2023-02-14 11:47:47 +00:00
|
|
|
// Copyright 2017 Vector Creations Ltd
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"flag"
|
2023-03-22 08:21:32 +00:00
|
|
|
"time"
|
2023-02-14 11:47:47 +00:00
|
|
|
|
2023-03-22 08:21:32 +00:00
|
|
|
"github.com/getsentry/sentry-go"
|
|
|
|
"github.com/matrix-org/dendrite/internal"
|
2023-03-17 11:09:45 +00:00
|
|
|
"github.com/matrix-org/dendrite/internal/caching"
|
2023-03-22 08:21:32 +00:00
|
|
|
"github.com/matrix-org/dendrite/internal/httputil"
|
|
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
|
|
"github.com/matrix-org/dendrite/setup/jetstream"
|
|
|
|
"github.com/matrix-org/dendrite/setup/process"
|
2023-04-06 09:55:01 +01:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/fclient"
|
2023-07-11 12:56:25 +01:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2023-02-14 11:47:47 +00:00
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
|
|
|
|
"github.com/matrix-org/dendrite/appservice"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi"
|
|
|
|
"github.com/matrix-org/dendrite/roomserver"
|
|
|
|
"github.com/matrix-org/dendrite/setup"
|
|
|
|
basepkg "github.com/matrix-org/dendrite/setup/base"
|
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
|
|
|
"github.com/matrix-org/dendrite/setup/mscs"
|
|
|
|
"github.com/matrix-org/dendrite/userapi"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2023-03-01 21:57:30 +00:00
|
|
|
unixSocket = flag.String("unix-socket", "",
|
|
|
|
"EXPERIMENTAL(unstable): The HTTP listening unix socket for the server (disables http[s]-bind-address feature)",
|
|
|
|
)
|
2023-03-16 07:51:21 +00:00
|
|
|
unixSocketPermission = flag.String("unix-socket-permission", "755",
|
|
|
|
"EXPERIMENTAL(unstable): The HTTP listening unix socket permission for the server (in chmod format like 755)",
|
2023-03-01 21:57:30 +00:00
|
|
|
)
|
2023-02-14 11:47:47 +00:00
|
|
|
httpBindAddr = flag.String("http-bind-address", ":8008", "The HTTP listening port for the server")
|
|
|
|
httpsBindAddr = flag.String("https-bind-address", ":8448", "The HTTPS listening port for the server")
|
|
|
|
certFile = flag.String("tls-cert", "", "The PEM formatted X509 certificate to use for TLS")
|
|
|
|
keyFile = flag.String("tls-key", "", "The PEM private key to use for TLS")
|
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
cfg := setup.ParseFlags(true)
|
2023-03-01 21:57:30 +00:00
|
|
|
httpAddr := config.ServerAddress{}
|
|
|
|
httpsAddr := config.ServerAddress{}
|
|
|
|
if *unixSocket == "" {
|
|
|
|
http, err := config.HTTPAddress("http://" + *httpBindAddr)
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).Fatalf("Failed to parse http address")
|
|
|
|
}
|
|
|
|
httpAddr = http
|
|
|
|
https, err := config.HTTPAddress("https://" + *httpsBindAddr)
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).Fatalf("Failed to parse https address")
|
|
|
|
}
|
|
|
|
httpsAddr = https
|
|
|
|
} else {
|
2023-03-16 07:51:21 +00:00
|
|
|
socket, err := config.UnixSocketAddress(*unixSocket, *unixSocketPermission)
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).Fatalf("Failed to parse unix socket")
|
|
|
|
}
|
|
|
|
httpAddr = socket
|
2023-03-01 21:57:30 +00:00
|
|
|
}
|
|
|
|
|
2023-03-22 08:21:32 +00:00
|
|
|
configErrors := &config.ConfigErrors{}
|
|
|
|
cfg.Verify(configErrors)
|
|
|
|
if len(*configErrors) > 0 {
|
|
|
|
for _, err := range *configErrors {
