relay_config/
config.rs

1use std::collections::{BTreeMap, HashMap};
2use std::error::Error;
3use std::io::Write;
4use std::net::{IpAddr, SocketAddr, ToSocketAddrs};
5use std::num::NonZeroU8;
6use std::path::{Path, PathBuf};
7use std::str::FromStr;
8use std::time::Duration;
9use std::{env, fmt, fs, io};
10
11use anyhow::Context;
12use relay_auth::{PublicKey, RelayId, SecretKey, generate_key_pair, generate_relay_id};
13use relay_common::Dsn;
14use relay_kafka::{
15    ConfigError as KafkaConfigError, KafkaConfigParam, KafkaTopic, KafkaTopicConfig,
16    TopicAssignments,
17};
18use relay_metrics::MetricNamespace;
19use serde::de::{DeserializeOwned, Unexpected, Visitor};
20use serde::{Deserialize, Deserializer, Serialize, Serializer};
21use uuid::Uuid;
22
23use crate::aggregator::{AggregatorServiceConfig, ScopedAggregatorConfig};
24use crate::byte_size::ByteSize;
25use crate::upstream::UpstreamDescriptor;
26use crate::{RedisConfig, RedisConfigs, RedisConfigsRef, build_redis_configs};
27
28const DEFAULT_NETWORK_OUTAGE_GRACE_PERIOD: u64 = 10;
29
30static CONFIG_YAML_HEADER: &str = r###"# Please see the relevant documentation.
31# Performance tuning: https://docs.sentry.io/product/relay/operating-guidelines/
32# All config options: https://docs.sentry.io/product/relay/options/
33"###;
34
35/// Indicates config related errors.
36#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)]
37#[non_exhaustive]
38pub enum ConfigErrorKind {
39    /// Failed to open the file.
40    CouldNotOpenFile,
41    /// Failed to save a file.
42    CouldNotWriteFile,
43    /// Parsing YAML failed.
44    BadYaml,
45    /// Parsing JSON failed.
46    BadJson,
47    /// Invalid config value
48    InvalidValue,
49    /// The user attempted to run Relay with processing enabled, but uses a binary that was
50    /// compiled without the processing feature.
51    ProcessingNotAvailable,
52}
53
54impl fmt::Display for ConfigErrorKind {
55    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
56        match self {
57            Self::CouldNotOpenFile => write!(f, "could not open config file"),
58            Self::CouldNotWriteFile => write!(f, "could not write config file"),
59            Self::BadYaml => write!(f, "could not parse yaml config file"),
60            Self::BadJson => write!(f, "could not parse json config file"),
61            Self::InvalidValue => write!(f, "invalid config value"),
62            Self::ProcessingNotAvailable => write!(
63                f,
64                "was not compiled with processing, cannot enable processing"
65            ),
66        }
67    }
68}
69
70/// Defines the source of a config error
71#[derive(Debug, Default)]
72enum ConfigErrorSource {
73    /// An error occurring independently.
74    #[default]
75    None,
76    /// An error originating from a configuration file.
77    File(PathBuf),
78    /// An error originating in a field override (an env var, or a CLI parameter).
79    FieldOverride(String),
80}
81
82impl fmt::Display for ConfigErrorSource {
83    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
84        match self {
85            ConfigErrorSource::None => Ok(()),
86            ConfigErrorSource::File(file_name) => {
87                write!(f, " (file {})", file_name.display())
88            }
89            ConfigErrorSource::FieldOverride(name) => write!(f, " (field {name})"),
90        }
91    }
92}
93
94/// Indicates config related errors.
95#[derive(Debug)]
96pub struct ConfigError {
97    source: ConfigErrorSource,
98    kind: ConfigErrorKind,
99}
100
101impl ConfigError {
102    #[inline]
103    fn new(kind: ConfigErrorKind) -> Self {
104        Self {
105            source: ConfigErrorSource::None,
106            kind,
107        }
108    }
109
110    #[inline]
111    fn field(field: &'static str) -> Self {
112        Self {
113            source: ConfigErrorSource::FieldOverride(field.to_owned()),
114            kind: ConfigErrorKind::InvalidValue,
115        }
116    }
117
118    #[inline]
119    fn file(kind: ConfigErrorKind, p: impl AsRef<Path>) -> Self {
120        Self {
121            source: ConfigErrorSource::File(p.as_ref().to_path_buf()),
122            kind,
123        }
124    }
125
126    /// Returns the error kind of the error.
127    pub fn kind(&self) -> ConfigErrorKind {
128        self.kind
129    }
130}
131
132impl fmt::Display for ConfigError {
133    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
134        write!(f, "{}{}", self.kind(), self.source)
135    }
136}
137
138impl Error for ConfigError {}
139
140enum ConfigFormat {
141    Yaml,
142    Json,
143}
144
145impl ConfigFormat {
146    pub fn extension(&self) -> &'static str {
147        match self {
148            ConfigFormat::Yaml => "yml",
149            ConfigFormat::Json => "json",
150        }
151    }
152}
153
154trait ConfigObject: DeserializeOwned + Serialize {
155    /// The format in which to serialize this configuration.
156    fn format() -> ConfigFormat;
157
158    /// The basename of the config file.
159    fn name() -> &'static str;
160
161    /// The full filename of the config file, including the file extension.
162    fn path(base: &Path) -> PathBuf {
163        base.join(format!("{}.{}", Self::name(), Self::format().extension()))
164    }
165
166    /// Loads the config file from a file within the given directory location.
167    fn load(base: &Path) -> anyhow::Result<Self> {
168        let path = Self::path(base);
169
170        let f = fs::File::open(&path)
171            .with_context(|| ConfigError::file(ConfigErrorKind::CouldNotOpenFile, &path))?;
172        let f = io::BufReader::new(f);
173
174        let mut source = serde_vars::EnvSource::default();
175        match Self::format() {
176            ConfigFormat::Yaml => {
177                serde_vars::deserialize(serde_yaml::Deserializer::from_reader(f), &mut source)
178                    .with_context(|| ConfigError::file(ConfigErrorKind::BadYaml, &path))
179            }
180            ConfigFormat::Json => {
181                serde_vars::deserialize(&mut serde_json::Deserializer::from_reader(f), &mut source)
182                    .with_context(|| ConfigError::file(ConfigErrorKind::BadJson, &path))
183            }
184        }
185    }
186
187    /// Writes the configuration to a file within the given directory location.
188    fn save(&self, base: &Path) -> anyhow::Result<()> {
189        let path = Self::path(base);
190        let mut options = fs::OpenOptions::new();
191        options.write(true).truncate(true).create(true);
192
193        // Remove all non-user permissions for the newly created file
194        #[cfg(unix)]
195        {
196            use std::os::unix::fs::OpenOptionsExt;
197            options.mode(0o600);
198        }
199
200        let mut f = options
201            .open(&path)
202            .with_context(|| ConfigError::file(ConfigErrorKind::CouldNotWriteFile, &path))?;
203
204        match Self::format() {
205            ConfigFormat::Yaml => {
206                f.write_all(CONFIG_YAML_HEADER.as_bytes())?;
207                serde_yaml::to_writer(&mut f, self)
208                    .with_context(|| ConfigError::file(ConfigErrorKind::CouldNotWriteFile, &path))?
209            }
210            ConfigFormat::Json => serde_json::to_writer_pretty(&mut f, self)
211                .with_context(|| ConfigError::file(ConfigErrorKind::CouldNotWriteFile, &path))?,
212        }
213
214        f.write_all(b"\n").ok();
215
216        Ok(())
217    }
218}
219
220/// Structure used to hold information about configuration overrides via
221/// CLI parameters or environment variables
222#[derive(Debug, Default)]
223pub struct OverridableConfig {
224    /// The operation mode of this relay.
225    pub mode: Option<String>,
226    /// The instance type of this relay.
227    pub instance: Option<String>,
228    /// The log level of this relay.
229    pub log_level: Option<String>,
230    /// The log format of this relay.
231    pub log_format: Option<String>,
232    /// The upstream relay or sentry instance.
233    pub upstream: Option<String>,
234    /// Alternate upstream provided through a Sentry DSN. Key and project will be ignored.
235    pub upstream_dsn: Option<String>,
236    /// The host the relay should bind to (network interface).
237    pub host: Option<String>,
238    /// The port to bind for the unencrypted relay HTTP server.
239    pub port: Option<String>,
240    /// "true" if processing is enabled "false" otherwise
241    pub processing: Option<String>,
242    /// the kafka bootstrap.servers configuration string
243    pub kafka_url: Option<String>,
244    /// the redis server url
245    pub redis_url: Option<String>,
246    /// The globally unique ID of the relay.
247    pub id: Option<String>,
248    /// The secret key of the relay
249    pub secret_key: Option<String>,
250    /// The public key of the relay
251    pub public_key: Option<String>,
252    /// Outcome source
253    pub outcome_source: Option<String>,
254    /// shutdown timeout
255    pub shutdown_timeout: Option<String>,
256    /// Server name reported in the Sentry SDK.
257    pub server_name: Option<String>,
258}
259
260/// The relay credentials
261#[derive(Serialize, Deserialize, Debug, Clone, PartialEq, Eq)]
262pub struct Credentials {
263    /// The secret key of the relay
264    pub secret_key: SecretKey,
265    /// The public key of the relay
266    pub public_key: PublicKey,
267    /// The globally unique ID of the relay.
