2016-06-15 21:50:56 +10:00
// Copyright (c) 2012-2014 Jeremy Latt
// Copyright (c) 2014-2015 Edmund Huber
2017-03-27 22:15:02 +10:00
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
2016-06-15 21:50:56 +10:00
// released under the MIT license
2014-02-08 13:18:11 -08:00
package main
import (
2019-02-03 07:21:46 +10:00
"bufio"
2014-02-23 22:21:39 -08:00
"fmt"
2014-02-09 07:53:42 -08:00
"log"
2019-02-03 07:21:46 +10:00
"os"
2017-07-01 07:07:48 +10:00
"strings"
2016-04-12 23:00:09 +10:00
"syscall"
2014-03-12 18:57:00 -07:00
2016-04-12 23:00:09 +10:00
"github.com/docopt/docopt-go"
2017-06-14 12:00:53 -06:00
"github.com/oragono/oragono/irc"
"github.com/oragono/oragono/irc/logger"
2018-02-04 05:34:26 +10:00
"github.com/oragono/oragono/irc/mkcerts"
2018-08-05 22:51:39 -04:00
"golang.org/x/crypto/bcrypt"
2016-04-12 23:00:09 +10:00
"golang.org/x/crypto/ssh/terminal"
)
2014-03-12 18:57:00 -07:00
2020-05-21 11:25:30 -04:00
// set via linker flags, either by make or by goreleaser:
var commit = "" // git hash
var version = "" // tagged version
2018-04-09 10:08:54 +10:00
2018-04-10 13:21:51 -04:00
// get a password from stdin from the user
func getPassword ( ) string {
2019-02-03 07:21:46 +10:00
fd := int ( os . Stdin . Fd ( ) )
if terminal . IsTerminal ( fd ) {
bytePassword , err := terminal . ReadPassword ( int ( syscall . Stdin ) )
if err != nil {
log . Fatal ( "Error reading password:" , err . Error ( ) )
}
return string ( bytePassword )
2018-04-10 13:21:51 -04:00
}
2019-02-03 07:21:46 +10:00
reader := bufio . NewReader ( os . Stdin )
text , _ := reader . ReadString ( '\n' )
2019-02-03 08:08:12 +10:00
return strings . TrimSpace ( text )
2018-04-10 13:21:51 -04:00
}
2019-09-11 20:15:34 -04:00
func fileDoesNotExist ( file string ) bool {
if _ , err := os . Stat ( file ) ; os . IsNotExist ( err ) {
return true
}
return false
}
2019-06-28 10:45:34 -04:00
// implements the `oragono mkcerts` command
func doMkcerts ( configFile string , quiet bool ) {
config , err := irc . LoadRawConfig ( configFile )
if err != nil {
log . Fatal ( err )
}
if ! quiet {
log . Println ( "making self-signed certificates" )
}
certToKey := make ( map [ string ] string )
for name , conf := range config . Server . Listeners {
if conf . TLS . Cert == "" {
continue
}
existingKey , ok := certToKey [ conf . TLS . Cert ]
if ok {
if existingKey == conf . TLS . Key {
continue
} else {
2019-09-11 20:15:34 -04:00
log . Fatal ( "Conflicting TLS key files for " , conf . TLS . Cert )
2019-06-28 10:45:34 -04:00
}
}
if ! quiet {
log . Printf ( " making cert for %s listener\n" , name )
}
host := config . Server . Name
cert , key := conf . TLS . Cert , conf . TLS . Key
2019-09-11 20:15:34 -04:00
if ! ( fileDoesNotExist ( cert ) && fileDoesNotExist ( key ) ) {
log . Fatalf ( "Preexisting TLS cert and/or key files: %s %s" , cert , key )
}
2019-06-28 10:45:34 -04:00
err := mkcerts . CreateCert ( "Oragono" , host , cert , key )
if err == nil {
if ! quiet {
log . Printf ( " Certificate created at %s : %s\n" , cert , key )
}
certToKey [ cert ] = key
} else {
log . Fatal ( " Could not create certificate:" , err . Error ( ) )
}
}
}
2016-04-12 23:00:09 +10:00
func main ( ) {
2020-05-21 11:25:30 -04:00
irc . SetVersionString ( version , commit )
2016-04-13 08:55:37 +10:00
usage := ` oragono .
2016-04-12 23:00:09 +10:00
Usage :
2016-09-19 22:30:45 +10:00
oragono initdb [ -- conf < filename > ] [ -- quiet ]
oragono upgradedb [ -- conf < filename > ] [ -- quiet ]
oragono genpasswd [ -- conf < filename > ] [ -- quiet ]
oragono mkcerts [ -- conf < filename > ] [ -- quiet ]
2020-03-24 09:53:04 -04:00
oragono run [ -- conf < filename > ] [ -- quiet ] [ -- smoke ]
2016-04-13 08:55:37 +10:00
oragono - h | -- help
oragono -- version
2016-04-12 23:00:09 +10:00
Options :
-- conf < filename > Configuration file to use [ default : ircd . yaml ] .
2016-09-19 22:30:45 +10:00
-- quiet Don ' t show startup / shutdown lines .
2016-04-12 23:00:09 +10:00
- h -- help Show this screen .
