2020-08-10 08:18:04 -05:00
|
|
|
package config
|
|
|
|
|
|
|
|
import (
|
|
|
|
"math/rand"
|
2022-07-11 08:31:31 -05:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
2020-08-10 08:18:04 -05:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
"golang.org/x/crypto/ed25519"
|
|
|
|
)
|
|
|
|
|
|
|
|
type Global struct {
|
|
|
|
// The name of the server. This is usually the domain name, e.g 'matrix.org', 'localhost'.
|
|
|
|
ServerName gomatrixserverlib.ServerName `yaml:"server_name"`
|
|
|
|
|
|
|
|
// Path to the private key which will be used to sign requests and events.
|
|
|
|
PrivateKeyPath Path `yaml:"private_key"`
|
|
|
|
|
|
|
|
// The private key which will be used to sign requests and events.
|
|
|
|
PrivateKey ed25519.PrivateKey `yaml:"-"`
|
|
|
|
|
|
|
|
// An arbitrary string used to uniquely identify the PrivateKey. Must start with the
|
|
|
|
// prefix "ed25519:".
|
2020-09-23 05:07:57 -05:00
|
|
|
KeyID gomatrixserverlib.KeyID `yaml:"-"`
|
2020-08-10 08:18:04 -05:00
|
|
|
|
2020-09-25 04:58:53 -05:00
|
|
|
// Information about old private keys that used to be used to sign requests and
|
|
|
|
// events on this domain. They will not be used but will be advertised to other
|
|
|
|
// servers that ask for them to help verify old events.
|
2022-10-06 05:56:00 -05:00
|
|
|
OldVerifyKeys []*OldVerifyKeys `yaml:"old_private_keys"`
|
2020-09-25 04:58:53 -05:00
|
|
|
|
2020-08-10 08:18:04 -05:00
|
|
|
// How long a remote server can cache our server key for before requesting it again.
|
|
|
|
// Increasing this number will reduce the number of requests made by remote servers
|
|
|
|
// for our key, but increases the period a compromised key will be considered valid
|
|
|
|
// by remote servers.
|
|
|
|
// Defaults to 24 hours.
|
|
|
|
KeyValidityPeriod time.Duration `yaml:"key_validity_period"`
|
|
|
|
|
2022-05-03 10:35:06 -05:00
|
|
|
// Global pool of database connections, which is used only in monolith mode. If a
|
|
|
|
// component does not specify any database options of its own, then this pool of
|
|
|
|
// connections will be used instead. This way we don't have to manage connection
|
|
|
|
// counts on a per-component basis, but can instead do it for the entire monolith.
|
|
|
|
// In a polylith deployment, this will be ignored.
|
2022-09-01 08:15:41 -05:00
|
|
|
DatabaseOptions DatabaseOptions `yaml:"database,omitempty"`
|
2022-05-03 10:35:06 -05:00
|
|
|
|
2021-09-10 04:05:31 -05:00
|
|
|
// The server name to delegate server-server communications to, with optional port
|
|
|
|
WellKnownServerName string `yaml:"well_known_server_name"`
|
|
|
|
|
2022-07-25 04:39:57 -05:00
|
|
|
// The server name to delegate client-server communications to, with optional port
|
|
|
|
WellKnownClientName string `yaml:"well_known_client_name"`
|
|
|
|
|
2020-12-02 09:10:03 -06:00
|
|
|
// Disables federation. Dendrite will not be able to make any outbound HTTP requests
|
|
|
|
// to other servers and the federation API will not be exposed.
|
|
|
|
DisableFederation bool `yaml:"disable_federation"`
|
|
|
|
|
2022-04-06 06:11:19 -05:00
|
|
|
// Configures the handling of presence events.
|
|
|
|
Presence PresenceOptions `yaml:"presence"`
|
|
|
|
|
2020-08-10 08:18:04 -05:00
|
|
|
// List of domains that the server will trust as identity servers to
|
|
|
|
// verify third-party identifiers.
|
|
|
|
// Defaults to an empty array.
