You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

oragono.go 6.5KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2014-2015 Edmund Huber
  3. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  4. // released under the MIT license
  5. package main
  6. import (
  7. "fmt"
  8. "log"
  9. "math/rand"
  10. "strings"
  11. "syscall"
  12. "time"
  13. "github.com/docopt/docopt-go"
  14. "github.com/oragono/oragono/irc"
  15. cloak "github.com/oragono/oragono/irc/cloaking"
  16. "github.com/oragono/oragono/irc/logger"
  17. "github.com/oragono/oragono/mkcerts"
  18. stackimpact "github.com/stackimpact/stackimpact-go"
  19. "golang.org/x/crypto/ssh/terminal"
  20. )
  21. func main() {
  22. version := irc.SemVer
  23. usage := `oragono.
  24. Usage:
  25. oragono initdb [--conf <filename>] [--quiet]
  26. oragono upgradedb [--conf <filename>] [--quiet]
  27. oragono genpasswd [--conf <filename>] [--quiet]
  28. oragono genkeys
  29. oragono mkcerts [--conf <filename>] [--quiet]
  30. oragono run [--conf <filename>] [--quiet]
  31. oragono -h | --help
  32. oragono --version
  33. Options:
  34. --conf <filename> Configuration file to use [default: ircd.yaml].
  35. --quiet Don't show startup/shutdown lines.
  36. -h --help Show this screen.
  37. --version Show version.`
  38. arguments, _ := docopt.Parse(usage, nil, true, version, false)
  39. // load config and logger for everything but genkeys
  40. var err error
  41. configfile := arguments["--conf"].(string)
  42. var config *irc.Config
  43. var logman *logger.Manager
  44. if !arguments["genkeys"].(bool) {
  45. config, err = irc.LoadConfig(configfile)
  46. if err != nil {
  47. log.Fatal("Config file did not load successfully:", err.Error())
  48. }
  49. // assemble separate log configs
  50. var logConfigs []logger.Config
  51. for _, lConfig := range config.Logging {
  52. logConfigs = append(logConfigs, logger.Config{
  53. MethodStdout: lConfig.MethodStdout,
  54. MethodStderr: lConfig.MethodStderr,
  55. MethodFile: lConfig.MethodFile,
  56. Filename: lConfig.Filename,
  57. Level: lConfig.Level,
  58. Types: lConfig.Types,
  59. ExcludedTypes: lConfig.ExcludedTypes,
  60. })
  61. }
  62. logman, err = logger.NewManager(logConfigs...)
  63. if err != nil {
  64. log.Fatal("Logger did not load successfully:", err.Error())
  65. }
  66. }
  67. if arguments["genpasswd"].(bool) {
  68. fmt.Print("Enter Password: ")
  69. bytePassword, err := terminal.ReadPassword(int(syscall.Stdin))
  70. if err != nil {
  71. log.Fatal("Error reading password:", err.Error())
  72. }
  73. password := string(bytePassword)
  74. encoded, err := irc.GenerateEncodedPassword(password)
  75. if err != nil {
  76. log.Fatal("encoding error:", err.Error())
  77. }
  78. fmt.Print("\n")
  79. fmt.Println(encoded)
  80. } else if arguments["genkeys"].(bool) {
  81. fmt.Println("Here are your cloak keys:")
  82. // generate IPv4 keys
  83. keyA, err := cloak.GenerateCloakKey()
  84. if err != nil {
  85. log.Fatal("Error generating cloak keys:", err)
  86. }
  87. keyB, err := cloak.GenerateCloakKey()
  88. if err != nil {
  89. log.Fatal("Error generating cloak keys:", err)
  90. }
  91. keyC, err := cloak.GenerateCloakKey()
  92. if err != nil {
  93. log.Fatal("Error generating cloak keys:", err)
  94. }
  95. keyD, err := cloak.GenerateCloakKey()
  96. if err != nil {
  97. log.Fatal("Error generating cloak keys:", err)
  98. }
  99. fmt.Println(fmt.Sprintf(`ipv4-keys: ["%s", "%s", "%s", "%s"]`, keyA, keyB, keyC, keyD))
  100. // generate IPv6 keys
  101. keyA, err = cloak.GenerateCloakKey()
  102. if err != nil {
  103. log.Fatal("Error generating cloak keys:", err)
  104. }
