2014-08-31 09:06:39 -06:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-06 21:26:29 -07:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2019-01-07 03:14:31 -07:00
|
|
|
# Copyright 2017-2018 New Vector Ltd
|
2019-05-16 07:26:41 -06:00
|
|
|
# Copyright 2019 The Matrix.org Foundation C.I.C.
|
2014-08-31 09:06:39 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2018-05-31 03:04:50 -06:00
|
|
|
import logging
|
2018-12-21 08:04:57 -07:00
|
|
|
import os.path
|
2019-08-28 06:12:22 -06:00
|
|
|
import re
|
|
|
|
from textwrap import indent
|
2019-11-19 06:30:04 -07:00
|
|
|
from typing import Dict, List, Optional
|
2018-05-31 03:04:50 -06:00
|
|
|
|
2019-07-29 10:47:27 -06:00
|
|
|
import attr
|
2019-08-28 06:12:22 -06:00
|
|
|
import yaml
|
2019-05-13 12:05:06 -06:00
|
|
|
from netaddr import IPSet
|
|
|
|
|
2019-05-23 08:00:20 -06:00
|
|
|
from synapse.api.room_versions import KNOWN_ROOM_VERSIONS
|
2018-07-04 11:15:03 -06:00
|
|
|
from synapse.http.endpoint import parse_and_validate_server_name
|
2019-01-07 03:14:31 -07:00
|
|
|
from synapse.python_dependencies import DependencyException, check_requirements
|
2018-07-09 00:09:20 -06:00
|
|
|
|
2016-06-07 08:45:56 -06:00
|
|
|
from ._base import Config, ConfigError
|
2014-08-31 09:06:39 -06:00
|
|
|
|
2018-05-31 03:04:50 -06:00
|
|
|
logger = logging.Logger(__name__)
|
|
|
|
|
2019-02-11 05:50:30 -07:00
|
|
|
# by default, we attempt to listen on both '::' *and* '0.0.0.0' because some OSes
|
|
|
|
# (Windows, macOS, other BSD/Linux where net.ipv6.bindv6only is set) will only listen
|
|
|
|
# on IPv6 when '::' is set.
|
|
|
|
#
|
|
|
|
# We later check for errors when binding to 0.0.0.0 and ignore them if :: is also in
|
|
|
|
# in the list.
|
2019-06-20 03:32:02 -06:00
|
|
|
DEFAULT_BIND_ADDRESSES = ["::", "0.0.0.0"]
|
2019-02-11 05:50:30 -07:00
|
|
|
|
2019-10-19 02:06:15 -06:00
|
|
|
DEFAULT_ROOM_VERSION = "5"
|
2019-05-23 08:00:20 -06:00
|
|
|
|
2019-07-29 10:47:27 -06:00
|
|
|
ROOM_COMPLEXITY_TOO_GREAT = (
|
|
|
|
"Your homeserver is unable to join rooms this large or complex. "
|
|
|
|
"Please speak to your server administrator, or upgrade your instance "
|
|
|
|
"to join this room."
|
|
|
|
)
|
|
|
|
|
2019-09-26 05:57:01 -06:00
|
|
|
METRICS_PORT_WARNING = """\
|
|
|
|
The metrics_port configuration option is deprecated in Synapse 0.31 in favour of
|
|
|
|
a listener. Please see
|
|
|
|
https://github.com/matrix-org/synapse/blob/master/docs/metrics-howto.md
|
|
|
|
on how to configure the new listener.
|
|
|
|
--------------------------------------------------------------------------------"""
|
|
|
|
|
2014-08-31 09:06:39 -06:00
|
|
|
|
|
|
|
class ServerConfig(Config):
|
2019-10-10 02:39:35 -06:00
|
|
|
section = "server"
|
|
|
|
|
2019-06-24 04:34:45 -06:00
|
|
|
def read_config(self, config, **kwargs):
|
2015-04-29 21:24:44 -06:00
|
|
|
self.server_name = config["server_name"]
|
2019-04-08 08:47:39 -06:00
|
|
|
self.server_context = config.get("server_context", None)
|
2018-07-04 11:15:03 -06:00
|
|
|
|
|
|
|
try:
|
|
|
|
parse_and_validate_server_name(self.server_name)
|
|
|
|
except ValueError as e:
|
|
|
|
raise ConfigError(str(e))
|
|
|
|
|
2015-04-29 21:24:44 -06:00
|
|
|
self.pid_file = self.abspath(config.get("pid_file"))
|
2015-08-25 05:01:23 -06:00
|
|
|
self.web_client_location = config.get("web_client_location", None)
|
2019-03-19 04:06:40 -06:00
|
|
|
self.soft_file_limit = config.get("soft_file_limit", 0)
|
2015-05-01 07:34:48 -06:00
|
|
|
self.daemonize = config.get("daemonize")
|
2015-08-07 09:36:42 -06:00
|
|
|
self.print_pidfile = config.get("print_pidfile")
|
2015-10-05 19:49:39 -06:00
|
|
|
self.user_agent_suffix = config.get("user_agent_suffix")
|
2016-06-17 08:11:22 -06:00
|
|
|
self.use_frozen_dicts = config.get("use_frozen_dicts", False)
|
2016-04-27 08:09:55 -06:00
|
|
|
self.public_baseurl = config.get("public_baseurl")
|
|
|
|
|
2016-11-16 10:34:44 -07:00
|
|
|
# Whether to send federation traffic out in this process. This only
|
|
|
|
# applies to some federation traffic, and so shouldn't be used to
|
|
|
|
# "disable" federation
|
|
|
|
self.send_federation = config.get("send_federation", True)
|
|
|
|
|
2018-08-17 09:08:45 -06:00
|
|
|
# Whether to enable user presence.
|
|
|
|
self.use_presence = config.get("use_presence", True)
|
|
|
|
|
2017-06-15 05:47:05 -06:00
|
|
|
# Whether to update the user directory or not. This should be set to
|
|
|
|
# false only if we are updating the user directory in a worker
|
|
|
|
self.update_user_directory = config.get("update_user_directory", True)
|
|
|
|
|
2017-11-21 06:29:39 -07:00
|
|
|
# whether to enable the media repository endpoints. This should be set
|
|
|
|
# to false if the media repository is running as a separate endpoint;
|
|
|
|
# doing so ensures that we will not run cache cleanup jobs on the
|
|
|
|
# master, potentially causing inconsistency.
|
|
|
|
self.enable_media_repo = config.get("enable_media_repo", True)
|
|
|
|
|
2019-05-08 11:26:56 -06:00
|
|
|
# Whether to require authentication to retrieve profile data (avatars,
|
|
|
|
# display names) of other users through the client API.
|
|
|
|
self.require_auth_for_profile_requests = config.get(
|
2019-06-20 03:32:02 -06:00
|
|
|
"require_auth_for_profile_requests", False
|
2019-05-08 11:26:56 -06:00
|
|
|
)
|
|
|
|
|
2019-12-16 09:11:55 -07:00
|
|
|
# Whether to require sharing a room with a user to retrieve their
|
|
|
|
# profile data
|
|
|
|
self.limit_profile_requests_to_users_who_share_rooms = config.get(
|
|
|
|
"limit_profile_requests_to_users_who_share_rooms", False,
|
|
|
|
)
|
|
|
|
|
2019-06-24 04:45:11 -06:00
|
|
|
if "restrict_public_rooms_to_local_users" in config and (
|
|
|
|
"allow_public_rooms_without_auth" in config
|
|
|
|
or "allow_public_rooms_over_federation" in config
|
|
|
|
):
|
|
|
|
raise ConfigError(
|
|
|
|
"Can't use 'restrict_public_rooms_to_local_users' if"
|
|
|
|
" 'allow_public_rooms_without_auth' and/or"
|
|
|
|
" 'allow_public_rooms_over_federation' is set."