268    pub id: RelayId,
269}
270
271impl Credentials {
272    /// Generates new random credentials.
273    pub fn generate() -> Self {
274        relay_log::info!("generating new relay credentials");
275        let (sk, pk) = generate_key_pair();
276        Self {
277            secret_key: sk,
278            public_key: pk,
279            id: generate_relay_id(),
280        }
281    }
282
283    /// Serializes this configuration to JSON.
284    pub fn to_json_string(&self) -> anyhow::Result<String> {
285        serde_json::to_string(self)
286            .with_context(|| ConfigError::new(ConfigErrorKind::CouldNotWriteFile))
287    }
288}
289
290impl ConfigObject for Credentials {
291    fn format() -> ConfigFormat {
292        ConfigFormat::Json
293    }
294    fn name() -> &'static str {
295        "credentials"
296    }
297}
298
299/// Information on a downstream Relay.
300#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
301#[serde(rename_all = "camelCase")]
302pub struct RelayInfo {
303    /// The public key that this Relay uses to authenticate and sign requests.
304    pub public_key: PublicKey,
305
306    /// Marks an internal relay that has privileged access to more project configuration.
307    #[serde(default)]
308    pub internal: bool,
309}
310
311impl RelayInfo {
312    /// Creates a new RelayInfo
313    pub fn new(public_key: PublicKey) -> Self {
314        Self {
315            public_key,
316            internal: false,
317        }
318    }
319}
320
321/// The operation mode of a relay.
322#[derive(Clone, Copy, Debug, Eq, PartialEq, Serialize)]
323#[serde(rename_all = "camelCase")]
324pub enum RelayMode {
325    /// This relay acts as a proxy for all requests and events.
326    ///
327    /// Events are normalized and rate limits from the upstream are enforced, but the relay will not
328    /// fetch project configurations from the upstream or perform PII stripping. All events are
329    /// accepted unless overridden on the file system.
330    Proxy,
331
332    /// Project configurations are managed by the upstream.
333    ///
334    /// Project configurations are always fetched from the upstream, unless they are statically
335    /// overridden in the file system. This relay must be allowed in the upstream Sentry. This is
336    /// only possible, if the upstream is Sentry directly, or another managed Relay.
337    Managed,
338}
339
340impl<'de> Deserialize<'de> for RelayMode {
341    fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
342    where
343        D: Deserializer<'de>,
344    {
345        let s = String::deserialize(deserializer)?;
346        match s.as_str() {
347            "proxy" => Ok(RelayMode::Proxy),
348            "managed" => Ok(RelayMode::Managed),
349            "static" => Err(serde::de::Error::custom(
350                "Relay mode 'static' has been removed. Please use 'managed' or 'proxy' instead.",
351            )),
352            other => Err(serde::de::Error::unknown_variant(
353                other,
354                &["proxy", "managed"],
355            )),
356        }
357    }
358}
359
360impl fmt::Display for RelayMode {
361    fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
362        match self {
363            RelayMode::Proxy => write!(f, "proxy"),
364            RelayMode::Managed => write!(f, "managed"),
365        }
366    }
367}
368
369/// The instance type of Relay.
370#[derive(Clone, Copy, Debug, Eq, PartialEq, Deserialize, Serialize)]
371#[serde(rename_all = "camelCase")]
372pub enum RelayInstance {
373    /// This Relay is run as a default instance.
374    Default,
375
376    /// This Relay is run as a canary instance where experiments can be run.
377    Canary,
378}
379
380impl RelayInstance {
381    /// Returns `true` if the [`RelayInstance`] is of type [`RelayInstance::Canary`].
382    pub fn is_canary(&self) -> bool {
383        matches!(self, RelayInstance::Canary)
384    }
385}
386
387impl fmt::Display for RelayInstance {
388    fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
389        match self {
390            RelayInstance::Default => write!(f, "default"),
391            RelayInstance::Canary => write!(f, "canary"),
392        }
393    }
394}
395
396impl FromStr for RelayInstance {
397    type Err = fmt::Error;
398
399    fn from_str(s: &str) -> Result<Self, Self::Err> {
400        match s {
401            "canary" => Ok(RelayInstance::Canary),
402            _ => Ok(RelayInstance::Default),
403        }
404    }
405}
406
407/// Error returned when parsing an invalid [`RelayMode`].
408#[derive(Clone, Copy, Debug, Eq, PartialEq)]
409pub struct ParseRelayModeError;
410
411impl fmt::Display for ParseRelayModeError {
412    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
413        write!(f, "Relay mode must be one of: managed or proxy")
414    }
415}
416
417impl Error for ParseRelayModeError {}
418
419impl FromStr for RelayMode {
420    type Err = ParseRelayModeError;
421
422    fn from_str(s: &str) -> Result<Self, Self::Err> {
423        match s {
424            "proxy" => Ok(RelayMode::Proxy),
425            "managed" => Ok(RelayMode::Managed),
426            _ => Err(ParseRelayModeError),
427        }
428    }
429}
430
431/// Returns `true` if this value is equal to `Default::default()`.
432fn is_default<T: Default + PartialEq>(t: &T) -> bool {
433    *t == T::default()
434}
435
436/// Checks if we are running in docker.
437fn is_docker() -> bool {
438    if fs::metadata("/.dockerenv").is_ok() {
439        return true;
440    }
441
442    fs::read_to_string("/proc/self/cgroup").is_ok_and(|s| s.contains("/docker"))
443}
444
445/// Default value for the "bind" configuration.
446fn default_host() -> IpAddr {
447    if is_docker() {
448        // Docker images rely on this service being exposed
449        "0.0.0.0".parse().unwrap()
450    } else {
451        "127.0.0.1".parse().unwrap()
452    }
453}
454
455/// Controls responses from the readiness health check endpoint based on authentication.
456///
457/// Independent of the the readiness condition, shutdown always switches Relay into unready state.
458#[derive(Clone, Copy, Debug, Eq, PartialEq, Deserialize, Serialize)]
459#[serde(rename_all = "lowercase")]
460#[derive(Default)]
461pub enum ReadinessCondition {
462    /// (default) Relay is ready when authenticated and connected to the upstream.
463    ///
464    /// Before authentication has succeeded and during network outages, Relay responds as not ready.
465    /// Relay reauthenticates based on the `http.auth_interval` parameter. During reauthentication,
466    /// Relay remains ready until authentication fails.
467    ///
468    /// Authentication is only required for Relays in managed mode. Other Relays will only check for
469    /// network outages.
470    #[default]
471    Authenticated,
472    /// Relay reports readiness regardless of the authentication and networking state.
473    Always,
474}
475
476/// Relay specific configuration values.
477#[derive(Serialize, Deserialize, Debug)]
478#[serde(default)]
479pub struct Relay {
480    /// The operation mode of this relay.
481    pub mode: RelayMode,
482    /// The instance type of this relay.
483    pub instance: RelayInstance,
484    /// The upstream relay or sentry instance.
485    pub upstream: UpstreamDescriptor<'static>,
486    /// The host the relay should bind to (network interface).
487    pub host: IpAddr,
488    /// The port to bind for the unencrypted relay HTTP server.
489    pub port: u16,
490    /// The host the relay should bind to (network interface) for internally exposed APIs, like
491    /// health checks.
492    ///
493    /// If not configured, internal routes are exposed on the main HTTP server.
494    ///
495    /// Note: configuring the internal http server on an address which overlaps with the main
496    /// server (e.g. main on `0.0.0.0:3000` and internal on `127.0.0.1:3000`) is a misconfiguration
497    /// resulting in approximately half of the requests sent to `127.0.0.1:3000` to fail, as the handling
498    /// http server is chosen by the operating system 'at random'.
499    ///
500    /// As a best practice you should always choose different ports to avoid this issue.
501    ///
502    /// Defaults to [`Self::host`].
503    pub internal_host: Option<IpAddr>,
504    /// The port to bind for internally exposed APIs.
505    ///
506    /// Defaults to [`Self::port`].
507    pub internal_port: Option<u16>,
508    /// Optional port to bind for the encrypted relay HTTPS server.
509    #[serde(skip_serializing)]
510    pub tls_port: Option<u16>,
511    /// The path to the identity (DER-encoded PKCS12) to use for TLS.
512    #[serde(skip_serializing)]
513    pub tls_identity_path: Option<PathBuf>,
514    /// Password for the PKCS12 archive.
515    #[serde(skip_serializing)]
516    pub tls_identity_password: Option<String>,
517    /// Always override project IDs from the URL and DSN with the identifier used at the upstream.
518    ///
519    /// Enable this setting for Relays used to redirect traffic to a migrated Sentry instance.
520    /// Validation of project identifiers can be safely skipped in these cases.
521    #[serde(skip_serializing_if = "is_default")]
522    pub override_project_ids: bool,
523}
524
525impl Default for Relay {
526    fn default() -> Self {
527        Relay {
528            mode: RelayMode::Managed,
529            instance: RelayInstance::Default,
530            upstream: "https://sentry.io/".parse().unwrap(),
531            host: default_host(),
532            port: 3000,
533            internal_host: None,
534            internal_port: None,
535            tls_port: None,
536            tls_identity_path: None,
537            tls_identity_password: None,
538            override_project_ids: false,
539        }
540    }
541}
542
543/// Control the metrics.