-- version Show version . `
2020-05-21 11:25:30 -04:00
arguments , _ := docopt . ParseArgs ( usage , nil , irc . Ver )
2016-04-12 23:00:09 +10:00
2020-05-08 01:16:49 -04:00
// don't require a config file for genpasswd
2016-04-12 23:00:09 +10:00
if arguments [ "genpasswd" ] . ( bool ) {
2019-02-03 07:21:46 +10:00
var password string
fd := int ( os . Stdin . Fd ( ) )
if terminal . IsTerminal ( fd ) {
fmt . Print ( "Enter Password: " )
password = getPassword ( )
fmt . Print ( "\n" )
fmt . Print ( "Reenter Password: " )
confirm := getPassword ( )
fmt . Print ( "\n" )
if confirm != password {
log . Fatal ( "passwords do not match" )
}
} else {
password = getPassword ( )
2016-04-12 23:00:09 +10:00
}
2018-08-05 22:51:39 -04:00
hash , err := bcrypt . GenerateFromPassword ( [ ] byte ( password ) , bcrypt . MinCost )
2014-03-01 15:10:04 -08:00
if err != nil {
2017-03-06 15:50:23 +10:00
log . Fatal ( "encoding error:" , err . Error ( ) )
2014-03-01 15:10:04 -08:00
}
2019-02-03 07:21:46 +10:00
fmt . Print ( string ( hash ) )
if terminal . IsTerminal ( fd ) {
fmt . Println ( )
}
2018-12-28 13:45:55 -05:00
return
2019-06-28 10:45:34 -04:00
} else if arguments [ "mkcerts" ] . ( bool ) {
doMkcerts ( arguments [ "--conf" ] . ( string ) , arguments [ "--quiet" ] . ( bool ) )
return
2018-12-28 13:45:55 -05:00
}
configfile := arguments [ "--conf" ] . ( string )
config , err := irc . LoadConfig ( configfile )
2020-05-06 05:53:45 -04:00
if err != nil {
_ , isCertError := err . ( * irc . CertKeyError )
if ! ( isCertError && arguments [ "mkcerts" ] . ( bool ) ) {
log . Fatal ( "Config file did not load successfully: " , err . Error ( ) )
}
2018-12-28 13:45:55 -05:00
}
logman , err := logger . NewManager ( config . Logging )
if err != nil {
log . Fatal ( "Logger did not load successfully:" , err . Error ( ) )
}
if arguments [ "initdb" ] . ( bool ) {
2016-09-17 21:23:04 +10:00
irc . InitDB ( config . Datastore . Path )
2016-09-19 22:30:45 +10:00
if ! arguments [ "--quiet" ] . ( bool ) {
log . Println ( "database initialized: " , config . Datastore . Path )
}
2016-04-12 23:00:09 +10:00
} else if arguments [ "upgradedb" ] . ( bool ) {
2018-04-16 16:28:31 -04:00
err = irc . UpgradeDB ( config )
if err != nil {
log . Fatal ( "Error while upgrading db:" , err . Error ( ) )
}
2016-09-19 22:30:45 +10:00
if ! arguments [ "--quiet" ] . ( bool ) {
log . Println ( "database upgraded: " , config . Datastore . Path )
}
2016-04-12 23:00:09 +10:00
} else if arguments [ "run" ] . ( bool ) {
2017-03-06 20:15:28 +10:00
if ! arguments [ "--quiet" ] . ( bool ) {
2020-05-21 11:25:30 -04:00
logman . Info ( "server" , fmt . Sprintf ( "%s starting" , irc . Ver ) )
2017-03-06 20:15:28 +10:00
}
2017-04-30 12:35:07 +10:00
2017-07-01 07:07:48 +10:00
// warning if running a non-final version
2020-05-21 11:25:30 -04:00
if strings . Contains ( irc . Ver , "unreleased" ) {
2019-02-02 21:12:17 -05:00
logman . Warning ( "server" , "You are currently running an unreleased beta version of Oragono that may be unstable and could corrupt your database.\nIf you are running a production network, please download the latest build from https://oragono.io/downloads.html and run that instead." )
2017-07-01 07:07:48 +10:00
}
2017-11-19 10:42:40 +10:00
server , err := irc . NewServer ( config , logman )
2017-03-06 15:50:23 +10:00
if err != nil {
2019-02-02 21:12:17 -05:00
logman . Error ( "server" , fmt . Sprintf ( "Could not load server: %s" , err . Error ( ) ) )
2019-02-02 21:15:41 -05:00
os . Exit ( 1 )
2016-11-06 13:47:13 +10:00
}
2016-09-19 22:30:45 +10:00
if ! arguments [ "--quiet" ] . ( bool ) {
2019-02-02 21:12:17 -05:00
logman . Info ( "server" , "Server running" )
defer logman . Info ( "server" , fmt . Sprintf ( "Oragono v%s exiting" , irc . SemVer ) )
2016-09-19 22:30:45 +10:00
}
2020-03-24 09:53:04 -04:00
if ! arguments [ "--smoke" ] . ( bool ) {
server . Run ( )
}
2014-03-12 18:57:00 -07:00
}
2014-02-08 13:18:11 -08:00
}