2013-08-23 01:03:37 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"flag"
|
|
|
|
"log"
|
2013-08-23 22:59:33 +00:00
|
|
|
"os"
|
|
|
|
"strings"
|
2013-08-23 01:03:37 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
|
|
|
|
tlsKeyFile := flag.String("tls-key", "tls.key", "The private key file used for TLS")
|
|
|
|
tlsCertFile := flag.String("tls-cert", "tls.crt", "The certificate file used for TLS")
|
|
|
|
|
|
|
|
ircAddress := flag.String("irc-address", ":6697", "The address:port to bind to and listen for clients on")
|
|
|
|
|
|
|
|
serverName := flag.String("irc-servername", "rosella", "Server name displayed to clients")
|
|
|
|
|
2013-08-24 06:49:16 +00:00
|
|
|
authFile := flag.String("irc-authfile", "", "File containing usernames and passwords of operators.")
|
2013-08-23 22:59:33 +00:00
|
|
|
|
2013-08-23 01:03:37 +00:00
|
|
|
flag.Parse()
|
|
|
|
|
|
|
|
log.Printf("Rosella Initialising.")
|
|
|
|
|
|
|
|
//Init rosella itself
|
2013-08-23 14:23:27 +00:00
|
|
|
server := NewServer()
|
2013-08-23 01:03:37 +00:00
|
|
|
server.name = *serverName
|
2013-08-23 22:59:33 +00:00
|
|
|
|
|
|
|
if *authFile != "" {
|
|
|
|
log.Printf("Loading auth file: %q", *authFile)
|
|
|
|
|
|
|
|
f, err := os.Open(*authFile)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
data := make([]byte, 1024)
|
|
|
|
size, err := f.Read(data)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
lines := strings.Split(string(data[:size]), "\n")
|
|
|
|
for _, line := range lines {
|
|
|
|
if strings.HasPrefix(line, "#") {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
fields := strings.Fields(line)
|
|
|
|
|
|
|
|
if len(fields) == 2 {
|
|
|
|
server.operatorMap[fields[0]] = fields[1]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-08-23 14:23:27 +00:00
|
|
|
server.Run()
|
2013-08-23 01:03:37 +00:00
|
|
|
|
|
|
|
tlsConfig := new(tls.Config)
|
|
|
|
|
|
|
|
cert, err := tls.LoadX509KeyPair(*tlsCertFile, *tlsKeyFile)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Error loading tls certificate and key files.")
|
|
|
|
log.Printf(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("Loaded certificate and key successfully.")
|
|
|
|
|
|
|
|
tlsConfig.Certificates = []tls.Certificate{cert}
|
|
|
|
|
|
|
|
//Fills out tlsConfig.NameToCertificate
|
|
|
|
tlsConfig.BuildNameToCertificate()
|
|
|
|
|
|
|
|
tlsListener, err := tls.Listen("tcp", *ircAddress, tlsConfig)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Could not open tls listener.")
|
|
|
|
log.Printf(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("Listening on %s", *ircAddress)
|
|
|
|
|
|
|
|
for {
|
|
|
|
conn, err := tlsListener.Accept()
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Error accepting connection.")
|
|
|
|
log.Printf(err.Error())
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
server.HandleConnection(conn)
|
|
|
|
}
|
|
|
|
}
|