702 lines
23 KiB
Python
Executable File
702 lines
23 KiB
Python
Executable File
#!/usr/bin/env python
|
|
# -*- coding: utf-8 -*-
|
|
# Copyright 2014, 2015 OpenMarket Ltd
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import sys
|
|
sys.dont_write_bytecode = True
|
|
from synapse.python_dependencies import check_requirements, DEPENDENCY_LINKS
|
|
|
|
if __name__ == '__main__':
|
|
check_requirements()
|
|
|
|
from synapse.storage.engines import create_engine, IncorrectDatabaseSetup
|
|
from synapse.storage import (
|
|
are_all_users_on_domain, UpgradeDatabaseException,
|
|
)
|
|
|
|
from synapse.server import HomeServer
|
|
|
|
|
|
from twisted.internet import reactor
|
|
from twisted.application import service
|
|
from twisted.enterprise import adbapi
|
|
from twisted.web.resource import Resource, EncodingResourceWrapper
|
|
from twisted.web.static import File
|
|
from twisted.web.server import Site, GzipEncoderFactory, Request
|
|
from synapse.http.server import JsonResource, RootRedirect
|
|
from synapse.rest.media.v0.content_repository import ContentRepoResource
|
|
from synapse.rest.media.v1.media_repository import MediaRepositoryResource
|
|
from synapse.rest.key.v1.server_key_resource import LocalKey
|
|
from synapse.rest.key.v2 import KeyApiV2Resource
|
|
from synapse.http.matrixfederationclient import MatrixFederationHttpClient
|
|
from synapse.api.urls import (
|
|
CLIENT_PREFIX, FEDERATION_PREFIX, WEB_CLIENT_PREFIX, CONTENT_REPO_PREFIX,
|
|
SERVER_KEY_PREFIX, MEDIA_PREFIX, CLIENT_V2_ALPHA_PREFIX, STATIC_PREFIX,
|
|
SERVER_KEY_V2_PREFIX,
|
|
)
|
|
from synapse.config.homeserver import HomeServerConfig
|
|
from synapse.crypto import context_factory
|
|
from synapse.util.logcontext import LoggingContext
|
|
from synapse.rest.client.v1 import ClientV1RestResource
|
|
from synapse.rest.client.v2_alpha import ClientV2AlphaRestResource
|
|
from synapse.metrics.resource import MetricsResource, METRICS_PREFIX
|
|
|
|
from synapse import events
|
|
|
|
from daemonize import Daemonize
|
|
import twisted.manhole.telnet
|
|
|
|
import synapse
|
|
|
|
import contextlib
|
|
import logging
|
|
import os
|
|
import re
|
|
import resource
|
|
import subprocess
|
|
import time
|
|
|
|
|
|
logger = logging.getLogger("synapse.app.homeserver")
|
|
|
|
|
|
class GzipFile(File):
|
|
def getChild(self, path, request):
|
|
child = File.getChild(self, path, request)
|
|
return EncodingResourceWrapper(child, [GzipEncoderFactory()])
|
|
|
|
|
|
def gz_wrap(r):
|
|
return EncodingResourceWrapper(r, [GzipEncoderFactory()])
|
|
|
|
|
|
class SynapseHomeServer(HomeServer):
|
|
|
|
def build_http_client(self):
|
|
return MatrixFederationHttpClient(self)
|
|
|
|
def build_resource_for_client(self):
|
|
return ClientV1RestResource(self)
|
|
|
|
def build_resource_for_client_v2_alpha(self):
|
|
return ClientV2AlphaRestResource(self)
|
|
|
|
def build_resource_for_federation(self):
|
|
return JsonResource(self)
|
|
|
|
def build_resource_for_web_client(self):
|
|
webclient_path = self.get_config().web_client_location
|
|
if not webclient_path:
|
|
try:
|
|
import syweb
|
|
except ImportError:
|
|
quit_with_error(
|
|
"Could not find a webclient.\n\n"
|
|
"Please either install the matrix-angular-sdk or configure\n"
|
|
"the location of the source to serve via the configuration\n"
|
|
"option `web_client_location`\n\n"
|
|
"To install the `matrix-angular-sdk` via pip, run:\n\n"
|
|
" pip install '%(dep)s'\n"
|
|
"\n"
|
|
"You can also disable hosting of the webclient via the\n"
|
|
"configuration option `web_client`\n"
|
|
% {"dep": DEPENDENCY_LINKS["matrix-angular-sdk"]}
|
|
)
|
|
syweb_path = os.path.dirname(syweb.__file__)
|
|
webclient_path = os.path.join(syweb_path, "webclient")