544#[derive(Serialize, Deserialize, Debug)]
545#[serde(default)]
546pub struct Metrics {
547    /// Hostname and port of the statsd server.
548    ///
549    /// Defaults to `None`.
550    pub statsd: Option<String>,
551    /// Common prefix that should be added to all metrics.
552    ///
553    /// Defaults to `"sentry.relay"`.
554    pub prefix: String,
555    /// Default tags to apply to all metrics.
556    pub default_tags: BTreeMap<String, String>,
557    /// Tag name to report the hostname to for each metric. Defaults to not sending such a tag.
558    pub hostname_tag: Option<String>,
559    /// Global sample rate for all emitted metrics between `0.0` and `1.0`.
560    ///
561    /// For example, a value of `0.3` means that only 30% of the emitted metrics will be sent.
562    /// Defaults to `1.0` (100%).
563    pub sample_rate: f32,
564    /// Interval for periodic metrics emitted from Relay.
565    ///
566    /// Setting it to `0` seconds disables the periodic metrics.
567    /// Defaults to 5 seconds.
568    pub periodic_secs: u64,
569    /// Whether local metric aggregation using statdsproxy should be enabled.
570    ///
571    /// Defaults to `true`.
572    pub aggregate: bool,
573    /// Allows emission of metrics with high cardinality tags.
574    ///
575    /// High cardinality tags are dynamic values attached to metrics,
576    /// such as project IDs. When enabled, these tags will be included
577    /// in the emitted metrics. When disabled, the tags will be omitted.
578    ///
579    /// Defaults to `false`.
580    pub allow_high_cardinality_tags: bool,
581}
582
583impl Default for Metrics {
584    fn default() -> Self {
585        Metrics {
586            statsd: None,
587            prefix: "sentry.relay".into(),
588            default_tags: BTreeMap::new(),
589            hostname_tag: None,
590            sample_rate: 1.0,
591            periodic_secs: 5,
592            aggregate: true,
593            allow_high_cardinality_tags: false,
594        }
595    }
596}
597
598/// Controls various limits
599#[derive(Serialize, Deserialize, Debug)]
600#[serde(default)]
601pub struct Limits {
602    /// How many requests can be sent concurrently from Relay to the upstream before Relay starts
603    /// buffering.
604    pub max_concurrent_requests: usize,
605    /// How many queries can be sent concurrently from Relay to the upstream before Relay starts
606    /// buffering.
607    ///
608    /// The concurrency of queries is additionally constrained by `max_concurrent_requests`.
609    pub max_concurrent_queries: usize,
610    /// The maximum payload size for events.
611    pub max_event_size: ByteSize,
612    /// The maximum size for each attachment.
613    pub max_attachment_size: ByteSize,
614    /// The maximum combined size for all attachments in an envelope or request.
615    pub max_attachments_size: ByteSize,
616    /// The maximum combined size for all client reports in an envelope or request.
617    pub max_client_reports_size: ByteSize,
618    /// The maximum payload size for a monitor check-in.
619    pub max_check_in_size: ByteSize,
620    /// The maximum payload size for an entire envelopes. Individual limits still apply.
621    pub max_envelope_size: ByteSize,
622    /// The maximum number of session items per envelope.
623    pub max_session_count: usize,
624    /// The maximum number of standalone span items per envelope.
625    pub max_span_count: usize,
626    /// The maximum number of log items per envelope.
627    pub max_log_count: usize,
628    /// The maximum number of trace metrics per envelope.
629    pub max_trace_metric_count: usize,
630    /// The maximum payload size for general API requests.
631    pub max_api_payload_size: ByteSize,
632    /// The maximum payload size for file uploads and chunks.
633    pub max_api_file_upload_size: ByteSize,
634    /// The maximum payload size for chunks
635    pub max_api_chunk_upload_size: ByteSize,
636    /// The maximum payload size for a profile
637    pub max_profile_size: ByteSize,
638    /// The maximum payload size for a trace metric.
639    pub max_trace_metric_size: ByteSize,
640    /// The maximum payload size for a log.
641    pub max_log_size: ByteSize,
642    /// The maximum payload size for a span.
643    pub max_span_size: ByteSize,
644    /// The maximum payload size for an item container.
645    pub max_container_size: ByteSize,
646    /// The maximum payload size for a statsd metric.
647    pub max_statsd_size: ByteSize,
648    /// The maximum payload size for metric buckets.
649    pub max_metric_buckets_size: ByteSize,
650    /// The maximum payload size for a compressed replay.
651    pub max_replay_compressed_size: ByteSize,
652    /// The maximum payload size for an uncompressed replay.
653    #[serde(alias = "max_replay_size")]
654    max_replay_uncompressed_size: ByteSize,
655    /// The maximum size for a replay recording Kafka message.
656    pub max_replay_message_size: ByteSize,
657    /// The maximum number of threads to spawn for CPU and web work, each.
658    ///
659    /// The total number of threads spawned will roughly be `2 * max_thread_count`. Defaults to
660    /// the number of logical CPU cores on the host.
661    pub max_thread_count: usize,
662    /// Controls the maximum concurrency of each worker thread.
663    ///
664    /// Increasing the concurrency, can lead to a better utilization of worker threads by
665    /// increasing the amount of I/O done concurrently.
666    //
667    /// Currently has no effect on defaults to `1`.
668    pub max_pool_concurrency: usize,
669    /// The maximum number of seconds a query is allowed to take across retries. Individual requests
670    /// have lower timeouts. Defaults to 30 seconds.
671    pub query_timeout: u64,
672    /// The maximum number of seconds to wait for pending envelopes after receiving a shutdown
673    /// signal.
674    pub shutdown_timeout: u64,
675    /// Server keep-alive timeout in seconds.
676    ///
677    /// By default, keep-alive is set to 5 seconds.
678    pub keepalive_timeout: u64,
679    /// Server idle timeout in seconds.
680    ///
681    /// The idle timeout limits the amount of time a connection is kept open without activity.
682    /// Setting this too short may abort connections before Relay is able to send a response.
683    ///
684    /// By default there is no idle timeout.
685    pub idle_timeout: Option<u64>,
686    /// Sets the maximum number of concurrent connections.
687    ///
688    /// Upon reaching the limit, the server will stop accepting connections.
689    ///
690    /// By default there is no limit.
691    pub max_connections: Option<usize>,
692    /// The TCP listen backlog.
693    ///
694    /// Configures the TCP listen backlog for the listening socket of Relay.
695    /// See [`man listen(2)`](https://man7.org/linux/man-pages/man2/listen.2.html)
696    /// for a more detailed description of the listen backlog.
697    ///
698    /// Defaults to `1024`, a value [google has been using for a long time](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19f92a030ca6d772ab44b22ee6a01378a8cb32d4).
699    pub tcp_listen_backlog: u32,
700}
701
702impl Default for Limits {
703    fn default() -> Self {
704        Limits {
705            max_concurrent_requests: 100,
706            max_concurrent_queries: 5,
707            max_event_size: ByteSize::mebibytes(1),
708            max_attachment_size: ByteSize::mebibytes(200),
709            max_attachments_size: ByteSize::mebibytes(200),
710            max_client_reports_size: ByteSize::kibibytes(4),
711            max_check_in_size: ByteSize::kibibytes(100),
712            max_envelope_size: ByteSize::mebibytes(200),
713            max_session_count: 100,
714            max_span_count: 1000,
715            max_log_count: 1000,
716            max_trace_metric_count: 1000,
717            max_api_payload_size: ByteSize::mebibytes(20),
718            max_api_file_upload_size: ByteSize::mebibytes(40),
719            max_api_chunk_upload_size: ByteSize::mebibytes(100),
720            max_profile_size: ByteSize::mebibytes(50),
721            max_trace_metric_size: ByteSize::kibibytes(2),
722            max_log_size: ByteSize::mebibytes(1),
723            max_span_size: ByteSize::mebibytes(1),
724            max_container_size: ByteSize::mebibytes(3),
725            max_statsd_size: ByteSize::mebibytes(1),
726            max_metric_buckets_size: ByteSize::mebibytes(1),
727            max_replay_compressed_size: ByteSize::mebibytes(10),
728            max_replay_uncompressed_size: ByteSize::mebibytes(100),
729            max_replay_message_size: ByteSize::mebibytes(15),
730            max_thread_count: num_cpus::get(),
731            max_pool_concurrency: 1,
732            query_timeout: 30,
733            shutdown_timeout: 10,
734            keepalive_timeout: 5,
735            idle_timeout: None,
736            max_connections: None,
737            tcp_listen_backlog: 1024,
738        }
739    }
740}
741
742/// Controls traffic steering.
743#[derive(Debug, Default, Deserialize, Serialize)]
744#[serde(default)]
745pub struct Routing {
746    /// Accept and forward unknown Envelope items to the upstream.
747    ///
748    /// Forwarding unknown items should be enabled in most cases to allow proxying traffic for newer
749    /// SDK versions. The upstream in Sentry makes the final decision on which items are valid. If
750    /// this is disabled, just the unknown items are removed from Envelopes, and the rest is
751    /// processed as usual.
752    ///
753    /// Defaults to `true` for all Relay modes other than processing mode. In processing mode, this
754    /// is disabled by default since the item cannot be handled.
755    pub accept_unknown_items: Option<bool>,
756}
757
758/// Http content encoding for both incoming and outgoing web requests.
