2021-03-25 17:53:54 +01:00
|
|
|
#!/usr/bin/env bash
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
DIR="$( cd "$( dirname "$0" )" && pwd )"
|
|
|
|
|
|
|
|
CWD=$(pwd)
|
|
|
|
|
|
|
|
cd "$DIR/.."
|
|
|
|
|
2014-09-01 16:51:15 +02:00
|
|
|
mkdir -p demo/etc
|
|
|
|
|
2015-04-30 05:24:44 +02:00
|
|
|
export PYTHONPATH=$(readlink -f $(pwd))
|
|
|
|
|
|
|
|
|
|
|
|
echo $PYTHONPATH
|
|
|
|
|
2014-08-26 14:43:55 +02:00
|
|
|
for port in 8080 8081 8082; do
|
2014-08-12 16:10:52 +02:00
|
|
|
echo "Starting server on port $port... "
|
|
|
|
|
2014-09-02 11:51:42 +02:00
|
|
|
https_port=$((port + 400))
|
2015-04-30 05:24:44 +02:00
|
|
|
mkdir -p demo/$port
|
2015-04-30 17:52:57 +02:00
|
|
|
pushd demo/$port
|
2014-09-02 11:51:42 +02:00
|
|
|
|
2015-04-30 17:04:02 +02:00
|
|
|
#rm $DIR/etc/$port.config
|
2019-06-14 14:03:46 +02:00
|
|
|
python3 -m synapse.app.homeserver \
|
2015-04-30 14:48:15 +02:00
|
|
|
--generate-config \
|
|
|
|
-H "localhost:$https_port" \
|
2015-04-30 05:24:44 +02:00
|
|
|
--config-path "$DIR/etc/$port.config" \
|
2015-09-23 10:55:24 +02:00
|
|
|
--report-stats no
|
2014-09-01 16:51:15 +02:00
|
|
|
|
2019-06-17 17:24:28 +02:00
|
|
|
if ! grep -F "Customisation made by demo/start.sh" -q $DIR/etc/$port.config; then
|
|
|
|
printf '\n\n# Customisation made by demo/start.sh\n' >> $DIR/etc/$port.config
|
2019-07-22 12:31:05 +02:00
|
|
|
|
2020-10-02 13:24:07 +02:00
|
|
|
echo "public_baseurl: http://localhost:$port/" >> $DIR/etc/$port.config
|
|
|
|
|
2019-06-17 17:24:28 +02:00
|
|
|
echo 'enable_registration: true' >> $DIR/etc/$port.config
|
|
|
|
|
|
|
|
# Warning, this heredoc depends on the interaction of tabs and spaces. Please don't
|
|
|
|
# accidentaly bork me with your fancy settings.
|
|
|
|
listeners=$(cat <<-PORTLISTENERS
|
|
|
|
# Configure server to listen on both $https_port and $port
|
|
|
|
# This overides some of the default settings above
|
|
|
|
listeners:
|
|
|
|
- port: $https_port
|
|
|
|
type: http
|
|
|
|
tls: true
|
|
|
|
resources:
|
|
|
|
- names: [client, federation]
|
2019-07-22 12:31:05 +02:00
|
|
|
|
2019-06-17 17:24:28 +02:00
|
|
|
- port: $port
|
|
|
|
tls: false
|
|
|
|
bind_addresses: ['::1', '127.0.0.1']
|
|
|
|
type: http
|
|
|
|
x_forwarded: true
|
|
|
|
resources:
|
|
|
|
- names: [client, federation]
|
|
|
|
compress: false
|
|
|
|
PORTLISTENERS
|
|
|
|
)
|
|
|
|
echo "${listeners}" >> $DIR/etc/$port.config
|
|
|
|
|
|
|
|
# Disable tls for the servers
|
|
|
|
printf '\n\n# Disable tls on the servers.' >> $DIR/etc/$port.config
|
|
|
|
echo '# DO NOT USE IN PRODUCTION' >> $DIR/etc/$port.config
|
|
|
|
echo 'use_insecure_ssl_client_just_for_testing_do_not_use: true' >> $DIR/etc/$port.config
|
|
|
|
echo 'federation_verify_certificates: false' >> $DIR/etc/$port.config
|
|
|
|
|
|
|
|
# Set tls paths
|
|
|
|
echo "tls_certificate_path: \"$DIR/etc/localhost:$https_port.tls.crt\"" >> $DIR/etc/$port.config
|
|
|
|
echo "tls_private_key_path: \"$DIR/etc/localhost:$https_port.tls.key\"" >> $DIR/etc/$port.config
|
|
|
|
|
|
|
|
# Generate tls keys
|
|
|
|
openssl req -x509 -newkey rsa:4096 -keyout $DIR/etc/localhost\:$https_port.tls.key -out $DIR/etc/localhost\:$https_port.tls.crt -days 365 -nodes -subj "/O=matrix"
|
2019-07-22 12:31:05 +02:00
|
|
|
|
2019-06-17 17:24:28 +02:00
|
|
|
# Ignore keys from the trusted keys server
|
|
|
|
echo '# Ignore keys from the trusted keys server' >> $DIR/etc/$port.config
|
|
|
|
echo 'trusted_key_servers:' >> $DIR/etc/$port.config
|
|
|
|
echo ' - server_name: "matrix.org"' >> $DIR/etc/$port.config
|
|
|
|
echo ' accept_keys_insecurely: true' >> $DIR/etc/$port.config
|
|
|
|
|
|
|
|
# Reduce the blacklist
|
|
|
|
blacklist=$(cat <<-BLACK
|
2019-10-22 14:52:25 +02:00
|
|
|
# Set the blacklist so that it doesn't include 127.0.0.1, ::1
|
2019-06-17 17:24:28 +02:00
|
|
|
federation_ip_range_blacklist:
|
|
|
|
- '10.0.0.0/8'
|
|
|
|
- '172.16.0.0/12'
|
|
|
|
- '192.168.0.0/16'
|
|
|
|
- '100.64.0.0/10'
|
|
|
|
- '169.254.0.0/16'
|
|
|
|
- 'fe80::/64'
|
|
|
|
- 'fc00::/7'
|
|
|
|
BLACK
|
|
|
|
)
|
|
|
|
echo "${blacklist}" >> $DIR/etc/$port.config
|
|
|
|
fi
|
2019-04-01 14:16:24 +02:00
|
|
|
|
2015-06-04 17:58:17 +02:00
|
|
|
# Check script parameters
|
|
|
|
if [ $# -eq 1 ]; then
|
|
|
|
if [ $1 = "--no-rate-limit" ]; then
|
2021-04-22 18:49:42 +02:00
|
|
|
|
|
|
|
# Disable any rate limiting
|
|
|
|
ratelimiting=$(cat <<-RC
|
|
|
|
rc_message:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
rc_registration:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
rc_login:
|
|
|
|
address:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
account:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
failed_attempts:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
rc_admin_redaction:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
rc_joins:
|
|
|
|
local:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
remote:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
rc_3pid_validation:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
rc_invites:
|
|
|
|
per_room:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
per_user:
|
|
|
|
per_second: 1000
|
|
|
|
burst_count: 1000
|
|
|
|
RC
|
|
|
|
)
|
|
|
|
echo "${ratelimiting}" >> $DIR/etc/$port.config
|
2015-06-04 17:58:17 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2015-10-22 11:43:35 +02:00
|
|
|
if ! grep -F "full_twisted_stacktraces" -q $DIR/etc/$port.config; then
|
|
|
|
echo "full_twisted_stacktraces: true" >> $DIR/etc/$port.config
|
|
|
|
fi
|
|
|
|
if ! grep -F "report_stats" -q $DIR/etc/$port.config ; then
|
|
|
|
echo "report_stats: false" >> $DIR/etc/$port.config
|
|
|
|
fi
|
2015-10-13 19:00:02 +02:00
|
|
|
|
2019-06-14 14:03:46 +02:00
|
|
|
python3 -m synapse.app.homeserver \
|
2015-04-30 05:24:44 +02:00
|
|
|
--config-path "$DIR/etc/$port.config" \
|
|
|
|
-D \
|
2014-09-01 16:51:15 +02:00
|
|
|
|
2015-04-30 17:52:57 +02:00
|
|
|
popd
|
2014-08-12 16:10:52 +02:00
|
|
|
done
|
|
|
|
|
|
|
|
cd "$CWD"
|