nmdc-ircfrontend/main.go

121 lines
2.7 KiB
Go
Raw Normal View History

2013-08-23 01:03:37 +00:00
package main
import (
"crypto/tls"
"flag"
"log"
2013-08-23 22:59:33 +00:00
"os"
"strings"
2013-08-23 01:03:37 +00:00
)
2013-08-24 07:36:57 +00:00
var (
tlsKeyFile = flag.String("tls-key", "tls.key", "The private key file used for TLS")
tlsCertFile = flag.String("tls-cert", "tls.crt", "The certificate file used for TLS")
ircAddress = flag.String("irc-address", ":6697", "The address:port to bind to and listen for clients on")
serverName = flag.String("irc-servername", "rosella", "Server name displayed to clients")
authFile = flag.String("irc-authfile", "", "File containing usernames and passwords of operators.")
2013-09-08 21:56:43 +00:00
motdFile = flag.String("irc-motdfile", "", "File container motd to display to clients.")
2013-08-24 07:36:57 +00:00
)
2013-08-23 01:03:37 +00:00
2013-08-24 07:36:57 +00:00
func main() {
2013-08-23 22:59:33 +00:00
2013-08-23 01:03:37 +00:00
flag.Parse()
log.Println("Starting server...")
2013-08-23 01:03:37 +00:00
//Init rosella itself
2013-08-23 14:23:27 +00:00
server := NewServer()
2013-08-23 01:03:37 +00:00
server.name = *serverName
2013-08-23 22:59:33 +00:00
if *authFile != "" {
log.Printf("Loading auth file: %q", *authFile)
f, err := os.Open(*authFile)
if err != nil {
log.Fatal(err)
}
data := make([]byte, 1024)
size, err := f.Read(data)
if err != nil {
log.Fatal(err)
}
f.Close()
2013-08-23 22:59:33 +00:00
lines := strings.Split(string(data[:size]), "\n")
for _, line := range lines {
if i := strings.IndexRune(line, '#'); i > -1 {
line = line[:i]
2013-08-23 22:59:33 +00:00
}
fields := strings.Fields(line)
if len(fields) == 2 {
server.operatorMap[fields[0]] = []byte(fields[1])
2013-08-23 22:59:33 +00:00
}
}
}
2013-08-24 07:36:57 +00:00
2013-09-08 21:56:43 +00:00
if *motdFile != "" {
log.Printf("Loading motd file: %q", *motdFile)
f, err := os.Open(*motdFile)
if err != nil {
log.Fatal(err)
}
data := make([]byte, 1024)
size, err := f.Read(data)
if err != nil {
log.Fatal(err)
}
f.Close()
2013-09-08 21:56:43 +00:00
server.motd = string(data[:size])
}
2013-08-23 01:03:37 +00:00
tlsConfig := new(tls.Config)
tlsConfig.PreferServerCipherSuites = true
tlsConfig.CipherSuites = []uint16{
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
2013-08-30 00:29:02 +00:00
tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
tls.TLS_RSA_WITH_AES_128_CBC_SHA,
tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA}
2013-08-23 01:03:37 +00:00
cert, err := tls.LoadX509KeyPair(*tlsCertFile, *tlsKeyFile)
if err != nil {
log.Printf("Error loading tls certificate and key files.")
log.Printf(err.Error())
return
}
log.Printf("Loaded certificate and key successfully.")
tlsConfig.Certificates = []tls.Certificate{cert}
//Fills out tlsConfig.NameToCertificate
tlsConfig.BuildNameToCertificate()
tlsListener, err := tls.Listen("tcp", *ircAddress, tlsConfig)
if err != nil {
log.Printf("Could not open tls listener.")
log.Printf(err.Error())
return
}
go server.Run()
2013-08-23 01:03:37 +00:00
log.Printf("Listening on %s", *ircAddress)
for {
conn, err := tlsListener.Accept()
if err != nil {
log.Printf("Error accepting connection.")
log.Printf(err.Error())
continue
}
server.HandleConnection(conn)
}
}