|
|
|
|
TrustedIDServers []string `yaml:"trusted_third_party_id_servers"`
|
|
|
|
|
2022-01-05 11:44:49 -06:00
|
|
|
// JetStream configuration
|
|
|
|
JetStream JetStream `yaml:"jetstream"`
|
2020-08-10 08:18:04 -05:00
|
|
|
|
|
|
|
// Metrics configuration
|
|
|
|
Metrics Metrics `yaml:"metrics"`
|
2021-01-22 08:16:59 -06:00
|
|
|
|
2021-03-24 05:25:24 -05:00
|
|
|
// Sentry configuration
|
|
|
|
Sentry Sentry `yaml:"sentry"`
|
|
|
|
|
2021-01-22 08:16:59 -06:00
|
|
|
// DNS caching options for all outbound HTTP requests
|
|
|
|
DNSCache DNSCacheOptions `yaml:"dns_cache"`
|
2022-02-18 09:05:03 -06:00
|
|
|
|
|
|
|
// ServerNotices configuration used for sending server notices
|
|
|
|
ServerNotices ServerNotices `yaml:"server_notices"`
|
2022-05-04 12:04:28 -05:00
|
|
|
|
2022-07-19 05:51:46 -05:00
|
|
|
// ReportStats configures opt-in phone-home statistics reporting.
|
2022-05-04 12:04:28 -05:00
|
|
|
ReportStats ReportStats `yaml:"report_stats"`
|
2022-07-11 08:31:31 -05:00
|
|
|
|
|
|
|
// Configuration for the caches.
|
|
|
|
Cache Cache `yaml:"cache"`
|
2020-08-10 08:18:04 -05:00
|
|
|
}
|
|
|
|
|
2022-09-01 08:15:41 -05:00
|
|
|
func (c *Global) Defaults(opts DefaultOpts) {
|
|
|
|
if opts.Generate {
|
2021-11-24 05:57:39 -06:00
|
|
|
c.ServerName = "localhost"
|
|
|
|
c.PrivateKeyPath = "matrix_key.pem"
|
|
|
|
_, c.PrivateKey, _ = ed25519.GenerateKey(rand.New(rand.NewSource(0)))
|
|
|
|
c.KeyID = "ed25519:auto"
|
2022-09-01 08:15:41 -05:00
|
|
|
c.TrustedIDServers = []string{
|
|
|
|
"matrix.org",
|
|
|
|
"vector.im",
|
|
|
|
}
|
2021-11-24 05:57:39 -06:00
|
|
|
}
|
2020-08-10 08:18:04 -05:00
|
|
|
c.KeyValidityPeriod = time.Hour * 24 * 7
|
2022-09-01 08:15:41 -05:00
|
|
|
if opts.Monolithic {
|
|
|
|
c.DatabaseOptions.Defaults(90)
|
|
|
|
}
|
|
|
|
c.JetStream.Defaults(opts)
|
|
|
|
c.Metrics.Defaults(opts)
|
2021-01-22 08:16:59 -06:00
|
|
|
c.DNSCache.Defaults()
|
2021-03-24 05:25:24 -05:00
|
|
|
c.Sentry.Defaults()
|
2022-09-01 08:15:41 -05:00
|
|
|
c.ServerNotices.Defaults(opts)
|
2022-05-04 12:04:28 -05:00
|
|
|
c.ReportStats.Defaults()
|
2022-09-01 08:15:41 -05:00
|
|
|
c.Cache.Defaults()
|
2020-08-10 08:18:04 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Global) Verify(configErrs *ConfigErrors, isMonolith bool) {
|
|
|
|
checkNotEmpty(configErrs, "global.server_name", string(c.ServerName))
|
|
|
|
checkNotEmpty(configErrs, "global.private_key", string(c.PrivateKeyPath))
|
|
|
|
|
2022-01-05 11:44:49 -06:00
|
|
|
c.JetStream.Verify(configErrs, isMonolith)
|
2020-08-10 08:18:04 -05:00
|
|
|
c.Metrics.Verify(configErrs, isMonolith)
|
2021-03-24 05:25:24 -05:00
|
|
|
c.Sentry.Verify(configErrs, isMonolith)
|
2021-01-22 08:16:59 -06:00
|
|
|
c.DNSCache.Verify(configErrs, isMonolith)
|
2022-02-18 09:05:03 -06:00
|
|
|
c.ServerNotices.Verify(configErrs, isMonolith)
|
2022-05-04 12:04:28 -05:00
|
|
|
c.ReportStats.Verify(configErrs, isMonolith)
|
2022-07-11 08:31:31 -05:00
|
|
|
c.Cache.Verify(configErrs, isMonolith)
|
2020-08-10 08:18:04 -05:00
|
|
|
}
|
|
|
|
|
2020-09-25 04:58:53 -05:00
|
|
|
type OldVerifyKeys struct {
|
|
|
|
// Path to the private key.