759#[derive(Clone, Copy, Debug, Default, Deserialize, Serialize)]
760#[serde(rename_all = "lowercase")]
761pub enum HttpEncoding {
762    /// Identity function without no compression.
763    ///
764    /// This is the default encoding and does not require the presence of the `content-encoding`
765    /// HTTP header.
766    #[default]
767    Identity,
768    /// Compression using a [zlib](https://en.wikipedia.org/wiki/Zlib) structure with
769    /// [deflate](https://en.wikipedia.org/wiki/DEFLATE) encoding.
770    ///
771    /// These structures are defined in [RFC 1950](https://datatracker.ietf.org/doc/html/rfc1950)
772    /// and [RFC 1951](https://datatracker.ietf.org/doc/html/rfc1951).
773    Deflate,
774    /// A format using the [Lempel-Ziv coding](https://en.wikipedia.org/wiki/LZ77_and_LZ78#LZ77)
775    /// (LZ77), with a 32-bit CRC.
776    ///
777    /// This is the original format of the UNIX gzip program. The HTTP/1.1 standard also recommends
778    /// that the servers supporting this content-encoding should recognize `x-gzip` as an alias, for
779    /// compatibility purposes.
780    Gzip,
781    /// A format using the [Brotli](https://en.wikipedia.org/wiki/Brotli) algorithm.
782    Br,
783    /// A format using the [Zstd](https://en.wikipedia.org/wiki/Zstd) compression algorithm.
784    Zstd,
785}
786
787impl HttpEncoding {
788    /// Parses a [`HttpEncoding`] from its `content-encoding` header value.
789    pub fn parse(str: &str) -> Self {
790        let str = str.trim();
791        if str.eq_ignore_ascii_case("zstd") {
792            Self::Zstd
793        } else if str.eq_ignore_ascii_case("br") {
794            Self::Br
795        } else if str.eq_ignore_ascii_case("gzip") || str.eq_ignore_ascii_case("x-gzip") {
796            Self::Gzip
797        } else if str.eq_ignore_ascii_case("deflate") {
798            Self::Deflate
799        } else {
800            Self::Identity
801        }
802    }
803
804    /// Returns the value for the `content-encoding` HTTP header.
805    ///
806    /// Returns `None` for [`Identity`](Self::Identity), and `Some` for other encodings.
807    pub fn name(&self) -> Option<&'static str> {
808        match self {
809            Self::Identity => None,
810            Self::Deflate => Some("deflate"),
811            Self::Gzip => Some("gzip"),
812            Self::Br => Some("br"),
813            Self::Zstd => Some("zstd"),
814        }
815    }
816}
817
818/// Controls authentication with upstream.
819#[derive(Serialize, Deserialize, Debug)]
820#[serde(default)]
821pub struct Http {
822    /// Timeout for upstream requests in seconds.
823    ///
824    /// This timeout covers the time from sending the request until receiving response headers.
825    /// Neither the connection process and handshakes, nor reading the response body is covered in
826    /// this timeout.
827    pub timeout: u32,
828    /// Timeout for establishing connections with the upstream in seconds.
829    ///
830    /// This includes SSL handshakes. Relay reuses connections when the upstream supports connection
831    /// keep-alive. Connections are retained for a maximum 75 seconds, or 15 seconds of inactivity.
832    pub connection_timeout: u32,
833    /// Maximum interval between failed request retries in seconds.
834    pub max_retry_interval: u32,
835    /// The custom HTTP Host header to send to the upstream.
836    pub host_header: Option<String>,
837    /// The interval in seconds at which Relay attempts to reauthenticate with the upstream server.
838    ///
839    /// Re-authentication happens even when Relay is idle. If authentication fails, Relay reverts
840    /// back into startup mode and tries to establish a connection. During this time, incoming
841    /// envelopes will be buffered.
842    ///
843    /// Defaults to `600` (10 minutes).
844    pub auth_interval: Option<u64>,
845    /// The maximum time of experiencing uninterrupted network failures until Relay considers that
846    /// it has encountered a network outage in seconds.
847    ///
848    /// During a network outage relay will try to reconnect and will buffer all upstream messages
849    /// until it manages to reconnect.
850    pub outage_grace_period: u64,
851    /// The time Relay waits before retrying an upstream request, in seconds.
852    ///
853    /// This time is only used before going into a network outage mode.
854    pub retry_delay: u64,
855    /// The interval in seconds for continued failed project fetches at which Relay will error.
856    ///
857    /// A successful fetch resets this interval. Relay does nothing during long
858    /// times without emitting requests.
859    pub project_failure_interval: u64,
860    /// Content encoding to apply to upstream store requests.
861    ///
862    /// By default, Relay applies `zstd` content encoding to compress upstream requests. Compression
863    /// can be disabled to reduce CPU consumption, but at the expense of increased network traffic.
864    ///
865    /// This setting applies to all store requests of SDK data, including events, transactions,
866    /// envelopes and sessions. At the moment, this does not apply to Relay's internal queries.
867    ///
868    /// Available options are:
869    ///
870    ///  - `identity`: Disables compression.
871    ///  - `deflate`: Compression using a zlib header with deflate encoding.
872    ///  - `gzip` (default): Compression using gzip.
873    ///  - `br`: Compression using the brotli algorithm.
874    ///  - `zstd`: Compression using the zstd algorithm.
875    pub encoding: HttpEncoding,
876    /// Submit metrics globally through a shared endpoint.
877    ///
878    /// As opposed to regular envelopes which are sent to an endpoint inferred from the project's
879    /// DSN, this submits metrics to the global endpoint with Relay authentication.
880    ///
881    /// This option does not have any effect on processing mode.
882    pub global_metrics: bool,
883}
884
885impl Default for Http {
886    fn default() -> Self {
887        Http {
888            timeout: 5,
889            connection_timeout: 3,
890            max_retry_interval: 60, // 1 minute
891            host_header: None,
892            auth_interval: Some(600), // 10 minutes
893            outage_grace_period: DEFAULT_NETWORK_OUTAGE_GRACE_PERIOD,
894            retry_delay: default_retry_delay(),
895            project_failure_interval: default_project_failure_interval(),
896            encoding: HttpEncoding::Zstd,
897            global_metrics: false,
898        }
899    }
900}
901
902/// Default for unavailable upstream retry period, 1s.
903fn default_retry_delay() -> u64 {
904    1
905}
906
907/// Default for project failure interval, 90s.
908fn default_project_failure_interval() -> u64 {
909    90
910}
911
912/// Default for max disk size, 500 MB.
913fn spool_envelopes_max_disk_size() -> ByteSize {
914    ByteSize::mebibytes(500)
915}
916
917/// Default number of encoded envelope bytes to cache before writing to disk.
918fn spool_envelopes_batch_size_bytes() -> ByteSize {
919    ByteSize::kibibytes(10)
920}
921
922fn spool_envelopes_max_envelope_delay_secs() -> u64 {
923    24 * 60 * 60
924}
925
926/// Default refresh frequency in ms for the disk usage monitoring.
927fn spool_disk_usage_refresh_frequency_ms() -> u64 {
928    100
929}
930
931/// Default bounded buffer size for handling backpressure.
932fn spool_max_backpressure_envelopes() -> usize {
933    500
934}
935
936/// Default max memory usage for unspooling.
937fn spool_max_backpressure_memory_percent() -> f32 {
938    0.9
939}
940
941/// Default number of partitions for the buffer.
942fn spool_envelopes_partitions() -> NonZeroU8 {
943    NonZeroU8::new(1).unwrap()
944}
945
946/// Persistent buffering configuration for incoming envelopes.
947#[derive(Debug, Serialize, Deserialize)]
948pub struct EnvelopeSpool {
949    /// The path of the SQLite database file(s) which persist the data.
950    ///
951    /// Based on the number of partitions, more database files will be created within the same path.
952    ///
953    /// If not set, the envelopes will be buffered in memory.
954    pub path: Option<PathBuf>,
955    /// The maximum size of the buffer to keep, in bytes.
956    ///
957    /// When the on-disk buffer reaches this size, new envelopes will be dropped.
958    ///
959    /// Defaults to 500MB.
960    #[serde(default = "spool_envelopes_max_disk_size")]
961    pub max_disk_size: ByteSize,
962    /// Size of the batch of compressed envelopes that are spooled to disk at once.
963    ///
964    /// Note that this is the size after which spooling will be triggered but it does not guarantee
965    /// that exactly this size will be spooled, it can be greater or equal.
966    ///
967    /// Defaults to 10 KiB.
968    #[serde(default = "spool_envelopes_batch_size_bytes")]
969    pub batch_size_bytes: ByteSize,
970    /// Maximum time between receiving the envelope and processing it.
971    ///
972    /// When envelopes spend too much time in the buffer (e.g. because their project cannot be loaded),
973    /// they are dropped.
974    ///
975    /// Defaults to 24h.
976    #[serde(default = "spool_envelopes_max_envelope_delay_secs")]
977    pub max_envelope_delay_secs: u64,
978    /// The refresh frequency in ms of how frequently disk usage is updated by querying SQLite
979    /// internal page stats.
980    ///
981    /// Defaults to 100ms.
982    #[serde(default = "spool_disk_usage_refresh_frequency_ms")]
983    pub disk_usage_refresh_frequency_ms: u64,
984    /// The amount of envelopes that the envelope buffer can push to its output queue.
985    ///
986    /// Defaults to 500.
