This repository has been archived by the owner on Sep 3, 2021. It is now read-only.
/
server.go
124 lines (114 loc) · 3.5 KB
/
server.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
package rpc
import (
"context"
"crypto/tls"
"fmt"
"github.com/greboid/irc/irc"
grpcmiddleware "github.com/grpc-ecosystem/go-grpc-middleware"
grpcauth "github.com/grpc-ecosystem/go-grpc-middleware/auth"
"google.golang.org/grpc"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
"log"
"strings"
)
func NewGrpcServer(conn *irc.Connection, eventManager *irc.EventManager, rpcPort int, plugins []Plugin) GrpcServer {
return GrpcServer{
conn: conn,
eventManager: eventManager,
rpcPort: rpcPort,
plugins: plugins,
}
}
type GrpcServer struct {
conn *irc.Connection
eventManager *irc.EventManager
rpcPort int
plugins []Plugin
}
func (s *GrpcServer) StartGRPC() {
log.Print("Generating certificate")
certificate, err := generateSelfSignedCert()
if err != nil {
log.Fatalf("failed to generate certifcate: %s", err.Error())
}
log.Printf("Starting RPC: %d", s.rpcPort)
lis, err := tls.Listen("tcp", fmt.Sprintf(":%d", s.rpcPort), &tls.Config{Certificates: []tls.Certificate{*certificate}})
if err != nil {
log.Fatalf("failed to listen: %v", err)
}
grpcServer := grpc.NewServer(
grpc.StreamInterceptor(grpcmiddleware.ChainStreamServer(grpcauth.StreamServerInterceptor(s.authPlugin))),
grpc.UnaryInterceptor(grpcmiddleware.ChainUnaryServer(grpcauth.UnaryServerInterceptor(s.authPlugin))),
)
RegisterIRCPluginServer(grpcServer, &pluginServer{s.conn, s.eventManager})
err = grpcServer.Serve(lis)
if err != nil {
log.Printf("Error listening: %s", err.Error())
}
}
func (s *GrpcServer) authPlugin(ctx context.Context) (context.Context, error) {
token, err := grpcauth.AuthFromMD(ctx, "bearer")
if err != nil {
return nil, status.Errorf(codes.Unauthenticated, "invalid auth token: %s", err.Error())
}
if !s.checkPlugin(token) {
return nil, status.Errorf(codes.Unauthenticated, "access denied")
}
return ctx, nil
}
func (s *GrpcServer) checkPlugin(token string) bool {
for _, plugin := range s.plugins {
if plugin.Token == token {
return true
}
}
return false
}
type pluginServer struct {
conn irc.Sender
EventManager *irc.EventManager
}
func (ps *pluginServer) SendChannelMessage(_ context.Context, req *ChannelMessage) (*Error, error) {
ps.conn.SendRawf("PRIVMSG %s :%s", req.Channel, req.Message)
return &Error{
Message: "",
}, nil
}
func (*pluginServer) SendRawMessage(_ context.Context, _ *RawMessage) (*Error, error) {
return &Error{
Message: "",
}, nil
}
func (ps *pluginServer) GetMessages(channel *Channel, stream IRCPlugin_GetMessagesServer) error {
exitLoop := make(chan bool, 1)
chanMessage := make(chan *irc.Message, 1)
channelName := channel.Name
partHandler := func(channelPart irc.Channel) {
if channelPart.Name == channelName {
exitLoop <- true
}
}
messageHandler := func(message irc.Message) {
if channelName == "*" || strings.ToLower(message.Params[0]) == strings.ToLower(channelName) {
chanMessage <- &message
}
}
ps.EventManager.SubscribeChannelPart(partHandler)
defer ps.EventManager.UnsubscribeChannelPart(partHandler)
ps.EventManager.SubscribeChannelMessage(messageHandler)
defer ps.EventManager.UnsubscribeChannelMessage(messageHandler)
for {
select {
case <-exitLoop:
return nil
case msg := <-chanMessage:
if err := stream.Send(&ChannelMessage{Channel: strings.ToLower(msg.Params[0]), Message: strings.Join(msg.Params[1:], " "), Source: msg.Source}); err != nil {
return err
}
}
}
}
func (ps *pluginServer) Ping(context.Context, *Empty) (*Empty, error) {
return &Empty{}, nil
}