|
|
|
|
PrivateKeyPath Path `yaml:"private_key"`
|
|
|
|
|
|
|
|
// The private key itself.
|
|
|
|
PrivateKey ed25519.PrivateKey `yaml:"-"`
|
|
|
|
|
2022-10-06 05:56:00 -05:00
|
|
|
// The public key, in case only that part is known.
|
|
|
|
PublicKey gomatrixserverlib.Base64Bytes `yaml:"public_key"`
|
|
|
|
|
2020-09-25 04:58:53 -05:00
|
|
|
// The key ID of the private key.
|
2022-10-06 05:56:00 -05:00
|
|
|
KeyID gomatrixserverlib.KeyID `yaml:"key_id"`
|
2020-09-25 04:58:53 -05:00
|
|
|
|
|
|
|
// When the private key was designed as "expired", as a UNIX timestamp
|
|
|
|
// in millisecond precision.
|
|
|
|
ExpiredAt gomatrixserverlib.Timestamp `yaml:"expired_at"`
|
|
|
|
}
|
|
|
|
|
2020-08-10 08:18:04 -05:00
|
|
|
// The configuration to use for Prometheus metrics
|
|
|
|
type Metrics struct {
|
|
|
|
// Whether or not the metrics are enabled
|
|
|
|
Enabled bool `yaml:"enabled"`
|
|
|
|
// Use BasicAuth for Authorization
|
|
|
|
BasicAuth struct {
|
|
|
|
// Authorization via Static Username & Password
|
|
|
|
// Hardcoded Username and Password
|
|
|
|
Username string `yaml:"username"`
|
|
|
|
Password string `yaml:"password"`
|
|
|
|
} `yaml:"basic_auth"`
|
|
|
|
}
|
|
|
|
|
2022-09-01 08:15:41 -05:00
|
|
|
func (c *Metrics) Defaults(opts DefaultOpts) {
|
2020-08-10 08:18:04 -05:00
|
|
|
c.Enabled = false
|
2022-09-01 08:15:41 -05:00
|
|
|
if opts.Generate {
|
2021-11-24 05:57:39 -06:00
|
|
|
c.BasicAuth.Username = "metrics"
|
|
|
|
c.BasicAuth.Password = "metrics"
|
|
|
|
}
|
2020-08-10 08:18:04 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Metrics) Verify(configErrs *ConfigErrors, isMonolith bool) {
|
|
|
|
}
|
|
|
|
|
2022-02-18 09:05:03 -06:00
|
|
|
// ServerNotices defines the configuration used for sending server notices
|
|
|
|
type ServerNotices struct {
|
|
|
|
Enabled bool `yaml:"enabled"`
|
|
|
|
// The localpart to be used when sending notices
|
|
|
|
LocalPart string `yaml:"local_part"`
|
|
|
|
// The displayname to be used when sending notices
|
|
|
|
DisplayName string `yaml:"display_name"`
|
|
|
|
// The avatar of this user
|
|
|
|
AvatarURL string `yaml:"avatar"`
|
|
|
|
// The roomname to be used when creating messages
|
|
|
|
RoomName string `yaml:"room_name"`
|
|
|
|
}
|
|
|
|
|
2022-09-01 08:15:41 -05:00
|
|
|
func (c *ServerNotices) Defaults(opts DefaultOpts) {
|
|
|
|
if opts.Generate {
|
2022-02-18 09:05:03 -06:00
|
|
|
c.Enabled = true
|
|
|
|
c.LocalPart = "_server"
|
|
|
|
c.DisplayName = "Server Alert"
