You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

oragono.go 4.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2014-2015 Edmund Huber
  3. // Copyright (c) 2016- Daniel Oaks <daniel@danieloaks.net>
  4. // released under the MIT license
  5. package main
  6. import (
  7. "crypto/ecdsa"
  8. "crypto/elliptic"
  9. "crypto/rand"
  10. "crypto/x509"
  11. "crypto/x509/pkix"
  12. "encoding/pem"
  13. "fmt"
  14. "log"
  15. "math/big"
  16. "net"
  17. "os"
  18. "syscall"
  19. "time"
  20. "github.com/DanielOaks/oragono/irc"
  21. "github.com/docopt/docopt-go"
  22. "golang.org/x/crypto/ssh/terminal"
  23. )
  24. func main() {
  25. version := irc.SEM_VER
  26. usage := `oragono.
  27. Usage:
  28. oragono initdb [--conf <filename>]
  29. oragono upgradedb [--conf <filename>]
  30. oragono genpasswd [--conf <filename>]
  31. oragono createcerts [--conf <filename>]
  32. oragono run [--conf <filename>]
  33. oragono -h | --help
  34. oragono --version
  35. Options:
  36. --conf <filename> Configuration file to use [default: ircd.yaml].
  37. -h --help Show this screen.
  38. --version Show version.`
  39. arguments, _ := docopt.Parse(usage, nil, true, version, false)
  40. configfile := arguments["--conf"].(string)
  41. config, err := irc.LoadConfig(configfile)
  42. if err != nil {
  43. log.Fatal("Config file did not load successfully:", err.Error())
  44. }
  45. if arguments["genpasswd"].(bool) {
  46. fmt.Print("Enter Password: ")
  47. bytePassword, err := terminal.ReadPassword(int(syscall.Stdin))
  48. if err != nil {
  49. log.Fatal("Error reading password:", err.Error())
  50. }
  51. password := string(bytePassword)
  52. encoded, err := irc.GenerateEncodedPassword(password)
  53. if err != nil {
  54. log.Fatalln("encoding error:", err)
  55. }
  56. fmt.Print("\n")
  57. fmt.Println(encoded)
  58. } else if arguments["initdb"].(bool) {
  59. irc.InitDB(config.Server.Database)
  60. log.Println("database initialized: ", config.Server.Database)
  61. } else if arguments["upgradedb"].(bool) {
  62. irc.UpgradeDB(config.Server.Database)
  63. log.Println("database upgraded: ", config.Server.Database)
  64. } else if arguments["createcerts"].(bool) {
  65. log.Println("creating self-signed certificates")
  66. for name, conf := range config.Server.TLSListeners {
  67. log.Printf(" creating cert for %s listener\n", name)
  68. host := config.Server.Name
  69. validFrom := time.Now()
  70. validFor := 365 * 24 * time.Hour
  71. notAfter := validFrom.Add(validFor)
  72. priv, err := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
  73. serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
  74. serialNumber, err := rand.Int(rand.Reader, serialNumberLimit)
  75. if err != nil {
  76. log.Fatalf("failed to generate serial number: %s", err)
  77. }
  78. template := x509.Certificate{
  79. SerialNumber: serialNumber,
  80. Subject: pkix.Name{
  81. Organization: []string{"Oragono"},
  82. },
  83. NotBefore: validFrom,
  84. NotAfter: notAfter,
  85. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
  86. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  87. BasicConstraintsValid: true,
  88. }
  89. // TODO: allow explicitly listing allowed addresses/names
  90. template.IPAddresses = append(template.IPAddresses, net.ParseIP("127.0.0.1"))
  91. template.IPAddresses = append(template.IPAddresses, net.ParseIP("::1"))
  92. template.DNSNames = append(template.DNSNames, host)
  93. template.DNSNames = append(template.DNSNames, "localhost")
  94. derBytes, err := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
  95. if err != nil {
  96. log.Fatalf("Failed to create certificate: %s", err)
  97. }
  98. certOut, err := os.Create(conf.Cert)
  99. if err != nil {
  100. log.Fatalf("failed to open %s for writing: %s", conf.Cert, err)
  101. }
  102. pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  103. certOut.Close()
  104. log.Printf(" wrote %s\n", conf.Cert)
  105. keyOut, err := os.OpenFile(conf.Key, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
  106. if err != nil {
  107. log.Print("failed to open %s for writing:", conf.Key, err)
  108. return
  109. }
  110. b, err := x509.MarshalECPrivateKey(priv)
  111. if err != nil {
  112. fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err)
  113. os.Exit(2)
  114. }
  115. pemBlock := pem.Block{Type: "EC PRIVATE KEY", Bytes: b}
  116. pem.Encode(keyOut, &pemBlock)
  117. keyOut.Close()
  118. log.Printf(" wrote %s\n", conf.Key)
  119. }
  120. } else if arguments["run"].(bool) {
  121. irc.Log.SetLevel(config.Server.Log)
  122. server := irc.NewServer(config)
  123. log.Println(irc.SEM_VER, "running")
  124. defer log.Println(irc.SEM_VER, "exiting")
  125. server.Run()
  126. }
  127. }