|
|
|
|
)
|
|
|
|
|
|
|
|
# Check if the legacy "restrict_public_rooms_to_local_users" flag is set. This
|
|
|
|
# flag is now obsolete but we need to check it for backward-compatibility.
|
|
|
|
if config.get("restrict_public_rooms_to_local_users", False):
|
|
|
|
self.allow_public_rooms_without_auth = False
|
|
|
|
self.allow_public_rooms_over_federation = False
|
|
|
|
else:
|
2019-12-04 02:46:16 -07:00
|
|
|
# If set to 'true', removes the need for authentication to access the server's
|
|
|
|
# public rooms directory through the client API, meaning that anyone can
|
|
|
|
# query the room directory. Defaults to 'false'.
|
2019-06-24 04:45:11 -06:00
|
|
|
self.allow_public_rooms_without_auth = config.get(
|
2019-12-04 02:46:16 -07:00
|
|
|
"allow_public_rooms_without_auth", False
|
2019-06-24 04:45:11 -06:00
|
|
|
)
|
2019-12-04 02:46:16 -07:00
|
|
|
# If set to 'true', allows any other homeserver to fetch the server's public
|
|
|
|
# rooms directory via federation. Defaults to 'false'.
|
2019-06-24 04:45:11 -06:00
|
|
|
self.allow_public_rooms_over_federation = config.get(
|
2019-12-04 02:46:16 -07:00
|
|
|
"allow_public_rooms_over_federation", False
|
2019-06-24 04:45:11 -06:00
|
|
|
)
|
2019-05-08 11:26:56 -06:00
|
|
|
|
2019-06-20 03:32:02 -06:00
|
|
|
default_room_version = config.get("default_room_version", DEFAULT_ROOM_VERSION)
|
2019-05-23 08:00:20 -06:00
|
|
|
|
|
|
|
# Ensure room version is a str
|
|
|
|
default_room_version = str(default_room_version)
|
|
|
|
|
|
|
|
if default_room_version not in KNOWN_ROOM_VERSIONS:
|
|
|
|
raise ConfigError(
|
2019-06-20 03:32:02 -06:00
|
|
|
"Unknown default_room_version: %s, known room versions: %s"
|
|
|
|
% (default_room_version, list(KNOWN_ROOM_VERSIONS.keys()))
|
2019-05-23 08:00:20 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
# Get the actual room version object rather than just the identifier
|
|
|
|
self.default_room_version = KNOWN_ROOM_VERSIONS[default_room_version]
|
|
|
|
|
2018-12-04 04:01:02 -07:00
|
|
|
# whether to enable search. If disabled, new entries will not be inserted
|
|
|
|
# into the search tables and they will not be indexed. Users will receive
|
|
|
|
# errors when attempting to search for messages.
|
|
|
|
self.enable_search = config.get("enable_search", True)
|
|
|
|
|
2017-05-13 10:17:54 -06:00
|
|
|
self.filter_timeline_limit = config.get("filter_timeline_limit", -1)
|
|
|
|
|
2017-09-19 09:08:14 -06:00
|
|
|
# Whether we should block invites sent to users on this server
|
|
|
|
# (other than those sent by local server admins)
|
2019-06-20 03:32:02 -06:00
|
|
|
self.block_non_admin_invites = config.get("block_non_admin_invites", False)
|
2017-09-19 09:08:14 -06:00
|
|
|
|
2019-05-14 09:59:21 -06:00
|
|
|
# Whether to enable experimental MSC1849 (aka relations) support
|
|
|
|
self.experimental_msc1849_support_enabled = config.get(
|
2019-07-18 08:56:59 -06:00
|
|
|
"experimental_msc1849_support_enabled", True
|
2019-05-14 09:59:21 -06:00
|
|
|
)
|
|
|
|
|
2018-07-30 08:55:57 -06:00
|
|
|
# Options to control access by tracking MAU
|
|
|
|
self.limit_usage_by_mau = config.get("limit_usage_by_mau", False)
|
2018-08-03 07:59:17 -06:00
|
|
|
self.max_mau_value = 0
|
2018-08-01 04:46:59 -06:00
|
|
|
if self.limit_usage_by_mau:
|
2019-06-20 03:32:02 -06:00
|
|
|
self.max_mau_value = config.get("max_mau_value", 0)
|
2018-11-15 11:08:27 -07:00
|
|
|
self.mau_stats_only = config.get("mau_stats_only", False)
|
2018-08-23 12:17:08 -06:00
|
|
|
|
2018-08-06 15:55:05 -06:00
|
|
|
self.mau_limits_reserved_threepids = config.get(
|
2018-08-07 10:49:43 -06:00
|
|
|
"mau_limit_reserved_threepids", []
|
2018-08-06 15:55:05 -06:00
|
|
|
)
|
2018-08-03 07:59:17 -06:00
|
|
|
|
2019-06-20 03:32:02 -06:00
|
|
|
self.mau_trial_days = config.get("mau_trial_days", 0)
|
2019-10-24 04:48:46 -06:00
|
|
|
self.mau_limit_alerting = config.get("mau_limit_alerting", True)
|
2018-08-23 12:17:08 -06:00
|
|
|
|
2019-09-05 10:16:03 -06:00
|
|
|
# How long to keep redacted events in the database in unredacted form
|
|
|
|
# before redacting them.
|
2019-09-09 06:40:05 -06:00
|
|
|
redaction_retention_period = config.get("redaction_retention_period", "7d")
|
2019-09-09 06:23:41 -06:00
|
|
|
if redaction_retention_period is not None:
|
2019-09-05 10:16:03 -06:00
|
|
|
self.redaction_retention_period = self.parse_duration(
|
|
|
|
redaction_retention_period
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
self.redaction_retention_period = None
|
|
|
|
|
2019-09-24 08:20:40 -06:00
|
|
|
# How long to keep entries in the `users_ips` table.
|
|
|
|
user_ips_max_age = config.get("user_ips_max_age", "28d")
|
|
|
|
if user_ips_max_age is not None:
|
|
|
|
self.user_ips_max_age = self.parse_duration(user_ips_max_age)
|
|
|
|
else:
|
|
|
|
self.user_ips_max_age = None
|
|
|
|
|
2018-08-04 15:07:04 -06:00
|
|
|
# Options to disable HS
|
|
|
|
self.hs_disabled = config.get("hs_disabled", False)
|
|
|
|
self.hs_disabled_message = config.get("hs_disabled_message", "")
|
|
|
|
|
2018-08-15 04:41:18 -06:00
|
|
|
# Admin uri to direct users at should their instance become blocked
|
2018-08-13 11:00:23 -06:00
|
|
|
# due to resource constraints
|
2018-08-24 09:51:27 -06:00
|
|
|
self.admin_contact = config.get("admin_contact", None)
|
2018-08-13 11:00:23 -06:00
|
|
|
|
2018-01-22 11:11:18 -07:00
|
|
|
# FIXME: federation_domain_whitelist needs sytests
|
2019-12-12 08:21:12 -07:00
|
|
|
self.federation_domain_whitelist = None # type: Optional[dict]
|
2019-06-20 03:32:02 -06:00
|
|
|
federation_domain_whitelist = config.get("federation_domain_whitelist", None)
|
2019-04-25 07:22:49 -06:00
|
|
|
|
2018-01-22 11:11:18 -07:00
|
|
|
if federation_domain_whitelist is not None:
|
2019-04-25 07:22:49 -06:00
|
|
|
# turn the whitelist into a hash for speed of lookup
|
2018-01-22 11:11:18 -07:00
|
|
|
self.federation_domain_whitelist = {}
|
2019-04-25 07:22:49 -06:00
|
|
|
|
2018-01-22 11:11:18 -07:00
|
|
|
for domain in federation_domain_whitelist:
|
|
|
|
self.federation_domain_whitelist[domain] = True
|
|
|
|
|
2019-05-13 12:05:06 -06:00
|
|
|
self.federation_ip_range_blacklist = config.get(
|
2019-06-20 03:32:02 -06:00
|
|
|
"federation_ip_range_blacklist", []
|
2019-05-13 12:05:06 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
# Attempt to create an IPSet from the given ranges
|
|
|
|
try:
|
|
|
|
self.federation_ip_range_blacklist = IPSet(
|
|
|
|
self.federation_ip_range_blacklist
|
|
|
|
)
|
|
|
|
|
|
|
|
# Always blacklist 0.0.0.0, ::
|
|
|
|
self.federation_ip_range_blacklist.update(["0.0.0.0", "::"])
|
|
|
|
except Exception as e:
|
|
|
|
raise ConfigError(
|
2019-11-21 05:00:14 -07:00
|
|
|
"Invalid range(s) provided in federation_ip_range_blacklist: %s" % e
|
2019-05-13 12:05:06 -06:00
|
|
|
)
|
|
|
|
|
2016-04-27 08:09:55 -06:00
|
|
|
if self.public_baseurl is not None:
|
2019-06-20 03:32:02 -06:00
|
|
|
if self.public_baseurl[-1] != "/":
|
|
|
|
self.public_baseurl += "/"
|
2016-04-21 10:21:02 -06:00
|
|
|
self.start_pushers = config.get("start_pushers", True)