|
|
|
|
c.RoomName = "Server Alert"
|
|
|
|
c.AvatarURL = ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ServerNotices) Verify(errors *ConfigErrors, isMonolith bool) {}
|
|
|
|
|
2022-07-11 08:31:31 -05:00
|
|
|
type Cache struct {
|
|
|
|
EstimatedMaxSize DataUnit `yaml:"max_size_estimated"`
|
|
|
|
MaxAge time.Duration `yaml:"max_age"`
|
|
|
|
}
|
|
|
|
|
2022-09-01 08:15:41 -05:00
|
|
|
func (c *Cache) Defaults() {
|
2022-07-11 08:31:31 -05:00
|
|
|
c.EstimatedMaxSize = 1024 * 1024 * 1024 // 1GB
|
|
|
|
c.MaxAge = time.Hour
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Cache) Verify(errors *ConfigErrors, isMonolith bool) {
|
|
|
|
checkPositive(errors, "max_size_estimated", int64(c.EstimatedMaxSize))
|
|
|
|
}
|
|
|
|
|
2022-07-19 05:51:46 -05:00
|
|
|
// ReportStats configures opt-in phone-home statistics reporting.
|
2022-05-04 12:04:28 -05:00
|
|
|
type ReportStats struct {
|
2022-07-19 05:51:46 -05:00
|
|
|
// Enabled configures phone-home statistics of the server
|
2022-05-04 12:04:28 -05:00
|
|
|
Enabled bool `yaml:"enabled"`
|
|
|
|
|
|
|
|
// Endpoint the endpoint to report stats to
|
|
|
|
Endpoint string `yaml:"endpoint"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ReportStats) Defaults() {
|
|
|
|
c.Enabled = false
|
|
|
|
c.Endpoint = "https://matrix.org/report-usage-stats/push"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ReportStats) Verify(configErrs *ConfigErrors, isMonolith bool) {
|
|
|
|
if c.Enabled {
|
|
|
|
checkNotEmpty(configErrs, "global.report_stats.endpoint", c.Endpoint)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-24 05:25:24 -05:00
|
|
|
// The configuration to use for Sentry error reporting
|
|
|
|
type Sentry struct {
|
|
|
|
Enabled bool `yaml:"enabled"`
|
|
|
|
// The DSN to connect to e.g "https://examplePublicKey@o0.ingest.sentry.io/0"
|
|
|
|
// See https://docs.sentry.io/platforms/go/configuration/options/
|
|
|
|
DSN string `yaml:"dsn"`
|
|
|
|
// The environment e.g "production"
|
|
|
|
// See https://docs.sentry.io/platforms/go/configuration/environments/
|
|
|
|
Environment string `yaml:"environment"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Sentry) Defaults() {
|
|
|
|
c.Enabled = false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Sentry) Verify(configErrs *ConfigErrors, isMonolith bool) {
|
|
|
|
}
|
|
|
|
|
2020-08-10 08:18:04 -05:00
|
|
|
type DatabaseOptions struct {
|
|
|
|
// The connection string, file:filename.db or postgres://server....
