588 lines
		
	
	
		
			22 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			588 lines
		
	
	
		
			22 KiB
		
	
	
	
		
			Python
		
	
	
| # -*- coding: utf-8 -*-
 | |
| # Copyright 2014-2016 OpenMarket Ltd
 | |
| # Copyright 2017-2018 New Vector Ltd
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License");
 | |
| # you may not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| #     http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS,
 | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| 
 | |
| import logging
 | |
| import os.path
 | |
| 
 | |
| from synapse.http.endpoint import parse_and_validate_server_name
 | |
| from synapse.python_dependencies import DependencyException, check_requirements
 | |
| 
 | |
| from ._base import Config, ConfigError
 | |
| 
 | |
| logger = logging.Logger(__name__)
 | |
| 
 | |
| # by default, we attempt to listen on both '::' *and* '0.0.0.0' because some OSes
 | |
| # (Windows, macOS, other BSD/Linux where net.ipv6.bindv6only is set) will only listen
 | |
| # on IPv6 when '::' is set.
 | |
| #
 | |
| # We later check for errors when binding to 0.0.0.0 and ignore them if :: is also in
 | |
| # in the list.
 | |
| DEFAULT_BIND_ADDRESSES = ['::', '0.0.0.0']
 | |
| 
 | |
| 
 | |
| class ServerConfig(Config):
 | |
| 
 | |
|     def read_config(self, config):
 | |
|         self.server_name = config["server_name"]
 | |
| 
 | |
|         try:
 | |
|             parse_and_validate_server_name(self.server_name)
 | |
|         except ValueError as e:
 | |
|             raise ConfigError(str(e))
 | |
| 
 | |
|         self.pid_file = self.abspath(config.get("pid_file"))
 | |
|         self.web_client_location = config.get("web_client_location", None)
 | |
|         self.soft_file_limit = config["soft_file_limit"]
 | |
|         self.daemonize = config.get("daemonize")
 | |
|         self.print_pidfile = config.get("print_pidfile")
 | |
|         self.user_agent_suffix = config.get("user_agent_suffix")
 | |
|         self.use_frozen_dicts = config.get("use_frozen_dicts", False)
 | |
|         self.public_baseurl = config.get("public_baseurl")
 | |
|         self.cpu_affinity = config.get("cpu_affinity")
 | |
| 
 | |
|         # Whether to send federation traffic out in this process. This only
 | |
|         # applies to some federation traffic, and so shouldn't be used to
 | |
|         # "disable" federation
 | |
|         self.send_federation = config.get("send_federation", True)
 | |
| 
 | |
|         # Whether to enable user presence.
 | |
|         self.use_presence = config.get("use_presence", True)
 | |
| 
 | |
|         # Whether to update the user directory or not. This should be set to
 | |
|         # false only if we are updating the user directory in a worker
 | |
|         self.update_user_directory = config.get("update_user_directory", True)
 | |
| 
 | |
|         # whether to enable the media repository endpoints. This should be set
 | |
|         # to false if the media repository is running as a separate endpoint;
 | |
|         # doing so ensures that we will not run cache cleanup jobs on the
 | |
|         # master, potentially causing inconsistency.
 | |
|         self.enable_media_repo = config.get("enable_media_repo", True)
 | |
| 
 | |
|         # whether to enable search. If disabled, new entries will not be inserted
 | |
|         # into the search tables and they will not be indexed. Users will receive
 | |
|         # errors when attempting to search for messages.
 | |
|         self.enable_search = config.get("enable_search", True)
 | |
| 
 | |
|         self.filter_timeline_limit = config.get("filter_timeline_limit", -1)
 | |
| 
 | |
|         # Whether we should block invites sent to users on this server
 | |
|         # (other than those sent by local server admins)
 | |
|         self.block_non_admin_invites = config.get(
 | |
|             "block_non_admin_invites", False,
 | |
|         )
 | |
| 
 | |
|         # Options to control access by tracking MAU
 | |
|         self.limit_usage_by_mau = config.get("limit_usage_by_mau", False)
 | |
|         self.max_mau_value = 0
 | |
|         if self.limit_usage_by_mau:
 | |
|             self.max_mau_value = config.get(
 | |
|                 "max_mau_value", 0,
 | |
|             )
 | |
|         self.mau_stats_only = config.get("mau_stats_only", False)
 | |
| 
 | |
|         self.mau_limits_reserved_threepids = config.get(
 | |
|             "mau_limit_reserved_threepids", []
 | |
|         )
 | |
| 
 | |
|         self.mau_trial_days = config.get(
 | |
|             "mau_trial_days", 0,
 | |
|         )
 | |
| 
 | |
|         # Options to disable HS
 | |
|         self.hs_disabled = config.get("hs_disabled", False)
 | |
|         self.hs_disabled_message = config.get("hs_disabled_message", "")
 | |
|         self.hs_disabled_limit_type = config.get("hs_disabled_limit_type", "")
 | |
| 
 | |
|         # Admin uri to direct users at should their instance become blocked
 | |
|         # due to resource constraints
 | |
|         self.admin_contact = config.get("admin_contact", None)
 | |
| 
 | |
|         # FIXME: federation_domain_whitelist needs sytests
 | |
|         self.federation_domain_whitelist = None
 | |
|         federation_domain_whitelist = config.get(
 | |
|             "federation_domain_whitelist", None
 | |
|         )
 | |
|         # turn the whitelist into a hash for speed of lookup
 | |
|         if federation_domain_whitelist is not None:
 | |
|             self.federation_domain_whitelist = {}
 | |
|             for domain in federation_domain_whitelist:
 | |
|                 self.federation_domain_whitelist[domain] = True
 | |
| 
 | |
|         if self.public_baseurl is not None:
 | |
|             if self.public_baseurl[-1] != '/':
 | |
|                 self.public_baseurl += '/'
 | |
|         self.start_pushers = config.get("start_pushers", True)
 | |
| 
 | |
|         self.listeners = []
 | |
|         for listener in config.get("listeners", []):
 | |
|             if not isinstance(listener.get("port", None), int):
 | |
|                 raise ConfigError(
 | |
|                     "Listener configuration is lacking a valid 'port' option"
 | |
|                 )
 | |
| 
 | |
|             if listener.setdefault("tls", False):
 | |
|                 # no_tls is not really supported any more, but let's grandfather it in
 | |
|                 # here.
 | |
|                 if config.get("no_tls", False):
 | |
|                     logger.info(
 | |
|                         "Ignoring TLS-enabled listener on port %i due to no_tls"
 | |
|                     )
 | |
|                     continue
 | |
| 
 | |
|             bind_address = listener.pop("bind_address", None)
 | |
|             bind_addresses = listener.setdefault("bind_addresses", [])
 | |
| 
 | |
|             # if bind_address was specified, add it to the list of addresses
 | |
|             if bind_address:
 | |
|                 bind_addresses.append(bind_address)
 | |
| 
 | |
|             # if we still have an empty list of addresses, use the default list
 | |
|             if not bind_addresses:
 | |
|                 if listener['type'] == 'metrics':
 | |
|                     # the metrics listener doesn't support IPv6
 | |
|                     bind_addresses.append('0.0.0.0')
 | |
|                 else:
 | |
|                     bind_addresses.extend(DEFAULT_BIND_ADDRESSES)
 | |
| 
 | |
|             self.listeners.append(listener)
 | |
| 
 | |
|         if not self.web_client_location:
 | |
|             _warn_if_webclient_configured(self.listeners)
 | |
| 
 | |
|         self.gc_thresholds = read_gc_thresholds(config.get("gc_thresholds", None))
 | |
| 
 | |
|         bind_port = config.get("bind_port")
 | |
|         if bind_port:
 | |
|             if config.get("no_tls", False):
 | |
|                 raise ConfigError("no_tls is incompatible with bind_port")
 | |
| 
 | |
|             self.listeners = []
 | |
|             bind_host = config.get("bind_host", "")
 | |
|             gzip_responses = config.get("gzip_responses", True)
 | |
| 
 | |
|             self.listeners.append({
 | |
|                 "port": bind_port,
 | |
|                 "bind_addresses": [bind_host],
 | |
|                 "tls": True,
 | |
|                 "type": "http",
 | |
|                 "resources": [
 | |
|                     {
 | |
|                         "names": ["client"],
 | |
|                         "compress": gzip_responses,
 | |
|                     },
 | |
|                     {
 | |
|                         "names": ["federation"],
 | |
|                         "compress": False,
 | |
|                     }
 | |
|                 ]
 | |
|             })
 | |
| 
 | |
|             unsecure_port = config.get("unsecure_port", bind_port - 400)
 | |
|             if unsecure_port:
 | |
|                 self.listeners.append({
 | |
|                     "port": unsecure_port,
 | |
|                     "bind_addresses": [bind_host],
 | |
|                     "tls": False,
 | |
|                     "type": "http",
 | |
|                     "resources": [
 | |
|                         {
 | |
|                             "names": ["client"],
 | |
|                             "compress": gzip_responses,
 | |
|                         },
 | |
|                         {
 | |
|                             "names": ["federation"],
 | |
|                             "compress": False,
 | |
|                         }
 | |
|                     ]
 | |
|                 })
 | |
| 
 | |
|         manhole = config.get("manhole")
 | |
|         if manhole:
 | |
|             self.listeners.append({
 | |
|                 "port": manhole,
 | |
|                 "bind_addresses": ["127.0.0.1"],
 | |
|                 "type": "manhole",
 | |
|                 "tls": False,
 | |
|             })
 | |
| 
 | |
|         metrics_port = config.get("metrics_port")
 | |
|         if metrics_port:
 | |
|             logger.warn(
 | |
|                 ("The metrics_port configuration option is deprecated in Synapse 0.31 "
 | |
|                  "in favour of a listener. Please see "
 | |
|                  "http://github.com/matrix-org/synapse/blob/master/docs/metrics-howto.rst"
 | |
|                  " on how to configure the new listener."))
 | |
| 
 | |
|             self.listeners.append({
 | |
|                 "port": metrics_port,
 | |
|                 "bind_addresses": [config.get("metrics_bind_host", "127.0.0.1")],
 | |
|                 "tls": False,
 | |
|                 "type": "http",
 | |
|                 "resources": [
 | |
|                     {
 | |
|                         "names": ["metrics"],
 | |
|                         "compress": False,
 | |
|                     },
 | |
|                 ]
 | |
|             })
 | |
| 
 | |
|         _check_resource_config(self.listeners)
 | |
| 
 | |
|     def has_tls_listener(self):
 | |
|         return any(l["tls"] for l in self.listeners)
 | |
| 
 | |
|     def default_config(self, server_name, data_dir_path, **kwargs):
 | |
|         _, bind_port = parse_and_validate_server_name(server_name)
 | |
|         if bind_port is not None:
 | |
|             unsecure_port = bind_port - 400
 | |
|         else:
 | |
|             bind_port = 8448
 | |
|             unsecure_port = 8008
 | |
| 
 | |
|         pid_file = os.path.join(data_dir_path, "homeserver.pid")
 | |
|         return """\
 | |
|         ## Server ##
 | |
| 
 | |
|         # The domain name of the server, with optional explicit port.
 | |
|         # This is used by remote servers to connect to this server,
 | |
|         # e.g. matrix.org, localhost:8080, etc.
 | |
|         # This is also the last part of your UserID.
 | |
|         #
 | |
|         server_name: "%(server_name)s"
 | |
| 
 | |
|         # When running as a daemon, the file to store the pid in
 | |
|         #
 | |
|         pid_file: %(pid_file)s
 | |
| 
 | |
|         # CPU affinity mask. Setting this restricts the CPUs on which the
 | |
|         # process will be scheduled. It is represented as a bitmask, with the
 | |
|         # lowest order bit corresponding to the first logical CPU and the
 | |
|         # highest order bit corresponding to the last logical CPU. Not all CPUs
 | |
|         # may exist on a given system but a mask may specify more CPUs than are
 | |
|         # present.
 | |
|         #
 | |
|         # For example:
 | |
|         #    0x00000001  is processor #0,
 | |
|         #    0x00000003  is processors #0 and #1,
 | |
|         #    0xFFFFFFFF  is all processors (#0 through #31).
 | |
|         #
 | |
|         # Pinning a Python process to a single CPU is desirable, because Python
 | |
|         # is inherently single-threaded due to the GIL, and can suffer a
 | |
|         # 30-40%% slowdown due to cache blow-out and thread context switching
 | |
|         # if the scheduler happens to schedule the underlying threads across
 | |
|         # different cores. See
 | |
|         # https://www.mirantis.com/blog/improve-performance-python-programs-restricting-single-cpu/.
 | |
|         #
 | |
|         # This setting requires the affinity package to be installed!
 | |
|         #
 | |
|         #cpu_affinity: 0xFFFFFFFF
 | |
| 
 | |
|         # The path to the web client which will be served at /_matrix/client/
 | |
|         # if 'webclient' is configured under the 'listeners' configuration.
 | |
|         #
 | |
|         #web_client_location: "/path/to/web/root"
 | |
| 
 | |
|         # The public-facing base URL that clients use to access this HS
 | |
|         # (not including _matrix/...). This is the same URL a user would
 | |
|         # enter into the 'custom HS URL' field on their client. If you
 | |
|         # use synapse with a reverse proxy, this should be the URL to reach
 | |
|         # synapse via the proxy.
 | |
|         #
 | |
|         #public_baseurl: https://example.com/
 | |
| 
 | |
|         # Set the soft limit on the number of file descriptors synapse can use
 | |
|         # Zero is used to indicate synapse should set the soft limit to the
 | |
|         # hard limit.
 | |
|         #
 | |
|         soft_file_limit: 0
 | |
| 
 | |
|         # Set to false to disable presence tracking on this homeserver.
 | |
|         #
 | |
|         use_presence: true
 | |
| 
 | |
|         # The GC threshold parameters to pass to `gc.set_threshold`, if defined
 | |
|         #
 | |
|         #gc_thresholds: [700, 10, 10]
 | |
| 
 | |
|         # Set the limit on the returned events in the timeline in the get
 | |
|         # and sync operations. The default value is -1, means no upper limit.
 | |
|         #
 | |
|         #filter_timeline_limit: 5000
 | |
| 
 | |
|         # Whether room invites to users on this server should be blocked
 | |
|         # (except those sent by local server admins). The default is False.
 | |
|         #
 | |
|         #block_non_admin_invites: True
 | |
| 
 | |
|         # Room searching
 | |
|         #
 | |
|         # If disabled, new messages will not be indexed for searching and users
 | |
|         # will receive errors when searching for messages. Defaults to enabled.
 | |
|         #
 | |
|         #enable_search: false
 | |
| 
 | |
|         # Restrict federation to the following whitelist of domains.
 | |
|         # N.B. we recommend also firewalling your federation listener to limit
 | |
|         # inbound federation traffic as early as possible, rather than relying
 | |
|         # purely on this application-layer restriction.  If not specified, the
 | |
|         # default is to whitelist everything.
 | |
|         #
 | |
|         #federation_domain_whitelist:
 | |
|         #  - lon.example.com
 | |
|         #  - nyc.example.com
 | |
|         #  - syd.example.com
 | |
| 
 | |
|         # List of ports that Synapse should listen on, their purpose and their
 | |
|         # configuration.
 | |
|         #
 | |
|         # Options for each listener include:
 | |
|         #
 | |
|         #   port: the TCP port to bind to
 | |
|         #
 | |
|         #   bind_addresses: a list of local addresses to listen on. The default is
 | |
|         #       'all local interfaces'.
 | |
|         #
 | |
|         #   type: the type of listener. Normally 'http', but other valid options are:
 | |
|         #       'manhole' (see docs/manhole.md),
 | |
|         #       'metrics' (see docs/metrics-howto.rst),
 | |
|         #       'replication' (see docs/workers.rst).
 | |
|         #
 | |
|         #   tls: set to true to enable TLS for this listener. Will use the TLS
 | |
|         #       key/cert specified in tls_private_key_path / tls_certificate_path.
 | |
|         #
 | |
|         #   x_forwarded: Only valid for an 'http' listener. Set to true to use the
 | |
|         #       X-Forwarded-For header as the client IP. Useful when Synapse is
 | |
|         #       behind a reverse-proxy.
 | |
|         #
 | |
|         #   resources: Only valid for an 'http' listener. A list of resources to host
 | |
|         #       on this port. Options for each resource are:
 | |
|         #
 | |
|         #       names: a list of names of HTTP resources. See below for a list of
 | |
|         #           valid resource names.
 | |
|         #
 | |
|         #       compress: set to true to enable HTTP comression for this resource.
 | |
|         #
 | |
|         #   additional_resources: Only valid for an 'http' listener. A map of
 | |
|         #        additional endpoints which should be loaded via dynamic modules.
 | |
|         #
 | |
|         # Valid resource names are:
 | |
|         #
 | |
|         #   client: the client-server API (/_matrix/client). Also implies 'media' and
 | |
|         #       'static'.
 | |
|         #
 | |
|         #   consent: user consent forms (/_matrix/consent). See
 | |
|         #       docs/consent_tracking.md.
 | |
|         #
 | |
|         #   federation: the server-server API (/_matrix/federation). Also implies
 | |
|         #       'media', 'keys', 'openid'
 | |
|         #
 | |
|         #   keys: the key discovery API (/_matrix/keys).
 | |
|         #
 | |
|         #   media: the media API (/_matrix/media).
 | |
|         #
 | |
|         #   metrics: the metrics interface. See docs/metrics-howto.rst.
 | |
|         #
 | |
|         #   openid: OpenID authentication.
 | |
|         #
 | |
|         #   replication: the HTTP replication API (/_synapse/replication). See
 | |
|         #       docs/workers.rst.
 | |
|         #
 | |
|         #   static: static resources under synapse/static (/_matrix/static). (Mostly
 | |
|         #       useful for 'fallback authentication'.)
 | |
|         #
 | |
|         #   webclient: A web client. Requires web_client_location to be set.
 | |
|         #
 | |
|         listeners:
 | |
|           # TLS-enabled listener: for when matrix traffic is sent directly to synapse.
 | |
|           #
 | |
|           # Disabled by default. To enable it, uncomment the following. (Note that you
 | |
|           # will also need to give Synapse a TLS key and certificate: see the TLS section
 | |
|           # below.)
 | |
|           #
 | |
|           #- port: %(bind_port)s
 | |
|           #  type: http
 | |
|           #  tls: true
 | |
|           #  resources:
 | |
|           #    - names: [client, federation]
 | |
| 
 | |
|           # Unsecure HTTP listener: for when matrix traffic passes through a reverse proxy
 | |
|           # that unwraps TLS.
 | |
|           #
 | |
|           # If you plan to use a reverse proxy, please see
 | |
|           # https://github.com/matrix-org/synapse/blob/master/docs/reverse_proxy.rst.
 | |
|           #
 | |
|           - port: %(unsecure_port)s
 | |
|             tls: false
 | |
|             bind_addresses: ['::1', '127.0.0.1']
 | |
|             type: http
 | |
|             x_forwarded: true
 | |
| 
 | |
|             resources:
 | |
|               - names: [client, federation]
 | |
|                 compress: false
 | |
| 
 | |
|             # example additonal_resources:
 | |
|             #
 | |
|             #additional_resources:
 | |
|             #  "/_matrix/my/custom/endpoint":
 | |
|             #    module: my_module.CustomRequestHandler
 | |
|             #    config: {}
 | |
| 
 | |
|           # Turn on the twisted ssh manhole service on localhost on the given
 | |
|           # port.
 | |
|           #
 | |
|           #- port: 9000
 | |
|           #  bind_addresses: ['::1', '127.0.0.1']
 | |
|           #  type: manhole
 | |
| 
 | |
| 
 | |
|         ## Homeserver blocking ##
 | |
| 
 | |
|         # How to reach the server admin, used in ResourceLimitError
 | |
|         #
 | |
|         #admin_contact: 'mailto:admin@server.com'
 | |
| 
 | |
|         # Global blocking
 | |
|         #
 | |
|         #hs_disabled: False
 | |
|         #hs_disabled_message: 'Human readable reason for why the HS is blocked'
 | |
|         #hs_disabled_limit_type: 'error code(str), to help clients decode reason'
 | |
| 
 | |
|         # Monthly Active User Blocking
 | |
|         #
 | |
|         #limit_usage_by_mau: False
 | |
|         #max_mau_value: 50
 | |
|         #mau_trial_days: 2
 | |
| 
 | |
|         # If enabled, the metrics for the number of monthly active users will
 | |
|         # be populated, however no one will be limited. If limit_usage_by_mau
 | |
|         # is true, this is implied to be true.
 | |
|         #
 | |
|         #mau_stats_only: False
 | |
| 
 | |
|         # Sometimes the server admin will want to ensure certain accounts are
 | |
|         # never blocked by mau checking. These accounts are specified here.
 | |
|         #
 | |
|         #mau_limit_reserved_threepids:
 | |
|         #  - medium: 'email'
 | |
|         #    address: 'reserved_user@example.com'
 | |
|         """ % locals()
 | |
| 
 | |
|     def read_arguments(self, args):
 | |
|         if args.manhole is not None:
 | |
|             self.manhole = args.manhole
 | |
|         if args.daemonize is not None:
 | |
|             self.daemonize = args.daemonize
 | |
|         if args.print_pidfile is not None:
 | |
|             self.print_pidfile = args.print_pidfile
 | |
| 
 | |
|     def add_arguments(self, parser):
 | |
|         server_group = parser.add_argument_group("server")
 | |
|         server_group.add_argument("-D", "--daemonize", action='store_true',
 | |
|                                   default=None,
 | |
|                                   help="Daemonize the home server")
 | |
|         server_group.add_argument("--print-pidfile", action='store_true',
 | |
|                                   default=None,
 | |
|                                   help="Print the path to the pidfile just"
 | |
|                                   " before daemonizing")
 | |
|         server_group.add_argument("--manhole", metavar="PORT", dest="manhole",
 | |
|                                   type=int,
 | |
|                                   help="Turn on the twisted telnet manhole"
 | |
|                                   " service on the given port.")
 | |
| 
 | |
| 
 | |
| def is_threepid_reserved(reserved_threepids, threepid):
 | |
|     """Check the threepid against the reserved threepid config
 | |
|     Args:
 | |
|         reserved_threepids([dict]) - list of reserved threepids
 | |
|         threepid(dict) - The threepid to test for
 | |
| 
 | |
|     Returns:
 | |
|         boolean Is the threepid undertest reserved_user
 | |
|     """
 | |
| 
 | |
|     for tp in reserved_threepids:
 | |
|         if (threepid['medium'] == tp['medium'] and threepid['address'] == tp['address']):
 | |
|             return True
 | |
|     return False
 | |
| 
 | |
| 
 | |
| def read_gc_thresholds(thresholds):
 | |
|     """Reads the three integer thresholds for garbage collection. Ensures that
 | |
|     the thresholds are integers if thresholds are supplied.
 | |
|     """
 | |
|     if thresholds is None:
 | |
|         return None
 | |
|     try:
 | |
|         assert len(thresholds) == 3
 | |
|         return (
 | |
|             int(thresholds[0]), int(thresholds[1]), int(thresholds[2]),
 | |
|         )
 | |
|     except Exception:
 | |
|         raise ConfigError(
 | |
|             "Value of `gc_threshold` must be a list of three integers if set"
 | |
|         )
 | |
| 
 | |
| 
 | |
| NO_MORE_WEB_CLIENT_WARNING = """
 | |
| Synapse no longer includes a web client. To enable a web client, configure
 | |
| web_client_location. To remove this warning, remove 'webclient' from the 'listeners'
 | |
| configuration.
 | |
| """
 | |
| 
 | |
| 
 | |
| def _warn_if_webclient_configured(listeners):
 | |
|     for listener in listeners:
 | |
|         for res in listener.get("resources", []):
 | |
|             for name in res.get("names", []):
 | |
|                 if name == 'webclient':
 | |
|                     logger.warning(NO_MORE_WEB_CLIENT_WARNING)
 | |
|                     return
 | |
| 
 | |
| 
 | |
| KNOWN_RESOURCES = (
 | |
|     'client',
 | |
|     'consent',
 | |
|     'federation',
 | |
|     'keys',
 | |
|     'media',
 | |
|     'metrics',
 | |
|     'openid',
 | |
|     'replication',
 | |
|     'static',
 | |
|     'webclient',
 | |
| )
 | |
| 
 | |
| 
 | |
| def _check_resource_config(listeners):
 | |
|     resource_names = set(
 | |
|         res_name
 | |
|         for listener in listeners
 | |
|         for res in listener.get("resources", [])
 | |
|         for res_name in res.get("names", [])
 | |
|     )
 | |
| 
 | |
|     for resource in resource_names:
 | |
|         if resource not in KNOWN_RESOURCES:
 | |
|             raise ConfigError(
 | |
|                 "Unknown listener resource '%s'" % (resource, )
 | |
|             )
 | |
|         if resource == "consent":
 | |
|             try:
 | |
|                 check_requirements('resources.consent')
 | |
|             except DependencyException as e:
 | |
|                 raise ConfigError(e.message)
 |