domani/src/main.rs

319 lines
11 KiB
Rust
Raw Normal View History

#![feature(result_option_inspect)]
use clap::Parser;
2023-05-19 10:29:37 +00:00
use futures::stream::futures_unordered::FuturesUnordered;
use futures::stream::StreamExt;
use signal_hook_tokio::Signals;
2023-05-15 19:18:33 +00:00
use tokio::select;
use tokio::time;
use std::convert::Infallible;
use std::net::SocketAddr;
use std::path;
use std::str::FromStr;
use std::sync;
use domiply::domain::acme::manager::Manager as AcmeManager;
2023-05-17 12:37:23 +00:00
use domiply::domain::manager::Manager;
2023-05-15 19:18:33 +00:00
#[derive(Parser, Debug)]
#[command(version)]
2023-05-13 14:39:54 +00:00
#[command(about = "A domiply to another dimension")]
struct Cli {
#[arg(long, required = true, env = "DOMIPLY_HTTP_DOMAIN")]
2023-05-19 10:36:01 +00:00
http_domain: domiply::domain::Name,
2023-05-15 16:23:53 +00:00
#[arg(long, default_value_t = SocketAddr::from_str("[::]:3030").unwrap(), env = "DOMIPLY_HTTP_LISTEN_ADDR")]
http_listen_addr: SocketAddr,
#[arg(
long,
help = "E.g. '[::]:443', if given then SSL certs will automatically be retrieved for all domains using LetsEncrypt",
env = "DOMIPLY_HTTPS_LISTEN_ADDR",
requires = "domain_acme_contact_email"
)]
https_listen_addr: Option<SocketAddr>,
2023-05-15 18:25:07 +00:00
2023-05-13 14:39:54 +00:00
#[arg(long, required = true, env = "DOMIPLY_PASSPHRASE")]
passphrase: String,
2023-05-13 14:39:54 +00:00
#[arg(long, required = true, env = "DOMIPLY_ORIGIN_STORE_GIT_DIR_PATH")]
origin_store_git_dir_path: path::PathBuf,
2023-05-15 20:16:29 +00:00
#[arg(long, required = true, env = "DOMIPLY_DOMAIN_CHECKER_TARGET_A")]
domain_checker_target_a: std::net::Ipv4Addr,
2023-05-13 14:39:54 +00:00
#[arg(long, default_value_t = String::from("1.1.1.1:53"), env = "DOMIPLY_DOMAIN_CHECKER_RESOLVER_ADDR")]
domain_checker_resolver_addr: String,
2023-05-13 14:39:54 +00:00
#[arg(long, required = true, env = "DOMIPLY_DOMAIN_CONFIG_STORE_DIR_PATH")]
domain_config_store_dir_path: path::PathBuf,
#[arg(long, required = true, env = "DOMIPLY_DOMAIN_ACME_STORE_DIR_PATH")]
domain_acme_store_dir_path: path::PathBuf,
#[arg(long, env = "DOMIPLY_DOMAIN_ACME_CONTACT_EMAIL")]
domain_acme_contact_email: Option<String>,
}
2023-05-20 12:28:02 +00:00
#[tokio::main]
async fn main() {
let config = Cli::parse();
2023-05-19 10:29:37 +00:00
let mut wait_group = FuturesUnordered::new();
2023-05-20 12:28:02 +00:00
let canceller = tokio_util::sync::CancellationToken::new();
2023-05-15 19:18:33 +00:00
{
let canceller = canceller.clone();
2023-05-20 12:28:02 +00:00
tokio::spawn(async move {
2023-05-16 14:20:01 +00:00
let mut signals =
Signals::new(signal_hook::consts::TERM_SIGNALS).expect("initialized signals");
2023-05-16 14:20:01 +00:00
if (signals.next().await).is_some() {
2023-05-15 19:18:33 +00:00
println!("Gracefully shutting down...");
canceller.cancel();
}
2023-05-16 14:20:01 +00:00
if (signals.next().await).is_some() {
2023-05-15 19:18:33 +00:00
println!("Forcefully shutting down");
std::process::exit(1);
};
});
}
2023-05-13 14:39:54 +00:00
let origin_store = domiply::origin::store::git::new(config.origin_store_git_dir_path)
.expect("git origin store initialized");
2023-05-17 12:37:23 +00:00
let domain_checker = domiply::domain::checker::new(
config.domain_checker_target_a,
&config.domain_checker_resolver_addr,
)
2023-05-20 12:28:02 +00:00
.await
2023-05-17 12:37:23 +00:00
.expect("domain checker initialized");
let domain_config_store = domiply::domain::config::new(&config.domain_config_store_dir_path)
.expect("domain config store initialized");
2023-05-20 12:28:02 +00:00
let (domain_acme_store, domain_acme_manager) = if config.https_listen_addr.is_some() {
let domain_acme_store =
domiply::domain::acme::store::new(&config.domain_acme_store_dir_path)
.expect("domain acme store initialized");
// if https_listen_addr is set then domain_acme_contact_email is required, see the Cli/clap
// settings.
