summaryrefslogtreecommitdiff
path: root/server/src/server.cpp
blob: 9eb44f409cbd27dd5127f724473327c6b9478578 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
/*
	Copyright © 2015 Gluzskiy Alexandr (sss)

    This file is part of Unknown Download Manager (UDM).

    UDM is free software: you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation, either version 2 of the License, or
    (at your option) any later version.

    UDM is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.

    You should have received a copy of the GNU General Public License
    along with UDM.  If not, see <http://www.gnu.org/licenses/>.

*/



#include <boost/bind.hpp>
#include "server.h"
#include "server_session.h"
#include "utilities.h"

#include "../../protocol/udm.pb.h"
#include "socket_wraper.h"




server::server(boost::asio::io_service& io_service,runtime_config_s &config, std::map<std::string, client*> &clients_, std::map<int, download_internal_s> &downloads_, short port) : io_service_(io_service), acceptor_(io_service, boost::asio::ip::tcp::endpoint(boost::asio::ip::tcp::v4(), port)), runtime_config(config), clients(clients_), downloads(downloads_)
{
	if(runtime_config.config_file.get<bool>("server.enable_encryption", false))
	{
		//TODO: validate encryption files path's
		context_ = new boost::asio::ssl::context(boost::asio::ssl::context::tlsv12_server);
		context_->set_options(boost::asio::ssl::context::single_dh_use);
		//context_.set_password_callback(boost::bind(&server::get_password, this)); //TODO: add password support
		context_->use_certificate_chain_file(runtime_config.config_file.get<std::string>("ssl_certificate", "")); //must be set
		context_->use_private_key_file(runtime_config.config_file.get<std::string>("ssl_key", ""), boost::asio::ssl::context::pem); //must be set
		context_->use_tmp_dh_file(runtime_config.config_file.get<std::string>("ssl_dh", "")); //must be set
	}
	start_accept();
}

void server::start_accept()
{
	server_session* new_session = new server_session(io_service_, runtime_config, clients, downloads);
	if(runtime_config.config_file.get<bool>("server.enable_encryption", false))
		acceptor_.async_accept(new_session->socket()->get_ssl_socket().lowest_layer(), boost::bind(&server::handle_accept, this, new_session, boost::asio::placeholders::error));
	else
		acceptor_.async_accept(new_session->socket()->get_socket(), boost::bind(&server::handle_accept, this, new_session, boost::asio::placeholders::error));
}

void server::handle_accept(server_session* new_session, const boost::system::error_code& error)
{
	if (!error)
	{
		new_session->run();
	}
	else
	{
		delete new_session;
	}
	start_accept();
}