123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143 |
- // Copyright (c) 2012-2014 Jeremy Latt
- // Copyright (c) 2014-2015 Edmund Huber
- // Copyright (c) 2016- Daniel Oaks <daniel@danieloaks.net>
- // released under the MIT license
-
- package irc
-
- import (
- "crypto/tls"
- "errors"
- "io/ioutil"
- "log"
-
- "gopkg.in/yaml.v2"
- )
-
- type PassConfig struct {
- Password string
- }
-
- // TLSListenConfig defines configuration options for listening on TLS
- type TLSListenConfig struct {
- Cert string
- Key string
- }
-
- // Certificate returns the TLS certificate assicated with this TLSListenConfig
- func (conf *TLSListenConfig) Config() (*tls.Config, error) {
- cert, err := tls.LoadX509KeyPair(conf.Cert, conf.Key)
- if err != nil {
- return nil, errors.New("tls cert+key: invalid pair")
- }
-
- return &tls.Config{
- Certificates: []tls.Certificate{cert},
- }, err
- }
-
- func (conf *PassConfig) PasswordBytes() []byte {
- bytes, err := DecodePassword(conf.Password)
- if err != nil {
- log.Fatal("decode password error: ", err)
- }
- return bytes
- }
-
- type Config struct {
- Network struct {
- Name string
- }
-
- Server struct {
- PassConfig
- Password string
- Name string
- Database string
- Listen []string
- Wslisten string `yaml:"ws-listen"`
- TLSListeners map[string]*TLSListenConfig `yaml:"tls-listeners"`
- CheckIdent bool `yaml:"check-ident"`
- Log string
- MOTD string
- ProxyAllowedFrom []string `yaml:"proxy-allowed-from"`
- }
-
- Operator map[string]*PassConfig
-
- Theater map[string]*PassConfig
-
- Limits struct {
- NickLen int `yaml:"nicklen"`
- ChannelLen int `yaml:"channellen"`
- }
- }
-
- func (conf *Config) Operators() map[Name][]byte {
- operators := make(map[Name][]byte)
- for name, opConf := range conf.Operator {
- operators[NewName(name)] = opConf.PasswordBytes()
- }
- return operators
- }
-
- func (conf *Config) Theaters() map[Name][]byte {
- theaters := make(map[Name][]byte)
- for s, theaterConf := range conf.Theater {
- name := NewName(s)
- if !name.IsChannel() {
- log.Fatal("config uses a non-channel for a theater!")
- }
- theaters[name] = theaterConf.PasswordBytes()
- }
- return theaters
- }
-
- func (conf *Config) TLSListeners() map[Name]*tls.Config {
- tlsListeners := make(map[Name]*tls.Config)
- for s, tlsListenersConf := range conf.Server.TLSListeners {
- config, err := tlsListenersConf.Config()
- if err != nil {
- log.Fatal(err)
- }
- tlsListeners[NewName(s)] = config
- }
- return tlsListeners
- }
-
- func LoadConfig(filename string) (config *Config, err error) {
- data, err := ioutil.ReadFile(filename)
- if err != nil {
- return nil, err
- }
-
- err = yaml.Unmarshal(data, &config)
- if err != nil {
- return nil, err
- }
-
- // we need this so PasswordBytes returns the correct info
- if config.Server.Password != "" {
- config.Server.PassConfig.Password = config.Server.Password
- }
-
- if config.Network.Name == "" {
- return nil, errors.New("Network name missing")
- }
- if config.Server.Name == "" {
- return nil, errors.New("Server name missing")
- }
- if !IsHostname(config.Server.Name) {
- return nil, errors.New("Server name must match the format of a hostname")
- }
- if config.Server.Database == "" {
- return nil, errors.New("Server database missing")
- }
- if len(config.Server.Listen) == 0 {
- return nil, errors.New("Server listening addresses missing")
- }
- if config.Limits.NickLen < 1 || config.Limits.ChannelLen < 2 {
- return nil, errors.New("Limits aren't setup properly, check them and make them sane")
- }
- return config, nil
- }
|