|
2015-06-12 08:33:07 -06:00
|
|
|
|
2019-03-20 10:04:35 -06:00
|
|
|
# (undocumented) option for torturing the worker-mode replication a bit,
|
|
|
|
# for testing. The value defines the number of milliseconds to pause before
|
|
|
|
# sending out any replication updates.
|
|
|
|
self.replication_torture_level = config.get("replication_torture_level")
|
|
|
|
|
2019-05-02 02:21:29 -06:00
|
|
|
# Whether to require a user to be in the room to add an alias to it.
|
|
|
|
# Defaults to True.
|
|
|
|
self.require_membership_for_aliases = config.get(
|
2019-06-20 03:32:02 -06:00
|
|
|
"require_membership_for_aliases", True
|
2019-05-02 02:21:29 -06:00
|
|
|
)
|
|
|
|
|
2019-05-16 07:26:41 -06:00
|
|
|
# Whether to allow per-room membership profiles through the send of membership
|
|
|
|
# events with profile information that differ from the target's global profile.
|
|
|
|
self.allow_per_room_profiles = config.get("allow_per_room_profiles", True)
|
|
|
|
|
2019-11-04 10:09:22 -07:00
|
|
|
retention_config = config.get("retention")
|
|
|
|
if retention_config is None:
|
|
|
|
retention_config = {}
|
|
|
|
|
|
|
|
self.retention_enabled = retention_config.get("enabled", False)
|
|
|
|
|
|
|
|
retention_default_policy = retention_config.get("default_policy")
|
|
|
|
|
|
|
|
if retention_default_policy is not None:
|
|
|
|
self.retention_default_min_lifetime = retention_default_policy.get(
|
|
|
|
"min_lifetime"
|
|
|
|
)
|
|
|
|
if self.retention_default_min_lifetime is not None:
|
|
|
|
self.retention_default_min_lifetime = self.parse_duration(
|
|
|
|
self.retention_default_min_lifetime
|
|
|
|
)
|
|
|
|
|
|
|
|
self.retention_default_max_lifetime = retention_default_policy.get(
|
|
|
|
"max_lifetime"
|
|
|
|
)
|
|
|
|
if self.retention_default_max_lifetime is not None:
|
|
|
|
self.retention_default_max_lifetime = self.parse_duration(
|
|
|
|
self.retention_default_max_lifetime
|
|
|
|
)
|
|
|
|
|
|
|
|
if (
|
|
|
|
self.retention_default_min_lifetime is not None
|
|
|
|
and self.retention_default_max_lifetime is not None
|
|
|
|
and (
|
|
|
|
self.retention_default_min_lifetime
|
|
|
|
> self.retention_default_max_lifetime
|
|
|
|
)
|
|
|
|
):
|
|
|
|
raise ConfigError(
|
|
|
|
"The default retention policy's 'min_lifetime' can not be greater"
|
|
|
|
" than its 'max_lifetime'"
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
self.retention_default_min_lifetime = None
|
|
|
|
self.retention_default_max_lifetime = None
|
|
|
|
|
2019-11-19 06:22:37 -07:00
|
|
|
self.retention_allowed_lifetime_min = retention_config.get(
|
|
|
|
"allowed_lifetime_min"
|
|
|
|
)
|
2019-11-04 10:09:22 -07:00
|
|
|
if self.retention_allowed_lifetime_min is not None:
|
|
|
|
self.retention_allowed_lifetime_min = self.parse_duration(
|
|
|
|
self.retention_allowed_lifetime_min
|
|
|
|
)
|
|
|
|
|
2019-11-19 06:22:37 -07:00
|
|
|
self.retention_allowed_lifetime_max = retention_config.get(
|
|
|
|
"allowed_lifetime_max"
|
|
|
|
)
|
2019-11-04 10:09:22 -07:00
|
|
|
if self.retention_allowed_lifetime_max is not None:
|
|
|
|
self.retention_allowed_lifetime_max = self.parse_duration(
|
|
|
|
self.retention_allowed_lifetime_max
|
|
|
|
)
|
|
|
|
|
|
|
|
if (
|
|
|
|
self.retention_allowed_lifetime_min is not None
|
|
|
|
and self.retention_allowed_lifetime_max is not None
|
2019-11-19 06:22:37 -07:00
|
|
|
and self.retention_allowed_lifetime_min
|
|
|
|
> self.retention_allowed_lifetime_max
|
2019-11-04 10:09:22 -07:00
|
|
|
):
|
|
|
|
raise ConfigError(
|
|
|
|
"Invalid retention policy limits: 'allowed_lifetime_min' can not be"
|
|
|
|
" greater than 'allowed_lifetime_max'"
|
|
|
|
)
|
|
|
|
|
2019-11-19 06:22:37 -07:00
|
|
|
self.retention_purge_jobs = [] # type: List[Dict[str, Optional[int]]]
|
2019-11-04 10:09:22 -07:00
|
|
|
for purge_job_config in retention_config.get("purge_jobs", []):
|
|
|
|
interval_config = purge_job_config.get("interval")
|
|
|
|
|
|
|
|
if interval_config is None:
|
|
|
|
raise ConfigError(
|
|
|
|
"A retention policy's purge jobs configuration must have the"
|
|
|
|
" 'interval' key set."
|
|
|
|
)
|
|
|
|
|
|
|
|
interval = self.parse_duration(interval_config)
|
|
|
|
|
|
|
|
shortest_max_lifetime = purge_job_config.get("shortest_max_lifetime")
|
|
|
|
|
|
|
|
if shortest_max_lifetime is not None:
|
|
|
|
shortest_max_lifetime = self.parse_duration(shortest_max_lifetime)
|
|
|
|
|
|
|
|
longest_max_lifetime = purge_job_config.get("longest_max_lifetime")
|
|
|
|
|
|
|
|
if longest_max_lifetime is not None:
|
|
|
|
longest_max_lifetime = self.parse_duration(longest_max_lifetime)
|
|
|
|
|
|
|
|
if (
|
|
|
|
shortest_max_lifetime is not None
|
|
|
|
and longest_max_lifetime is not None
|
|
|
|
and shortest_max_lifetime > longest_max_lifetime
|
|
|
|
):
|
|
|
|
raise ConfigError(
|
|
|
|
"A retention policy's purge jobs configuration's"
|
|
|
|
" 'shortest_max_lifetime' value can not be greater than its"
|
|
|
|
" 'longest_max_lifetime' value."
|
|
|
|
)
|
|
|
|
|
2019-11-19 06:22:37 -07:00
|
|
|
self.retention_purge_jobs.append(
|
|
|
|
{
|
|
|
|
"interval": interval,
|
|
|
|
"shortest_max_lifetime": shortest_max_lifetime,
|
|
|
|
"longest_max_lifetime": longest_max_lifetime,
|
|
|
|
}
|
|
|
|
)
|
2019-11-04 10:09:22 -07:00
|
|
|
|
|
|
|
if not self.retention_purge_jobs:
|
2019-11-19 06:22:37 -07:00
|
|
|
self.retention_purge_jobs = [
|
|
|
|
{
|
|
|
|
"interval": self.parse_duration("1d"),
|
|
|
|
"shortest_max_lifetime": None,
|
|
|
|
"longest_max_lifetime": None,
|
|
|
|
}
|
|
|
|
]
|
2019-11-04 10:09:22 -07:00
|
|
|
|
2019-10-02 06:29:01 -06:00
|
|
|
self.listeners = [] # type: List[dict]
|
2019-02-11 10:57:58 -07:00
|
|
|
for listener in config.get("listeners", []):
|
2019-02-11 14:13:53 -07:00
|
|
|
if not isinstance(listener.get("port", None), int):
|
|
|
|
raise ConfigError(
|
|
|
|
"Listener configuration is lacking a valid 'port' option"
|
|
|
|
)
|
|
|
|
|
2019-02-11 10:57:58 -07:00
|
|
|
if listener.setdefault("tls", False):
