blob: f759ff5087c369c6b688d4e04f505b6b572070dc [file] [log] [blame]
/*
* Copyright (C) 2023 Savoir-faire Linux Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
#include "dnc.h"
#include "common.h"
#include "dhtnet_crtmgr/dhtnet_crtmgr.h"
#include <string>
#include <vector>
#include <iostream>
#include <unistd.h>
#include <getopt.h>
#if __has_include(<fmt/std.h>)
#include <fmt/std.h>
#else
#include <fmt/ostream.h>
#endif
#include <netinet/in.h>
#include <yaml-cpp/yaml.h>
#include <fstream>
struct dhtnc_params
{
bool help {false};
bool version {false};
bool listen {false};
std::filesystem::path privateKey {};
std::filesystem::path cert {};
std::string bootstrap {};
std::string remote_host {};
in_port_t remote_port {};
dht::InfoHash peer_id {};
std::string turn_host {};
std::string turn_user {};
std::string turn_pass {};
std::string turn_realm {};
std::string configuration {};
bool anonymous_cnx {false};
bool verbose {false};
std::map<std::string, std::vector<int>> authorizedServices {};
bool enable_upnp {true};
};
static const constexpr struct option long_options[]
= {{"help", no_argument, nullptr, 'h'},
{"version", no_argument, nullptr, 'v'},
{"port", required_argument, nullptr, 'P'},
{"ip", required_argument, nullptr, 'i'},
{"listen", no_argument, nullptr, 'l'},
{"bootstrap", required_argument, nullptr, 'b'},
{"privateKey", required_argument, nullptr, 'p'},
{"turn_host", required_argument, nullptr, 't'},
{"turn_user", required_argument, nullptr, 'u'},
{"turn_pass", required_argument, nullptr, 'w'},
{"turn_realm", required_argument, nullptr, 'r'},
{"certificate", required_argument, nullptr, 'c'},
{"configuration", required_argument, nullptr, 'd'},
{"anonymous", no_argument, nullptr, 'a'},
{nullptr, 0, nullptr, 0}};
dhtnc_params
parse_args(int argc, char** argv)
{
dhtnc_params params;
int opt;
int v_count = 0;
while ((opt = getopt_long(argc, argv, "ahvlw:r:u:t:P:b:p:i:c:d:", long_options, nullptr)) != -1) {
switch (opt) {
case 'h':
params.help = true;
break;
case 'v':
v_count++;
if (v_count == 1) {
params.version = true;
}else if (v_count == 2) {
params.version = false;
params.verbose = true;
}
break;
case 'P':
params.remote_port = std::stoi(optarg);
break;
case 'i':
params.remote_host = optarg;
break;
case 'l':
params.listen = true;
break;
case 'b':
params.bootstrap = optarg;
break;
case 'p':
params.privateKey = optarg;
break;
case 't':
params.turn_host = optarg;
break;
case 'u':
params.turn_user = optarg;
break;
case 'w':
params.turn_pass = optarg;
break;
case 'r':
params.turn_realm = optarg;
break;
case 'c':
params.cert = optarg;
break;
case 'd':
params.configuration = optarg;
break;
case 'a':
params.anonymous_cnx = true;
break;
default:
std::cerr << "Invalid option" << std::endl;
exit(EXIT_FAILURE);
}
}
// If not listening, the peer_id argument is required
if (!params.listen && !params.help && !params.version) {
if (optind < argc) {
params.peer_id = dht::InfoHash(argv[optind]);
optind++; // Move to the next argument
} else {
std::cerr << "Error: Missing peer_id argument.\n";
exit(EXIT_FAILURE);
}
}
// extract values from dnc yaml file
if (!params.configuration.empty()) {
Log("Read configuration file: {}\n", params.configuration.c_str());
std::ifstream config_file(params.configuration);
if (!config_file.is_open()) {
std::cerr << "Error: Could not open configuration file.\n";
} else {
YAML::Node config = YAML::Load(config_file);
if (config["bootstrap"] && params.bootstrap.empty()) {
params.bootstrap = config["bootstrap"].as<std::string>();
}
if (config["privateKey"] && params.privateKey.empty()) {
params.privateKey = config["privateKey"].as<std::string>();
}
if (config["turn_host"] && params.turn_host.empty()) {
params.turn_host = config["turn_host"].as<std::string>();
}
if (config["turn_user"] && params.turn_user.empty()) {
params.turn_user = config["turn_user"].as<std::string>();
