1 | package main
|
---|
2 |
|
---|
3 | import (
|
---|
4 | "crypto/tls"
|
---|
5 | "flag"
|
---|
6 | "log"
|
---|
7 | "net"
|
---|
8 | "net/http"
|
---|
9 | "net/url"
|
---|
10 | "os"
|
---|
11 | "os/signal"
|
---|
12 | "strings"
|
---|
13 | "sync/atomic"
|
---|
14 | "syscall"
|
---|
15 |
|
---|
16 | "github.com/pires/go-proxyproto"
|
---|
17 |
|
---|
18 | "git.sr.ht/~emersion/soju"
|
---|
19 | "git.sr.ht/~emersion/soju/config"
|
---|
20 | )
|
---|
21 |
|
---|
22 | func main() {
|
---|
23 | var listen, configPath string
|
---|
24 | var debug bool
|
---|
25 | flag.StringVar(&listen, "listen", "", "listening address")
|
---|
26 | flag.StringVar(&configPath, "config", "", "path to configuration file")
|
---|
27 | flag.BoolVar(&debug, "debug", false, "enable debug logging")
|
---|
28 | flag.Parse()
|
---|
29 |
|
---|
30 | var cfg *config.Server
|
---|
31 | if configPath != "" {
|
---|
32 | var err error
|
---|
33 | cfg, err = config.Load(configPath)
|
---|
34 | if err != nil {
|
---|
35 | log.Fatalf("failed to load config file: %v", err)
|
---|
36 | }
|
---|
37 | } else {
|
---|
38 | cfg = config.Defaults()
|
---|
39 | }
|
---|
40 |
|
---|
41 | if listen != "" {
|
---|
42 | cfg.Listen = append(cfg.Listen, listen)
|
---|
43 | }
|
---|
44 | if len(cfg.Listen) == 0 {
|
---|
45 | cfg.Listen = []string{":6697"}
|
---|
46 | }
|
---|
47 |
|
---|
48 | db, err := soju.OpenSQLDB(cfg.SQLDriver, cfg.SQLSource)
|
---|
49 | if err != nil {
|
---|
50 | log.Fatalf("failed to open database: %v", err)
|
---|
51 | }
|
---|
52 |
|
---|
53 | var tlsCfg *tls.Config
|
---|
54 | var tlsCert atomic.Value
|
---|
55 | if cfg.TLS != nil {
|
---|
56 | cert, err := tls.LoadX509KeyPair(cfg.TLS.CertPath, cfg.TLS.KeyPath)
|
---|
57 | if err != nil {
|
---|
58 | log.Fatalf("failed to load TLS certificate and key: %v", err)
|
---|
59 | }
|
---|
60 | tlsCert.Store(cert)
|
---|
61 |
|
---|
62 | tlsCfg = &tls.Config{
|
---|
63 | GetCertificate: func(*tls.ClientHelloInfo) (*tls.Certificate, error) {
|
---|
64 | return tlsCert.Load().(*tls.Certificate), nil
|
---|
65 | },
|
---|
66 | }
|
---|
67 | }
|
---|
68 |
|
---|
69 | srv := soju.NewServer(db)
|
---|
70 | // TODO: load from config/DB
|
---|
71 | srv.Hostname = cfg.Hostname
|
---|
72 | srv.LogPath = cfg.LogPath
|
---|
73 | srv.HTTPOrigins = cfg.HTTPOrigins
|
---|
74 | srv.AcceptProxyIPs = cfg.AcceptProxyIPs
|
---|
75 | srv.Debug = debug
|
---|
76 |
|
---|
77 | for _, listen := range cfg.Listen {
|
---|
78 | listenURI := listen
|
---|
79 | if !strings.Contains(listenURI, ":/") {
|
---|
80 | // This is a raw domain name, make it an URL with an empty scheme
|
---|
81 | listenURI = "//" + listenURI
|
---|
82 | }
|
---|
83 | u, err := url.Parse(listenURI)
|
---|
84 | if err != nil {
|
---|
85 | log.Fatalf("failed to parse listen URI %q: %v", listen, err)
|
---|
86 | }
|
---|
87 |
|
---|
88 | switch u.Scheme {
|
---|
89 | case "ircs", "":
|
---|
90 | if tlsCfg == nil {
|
---|
91 | log.Fatalf("failed to listen on %q: missing TLS configuration", listen)
|
---|
92 | }
|
---|
93 | host := u.Host
|
---|
94 | if _, _, err := net.SplitHostPort(host); err != nil {
|
---|
95 | host = host + ":6697"
|
---|
96 | }
|
---|
97 | ircsTLSCfg := tlsCfg.Clone()
|
---|
98 | ircsTLSCfg.NextProtos = []string{"irc"}
|
---|
99 | ln, err := tls.Listen("tcp", host, ircsTLSCfg)
|
---|
100 | if err != nil {
|
---|
101 | log.Fatalf("failed to start TLS listener on %q: %v", listen, err)
|
---|
102 | }
|
---|
103 | ln = proxyProtoListener(ln, srv)
|
---|
104 | go func() {
|
---|
105 | if err := srv.Serve(ln); err != nil {
|
---|
106 | log.Printf("serving %q: %v", listen, err)
|
---|
107 | }
|
---|
108 | }()
|
---|
109 | case "irc+insecure":
|
---|
110 | host := u.Host
|
---|
111 | if _, _, err := net.SplitHostPort(host); err != nil {
|
---|
112 | host = host + ":6667"
|
---|
113 | }
|
---|
114 | ln, err := net.Listen("tcp", host)
|
---|
115 | if err != nil {
|
---|
116 | log.Fatalf("failed to start listener on %q: %v", listen, err)
