2014-08-31 17:06:39 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2017-08-16 15:57:35 +02:00
|
|
|
# Copyright 2017 New Vector Ltd
|
2014-08-31 17:06:39 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2018-05-31 11:04:50 +02:00
|
|
|
import logging
|
|
|
|
|
2018-07-04 19:15:03 +02:00
|
|
|
from synapse.http.endpoint import parse_and_validate_server_name
|
2018-07-09 08:09:20 +02:00
|
|
|
|
2016-06-07 16:45:56 +02:00
|
|
|
from ._base import Config, ConfigError
|
2014-08-31 17:06:39 +02:00
|
|
|
|
2018-05-31 11:04:50 +02:00
|
|
|
logger = logging.Logger(__name__)
|
|
|
|
|
2014-08-31 17:06:39 +02:00
|
|
|
|
|
|
|
class ServerConfig(Config):
|
|
|
|
|
2015-04-30 05:24:44 +02:00
|
|
|
def read_config(self, config):
|
|
|
|
self.server_name = config["server_name"]
|
2018-07-04 19:15:03 +02:00
|
|
|
|
|
|
|
try:
|
|
|
|
parse_and_validate_server_name(self.server_name)
|
|
|
|
except ValueError as e:
|
|
|
|
raise ConfigError(str(e))
|
|
|
|
|
2015-04-30 05:24:44 +02:00
|
|
|
self.pid_file = self.abspath(config.get("pid_file"))
|
|
|
|
self.web_client = config["web_client"]
|
2015-08-25 13:01:23 +02:00
|
|
|
self.web_client_location = config.get("web_client_location", None)
|
2015-04-30 05:24:44 +02:00
|
|
|
self.soft_file_limit = config["soft_file_limit"]
|
2015-05-01 15:34:48 +02:00
|
|
|
self.daemonize = config.get("daemonize")
|
2015-08-07 17:36:42 +02:00
|
|
|
self.print_pidfile = config.get("print_pidfile")
|
2015-10-06 03:49:39 +02:00
|
|
|
self.user_agent_suffix = config.get("user_agent_suffix")
|
2016-06-17 16:11:22 +02:00
|
|
|
self.use_frozen_dicts = config.get("use_frozen_dicts", False)
|
2016-04-27 16:09:55 +02:00
|
|
|
self.public_baseurl = config.get("public_baseurl")
|
2017-08-15 18:08:28 +02:00
|
|
|
self.cpu_affinity = config.get("cpu_affinity")
|
2016-04-27 16:09:55 +02:00
|
|
|
|
2016-11-16 18:34:44 +01:00
|
|
|
# Whether to send federation traffic out in this process. This only
|
|
|
|
# applies to some federation traffic, and so shouldn't be used to
|
|
|
|
# "disable" federation
|
|
|
|
self.send_federation = config.get("send_federation", True)
|
|
|
|
|
2018-08-17 17:08:45 +02:00
|
|
|
# Whether to enable user presence.
|
|
|
|
self.use_presence = config.get("use_presence", True)
|
|
|
|
|
2017-06-15 13:47:05 +02:00
|
|
|
# Whether to update the user directory or not. This should be set to
|
|
|
|
# false only if we are updating the user directory in a worker
|
|
|
|
self.update_user_directory = config.get("update_user_directory", True)
|
|
|
|
|
2017-11-21 14:29:39 +01:00
|
|
|
# whether to enable the media repository endpoints. This should be set
|
|
|
|
# to false if the media repository is running as a separate endpoint;
|
|
|
|
# doing so ensures that we will not run cache cleanup jobs on the
|
|
|
|
# master, potentially causing inconsistency.
|
|
|
|
self.enable_media_repo = config.get("enable_media_repo", True)
