2023-05-18 20:02:57 +00:00
|
|
|
#![feature(result_option_inspect)]
|
|
|
|
|
2023-05-11 12:19:36 +00:00
|
|
|
use clap::Parser;
|
|
|
|
use futures::stream::StreamExt;
|
|
|
|
use signal_hook_tokio::Signals;
|
2023-05-15 19:18:33 +00:00
|
|
|
use tokio::select;
|
|
|
|
use tokio::time;
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-15 15:42:32 +00:00
|
|
|
use std::convert::Infallible;
|
2023-05-12 09:17:15 +00:00
|
|
|
use std::net::SocketAddr;
|
2023-05-11 12:19:36 +00:00
|
|
|
use std::path;
|
2023-05-12 09:17:15 +00:00
|
|
|
use std::str::FromStr;
|
2023-05-15 15:42:32 +00:00
|
|
|
use std::sync;
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-18 20:02:57 +00:00
|
|
|
use domiply::domain::acme::manager::Manager as AcmeManager;
|
2023-05-17 12:37:23 +00:00
|
|
|
use domiply::domain::manager::Manager;
|
2023-05-15 19:18:33 +00:00
|
|
|
|
2023-05-11 12:19:36 +00:00
|
|
|
#[derive(Parser, Debug)]
|
|
|
|
#[command(version)]
|
2023-05-13 14:39:54 +00:00
|
|
|
#[command(about = "A domiply to another dimension")]
|
2023-05-11 12:19:36 +00:00
|
|
|
struct Cli {
|
2023-05-18 20:02:57 +00:00
|
|
|
#[arg(long, required = true, env = "DOMIPLY_HTTP_DOMAIN")]
|
|
|
|
http_domain: String,
|
|
|
|
|
2023-05-15 16:23:53 +00:00
|
|
|
#[arg(long, default_value_t = SocketAddr::from_str("[::]:3030").unwrap(), env = "DOMIPLY_HTTP_LISTEN_ADDR")]
|
2023-05-12 09:17:15 +00:00
|
|
|
http_listen_addr: SocketAddr,
|
|
|
|
|
2023-05-18 20:02:57 +00:00
|
|
|
#[arg(
|
|
|
|
long,
|
|
|
|
help = "E.g. '[::]:443', if given then SSL certs will automatically be retrieved for all domains using LetsEncrypt",
|
|
|
|
env = "DOMIPLY_HTTPS_LISTEN_ADDR"
|
|
|
|
)]
|
|
|
|
https_listen_addr: Option<SocketAddr>,
|
2023-05-15 18:25:07 +00:00
|
|
|
|
2023-05-13 14:39:54 +00:00
|
|
|
#[arg(long, required = true, env = "DOMIPLY_PASSPHRASE")]
|
2023-05-12 16:17:23 +00:00
|
|
|
passphrase: String,
|
|
|
|
|
2023-05-13 14:39:54 +00:00
|
|
|
#[arg(long, required = true, env = "DOMIPLY_ORIGIN_STORE_GIT_DIR_PATH")]
|
2023-05-12 13:19:24 +00:00
|
|
|
origin_store_git_dir_path: path::PathBuf,
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-15 20:16:29 +00:00
|
|
|
#[arg(long, required = true, env = "DOMIPLY_DOMAIN_CHECKER_TARGET_A")]
|
|
|
|
domain_checker_target_a: std::net::Ipv4Addr,
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-13 14:39:54 +00:00
|
|
|
#[arg(long, default_value_t = String::from("1.1.1.1:53"), env = "DOMIPLY_DOMAIN_CHECKER_RESOLVER_ADDR")]
|
2023-05-11 12:19:36 +00:00
|
|
|
domain_checker_resolver_addr: String,
|
|
|
|
|
2023-05-13 14:39:54 +00:00
|
|
|
#[arg(long, required = true, env = "DOMIPLY_DOMAIN_CONFIG_STORE_DIR_PATH")]
|
2023-05-12 13:19:24 +00:00
|
|
|
domain_config_store_dir_path: path::PathBuf,
|
2023-05-18 20:02:57 +00:00
|
|
|
|
|
|
|
#[arg(long, required = true, env = "DOMIPLY_DOMAIN_ACME_STORE_DIR_PATH")]
|
|
|
|
domain_acme_store_dir_path: path::PathBuf,
|
|
|
|
|
|
|
|
#[arg(long, required = true, env = "DOMIPLY_DOMAIN_ACME_CONTACT_EMAIL")]
|
|
|
|
domain_acme_contact_email: String,
|
2023-05-11 12:19:36 +00:00
|
|
|
}
|
|
|
|
|
2023-05-14 09:18:36 +00:00
|
|
|
fn main() {
|
2023-05-11 12:19:36 +00:00
|
|
|
let config = Cli::parse();
|
|
|
|
|
2023-05-14 09:18:36 +00:00
|
|
|