|
|
# GZip is disabled here due to
|
|
# https://twistedmatrix.com/trac/ticket/7678
|
|
# (It can stay enabled for the API resources: they call
|
|
# write() with the whole body and then finish() straight
|
|
# after and so do not trigger the bug.
|
|
# return GzipFile(webclient_path) # TODO configurable?
|
|
return File(webclient_path) # TODO configurable?
|
|
|
|
def build_resource_for_static_content(self):
|
|
# This is old and should go away: not going to bother adding gzip
|
|
return File("static")
|
|
|
|
def build_resource_for_content_repo(self):
|
|
return ContentRepoResource(
|
|
self, self.config.uploads_path, self.auth, self.content_addr
|
|
)
|
|
|
|
def build_resource_for_media_repository(self):
|
|
return MediaRepositoryResource(self)
|
|
|
|
def build_resource_for_server_key(self):
|
|
return LocalKey(self)
|
|
|
|
def build_resource_for_server_key_v2(self):
|
|
return KeyApiV2Resource(self)
|
|
|
|
def build_resource_for_metrics(self):
|
|
if self.get_config().enable_metrics:
|
|
return MetricsResource(self)
|
|
else:
|
|
return None
|
|
|
|
def build_db_pool(self):
|
|
name = self.db_config["name"]
|
|
|
|
return adbapi.ConnectionPool(
|
|
name,
|
|
**self.db_config.get("args", {})
|
|
)
|
|
|
|
def _listener_http(self, config, listener_config):
|
|
port = listener_config["port"]
|
|
bind_address = listener_config.get("bind_address", "")
|
|
tls = listener_config.get("tls", False)
|
|
site_tag = listener_config.get("tag", port)
|
|
|
|
if tls and config.no_tls:
|
|
return
|
|
|
|
metrics_resource = self.get_resource_for_metrics()
|
|
|
|
resources = {}
|
|
for res in listener_config["resources"]:
|
|
for name in res["names"]:
|
|
if name == "client":
|
|
if res["compress"]:
|
|
client_v1 = gz_wrap(self.get_resource_for_client())
|
|
client_v2 = gz_wrap(self.get_resource_for_client_v2_alpha())
|
|
else:
|
|
client_v1 = self.get_resource_for_client()
|
|
client_v2 = self.get_resource_for_client_v2_alpha()
|
|
|
|
resources.update({
|
|
CLIENT_PREFIX: client_v1,
|
|
CLIENT_V2_ALPHA_PREFIX: client_v2,
|
|
})
|
|
|
|
if name == "federation":
|
|
resources.update({
|
|
FEDERATION_PREFIX: self.get_resource_for_federation(),
|
|
})
|
|
|
|
if name in ["static", "client"]:
|
|
resources.update({
|
|
STATIC_PREFIX: self.get_resource_for_static_content(),
|
|
})
|
|
|
|
if name in ["media", "federation", "client"]:
|
|
resources.update({
|
|
MEDIA_PREFIX: self.get_resource_for_media_repository(),
|
|
CONTENT_REPO_PREFIX: self.get_resource_for_content_repo(),
|
|
})
|
|
|
|
if name in ["keys", "federation"]:
|
|
resources.update({
|
|
SERVER_KEY_PREFIX: self.get_resource_for_server_key(),
|
|
SERVER_KEY_V2_PREFIX: self.get_resource_for_server_key_v2(),
|
|
})
|
|
|
|
if name == "webclient":
|
|
resources[WEB_CLIENT_PREFIX] = self.get_resource_for_web_client()
|
|
|
|
if name == "metrics" and metrics_resource:
|
|
resources[METRICS_PREFIX] = metrics_resource
|
|
|
|
root_resource = create_resource_tree(resources)
|
|
if tls:
|
|
reactor.listenSSL(
|
|
port,
|
|
SynapseSite(
|
|
"synapse.access.https.%s" % (site_tag,),
|
|
site_tag,
|
|
listener_config,
|
|
root_resource,
|
|
),
|
|
self.tls_context_factory,
|
|
interface=bind_address
|
|
)
|
|
else:
|
|
reactor.listenTCP(
|
|
port,
|
|
SynapseSite(
|
|
"synapse.access.http.%s" % (site_tag,),
|
|
site_tag,
|
|
listener_config,
|
|
root_resource,
|
|
),
|
|
interface=bind_address
|
|
)
|
|
logger.info("Synapse now listening on port %d", port)
|
|
|
|
def start_listening(self):
|
|
