/* goircd -- minimalistic simple Internet Relay Chat (IRC) server Copyright (C) 2014-2016 Sergey Matveev This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ package main import ( "crypto/tls" "flag" "io/ioutil" "log" "net" "path" "path/filepath" "strings" "time" proxyproto "github.com/Freeaqingme/go-proxyproto" ) const ( PROXY_TIMEOUT = 5 ) var ( version string hostname = flag.String("hostname", "localhost", "Hostname") bind = flag.String("bind", ":6667", "Address to bind to") motd = flag.String("motd", "", "Path to MOTD file") logdir = flag.String("logdir", "", "Absolute path to directory for logs") statedir = flag.String("statedir", "", "Absolute path to directory for states") passwords = flag.String("passwords", "", "Optional path to passwords file") tlsBind = flag.String("tlsbind", "", "TLS address to bind to") tlsPEM = flag.String("tlspem", "", "Path to TLS certificat+key PEM file") proxyTimeout = flag.Uint("proxytimeout", PROXY_TIMEOUT, "Timeout when using proxy protocol") verbose = flag.Bool("v", false, "Enable verbose logging.") ) func listenerLoop(sock net.Listener, events chan ClientEvent) { for { conn, err := sock.Accept() if err != nil { log.Println("Error during accepting connection", err) continue } client := NewClient(conn) go client.Processor(events) } } func Run() { events := make(chan ClientEvent) log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile) if *logdir == "" { // Dummy logger go func() { for _ = range logSink { } }() } else { if !path.IsAbs(*logdir) { log.Fatalln("Need absolute path for logdir") } go Logger(*logdir, logSink) log.Println(*logdir, "logger initialized") } log.Println("goircd " + version + " is starting") if *statedir == "" { // Dummy statekeeper go func() { for _ = range stateSink { } }() } else { if !path.IsAbs(*statedir) { log.Fatalln("Need absolute path for statedir") } states, err := filepath.Glob(path.Join(*statedir, "#*")) if err != nil { log.Fatalln("Can not read statedir", err) } for _, state := range states { buf, err := ioutil.ReadFile(state) if err != nil { log.Fatalf("Can not read state %s: %v", state, err) } room, _ := RoomRegister(path.Base(state)) contents := strings.Split(string(buf), "\n") if len(contents) < 2 { log.Printf("State corrupted for %s: %q", *room.name, contents) } else { room.topic = &contents[0] room.key = &contents[1] log.Println("Loaded state for room", *room.name) } } go StateKeeper(*statedir, stateSink) log.Println(*statedir, "statekeeper initialized") } proxyTimeout := time.Duration(uint(*proxyTimeout)) * time.Second if *bind != "" { listener, err := net.Listen("tcp", *bind) if err != nil { log.Fatalf("Can not listen on %s: %v", *bind, err) } // Add PROXY-Protocol support listener = &proxyproto.Listener{Listener: listener, ProxyHeaderTimeout: proxyTimeout} log.Println("Raw listening on", *bind) go listenerLoop(listener, events) } if *tlsBind != "" { cert, err := tls.LoadX509KeyPair(*tlsPEM, *tlsPEM) if err != nil { log.Fatalf("Could not load TLS keys from %s: %s", *tlsPEM, err) } config := tls.Config{Certificates: []tls.Certificate{cert}} listenerTLS, err := net.Listen("tcp", *tlsBind) if err != nil { log.Fatalf("Can not listen on %s: %v", *tlsBind, err) } log.Println("TLS listening on", *tlsBind) // Add PROXY-Protocol support listenerTLS = &proxyproto.Listener{Listener: listenerTLS, ProxyHeaderTimeout: proxyTimeout} listenerTLS = tls.NewListener(listenerTLS, &config) go listenerLoop(listenerTLS, events) } Processor(events, make(chan struct{})) } func main() { flag.Parse() Run() }