let tokio_runtime = std::sync::Arc::new(
|
|
|
|
tokio::runtime::Builder::new_multi_thread()
|
|
|
|
.enable_all()
|
|
|
|
.build()
|
|
|
|
.unwrap(),
|
|
|
|
);
|
|
|
|
|
2023-05-15 19:18:33 +00:00
|
|
|
let canceller = tokio_runtime.block_on(async { tokio_util::sync::CancellationToken::new() });
|
2023-05-14 09:18:36 +00:00
|
|
|
|
2023-05-15 19:18:33 +00:00
|
|
|
{
|
|
|
|
let canceller = canceller.clone();
|
|
|
|
tokio_runtime.spawn(async move {
|
2023-05-16 14:20:01 +00:00
|
|
|
let mut signals =
|
|
|
|
Signals::new(signal_hook::consts::TERM_SIGNALS).expect("initialized signals");
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-16 14:20:01 +00:00
|
|
|
if (signals.next().await).is_some() {
|
2023-05-15 19:18:33 +00:00
|
|
|
println!("Gracefully shutting down...");
|
|
|
|
canceller.cancel();
|
|
|
|
}
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-16 14:20:01 +00:00
|
|
|
if (signals.next().await).is_some() {
|
2023-05-15 19:18:33 +00:00
|
|
|
println!("Forcefully shutting down");
|
|
|
|
std::process::exit(1);
|
|
|
|
};
|
|
|
|
});
|
|
|
|
}
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-13 14:39:54 +00:00
|
|
|
let origin_store = domiply::origin::store::git::new(config.origin_store_git_dir_path)
|
2023-05-11 12:19:36 +00:00
|
|
|
.expect("git origin store initialized");
|
|
|
|
|
2023-05-17 12:37:23 +00:00
|
|
|
let domain_checker = domiply::domain::checker::new(
|
|
|
|
tokio_runtime.clone(),
|
|
|
|
config.domain_checker_target_a,
|
|
|
|
&config.domain_checker_resolver_addr,
|
|
|
|
)
|
|
|
|
.expect("domain checker initialized");
|
|
|
|
|
|
|
|
let domain_config_store = domiply::domain::config::new(&config.domain_config_store_dir_path)
|
|
|
|
.expect("domain config store initialized");
|
|
|
|
|
2023-05-18 20:02:57 +00:00
|
|
|
let domain_acme_manager = config.https_listen_addr.and_then(|_addr| {
|
|
|
|
let domain_acme_store =
|
|
|
|
domiply::domain::acme::store::new(&config.domain_acme_store_dir_path)
|
|
|
|
.expect("domain acme store initialized");
|
|
|
|
|
|
|
|
let domain_acme_manager = tokio_runtime.block_on(async {
|
|
|
|
domiply::domain::acme::manager::new(
|
|
|
|
domain_acme_store,
|
|
|
|
&config.domain_acme_contact_email,
|
|
|
|
)
|
|
|
|
.await
|
|
|
|
.expect("domain acme manager initialized")
|
|
|
|
});
|
|
|
|
|
|
|
|
Some(domain_acme_manager)
|
|
|
|
});
|
|
|
|
|
|
|
|
let manager = domiply::domain::manager::new(
|
|
|
|
origin_store,
|
|
|
|
domain_config_store,
|
|
|
|
domain_checker,
|
|
|
|
domain_acme_manager.clone(),
|
|
|
|
);
|
2023-05-17 12:37:23 +00:00
|
|
|
|
2023-05-15 19:18:33 +00:00
|
|
|
let origin_syncer_handler = {
|
2023-05-17 12:37:23 +00:00
|
|
|
let manager = manager.clone();
|
2023-05-15 19:18:33 +00:00
|
|
|
let canceller = canceller.clone();
|
|
|
|
|
|
|
|
tokio_runtime.spawn(async move {
|
|
|
|
let mut interval = time::interval(time::Duration::from_secs(20 * 60));
|
|
|
|
|
|
|
|
loop {
|
|
|
|
select! {
|
2023-05-17 12:37:23 +00:00
|
|
|
_ = interval.tick() => (),
|
2023-05-15 19:18:33 +00:00
|
|
|
_ = canceller.cancelled() => return,
|
|
|
|
}
|
|
|
|
|
2023-05-17 12:37:23 +00:00
|
|
|
let errors_iter = manager.sync_all_origins();
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-17 12:37:23 +00:00
|
|
|
if let Err(err) = errors_iter {