|
|
|
|
|
2018-12-04 12:01:02 +01:00
|
|
|
# whether to enable search. If disabled, new entries will not be inserted
|
|
|
|
# into the search tables and they will not be indexed. Users will receive
|
|
|
|
# errors when attempting to search for messages.
|
|
|
|
self.enable_search = config.get("enable_search", True)
|
|
|
|
|
2017-05-13 18:17:54 +02:00
|
|
|
self.filter_timeline_limit = config.get("filter_timeline_limit", -1)
|
|
|
|
|
2017-09-19 17:08:14 +02:00
|
|
|
# Whether we should block invites sent to users on this server
|
|
|
|
# (other than those sent by local server admins)
|
|
|
|
self.block_non_admin_invites = config.get(
|
|
|
|
"block_non_admin_invites", False,
|
|
|
|
)
|
|
|
|
|
2018-07-30 16:55:57 +02:00
|
|
|
# Options to control access by tracking MAU
|
|
|
|
self.limit_usage_by_mau = config.get("limit_usage_by_mau", False)
|
2018-08-03 15:59:17 +02:00
|
|
|
self.max_mau_value = 0
|
2018-08-01 12:46:59 +02:00
|
|
|
if self.limit_usage_by_mau:
|
|
|
|
self.max_mau_value = config.get(
|
|
|
|
"max_mau_value", 0,
|
|
|
|
)
|
2018-11-15 19:08:27 +01:00
|
|
|
self.mau_stats_only = config.get("mau_stats_only", False)
|
2018-08-23 20:17:08 +02:00
|
|
|
|
2018-08-06 23:55:05 +02:00
|
|
|
self.mau_limits_reserved_threepids = config.get(
|
2018-08-07 18:49:43 +02:00
|
|
|
"mau_limit_reserved_threepids", []
|
2018-08-06 23:55:05 +02:00
|
|
|
)
|
2018-08-03 15:59:17 +02:00
|
|
|
|
2018-08-23 20:17:08 +02:00
|
|
|
self.mau_trial_days = config.get(
|
|
|
|
"mau_trial_days", 0,
|
|
|
|
)
|
|
|
|
|
2018-08-04 23:07:04 +02:00
|
|
|
# Options to disable HS
|
|
|
|
self.hs_disabled = config.get("hs_disabled", False)
|
|
|
|
self.hs_disabled_message = config.get("hs_disabled_message", "")
|
2018-08-16 19:02:02 +02:00
|
|
|
self.hs_disabled_limit_type = config.get("hs_disabled_limit_type", "")
|
2018-08-04 23:07:04 +02:00
|
|
|
|
2018-08-15 12:41:18 +02:00
|
|
|
# Admin uri to direct users at should their instance become blocked
|
2018-08-13 19:00:23 +02:00
|
|
|
# due to resource constraints
|
2018-08-24 17:51:27 +02:00
|
|
|
self.admin_contact = config.get("admin_contact", None)
|
2018-08-13 19:00:23 +02:00
|
|
|
|
2018-01-22 19:11:18 +01:00
|
|
|
# FIXME: federation_domain_whitelist needs sytests
|
|
|
|
self.federation_domain_whitelist = None
|
|
|
|
federation_domain_whitelist = config.get(
|
|
|
|
"federation_domain_whitelist", None
|
|
|
|
)
|
|
|
|
# turn the whitelist into a hash for speed of lookup
|
|
|
|
if federation_domain_whitelist is not None:
|
|
|
|
self.federation_domain_whitelist = {}
|
|
|
|
for domain in federation_domain_whitelist:
|
|
|
|
self.federation_domain_whitelist[domain] = True
|
|
|
|
|
2016-04-27 16:09:55 +02:00
|
|
|
if self.public_baseurl is not None:
|
|
|
|
if self.public_baseurl[-1] != '/':
|
|
|
|
self.public_baseurl += '/'
|
2016-04-21 18:21:02 +02:00