|
---|
117 | }
|
---|
118 | ln = proxyProtoListener(ln, srv)
|
---|
119 | go func() {
|
---|
120 | if err := srv.Serve(ln); err != nil {
|
---|
121 | log.Printf("serving %q: %v", listen, err)
|
---|
122 | }
|
---|
123 | }()
|
---|
124 | case "unix":
|
---|
125 | ln, err := net.Listen("unix", u.Path)
|
---|
126 | if err != nil {
|
---|
127 | log.Fatalf("failed to start listener on %q: %v", listen, err)
|
---|
128 | }
|
---|
129 | ln = proxyProtoListener(ln, srv)
|
---|
130 | go func() {
|
---|
131 | if err := srv.Serve(ln); err != nil {
|
---|
132 | log.Printf("serving %q: %v", listen, err)
|
---|
133 | }
|
---|
134 | }()
|
---|
135 | case "wss":
|
---|
136 | addr := u.Host
|
---|
137 | if _, _, err := net.SplitHostPort(addr); err != nil {
|
---|
138 | addr = addr + ":https"
|
---|
139 | }
|
---|
140 | httpSrv := http.Server{
|
---|
141 | Addr: addr,
|
---|
142 | TLSConfig: tlsCfg,
|
---|
143 | Handler: srv,
|
---|
144 | }
|
---|
145 | go func() {
|
---|
146 | if err := httpSrv.ListenAndServeTLS("", ""); err != nil {
|
---|
147 | log.Fatalf("serving %q: %v", listen, err)
|
---|
148 | }
|
---|
149 | }()
|
---|
150 | case "ws+insecure":
|
---|
151 | addr := u.Host
|
---|
152 | if _, _, err := net.SplitHostPort(addr); err != nil {
|
---|
153 | addr = addr + ":http"
|
---|
154 | }
|
---|
155 | httpSrv := http.Server{
|
---|
156 | Addr: addr,
|
---|
157 | Handler: srv,
|
---|
158 | }
|
---|
159 | go func() {
|
---|
160 | if err := httpSrv.ListenAndServe(); err != nil {
|
---|
161 | log.Fatalf("serving %q: %v", listen, err)
|
---|
162 | }
|
---|
163 | }()
|
---|
164 | case "ident":
|
---|
165 | if srv.Identd == nil {
|
---|
166 | srv.Identd = soju.NewIdentd()
|
---|
167 | }
|
---|
168 |
|
---|
169 | host := u.Host
|
---|
170 | if _, _, err := net.SplitHostPort(host); err != nil {
|
---|
171 | host = host + ":113"
|
---|
172 | }
|
---|
173 | ln, err := net.Listen("tcp", host)
|
---|
174 | if err != nil {
|
---|
175 | log.Fatalf("failed to start listener on %q: %v", listen, err)
|
---|
176 | }
|
---|
177 | ln = proxyProtoListener(ln, srv)
|
---|
178 | go func() {
|
---|
179 | if err := srv.Identd.Serve(ln); err != nil {
|
---|
180 | log.Printf("serving %q: %v", listen, err)
|
---|
181 | }
|
---|
182 | }()
|
---|
183 | default:
|
---|
184 | log.Fatalf("failed to listen on %q: unsupported scheme", listen)
|
---|
185 | }
|
---|
186 |
|
---|
187 | log.Printf("server listening on %q", listen)
|
---|
188 | }
|
---|
189 |
|
---|
190 | sigCh := make(chan os.Signal, 1)
|
---|
191 | signal.Notify(sigCh, syscall.SIGINT, syscall.SIGTERM, syscall.SIGHUP)
|
---|
192 |
|
---|
193 | if err := srv.Start(); err != nil {
|
---|
194 | log.Fatal(err)
|
---|
195 | }
|
---|
196 |
|
---|
197 | for sig := range sigCh {
|
---|
198 | switch sig {
|
---|
199 | case syscall.SIGHUP:
|
---|
200 | if cfg.TLS != nil {
|
---|
201 | log.Print("reloading TLS certificate")
|
---|
202 | cert, err := tls.LoadX509KeyPair(cfg.TLS.CertPath, cfg.TLS.KeyPath)
|
---|
203 | if err != nil {
|
---|
204 | log.Printf("failed to reload TLS certificate and key: %v", err)
|
---|
205 | break
|
---|
206 | }
|
---|
207 | tlsCert.Store(cert)
|
---|
208 | }
|
---|
209 | case syscall.SIGINT, syscall.SIGTERM:
|
---|
210 | log.Print("shutting down server")
|
---|
211 | srv.Shutdown()
|
---|
212 | return
|
---|
213 | }
|
---|
214 | }
|
---|
215 | }
|
---|
216 |
|
---|
217 | func proxyProtoListener(ln net.Listener, srv *soju.Server) net.Listener {
|
---|
218 | return &proxyproto.Listener{
|
---|
219 | Listener: ln,
|
---|
220 | Policy: func(upstream net.Addr) (proxyproto.Policy, error) {
|
---|
221 | tcpAddr, ok := upstream.(*net.TCPAddr)
|
---|
222 | if !ok {
|
---|
223 | return proxyproto.IGNORE, nil
|
---|
224 | }
|
---|
225 | if srv.AcceptProxyIPs.Contains(tcpAddr.IP) {
|
---|
226 | return proxyproto.USE, nil
|
---|
227 | }
|
---|
228 | return proxyproto.IGNORE, nil
|
---|
229 | },
|
---|
230 | }
|
---|
231 | }
|
---|