987    #[serde(default = "spool_max_backpressure_envelopes")]
988    pub max_backpressure_envelopes: usize,
989    /// The relative memory usage above which the buffer service will stop dequeueing envelopes.
990    ///
991    /// Only applies when [`Self::path`] is set.
992    ///
993    /// This value should be lower than [`Health::max_memory_percent`] to prevent flip-flopping.
994    ///
995    /// Warning: This threshold can cause the buffer service to deadlock when the buffer consumes
996    /// excessive memory (as influenced by [`Self::batch_size_bytes`]).
997    ///
998    /// This scenario arises when the buffer stops spooling due to reaching the
999    /// [`Self::max_backpressure_memory_percent`] limit, but the batch threshold for spooling
1000    /// ([`Self::batch_size_bytes`]) is never reached. As a result, no data is spooled, memory usage
1001    /// continues to grow, and the system becomes deadlocked.
1002    ///
1003    /// ### Example
1004    /// Suppose the system has 1GB of available memory and is configured to spool only after
1005    /// accumulating 10GB worth of envelopes. If Relay consumes 900MB of memory, it will stop
1006    /// unspooling due to reaching the [`Self::max_backpressure_memory_percent`] threshold.
1007    ///
1008    /// However, because the buffer hasn't accumulated the 10GB needed to trigger spooling,
1009    /// no data will be offloaded. Memory usage keeps increasing until it hits the
1010    /// [`Health::max_memory_percent`] threshold, e.g., at 950MB. At this point:
1011    ///
1012    /// - No more envelopes are accepted.
1013    /// - The buffer remains stuck, as unspooling won’t resume until memory drops below 900MB which
1014    ///   will not happen.
1015    /// - A deadlock occurs, with the system unable to recover without manual intervention.
1016    ///
1017    /// Defaults to 90% (5% less than max memory).
1018    #[serde(default = "spool_max_backpressure_memory_percent")]
1019    pub max_backpressure_memory_percent: f32,
1020    /// Number of partitions of the buffer.
1021    ///
1022    /// A partition is a separate instance of the buffer which has its own isolated queue, stacks
1023    /// and other resources.
1024    ///
1025    /// Defaults to 1.
1026    #[serde(default = "spool_envelopes_partitions")]
1027    pub partitions: NonZeroU8,
1028}
1029
1030impl Default for EnvelopeSpool {
1031    fn default() -> Self {
1032        Self {
1033            path: None,
1034            max_disk_size: spool_envelopes_max_disk_size(),
1035            batch_size_bytes: spool_envelopes_batch_size_bytes(),
1036            max_envelope_delay_secs: spool_envelopes_max_envelope_delay_secs(),
1037            disk_usage_refresh_frequency_ms: spool_disk_usage_refresh_frequency_ms(),
1038            max_backpressure_envelopes: spool_max_backpressure_envelopes(),
1039            max_backpressure_memory_percent: spool_max_backpressure_memory_percent(),
1040            partitions: spool_envelopes_partitions(),
1041        }
1042    }
1043}
1044
1045/// Persistent buffering configuration.
1046#[derive(Debug, Serialize, Deserialize, Default)]
1047pub struct Spool {
1048    /// Configuration for envelope spooling.
1049    #[serde(default)]
1050    pub envelopes: EnvelopeSpool,
1051}
1052
1053/// Controls internal caching behavior.
1054#[derive(Serialize, Deserialize, Debug)]
1055#[serde(default)]
1056pub struct Cache {
1057    /// The full project state will be requested by this Relay if set to `true`.
1058    pub project_request_full_config: bool,
1059    /// The cache timeout for project configurations in seconds.
1060    pub project_expiry: u32,
1061    /// Continue using project state this many seconds after cache expiry while a new state is
1062    /// being fetched. This is added on top of `project_expiry`.
1063    ///
1064    /// Default is 2 minutes.
1065    pub project_grace_period: u32,
1066    /// Refresh a project after the specified seconds.
1067    ///
1068    /// The time must be between expiry time and the grace period.
1069    ///
1070    /// By default there are no refreshes enabled.
1071    pub project_refresh_interval: Option<u32>,
1072    /// The cache timeout for downstream relay info (public keys) in seconds.
1073    pub relay_expiry: u32,
1074    /// Unused cache timeout for envelopes.
1075    ///
1076    /// The envelope buffer is instead controlled by `envelope_buffer_size`, which controls the
1077    /// maximum number of envelopes in the buffer. A time based configuration may be re-introduced
1078    /// at a later point.
1079    #[serde(alias = "event_expiry")]
1080    envelope_expiry: u32,
1081    /// The maximum amount of envelopes to queue before dropping them.
1082    #[serde(alias = "event_buffer_size")]
1083    envelope_buffer_size: u32,
1084    /// The cache timeout for non-existing entries.
1085    pub miss_expiry: u32,
1086    /// The buffer timeout for batched project config queries before sending them upstream in ms.
1087    pub batch_interval: u32,
1088    /// The buffer timeout for batched queries of downstream relays in ms. Defaults to 100ms.
1089    pub downstream_relays_batch_interval: u32,
1090    /// The maximum number of project configs to fetch from Sentry at once. Defaults to 500.
1091    ///
1092    /// `cache.batch_interval` controls how quickly batches are sent, this controls the batch size.
1093    pub batch_size: usize,
1094    /// Interval for watching local cache override files in seconds.
1095    pub file_interval: u32,
1096    /// Interval for fetching new global configs from the upstream, in seconds.
1097    pub global_config_fetch_interval: u32,
1098}
1099
1100impl Default for Cache {
1101    fn default() -> Self {
1102        Cache {
1103            project_request_full_config: false,
1104            project_expiry: 300,       // 5 minutes
1105            project_grace_period: 120, // 2 minutes
1106            project_refresh_interval: None,
1107            relay_expiry: 3600,   // 1 hour
1108            envelope_expiry: 600, // 10 minutes
1109            envelope_buffer_size: 1000,
1110            miss_expiry: 60,                       // 1 minute
1111            batch_interval: 100,                   // 100ms
1112            downstream_relays_batch_interval: 100, // 100ms
1113            batch_size: 500,
1114            file_interval: 10,                // 10 seconds
1115            global_config_fetch_interval: 10, // 10 seconds
1116        }
1117    }
1118}
1119
1120fn default_max_secs_in_future() -> u32 {
1121    60 // 1 minute
1122}
1123
1124fn default_max_session_secs_in_past() -> u32 {
1125    5 * 24 * 3600 // 5 days
1126}
1127
1128fn default_chunk_size() -> ByteSize {
1129    ByteSize::mebibytes(1)
1130}
1131
1132fn default_projectconfig_cache_prefix() -> String {
1133    "relayconfig".to_owned()
1134}
1135
1136#[allow(clippy::unnecessary_wraps)]
1137fn default_max_rate_limit() -> Option<u32> {
1138    Some(300) // 5 minutes
1139}
1140
1141/// Controls Sentry-internal event processing.
1142#[derive(Serialize, Deserialize, Debug)]
1143pub struct Processing {
1144    /// True if the Relay should do processing. Defaults to `false`.
1145    pub enabled: bool,
1146    /// GeoIp DB file source.
1147    #[serde(default)]
1148    pub geoip_path: Option<PathBuf>,
1149    /// Maximum future timestamp of ingested events.
1150    #[serde(default = "default_max_secs_in_future")]
1151    pub max_secs_in_future: u32,
1152    /// Maximum age of ingested sessions. Older sessions will be dropped.
1153    #[serde(default = "default_max_session_secs_in_past")]
1154    pub max_session_secs_in_past: u32,
1155    /// Kafka producer configurations.
1156    pub kafka_config: Vec<KafkaConfigParam>,
1157    /// Additional kafka producer configurations.
1158    ///
1159    /// The `kafka_config` is the default producer configuration used for all topics. A secondary
1160    /// kafka config can be referenced in `topics:` like this:
1161    ///
1162    /// ```yaml
1163    /// secondary_kafka_configs:
1164    ///   mycustomcluster:
1165    ///     - name: 'bootstrap.servers'
1166    ///       value: 'sentry_kafka_metrics:9093'
1167    ///
1168    /// topics:
1169    ///   transactions: ingest-transactions
1170    ///   metrics:
1171    ///     name: ingest-metrics
1172    ///     config: mycustomcluster
1173    /// ```
1174    ///
1175    /// Then metrics will be produced to an entirely different Kafka cluster.
1176    #[serde(default)]
1177    pub secondary_kafka_configs: BTreeMap<String, Vec<KafkaConfigParam>>,
1178    /// Kafka topic names.
1179    #[serde(default)]
1180    pub topics: TopicAssignments,
1181    /// Whether to validate the supplied topics by calling Kafka's metadata endpoints.
1182    #[serde(default)]
1183    pub kafka_validate_topics: bool,
1184    /// Redis hosts to connect to for storing state for rate limits.
1185    #[serde(default)]
1186    pub redis: Option<RedisConfigs>,
1187    /// Maximum chunk size of attachments for Kafka.
1188    #[serde(default = "default_chunk_size")]
1189    pub attachment_chunk_size: ByteSize,
1190    /// Prefix to use when looking up project configs in Redis. Defaults to "relayconfig".
1191    #[serde(default = "default_projectconfig_cache_prefix")]
1192    pub projectconfig_cache_prefix: String,
1193    /// Maximum rate limit to report to clients.
