goircd/goircd.go

144 lines
3.9 KiB
Go
Raw Normal View History

2014-05-11 16:18:55 +00:00
/*
goircd -- minimalistic simple Internet Relay Chat (IRC) server
Copyright (C) 2014 Sergey Matveev <stargrave@stargrave.org>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
package main
import (
2014-06-08 00:08:13 +00:00
"crypto/tls"
2014-05-11 16:18:55 +00:00
"flag"
2014-06-08 01:16:33 +00:00
"io/ioutil"
2014-05-11 16:18:55 +00:00
"log"
"net"
"path"
"path/filepath"
"strings"
)
var (
2014-08-14 10:31:34 +00:00
version string
hostname = flag.String("hostname", "localhost", "Hostname")
bind = flag.String("bind", ":6667", "Address to bind to")
motd = flag.String("motd", "", "Path to MOTD file")
logdir = flag.String("logdir", "", "Absolute path to directory for logs")
statedir = flag.String("statedir", "", "Absolute path to directory for states")
passwords = flag.String("passwords", "", "Optional path to passwords file")
2014-06-08 00:08:13 +00:00
tlsBind = flag.String("tlsbind", "", "TLS address to bind to")
tlsPEM = flag.String("tlspem", "", "Path to TLS certificat+key PEM file")
2014-06-08 00:49:27 +00:00
verbose = flag.Bool("v", false, "Enable verbose logging.")
2014-05-11 16:18:55 +00:00
)
func listenerLoop(sock net.Listener, events chan<- ClientEvent) {
for {
conn, err := sock.Accept()
if err != nil {
log.Println("Error during accepting connection", err)
continue
}
client := NewClient(hostname, conn)
go client.Processor(events)
}
}
2014-05-11 16:18:55 +00:00
func Run() {
events := make(chan ClientEvent)
log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile)
2014-08-09 12:42:19 +00:00
logSink := make(chan LogEvent)
2014-05-11 16:18:55 +00:00
if *logdir == "" {
// Dummy logger
go func() {
2014-08-09 12:42:19 +00:00
for _ = range logSink {
2014-05-11 16:18:55 +00:00
}
}()
} else {
if !path.IsAbs(*logdir) {
log.Fatalln("Need absolute path for logdir")
return
}
2014-08-09 12:42:19 +00:00
go Logger(*logdir, logSink)
2014-05-11 16:18:55 +00:00
log.Println(*logdir, "logger initialized")
}
2014-08-09 12:42:19 +00:00
stateSink := make(chan StateEvent)
daemon := NewDaemon(version, hostname, motd, passwords, logSink, stateSink)
2014-06-08 00:49:27 +00:00
daemon.Verbose = *verbose
log.Println("goircd " + daemon.version + " is starting")
2014-05-11 16:18:55 +00:00
if *statedir == "" {
// Dummy statekeeper
go func() {
2014-08-09 12:42:19 +00:00
for _ = range stateSink {
2014-05-11 16:18:55 +00:00
}
}()
} else {
if !path.IsAbs(*statedir) {
log.Fatalln("Need absolute path for statedir")
}
2014-06-08 01:16:33 +00:00
states, err := filepath.Glob(path.Join(*statedir, "#*"))
2014-05-11 16:18:55 +00:00
if err != nil {
log.Fatalln("Can not read statedir", err)
}
for _, state := range states {
2014-06-08 01:16:33 +00:00
buf, err := ioutil.ReadFile(state)
2014-05-11 16:18:55 +00:00
if err != nil {
2014-06-08 01:16:33 +00:00
log.Fatalf("Can not read state %s: %v", state, err)
2014-05-11 16:18:55 +00:00
}
room, _ := daemon.RoomRegister(path.Base(state))
contents := strings.Split(string(buf), "\n")
2014-06-08 01:16:33 +00:00
if len(contents) < 2 {
log.Printf("State corrupted for %s: %q", room.name, contents)
} else {
room.topic = contents[0]
room.key = contents[1]
log.Println("Loaded state for room", room.name)
}
2014-05-11 16:18:55 +00:00
}
2014-08-09 12:42:19 +00:00
go StateKeeper(*statedir, stateSink)
2014-05-11 16:18:55 +00:00
log.Println(*statedir, "statekeeper initialized")
}
if *bind != "" {
listener, err := net.Listen("tcp", *bind)
2014-05-11 16:18:55 +00:00
if err != nil {
log.Fatalf("Can not listen on %s: %v", *bind, err)
2014-05-11 16:18:55 +00:00
}
log.Println("Raw listening on", *bind)
go listenerLoop(listener, events)
2014-05-11 16:18:55 +00:00
}
if *tlsBind != "" {
cert, err := tls.LoadX509KeyPair(*tlsPEM, *tlsPEM)
if err != nil {
log.Fatalf("Could not load TLS keys from %s: %s", *tlsPEM, err)
}
config := tls.Config{Certificates: []tls.Certificate{cert}}
listenerTLS, err := tls.Listen("tcp", *tlsBind, &config)
if err != nil {
log.Fatalf("Can not listen on %s: %v", *tlsBind, err)
}
log.Println("TLS listening on", *tlsBind)
go listenerLoop(listenerTLS, events)
}
daemon.Processor(events)
2014-05-11 16:18:55 +00:00
}
func main() {
flag.Parse()
Run()
}