source: code/trunk/cmd/soju/main.go@ 466

Last change on this file since 466 was 466, checked in by contact, 4 years ago

Add Unix socket listener

Closes: https://todo.sr.ht/~emersion/soju/51

File size: 4.8 KB
Line 
1package main
2
3import (
4 "crypto/tls"
5 "flag"
6 "log"
7 "net"
8 "net/http"
9 "net/url"
10 "os"
11 "os/signal"
12 "strings"
13 "syscall"
14
15 "github.com/pires/go-proxyproto"
16
17 "git.sr.ht/~emersion/soju"
18 "git.sr.ht/~emersion/soju/config"
19)
20
21func main() {
22 var listen, configPath string
23 var debug bool
24 flag.StringVar(&listen, "listen", "", "listening address")
25 flag.StringVar(&configPath, "config", "", "path to configuration file")
26 flag.BoolVar(&debug, "debug", false, "enable debug logging")
27 flag.Parse()
28
29 var cfg *config.Server
30 if configPath != "" {
31 var err error
32 cfg, err = config.Load(configPath)
33 if err != nil {
34 log.Fatalf("failed to load config file: %v", err)
35 }
36 } else {
37 cfg = config.Defaults()
38 }
39
40 if listen != "" {
41 cfg.Listen = append(cfg.Listen, listen)
42 }
43 if len(cfg.Listen) == 0 {
44 cfg.Listen = []string{":6697"}
45 }
46
47 db, err := soju.OpenSQLDB(cfg.SQLDriver, cfg.SQLSource)
48 if err != nil {
49 log.Fatalf("failed to open database: %v", err)
50 }
51
52 var tlsCfg *tls.Config
53 if cfg.TLS != nil {
54 cert, err := tls.LoadX509KeyPair(cfg.TLS.CertPath, cfg.TLS.KeyPath)
55 if err != nil {
56 log.Fatalf("failed to load TLS certificate and key: %v", err)
57 }
58 tlsCfg = &tls.Config{
59 NextProtos: []string{"irc"},
60 Certificates: []tls.Certificate{cert},
61 }
62 }
63
64 srv := soju.NewServer(db)
65 // TODO: load from config/DB
66 srv.Hostname = cfg.Hostname
67 srv.LogPath = cfg.LogPath
68 srv.HTTPOrigins = cfg.HTTPOrigins
69 srv.AcceptProxyIPs = cfg.AcceptProxyIPs
70 srv.Debug = debug
71
72 for _, listen := range cfg.Listen {
73 listenURI := listen
74 if !strings.Contains(listenURI, ":/") {
75 // This is a raw domain name, make it an URL with an empty scheme
76 listenURI = "//" + listenURI
77 }
78 u, err := url.Parse(listenURI)
79 if err != nil {
80 log.Fatalf("failed to parse listen URI %q: %v", listen, err)
81 }
82
83 switch u.Scheme {
84 case "ircs", "":
85 if tlsCfg == nil {
86 log.Fatalf("failed to listen on %q: missing TLS configuration", listen)
87 }
88 host := u.Host
89 if _, _, err := net.SplitHostPort(host); err != nil {
90 host = host + ":6697"
91 }
92 ln, err := tls.Listen("tcp", host, tlsCfg)
93 if err != nil {
94 log.Fatalf("failed to start TLS listener on %q: %v", listen, err)
95 }
96 ln = proxyProtoListener(ln, srv)
97 go func() {
98 if err := srv.Serve(ln); err != nil {
99 log.Printf("serving %q: %v", listen, err)
100 }
101 }()
102 case "irc+insecure":
103 host := u.Host
104 if _, _, err := net.SplitHostPort(host); err != nil {
105 host = host + ":6667"
106 }
107 ln, err := net.Listen("tcp", host)
108 if err != nil {
109 log.Fatalf("failed to start listener on %q: %v", listen, err)
110 }
111 ln = proxyProtoListener(ln, srv)
112 go func() {
113 if err := srv.Serve(ln); err != nil {
114 log.Printf("serving %q: %v", listen, err)
115 }
116 }()
117 case "unix":
118 ln, err := net.Listen("unix", u.Path)
119 if err != nil {
120 log.Fatalf("failed to start listener on %q: %v", listen, err)
121 }
122 ln = proxyProtoListener(ln, srv)
123 go func() {
124 if err := srv.Serve(ln); err != nil {
125 log.Printf("serving %q: %v", listen, err)
126 }
127 }()
128 case "wss":
129 addr := u.Host
130 if _, _, err := net.SplitHostPort(addr); err != nil {
131 addr = addr + ":https"
132 }
133 httpSrv := http.Server{
134 Addr: addr,
135 TLSConfig: tlsCfg,
136 Handler: srv,
137 }
138 go func() {
139 if err := httpSrv.ListenAndServeTLS("", ""); err != nil {
140 log.Fatalf("serving %q: %v", listen, err)
141 }
142 }()
143 case "ws+insecure":
144 addr := u.Host
145 if _, _, err := net.SplitHostPort(addr); err != nil {
146 addr = addr + ":http"
147 }
148 httpSrv := http.Server{
149 Addr: addr,
150 Handler: srv,
151 }
152 go func() {
153 if err := httpSrv.ListenAndServe(); err != nil {
154 log.Fatalf("serving %q: %v", listen, err)
155 }
156 }()
157 case "ident":
158 if srv.Identd == nil {
159 srv.Identd = soju.NewIdentd()
160 }
161
162 host := u.Host
163 if _, _, err := net.SplitHostPort(host); err != nil {
164 host = host + ":113"
165 }
166 ln, err := net.Listen("tcp", host)
167 if err != nil {
168 log.Fatalf("failed to start listener on %q: %v", listen, err)
169 }
170 ln = proxyProtoListener(ln, srv)
171 go func() {
172 if err := srv.Identd.Serve(ln); err != nil {
173 log.Printf("serving %q: %v", listen, err)
174 }
175 }()
176 default:
177 log.Fatalf("failed to listen on %q: unsupported scheme", listen)
178 }
179
180 log.Printf("server listening on %q", listen)
181 }
182
183 sigCh := make(chan os.Signal, 1)
184 signal.Notify(sigCh, syscall.SIGINT, syscall.SIGTERM)
185
186 if err := srv.Start(); err != nil {
187 log.Fatal(err)
188 }
189
190 <-sigCh
191 log.Print("shutting down server")
192 srv.Shutdown()
193}
194
195func proxyProtoListener(ln net.Listener, srv *soju.Server) net.Listener {
196 return &proxyproto.Listener{
197 Listener: ln,
198 Policy: func(upstream net.Addr) (proxyproto.Policy, error) {
199 tcpAddr, ok := upstream.(*net.TCPAddr)
200 if !ok {
201 return proxyproto.IGNORE, nil
202 }
203 if srv.AcceptProxyIPs.Contains(tcpAddr.IP) {
204 return proxyproto.USE, nil
205 }
206 return proxyproto.IGNORE, nil
207 },
208 }
209}
Note: See TracBrowser for help on using the repository browser.