1194    #[serde(default = "default_max_rate_limit")]
1195    pub max_rate_limit: Option<u32>,
1196    /// Configuration for attachment uploads.
1197    #[serde(default)]
1198    pub upload: UploadServiceConfig,
1199}
1200
1201impl Default for Processing {
1202    /// Constructs a disabled processing configuration.
1203    fn default() -> Self {
1204        Self {
1205            enabled: false,
1206            geoip_path: None,
1207            max_secs_in_future: default_max_secs_in_future(),
1208            max_session_secs_in_past: default_max_session_secs_in_past(),
1209            kafka_config: Vec::new(),
1210            secondary_kafka_configs: BTreeMap::new(),
1211            topics: TopicAssignments::default(),
1212            kafka_validate_topics: false,
1213            redis: None,
1214            attachment_chunk_size: default_chunk_size(),
1215            projectconfig_cache_prefix: default_projectconfig_cache_prefix(),
1216            max_rate_limit: default_max_rate_limit(),
1217            upload: UploadServiceConfig::default(),
1218        }
1219    }
1220}
1221
1222/// Configuration for normalization in this Relay.
1223#[derive(Debug, Default, Serialize, Deserialize)]
1224#[serde(default)]
1225pub struct Normalization {
1226    /// Level of normalization for Relay to apply to incoming data.
1227    #[serde(default)]
1228    pub level: NormalizationLevel,
1229}
1230
1231/// Configuration for the level of normalization this Relay should do.
1232#[derive(Copy, Clone, Debug, Default, Serialize, Deserialize, Eq, PartialEq)]
1233#[serde(rename_all = "lowercase")]
1234pub enum NormalizationLevel {
1235    /// Runs normalization, excluding steps that break future compatibility.
1236    ///
1237    /// Processing Relays run [`NormalizationLevel::Full`] if this option is set.
1238    #[default]
1239    Default,
1240    /// Run full normalization.
1241    ///
1242    /// It includes steps that break future compatibility and should only run in
1243    /// the last layer of relays.
1244    Full,
1245}
1246
1247/// Configuration values for the outcome aggregator
1248#[derive(Serialize, Deserialize, Debug)]
1249#[serde(default)]
1250pub struct OutcomeAggregatorConfig {
1251    /// Defines the width of the buckets into which outcomes are aggregated, in seconds.
1252    pub bucket_interval: u64,
1253    /// Defines how often all buckets are flushed, in seconds.
1254    pub flush_interval: u64,
1255}
1256
1257impl Default for OutcomeAggregatorConfig {
1258    fn default() -> Self {
1259        Self {
1260            bucket_interval: 60,
1261            flush_interval: 120,
1262        }
1263    }
1264}
1265
1266/// Configuration values for attachment uploads.
1267#[derive(Serialize, Deserialize, Debug)]
1268#[serde(default)]
1269pub struct UploadServiceConfig {
1270    /// Maximum concurrency of uploads.
1271    pub max_concurrent_requests: usize,
1272
1273    /// Maximum duration of an attachment upload in seconds. Uploads that take longer are discarded.
1274    pub timeout: u64,
1275}
1276
1277impl Default for UploadServiceConfig {
1278    fn default() -> Self {
1279        Self {
1280            max_concurrent_requests: 100,
1281            timeout: 60,
1282        }
1283    }
1284}
1285
1286/// Determines how to emit outcomes.
1287/// For compatibility reasons, this can either be true, false or AsClientReports
1288#[derive(Copy, Clone, Debug, PartialEq, Eq)]
1289
1290pub enum EmitOutcomes {
1291    /// Do not emit any outcomes
1292    None,
1293    /// Emit outcomes as client reports
1294    AsClientReports,
1295    /// Emit outcomes as outcomes
1296    AsOutcomes,
1297}
1298
1299impl EmitOutcomes {
1300    /// Returns true of outcomes are emitted via http, kafka, or client reports.
1301    pub fn any(&self) -> bool {
1302        !matches!(self, EmitOutcomes::None)
1303    }
1304}
1305
1306impl Serialize for EmitOutcomes {
1307    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
1308    where
1309        S: Serializer,
1310    {
1311        // For compatibility, serialize None and AsOutcomes as booleans.
1312        match self {
1313            Self::None => serializer.serialize_bool(false),
1314            Self::AsClientReports => serializer.serialize_str("as_client_reports"),
1315            Self::AsOutcomes => serializer.serialize_bool(true),
1316        }
1317    }
1318}
1319
1320struct EmitOutcomesVisitor;
1321
1322impl Visitor<'_> for EmitOutcomesVisitor {
1323    type Value = EmitOutcomes;
1324
1325    fn expecting(&self, formatter: &mut fmt::Formatter) -> fmt::Result {
1326        formatter.write_str("true, false, or 'as_client_reports'")
1327    }
1328
1329    fn visit_bool<E>(self, v: bool) -> Result<Self::Value, E>
1330    where
1331        E: serde::de::Error,
1332    {
1333        Ok(if v {
1334            EmitOutcomes::AsOutcomes
1335        } else {
1336            EmitOutcomes::None
1337        })
1338    }
1339
1340    fn visit_str<E>(self, v: &str) -> Result<Self::Value, E>
1341    where
1342        E: serde::de::Error,
1343    {
1344        if v == "as_client_reports" {
1345            Ok(EmitOutcomes::AsClientReports)
1346        } else {
1347            Err(E::invalid_value(Unexpected::Str(v), &"as_client_reports"))
1348        }
1349    }
1350}
1351
1352impl<'de> Deserialize<'de> for EmitOutcomes {
1353    fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
1354    where
1355        D: Deserializer<'de>,
1356    {
1357        deserializer.deserialize_any(EmitOutcomesVisitor)
1358    }
1359}
1360
1361/// Outcome generation specific configuration values.
1362#[derive(Serialize, Deserialize, Debug)]
1363#[serde(default)]
1364pub struct Outcomes {
1365    /// Controls whether outcomes will be emitted when processing is disabled.
1366    /// Processing relays always emit outcomes (for backwards compatibility).
1367    /// Can take the following values: false, "as_client_reports", true
1368    pub emit_outcomes: EmitOutcomes,
1369    /// Controls wheather client reported outcomes should be emitted.
1370    pub emit_client_outcomes: bool,
1371    /// The maximum number of outcomes that are batched before being sent
1372    /// via http to the upstream (only applies to non processing relays).
1373    pub batch_size: usize,
1374    /// The maximum time interval (in milliseconds) that an outcome may be batched
1375    /// via http to the upstream (only applies to non processing relays).
1376    pub batch_interval: u64,
1377    /// Defines the source string registered in the outcomes originating from
1378    /// this Relay (typically something like the region or the layer).
1379    pub source: Option<String>,
1380    /// Configures the outcome aggregator.
1381    pub aggregator: OutcomeAggregatorConfig,
1382}
1383
1384impl Default for Outcomes {
1385    fn default() -> Self {
1386        Outcomes {
1387            emit_outcomes: EmitOutcomes::AsClientReports,
1388            emit_client_outcomes: true,
1389            batch_size: 1000,
1390            batch_interval: 500,
1391            source: None,
1392            aggregator: OutcomeAggregatorConfig::default(),
1393        }
1394    }
1395}
1396
1397/// Minimal version of a config for dumping out.
1398#[derive(Serialize, Deserialize, Debug, Default)]
1399pub struct MinimalConfig {
1400    /// The relay part of the config.
1401    pub relay: Relay,
1402}
1403
1404impl MinimalConfig {
1405    /// Saves the config in the given config folder as config.yml
1406    pub fn save_in_folder<P: AsRef<Path>>(&self, p: P) -> anyhow::Result<()> {
1407        let path = p.as_ref();
1408        if fs::metadata(path).is_err() {
1409            fs::create_dir_all(path)
1410                .with_context(|| ConfigError::file(ConfigErrorKind::CouldNotOpenFile, path))?;
1411        }
1412        self.save(path)
1413    }
1414}
1415
1416impl ConfigObject for MinimalConfig {
1417    fn format() -> ConfigFormat {
1418        ConfigFormat::Yaml
1419    }
1420
1421    fn name() -> &'static str {
1422        "config"
1423    }
1424}
1425
1426/// Alternative serialization of RelayInfo for config file using snake case.
1427mod config_relay_info {
1428    use serde::ser::SerializeMap;
1429
1430    use super::*;
1431
1432    // Uses snake_case as opposed to camelCase.
1433    #[derive(Debug, Serialize, Deserialize, Clone)]
1434    struct RelayInfoConfig {
1435        public_key: PublicKey,
1436        #[serde(default)]
1437        internal: bool,
1438    }
1439
1440    impl From<RelayInfoConfig> for RelayInfo {
1441        fn from(v: RelayInfoConfig) -> Self {
1442            RelayInfo {
1443                public_key: v.public_key,
1444                internal: v.internal,
1445            }
1446        }
1447    }
1448
1449    impl From<RelayInfo> for RelayInfoConfig {
1450        fn from(v: RelayInfo) -> Self {
1451            RelayInfoConfig {
1452                public_key: v.public_key,
1453                internal: v.internal,
1454            }
1455        }
1456    }
1457
1458    pub(super) fn deserialize<'de, D>(des: D) -> Result<HashMap<RelayId, RelayInfo>, D::Error>
1459    where
1460        D: Deserializer<'de>,
1461    {
1462        let map = HashMap::<RelayId, RelayInfoConfig>::deserialize(des)?;
1463        Ok(map.into_iter().map(|(k, v)| (k, v.into())).collect())
1464    }
1465
1466    pub(super) fn serialize<S>(elm: &HashMap<RelayId, RelayInfo>, ser: S) -> Result<S::Ok, S::Error>
1467    where
1468        S: Serializer,
1469    {
1470        let mut map = ser.serialize_map(Some(elm.len()))?;
1471
1472        for (k, v) in elm {
1473            map.serialize_entry(k, &RelayInfoConfig::from(v.clone()))?;
1474        }
1475
1476        map.end()
1477    }
1478}
1479
1480/// Authentication options.