|
|
|
|
logrus.Errorf("Configuration error: %s", err)
|
|
|
|
}
|
|
|
|
logrus.Fatalf("Failed to start due to configuration errors")
|
|
|
|
}
|
|
|
|
processCtx := process.NewProcessContext()
|
2023-02-14 11:47:47 +00:00
|
|
|
|
2023-03-22 08:21:32 +00:00
|
|
|
internal.SetupStdLogging()
|
|
|
|
internal.SetupHookLogging(cfg.Logging)
|
|
|
|
internal.SetupPprof()
|
2023-02-14 11:47:47 +00:00
|
|
|
|
2023-03-22 08:21:32 +00:00
|
|
|
basepkg.PlatformSanityChecks()
|
|
|
|
|
|
|
|
logrus.Infof("Dendrite version %s", internal.VersionString())
|
|
|
|
if !cfg.ClientAPI.RegistrationDisabled && cfg.ClientAPI.OpenRegistrationWithoutVerificationEnabled {
|
|
|
|
logrus.Warn("Open registration is enabled")
|
|
|
|
}
|
2023-02-14 11:47:47 +00:00
|
|
|
|
2023-03-22 08:21:32 +00:00
|
|
|
// create DNS cache
|
2023-04-06 09:55:01 +01:00
|
|
|
var dnsCache *fclient.DNSCache
|
2023-03-22 08:21:32 +00:00
|
|
|
if cfg.Global.DNSCache.Enabled {
|
2023-04-06 09:55:01 +01:00
|
|
|
dnsCache = fclient.NewDNSCache(
|
2023-03-22 08:21:32 +00:00
|
|
|
cfg.Global.DNSCache.CacheSize,
|
|
|
|
cfg.Global.DNSCache.CacheLifetime,
|
|
|
|
)
|
|
|
|
logrus.Infof(
|
|
|
|
"DNS cache enabled (size %d, lifetime %s)",
|
|
|
|
cfg.Global.DNSCache.CacheSize,
|
|
|
|
cfg.Global.DNSCache.CacheLifetime,
|
|
|
|
)
|
|
|
|
}
|
2023-02-14 11:47:47 +00:00
|
|
|
|
2023-03-22 08:21:32 +00:00
|
|
|
// setup tracing
|
|
|
|
closer, err := cfg.SetupTracing()
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).Panicf("failed to start opentracing")
|
|
|
|
}
|
|
|
|
defer closer.Close() // nolint: errcheck
|
|
|
|
|
|
|
|
// setup sentry
|
|
|
|
if cfg.Global.Sentry.Enabled {
|
|
|
|
logrus.Info("Setting up Sentry for debugging...")
|
|
|
|
err = sentry.Init(sentry.ClientOptions{
|
|
|
|
Dsn: cfg.Global.Sentry.DSN,
|
|
|
|
Environment: cfg.Global.Sentry.Environment,
|
|
|
|
Debug: true,
|
|
|
|
ServerName: string(cfg.Global.ServerName),
|
|
|
|
Release: "dendrite@" + internal.VersionString(),
|
|
|
|
AttachStacktrace: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).Panic("failed to start Sentry")
|
|
|
|
}
|
|
|
|
go func() {
|
|
|
|
processCtx.ComponentStarted()
|
|
|
|
<-processCtx.WaitForShutdown()
|
|
|
|
if !sentry.Flush(time.Second * 5) {
|
|
|
|
logrus.Warnf("failed to flush all Sentry events!")
|
|
|
|
}
|
|
|
|
processCtx.ComponentFinished()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
federationClient := basepkg.CreateFederationClient(cfg, dnsCache)
|
|
|
|
httpClient := basepkg.CreateClient(cfg, dnsCache)
|
|
|
|
|
|
|
|
// prepare required dependencies
|
|
|
|
cm := sqlutil.NewConnectionManager(processCtx, cfg.Global.DatabaseOptions)
|
|
|
|
routers := httputil.NewRouters()
|
|
|
|
|
|
|
|
caches := caching.NewRistrettoCache(cfg.Global.Cache.EstimatedMaxSize, cfg.Global.Cache.MaxAge, caching.EnableMetrics)
|
|
|
|
natsInstance := jetstream.NATSInstance{}
|
|
|
|
rsAPI := roomserver.NewInternalAPI(processCtx, cfg, cm, &natsInstance, caches, caching.EnableMetrics)
|
2023-02-14 11:47:47 +00:00
|
|
|
fsAPI := federationapi.NewInternalAPI(
|
2023-03-22 08:21:32 +00:00
|
|
|
processCtx, cfg, cm, &natsInstance, federationClient, rsAPI, caches, nil, false,
|
2023-02-14 11:47:47 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
keyRing := fsAPI.KeyRing()
|
|
|
|
|
|
|
|
// The underlying roomserver implementation needs to be able to call the fedsender.
