2020-06-19 07:29:27 -05:00
|
|
|
package gobind
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/matrix-org/dendrite/appservice"
|
|
|
|
"github.com/matrix-org/dendrite/cmd/dendrite-demo-yggdrasil/signing"
|
|
|
|
"github.com/matrix-org/dendrite/cmd/dendrite-demo-yggdrasil/yggconn"
|
2020-07-03 08:29:36 -05:00
|
|
|
"github.com/matrix-org/dendrite/cmd/dendrite-demo-yggdrasil/yggrooms"
|
2020-07-01 07:35:58 -05:00
|
|
|
"github.com/matrix-org/dendrite/currentstateserver"
|
2020-06-19 07:29:27 -05:00
|
|
|
"github.com/matrix-org/dendrite/eduserver"
|
|
|
|
"github.com/matrix-org/dendrite/eduserver/cache"
|
|
|
|
"github.com/matrix-org/dendrite/federationsender"
|
2020-07-08 08:52:48 -05:00
|
|
|
"github.com/matrix-org/dendrite/federationsender/api"
|
2020-06-19 07:29:27 -05:00
|
|
|
"github.com/matrix-org/dendrite/internal/config"
|
|
|
|
"github.com/matrix-org/dendrite/internal/httputil"
|
|
|
|
"github.com/matrix-org/dendrite/internal/setup"
|
2020-07-22 11:01:29 -05:00
|
|
|
"github.com/matrix-org/dendrite/keyserver"
|
2020-06-19 07:29:27 -05:00
|
|
|
"github.com/matrix-org/dendrite/roomserver"
|
|
|
|
"github.com/matrix-org/dendrite/userapi"
|
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
"github.com/sirupsen/logrus"
|
2020-07-10 10:28:18 -05:00
|
|
|
"go.uber.org/atomic"
|
2020-06-19 07:29:27 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
type DendriteMonolith struct {
|
2020-07-10 10:28:18 -05:00
|
|
|
logger logrus.Logger
|
2020-07-01 07:35:58 -05:00
|
|
|
YggdrasilNode *yggconn.Node
|
2020-06-19 07:29:27 -05:00
|
|
|
StorageDirectory string
|
|
|
|
listener net.Listener
|
2020-07-10 10:28:18 -05:00
|
|
|
httpServer *http.Server
|
|
|
|
httpListening atomic.Bool
|
|
|
|
yggListening atomic.Bool
|
2020-06-19 07:29:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *DendriteMonolith) BaseURL() string {
|
|
|
|
return fmt.Sprintf("http://%s", m.listener.Addr().String())
|
|
|
|
}
|
|
|
|
|
2020-07-01 07:35:58 -05:00
|
|
|
func (m *DendriteMonolith) PeerCount() int {
|
|
|
|
return m.YggdrasilNode.PeerCount()
|
|
|
|
}
|
|
|
|
|
2020-07-06 08:51:59 -05:00
|
|
|
func (m *DendriteMonolith) SetMulticastEnabled(enabled bool) {
|
|
|
|
m.YggdrasilNode.SetMulticastEnabled(enabled)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *DendriteMonolith) SetStaticPeer(uri string) error {
|
|
|
|
return m.YggdrasilNode.SetStaticPeer(uri)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *DendriteMonolith) DisconnectNonMulticastPeers() {
|
|
|
|
m.YggdrasilNode.DisconnectNonMulticastPeers()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *DendriteMonolith) DisconnectMulticastPeers() {
|
|
|
|
m.YggdrasilNode.DisconnectMulticastPeers()
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:18:58 -05:00
|
|
|
func (m *DendriteMonolith) Start() {
|
2020-07-10 10:28:18 -05:00
|
|
|
m.logger = logrus.Logger{
|
2020-06-19 07:29:27 -05:00
|
|
|
Out: BindLogger{},
|
|
|
|
}
|
2020-07-10 10:28:18 -05:00
|
|
|
m.logger.SetOutput(BindLogger{})
|
2020-06-19 07:29:27 -05:00
|
|
|
logrus.SetOutput(BindLogger{})
|
|
|
|
|
|
|
|
var err error
|
|
|
|
m.listener, err = net.Listen("tcp", "localhost:65432")
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:18:58 -05:00
|
|
|
ygg, err := yggconn.Setup("dendrite", m.StorageDirectory)
|
2020-06-19 07:29:27 -05:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2020-07-01 07:35:58 -05:00
|
|
|
m.YggdrasilNode = ygg
|
2020-06-19 07:29:27 -05:00
|
|
|
|
|
|
|
cfg := &config.Dendrite{}
|
|
|
|
cfg.SetDefaults()
|
|
|
|
cfg.Matrix.ServerName = gomatrixserverlib.ServerName(ygg.DerivedServerName())