1481#[derive(Serialize, Deserialize, Debug, Default)]
1482pub struct AuthConfig {
1483    /// Controls responses from the readiness health check endpoint based on authentication.
1484    #[serde(default, skip_serializing_if = "is_default")]
1485    pub ready: ReadinessCondition,
1486
1487    /// Statically authenticated downstream relays.
1488    #[serde(default, with = "config_relay_info")]
1489    pub static_relays: HashMap<RelayId, RelayInfo>,
1490
1491    /// How old a signature can be before it is considered invalid, in seconds.
1492    ///
1493    /// Defaults to 5 minutes.
1494    #[serde(default = "default_max_age")]
1495    pub signature_max_age: u64,
1496}
1497
1498fn default_max_age() -> u64 {
1499    300
1500}
1501
1502/// GeoIp database configuration options.
1503#[derive(Serialize, Deserialize, Debug, Default)]
1504pub struct GeoIpConfig {
1505    /// The path to GeoIP database.
1506    pub path: Option<PathBuf>,
1507}
1508
1509/// Cardinality Limiter configuration options.
1510#[derive(Serialize, Deserialize, Debug)]
1511#[serde(default)]
1512pub struct CardinalityLimiter {
1513    /// Cache vacuum interval in seconds for the in memory cache.
1514    ///
1515    /// The cache will scan for expired values based on this interval.
1516    ///
1517    /// Defaults to 180 seconds, 3 minutes.
1518    pub cache_vacuum_interval: u64,
1519}
1520
1521impl Default for CardinalityLimiter {
1522    fn default() -> Self {
1523        Self {
1524            cache_vacuum_interval: 180,
1525        }
1526    }
1527}
1528
1529/// Settings to control Relay's health checks.
1530///
1531/// After breaching one of the configured thresholds, Relay will
1532/// return an `unhealthy` status from its health endpoint.
1533#[derive(Serialize, Deserialize, Debug)]
1534#[serde(default)]
1535pub struct Health {
1536    /// Interval to refresh internal health checks.
1537    ///
1538    /// Shorter intervals will decrease the time it takes the health check endpoint to report
1539    /// issues, but can also increase sporadic unhealthy responses.
1540    ///
1541    /// Defaults to `3000`` (3 seconds).
1542    pub refresh_interval_ms: u64,
1543    /// Maximum memory watermark in bytes.
1544    ///
1545    /// By default, there is no absolute limit set and the watermark
1546    /// is only controlled by setting [`Self::max_memory_percent`].
1547    pub max_memory_bytes: Option<ByteSize>,
1548    /// Maximum memory watermark as a percentage of maximum system memory.
1549    ///
1550    /// Defaults to `0.95` (95%).
1551    pub max_memory_percent: f32,
1552    /// Health check probe timeout in milliseconds.
1553    ///
1554    /// Any probe exceeding the timeout will be considered failed.
1555    /// This limits the max execution time of Relay health checks.
1556    ///
1557    /// Defaults to 900 milliseconds.
1558    pub probe_timeout_ms: u64,
1559    /// The refresh frequency of memory stats which are used to poll memory
1560    /// usage of Relay.
1561    ///
1562    /// The implementation of memory stats guarantees that the refresh will happen at
1563    /// least every `x` ms since memory readings are lazy and are updated only if needed.
1564    pub memory_stat_refresh_frequency_ms: u64,
1565}
1566
1567impl Default for Health {
1568    fn default() -> Self {
1569        Self {
1570            refresh_interval_ms: 3000,
1571            max_memory_bytes: None,
1572            max_memory_percent: 0.95,
1573            probe_timeout_ms: 900,
1574            memory_stat_refresh_frequency_ms: 100,
1575        }
1576    }
1577}
1578
1579/// COGS configuration.
1580#[derive(Serialize, Deserialize, Debug)]
1581#[serde(default)]
1582pub struct Cogs {
1583    /// Maximium amount of COGS measurements allowed to backlog.
1584    ///
1585    /// Any additional COGS measurements recorded will be dropped.
1586    ///
1587    /// Defaults to `10_000`.
1588    pub max_queue_size: u64,
1589    /// Relay COGS resource id.
1590    ///
1591    /// All Relay related COGS measurements are emitted with this resource id.
1592    ///
1593    /// Defaults to `relay_service`.
1594    pub relay_resource_id: String,
1595}
1596
1597impl Default for Cogs {
1598    fn default() -> Self {
1599        Self {
1600            max_queue_size: 10_000,
1601            relay_resource_id: "relay_service".to_owned(),
1602        }
1603    }
1604}
1605
1606#[derive(Serialize, Deserialize, Debug, Default)]
1607struct ConfigValues {
1608    #[serde(default)]
1609    relay: Relay,
1610    #[serde(default)]
1611    http: Http,
1612    #[serde(default)]
1613    cache: Cache,
1614    #[serde(default)]
1615    spool: Spool,
1616    #[serde(default)]
1617    limits: Limits,
1618    #[serde(default)]
1619    logging: relay_log::LogConfig,
1620    #[serde(default)]
1621    routing: Routing,
1622    #[serde(default)]
1623    metrics: Metrics,
1624    #[serde(default)]
1625    sentry: relay_log::SentryConfig,
1626    #[serde(default)]
1627    processing: Processing,
1628    #[serde(default)]
1629    outcomes: Outcomes,
1630    #[serde(default)]
1631    aggregator: AggregatorServiceConfig,
1632    #[serde(default)]
1633    secondary_aggregators: Vec<ScopedAggregatorConfig>,
1634    #[serde(default)]
1635    auth: AuthConfig,
1636    #[serde(default)]
1637    geoip: GeoIpConfig,
1638    #[serde(default)]
1639    normalization: Normalization,
1640    #[serde(default)]
1641    cardinality_limiter: CardinalityLimiter,
1642    #[serde(default)]
1643    health: Health,
1644    #[serde(default)]
1645    cogs: Cogs,
1646}
1647
1648impl ConfigObject for ConfigValues {
1649    fn format() -> ConfigFormat {
1650        ConfigFormat::Yaml
1651    }
1652
1653    fn name() -> &'static str {
1654        "config"
1655    }
1656}
1657
1658/// Config struct.
1659pub struct Config {
1660    values: ConfigValues,
1661    credentials: Option<Credentials>,
1662    path: PathBuf,
1663}
1664
1665impl fmt::Debug for Config {
1666    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
1667        f.debug_struct("Config")
1668            .field("path", &self.path)
1669            .field("values", &self.values)
1670            .finish()
1671    }
1672}
1673
1674impl Config {
1675    /// Loads a config from a given config folder.
1676    pub fn from_path<P: AsRef<Path>>(path: P) -> anyhow::Result<Config> {
1677        let path = env::current_dir()
1678            .map(|x| x.join(path.as_ref()))
1679            .unwrap_or_else(|_| path.as_ref().to_path_buf());
1680
1681        let config = Config {
1682            values: ConfigValues::load(&path)?,
1683            credentials: if Credentials::path(&path).exists() {
1684                Some(Credentials::load(&path)?)
1685            } else {
1686                None
1687            },
1688            path: path.clone(),
1689        };
1690
1691        if cfg!(not(feature = "processing")) && config.processing_enabled() {
1692            return Err(ConfigError::file(ConfigErrorKind::ProcessingNotAvailable, &path).into());
1693        }
1694
1695        Ok(config)
1696    }
1697
1698    /// Creates a config from a JSON value.
1699    ///
1700    /// This is mostly useful for tests.
