2020-08-10 08:18:04 -05:00
|
|
|
package config
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
type ClientAPI struct {
|
|
|
|
Matrix *Global `yaml:"-"`
|
|
|
|
Derived *Derived `yaml:"-"` // TODO: Nuke Derived from orbit
|
|
|
|
|
2020-08-13 06:16:37 -05:00
|
|
|
InternalAPI InternalAPIOptions `yaml:"internal_api"`
|
|
|
|
ExternalAPI ExternalAPIOptions `yaml:"external_api"`
|
2020-08-10 08:18:04 -05:00
|
|
|
|
2020-08-11 07:21:26 -05:00
|
|
|
// If set disables new users from registering (except via shared
|
|
|
|
// secrets)
|
|
|
|
RegistrationDisabled bool `yaml:"registration_disabled"`
|
2020-08-10 08:18:04 -05:00
|
|
|
// If set, allows registration by anyone who also has the shared
|
|
|
|
// secret, even if registration is otherwise disabled.
|
|
|
|
RegistrationSharedSecret string `yaml:"registration_shared_secret"`
|
2020-08-11 07:21:26 -05:00
|
|
|
|
|
|
|
// Boolean stating whether catpcha registration is enabled
|
|
|
|
// and required
|
|
|
|
RecaptchaEnabled bool `yaml:"enable_registration_captcha"`
|
2020-08-10 08:18:04 -05:00
|
|
|
// This Home Server's ReCAPTCHA public key.
|
|
|
|
RecaptchaPublicKey string `yaml:"recaptcha_public_key"`
|
|
|
|
// This Home Server's ReCAPTCHA private key.
|
|
|
|
RecaptchaPrivateKey string `yaml:"recaptcha_private_key"`
|
|
|
|
// Secret used to bypass the captcha registration entirely
|
2020-08-11 07:21:26 -05:00
|
|
|
RecaptchaBypassSecret string `yaml:"recaptcha_bypass_secret"`
|
2020-08-10 08:18:04 -05:00
|
|
|
// HTTP API endpoint used to verify whether the captcha response
|
|
|
|
// was successful
|
|
|
|
RecaptchaSiteVerifyAPI string `yaml:"recaptcha_siteverify_api"`
|
|
|
|
|
|
|
|
// TURN options
|
|
|
|
TURN TURN `yaml:"turn"`
|
2020-09-03 04:12:11 -05:00
|
|
|
|
|
|
|
// Rate-limiting options
|
|
|
|
RateLimiting RateLimiting `yaml:"rate_limiting"`
|
2021-01-18 07:09:28 -06:00
|
|
|
|
|
|
|
MSCs *MSCs `yaml:"mscs"`
|
2020-08-10 08:18:04 -05:00
|
|
|
}
|
|
|
|
|
2021-11-24 05:57:39 -06:00
|
|
|
func (c *ClientAPI) Defaults(generate bool) {
|
2020-08-13 06:16:37 -05:00
|
|
|
c.InternalAPI.Listen = "http://localhost:7771"
|
|
|
|
c.InternalAPI.Connect = "http://localhost:7771"
|
|
|
|
c.ExternalAPI.Listen = "http://[::]:8071"
|
2020-08-10 08:18:04 -05:00
|
|
|
c.RegistrationSharedSecret = ""
|
|
|
|
c.RecaptchaPublicKey = ""
|
|
|
|
c.RecaptchaPrivateKey = ""
|
|
|
|
c.RecaptchaEnabled = false
|
|
|
|
c.RecaptchaBypassSecret = ""
|
|
|
|
c.RecaptchaSiteVerifyAPI = ""
|
|
|
|
c.RegistrationDisabled = false
|
2020-09-03 04:12:11 -05:00
|
|
|
c.RateLimiting.Defaults()
|
2020-08-10 08:18:04 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ClientAPI) Verify(configErrs *ConfigErrors, isMonolith bool) {
|
2020-08-13 06:16:37 -05:00
|
|
|
checkURL(configErrs, "client_api.internal_api.listen", string(c.InternalAPI.Listen))
|
|
|
|
checkURL(configErrs, "client_api.internal_api.connect", string(c.InternalAPI.Connect))
|
|
|
|
if !isMonolith {
|
|
|
|
checkURL(configErrs, "client_api.external_api.listen", string(c.ExternalAPI.Listen))
|
|
|
|
}
|
2020-08-10 08:18:04 -05:00
|
|
|
if c.RecaptchaEnabled {
|
|
|
|
checkNotEmpty(configErrs, "client_api.recaptcha_public_key", string(c.RecaptchaPublicKey))
|
|
|
|
checkNotEmpty(configErrs, "client_api.recaptcha_private_key", string(c.RecaptchaPrivateKey))
|
|
|
|
checkNotEmpty(configErrs, "client_api.recaptcha_siteverify_api", string(c.RecaptchaSiteVerifyAPI))
|
|
|
|
}
|
|
|
|
c.TURN.Verify(configErrs)
|
2020-09-03 04:12:11 -05:00
|
|
|
c.RateLimiting.Verify(configErrs)
|
2020-08-10 08:18:04 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
type TURN struct {
|
|
|
|
// TODO Guest Support
|
|
|
|
// Whether or not guests can request TURN credentials
|
|
|
|
// AllowGuests bool `yaml:"turn_allow_guests"`
|
|
|
|
// How long the authorization should last
|
|
|
|
UserLifetime string `yaml:"turn_user_lifetime"`
|
|
|
|
// The list of TURN URIs to pass to clients
|
|
|
|
URIs []string `yaml:"turn_uris"`
|
|
|
|
|
|
|
|
// Authorization via Shared Secret
|
|
|
|
// The shared secret from coturn
|
|
|
|
SharedSecret string `yaml:"turn_shared_secret"`
|
|
|
|
|
|
|
|
// Authorization via Static Username & Password
|
|
|
|
// Hardcoded Username and Password
|
|
|
|
Username string `yaml:"turn_username"`
|
|
|
|
Password string `yaml:"turn_password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *TURN) Verify(configErrs *ConfigErrors) {
|
|
|
|
value := c.UserLifetime
|
|
|
|
if value != "" {
|
|
|
|
if _, err := time.ParseDuration(value); err != nil {
|
|
|
|
configErrs.Add(fmt.Sprintf("invalid duration for config key %q: %s", "client_api.turn.turn_user_lifetime", value))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-09-03 04:12:11 -05:00
|
|
|
|
|
|
|
type RateLimiting struct {
|
|
|
|
// Is rate limiting enabled or disabled?
|
|
|
|
Enabled bool `yaml:"enabled"`
|
|
|
|
|
|
|
|
// How many "slots" a user can occupy sending requests to a rate-limited
|
|
|
|
// endpoint before we apply rate-limiting
|
|
|
|
Threshold int64 `yaml:"threshold"`
|
|
|
|
|
|
|
|
// The cooloff period in milliseconds after a request before the "slot"
|
|
|
|
// is freed again
|
|
|
|
CooloffMS int64 `yaml:"cooloff_ms"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *RateLimiting) Verify(configErrs *ConfigErrors) {
|
|
|
|
if r.Enabled {
|
|
|
|
checkPositive(configErrs, "client_api.rate_limiting.threshold", r.Threshold)
|
|
|
|
checkPositive(configErrs, "client_api.rate_limiting.cooloff_ms", r.CooloffMS)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *RateLimiting) Defaults() {
|
|
|
|
r.Enabled = true
|
|
|
|
r.Threshold = 5
|
|
|
|
r.CooloffMS = 500
|
|
|
|
}
|