|
|
|
|
println!("Got error calling sync_all_origins: {err}");
|
|
|
|
continue;
|
|
|
|
}
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-17 12:37:23 +00:00
|
|
|
errors_iter
|
|
|
|
.unwrap()
|
|
|
|
.into_iter()
|
|
|
|
.for_each(|(descr, err)| match descr {
|
|
|
|
None => println!("error while syncing unknown descr: {err}"),
|
|
|
|
Some(descr) => println!("failed to sync {descr:?}: {err}"),
|
|
|
|
});
|
|
|
|
}
|
|
|
|
})
|
|
|
|
};
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-13 14:39:54 +00:00
|
|
|
let service = domiply::service::new(
|
2023-05-12 16:17:23 +00:00
|
|
|
manager,
|
2023-05-15 20:16:29 +00:00
|
|
|
config.domain_checker_target_a,
|
2023-05-12 16:17:23 +00:00
|
|
|
config.passphrase,
|
2023-05-15 20:16:29 +00:00
|
|
|
config.http_domain.clone(),
|
2023-05-15 15:42:32 +00:00
|
|
|
);
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-15 15:42:32 +00:00
|
|
|
let service = sync::Arc::new(service);
|
|
|
|
|
|
|
|
let make_service =
|
|
|
|
hyper::service::make_service_fn(move |_conn: &hyper::server::conn::AddrStream| {
|
|
|
|
let service = service.clone();
|
|
|
|
|
|
|
|
// Create a `Service` for responding to the request.
|
|
|
|
let service = hyper::service::service_fn(move |req| {
|
|
|
|
domiply::service::handle_request(service.clone(), req)
|
2023-05-14 09:18:36 +00:00
|
|
|
});
|
2023-05-11 12:19:36 +00:00
|
|
|
|
2023-05-15 15:42:32 +00:00
|
|
|
// Return the service to hyper.
|
|
|
|
async move { Ok::<_, Infallible>(service) }
|
|
|
|
});
|
|
|
|
|
2023-05-15 19:18:33 +00:00
|
|
|
let server_handler = {
|
2023-05-18 20:02:57 +00:00
|
|
|
let http_domain = config.http_domain.clone();
|
|
|
|
|
2023-05-15 19:18:33 +00:00
|
|
|
tokio_runtime.spawn(async move {
|
|
|
|
let addr = config.http_listen_addr;
|
2023-05-15 15:42:32 +00:00
|
|
|
|
2023-05-18 20:02:57 +00:00
|
|
|
println!("Listening on http://{}:{}", http_domain, addr.port());
|
2023-05-15 19:18:33 +00:00
|
|
|
let server = hyper::Server::bind(&addr).serve(make_service);
|
2023-05-15 15:42:32 +00:00
|
|
|
|
2023-05-15 19:18:33 +00:00
|
|
|
let graceful = server.with_graceful_shutdown(async {
|
|
|
|
canceller.cancelled().await;
|
|
|
|
});
|
|
|
|
|
|
|
|
if let Err(e) = graceful.await {
|
|
|
|
panic!("server error: {}", e);
|
|
|
|
};
|
|
|
|
})
|
|
|
|
};
|
2023-05-15 15:42:32 +00:00
|
|
|
|
2023-05-18 20:02:57 +00:00
|
|
|
// if there's an acme manager then it means that https is enabled, and we should ensure that
|
|
|
|
// the http domain for domiply itself has a valid certificate.
|
|
|
|
if let Some(domain_acme_manager) = domain_acme_manager {
|
|
|
|
let domain = domiply::domain::Name::from_str(&config.http_domain)
|
|
|
|
.expect("--http-domain parses as a domain");
|
|
|
|
|
|
|
|
tokio_runtime.spawn(async move {
|
|
|
|
_ = domain_acme_manager
|
|
|
|
.sync_domain(domain.clone())
|
|
|
|
.await
|
|
|
|
.inspect_err(|err| {
|
|
|
|
println!("Error while getting cert for {}: {err}", domain.as_str())
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2023-05-15 19:18:33 +00:00
|
|
|
tokio_runtime
|
|
|
|
.block_on(async { futures::try_join!(origin_syncer_handler, server_handler) })
|
|
|
|
.unwrap();
|
2023-05-11 12:19:36 +00:00
|
|
|
|
|
|
|
println!("Graceful shutdown complete");
|
|
|
|
}
|