|
|
|
|
cfg.Matrix.PrivateKey = ygg.SigningPrivateKey()
|
|
|
|
cfg.Matrix.KeyID = gomatrixserverlib.KeyID(signing.KeyID)
|
2020-07-22 11:01:29 -05:00
|
|
|
cfg.Matrix.FederationMaxRetries = 6
|
2020-06-19 07:29:27 -05:00
|
|
|
cfg.Kafka.UseNaffka = true
|
|
|
|
cfg.Kafka.Topics.OutputRoomEvent = "roomserverOutput"
|
|
|
|
cfg.Kafka.Topics.OutputClientData = "clientapiOutput"
|
|
|
|
cfg.Kafka.Topics.OutputTypingEvent = "typingServerOutput"
|
|
|
|
cfg.Kafka.Topics.OutputSendToDeviceEvent = "sendToDeviceOutput"
|
|
|
|
cfg.Database.Account = config.DataSource(fmt.Sprintf("file:%s/dendrite-account.db", m.StorageDirectory))
|
|
|
|
cfg.Database.Device = config.DataSource(fmt.Sprintf("file:%s/dendrite-device.db", m.StorageDirectory))
|
|
|
|
cfg.Database.MediaAPI = config.DataSource(fmt.Sprintf("file:%s/dendrite-mediaapi.db", m.StorageDirectory))
|
|
|
|
cfg.Database.SyncAPI = config.DataSource(fmt.Sprintf("file:%s/dendrite-syncapi.db", m.StorageDirectory))
|
|
|
|
cfg.Database.RoomServer = config.DataSource(fmt.Sprintf("file:%s/dendrite-roomserver.db", m.StorageDirectory))
|
|
|
|
cfg.Database.ServerKey = config.DataSource(fmt.Sprintf("file:%s/dendrite-serverkey.db", m.StorageDirectory))
|
2020-07-30 09:47:44 -05:00
|
|
|
cfg.Database.E2EKey = config.DataSource(fmt.Sprintf("file:%s/dendrite-e2ekey.db", m.StorageDirectory))
|
2020-06-19 07:29:27 -05:00
|
|
|
cfg.Database.FederationSender = config.DataSource(fmt.Sprintf("file:%s/dendrite-federationsender.db", m.StorageDirectory))
|
|
|
|
cfg.Database.AppService = config.DataSource(fmt.Sprintf("file:%s/dendrite-appservice.db", m.StorageDirectory))
|
2020-07-01 07:35:58 -05:00
|
|
|
cfg.Database.CurrentState = config.DataSource(fmt.Sprintf("file:%s/dendrite-currentstate.db", m.StorageDirectory))
|
2020-06-19 07:29:27 -05:00
|
|
|
cfg.Database.Naffka = config.DataSource(fmt.Sprintf("file:%s/dendrite-naffka.db", m.StorageDirectory))
|
2020-07-08 10:24:31 -05:00
|
|
|
cfg.Media.BasePath = config.Path(fmt.Sprintf("%s/tmp", m.StorageDirectory))
|
|
|
|
cfg.Media.AbsBasePath = config.Path(fmt.Sprintf("%s/tmp", m.StorageDirectory))
|
2020-06-19 07:29:27 -05:00
|
|
|
if err = cfg.Derive(); err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
base := setup.NewBaseDendrite(cfg, "Monolith", false)
|
|
|
|
defer base.Close() // nolint: errcheck
|
|
|
|
|
|
|
|
accountDB := base.CreateAccountsDB()
|
|
|
|
deviceDB := base.CreateDeviceDB()
|
|
|
|
federation := ygg.CreateFederationClient(base)
|
|
|
|
|
|
|
|
serverKeyAPI := &signing.YggdrasilKeys{}
|
|
|
|
keyRing := serverKeyAPI.KeyRing()
|
2020-07-30 12:00:56 -05:00
|
|
|
keyAPI := keyserver.NewInternalAPI(base.Cfg, federation, base.KafkaProducer)
|
|
|
|
userAPI := userapi.NewInternalAPI(accountDB, deviceDB, cfg.Matrix.ServerName, cfg.Derived.ApplicationServices, keyAPI)
|
|
|
|
keyAPI.SetUserAPI(userAPI)
|
2020-06-19 07:29:27 -05:00
|
|
|
|
|
|
|
rsAPI := roomserver.NewInternalAPI(
|
|
|
|
base, keyRing, federation,
|
|
|
|
)
|
|
|
|
|
|
|
|
eduInputAPI := eduserver.NewInternalAPI(
|
|
|
|
base, cache.New(), userAPI,
|
|
|
|
)
|
|
|
|
|
|
|
|
asAPI := appservice.NewInternalAPI(base, userAPI, rsAPI)
|
2020-08-04 05:32:14 -05:00
|
|
|
stateAPI := currentstateserver.NewInternalAPI(base.Cfg, base.KafkaConsumer)
|
2020-06-19 07:29:27 -05:00
|
|
|
fsAPI := federationsender.NewInternalAPI(
|
2020-08-04 05:32:14 -05:00
|
|
|
base, federation, rsAPI, stateAPI, keyRing,
|
2020-06-19 07:29:27 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
// The underlying roomserver implementation needs to be able to call the fedsender.