config = self.get_config()
|
|
|
|
for listener in config.listeners:
|
|
if listener["type"] == "http":
|
|
self._listener_http(config, listener)
|
|
elif listener["type"] == "manhole":
|
|
f = twisted.manhole.telnet.ShellFactory()
|
|
f.username = "matrix"
|
|
f.password = "rabbithole"
|
|
f.namespace['hs'] = self
|
|
reactor.listenTCP(
|
|
listener["port"],
|
|
f,
|
|
interface=listener.get("bind_address", '127.0.0.1')
|
|
)
|
|
else:
|
|
logger.warn("Unrecognized listener type: %s", listener["type"])
|
|
|
|
def run_startup_checks(self, db_conn, database_engine):
|
|
all_users_native = are_all_users_on_domain(
|
|
db_conn.cursor(), database_engine, self.hostname
|
|
)
|
|
if not all_users_native:
|
|
quit_with_error(
|
|
"Found users in database not native to %s!\n"
|
|
"You cannot changed a synapse server_name after it's been configured"
|
|
% (self.hostname,)
|
|
)
|
|
|
|
try:
|
|
database_engine.check_database(db_conn.cursor())
|
|
except IncorrectDatabaseSetup as e:
|
|
quit_with_error(e.message)
|
|
|
|
|
|
def quit_with_error(error_string):
|
|
message_lines = error_string.split("\n")
|
|
line_length = max([len(l) for l in message_lines if len(l) < 80]) + 2
|
|
sys.stderr.write("*" * line_length + '\n')
|
|
for line in message_lines:
|
|
sys.stderr.write(" %s\n" % (line.rstrip(),))
|
|
sys.stderr.write("*" * line_length + '\n')
|
|
sys.exit(1)
|
|
|
|
|
|
def get_version_string():
|
|
try:
|
|
null = open(os.devnull, 'w')
|
|
cwd = os.path.dirname(os.path.abspath(__file__))
|
|
try:
|
|
git_branch = subprocess.check_output(
|
|
['git', 'rev-parse', '--abbrev-ref', 'HEAD'],
|
|
stderr=null,
|
|
cwd=cwd,
|
|
).strip()
|
|
git_branch = "b=" + git_branch
|
|
except subprocess.CalledProcessError:
|
|
git_branch = ""
|
|
|
|
try:
|
|
git_tag = subprocess.check_output(
|
|
['git', 'describe', '--exact-match'],
|
|
stderr=null,
|
|
cwd=cwd,
|
|
).strip()
|
|
git_tag = "t=" + git_tag
|
|
except subprocess.CalledProcessError:
|
|
git_tag = ""
|
|
|
|
try:
|
|
git_commit = subprocess.check_output(
|
|
['git', 'rev-parse', '--short', 'HEAD'],
|
|
stderr=null,
|
|
cwd=cwd,
|
|
).strip()
|
|
except subprocess.CalledProcessError:
|
|
git_commit = ""
|
|
|
|
try:
|
|
dirty_string = "-this_is_a_dirty_checkout"
|
|
is_dirty = subprocess.check_output(
|
|
['git', 'describe', '--dirty=' + dirty_string],
|
|
stderr=null,
|
|
cwd=cwd,
|
|
).strip().endswith(dirty_string)
|
|
|
|
git_dirty = "dirty" if is_dirty else ""
|
|
except subprocess.CalledProcessError:
|
|
git_dirty = ""
|
|
|
|
if git_branch or git_tag or git_commit or git_dirty:
|
|
git_version = ",".join(
|
|
s for s in
|
|
(git_branch, git_tag, git_commit, git_dirty,)
|
|
if s
|
|
)
|
|
|
|
return (
|
|
"Synapse/%s (%s)" % (
|
|
synapse.__version__, git_version,
|
|
)
|
|
).encode("ascii")
|
|
except Exception as e:
|
|
logger.warn("Failed to check for git repository: %s", e)
|
|
|
|
return ("Synapse/%s" % (synapse.__version__,)).encode("ascii")
|
|
|
|
|
|
def change_resource_limit(soft_file_no):
|
|
try:
|
|
soft, hard = resource.getrlimit(resource.RLIMIT_NOFILE)
|
|
|
|
if not soft_file_no:
|
|
soft_file_no = hard
|
|
|
|
resource.setrlimit(resource.RLIMIT_NOFILE, (soft_file_no, hard))
|
|
|
|
logger.info("Set file limit to: %d", soft_file_no)
|
|
except (ValueError, resource.error) as e:
|
|
logger.warn("Failed to set file limit: %s", e)
|
|
|
|
|
|
def setup(config_options):
|
|
"""
|
|
Args:
|
|
config_options_options: The options passed to Synapse. Usually
|
|
`sys.argv[1:]`.