|
|
|
|
// This is different to rsAPI which can be the http client which doesn't need this
|
|
|
|
// dependency. Other components also need updating after their dependencies are up.
|
|
|
|
rsAPI.SetFederationAPI(fsAPI, keyRing)
|
2023-07-20 15:06:05 +01:00
|
|
|
|
2023-11-09 07:43:27 +00:00
|
|
|
userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, federationClient, caching.EnableMetrics, fsAPI.IsBlacklistedOrBackingOff)
|
2023-07-20 15:06:05 +01:00
|
|
|
asAPI := appservice.NewInternalAPI(processCtx, cfg, &natsInstance, userAPI, rsAPI)
|
|
|
|
|
2023-02-14 11:47:47 +00:00
|
|
|
rsAPI.SetAppserviceAPI(asAPI)
|
|
|
|
rsAPI.SetUserAPI(userAPI)
|
|
|
|
|
|
|
|
monolith := setup.Monolith{
|
2023-03-22 08:21:32 +00:00
|
|
|
Config: cfg,
|
|
|
|
Client: httpClient,
|
|
|
|
FedClient: federationClient,
|
2023-02-14 11:47:47 +00:00
|
|
|
KeyRing: keyRing,
|
|
|
|
|
|
|
|
AppserviceAPI: asAPI,
|
|
|
|
// always use the concrete impl here even in -http mode because adding public routes
|
|
|
|
// must be done on the concrete impl not an HTTP client else fedapi will call itself
|
|
|
|
FederationAPI: fsAPI,
|
|
|
|
RoomserverAPI: rsAPI,
|
|
|
|
UserAPI: userAPI,
|
|
|
|
}
|
2023-03-22 08:21:32 +00:00
|
|
|
monolith.AddAllPublicRoutes(processCtx, cfg, routers, cm, &natsInstance, caches, caching.EnableMetrics)
|
2023-02-14 11:47:47 +00:00
|
|
|
|
2023-03-22 08:21:32 +00:00
|
|
|
if len(cfg.MSCs.MSCs) > 0 {
|
|
|
|
if err := mscs.Enable(cfg, cm, routers, &monolith, caches); err != nil {
|
2023-02-14 11:47:47 +00:00
|
|
|
logrus.WithError(err).Fatalf("Failed to enable MSCs")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-11 12:56:25 +01:00
|
|
|
upCounter := prometheus.NewCounter(prometheus.CounterOpts{
|
|
|
|
Namespace: "dendrite",
|
|
|
|
Name: "up",
|
|
|
|
ConstLabels: map[string]string{
|
|
|
|
"version": internal.VersionString(),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
upCounter.Add(1)
|
|
|
|
prometheus.MustRegister(upCounter)
|
|
|
|
|
2023-02-14 11:47:47 +00:00
|
|
|
// Expose the matrix APIs directly rather than putting them under a /api path.
|
|
|
|
go func() {
|
2023-03-22 08:21:32 +00:00
|
|
|
basepkg.SetupAndServeHTTP(processCtx, cfg, routers, httpAddr, nil, nil)
|
2023-02-14 11:47:47 +00:00
|
|
|
}()
|
|
|
|
// Handle HTTPS if certificate and key are provided
|
2023-03-01 21:57:30 +00:00
|
|
|
if *unixSocket == "" && *certFile != "" && *keyFile != "" {
|
2023-02-14 11:47:47 +00:00
|
|
|
go func() {
|
2023-03-22 08:21:32 +00:00
|
|
|
basepkg.SetupAndServeHTTP(processCtx, cfg, routers, httpsAddr, certFile, keyFile)
|
2023-02-14 11:47:47 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
// We want to block forever to let the HTTP and HTTPS handler serve the APIs
|
2023-03-22 08:21:32 +00:00
|
|
|
basepkg.WaitForShutdown(processCtx)
|
2023-02-14 11:47:47 +00:00
|
|
|
}
|