mirror of
https://github.com/matrix-org/dendrite
synced 2024-12-17 22:33:43 +01:00
4b09f445c9
* Initial pass at refactoring config (not finished) * Don't forget current state and EDU servers * More shifting around * Update server key API tests * Fix roomserver test * Fix more tests * Further tweaks * Fix current state server test (sort of) * Maybe fix appservices * Fix client API test * Include database connection string in database options * Fix sync API build * Update config test * Fix unit tests * Fix federation sender build * Fix gobind build * Set Listen address for all services in HTTP monolith mode * Validate config, reinstate appservice derived in directory, tweaks * Tweak federation API test * Set MaxOpenConnections/MaxIdleConnections to previous values * Update generate-config
64 lines
2 KiB
Go
64 lines
2 KiB
Go
package config
|
|
|
|
type FederationSender struct {
|
|
Matrix *Global `yaml:"-"`
|
|
|
|
Listen Address `yaml:"listen"`
|
|
Bind Address `yaml:"bind"`
|
|
|
|
// The FederationSender database stores information used by the FederationSender
|
|
// It is only accessed by the FederationSender.
|
|
Database DatabaseOptions `yaml:"database"`
|
|
|
|
// Federation failure threshold. How many consecutive failures that we should
|
|
// tolerate when sending federation requests to a specific server. The backoff
|
|
// is 2**x seconds, so 1 = 2 seconds, 2 = 4 seconds, 3 = 8 seconds, etc.
|
|
// The default value is 16 if not specified, which is circa 18 hours.
|
|
FederationMaxRetries uint32 `yaml:"send_max_retries"`
|
|
|
|
// FederationDisableTLSValidation disables the validation of X.509 TLS certs
|
|
// on remote federation endpoints. This is not recommended in production!
|
|
DisableTLSValidation bool `yaml:"disable_tls_validation"`
|
|
|
|
Proxy Proxy `yaml:"proxy_outbound"`
|
|
}
|
|
|
|
func (c *FederationSender) Defaults() {
|
|
c.Listen = "localhost:7775"
|
|
c.Bind = "localhost:7775"
|
|
c.Database.Defaults()
|
|
c.Database.ConnectionString = "file:federationsender.db"
|
|
|
|
c.FederationMaxRetries = 16
|
|
c.DisableTLSValidation = false
|
|
|
|
c.Proxy.Defaults()
|
|
}
|
|
|
|
func (c *FederationSender) Verify(configErrs *ConfigErrors, isMonolith bool) {
|
|
checkNotEmpty(configErrs, "federation_sender.listen", string(c.Listen))
|
|
checkNotEmpty(configErrs, "federation_sender.bind", string(c.Bind))
|
|
checkNotEmpty(configErrs, "federation_sender.database.connection_string", string(c.Database.ConnectionString))
|
|
}
|
|
|
|
// The config for setting a proxy to use for server->server requests
|
|
type Proxy struct {
|
|
// Is the proxy enabled?
|
|
Enabled bool `yaml:"enabled"`
|
|
// The protocol for the proxy (http / https / socks5)
|
|
Protocol string `yaml:"protocol"`
|
|
// The host where the proxy is listening
|
|
Host string `yaml:"host"`
|
|
// The port on which the proxy is listening
|
|
Port uint16 `yaml:"port"`
|
|
}
|
|
|
|
func (c *Proxy) Defaults() {
|
|
c.Enabled = false
|
|
c.Protocol = "http"
|
|
c.Host = "localhost"
|
|
c.Port = 8080
|
|
}
|
|
|
|
func (c *Proxy) Verify(configErrs *ConfigErrors) {
|
|
}
|