ircd/irc/config.go

162 lines
3.9 KiB
Go
Raw Normal View History

// Copyright (c) 2012-2014 Jeremy Latt
// Copyright (c) 2014-2015 Edmund Huber
// Copyright (c) 2016- Daniel Oaks <daniel@danieloaks.net>
// released under the MIT license
2014-02-09 15:53:42 +00:00
package irc
import (
"crypto/tls"
"errors"
"io/ioutil"
2014-02-24 06:21:39 +00:00
"log"
"gopkg.in/yaml.v2"
2014-02-09 15:53:42 +00:00
)
type PassConfig struct {
Password string
}
// TLSListenConfig defines configuration options for listening on TLS
type TLSListenConfig struct {
Cert string
Key string
}
// Certificate returns the TLS certificate assicated with this TLSListenConfig
func (conf *TLSListenConfig) Config() (*tls.Config, error) {
cert, err := tls.LoadX509KeyPair(conf.Cert, conf.Key)
if err != nil {
return nil, errors.New("tls cert+key: invalid pair")
}
return &tls.Config{
Certificates: []tls.Certificate{cert},
}, err
}
func (conf *PassConfig) PasswordBytes() []byte {
bytes, err := DecodePassword(conf.Password)
2014-02-24 06:21:39 +00:00
if err != nil {
2014-03-06 07:07:55 +00:00
log.Fatal("decode password error: ", err)
2014-02-24 06:21:39 +00:00
}
return bytes
}
type AccountRegistrationConfig struct {
Enabled bool
EnabledCallbacks []string `yaml:"enabled-callbacks"`
Callbacks struct {
Mailto struct {
Server string
Port int
TLS struct {
Enabled bool
InsecureSkipVerify bool `yaml:"insecure_skip_verify"`
ServerName string `yaml:"servername"`
}
Username string
Password string
Sender string
VerifyMessageSubject string `yaml:"verify-message-subject"`
VerifyMessage string `yaml:"verify-message"`
}
}
}
2014-02-09 15:53:42 +00:00
type Config struct {
2016-04-12 05:44:00 +00:00
Network struct {
Name string
}
Server struct {
PassConfig
2016-06-28 06:06:17 +00:00
Password string
Name string
Listen []string
Wslisten string `yaml:"ws-listen"`
TLSListeners map[string]*TLSListenConfig `yaml:"tls-listeners"`
CheckIdent bool `yaml:"check-ident"`
Log string
MOTD string
ProxyAllowedFrom []string `yaml:"proxy-allowed-from"`
}
Datastore struct {
Path string
}
Registration struct {
Accounts AccountRegistrationConfig
}
Operator map[string]*PassConfig
2014-03-13 08:55:46 +00:00
Limits struct {
NickLen int `yaml:"nicklen"`
ChannelLen int `yaml:"channellen"`
2016-09-12 02:40:09 +00:00
AwayLen int `yaml:"awaylen"`
2016-09-12 02:22:50 +00:00
KickLen int `yaml:"kicklen"`
TopicLen int `yaml:"topiclen"`
WhowasEntries uint `yaml:"whowas-entries"`
}
2014-02-24 06:21:39 +00:00
}
2014-03-09 20:45:36 +00:00
func (conf *Config) Operators() map[Name][]byte {
operators := make(map[Name][]byte)
for name, opConf := range conf.Operator {
2014-03-09 20:45:36 +00:00
operators[NewName(name)] = opConf.PasswordBytes()
}
return operators
}
func (conf *Config) TLSListeners() map[Name]*tls.Config {
tlsListeners := make(map[Name]*tls.Config)
for s, tlsListenersConf := range conf.Server.TLSListeners {
config, err := tlsListenersConf.Config()
if err != nil {
log.Fatal(err)
}
tlsListeners[NewName(s)] = config
}
return tlsListeners
}
2014-02-24 06:21:39 +00:00
func LoadConfig(filename string) (config *Config, err error) {
data, err := ioutil.ReadFile(filename)
2014-02-09 15:53:42 +00:00
if err != nil {
return nil, err
2014-02-09 15:53:42 +00:00
}
err = yaml.Unmarshal(data, &config)
if err != nil {
return nil, err
}
2016-06-28 06:06:17 +00:00
// we need this so PasswordBytes returns the correct info
if config.Server.Password != "" {
config.Server.PassConfig.Password = config.Server.Password
}
2016-04-12 05:44:00 +00:00
if config.Network.Name == "" {
return nil, errors.New("Network name missing")
}
if config.Server.Name == "" {
return nil, errors.New("Server name missing")
}
if !IsHostname(config.Server.Name) {
return nil, errors.New("Server name must match the format of a hostname")
}
2016-08-19 13:21:52 +00:00
if config.Datastore.Path == "" {
return nil, errors.New("Datastore path missing")
}
if len(config.Server.Listen) == 0 {
return nil, errors.New("Server listening addresses missing")
2014-02-10 21:52:28 +00:00
}
2016-09-12 02:40:09 +00:00
if config.Limits.NickLen < 1 || config.Limits.ChannelLen < 2 || config.Limits.AwayLen < 1 || config.Limits.TopicLen < 1 || config.Limits.TopicLen < 1 {
return nil, errors.New("Limits aren't setup properly, check them and make them sane")
}
return config, nil
2014-02-09 15:53:42 +00:00
}