/* * This file is part of the AzerothCore Project. See AUTHORS file for Copyright information * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU Affero General Public License as published by the * Free Software Foundation; either version 3 of the License, or (at your * option) any later version. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for * more details. * * You should have received a copy of the GNU General Public License along * with this program. If not, see . */ /** * @file main.cpp * @brief Authentication Server main program * * This file contains the main program for the * authentication server */ #include "AppenderDB.h" #include "AuthSocketMgr.h" #include "Banner.h" #include "Config.h" #include "DatabaseEnv.h" #include "DatabaseLoader.h" #include "DeadlineTimer.h" #include "GitRevision.h" #include "IPLocation.h" #include "IoContext.h" #include "Log.h" #include "MySQLThreading.h" #include "ProcessPriority.h" #include "RealmList.h" #include "SecretMgr.h" #include "SharedDefines.h" #include "Util.h" #include #include #include #include #include #ifndef _ACORE_REALM_CONFIG #define _ACORE_REALM_CONFIG "authserver.conf" #endif using boost::asio::ip::tcp; bool StartDB(); void StopDB(); void SignalHandler(std::weak_ptr ioContextRef, boost::system::error_code const& error, int signalNumber); void KeepDatabaseAliveHandler(std::weak_ptr dbPingTimerRef, int32 dbPingInterval, boost::system::error_code const& error); void BanExpiryHandler(std::weak_ptr banExpiryCheckTimerRef, int32 banExpiryCheckInterval, boost::system::error_code const& error); /// Print out the usage string for this program on the console. void usage(const char* prog) { LOG_INFO("server.authserver", "Usage: \n {} []\n" " -c config_file use config_file as configuration file\n\r", prog); } /// Launch the auth server int main(int argc, char** argv) { Acore::Impl::CurrentServerProcessHolder::_type = SERVER_PROCESS_AUTHSERVER; signal(SIGABRT, &Acore::AbortHandler); // Command line parsing to get the configuration file name std::string configFile = sConfigMgr->GetConfigPath() + std::string(_ACORE_REALM_CONFIG); int count = 1; while (count < argc) { if (strcmp(argv[count], "-c") == 0) { if (++count >= argc) { printf("Runtime-Error: -c option requires an input argument\n"); usage(argv[0]); return 1; } else configFile = argv[count]; } ++count; } // Add file and args in config sConfigMgr->Configure(configFile, std::vector(argv, argv + argc)); if (!sConfigMgr->LoadAppConfigs()) return 1; // Init logging sLog->RegisterAppender(); sLog->Initialize(nullptr); Acore::Banner::Show("authserver", [](std::string_view text) { LOG_INFO("server.authserver", text); }, []() { LOG_INFO("server.authserver", "> Using configuration file {}", sConfigMgr->GetFilename()); LOG_INFO("server.authserver", "> Using SSL version: {} (library: {})", OPENSSL_VERSION_TEXT, SSLeay_version(SSLEAY_VERSION)); LOG_INFO("server.authserver", "> Using Boost version: {}.{}.{}", BOOST_VERSION / 100000, BOOST_VERSION / 100 % 1000, BOOST_VERSION % 100); }); // authserver PID file creation std::string pidFile = sConfigMgr->GetOption("PidFile", ""); if (!pidFile.empty()) { if (uint32 pid = CreatePIDFile(pidFile)) LOG_INFO("server.authserver", "Daemon PID: {}\n", pid); // outError for red color in console else { LOG_ERROR("server.authserver", "Cannot create PID file {} (possible error: permission)\n", pidFile); return 1; } } // Initialize the database connection if (!StartDB()) return 1; sSecretMgr->Initialize(); // Load IP Location Database sIPLocation->Load(); std::shared_ptr dbHandle(nullptr, [](void*) { StopDB(); }); std::shared_ptr ioContext = std::make_shared(); // Get the list of realms for the server sRealmList->Initialize(*ioContext, sConfigMgr->GetOption("RealmsStateUpdateDelay", 20)); std::shared_ptr sRealmListHandle(nullptr, [](void*) { sRealmList->Close(); }); if (sRealmList->GetRealms().empty()) { LOG_ERROR("server.authserver", "No valid realms specified."); return 