mirror of
https://github.com/1f349/dendrite.git
synced 2024-11-22 03:31:41 +00:00
7863a405a5
Use `IsBlacklistedOrBackingOff` from the federation API to check if we should fetch devices. To reduce back pressure, we now only queue retrying servers if there's space in the channel.
183 lines
6.7 KiB
Go
183 lines
6.7 KiB
Go
// Copyright 2017 Vector Creations Ltd
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package federationapi
|
|
|
|
import (
|
|
"time"
|
|
|
|
"github.com/matrix-org/dendrite/internal/httputil"
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
"github.com/matrix-org/dendrite/setup/config"
|
|
"github.com/matrix-org/dendrite/setup/process"
|
|
"github.com/matrix-org/gomatrixserverlib/fclient"
|
|
"github.com/sirupsen/logrus"
|
|
|
|
federationAPI "github.com/matrix-org/dendrite/federationapi/api"
|
|
"github.com/matrix-org/dendrite/federationapi/consumers"
|
|
"github.com/matrix-org/dendrite/federationapi/internal"
|
|
"github.com/matrix-org/dendrite/federationapi/producers"
|
|
"github.com/matrix-org/dendrite/federationapi/queue"
|
|
"github.com/matrix-org/dendrite/federationapi/statistics"
|
|
"github.com/matrix-org/dendrite/federationapi/storage"
|
|
"github.com/matrix-org/dendrite/internal/caching"
|
|
roomserverAPI "github.com/matrix-org/dendrite/roomserver/api"
|
|
"github.com/matrix-org/dendrite/setup/jetstream"
|
|
userapi "github.com/matrix-org/dendrite/userapi/api"
|
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/routing"
|
|
)
|
|
|
|
// AddPublicRoutes sets up and registers HTTP handlers on the base API muxes for the FederationAPI component.
|
|
func AddPublicRoutes(
|
|
processContext *process.ProcessContext,
|
|
routers httputil.Routers,
|
|
dendriteConfig *config.Dendrite,
|
|
natsInstance *jetstream.NATSInstance,
|
|
userAPI userapi.FederationUserAPI,
|
|
federation fclient.FederationClient,
|
|
keyRing gomatrixserverlib.JSONVerifier,
|
|
rsAPI roomserverAPI.FederationRoomserverAPI,
|
|
fedAPI federationAPI.FederationInternalAPI,
|
|
enableMetrics bool,
|
|
) {
|
|
cfg := &dendriteConfig.FederationAPI
|
|
mscCfg := &dendriteConfig.MSCs
|
|
js, _ := natsInstance.Prepare(processContext, &cfg.Matrix.JetStream)
|
|
producer := &producers.SyncAPIProducer{
|
|
JetStream: js,
|
|
TopicReceiptEvent: cfg.Matrix.JetStream.Prefixed(jetstream.OutputReceiptEvent),
|
|
TopicSendToDeviceEvent: cfg.Matrix.JetStream.Prefixed(jetstream.OutputSendToDeviceEvent),
|
|
TopicTypingEvent: cfg.Matrix.JetStream.Prefixed(jetstream.OutputTypingEvent),
|
|
TopicPresenceEvent: cfg.Matrix.JetStream.Prefixed(jetstream.OutputPresenceEvent),
|
|
TopicDeviceListUpdate: cfg.Matrix.JetStream.Prefixed(jetstream.InputDeviceListUpdate),
|
|
TopicSigningKeyUpdate: cfg.Matrix.JetStream.Prefixed(jetstream.InputSigningKeyUpdate),
|
|
Config: cfg,
|
|
UserAPI: userAPI,
|
|
}
|
|
|
|
// the federationapi component is a bit unique in that it attaches public routes AND serves
|
|
// internal APIs (because it used to be 2 components: the 2nd being fedsender). As a result,
|
|
// the constructor shape is a bit wonky in that it is not valid to AddPublicRoutes without a
|
|
// concrete impl of FederationInternalAPI as the public routes and the internal API _should_
|
|
// be the same thing now.
|
|
f, ok := fedAPI.(*internal.FederationInternalAPI)
|
|
if !ok {
|
|
panic("federationapi.AddPublicRoutes called with a FederationInternalAPI impl which was not " +
|
|
"FederationInternalAPI. This is a programming error.")
|
|
}
|
|
|
|
routing.Setup(
|
|
routers,
|
|
dendriteConfig,
|
|
rsAPI, f, keyRing,
|
|
federation, userAPI, mscCfg,
|
|
producer, enableMetrics,
|
|
)
|
|
}
|
|
|
|
// NewInternalAPI returns a concerete implementation of the internal API. Callers
|
|
// can call functions directly on the returned API or via an HTTP interface using AddInternalRoutes.