|
|
should_run (bool): Whether to start the reactor.
|
|
|
|
Returns:
|
|
HomeServer
|
|
"""
|
|
config = HomeServerConfig.load_config(
|
|
"Synapse Homeserver",
|
|
config_options,
|
|
generate_section="Homeserver"
|
|
)
|
|
|
|
config.setup_logging()
|
|
|
|
# check any extra requirements we have now we have a config
|
|
check_requirements(config)
|
|
|
|
version_string = get_version_string()
|
|
|
|
logger.info("Server hostname: %s", config.server_name)
|
|
logger.info("Server version: %s", version_string)
|
|
|
|
events.USE_FROZEN_DICTS = config.use_frozen_dicts
|
|
|
|
tls_context_factory = context_factory.ServerContextFactory(config)
|
|
|
|
database_engine = create_engine(config.database_config["name"])
|
|
config.database_config["args"]["cp_openfun"] = database_engine.on_new_connection
|
|
|
|
hs = SynapseHomeServer(
|
|
config.server_name,
|
|
db_config=config.database_config,
|
|
tls_context_factory=tls_context_factory,
|
|
config=config,
|
|
content_addr=config.content_addr,
|
|
version_string=version_string,
|
|
database_engine=database_engine,
|
|
)
|
|
|
|
logger.info("Preparing database: %r...", config.database_config)
|
|
|
|
try:
|
|
db_conn = database_engine.module.connect(
|
|
**{
|
|
k: v for k, v in config.database_config.get("args", {}).items()
|
|
if not k.startswith("cp_")
|
|
}
|
|
)
|
|
|
|
database_engine.prepare_database(db_conn)
|
|
hs.run_startup_checks(db_conn, database_engine)
|
|
|
|
db_conn.commit()
|
|
except UpgradeDatabaseException:
|
|
sys.stderr.write(
|
|
"\nFailed to upgrade database.\n"
|
|
"Have you checked for version specific instructions in"
|
|
" UPGRADES.rst?\n"
|
|
)
|
|
sys.exit(1)
|
|
|
|
logger.info("Database prepared in %r.", config.database_config)
|
|
|
|
hs.start_listening()
|
|
|
|
hs.get_pusherpool().start()
|
|
hs.get_state_handler().start_caching()
|
|
hs.get_datastore().start_profiling()
|
|
hs.get_replication_layer().start_get_pdu_cache()
|
|
|
|
return hs
|
|
|
|
|
|
class SynapseService(service.Service):
|
|
"""A twisted Service class that will start synapse. Used to run synapse
|
|
via twistd and a .tac.