let domain_acme_contact_email = config.domain_acme_contact_email.unwrap();
2023-05-20 12:28:02 +00:00
let domain_acme_manager = domiply::domain::acme::manager::new(
domain_acme_store.clone(),
&domain_acme_contact_email,
)
.await
.expect("domain acme manager initialized");
2023-05-20 12:28:02 +00:00
(Some(domain_acme_store), Some(domain_acme_manager))
} else {
(None, None)
};
let manager = domiply::domain::manager::new(
origin_store,
domain_config_store,
domain_checker,
domain_acme_manager.clone(),
);
2023-05-17 12:37:23 +00:00
2023-05-19 10:29:37 +00:00
wait_group.push({
2023-05-17 12:37:23 +00:00
let manager = manager.clone();
2023-05-15 19:18:33 +00:00
let canceller = canceller.clone();
2023-05-20 12:28:02 +00:00
tokio::spawn(async move {
2023-05-15 19:18:33 +00:00
let mut interval = time::interval(time::Duration::from_secs(20 * 60));
loop {
select! {
2023-05-17 12:37:23 +00:00
_ = interval.tick() => (),
2023-05-15 19:18:33 +00:00
_ = canceller.cancelled() => return,
}
2023-05-17 12:37:23 +00:00
let errors_iter = manager.sync_all_origins();
2023-05-17 12:37:23 +00:00
if let Err(err) = errors_iter {
println!("Got error calling sync_all_origins: {err}");
continue;
}
2023-05-17 12:37:23 +00:00
errors_iter
.unwrap()
.into_iter()
.for_each(|(descr, err)| match descr {
None => println!("error while syncing unknown descr: {err}"),
Some(descr) => println!("failed to sync {descr:?}: {err}"),
});
}
})
2023-05-19 10:29:37 +00:00
});
2023-05-13 14:39:54 +00:00
let service = domiply::service::new(
manager.clone(),
2023-05-15 20:16:29 +00:00
config.domain_checker_target_a,
config.passphrase,
2023-05-15 20:16:29 +00:00
config.http_domain.clone(),
);
let service = sync::Arc::new(service);
2023-05-20 12:28:02 +00:00
wait_group.push({
let http_domain = config.http_domain.clone();
let canceller = canceller.clone();
let service = service.clone();
let make_service = hyper::service::make_service_fn(move |_| {
let service = service.clone();
// Create a `Service` for responding to the request.
let service = hyper::service::service_fn(move |req| {
domiply::service::handle_request(service.clone(), req)
});
// Return the service to hyper.
async move { Ok::<_, Infallible>(service) }
});
2023-05-20 12:28:02 +00:00
tokio::spawn(async move {
2023-05-15 19:18:33 +00:00
let addr = config.http_listen_addr;
2023-05-19 10:36:01 +00:00
println!(
"Listening on http://{}:{}",
http_domain.as_str(),
addr.port()
);
2023-05-15 19:18:33 +00:00
let server = hyper::Server::bind(&addr).serve(make_service);
2023-05-15 19:18:33 +00:00
let graceful = server.with_graceful_shutdown(async {
canceller.cancelled().await;
});
if let Err(e) = graceful.await {
panic!("server error: {}", e);
};
})
2023-05-19 10:29:37 +00:00
});
2023-05-20 12:28:02 +00:00
// if there's an acme manager then it means that https is enabled
if let (Some(domain_acme_store), Some(domain_acme_manager)) =
(domain_acme_store, domain_acme_manager)
{
// Periodically refresh all domain certs, including the http_domain passed in the Cli opts
wait_group.push({
let manager = manager.clone();
let http_domain = config.http_domain.clone();
let canceller = canceller.clone();
tokio::spawn(async move {
let mut interval = time::interval(time::Duration::from_secs(60 * 60));
loop {
select! {
_ = interval.tick() => (),
_ = canceller.cancelled() => return,
}
_ = domain_acme_manager
.sync_domain(http_domain.clone())
.await
.inspect_err(|err| {
println!(
"Error while getting cert for {}: {err}",
http_domain.as_str()
)
});
let domains_iter = manager.all_domains();
if let Err(err) = domains_iter {
println!("Got error calling all_domains: {err}");
continue;
}
for domain in domains_iter.unwrap().into_iter() {
match domain {
Ok(domain) => {
let _ = domain_acme_manager
.sync_domain(domain.clone())
.await
.inspect_err(|err| {
println!(
"Error while getting cert for {}: {err}",
domain.as_str(),
)
});
}
Err(err) => println!("Error iterating through domains: {err}"),
};
}
}
2023-05-20 12:28:02 +00:00
})
});
2023-05-20 12:28:02 +00:00
// HTTPS server
wait_group.push({
let http_domain = config.http_domain.clone();
let canceller = canceller.clone();
let service = service.clone();
2023-05-20 12:28:02 +00:00
let make_service = hyper::service::make_service_fn(move |_| {
let service = service.clone();
2023-05-20 12:28:02 +00:00
// Create a `Service` for responding to the request.
let service = hyper::service::service_fn(move |req| {
domiply::service::handle_request(service.clone(), req)
});
2023-05-20 12:28:02 +00:00
// Return the service to hyper.
async move { Ok::<_, Infallible>(service) }
});
tokio::spawn(async move {
let canceller = canceller.clone();
let server_config: tokio_rustls::TlsAcceptor = sync::Arc::new(
rustls::server::ServerConfig::builder()
.with_safe_default_cipher_suites()
.with_safe_default_kx_groups()
.with_safe_default_protocol_versions()
.unwrap()
.with_no_client_auth()
.with_cert_resolver(sync::Arc::from(domain_acme_store)),
)
.into();
let addr = config.https_listen_addr.unwrap();
let addr_incoming = hyper::server::conn::AddrIncoming::bind(&addr)
.expect("https listen socket created");
let incoming = tls_listener::TlsListener::new(server_config, addr_incoming);
println!(
"Listening on https://{}:{}",
http_domain.as_str(),
addr.port()
);
let server = hyper::Server::builder(incoming).serve(make_service);
let graceful = server.with_graceful_shutdown(async {
canceller.cancelled().await;
});
if let Err(e) = graceful.await {
panic!("server error: {}", e);
};
})
})
}
2023-05-20 12:28:02 +00:00
while let Some(_) = wait_group.next().await {}
println!("Graceful shutdown complete");
}