1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
#![forbid(unsafe_code)]
#![warn(clippy::all, rust_2018_idioms)]
#![allow(clippy::filter_map, clippy::find_map, clippy::shadow_unrelated, clippy::use_self)]
pub use crate::config::Config;
pub use crate::state::State;
use std::{env, process};
pub mod auth;
mod channel;
mod client;
pub mod config;
mod lines;
pub mod message;
pub mod modes;
mod net;
mod state;
mod util;
pub fn start() {
let matches = clap::App::new(env!("CARGO_PKG_NAME"))
.version(env!("CARGO_PKG_VERSION"))
.author(env!("CARGO_PKG_AUTHORS"))
.about(env!("CARGO_PKG_DESCRIPTION"))
.arg(clap::Arg::with_name("CONFIG_FILE")
.help("ellidri's configuration file")
.required(true))
.get_matches();
let config_path = matches.value_of("CONFIG_FILE").unwrap();
if cfg!(debug_assertions) {
env::set_var("RUST_BACKTRACE", "1");
}
let log_settings = env_logger::Env::new()
.filter_or("ELLIDRI_LOG", "ellidri=debug")
.write_style("ELLIDRI_LOG_STYLE");
env_logger::Builder::from_env(log_settings)
.format(|buf, r| {
use std::io::Write;
writeln!(buf, "[{:<5} {}] {}", r.level(), r.target(), r.args())
})
.init();
let cfg = Config::from_file(&config_path).unwrap_or_else(|err| {
log::error!("Failed to read {:?}: {}", config_path, err);
process::exit(1);
});
let sasl_backend = cfg.sasl_backend;
let auth_provider = auth::choose_provider(sasl_backend, cfg.db_url).unwrap_or_else(|err| {
log::warn!("Failed to initialize the {} SASL backend: {}", sasl_backend, err);
Box::new(auth::DummyProvider)
});
let mut runtime = runtime(cfg.workers);
let shared = State::new(cfg.state, auth_provider);
let mut store = net::TlsIdentityStore::default();
for config::Binding { address, tls_identity } in cfg.bindings {
if let Some(identity_path) = tls_identity {
let acceptor = store.acceptor(identity_path);
let server = net::listen_tls(address, shared.clone(), acceptor);
runtime.spawn(server);
} else {
let server = net::listen(address, shared.clone());
runtime.spawn(server);
}
}
runtime.block_on(infinite());
}
#[cfg(feature = "threads")]
fn runtime(workers: usize) -> tokio::runtime::Runtime {
let mut builder = tokio::runtime::Builder::new();
if workers != 0 {
builder.core_threads(workers);
}
builder
.threaded_scheduler()
.enable_io()
.build()
.unwrap_or_else(|err| {
log::error!("Failed to start the tokio runtime: {}", err);
process::exit(1);
})
}
#[cfg(not(feature = "threads"))]
fn runtime(_cfg: usize) -> tokio::runtime::Runtime {
tokio::runtime::Runtime::new()
.unwrap_or_else(|err| {
log::error!("Failed to start the tokio runtime: {}", err);
process::exit(1);
})
}
fn infinite() -> impl std::future::Future<Output=()> {
futures::future::poll_fn(|_| futures::task::Poll::Pending)
}