2020-08-10 13:18:04 +00:00
|
|
|
package config
|
|
|
|
|
2023-02-14 11:47:47 +00:00
|
|
|
import (
|
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2023-04-19 14:50:33 +00:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2023-02-14 11:47:47 +00:00
|
|
|
)
|
2021-11-24 10:45:23 +00:00
|
|
|
|
2020-08-10 13:18:04 +00:00
|
|
|
type FederationAPI struct {
|
|
|
|
Matrix *Global `yaml:"-"`
|
|
|
|
|
2021-11-24 10:45:23 +00:00
|
|
|
// The database stores information used by the federation destination queues to
|
|
|
|
// send transactions to remote servers.
|
2022-09-01 13:15:41 +00:00
|
|
|
Database DatabaseOptions `yaml:"database,omitempty"`
|
2021-11-24 10:45:23 +00:00
|
|
|
|
|
|
|
// Federation failure threshold. How many consecutive failures that we should
|
|
|
|
// tolerate when sending federation requests to a specific server. The backoff
|
|
|
|
// is 2**x seconds, so 1 = 2 seconds, 2 = 4 seconds, 3 = 8 seconds, etc.
|
|
|
|
// The default value is 16 if not specified, which is circa 18 hours.
|
|
|
|
FederationMaxRetries uint32 `yaml:"send_max_retries"`
|
|
|
|
|
2023-01-23 17:55:12 +00:00
|
|
|
// P2P Feature: How many consecutive failures that we should tolerate when
|
|
|
|
// sending federation requests to a specific server until we should assume they
|
|
|
|
// are offline. If we assume they are offline then we will attempt to send
|
|
|
|
// messages to their relay server if we know of one that is appropriate.
|
|
|
|
P2PFederationRetriesUntilAssumedOffline uint32 `yaml:"p2p_retries_until_assumed_offline"`
|
|
|
|
|
2021-11-24 10:45:23 +00:00
|
|
|
// FederationDisableTLSValidation disables the validation of X.509 TLS certs
|
|
|
|
// on remote federation endpoints. This is not recommended in production!
|
|
|
|
DisableTLSValidation bool `yaml:"disable_tls_validation"`
|
|
|
|
|
2022-09-20 16:17:44 +00:00
|
|
|
// DisableHTTPKeepalives prevents Dendrite from keeping HTTP connections
|
|
|
|
// open for reuse for future requests. Connections will be closed quicker
|
|
|
|
// but we may spend more time on TLS handshakes instead.
|
|
|
|
DisableHTTPKeepalives bool `yaml:"disable_http_keepalives"`
|
|
|
|
|
2021-11-24 10:45:23 +00:00
|
|
|
// Perspective keyservers, to use as a backup when direct key fetch
|
|
|
|
// requests don't succeed
|
|
|
|
KeyPerspectives KeyPerspectives `yaml:"key_perspectives"`
|
|
|
|
|
|
|
|
// Should we prefer direct key fetches over perspective ones?
|
|
|
|
PreferDirectFetch bool `yaml:"prefer_direct_fetch"`
|
2020-08-10 13:18:04 +00:00
|
|
|
}
|
|
|
|
|
2022-09-01 13:15:41 +00:00
|
|
|
func (c *FederationAPI) Defaults(opts DefaultOpts) {
|
2022-05-13 07:33:55 +00:00
|
|
|
c.FederationMaxRetries = 16
|
2023-01-28 23:27:53 +00:00
|
|
|
c.P2PFederationRetriesUntilAssumedOffline = 1
|
2022-05-13 07:33:55 +00:00
|
|
|
c.DisableTLSValidation = false
|
2022-09-20 16:17:44 +00:00
|
|
|
c.DisableHTTPKeepalives = false
|
2022-09-01 13:15:41 +00:00
|
|
|
if opts.Generate {
|
|
|
|
c.KeyPerspectives = KeyPerspectives{
|
|
|
|
{
|
|
|
|
ServerName: "matrix.org",
|
|
|
|
Keys: []KeyPerspectiveTrustKey{
|
|
|
|
{
|
|
|
|
KeyID: "ed25519:auto",
|
|
|
|
PublicKey: "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
KeyID: "ed25519:a_RXGa",
|
|
|
|
PublicKey: "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2023-02-14 11:47:47 +00:00
|
|
|
if !opts.SingleDatabase {
|
2022-09-01 13:15:41 +00:00
|
|
|
c.Database.ConnectionString = "file:federationapi.db"
|
|
|
|
}
|
2021-11-24 11:57:39 +00:00
|
|
|
}
|
2020-08-10 13:18:04 +00:00
|
|
|
}
|
|
|
|
|
2023-02-14 11:47:47 +00:00
|
|
|
func (c *FederationAPI) Verify(configErrs *ConfigErrors) {
|
2022-09-01 13:15:41 +00:00
|
|
|
if c.Matrix.DatabaseOptions.ConnectionString == "" {
|
|
|
|
checkNotEmpty(configErrs, "federation_api.database.connection_string", string(c.Database.ConnectionString))
|
|
|
|
}
|
2020-08-10 13:18:04 +00:00
|
|
|
}
|
2021-11-24 10:45:23 +00:00
|
|
|
|
|
|
|
// The config for setting a proxy to use for server->server requests
|
|
|
|
type Proxy struct {
|
|
|
|
// Is the proxy enabled?
|
|
|
|
Enabled bool `yaml:"enabled"`
|
|
|
|
// The protocol for the proxy (http / https / socks5)
|
|
|
|
Protocol string `yaml:"protocol"`
|
|
|
|
// The host where the proxy is listening
|
|
|
|
Host string `yaml:"host"`
|
|
|
|
// The port on which the proxy is listening
|
|
|
|
Port uint16 `yaml:"port"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Proxy) Defaults() {
|
|
|
|
c.Enabled = false
|
|
|
|
c.Protocol = "http"
|
|
|
|
c.Host = "localhost"
|
|
|
|
c.Port = 8080
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Proxy) Verify(configErrs *ConfigErrors) {
|
|
|
|
}
|
|
|
|
|
|
|
|
// KeyPerspectives are used to configure perspective key servers for
|
|
|
|
// retrieving server keys.
|
|
|
|
type KeyPerspectives []KeyPerspective
|
|
|
|
|
|
|
|
type KeyPerspective struct {
|
|
|
|
// The server name of the perspective key server
|
2023-04-19 14:50:33 +00:00
|
|
|
ServerName spec.ServerName `yaml:"server_name"`
|
2021-11-24 10:45:23 +00:00
|
|
|
// Server keys for the perspective user, used to verify the
|
|
|
|
// keys have been signed by the perspective server
|
|
|
|
Keys []KeyPerspectiveTrustKey `yaml:"keys"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type KeyPerspectiveTrustKey struct {
|
|
|
|
// The key ID, e.g. ed25519:auto
|
|
|
|
KeyID gomatrixserverlib.KeyID `yaml:"key_id"`
|
|
|
|
// The public key in base64 unpadded format
|
|
|
|
PublicKey string `yaml:"public_key"`
|
|
|
|
}
|