|
|
|
|
// This is different to rsAPI which can be the http client which doesn't need this dependency
|
|
|
|
rsAPI.SetFederationSenderAPI(fsAPI)
|
|
|
|
|
|
|
|
monolith := setup.Monolith{
|
|
|
|
Config: base.Cfg,
|
|
|
|
AccountDB: accountDB,
|
|
|
|
DeviceDB: deviceDB,
|
|
|
|
Client: ygg.CreateClient(base),
|
|
|
|
FedClient: federation,
|
|
|
|
KeyRing: keyRing,
|
|
|
|
KafkaConsumer: base.KafkaConsumer,
|
|
|
|
KafkaProducer: base.KafkaProducer,
|
|
|
|
|
|
|
|
AppserviceAPI: asAPI,
|
|
|
|
EDUInternalAPI: eduInputAPI,
|
|
|
|
FederationSenderAPI: fsAPI,
|
|
|
|
RoomserverAPI: rsAPI,
|
|
|
|
UserAPI: userAPI,
|
2020-07-01 07:35:58 -05:00
|
|
|
StateAPI: stateAPI,
|
2020-07-30 12:00:56 -05:00
|
|
|
KeyAPI: keyAPI,
|
2020-07-03 08:29:36 -05:00
|
|
|
ExtPublicRoomsProvider: yggrooms.NewYggdrasilRoomProvider(
|
|
|
|
ygg, fsAPI, federation,
|
|
|
|
),
|
2020-06-19 07:29:27 -05:00
|
|
|
}
|
|
|
|
monolith.AddAllPublicRoutes(base.PublicAPIMux)
|
|
|
|
|
|
|
|
httputil.SetupHTTPAPI(
|
|
|
|
base.BaseMux,
|
|
|
|
base.PublicAPIMux,
|
|
|
|
base.InternalAPIMux,
|
|
|
|
cfg,
|
|
|
|
base.UseHTTPAPIs,
|
|
|
|
)
|
|
|
|
|
|
|
|
// Build both ends of a HTTP multiplex.
|
2020-07-10 10:28:18 -05:00
|
|
|
m.httpServer = &http.Server{
|
2020-06-19 07:29:27 -05:00
|
|
|
Addr: ":0",
|
|
|
|
TLSNextProto: map[string]func(*http.Server, *tls.Conn, http.Handler){},
|
2020-07-10 10:28:18 -05:00
|
|
|
ReadTimeout: 30 * time.Second,
|
|
|
|
WriteTimeout: 30 * time.Second,
|
2020-06-19 07:29:27 -05:00
|
|
|
IdleTimeout: 60 * time.Second,
|
|
|
|
BaseContext: func(_ net.Listener) context.Context {
|
|
|
|
return context.Background()
|
|
|
|
},
|
|
|
|
Handler: base.BaseMux,
|
|
|
|
}
|
|
|
|
|
2020-07-16 07:52:08 -05:00
|
|
|
go func() {
|
2020-07-16 08:26:04 -05:00
|
|
|
m.logger.Info("Listening on ", ygg.DerivedServerName())
|
|
|
|
m.logger.Fatal(m.httpServer.Serve(ygg))
|
2020-07-16 07:52:08 -05:00
|
|
|
}()
|
|
|
|
go func() {
|
2020-07-16 08:26:04 -05:00
|
|
|
m.logger.Info("Listening on ", m.BaseURL())
|
|
|
|
m.logger.Fatal(m.httpServer.Serve(m.listener))
|
2020-07-16 07:52:08 -05:00
|
|
|
}()
|
|
|
|
go func() {
|
|
|
|
logrus.Info("Sending wake-up message to known nodes")
|
|
|
|
req := &api.PerformBroadcastEDURequest{}
|
|
|
|
res := &api.PerformBroadcastEDUResponse{}
|
|
|
|
if err := fsAPI.PerformBroadcastEDU(context.TODO(), req, res); err != nil {
|
|
|
|
logrus.WithError(err).Error("Failed to send wake-up message to known nodes")
|
|
|
|
}
|
|
|
|
}()
|
2020-06-19 07:29:27 -05:00
|
|
|
}
|
2020-07-06 11:09:02 -05:00
|
|
|
|
2020-07-10 10:28:18 -05:00
|
|
|
func (m *DendriteMonolith) Suspend() {
|
|
|
|
m.logger.Info("Suspending monolith")
|
|
|
|
if err := m.httpServer.Close(); err != nil {
|
|
|
|
m.logger.Warn("Error stopping HTTP server:", err)
|
2020-07-06 11:09:02 -05:00
|
|
|
}
|
|
|
|
}
|