|
|
|
self.start_pushers = config.get("start_pushers", True)
|
2015-06-12 16:33:07 +02:00
|
|
|
|
|
|
|
self.listeners = config.get("listeners", [])
|
|
|
|
|
2017-01-10 18:21:41 +01:00
|
|
|
for listener in self.listeners:
|
2017-01-10 18:23:18 +01:00
|
|
|
bind_address = listener.pop("bind_address", None)
|
2017-01-10 18:21:41 +01:00
|
|
|
bind_addresses = listener.setdefault("bind_addresses", [])
|
|
|
|
|
|
|
|
if bind_address:
|
|
|
|
bind_addresses.append(bind_address)
|
|
|
|
elif not bind_addresses:
|
|
|
|
bind_addresses.append('')
|
|
|
|
|
2016-06-16 12:06:12 +02:00
|
|
|
self.gc_thresholds = read_gc_thresholds(config.get("gc_thresholds", None))
|
2016-06-07 16:45:56 +02:00
|
|
|
|
2015-06-12 16:33:07 +02:00
|
|
|
bind_port = config.get("bind_port")
|
|
|
|
if bind_port:
|
|
|
|
self.listeners = []
|
|
|
|
bind_host = config.get("bind_host", "")
|
|
|
|
gzip_responses = config.get("gzip_responses", True)
|
|
|
|
|
2015-06-12 18:41:36 +02:00
|
|
|
names = ["client", "webclient"] if self.web_client else ["client"]
|
|
|
|
|
2015-06-12 16:33:07 +02:00
|
|
|
self.listeners.append({
|
|
|
|
"port": bind_port,
|
2017-01-10 18:21:41 +01:00
|
|
|
"bind_addresses": [bind_host],
|
2015-06-12 16:33:07 +02:00
|
|
|
"tls": True,
|
|
|
|
"type": "http",
|
|
|
|
"resources": [
|
|
|
|
{
|
2015-06-12 18:41:36 +02:00
|
|
|
"names": names,
|
2015-06-12 16:33:07 +02:00
|
|
|
"compress": gzip_responses,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"names": ["federation"],
|
|
|
|
"compress": False,
|
|
|
|
}
|
|
|
|
]
|
|
|
|
})
|
|
|
|
|
|
|
|
unsecure_port = config.get("unsecure_port", bind_port - 400)
|
|
|
|
if unsecure_port:
|
|
|
|
self.listeners.append({
|
|
|
|
"port": unsecure_port,
|
2017-01-10 18:21:41 +01:00
|
|
|
"bind_addresses": [bind_host],
|
2015-06-12 16:33:07 +02:00
|
|
|
"tls": False,
|
|
|
|
"type": "http",
|
|
|
|
"resources": [
|
|
|
|
{
|
2015-06-12 18:41:36 +02:00
|
|
|
"names": names,
|
2015-06-12 16:33:07 +02:00
|
|
|
"compress": gzip_responses,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"names": ["federation"],
|
|
|
|
"compress": False,
|
|
|
|
}
|
|
|
|
]
|
|
|
|
})
|
2015-04-30 05:24:44 +02:00
|
|
|
|
2015-06-12 18:41:36 +02:00
|
|
|
manhole = config.get("manhole")
|
|
|
|
if manhole:
|
|
|
|
self.listeners.append({
|
|
|
|
"port": manhole,
|
2017-01-10 18:21:41 +01:00
|
|
|
"bind_addresses": ["127.0.0.1"],
|
2015-06-12 18:41:36 +02:00
|
|
|
"type": "manhole",
|
|
|
|
})
|
|
|
|
|
|
|
|
metrics_port = config.get("metrics_port")
|
|
|
|
if metrics_port:
|
2018-05-31 11:04:50 +02:00
|
|
|
logger.warn(
|
|
|
|
("The metrics_port configuration option is deprecated in Synapse 0.31 "
|
|
|
|
"in favour of a listener. Please see "
|
|
|
|
"http://github.com/matrix-org/synapse/blob/master/docs/metrics-howto.rst"
|
|
|
|
" on how to configure the new listener."))
