | listenURI = "//" + listenURI
|
---|
[98] | 77 | }
|
---|
[317] | 78 | u, err := url.Parse(listenURI)
|
---|
| 79 | if err != nil {
|
---|
| 80 | log.Fatalf("failed to parse listen URI %q: %v", listen, err)
|
---|
| 81 | }
|
---|
| 82 |
|
---|
| 83 | switch u.Scheme {
|
---|
| 84 | case "ircs", "":
|
---|
| 85 | if tlsCfg == nil {
|
---|
| 86 | log.Fatalf("failed to listen on %q: missing TLS configuration", listen)
|
---|
| 87 | }
|
---|
| 88 | host := u.Host
|
---|
| 89 | if _, _, err := net.SplitHostPort(host); err != nil {
|
---|
| 90 | host = host + ":6697"
|
---|
| 91 | }
|
---|
| 92 | ln, err := tls.Listen("tcp", host, tlsCfg)
|
---|
| 93 | if err != nil {
|
---|
| 94 | log.Fatalf("failed to start TLS listener on %q: %v", listen, err)
|
---|
| 95 | }
|
---|
[418] | 96 | ln = proxyProtoListener(ln, srv)
|
---|
[317] | 97 | go func() {
|
---|
[449] | 98 | if err := srv.Serve(ln); err != nil {
|
---|
| 99 | log.Printf("serving %q: %v", listen, err)
|
---|
| 100 | }
|
---|
[317] | 101 | }()
|
---|
| 102 | case "irc+insecure":
|
---|
| 103 | host := u.Host
|
---|
| 104 | if _, _, err := net.SplitHostPort(host); err != nil {
|
---|
| 105 | host = host + ":6667"
|
---|
| 106 | }
|
---|
| 107 | ln, err := net.Listen("tcp", host)
|
---|
| 108 | if err != nil {
|
---|
| 109 | log.Fatalf("failed to start listener on %q: %v", listen, err)
|
---|
| 110 | }
|
---|
[418] | 111 | ln = proxyProtoListener(ln, srv)
|
---|
[317] | 112 | go func() {
|
---|
[449] | 113 | if err := srv.Serve(ln); err != nil {
|
---|
| 114 | log.Printf("serving %q: %v", listen, err)
|
---|
| 115 | }
|
---|
[317] | 116 | }()
|
---|
[323] | 117 | case "wss":
|
---|
| 118 | addr := u.Host
|
---|
| 119 | if _, _, err := net.SplitHostPort(addr); err != nil {
|
---|
| 120 | addr = addr + ":https"
|
---|
| 121 | }
|
---|
| 122 | httpSrv := http.Server{
|
---|
| 123 | Addr: addr,
|
---|
| 124 | TLSConfig: tlsCfg,
|
---|
| 125 | Handler: srv,
|
---|
| 126 | }
|
---|
| 127 | go func() {
|
---|
[449] | 128 | if err := httpSrv.ListenAndServeTLS("", ""); err != nil {
|
---|
| 129 | log.Fatalf("serving %q: %v", listen, err)
|
---|
| 130 | }
|
---|
[323] | 131 | }()
|
---|
| 132 | case "ws+insecure":
|
---|
| 133 | addr := u.Host
|
---|
| 134 | if _, _, err := net.SplitHostPort(addr); err != nil {
|
---|
| 135 | addr = addr + ":http"
|
---|
| 136 | }
|
---|
| 137 | httpSrv := http.Server{
|
---|
| 138 | Addr: addr,
|
---|
| 139 | Handler: srv,
|
---|
| 140 | }
|
---|
| 141 | go func() {
|
---|
[449] | 142 | if err := httpSrv.ListenAndServe(); err != nil {
|
---|
| 143 | log.Fatalf("serving %q: %v", listen, err)
|
---|
| 144 | }
|
---|
[323] | 145 | }()
|
---|
[385] | 146 | case "ident":
|
---|
| 147 | if srv.Identd == nil {
|
---|
| 148 | srv.Identd = soju.NewIdentd()
|
---|
| 149 | }
|
---|
| 150 |
|
---|
| 151 | host := u.Host
|
---|
| 152 | if _, _, err := net.SplitHostPort(host); err != nil {
|
---|
| 153 | host = host + ":113"
|
---|
| 154 | }
|
---|
| 155 | ln, err := net.Listen("tcp", host)
|
---|
| 156 | if err != nil {
|
---|
| 157 | log.Fatalf("failed to start listener on %q: %v", listen, err)
|
---|
| 158 | }
|
---|
[418] | 159 | ln = proxyProtoListener(ln, srv)
|
---|
[385] | 160 | go func() {
|
---|
[449] | 161 | if err := srv.Identd.Serve(ln); err != nil {
|
---|
| 162 | log.Printf("serving %q: %v", listen, err)
|
---|
| 163 | }
|
---|
[385] | 164 | }()
|
---|
[317] | 165 | default:
|
---|
| 166 | log.Fatalf("failed to listen on %q: unsupported scheme", listen)
|
---|
| 167 | }
|
---|
| 168 |
|
---|
| 169 | log.Printf("server listening on %q", listen)
|
---|
| 170 | }
|
---|
[449] | 171 |
|
---|
| 172 | sigCh := make(chan os.Signal, 1)
|
---|
| 173 | signal.Notify(sigCh, syscall.SIGINT, syscall.SIGTERM)
|
---|
| 174 |
|
---|
| 175 | if err := srv.Start(); err != nil {
|
---|
| 176 | log.Fatal(err)
|
---|
| 177 | }
|
---|
| 178 |
|
---|
| 179 | <-sigCh
|
---|
| 180 | log.Print("shutting down server")
|
---|
| 181 | srv.Shutdown()
|
---|
[98] | 182 | }
|
---|
[418] | 183 |
|
---|
| 184 | func proxyProtoListener(ln net.Listener, srv *soju.Server) net.Listener {
|
---|
| 185 | return &proxyproto.Listener{
|
---|
| 186 | Listener: ln,
|
---|
| 187 | Policy: func(upstream net.Addr) (proxyproto.Policy, error) {
|
---|
| 188 | tcpAddr, ok := upstream.(*net.TCPAddr)
|
---|
| 189 | if !ok {
|
---|
| 190 | return proxyproto.IGNORE, nil
|
---|
| 191 | }
|
---|
| 192 | if srv.AcceptProxyIPs.Contains(tcpAddr.IP) {
|
---|
| 193 | return proxyproto.USE, nil
|
---|
| 194 | }
|
---|
| 195 | return proxyproto.IGNORE, nil
|
---|
| 196 | },
|
---|
| 197 | }
|
---|
| 198 | }
|
---|