|
|
|
|
# no_tls is not really supported any more, but let's grandfather it in
|
|
|
|
# here.
|
|
|
|
if config.get("no_tls", False):
|
|
|
|
logger.info(
|
|
|
|
"Ignoring TLS-enabled listener on port %i due to no_tls"
|
|
|
|
)
|
|
|
|
continue
|
|
|
|
|
2017-01-10 10:23:18 -07:00
|
|
|
bind_address = listener.pop("bind_address", None)
|
2017-01-10 10:21:41 -07:00
|
|
|
bind_addresses = listener.setdefault("bind_addresses", [])
|
|
|
|
|
2019-02-11 05:50:30 -07:00
|
|
|
# if bind_address was specified, add it to the list of addresses
|
2017-01-10 10:21:41 -07:00
|
|
|
if bind_address:
|
|
|
|
bind_addresses.append(bind_address)
|
2019-02-11 05:50:30 -07:00
|
|
|
|
|
|
|
# if we still have an empty list of addresses, use the default list
|
|
|
|
if not bind_addresses:
|
2019-06-20 03:32:02 -06:00
|
|
|
if listener["type"] == "metrics":
|
2019-02-13 04:48:56 -07:00
|
|
|
# the metrics listener doesn't support IPv6
|
2019-06-20 03:32:02 -06:00
|
|
|
bind_addresses.append("0.0.0.0")
|
2019-02-13 04:48:56 -07:00
|
|
|
else:
|
|
|
|
bind_addresses.extend(DEFAULT_BIND_ADDRESSES)
|
2017-01-10 10:21:41 -07:00
|
|
|
|
2019-02-11 10:57:58 -07:00
|
|
|
self.listeners.append(listener)
|
|
|
|
|
2018-12-11 06:18:48 -07:00
|
|
|
if not self.web_client_location:
|
|
|
|
_warn_if_webclient_configured(self.listeners)
|
|
|
|
|
2016-06-16 04:06:12 -06:00
|
|
|
self.gc_thresholds = read_gc_thresholds(config.get("gc_thresholds", None))
|
2016-06-07 08:45:56 -06:00
|
|
|
|
2019-07-29 10:47:27 -06:00
|
|
|
@attr.s
|
|
|
|
class LimitRemoteRoomsConfig(object):
|
|
|
|
enabled = attr.ib(
|
|
|
|
validator=attr.validators.instance_of(bool), default=False
|
|
|
|
)
|
|
|
|
complexity = attr.ib(
|
2019-10-02 06:29:01 -06:00
|
|
|
validator=attr.validators.instance_of(
|
|
|
|
(float, int) # type: ignore[arg-type] # noqa
|
|
|
|
),
|
|
|
|
default=1.0,
|
2019-07-29 10:47:27 -06:00
|
|
|
)
|
|
|
|
complexity_error = attr.ib(
|
|
|
|
validator=attr.validators.instance_of(str),
|
|
|
|
default=ROOM_COMPLEXITY_TOO_GREAT,
|
|
|
|
)
|
|
|
|
|
|
|
|
self.limit_remote_rooms = LimitRemoteRoomsConfig(
|
|
|
|
**config.get("limit_remote_rooms", {})
|
|
|
|
)
|
|
|
|
|
2015-06-12 08:33:07 -06:00
|
|
|
bind_port = config.get("bind_port")
|
|
|
|
if bind_port:
|
2019-02-11 10:57:58 -07:00
|
|
|
if config.get("no_tls", False):
|
|
|
|
raise ConfigError("no_tls is incompatible with bind_port")
|
|
|
|
|
2015-06-12 08:33:07 -06:00
|
|
|
self.listeners = []
|
|
|
|
bind_host = config.get("bind_host", "")
|
|
|
|
gzip_responses = config.get("gzip_responses", True)
|
|
|
|
|
2019-06-20 03:32:02 -06:00
|
|
|
self.listeners.append(
|
|
|
|
{
|
|
|
|
"port": bind_port,
|
2017-01-10 10:21:41 -07:00
|
|
|
"bind_addresses": [bind_host],
|
2019-06-20 03:32:02 -06:00
|
|
|
"tls": True,
|
2015-06-12 08:33:07 -06:00
|
|
|
"type": "http",
|
|
|
|
"resources": [
|
2019-06-20 03:32:02 -06:00
|
|
|
{"names": ["client"], "compress": gzip_responses},
|
|
|
|
{"names": ["federation"], "compress": False},
|
|
|
|
],
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
unsecure_port = config.get("unsecure_port", bind_port - 400)
|
|
|
|
if unsecure_port:
|
|
|
|
self.listeners.append(
|
|
|
|
{
|
|
|
|
"port": unsecure_port,
|
|
|
|
"bind_addresses": [bind_host],
|
|
|
|
"tls": False,
|
|
|
|
"type": "http",
|
|
|
|
"resources": [
|
|
|
|
{"names": ["client"], "compress": gzip_responses},
|
|
|
|
{"names": ["federation"], "compress": False},
|
|
|
|
],
|
|
|
|
}
|
|
|
|
)
|
2015-04-29 21:24:44 -06:00
|
|
|
|
2015-06-12 10:41:36 -06:00
|
|
|
manhole = config.get("manhole")
|
|
|
|
if manhole:
|
2019-06-20 03:32:02 -06:00
|
|
|
self.listeners.append(
|
|
|
|
{
|
|
|
|
"port": manhole,
|
|
|
|
"bind_addresses": ["127.0.0.1"],
|
|
|
|
"type": "manhole",
|
|
|
|
"tls": False,
|
|
|
|
}
|
|
|
|
)
|
2015-06-12 10:41:36 -06:00
|
|
|
|
|
|
|
metrics_port = config.get("metrics_port")
|
|
|
|
if metrics_port:
|
2019-09-26 05:57:01 -06:00
|
|
|
logger.warning(METRICS_PORT_WARNING)
|
2019-06-20 03:32:02 -06:00
|
|
|
|
|
|
|
self.listeners.append(
|
|
|
|
{
|
|
|
|
"port": metrics_port,
|
|
|
|
"bind_addresses": [config.get("metrics_bind_host", "127.0.0.1")],
|
|
|
|
"tls": False,
|
|
|
|
"type": "http",
|
|
|
|
"resources": [{"names": ["metrics"], "compress": False}],
|
|
|
|
}
|
|
|
|
)
|
2015-06-12 10:41:36 -06:00
|
|
|
|
2019-01-07 03:14:31 -07:00
|
|
|
_check_resource_config(self.listeners)
|
|
|
|
|
2019-06-17 11:04:42 -06:00
|
|
|
self.cleanup_extremities_with_dummy_events = config.get(
|
2019-09-25 10:27:35 -06:00
|
|
|
"cleanup_extremities_with_dummy_events", True
|
2019-06-17 11:04:42 -06:00
|
|
|
)
|
|
|
|
|
2019-12-03 12:19:45 -07:00
|
|
|
self.enable_ephemeral_messages = config.get("enable_ephemeral_messages", False)
|
|
|
|
|
2019-10-02 06:29:01 -06:00
|
|
|
def has_tls_listener(self) -> bool:
|
2019-02-11 10:57:58 -07:00
|
|
|
return any(l["tls"] for l in self.listeners)
|
|
|
|
|
2019-06-21 06:46:39 -06:00
|
|
|
def generate_config_section(
|
2019-08-28 06:12:22 -06:00
|
|
|
self, server_name, data_dir_path, open_private_ports, listeners, **kwargs
|
2019-06-21 06:46:39 -06:00
|
|
|
):
|
2018-07-04 11:15:03 -06:00
|
|
|
_, bind_port = parse_and_validate_server_name(server_name)
|
|
|
|
if bind_port is not None:
|
2015-04-29 21:24:44 -06:00
|
|
|
unsecure_port = bind_port - 400
|
|
|
|
else:
|
|
|
|
bind_port = 8448
|
|
|
|
unsecure_port = 8008
|
|
|
|
|
2018-12-21 08:04:57 -07:00
|
|
|
pid_file = os.path.join(data_dir_path, "homeserver.pid")
|
2019-05-23 08:00:20 -06:00
|
|
|
|
|
|
|
# Bring DEFAULT_ROOM_VERSION into the local-scope for use in the
|
|
|
|
# default config string
|
|
|
|
default_room_version = DEFAULT_ROOM_VERSION
|
2019-08-28 06:12:22 -06:00
|
|
|
secure_listeners = []
|
|
|
|
unsecure_listeners = []
|
|
|
|
private_addresses = ["::1", "127.0.0.1"]
|
|
|
|
if listeners:
|
|
|
|
for listener in listeners:
|
|
|
|
if listener["tls"]:
|
|
|
|
secure_listeners.append(listener)
|
|
|
|
else:
|
|
|
|
# If we don't want open ports we need to bind the listeners
|
|
|
|
# to some address other than 0.0.0.0. Here we chose to use
|
|
|
|
# localhost.
|
|
|
|
# If the addresses are already bound we won't overwrite them
|
|
|
|
# however.
|
|
|
|
if not open_private_ports:
|
|
|
|
listener.setdefault("bind_addresses", private_addresses)
|
|
|
|
|
|
|
|
unsecure_listeners.append(listener)
|
|
|
|
|
|
|
|
secure_http_bindings = indent(
|
|
|
|
yaml.dump(secure_listeners), " " * 10
|
|
|
|
).lstrip()
|
|
|
|
|
|
|
|
unsecure_http_bindings = indent(
|
|
|
|
yaml.dump(unsecure_listeners), " " * 10
|
|
|
|
).lstrip()
|
|
|
|
|
|
|
|
if not unsecure_listeners:
|
|
|
|
unsecure_http_bindings = (
|
|
|
|
"""- port: %(unsecure_port)s
|
|
|
|
tls: false
|
|
|
|
type: http
|
|
|
|
x_forwarded: true"""
|
|
|
|
% locals()
|
|
|
|
)
|
|
|
|
|
|
|
|
if not open_private_ports:
|
|
|
|
unsecure_http_bindings += (
|
|
|
|
"\n bind_addresses: ['::1', '127.0.0.1']"
|
|
|
|
)
|
|
|
|
|
|
|
|
unsecure_http_bindings += """
|
|
|
|
|
|
|
|
resources:
|
|
|
|
- names: [client, federation]
|
|
|
|
compress: false"""
|
|
|
|
|
|
|
|
if listeners:
|
|
|
|
# comment out this block
|
|
|
|
unsecure_http_bindings = "#" + re.sub(
|
|
|
|
"\n {10}",
|
|
|
|
lambda match: match.group(0) + "#",
|
|
|
|
unsecure_http_bindings,
|
|
|
|
)
|
2019-06-21 06:46:39 -06:00
|
|
|
|
2019-08-28 06:12:22 -06:00
|
|
|
if not secure_listeners:
|
|
|
|
secure_http_bindings = (
|
|
|
|
"""#- port: %(bind_port)s
|
|
|
|
# type: http
|
|
|
|
# tls: true
|
|
|
|
# resources:
|
|
|
|
# - names: [client, federation]"""
|
|
|
|
% locals()
|
2019-06-21 06:46:39 -06:00
|
|
|
)
|
|
|
|
|
2019-06-20 03:32:02 -06:00
|
|
|
return (
|
|
|
|
"""\
|
2015-04-29 21:24:44 -06:00
|
|
|
## Server ##
|
|
|
|
|
|
|
|
# The domain name of the server, with optional explicit port.
|
|
|
|
# This is used by remote servers to connect to this server,
|
|
|
|
# e.g. matrix.org, localhost:8080, etc.
|
2015-12-01 16:37:55 -07:00
|
|
|
# This is also the last part of your UserID.
|
2019-03-04 10:14:58 -07:00
|
|
|
#
|
2015-04-29 21:24:44 -06:00
|
|
|
server_name: "%(server_name)s"
|
|
|
|
|
|
|
|
# When running as a daemon, the file to store the pid in
|
2019-03-04 10:14:58 -07:00
|
|
|
#
|
2015-04-29 21:24:44 -06:00
|
|
|
pid_file: %(pid_file)s
|
|
|
|
|
2018-12-11 06:18:48 -07:00
|
|
|
# The path to the web client which will be served at /_matrix/client/
|
|
|
|
# if 'webclient' is configured under the 'listeners' configuration.
|
|
|
|
#
|
2019-02-19 06:54:29 -07:00
|
|
|
#web_client_location: "/path/to/web/root"
|
2017-04-16 23:44:05 -06:00
|
|
|
|
2019-01-24 03:52:06 -07:00
|
|
|
# The public-facing base URL that clients use to access this HS
|
|
|
|
# (not including _matrix/...). This is the same URL a user would
|
|
|
|
# enter into the 'custom HS URL' field on their client. If you
|
|
|
|
# use synapse with a reverse proxy, this should be the URL to reach
|
|
|
|
# synapse via the proxy.
|
2019-02-19 06:54:29 -07:00
|
|
|
#
|
|
|
|
#public_baseurl: https://example.com/
|
2016-04-27 08:09:55 -06:00
|
|
|
|
2015-04-29 21:24:44 -06:00
|
|
|
# Set the soft limit on the number of file descriptors synapse can use
|
|
|
|
# Zero is used to indicate synapse should set the soft limit to the
|
|
|
|
# hard limit.
|
2019-03-04 10:14:58 -07:00
|
|
|
#
|
2019-03-19 04:06:40 -06:00
|
|
|
#soft_file_limit: 0
|
2015-04-29 21:24:44 -06:00
|
|
|
|
2018-08-17 09:08:45 -06:00
|
|
|
# Set to false to disable presence tracking on this homeserver.
|
2019-03-04 10:14:58 -07:00
|
|
|
#
|
2019-03-19 04:06:40 -06:00
|
|
|
#use_presence: false
|
2018-08-17 09:08:45 -06:00
|
|
|
|
2019-05-08 11:26:56 -06:00
|
|
|
# Whether to require authentication to retrieve profile data (avatars,
|
|
|
|
# display names) of other users through the client API. Defaults to
|
|
|
|
# 'false'. Note that profile data is also available via the federation
|
|
|
|
# API, so this setting is of limited value if federation is enabled on
|
|
|
|
# the server.
|
|
|
|
#
|
|
|
|
#require_auth_for_profile_requests: true
|
|
|
|
|
2019-12-16 09:11:55 -07:00
|
|
|
# Uncomment to require a user to share a room with another user in order
|
|
|
|
# to retrieve their profile information. Only checked on Client-Server
|
|
|
|
# requests. Profile requests from other servers should be checked by the
|
|
|
|
# requesting server. Defaults to 'false'.
|
|
|
|
#
|
|
|
|
#limit_profile_requests_to_users_who_share_rooms: true
|
|
|
|
|
2019-12-04 02:46:16 -07:00
|
|
|
# If set to 'true', removes the need for authentication to access the server's
|
|
|
|
# public rooms directory through the client API, meaning that anyone can
|
|
|
|
# query the room directory. Defaults to 'false'.
|
2019-06-24 04:45:11 -06:00
|
|
|
#
|
2019-12-04 02:46:16 -07:00
|
|
|
#allow_public_rooms_without_auth: true
|
2019-06-24 04:45:11 -06:00
|
|
|
|
2019-12-04 02:46:16 -07:00
|
|
|
# If set to 'true', allows any other homeserver to fetch the server's public
|
|
|
|
# rooms directory via federation. Defaults to 'false'.
|
2019-05-08 11:26:56 -06:00
|
|
|
#
|
2019-12-04 02:46:16 -07:00
|
|
|
#allow_public_rooms_over_federation: true
|
2019-05-08 11:26:56 -06:00
|
|
|
|
2019-05-23 08:00:20 -06:00
|
|
|
# The default room version for newly created rooms.
|
|
|
|
#
|
|
|
|
# Known room versions are listed here:
|
|
|
|
# https://matrix.org/docs/spec/#complete-list-of-room-versions
|
|
|
|
#
|
|
|
|
# For example, for room version 1, default_room_version should be set
|
|
|
|
# to "1".
|
2019-05-24 07:12:38 -06:00
|
|
|
#
|
2019-05-23 08:00:20 -06:00
|
|
|
#default_room_version: "%(default_room_version)s"
|
|
|
|
|
2016-06-07 08:45:56 -06:00
|
|
|
# The GC threshold parameters to pass to `gc.set_threshold`, if defined
|
2019-02-19 06:54:29 -07:00
|
|
|
#
|
|
|
|
#gc_thresholds: [700, 10, 10]