|
|
|
|
|
2015-06-12 18:41:36 +02:00
|
|
|
self.listeners.append({
|
|
|
|
"port": metrics_port,
|
2017-01-10 18:21:41 +01:00
|
|
|
"bind_addresses": [config.get("metrics_bind_host", "127.0.0.1")],
|
2015-06-12 18:41:36 +02:00
|
|
|
"tls": False,
|
|
|
|
"type": "http",
|
|
|
|
"resources": [
|
|
|
|
{
|
|
|
|
"names": ["metrics"],
|
|
|
|
"compress": False,
|
|
|
|
},
|
|
|
|
]
|
|
|
|
})
|
|
|
|
|
2015-09-22 13:57:40 +02:00
|
|
|
def default_config(self, server_name, **kwargs):
|
2018-07-04 19:15:03 +02:00
|
|
|
_, bind_port = parse_and_validate_server_name(server_name)
|
|
|
|
if bind_port is not None:
|
2015-04-30 05:24:44 +02:00
|
|
|
unsecure_port = bind_port - 400
|
|
|
|
else:
|
|
|
|
bind_port = 8448
|
|
|
|
unsecure_port = 8008
|
|
|
|
|
|
|
|
pid_file = self.abspath("homeserver.pid")
|
|
|
|
return """\
|
|
|
|
## Server ##
|
|
|
|
|
|
|
|
# The domain name of the server, with optional explicit port.
|
|
|
|
# This is used by remote servers to connect to this server,
|
|
|
|
# e.g. matrix.org, localhost:8080, etc.
|
2015-12-02 00:37:55 +01:00
|
|
|
# This is also the last part of your UserID.
|
2015-04-30 05:24:44 +02:00
|
|
|
server_name: "%(server_name)s"