|
|
"""
|
|
def __init__(self, config):
|
|
self.config = config
|
|
|
|
def startService(self):
|
|
hs = setup(self.config)
|
|
change_resource_limit(hs.config.soft_file_limit)
|
|
|
|
def stopService(self):
|
|
return self._port.stopListening()
|
|
|
|
|
|
class SynapseRequest(Request):
|
|
def __init__(self, site, *args, **kw):
|
|
Request.__init__(self, *args, **kw)
|
|
self.site = site
|
|
self.authenticated_entity = None
|
|
self.start_time = 0
|
|
|
|
def __repr__(self):
|
|
# We overwrite this so that we don't log ``access_token``
|
|
return '<%s at 0x%x method=%s uri=%s clientproto=%s site=%s>' % (
|
|
self.__class__.__name__,
|
|
id(self),
|
|
self.method,
|
|
self.get_redacted_uri(),
|
|
self.clientproto,
|
|
self.site.site_tag,
|
|
)
|
|
|
|
def get_redacted_uri(self):
|
|
return re.sub(
|
|
r'(\?.*access_token=)[^&]*(.*)$',
|
|
r'\1<redacted>\2',
|
|
self.uri
|
|
)
|
|
|
|
def get_user_agent(self):
|
|
return self.requestHeaders.getRawHeaders("User-Agent", [None])[-1]
|
|
|
|
def started_processing(self):
|
|
self.site.access_logger.info(
|
|
"%s - %s - Received request: %s %s",
|
|
self.getClientIP(),
|
|
self.site.site_tag,
|
|
self.method,
|
|
self.get_redacted_uri()
|
|
)
|
|
self.start_time = int(time.time() * 1000)
|
|
|
|
def finished_processing(self):
|
|
self.site.access_logger.info(
|
|
"%s - %s - {%s}"
|
|
" Processed request: %dms %sB %s \"%s %s %s\" \"%s\"",
|
|
self.getClientIP(),
|
|
self.site.site_tag,
|
|
self.authenticated_entity,
|
|
int(time.time() * 1000) - self.start_time,
|
|
self.sentLength,
|
|
self.code,
|
|
self.method,
|
|
self.get_redacted_uri(),
|
|
self.clientproto,
|
|
self.get_user_agent(),
|
|
)
|
|
|
|
@contextlib.contextmanager
|
|
def processing(self):
|
|
self.started_processing()
|
|
yield
|
|
self.finished_processing()
|
|
|
|
|
|
class XForwardedForRequest(SynapseRequest):
|
|
def __init__(self, *args, **kw):
|
|
SynapseRequest.__init__(self, *args, **kw)
|
|
|
|
"""
|
|
Add a layer on top of another request that only uses the value of an
|
|
X-Forwarded-For header as the result of C{getClientIP}.
|
|
"""
|
|
def getClientIP(self):
|
|
"""
|
|
@return: The client address (the first address) in the value of the
|
|
I{X-Forwarded-For header}. If the header is not present, return
|
|
C{b"-"}.
|
|
"""
|
|
return self.requestHeaders.getRawHeaders(
|
|
b"x-forwarded-for", [b"-"])[0].split(b",")[0].strip()
|
|
|
|
|
|
class SynapseRequestFactory(object):
|
|
def __init__(self, site, x_forwarded_for):
|
|
self.site = site
|
|
self.x_forwarded_for = x_forwarded_for
|
|
|
|
def __call__(self, *args, **kwargs):
|
|
if self.x_forwarded_for:
|
|
return XForwardedForRequest(self.site, *args, **kwargs)
|
|
else:
|
|
return SynapseRequest(self.site, *args, **kwargs)
|
|
|
|
|
|
class SynapseSite(Site):
|
|
"""
|
|
Subclass of a twisted http Site that does access logging with python's
|
|
standard logging
|
|
"""
|
|
def __init__(self, logger_name, site_tag, config, resource, *args, **kwargs):
|
|
Site.__init__(self, resource, *args, **kwargs)
|
|
|
|
self.site_tag = site_tag
|
|
|
|
proxied = config.get("x_forwarded", False)
|
|
self.requestFactory = SynapseRequestFactory(self, proxied)
|
|
self.access_logger = logging.getLogger(logger_name)
|
|
|
|
def log(self, request):
|
|
pass
|
|
|
|
|
|
def create_resource_tree(desired_tree, redirect_root_to_web_client=True):
|
|
"""Create the resource tree for this Home Server.
|
|
|
|
This in unduly complicated because Twisted does not support putting
|
|
child resources more than 1 level deep at a time.
|
|
|
|
Args:
|
|
web_client (bool): True to enable the web client.
|
|
redirect_root_to_web_client (bool): True to redirect '/' to the
|
|
location of the web client. This does nothing if web_client is not
|
|
True.