  105. keyB, err = cloak.GenerateCloakKey()
  106. if err != nil {
  107. log.Fatal("Error generating cloak keys:", err)
  108. }
  109. keyC, err = cloak.GenerateCloakKey()
  110. if err != nil {
  111. log.Fatal("Error generating cloak keys:", err)
  112. }
  113. keyD, err = cloak.GenerateCloakKey()
  114. if err != nil {
  115. log.Fatal("Error generating cloak keys:", err)
  116. }
  117. keyE, err := cloak.GenerateCloakKey()
  118. if err != nil {
  119. log.Fatal("Error generating cloak keys:", err)
  120. }
  121. keyF, err := cloak.GenerateCloakKey()
  122. if err != nil {
  123. log.Fatal("Error generating cloak keys:", err)
  124. }
  125. keyG, err := cloak.GenerateCloakKey()
  126. if err != nil {
  127. log.Fatal("Error generating cloak keys:", err)
  128. }
  129. keyH, err := cloak.GenerateCloakKey()
  130. if err != nil {
  131. log.Fatal("Error generating cloak keys:", err)
  132. }
  133. fmt.Println(fmt.Sprintf(`ipv6-keys: ["%s", "%s", "%s", "%s", "%s", "%s", "%s", "%s"]`, keyA, keyB, keyC, keyD, keyE, keyF, keyG, keyH))
  134. } else if arguments["initdb"].(bool) {
  135. irc.InitDB(config.Datastore.Path)
  136. if !arguments["--quiet"].(bool) {
  137. log.Println("database initialized: ", config.Datastore.Path)
  138. }
  139. } else if arguments["upgradedb"].(bool) {
  140. irc.UpgradeDB(config.Datastore.Path)
  141. if !arguments["--quiet"].(bool) {
  142. log.Println("database upgraded: ", config.Datastore.Path)
  143. }
  144. } else if arguments["mkcerts"].(bool) {
  145. if !arguments["--quiet"].(bool) {
  146. log.Println("making self-signed certificates")
  147. }
  148. for name, conf := range config.Server.TLSListeners {
  149. log.Printf(" making cert for %s listener\n", name)
  150. host := config.Server.Name
  151. err := mkcerts.CreateCert("Oragono", host, conf.Cert, conf.Key)
  152. if err == nil {
  153. if !arguments["--quiet"].(bool) {
  154. log.Printf(" Certificate created at %s : %s\n", conf.Cert, conf.Key)
  155. }
  156. } else {
  157. log.Fatal(" Could not create certificate:", err.Error())
  158. }
  159. }
  160. } else if arguments["run"].(bool) {
  161. rand.Seed(time.Now().UTC().UnixNano())
  162. if !arguments["--quiet"].(bool) {
  163. logman.Info("startup", fmt.Sprintf("Oragono v%s starting", irc.SemVer))
  164. }
  165. // profiling
  166. if config.Debug.StackImpact.Enabled {
  167. if config.Debug.StackImpact.AgentKey == "" || config.Debug.StackImpact.AppName == "" {
  168. logman.Error("startup", "Could not start StackImpact - agent-key or app-name are undefined")
  169. return
  170. }
  171. agent := stackimpact.NewAgent()
  172. agent.Start(stackimpact.Options{AgentKey: config.Debug.StackImpact.AgentKey, AppName: config.Debug.StackImpact.AppName})
  173. defer agent.RecordPanic()
  174. logman.Info("startup", fmt.Sprintf("StackImpact profiling started as %s", config.Debug.StackImpact.AppName))
  175. }
  176. // warning if running a non-final version
  177. if strings.Contains(irc.SemVer, "unreleased") {
  178. logman.Warning("startup", "You are currently running an unreleased beta version of Oragono that may be unstable and could corrupt your database.\nIf you are running a production network, please download the latest build from https://oragono.io/downloads.html and run that instead.")
  179. }
  180. server, err := irc.NewServer(configfile, config, logman)
  181. if err != nil {
  182. logman.Error("startup", fmt.Sprintf("Could not load server: %s", err.Error()))
  183. return
  184. }
  185. if !arguments["--quiet"].(bool) {
  186. logman.Info("startup", "Server running")
  187. defer logman.Info("shutdown", fmt.Sprintf("Oragono v%s exiting", irc.SemVer))
  188. }
  189. server.Run()
  190. }
  191. }