|
|
|
|
|
|
|
|
# When running as a daemon, the file to store the pid in
|
|
|
|
pid_file: %(pid_file)s
|
|
|
|
|
2017-08-16 15:57:35 +02:00
|
|
|
# CPU affinity mask. Setting this restricts the CPUs on which the
|
|
|
|
# process will be scheduled. It is represented as a bitmask, with the
|
|
|
|
# lowest order bit corresponding to the first logical CPU and the
|
|
|
|
# highest order bit corresponding to the last logical CPU. Not all CPUs
|
|
|
|
# may exist on a given system but a mask may specify more CPUs than are
|
|
|
|
# present.
|
2017-08-15 19:27:42 +02:00
|
|
|
#
|
2017-08-15 18:08:28 +02:00
|
|
|
# For example:
|
|
|
|
# 0x00000001 is processor #0,
|
|
|
|
# 0x00000003 is processors #0 and #1,
|
|
|
|
# 0xFFFFFFFF is all processors (#0 through #31).
|
2017-08-15 19:27:42 +02:00
|
|
|
#
|
2017-08-16 15:57:35 +02:00
|
|
|
# Pinning a Python process to a single CPU is desirable, because Python
|
|
|
|
# is inherently single-threaded due to the GIL, and can suffer a
|
|
|
|
# 30-40%% slowdown due to cache blow-out and thread context switching
|
|
|
|
# if the scheduler happens to schedule the underlying threads across
|
|
|
|
# different cores. See
|
|
|
|
# https://www.mirantis.com/blog/improve-performance-python-programs-restricting-single-cpu/.
|
2017-08-15 19:27:42 +02:00
|
|
|
#
|
2018-06-09 22:50:29 +02:00
|
|
|
# This setting requires the affinity package to be installed!
|
|
|
|
#
|
2017-08-15 18:08:28 +02:00
|
|
|
# cpu_affinity: 0xFFFFFFFF
|
|
|
|
|
2015-04-30 05:24:44 +02:00
|
|
|
# Whether to serve a web client from the HTTP/HTTPS root resource.
|
|
|
|
web_client: True
|
|
|
|
|
2017-04-17 07:44:05 +02:00
|
|
|
# The root directory to server for the above web client.
|
|
|
|
# If left undefined, synapse will serve the matrix-angular-sdk web client.
|
|
|
|
# Make sure matrix-angular-sdk is installed with pip if web_client is True
|
|
|
|
# and web_client_location is undefined
|
|
|
|
# web_client_location: "/path/to/web/root"
|
|
|
|
|
2016-04-29 15:30:15 +02:00
|
|
|
# The public-facing base URL for the client API (not including _matrix/...)
|
|
|
|
# public_baseurl: https://example.com:8448/
|
2016-04-27 16:09:55 +02:00
|
|
|
|
2015-04-30 05:24:44 +02:00
|
|
|
# Set the soft limit on the number of file descriptors synapse can use
|
|
|
|
# Zero is used to indicate synapse should set the soft limit to the
|
|
|
|
# hard limit.
|
|
|
|
soft_file_limit: 0
|
|
|
|
|
2018-08-17 17:08:45 +02:00
|
|
|
# Set to false to disable presence tracking on this homeserver.
|
|
|
|
use_presence: true
|
|
|
|
|
2016-06-07 16:45:56 +02:00
|
|
|
# The GC threshold parameters to pass to `gc.set_threshold`, if defined
|
|
|
|
# gc_thresholds: [700, 10, 10]
|
|
|
|
|
2017-05-13 18:17:54 +02:00
|
|
|
# Set the limit on the returned events in the timeline in the get
|
|
|
|
# and sync operations. The default value is -1, means no upper limit.
|
|
|
|
# filter_timeline_limit: 5000
|
|
|
|
|
2017-09-19 17:08:14 +02:00
|
|
|
# Whether room invites to users on this server should be blocked
|
|
|
|
# (except those sent by local server admins). The default is False.
|
|
|
|
# block_non_admin_invites: True
|
|
|
|
|
2018-01-22 19:11:18 +01:00
|
|
|
# Restrict federation to the following whitelist of domains.
|
|
|
|
# N.B. we recommend also firewalling your federation listener to limit
|
|
|
|
# inbound federation traffic as early as possible, rather than relying
|
|
|
|
# purely on this application-layer restriction. If not specified, the
|
|
|
|
# default is to whitelist everything.
|
|
|
|
#
|
|
|
|
# federation_domain_whitelist:
|
|
|
|
# - lon.example.com
|
|
|
|
# - nyc.example.com
|
|
|
|
# - syd.example.com
|
|
|
|
|
2015-06-15 12:25:53 +02:00
|
|
|
# List of ports that Synapse should listen on, their purpose and their
|
|
|
|
# configuration.
|
2015-06-11 16:48:52 +02:00
|
|
|
listeners:
|
2015-06-15 12:25:53 +02:00
|
|
|
# Main HTTPS listener
|
|
|
|
# For when matrix traffic is sent directly to synapse.
|
|
|
|
-
|
|
|
|
# The port to listen for HTTPS requests on.
|
|
|
|
port: %(bind_port)s
|
|
|
|
|
2016-12-18 20:54:22 +01:00
|
|
|
# Local addresses to listen on.
|
2017-09-02 17:26:40 +02:00
|
|
|
# On Linux and Mac OS, `::` will listen on all IPv4 and IPv6
|
2017-05-18 15:35:36 +02:00
|
|
|
# addresses by default. For most other OSes, this will only listen
|
|
|
|
# on IPv6.
|
2016-12-18 20:54:22 +01:00
|
|
|
bind_addresses:
|
2017-05-18 15:35:36 +02:00
|
|
|
- '::'
|
2017-09-02 17:26:40 +02:00
|
|
|
- '0.0.0.0'
|
2015-06-15 12:25:53 +02:00
|
|
|
|
|
|
|
# This is a 'http' listener, allows us to specify 'resources'.
|
2015-06-12 16:33:07 +02:00
|
|
|
type: http
|
|
|
|
|
2015-06-15 12:25:53 +02:00
|
|
|
tls: true
|
|
|
|
|
|
|
|
# Use the X-Forwarded-For (XFF) header as the client IP and not the
|
|
|
|
# actual client IP.
|
|
|
|
x_forwarded: false
|
|
|
|
|
|
|
|
# List of HTTP resources to serve on this listener.
|
2015-06-12 16:33:07 +02:00
|
|
|
resources:
|
2015-06-15 12:25:53 +02:00
|
|
|
-
|
|
|
|
# List of resources to host on this listener.
|
|
|
|
names:
|
|
|
|
- client # The client-server APIs, both v1 and v2
|
|
|
|
- webclient # The bundled webclient.