|
|
"""
|
|
if redirect_root_to_web_client and WEB_CLIENT_PREFIX in desired_tree:
|
|
root_resource = RootRedirect(WEB_CLIENT_PREFIX)
|
|
else:
|
|
root_resource = Resource()
|
|
|
|
# ideally we'd just use getChild and putChild but getChild doesn't work
|
|
# unless you give it a Request object IN ADDITION to the name :/ So
|
|
# instead, we'll store a copy of this mapping so we can actually add
|
|
# extra resources to existing nodes. See self._resource_id for the key.
|
|
resource_mappings = {}
|
|
for full_path, res in desired_tree.items():
|
|
logger.info("Attaching %s to path %s", res, full_path)
|
|
last_resource = root_resource
|
|
for path_seg in full_path.split('/')[1:-1]:
|
|
if path_seg not in last_resource.listNames():
|
|
# resource doesn't exist, so make a "dummy resource"
|
|
child_resource = Resource()
|
|
last_resource.putChild(path_seg, child_resource)
|
|
res_id = _resource_id(last_resource, path_seg)
|
|
resource_mappings[res_id] = child_resource
|
|
last_resource = child_resource
|
|
else:
|
|
# we have an existing Resource, use that instead.
|
|
res_id = _resource_id(last_resource, path_seg)
|
|
last_resource = resource_mappings[res_id]
|
|
|
|
# ===========================
|
|
# now attach the actual desired resource
|
|
last_path_seg = full_path.split('/')[-1]
|
|
|
|
# if there is already a resource here, thieve its children and
|
|
# replace it
|
|
res_id = _resource_id(last_resource, last_path_seg)
|
|
if res_id in resource_mappings:
|
|
# there is a dummy resource at this path already, which needs
|
|
# to be replaced with the desired resource.
|
|
existing_dummy_resource = resource_mappings[res_id]
|
|
for child_name in existing_dummy_resource.listNames():
|
|
child_res_id = _resource_id(
|
|
existing_dummy_resource, child_name
|
|
)
|
|
child_resource = resource_mappings[child_res_id]
|
|
# steal the children
|
|
res.putChild(child_name, child_resource)
|
|
|
|
# finally, insert the desired resource in the right place
|
|
last_resource.putChild(last_path_seg, res)
|
|
res_id = _resource_id(last_resource, last_path_seg)
|
|
resource_mappings[res_id] = res
|
|
|
|
return root_resource
|
|
|
|
|
|
def _resource_id(resource, path_seg):
|
|
"""Construct an arbitrary resource ID so you can retrieve the mapping
|
|
later.
|
|
|
|
If you want to represent resource A putChild resource B with path C,
|
|
the mapping should looks like _resource_id(A,C) = B.
|
|
|
|
Args:
|
|
resource (Resource): The *parent* Resource
|
|
path_seg (str): The name of the child Resource to be attached.
|
|
Returns:
|
|
str: A unique string which can be a key to the child Resource.
|
|
"""
|
|
return "%s-%s" % (resource, path_seg)
|
|
|
|
|
|
def run(hs):
|
|
PROFILE_SYNAPSE = False
|
|
if PROFILE_SYNAPSE:
|
|
def profile(func):
|
|
from cProfile import Profile
|
|
from threading import current_thread
|
|
|
|
def profiled(*args, **kargs):
|
|
profile = Profile()
|
|
profile.enable()
|
|
func(*args, **kargs)
|
|
profile.disable()
|
|
ident = current_thread().ident
|
|
profile.dump_stats("/tmp/%s.%s.%i.pstat" % (
|
|
hs.hostname, func.__name__, ident
|
|
))
|
|
|
|
return profiled
|
|
|
|
from twisted.python.threadpool import ThreadPool
|
|
ThreadPool._worker = profile(ThreadPool._worker)
|
|
reactor.run = profile(reactor.run)
|
|
|
|
def in_thread():
|
|
with LoggingContext("run"):
|
|
change_resource_limit(hs.config.soft_file_limit)
|
|
reactor.run()
|
|
|
|
if hs.config.daemonize:
|
|
|
|
if hs.config.print_pidfile:
|
|
print hs.config.pid_file
|
|
|
|
daemon = Daemonize(
|
|
app="synapse-homeserver",
|
|
pid=hs.config.pid_file,
|
|
action=lambda: in_thread(),
|
|
auto_close_fds=False,
|
|
verbose=True,
|
|
logger=logger,
|
|
)
|
|
|
|
daemon.start()
|
|
else:
|
|
in_thread()
|
|
|
|
|
|
def main():
|
|
with LoggingContext("main"):
|
|
# check base requirements
|
|
check_requirements()
|
|
hs = setup(sys.argv[1:])
|
|
run(hs)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|