}
if (config["turn_pass"] && params.turn_pass.empty()) {
params.turn_pass = config["turn_pass"].as<std::string>();
}
if (config["turn_realm"] && params.turn_realm.empty()) {
params.turn_realm = config["turn_realm"].as<std::string>();
}
if (config["certificate"] && params.cert.empty()) {
params.cert = config["certificate"].as<std::string>();
}
if (config["ip"] && params.remote_host.empty()) {
params.remote_host = config["ip"].as<std::string>();
}
if (config["port"] && params.remote_port == 0) {
params.remote_port = config["port"].as<int>();
}
if (config["anonymous"] && !params.anonymous_cnx) {
params.anonymous_cnx = config["anonymous"].as<bool>();
}
if (config["verbose"] && !params.verbose) {
params.verbose = config["verbose"].as<bool>();
}
if (config["authorized_services"]) {
for (auto service : config["authorized_services"]) {
std::string ip = service["ip"].as<std::string>();
int port = 0;
try {
port = service["port"].as<int>();
} catch (YAML::TypedBadConversion<int> e) {
std::cerr << "Error: Invalid port number in configuration file.\n";
exit(EXIT_FAILURE);
}
if (port < 1 || port > 65535 || ip.empty()) {
std::cerr << "Error: Invalid ip or port number in configuration file.\n";
exit(EXIT_FAILURE);
}
params.authorizedServices[ip].push_back(port);
}
}
if (config["enable_upnp"]) {
params.enable_upnp = config["enable_upnp"].as<bool>();
}
}
}
return params;
}
static void
setSipLogLevel()
{
int level = 0;
if (char* envvar = getenv("SIPLOGLEVEL")) {
// From 0 (min) to 6 (max)
level = std::clamp(std::stoi(envvar), 0, 6);
}
pj_log_set_level(level);
pj_log_set_log_func([](int level, const char* data, int len) {
Log("{}", std::string_view(data, len));
});
}
int
main(int argc, char** argv)
{
setSipLogLevel();
auto params = parse_args(argc, argv);
if (params.help) {
Log("Usage: dnc [options] [PEER_ID]\n"
"\nOptions:\n"
" -h, --help Show this help message and exit.\n"
" -v, --version Display the program version.\n"
" -P, --port [PORT] Specify the port option with an argument.\n"
" -i, --ip [ADDRESS] Specify the ip option with an argument.\n"
" -l, --listen Start the program in listen mode.\n"
" -b, --bootstrap [ADDRESS] Specify the bootstrap option with an argument.\n"
" -t, --turn_host [ADDRESS] Specify the turn_host option with an argument.\n"
" -u, --turn_user [USER] Specify the turn_user option with an argument.\n"
" -w, --turn_pass [SECRET] Specify the turn_pass option with an argument.\n"
" -r, --turn_realm [REALM] Specify the turn_realm option with an argument.\n"
" -c, --certificate [FILE] Specify the certificate option with an argument.\n"
" -d, --configuration [FILE] Specify the configuration option with an argument.\n"
" -p, --privateKey [FILE] Specify the privateKey option with an argument.\n"
" -a, --anonymous Enable the anonymous mode.\n"
" -vv, --verbose Enable verbose mode.\n");
return EXIT_SUCCESS;
}
if (params.version) {
Log("dnc v1.0\n");
return EXIT_SUCCESS;
}
auto identity = dhtnet::loadIdentity(params.privateKey, params.cert);
if (!identity.first || !identity.second) {
fmt::print(stderr, "Hint: To generate new identity files, run: dhtnet-crtmgr --interactive\n");
return EXIT_FAILURE;
}
Log("Loaded identity: {}\n", identity.second->getId());
Log("dnc 1.0\n");
std::unique_ptr<dhtnet::Dnc> dhtnc;
if (params.listen) {
// create dnc instance
dhtnc = std::make_unique<dhtnet::Dnc>(identity,
params.bootstrap,
params.turn_host,
params.turn_user,
params.turn_pass,
params.turn_realm,
params.anonymous_cnx,
params.verbose,
params.authorizedServices,
params.enable_upnp);
} else {
dhtnc = std::make_unique<dhtnet::Dnc>(identity,
params.bootstrap,
params.peer_id,
params.remote_host,
params.remote_port,
params.turn_host,
params.turn_user,
params.turn_pass,
params.turn_realm,
params.verbose,
params.enable_upnp);
}
dhtnc->run();
return EXIT_SUCCESS;
}