|
|
|
|
|
|
|
|
# Should synapse compress HTTP responses to clients that support it?
|
|
|
|
# This should be disabled if running synapse behind a load balancer
|
|
|
|
# that can do automatic compression.
|
2015-06-12 16:33:07 +02:00
|
|
|
compress: true
|
2015-06-15 12:25:53 +02:00
|
|
|
|
|
|
|
- names: [federation] # Federation APIs
|
2015-06-12 16:33:07 +02:00
|
|
|
compress: false
|
|
|
|
|
2017-11-02 15:18:24 +01:00
|
|
|
# optional list of additional endpoints which can be loaded via
|
|
|
|
# dynamic modules
|
|
|
|
# additional_resources:
|
|
|
|
# "/_matrix/my/custom/endpoint":
|
|
|
|
# module: my_module.CustomRequestHandler
|
|
|
|
# config: {}
|
|
|
|
|
2015-06-15 12:25:53 +02:00
|
|
|
# Unsecure HTTP listener,
|
|
|
|
# For when matrix traffic passes through loadbalancer that unwraps TLS.
|
2015-06-15 12:27:29 +02:00
|
|
|
- port: %(unsecure_port)s
|
2015-06-15 12:25:53 +02:00
|
|
|
tls: false
|
2017-09-02 17:26:40 +02:00
|
|
|
bind_addresses: ['::', '0.0.0.0']
|
2015-06-12 16:33:07 +02:00
|
|
|
type: http
|
|
|
|
|
2015-06-15 12:25:53 +02:00
|
|
|
x_forwarded: false
|
2015-06-12 18:13:23 +02:00
|
|
|
|
2015-06-12 16:33:07 +02:00
|
|
|
resources:
|
|
|
|
- names: [client, webclient]
|
|
|
|
compress: true
|
|
|
|
- names: [federation]