|
2016-06-07 08:45:56 -06:00
|
|
|
|
2017-05-13 10:17:54 -06:00
|
|
|
# Set the limit on the returned events in the timeline in the get
|
|
|
|
# and sync operations. The default value is -1, means no upper limit.
|
2019-02-19 06:54:29 -07:00
|
|
|
#
|
|
|
|
#filter_timeline_limit: 5000
|
2017-05-13 10:17:54 -06:00
|
|
|
|
2017-09-19 09:08:14 -06:00
|
|
|
# Whether room invites to users on this server should be blocked
|
|
|
|
# (except those sent by local server admins). The default is False.
|
2019-02-19 06:54:29 -07:00
|
|
|
#
|
2019-10-23 06:22:54 -06:00
|
|
|
#block_non_admin_invites: true
|
2019-02-19 06:54:29 -07:00
|
|
|
|
|
|
|
# Room searching
|
|
|
|
#
|
|
|
|
# If disabled, new messages will not be indexed for searching and users
|
|
|
|
# will receive errors when searching for messages. Defaults to enabled.
|
|
|
|
#
|
|
|
|
#enable_search: false
|
2017-09-19 09:08:14 -06:00
|
|
|
|
2018-01-22 11:11:18 -07:00
|
|
|
# Restrict federation to the following whitelist of domains.
|
|
|
|
# N.B. we recommend also firewalling your federation listener to limit
|
|
|
|
# inbound federation traffic as early as possible, rather than relying
|
|
|
|
# purely on this application-layer restriction. If not specified, the
|
|
|
|
# default is to whitelist everything.
|
|
|
|
#
|
2019-02-19 06:54:29 -07:00
|
|
|
#federation_domain_whitelist:
|
2018-01-22 11:11:18 -07:00
|
|
|
# - lon.example.com
|
|
|
|
# - nyc.example.com
|
|
|
|
# - syd.example.com
|
|
|
|
|
2019-05-13 12:05:06 -06:00
|
|
|
# Prevent federation requests from being sent to the following
|
|
|
|
# blacklist IP address CIDR ranges. If this option is not specified, or
|
|
|
|
# specified with an empty list, no ip range blacklist will be enforced.
|
|
|
|
#
|
2019-09-23 13:23:20 -06:00
|
|
|
# As of Synapse v1.4.0 this option also affects any outbound requests to identity
|
|
|
|
# servers provided by user input.
|
|
|
|
#
|
2019-05-13 12:05:06 -06:00
|
|
|
# (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly
|
|
|
|
# listed here, since they correspond to unroutable addresses.)
|
|
|
|
#
|
|
|
|
federation_ip_range_blacklist:
|
|
|
|
- '127.0.0.0/8'
|
|
|
|
- '10.0.0.0/8'
|
|
|
|
- '172.16.0.0/12'
|
|
|
|
- '192.168.0.0/16'
|
|
|
|
- '100.64.0.0/10'
|
|
|
|
- '169.254.0.0/16'
|
|
|
|
- '::1/128'
|
|
|
|
- 'fe80::/64'
|
|
|
|
- 'fc00::/7'
|
|
|
|
|
2015-06-15 04:25:53 -06:00
|
|
|
# List of ports that Synapse should listen on, their purpose and their
|
|
|
|
# configuration.
|
2019-02-11 05:50:30 -07:00
|
|
|
#
|
|
|
|
# Options for each listener include:
|
|
|
|
#
|
|
|
|
# port: the TCP port to bind to
|
|
|
|
#
|
|
|
|
# bind_addresses: a list of local addresses to listen on. The default is
|
|
|
|
# 'all local interfaces'.
|
|
|
|
#
|
|
|
|
# type: the type of listener. Normally 'http', but other valid options are:
|
|
|
|
# 'manhole' (see docs/manhole.md),
|
2019-09-17 05:55:29 -06:00
|
|
|
# 'metrics' (see docs/metrics-howto.md),
|
|
|
|
# 'replication' (see docs/workers.md).
|
2019-02-11 05:50:30 -07:00
|
|
|
#
|
|
|
|
# tls: set to true to enable TLS for this listener. Will use the TLS
|
|
|
|
# key/cert specified in tls_private_key_path / tls_certificate_path.
|
|
|
|
#
|
|
|
|
# x_forwarded: Only valid for an 'http' listener. Set to true to use the
|
|
|
|
# X-Forwarded-For header as the client IP. Useful when Synapse is
|
|
|
|
# behind a reverse-proxy.
|
|
|
|
#
|
|
|
|
# resources: Only valid for an 'http' listener. A list of resources to host
|
|
|
|
# on this port. Options for each resource are:
|
|
|
|
#
|
|
|
|
# names: a list of names of HTTP resources. See below for a list of
|
|
|
|
# valid resource names.
|
|
|
|
#
|
|
|
|
# compress: set to true to enable HTTP comression for this resource.
|
|
|
|
#
|
|
|
|
# additional_resources: Only valid for an 'http' listener. A map of
|
|
|
|
# additional endpoints which should be loaded via dynamic modules.
|
|
|
|
#
|
|
|
|
# Valid resource names are:
|
|
|
|
#
|
2019-05-01 08:18:58 -06:00
|
|
|
# client: the client-server API (/_matrix/client), and the synapse admin
|
|
|
|
# API (/_synapse/admin). Also implies 'media' and 'static'.
|
2019-02-11 05:50:30 -07:00
|
|
|
#
|
|
|
|
# consent: user consent forms (/_matrix/consent). See
|
|
|
|
# docs/consent_tracking.md.
|
|
|
|
#
|
|
|
|
# federation: the server-server API (/_matrix/federation). Also implies
|
|
|
|
# 'media', 'keys', 'openid'
|
|
|
|
#
|
|
|
|
# keys: the key discovery API (/_matrix/keys).
|
|
|
|
#
|
|
|
|
# media: the media API (/_matrix/media).
|
|
|
|
#
|
2019-09-17 05:55:29 -06:00
|
|
|
# metrics: the metrics interface. See docs/metrics-howto.md.
|
2019-02-11 05:50:30 -07:00
|
|
|
#
|
|
|
|
# openid: OpenID authentication.
|
|
|
|
#
|
|
|
|
# replication: the HTTP replication API (/_synapse/replication). See
|
2019-09-17 05:55:29 -06:00
|
|
|
# docs/workers.md.
|
2019-02-11 05:50:30 -07:00
|
|
|
#
|
|
|
|
# static: static resources under synapse/static (/_matrix/static). (Mostly
|
|
|
|
# useful for 'fallback authentication'.)
|
|
|
|
#
|
|
|
|
# webclient: A web client. Requires web_client_location to be set.
|
|
|
|
#
|
2015-06-11 08:48:52 -06:00
|
|
|
listeners:
|
2019-02-12 03:52:08 -07:00
|
|
|
# TLS-enabled listener: for when matrix traffic is sent directly to synapse.
|
|
|
|
#
|
|
|
|
# Disabled by default. To enable it, uncomment the following. (Note that you
|
|
|
|
# will also need to give Synapse a TLS key and certificate: see the TLS section
|
|
|
|
# below.)
|
|
|
|
#
|
2019-08-28 06:12:22 -06:00
|
|
|
%(secure_http_bindings)s
|
2019-02-12 03:52:08 -07:00
|
|
|
|
|
|
|
# Unsecure HTTP listener: for when matrix traffic passes through a reverse proxy
|
|
|
|
# that unwraps TLS.
|
|
|
|
#
|
|
|
|
# If you plan to use a reverse proxy, please see
|
2019-09-17 05:55:29 -06:00
|
|
|
# https://github.com/matrix-org/synapse/blob/master/docs/reverse_proxy.md.
|
2019-02-12 03:52:08 -07:00
|
|
|
#
|
2019-08-28 06:12:22 -06:00
|
|
|
%(unsecure_http_bindings)s
|
2015-06-12 08:33:07 -06:00
|
|
|
|
2019-06-21 06:46:39 -06:00
|
|
|
# example additional_resources:
|
2019-02-11 05:50:30 -07:00
|
|
|
#
|
2019-02-19 06:54:29 -07:00
|
|
|
#additional_resources:
|
|
|
|
# "/_matrix/my/custom/endpoint":
|
|
|
|
# module: my_module.CustomRequestHandler
|
|
|
|
# config: {}
|
2017-11-02 08:18:24 -06:00
|
|
|
|
2016-01-07 07:02:57 -07:00
|
|
|
# Turn on the twisted ssh manhole service on localhost on the given
|
2015-06-15 04:25:53 -06:00
|
|
|
# port.
|
2019-02-19 06:54:29 -07:00
|
|
|
#
|
|
|
|
#- port: 9000
|
|
|
|
# bind_addresses: ['::1', '127.0.0.1']
|
|
|
|
# type: manhole
|
|
|
|
|
|
|
|
|
|
|
|
## Homeserver blocking ##
|
2018-08-17 06:58:25 -06:00
|
|
|
|
2018-12-21 08:01:43 -07:00
|
|
|
# How to reach the server admin, used in ResourceLimitError
|
|
|
|
#
|
2019-02-19 06:54:29 -07:00
|
|
|
#admin_contact: 'mailto:admin@server.com'
|
|
|
|
|
|
|
|
# Global blocking
|
2018-12-21 08:01:43 -07:00
|
|
|
#
|
2019-10-23 06:22:54 -06:00
|
|
|
#hs_disabled: false
|
2019-02-19 06:54:29 -07:00
|
|
|
#hs_disabled_message: 'Human readable reason for why the HS is blocked'
|
|
|
|
|
2018-12-21 08:01:43 -07:00
|
|
|
# Monthly Active User Blocking
|
|
|
|
#
|
2019-06-05 06:16:23 -06:00
|
|
|
# Used in cases where the admin or server owner wants to limit to the
|
|
|
|
# number of monthly active users.
|
|
|
|
#
|
|
|
|
# 'limit_usage_by_mau' disables/enables monthly active user blocking. When
|
|
|
|
# anabled and a limit is reached the server returns a 'ResourceLimitError'
|
|
|
|
# with error type Codes.RESOURCE_LIMIT_EXCEEDED
|
|
|
|
#
|
|
|
|
# 'max_mau_value' is the hard limit of monthly active users above which
|
|
|
|
# the server will start blocking user actions.
|
|
|
|
#
|
|
|
|
# 'mau_trial_days' is a means to add a grace period for active users. It
|
|
|
|
# means that users must be active for this number of days before they
|
|
|
|
# can be considered active and guards against the case where lots of users
|
|
|
|
# sign up in a short space of time never to return after their initial
|
|
|
|
# session.
|
|
|
|
#
|
2019-10-24 04:48:46 -06:00
|
|
|
# 'mau_limit_alerting' is a means of limiting client side alerting
|
|
|
|
# should the mau limit be reached. This is useful for small instances
|
|
|
|
# where the admin has 5 mau seats (say) for 5 specific people and no
|
|
|
|
# interest increasing the mau limit further. Defaults to True, which
|
|
|
|
# means that alerting is enabled
|
|
|
|
#
|
2019-10-23 06:22:54 -06:00
|
|
|
#limit_usage_by_mau: false
|
2019-02-19 06:54:29 -07:00
|
|
|
#max_mau_value: 50
|
|
|
|
#mau_trial_days: 2
|
2019-10-24 04:48:46 -06:00
|
|
|
#mau_limit_alerting: false
|
2019-02-19 06:54:29 -07:00
|
|
|
|
2018-12-21 08:01:43 -07:00
|
|
|
# If enabled, the metrics for the number of monthly active users will
|
|
|
|
# be populated, however no one will be limited. If limit_usage_by_mau
|
|
|
|
# is true, this is implied to be true.
|
|
|
|
#
|
2019-10-23 06:22:54 -06:00
|
|
|
#mau_stats_only: false
|
2019-02-19 06:54:29 -07:00
|
|
|
|
2018-12-21 08:01:43 -07:00
|
|
|
# Sometimes the server admin will want to ensure certain accounts are
|
|
|
|
# never blocked by mau checking. These accounts are specified here.
|
|
|
|
#
|
2019-02-19 06:54:29 -07:00
|
|
|
#mau_limit_reserved_threepids:
|
|
|
|
# - medium: 'email'
|
|
|
|
# address: 'reserved_user@example.com'
|
2019-04-08 08:47:39 -06:00
|
|
|
|
|
|
|
# Used by phonehome stats to group together related servers.
|
|
|
|
#server_context: context
|
2019-05-02 02:21:29 -06:00
|
|
|
|
2019-11-12 06:12:25 -07:00
|
|
|
# Resource-constrained homeserver Settings
|
2019-07-29 10:47:27 -06:00
|
|
|
#
|
|
|
|
# If limit_remote_rooms.enabled is True, the room complexity will be
|
|
|
|
# checked before a user joins a new remote room. If it is above
|
|
|
|
# limit_remote_rooms.complexity, it will disallow joining or
|
|
|
|
# instantly leave.
|
|
|
|
#
|
|
|
|
# limit_remote_rooms.complexity_error can be set to customise the text
|
|
|
|
# displayed to the user when a room above the complexity threshold has
|
|
|
|
# its join cancelled.
|
|
|
|
#
|
|
|
|
# Uncomment the below lines to enable:
|
|
|
|
#limit_remote_rooms:
|
2019-10-23 06:22:54 -06:00
|
|
|
# enabled: true
|
2019-07-29 10:47:27 -06:00
|
|
|
# complexity: 1.0
|
|
|
|
# complexity_error: "This room is too complex."
|
|
|
|
|
2019-05-02 02:21:29 -06:00
|
|
|
# Whether to require a user to be in the room to add an alias to it.
|
|
|
|
# Defaults to 'true'.
|
|
|
|
#
|
|
|
|
#require_membership_for_aliases: false
|
2019-05-16 07:26:41 -06:00
|
|
|
|
|
|
|
# Whether to allow per-room membership profiles through the send of membership
|
|
|
|
# events with profile information that differ from the target's global profile.
|
|
|
|
# Defaults to 'true'.
|
|
|
|
#
|
|
|
|
#allow_per_room_profiles: false
|
2019-09-05 10:16:03 -06:00
|
|
|
|
2019-09-09 06:40:05 -06:00
|
|
|
# How long to keep redacted events in unredacted form in the database. After
|
|
|
|
# this period redacted events get replaced with their redacted form in the DB.
|
2019-09-05 10:16:03 -06:00
|
|
|
#
|
2019-09-09 06:40:05 -06:00
|
|
|
# Defaults to `7d`. Set to `null` to disable.
|
|
|
|
#
|
2019-09-26 09:39:15 -06:00
|
|
|
#redaction_retention_period: 28d
|
2019-09-24 08:20:40 -06:00
|
|
|
|
|
|
|
# How long to track users' last seen time and IPs in the database.
|
|
|
|
#
|
2019-09-25 10:22:33 -06:00
|
|
|
# Defaults to `28d`. Set to `null` to disable clearing out of old rows.
|
2019-09-24 08:20:40 -06:00
|
|
|
#
|
|
|
|
#user_ips_max_age: 14d
|
2019-11-19 06:33:58 -07:00
|
|
|
|
2019-11-04 10:09:22 -07:00
|
|
|
# Message retention policy at the server level.
|
|
|
|
#
|
|
|
|
# Room admins and mods can define a retention period for their rooms using the
|
|
|
|
# 'm.room.retention' state event, and server admins can cap this period by setting
|
|
|
|
# the 'allowed_lifetime_min' and 'allowed_lifetime_max' config options.
|
|
|
|
#
|
|
|
|
# If this feature is enabled, Synapse will regularly look for and purge events
|
|
|
|
# which are older than the room's maximum retention period. Synapse will also
|
|
|
|
# filter events received over federation so that events that should have been
|
|
|
|
# purged are ignored and not stored again.
|
|
|
|
#
|
|
|
|
retention:
|
|
|
|
# The message retention policies feature is disabled by default. Uncomment the
|
|
|
|
# following line to enable it.
|
|
|
|
#
|
|
|
|
#enabled: true
|
|
|
|
|
|
|
|
# Default retention policy. If set, Synapse will apply it to rooms that lack the
|
|
|
|
# 'm.room.retention' state event. Currently, the value of 'min_lifetime' doesn't
|
|
|
|
# matter much because Synapse doesn't take it into account yet.
|
|
|
|
#
|
|
|
|
#default_policy:
|
|
|
|
# min_lifetime: 1d
|
|
|
|
# max_lifetime: 1y
|
|
|
|
|
|
|
|
# Retention policy limits. If set, a user won't be able to send a
|
|
|
|
# 'm.room.retention' event which features a 'min_lifetime' or a 'max_lifetime'
|
|
|
|
# that's not within this range. This is especially useful in closed federations,
|
|
|
|
# in which server admins can make sure every federating server applies the same
|
|
|
|
# rules.
|
|
|
|
#
|
|
|
|
#allowed_lifetime_min: 1d
|
|
|
|
#allowed_lifetime_max: 1y
|
|
|
|
|
|
|
|
# Server admins can define the settings of the background jobs purging the
|
|
|
|
# events which lifetime has expired under the 'purge_jobs' section.
|
|
|
|
#
|
|
|
|
# If no configuration is provided, a single job will be set up to delete expired
|
|
|
|
# events in every room daily.
|
|
|
|
#
|
|
|
|
# Each job's configuration defines which range of message lifetimes the job
|
|
|
|
# takes care of. For example, if 'shortest_max_lifetime' is '2d' and
|
|
|
|
# 'longest_max_lifetime' is '3d', the job will handle purging expired events in
|
|
|
|
# rooms whose state defines a 'max_lifetime' that's both higher than 2 days, and
|
|
|
|
# lower than or equal to 3 days. Both the minimum and the maximum value of a
|
|
|
|
# range are optional, e.g. a job with no 'shortest_max_lifetime' and a
|
|
|
|
# 'longest_max_lifetime' of '3d' will handle every room with a retention policy
|
|
|
|
# which 'max_lifetime' is lower than or equal to three days.
|
|
|
|
#
|
|
|
|
# The rationale for this per-job configuration is that some rooms might have a
|
|
|
|
# retention policy with a low 'max_lifetime', where history needs to be purged
|
2020-01-07 07:54:32 -07:00
|
|
|
# of outdated messages on a more frequent basis than for the rest of the rooms
|
|
|
|
# (e.g. every 12h), but not want that purge to be performed by a job that's
|
|
|
|
# iterating over every room it knows, which could be heavy on the server.
|
2019-11-04 10:09:22 -07:00
|
|
|
#
|
|
|
|
#purge_jobs:
|
|
|
|
# - shortest_max_lifetime: 1d
|
|
|
|
# longest_max_lifetime: 3d
|
2020-01-07 07:53:07 -07:00
|
|
|
# interval: 12h
|
2019-11-04 10:09:22 -07:00
|
|
|
# - shortest_max_lifetime: 3d
|
|
|
|
# longest_max_lifetime: 1y
|
2020-01-07 07:53:07 -07:00
|
|
|
# interval: 1d
|
2019-06-20 03:32:02 -06:00
|
|
|
"""
|
|
|
|
% locals()
|
|
|
|
)
|
2015-04-29 21:24:44 -06:00
|
|
|
|
|
|
|
def read_arguments(self, args):
|
|
|
|
if args.manhole is not None:
|
|
|
|
self.manhole = args.manhole
|
2015-05-01 07:34:48 -06:00
|
|
|
if args.daemonize is not None:
|
|
|
|
self.daemonize = args.daemonize
|
2015-08-07 09:36:42 -06:00
|
|
|
if args.print_pidfile is not None:
|
|
|
|
self.print_pidfile = args.print_pidfile
|
2014-09-03 04:57:23 -06:00
|
|
|
|
2019-07-15 06:15:34 -06:00
|
|
|
@staticmethod
|
|
|
|
def add_arguments(parser):
|
2014-08-31 09:06:39 -06:00
|
|
|
server_group = parser.add_argument_group("server")
|
2019-06-20 03:32:02 -06:00
|
|
|
server_group.add_argument(
|
|
|
|
"-D",
|
|
|
|
"--daemonize",
|
|
|
|
action="store_true",
|
|
|
|
default=None,
|
2019-11-12 06:08:12 -07:00
|
|
|
help="Daemonize the homeserver",
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
|
|
|
server_group.add_argument(
|
|
|
|
"--print-pidfile",
|
|
|
|
action="store_true",
|
|
|
|
default=None,
|
2019-11-21 05:00:14 -07:00
|
|
|
help="Print the path to the pidfile just before daemonizing",
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
|
|
|
server_group.add_argument(
|
|
|
|
"--manhole",
|
|
|
|
metavar="PORT",
|
|
|
|
dest="manhole",
|
|
|
|
type=int,
|
2019-11-21 05:00:14 -07:00
|
|
|
help="Turn on the twisted telnet manhole service on the given port.",
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
2016-06-16 04:06:12 -06:00
|
|
|
|
|
|
|
|
2019-01-22 09:52:29 -07:00
|
|
|
def is_threepid_reserved(reserved_threepids, threepid):
|
2018-08-31 10:11:11 -06:00
|
|
|
"""Check the threepid against the reserved threepid config
|
|
|
|
Args:
|
2019-01-22 09:52:29 -07:00
|
|
|
reserved_threepids([dict]) - list of reserved threepids
|
2018-08-31 10:11:11 -06:00
|
|
|
threepid(dict) - The threepid to test for
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
boolean Is the threepid undertest reserved_user
|
|
|
|
"""
|
|
|
|
|
2019-01-22 09:52:29 -07:00
|
|
|
for tp in reserved_threepids:
|
2019-06-20 03:32:02 -06:00
|
|
|
if threepid["medium"] == tp["medium"] and threepid["address"] == tp["address"]:
|
2018-08-31 10:11:11 -06:00
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
2016-06-16 04:06:12 -06:00
|
|
|
def read_gc_thresholds(thresholds):
|
|
|
|
"""Reads the three integer thresholds for garbage collection. Ensures that
|
|
|
|
the thresholds are integers if thresholds are supplied.
|
|
|
|
"""
|
|
|
|
if thresholds is None:
|
|
|
|
return None
|
|
|
|
try:
|
|
|
|
assert len(thresholds) == 3
|
2019-06-20 03:32:02 -06:00
|
|
|
return (int(thresholds[0]), int(thresholds[1]), int(thresholds[2]))
|
2017-10-23 08:52:32 -06:00
|
|
|
except Exception:
|
2016-06-16 04:06:12 -06:00
|
|
|
raise ConfigError(
|
|
|
|
"Value of `gc_threshold` must be a list of three integers if set"
|
|
|
|
)
|
2018-12-11 06:18:48 -07:00
|
|
|
|
|
|
|
|
|
|
|
NO_MORE_WEB_CLIENT_WARNING = """
|
|
|
|
Synapse no longer includes a web client. To enable a web client, configure
|
|
|
|
web_client_location. To remove this warning, remove 'webclient' from the 'listeners'
|
|
|
|
configuration.
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
|
|
def _warn_if_webclient_configured(listeners):
|
|
|
|
for listener in listeners:
|
|
|
|
for res in listener.get("resources", []):
|
|
|
|
for name in res.get("names", []):
|
2019-06-20 03:32:02 -06:00
|
|
|
if name == "webclient":
|
2018-12-11 06:18:48 -07:00
|
|
|
logger.warning(NO_MORE_WEB_CLIENT_WARNING)
|
|
|
|
return
|
2019-01-07 03:14:31 -07:00
|
|
|
|
|
|
|
|
|
|
|
KNOWN_RESOURCES = (
|
2019-06-20 03:32:02 -06:00
|
|
|
"client",
|
|
|
|
"consent",
|
|
|
|
"federation",
|
|
|
|
"keys",
|
|
|
|
"media",
|
|
|
|
"metrics",
|
|
|
|
"openid",
|
|
|
|
"replication",
|
|
|
|
"static",
|
|
|
|
"webclient",
|
2019-01-07 03:14:31 -07:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
def _check_resource_config(listeners):
|
|
|
|
resource_names = set(
|
|
|
|
res_name
|
|
|
|
for listener in listeners
|
|
|
|
for res in listener.get("resources", [])
|
|
|
|
for res_name in res.get("names", [])
|
|
|
|
)
|
|
|
|
|
|
|
|
for resource in resource_names:
|
|
|
|
if resource not in KNOWN_RESOURCES:
|
2019-06-20 03:32:02 -06:00
|
|
|
raise ConfigError("Unknown listener resource '%s'" % (resource,))
|
2019-01-07 03:14:31 -07:00
|
|
|
if resource == "consent":
|
|
|
|
try:
|
2019-06-20 03:32:02 -06:00
|
|
|
check_requirements("resources.consent")
|
2019-01-07 03:14:31 -07:00
|
|
|
except DependencyException as e:
|
|
|
|
raise ConfigError(e.message)
|