mirror of
https://github.com/matrix-org/dendrite.git
synced 2025-12-12 17:33:09 -06:00
apply review feedback
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
This commit is contained in:
parent
6858b00ed0
commit
78772cc830
|
|
@ -26,6 +26,7 @@ import (
|
||||||
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
||||||
"github.com/matrix-org/dendrite/common/config"
|
"github.com/matrix-org/dendrite/common/config"
|
||||||
"github.com/matrix-org/util"
|
"github.com/matrix-org/util"
|
||||||
|
"github.com/matrix-org/dendrite/clientapi/httputil"
|
||||||
)
|
)
|
||||||
|
|
||||||
type turnServerResponse struct {
|
type turnServerResponse struct {
|
||||||
|
|
@ -39,38 +40,35 @@ func RequestTurnServer(req *http.Request, device *authtypes.Device, cfg config.D
|
||||||
turnConfig := cfg.TURN
|
turnConfig := cfg.TURN
|
||||||
|
|
||||||
// TODO Guest Support
|
// TODO Guest Support
|
||||||
if len(turnConfig.URIs) == 0 /* || (isGuest && !turnConfig.AllowGuests) */ {
|
if len(turnConfig.URIs) == 0 || turnConfig.UserLifetime == "" {
|
||||||
return util.JSONResponse{
|
return util.JSONResponse{
|
||||||
Code: 200,
|
Code: 200,
|
||||||
JSON: struct{}{},
|
JSON: struct{}{},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
duration, err := time.ParseDuration(turnConfig.UserLifetime)
|
// Duration checked at startup, err not possible
|
||||||
if err != nil {
|
duration, _ := time.ParseDuration(turnConfig.UserLifetime)
|
||||||
util.GetLogger(req.Context()).WithError(err).Warn("Invalid configuration value turn.turn_user_lifetime")
|
|
||||||
return util.JSONResponse{
|
|
||||||
Code: 200,
|
|
||||||
JSON: struct{}{},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resp := turnServerResponse{
|
resp := turnServerResponse{
|
||||||
Username: turnConfig.Username,
|
|
||||||
Password: turnConfig.Password,
|
|
||||||
URIs: turnConfig.URIs,
|
URIs: turnConfig.URIs,
|
||||||
TTL: int(duration.Seconds()),
|
TTL: int(duration.Seconds()),
|
||||||
}
|
}
|
||||||
|
|
||||||
if turnConfig.SharedSecret != "" {
|
if turnConfig.SharedSecret != "" {
|
||||||
expiry := time.Now().Add(duration).Unix()
|
expiry := time.Now().Add(duration).Unix()
|
||||||
resp.Username = fmt.Sprintf("%d:%s", expiry, device.UserID)
|
|
||||||
|
|
||||||
mac := hmac.New(sha1.New, []byte(turnConfig.SharedSecret))
|
mac := hmac.New(sha1.New, []byte(turnConfig.SharedSecret))
|
||||||
mac.Write([]byte(resp.Username))
|
_, err := mac.Write([]byte(resp.Username))
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return httputil.LogThenError(req, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
resp.Username = fmt.Sprintf("%d:%s", expiry, device.UserID)
|
||||||
resp.Password = base64.StdEncoding.EncodeToString(mac.Sum(nil))
|
resp.Password = base64.StdEncoding.EncodeToString(mac.Sum(nil))
|
||||||
} else if turnConfig.Username != "" && turnConfig.Password != "" {
|
} else if turnConfig.Username != "" && turnConfig.Password != "" {
|
||||||
// Already have turnConfig.Username and turnConfig.Password in resp
|
resp.Username = turnConfig.Username
|
||||||
|
resp.Password = turnConfig.Password
|
||||||
} else {
|
} else {
|
||||||
return util.JSONResponse{
|
return util.JSONResponse{
|
||||||
Code: 200,
|
Code: 200,
|
||||||
|
|
|
||||||
|
|
@ -152,8 +152,9 @@ type Dendrite struct {
|
||||||
|
|
||||||
// TURN Server Config
|
// TURN Server Config
|
||||||
TURN struct {
|
TURN struct {
|
||||||
|
// TODO Guest Support
|
||||||
// Whether or not guests can request TURN credentials
|
// Whether or not guests can request TURN credentials
|
||||||
AllowGuests bool `yaml:"turn_allow_guests"`
|
//AllowGuests bool `yaml:"turn_allow_guests"`
|
||||||
// How long the authorization should last
|
// How long the authorization should last
|
||||||
UserLifetime string `yaml:"turn_user_lifetime"`
|
UserLifetime string `yaml:"turn_user_lifetime"`
|
||||||
// The list of TURN URIs to pass to clients
|
// The list of TURN URIs to pass to clients
|
||||||
|
|
@ -360,10 +361,20 @@ func (config *Dendrite) check(monolithic bool) error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
checkValidDuration := func(key, value string) {
|
||||||
|
if _, err := time.ParseDuration(config.TURN.UserLifetime); err != nil {
|
||||||
|
problems = append(problems, fmt.Sprintf("invalid duration for config key %q: %s", key, value))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
checkNotEmpty("matrix.server_name", string(config.Matrix.ServerName))
|
checkNotEmpty("matrix.server_name", string(config.Matrix.ServerName))
|
||||||
checkNotEmpty("matrix.private_key", string(config.Matrix.PrivateKeyPath))
|
checkNotEmpty("matrix.private_key", string(config.Matrix.PrivateKeyPath))
|
||||||
checkNotZero("matrix.federation_certificates", int64(len(config.Matrix.FederationCertificatePaths)))
|
checkNotZero("matrix.federation_certificates", int64(len(config.Matrix.FederationCertificatePaths)))
|
||||||
|
|
||||||
|
if config.TURN.UserLifetime != "" {
|
||||||
|
checkValidDuration("turn.turn_user_lifetime", config.TURN.UserLifetime)
|
||||||
|
}
|
||||||
|
|
||||||
checkNotEmpty("media.base_path", string(config.Media.BasePath))
|
checkNotEmpty("media.base_path", string(config.Media.BasePath))
|
||||||
checkPositive("media.max_file_size_bytes", int64(*config.Media.MaxFileSizeBytes))
|
checkPositive("media.max_file_size_bytes", int64(*config.Media.MaxFileSizeBytes))
|
||||||
checkPositive("media.max_thumbnail_generators", int64(config.Media.MaxThumbnailGenerators))
|
checkPositive("media.max_thumbnail_generators", int64(config.Media.MaxThumbnailGenerators))
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue