2020-06-15 09:54:11 +01:00
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package userapi
|
|
|
|
|
|
|
|
import (
|
2022-03-03 16:45:06 +00:00
|
|
|
"time"
|
|
|
|
|
2023-02-20 13:58:03 +00:00
|
|
|
fedsenderapi "github.com/matrix-org/dendrite/federationapi/api"
|
2022-09-09 12:56:33 +01:00
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
|
2022-03-03 11:40:53 +00:00
|
|
|
rsapi "github.com/matrix-org/dendrite/roomserver/api"
|
|
|
|
"github.com/matrix-org/dendrite/setup/base"
|
|
|
|
"github.com/matrix-org/dendrite/setup/jetstream"
|
2020-06-15 09:54:11 +01:00
|
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
2022-03-03 11:40:53 +00:00
|
|
|
"github.com/matrix-org/dendrite/userapi/consumers"
|
2020-06-15 09:54:11 +01:00
|
|
|
"github.com/matrix-org/dendrite/userapi/internal"
|
2022-03-03 11:40:53 +00:00
|
|
|
"github.com/matrix-org/dendrite/userapi/producers"
|
2022-02-18 11:31:05 +00:00
|
|
|
"github.com/matrix-org/dendrite/userapi/storage"
|
2022-05-04 18:04:28 +01:00
|
|
|
"github.com/matrix-org/dendrite/userapi/util"
|
2020-06-15 09:54:11 +01:00
|
|
|
)
|
|
|
|
|
2023-02-20 13:58:03 +00:00
|
|
|
// NewInternalAPI returns a concrete implementation of the internal API. Callers
|
2020-06-15 09:54:11 +01:00
|
|
|
// can call functions directly on the returned API or via an HTTP interface using AddInternalRoutes.
|
2020-08-27 18:53:40 +01:00
|
|
|
func NewInternalAPI(
|
2023-02-20 13:58:03 +00:00
|
|
|
base *base.BaseDendrite,
|
|
|
|
rsAPI rsapi.UserRoomserverAPI,
|
|
|
|
fedClient fedsenderapi.KeyserverFederationAPI,
|
|
|
|
) *internal.UserInternalAPI {
|
|
|
|
cfg := &base.Cfg.UserAPI
|
2022-05-09 14:15:24 +01:00
|
|
|
js, _ := base.NATS.Prepare(base.ProcessContext, &cfg.Matrix.JetStream)
|
2023-02-20 13:58:03 +00:00
|
|
|
appServices := base.Cfg.Derived.ApplicationServices
|
2022-02-10 10:27:26 +00:00
|
|
|
|
2023-02-20 13:58:03 +00:00
|
|
|
pgClient := base.PushGatewayHTTPClient()
|
|
|
|
|
|
|
|
db, err := storage.NewUserDatabase(
|
2022-05-03 16:35:06 +01:00
|
|
|
base,
|
|
|
|
&cfg.AccountDatabase,
|
|
|
|
cfg.Matrix.ServerName,
|
|
|
|
cfg.BCryptCost,
|
|
|
|
cfg.OpenIDTokenLifetimeMS,
|
|
|
|
api.DefaultLoginTokenLifetime,
|
|
|
|
cfg.Matrix.ServerNotices.LocalPart,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).Panicf("failed to connect to accounts db")
|
|
|
|
}
|
|
|
|
|
2023-02-20 13:58:03 +00:00
|
|
|
keyDB, err := storage.NewKeyDatabase(base, &base.Cfg.KeyServer.Database)
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).Panicf("failed to connect to key db")
|
|
|
|
}
|
|
|
|
|
2022-03-03 11:40:53 +00:00
|
|
|
syncProducer := producers.NewSyncAPI(
|
|
|
|
db, js,
|
|
|
|
// TODO: user API should handle syncs for account data. Right now,
|
|
|
|
// it's handled by clientapi, and hence uses its topic. When user
|
|
|
|
// API handles it for all account data, we can remove it from
|
|
|
|
// here.
|
2022-03-23 10:20:18 +00:00
|
|
|
cfg.Matrix.JetStream.Prefixed(jetstream.OutputClientData),
|
|
|
|
cfg.Matrix.JetStream.Prefixed(jetstream.OutputNotificationData),
|
2022-03-03 11:40:53 +00:00
|
|
|
)
|
2023-02-20 13:58:03 +00:00
|
|
|
keyChangeProducer := &producers.KeyChange{
|
|
|
|
Topic: cfg.Matrix.JetStream.Prefixed(jetstream.OutputKeyChangeEvent),
|
|
|
|
JetStream: js,
|
|
|
|
DB: keyDB,
|
|
|
|
}
|
2022-03-03 11:40:53 +00:00
|
|
|
|
|
|
|
userAPI := &internal.UserInternalAPI{
|
|
|
|
DB: db,
|
2023-02-20 13:58:03 +00:00
|
|
|
KeyDatabase: keyDB,
|
2022-03-03 11:40:53 +00:00
|
|
|
SyncProducer: syncProducer,
|
2023-02-20 13:58:03 +00:00
|
|
|
KeyChangeProducer: keyChangeProducer,
|
2022-10-26 12:59:19 +01:00
|
|
|
Config: cfg,
|
2022-03-03 11:40:53 +00:00
|
|
|
AppServices: appServices,
|
2022-06-29 15:29:39 +01:00
|
|
|
RSAPI: rsAPI,
|
2022-03-03 11:40:53 +00:00
|
|
|
DisableTLSValidation: cfg.PushGatewayDisableTLSValidation,
|
2022-09-27 14:01:34 +01:00
|
|
|
PgClient: pgClient,
|
2023-02-20 13:58:03 +00:00
|
|
|
FedClient: fedClient,
|
|
|
|
}
|
|
|
|
|
|
|
|
updater := internal.NewDeviceListUpdater(base.ProcessContext, keyDB, userAPI, keyChangeProducer, fedClient, 8, rsAPI, cfg.Matrix.ServerName) // 8 workers TODO: configurable
|
|
|
|
userAPI.Updater = updater
|
|
|
|
// Remove users which we don't share a room with anymore
|
|
|
|
if err := updater.CleanUp(); err != nil {
|
|
|
|
logrus.WithError(err).Error("failed to cleanup stale device lists")
|
|
|
|
}
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
if err := updater.Start(); err != nil {
|
|
|
|
logrus.WithError(err).Panicf("failed to start device list updater")
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
dlConsumer := consumers.NewDeviceListUpdateConsumer(
|
|
|
|
base.ProcessContext, cfg, js, updater,
|
|
|
|
)
|
|
|
|
if err := dlConsumer.Start(); err != nil {
|
|
|
|
logrus.WithError(err).Panic("failed to start device list consumer")
|
|
|
|
}
|
|
|
|
|
|
|
|
sigConsumer := consumers.NewSigningKeyUpdateConsumer(
|
|
|
|
base.ProcessContext, cfg, js, userAPI,
|
|
|
|
)
|
|
|
|
if err := sigConsumer.Start(); err != nil {
|
|
|
|
logrus.WithError(err).Panic("failed to start signing key consumer")
|
2022-03-03 11:40:53 +00:00
|
|
|
}
|
|
|
|
|
2022-09-27 14:01:34 +01:00
|
|
|
receiptConsumer := consumers.NewOutputReceiptEventConsumer(
|
|
|
|
base.ProcessContext, cfg, js, db, syncProducer, pgClient,
|
2022-03-03 11:40:53 +00:00
|
|
|
)
|
2022-09-27 14:01:34 +01:00
|
|
|
if err := receiptConsumer.Start(); err != nil {
|
|
|
|
logrus.WithError(err).Panic("failed to start user API receipt consumer")
|
2022-03-03 11:40:53 +00:00
|
|
|
}
|
|
|
|
|
2022-09-27 14:01:34 +01:00
|
|
|
eventConsumer := consumers.NewOutputRoomEventConsumer(
|
2022-09-09 12:56:33 +01:00
|
|
|
base.ProcessContext, cfg, js, db, pgClient, rsAPI, syncProducer,
|
2022-03-03 11:40:53 +00:00
|
|
|
)
|
|
|
|
if err := eventConsumer.Start(); err != nil {
|
|
|
|
logrus.WithError(err).Panic("failed to start user API streamed event consumer")
|
2020-06-15 09:54:11 +01:00
|
|
|
}
|
2022-03-03 11:40:53 +00:00
|
|
|
|
2022-03-03 16:45:06 +00:00
|
|
|
var cleanOldNotifs func()
|
|
|
|
cleanOldNotifs = func() {
|
|
|
|
logrus.Infof("Cleaning old notifications")
|
|
|
|
if err := db.DeleteOldNotifications(base.Context()); err != nil {
|
|
|
|
logrus.WithError(err).Error("Failed to clean old notifications")
|
|
|
|
}
|
|
|
|
time.AfterFunc(time.Hour, cleanOldNotifs)
|
|
|
|
}
|
|
|
|
time.AfterFunc(time.Minute, cleanOldNotifs)
|
|
|
|
|
2022-05-04 18:04:28 +01:00
|
|
|
if base.Cfg.Global.ReportStats.Enabled {
|
|
|
|
go util.StartPhoneHomeCollector(time.Now(), base.Cfg, db)
|
|
|
|
}
|
|
|
|
|
2022-03-03 11:40:53 +00:00
|
|
|
return userAPI
|
2020-06-15 09:54:11 +01:00
|
|
|
}
|