|
|
func NewInternalAPI(
|
|
processContext *process.ProcessContext,
|
|
dendriteCfg *config.Dendrite,
|
|
cm *sqlutil.Connections,
|
|
natsInstance *jetstream.NATSInstance,
|
|
federation fclient.FederationClient,
|
|
rsAPI roomserverAPI.FederationRoomserverAPI,
|
|
caches *caching.Caches,
|
|
keyRing *gomatrixserverlib.KeyRing,
|
|
resetBlacklist bool,
|
|
) *internal.FederationInternalAPI {
|
|
cfg := &dendriteCfg.FederationAPI
|
|
|
|
federationDB, err := storage.NewDatabase(processContext.Context(), cm, &cfg.Database, caches, dendriteCfg.Global.IsLocalServerName)
|
|
if err != nil {
|
|
logrus.WithError(err).Panic("failed to connect to federation sender db")
|
|
}
|
|
|
|
if resetBlacklist {
|
|
_ = federationDB.RemoveAllServersFromBlacklist()
|
|
}
|
|
|
|
stats := statistics.NewStatistics(
|
|
federationDB,
|
|
cfg.FederationMaxRetries+1,
|
|
cfg.P2PFederationRetriesUntilAssumedOffline+1)
|
|
|
|
js, nats := natsInstance.Prepare(processContext, &cfg.Matrix.JetStream)
|
|
|
|
signingInfo := dendriteCfg.Global.SigningIdentities()
|
|
|
|
queues := queue.NewOutgoingQueues(
|
|
federationDB, processContext,
|
|
cfg.Matrix.DisableFederation,
|
|
cfg.Matrix.ServerName, federation, rsAPI, &stats,
|
|
signingInfo,
|
|
)
|
|
|
|
rsConsumer := consumers.NewOutputRoomEventConsumer(
|
|
processContext, cfg, js, nats, queues,
|
|
federationDB, rsAPI,
|
|
)
|
|
if err = rsConsumer.Start(); err != nil {
|
|
logrus.WithError(err).Panic("failed to start room server consumer")
|
|
}
|
|
tsConsumer := consumers.NewOutputSendToDeviceConsumer(
|
|
processContext, cfg, js, queues, federationDB,
|
|
)
|
|
if err = tsConsumer.Start(); err != nil {
|
|
logrus.WithError(err).Panic("failed to start send-to-device consumer")
|
|
}
|
|
receiptConsumer := consumers.NewOutputReceiptConsumer(
|
|
processContext, cfg, js, queues, federationDB,
|
|
)
|
|
if err = receiptConsumer.Start(); err != nil {
|
|
logrus.WithError(err).Panic("failed to start receipt consumer")
|
|
}
|
|
typingConsumer := consumers.NewOutputTypingConsumer(
|
|
processContext, cfg, js, queues, federationDB,
|
|
)
|
|
if err = typingConsumer.Start(); err != nil {
|
|
logrus.WithError(err).Panic("failed to start typing consumer")
|
|
}
|
|
keyConsumer := consumers.NewKeyChangeConsumer(
|
|
processContext, &dendriteCfg.KeyServer, js, queues, federationDB, rsAPI,
|
|
)
|
|
if err = keyConsumer.Start(); err != nil {
|
|
logrus.WithError(err).Panic("failed to start key server consumer")
|
|
}
|
|
|
|
presenceConsumer := consumers.NewOutputPresenceConsumer(
|
|
processContext, cfg, js, queues, federationDB, rsAPI,
|
|
)
|
|
if err = presenceConsumer.Start(); err != nil {
|
|
logrus.WithError(err).Panic("failed to start presence consumer")
|
|
}
|
|
|
|
var cleanExpiredEDUs func()
|
|
cleanExpiredEDUs = func() {
|
|
logrus.Infof("Cleaning expired EDUs")
|
|
if err := federationDB.DeleteExpiredEDUs(processContext.Context()); err != nil {
|
|
logrus.WithError(err).Error("Failed to clean expired EDUs")
|
|
}
|
|
time.AfterFunc(time.Hour, cleanExpiredEDUs)
|
|
}
|
|
time.AfterFunc(time.Minute, cleanExpiredEDUs)
|
|
|
|
return internal.NewFederationInternalAPI(federationDB, cfg, rsAPI, federation, &stats, caches, queues, keyRing)
|
|
}
|