|
|
|
|
ConnectionString DataSource `yaml:"connection_string"`
|
|
|
|
// Maximum open connections to the DB (0 = use default, negative means unlimited)
|
|
|
|
MaxOpenConnections int `yaml:"max_open_conns"`
|
|
|
|
// Maximum idle connections to the DB (0 = use default, negative means unlimited)
|
|
|
|
MaxIdleConnections int `yaml:"max_idle_conns"`
|
|
|
|
// maximum amount of time (in seconds) a connection may be reused (<= 0 means unlimited)
|
|
|
|
ConnMaxLifetimeSeconds int `yaml:"conn_max_lifetime"`
|
|
|
|
}
|
|
|
|
|
2021-03-08 07:18:29 -06:00
|
|
|
func (c *DatabaseOptions) Defaults(conns int) {
|
|
|
|
c.MaxOpenConnections = conns
|
2020-08-10 08:18:04 -05:00
|
|
|
c.MaxIdleConnections = 2
|
|
|
|
c.ConnMaxLifetimeSeconds = -1
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *DatabaseOptions) Verify(configErrs *ConfigErrors, isMonolith bool) {
|
|
|
|
}
|
|
|
|
|
|
|
|
// MaxIdleConns returns maximum idle connections to the DB
|
|
|
|
func (c DatabaseOptions) MaxIdleConns() int {
|
|
|
|
return c.MaxIdleConnections
|
|
|
|
}
|
|
|
|
|
|
|
|
// MaxOpenConns returns maximum open connections to the DB
|
|
|
|
func (c DatabaseOptions) MaxOpenConns() int {
|
|
|
|
return c.MaxOpenConnections
|
|
|
|
}
|
|
|
|
|
|
|
|
// ConnMaxLifetime returns maximum amount of time a connection may be reused
|
|
|
|
func (c DatabaseOptions) ConnMaxLifetime() time.Duration {
|
|
|
|
return time.Duration(c.ConnMaxLifetimeSeconds) * time.Second
|
|
|
|
}
|
2021-01-22 08:16:59 -06:00
|
|
|
|
|
|
|
type DNSCacheOptions struct {
|
|
|
|
// Whether the DNS cache is enabled or not
|
|
|
|
Enabled bool `yaml:"enabled"`
|
|
|
|
// How many entries to store in the DNS cache at a given time
|
|
|
|
CacheSize int `yaml:"cache_size"`
|
|
|
|
// How long a cache entry should be considered valid for
|
|
|
|
CacheLifetime time.Duration `yaml:"cache_lifetime"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *DNSCacheOptions) Defaults() {
|
|
|
|
c.Enabled = false
|
|
|
|
c.CacheSize = 256
|
|
|
|
c.CacheLifetime = time.Minute * 5
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *DNSCacheOptions) Verify(configErrs *ConfigErrors, isMonolith bool) {
|
|
|
|
checkPositive(configErrs, "cache_size", int64(c.CacheSize))
|
|
|
|
checkPositive(configErrs, "cache_lifetime", int64(c.CacheLifetime))
|
|
|
|
}
|
2022-04-06 06:11:19 -05:00
|
|
|
|
|
|
|
// PresenceOptions defines possible configurations for presence events.
|
|
|
|
type PresenceOptions struct {
|
|
|
|
// Whether inbound presence events are allowed
|
|
|
|
EnableInbound bool `yaml:"enable_inbound"`
|
|
|
|
// Whether outbound presence events are allowed
|
|
|
|
EnableOutbound bool `yaml:"enable_outbound"`
|
|
|
|
}
|
2022-07-11 08:31:31 -05:00
|
|
|
|
|
|
|
type DataUnit int64
|
|
|
|
|
|
|
|
func (d *DataUnit) UnmarshalText(text []byte) error {
|
|
|
|
var magnitude float64
|
|
|
|
s := strings.ToLower(string(text))
|
|
|
|
switch {
|
|
|
|
case strings.HasSuffix(s, "tb"):
|
|
|
|
s, magnitude = s[:len(s)-2], 1024*1024*1024*1024
|
|
|
|
case strings.HasSuffix(s, "gb"):
|
|
|
|
s, magnitude = s[:len(s)-2], 1024*1024*1024
|
|
|
|
case strings.HasSuffix(s, "mb"):
|
|
|
|
s, magnitude = s[:len(s)-2], 1024*1024
|
|
|
|
case strings.HasSuffix(s, "kb"):
|
|
|
|
s, magnitude = s[:len(s)-2], 1024
|
|
|
|
default:
|
|
|
|
magnitude = 1
|
|
|
|
}
|
|
|
|
v, err := strconv.ParseFloat(s, 64)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
*d = DataUnit(v * magnitude)
|
|
|
|
return nil
|
|
|
|
}
|