1; } // Start the listening port (acceptor) for auth connections int32 port = sConfigMgr->GetOption("RealmServerPort", 3724); if (port < 0 || port > 0xFFFF) { LOG_ERROR("server.authserver", "Specified port out of allowed range (1-65535)"); return 1; } std::string bindIp = sConfigMgr->GetOption("BindIP", "0.0.0.0"); if (!sAuthSocketMgr.StartNetwork(*ioContext, bindIp, port)) { LOG_ERROR("server.authserver", "Failed to initialize network"); return 1; } std::shared_ptr sAuthSocketMgrHandle(nullptr, [](void*) { sAuthSocketMgr.StopNetwork(); }); // Set signal handlers boost::asio::signal_set signals(*ioContext, SIGINT, SIGTERM); #if AC_PLATFORM == AC_PLATFORM_WINDOWS signals.add(SIGBREAK); #endif signals.async_wait(std::bind(&SignalHandler, std::weak_ptr(ioContext), std::placeholders::_1, std::placeholders::_2)); // Set process priority according to configuration settings SetProcessPriority("server.authserver", sConfigMgr->GetOption(CONFIG_PROCESSOR_AFFINITY, 0), sConfigMgr->GetOption(CONFIG_HIGH_PRIORITY, false)); // Enabled a timed callback for handling the database keep alive ping int32 dbPingInterval = sConfigMgr->GetOption("MaxPingTime", 30); std::shared_ptr dbPingTimer = std::make_shared(*ioContext); dbPingTimer->expires_from_now(boost::posix_time::minutes(dbPingInterval)); dbPingTimer->async_wait(std::bind(&KeepDatabaseAliveHandler, std::weak_ptr(dbPingTimer), dbPingInterval, std::placeholders::_1)); int32 banExpiryCheckInterval = sConfigMgr->GetOption("BanExpiryCheckInterval", 60); std::shared_ptr banExpiryCheckTimer = std::make_shared(*ioContext); banExpiryCheckTimer->expires_from_now(boost::posix_time::seconds(banExpiryCheckInterval)); banExpiryCheckTimer->async_wait(std::bind(&BanExpiryHandler, std::weak_ptr(banExpiryCheckTimer), banExpiryCheckInterval, std::placeholders::_1)); // Start the io service worker loop ioContext->run(); banExpiryCheckTimer->cancel(); dbPingTimer->cancel(); LOG_INFO("server.authserver", "Halting process..."); signals.cancel(); return 0; } /// Initialize connection to the database bool StartDB() { MySQL::Library_Init(); // Load databases // NOTE: While authserver is singlethreaded you should keep synch_threads == 1. // Increasing it is just silly since only 1 will be used ever. DatabaseLoader loader("server.authserver"); loader .AddDatabase(LoginDatabase, "Login"); if (!loader.Load()) return false; LOG_INFO("server.authserver", "Started auth database connection pool."); sLog->SetRealmId(0); // Enables DB appenders when realm is set. return true; } /// Close the connection to the database void StopDB() { LoginDatabase.Close(); MySQL::Library_End(); } void SignalHandler(std::weak_ptr ioContextRef, boost::system::error_code const& error, int /*signalNumber*/) { if (!error) { if (std::shared_ptr ioContext = ioContextRef.lock()) { ioContext->stop(); } } } void KeepDatabaseAliveHandler(std::weak_ptr dbPingTimerRef, int32 dbPingInterval, boost::system::error_code const& error) { if (!error) { if (std::shared_ptr dbPingTimer = dbPingTimerRef.lock()) { LOG_INFO("server.authserver", "Ping MySQL to keep connection alive"); LoginDatabase.KeepAlive(); dbPingTimer->expires_from_now(boost::posix_time::minutes(dbPingInterval)); dbPingTimer->async_wait(std::bind(&KeepDatabaseAliveHandler, dbPingTimerRef, dbPingInterval, std::placeholders::_1)); } } } void BanExpiryHandler(std::weak_ptr banExpiryCheckTimerRef, int32 banExpiryCheckInterval, boost::system::error_code const& error) { if (!error) { if (std::shared_ptr banExpiryCheckTimer = banExpiryCheckTimerRef.lock()) { LoginDatabase.Execute(LoginDatabase.GetPreparedStatement(LOGIN_DEL_EXPIRED_IP_BANS)); LoginDatabase.Execute(LoginDatabase.GetPreparedStatement(LOGIN_UPD_EXPIRED_ACCOUNT_BANS)); banExpiryCheckTimer->expires_from_now(boost::posix_time::seconds(banExpiryCheckInterval)); banExpiryCheckTimer->async_wait(std::bind(&BanExpiryHandler, banExpiryCheckTimerRef, banExpiryCheckInterval, std::placeholders::_1)); } } }