|
|
|
|
compress: false
|
2015-06-15 12:25:53 +02:00
|
|
|
|
2016-01-07 15:02:57 +01:00
|
|
|
# Turn on the twisted ssh manhole service on localhost on the given
|
2015-06-15 12:25:53 +02:00
|
|
|
# port.
|
|
|
|
# - port: 9000
|
2017-05-18 15:35:36 +02:00
|
|
|
# bind_addresses: ['::1', '127.0.0.1']
|
2015-06-15 12:25:53 +02:00
|
|
|
# type: manhole
|
2018-08-17 14:58:25 +02:00
|
|
|
|
|
|
|
|
|
|
|
# Homeserver blocking
|
|
|
|
#
|
|
|
|
# How to reach the server admin, used in ResourceLimitError
|
2018-08-24 17:51:27 +02:00
|
|
|
# admin_contact: 'mailto:admin@server.com'
|
2018-08-17 14:58:25 +02:00
|
|
|
#
|
|
|
|
# Global block config
|
|
|
|
#
|
|
|
|
# hs_disabled: False
|
|
|
|
# hs_disabled_message: 'Human readable reason for why the HS is blocked'
|
|
|
|
# hs_disabled_limit_type: 'error code(str), to help clients decode reason'
|
|
|
|
#
|
|
|
|
# Monthly Active User Blocking
|
|
|
|
#
|
|
|
|
# Enables monthly active user checking
|
|
|
|
# limit_usage_by_mau: False
|
|
|
|
# max_mau_value: 50
|
2018-08-23 20:17:08 +02:00
|
|
|
# mau_trial_days: 2
|
2018-08-17 14:58:25 +02:00
|
|
|
#
|
2018-11-15 19:08:27 +01:00
|
|
|
# If enabled, the metrics for the number of monthly active users will
|
|
|
|
# be populated, however no one will be limited. If limit_usage_by_mau
|
|
|
|
# is true, this is implied to be true.
|
|
|
|
# mau_stats_only: False
|
|
|
|
#
|
2018-08-17 14:58:25 +02:00
|
|
|
# Sometimes the server admin will want to ensure certain accounts are
|
|
|
|
# never blocked by mau checking. These accounts are specified here.
|
|
|
|
#
|
|
|
|
# mau_limit_reserved_threepids:
|
|
|
|
# - medium: 'email'
|
|
|
|
# address: 'reserved_user@example.com'
|
2018-12-04 12:01:02 +01:00
|
|
|
#
|
|
|
|
# Room searching
|
|
|
|
#
|
|
|
|
# If disabled, new messages will not be indexed for searching and users
|
|
|
|
# will receive errors when searching for messages. Defaults to enabled.
|
|
|
|
# enable_search: true
|
2015-04-30 05:24:44 +02:00
|
|
|
""" % locals()
|
|
|
|
|
|
|
|
def read_arguments(self, args):
|
|
|
|
if args.manhole is not None:
|
|
|
|
self.manhole = args.manhole
|
2015-05-01 15:34:48 +02:00
|
|
|
if args.daemonize is not None:
|
|
|
|
self.daemonize = args.daemonize
|
2015-08-07 17:36:42 +02:00
|
|
|
if args.print_pidfile is not None:
|
|
|
|
self.print_pidfile = args.print_pidfile
|
2014-09-03 12:57:23 +02:00
|
|
|
|
2015-04-30 05:24:44 +02:00
|
|
|
def add_arguments(self, parser):
|
2014-08-31 17:06:39 +02:00
|
|
|
server_group = parser.add_argument_group("server")
|
|
|
|
server_group.add_argument("-D", "--daemonize", action='store_true',
|
2015-05-01 15:34:48 +02:00
|
|
|
default=None,
|
2014-08-31 17:06:39 +02:00
|
|
|
help="Daemonize the home server")
|
2015-08-07 17:36:42 +02:00
|
|
|
server_group.add_argument("--print-pidfile", action='store_true',
|
|
|
|
default=None,
|
|
|
|
help="Print the path to the pidfile just"
|
|
|
|
" before daemonizing")
|
2014-09-01 23:11:08 +02:00
|
|
|
server_group.add_argument("--manhole", metavar="PORT", dest="manhole",
|
|
|
|
type=int,
|
2014-08-31 17:06:39 +02:00
|
|
|
help="Turn on the twisted telnet manhole"
|
|
|
|
" service on the given port.")
|
2016-06-16 12:06:12 +02:00
|
|
|
|
|
|
|
|
2018-08-31 18:11:11 +02:00
|
|
|
def is_threepid_reserved(config, threepid):
|
|
|
|
"""Check the threepid against the reserved threepid config
|
|
|
|
Args:
|
|
|
|
config(ServerConfig) - to access server config attributes
|
|
|
|
threepid(dict) - The threepid to test for
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
boolean Is the threepid undertest reserved_user
|
|
|
|
"""
|
|
|
|
|
|
|
|
for tp in config.mau_limits_reserved_threepids:
|
|
|
|
if (threepid['medium'] == tp['medium']
|
|
|
|
and threepid['address'] == tp['address']):
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
2016-06-16 12:06:12 +02:00
|
|
|
def read_gc_thresholds(thresholds):
|
|
|
|
"""Reads the three integer thresholds for garbage collection. Ensures that
|
|
|
|
the thresholds are integers if thresholds are supplied.
|
|
|
|
"""
|
|
|
|
if thresholds is None:
|
|
|
|
return None
|
|
|
|
try:
|
|
|
|
assert len(thresholds) == 3
|
|
|
|
return (
|
|
|
|
int(thresholds[0]), int(thresholds[1]), int(thresholds[2]),
|
|
|
|
)
|
2017-10-23 16:52:32 +02:00
|
|
|
except Exception:
|
2016-06-16 12:06:12 +02:00
|
|
|
raise ConfigError(
|
|
|
|
"Value of `gc_threshold` must be a list of three integers if set"
|
|
|
|
)
|