1701    pub fn from_json_value(value: serde_json::Value) -> anyhow::Result<Config> {
1702        Ok(Config {
1703            values: serde_json::from_value(value)
1704                .with_context(|| ConfigError::new(ConfigErrorKind::BadJson))?,
1705            credentials: None,
1706            path: PathBuf::new(),
1707        })
1708    }
1709
1710    /// Override configuration with values coming from other sources (e.g. env variables or
1711    /// command line parameters)
1712    pub fn apply_override(
1713        &mut self,
1714        mut overrides: OverridableConfig,
1715    ) -> anyhow::Result<&mut Self> {
1716        let relay = &mut self.values.relay;
1717
1718        if let Some(mode) = overrides.mode {
1719            relay.mode = mode
1720                .parse::<RelayMode>()
1721                .with_context(|| ConfigError::field("mode"))?;
1722        }
1723
1724        if let Some(deployment) = overrides.instance {
1725            relay.instance = deployment
1726                .parse::<RelayInstance>()
1727                .with_context(|| ConfigError::field("deployment"))?;
1728        }
1729
1730        if let Some(log_level) = overrides.log_level {
1731            self.values.logging.level = log_level.parse()?;
1732        }
1733
1734        if let Some(log_format) = overrides.log_format {
1735            self.values.logging.format = log_format.parse()?;
1736        }
1737
1738        if let Some(upstream) = overrides.upstream {
1739            relay.upstream = upstream
1740                .parse::<UpstreamDescriptor>()
1741                .with_context(|| ConfigError::field("upstream"))?;
1742        } else if let Some(upstream_dsn) = overrides.upstream_dsn {
1743            relay.upstream = upstream_dsn
1744                .parse::<Dsn>()
1745                .map(|dsn| UpstreamDescriptor::from_dsn(&dsn).into_owned())
1746                .with_context(|| ConfigError::field("upstream_dsn"))?;
1747        }
1748
1749        if let Some(host) = overrides.host {
1750            relay.host = host
1751                .parse::<IpAddr>()
1752                .with_context(|| ConfigError::field("host"))?;
1753        }
1754
1755        if let Some(port) = overrides.port {
1756            relay.port = port
1757                .as_str()
1758                .parse()
1759                .with_context(|| ConfigError::field("port"))?;
1760        }
1761
1762        let processing = &mut self.values.processing;
1763        if let Some(enabled) = overrides.processing {
1764            match enabled.to_lowercase().as_str() {
1765                "true" | "1" => processing.enabled = true,
1766                "false" | "0" | "" => processing.enabled = false,
1767                _ => return Err(ConfigError::field("processing").into()),
1768            }
1769        }
1770
1771        if let Some(redis) = overrides.redis_url {
1772            processing.redis = Some(RedisConfigs::Unified(RedisConfig::single(redis)))
1773        }
1774
1775        if let Some(kafka_url) = overrides.kafka_url {
1776            let existing = processing
1777                .kafka_config
1778                .iter_mut()
1779                .find(|e| e.name == "bootstrap.servers");
1780
1781            if let Some(config_param) = existing {
1782                config_param.value = kafka_url;
1783            } else {
1784                processing.kafka_config.push(KafkaConfigParam {
1785                    name: "bootstrap.servers".to_owned(),
1786                    value: kafka_url,
1787                })
1788            }
1789        }
1790        // credentials overrides
1791        let id = if let Some(id) = overrides.id {
1792            let id = Uuid::parse_str(&id).with_context(|| ConfigError::field("id"))?;
1793            Some(id)
1794        } else {
1795            None
1796        };
1797        let public_key = if let Some(public_key) = overrides.public_key {
1798            let public_key = public_key
1799                .parse::<PublicKey>()
1800                .with_context(|| ConfigError::field("public_key"))?;
1801            Some(public_key)
1802        } else {
1803            None
1804        };
1805
1806        let secret_key = if let Some(secret_key) = overrides.secret_key {
1807            let secret_key = secret_key
1808                .parse::<SecretKey>()
1809                .with_context(|| ConfigError::field("secret_key"))?;
1810            Some(secret_key)
1811        } else {
1812            None
1813        };
1814        let outcomes = &mut self.values.outcomes;
1815        if overrides.outcome_source.is_some() {
1816            outcomes.source = overrides.outcome_source.take();
1817        }
1818
1819        if let Some(credentials) = &mut self.credentials {
1820            //we have existing credentials we may override some entries
1821            if let Some(id) = id {
1822                credentials.id = id;
1823            }
1824            if let Some(public_key) = public_key {
1825                credentials.public_key = public_key;
1826            }
1827            if let Some(secret_key) = secret_key {
1828                credentials.secret_key = secret_key
1829            }
1830        } else {
1831            //no existing credentials we may only create the full credentials
1832            match (id, public_key, secret_key) {
1833                (Some(id), Some(public_key), Some(secret_key)) => {
1834                    self.credentials = Some(Credentials {
1835                        secret_key,
1836                        public_key,
1837                        id,
1838                    })
1839                }
1840                (None, None, None) => {
1841                    // nothing provided, we'll just leave the credentials None, maybe we
1842                    // don't need them in the current command or we'll override them later
1843                }
1844                _ => {
1845                    return Err(ConfigError::field("incomplete credentials").into());
1846                }
1847            }
1848        }
1849
1850        let limits = &mut self.values.limits;
1851        if let Some(shutdown_timeout) = overrides.shutdown_timeout
1852            && let Ok(shutdown_timeout) = shutdown_timeout.parse::<u64>()
1853        {
1854            limits.shutdown_timeout = shutdown_timeout;
1855        }
1856
1857        if let Some(server_name) = overrides.server_name {
1858            self.values.sentry.server_name = Some(server_name.into());
1859        }
1860
1861        Ok(self)
1862    }
1863
1864    /// Checks if the config is already initialized.
1865    pub fn config_exists<P: AsRef<Path>>(path: P) -> bool {
1866        fs::metadata(ConfigValues::path(path.as_ref())).is_ok()
1867    }
1868
1869    /// Returns the filename of the config file.
1870    pub fn path(&self) -> &Path {
1871        &self.path
1872    }
1873
1874    /// Dumps out a YAML string of the values.
1875    pub fn to_yaml_string(&self) -> anyhow::Result<String> {
1876        serde_yaml::to_string(&self.values)
1877            .with_context(|| ConfigError::new(ConfigErrorKind::CouldNotWriteFile))
1878    }
1879
1880    /// Regenerates the relay credentials.
1881    ///
1882    /// This also writes the credentials back to the file.
1883    pub fn regenerate_credentials(&mut self, save: bool) -> anyhow::Result<()> {
1884        let creds = Credentials::generate();
1885        if save {
1886            creds.save(&self.path)?;
1887        }
1888        self.credentials = Some(creds);
1889        Ok(())
1890    }
1891
1892    /// Return the current credentials
1893    pub fn credentials(&self) -> Option<&Credentials> {
1894        self.credentials.as_ref()
1895    }
1896
1897    /// Set new credentials.
1898    ///
1899    /// This also writes the credentials back to the file.
1900    pub fn replace_credentials(
1901        &mut self,
1902        credentials: Option<Credentials>,
1903    ) -> anyhow::Result<bool> {
1904        if self.credentials == credentials {
1905            return Ok(false);
1906        }
1907
1908        match credentials {
1909            Some(ref creds) => {
1910                creds.save(&self.path)?;
1911            }
1912            None => {
1913                let path = Credentials::path(&self.path);
1914                if fs::metadata(&path).is_ok() {
1915                    fs::remove_file(&path).with_context(|| {
1916                        ConfigError::file(ConfigErrorKind::CouldNotWriteFile, &path)
1917                    })?;
1918                }
1919            }
1920        }
1921
1922        self.credentials = credentials;
1923        Ok(true)
1924    }
1925
1926    /// Returns `true` if the config is ready to use.
1927    pub fn has_credentials(&self) -> bool {
1928        self.credentials.is_some()
1929    }
1930
1931    /// Returns the secret key if set.
1932    pub fn secret_key(&self) -> Option<&SecretKey> {
1933        self.credentials.as_ref().map(|x| &x.secret_key)
1934    }
1935
1936    /// Returns the public key if set.
1937    pub fn public_key(&self) -> Option<&PublicKey> {
1938        self.credentials.as_ref().map(|x| &x.public_key)
1939    }
1940
1941    /// Returns the relay ID.
1942    pub fn relay_id(&self) -> Option<&RelayId> {
1943        self.credentials.as_ref().map(|x| &x.id)
1944    }
1945
1946    /// Returns the relay mode.
1947    pub fn relay_mode(&self) -> RelayMode {
1948        self.values.relay.mode
1949    }
1950
1951    /// Returns the instance type of relay.
1952    pub fn relay_instance(&self) -> RelayInstance {
1953        self.values.relay.instance
1954    }
1955
1956    /// Returns the upstream target as descriptor.
1957    pub fn upstream_descriptor(&self) -> &UpstreamDescriptor<'_> {
1958        &self.values.relay.upstream
1959    }
1960
1961    /// Returns the custom HTTP "Host" header.
1962    pub fn http_host_header(&self) -> Option<&str> {
1963        self.values.http.host_header.as_deref()
1964    }
1965
1966    /// Returns the listen address.
1967    pub fn listen_addr(&self) -> SocketAddr {
1968        (self.values.relay.host, self.values.relay.port).into()
1969    }
1970
1971    /// Returns the listen address for internal APIs.
1972    ///
1973    /// Internal APIs are APIs which do not need to be publicly exposed,
1974    /// like health checks.
1975    ///
1976    /// Returns `None` when there is no explicit address configured for internal APIs,
1977    /// and they should instead be exposed on the main [`Self::listen_addr`].
1978    pub fn listen_addr_internal(&self) -> Option<SocketAddr> {
1979        match (
1980            self.values.relay.internal_host,
1981            self.values.relay.internal_port,
1982        ) {
1983            (Some(host), None) => Some((host, self.values.relay.port).into()),
1984            (None, Some(port)) => Some((self.values.relay.host, port).into()),
1985            (Some(host), Some(port)) => Some((host, port).into()),
1986            (None, None) => None,
1987        }
1988    }
1989
1990    /// Returns the TLS listen address.
1991    pub fn tls_listen_addr(&self) -> Option<SocketAddr> {
1992        if self.values.relay.tls_identity_path.is_some() {
1993            let port = self.values.relay.tls_port.unwrap_or(3443);
1994            Some((self.values.relay.host, port).into())
1995        } else {
1996            None
1997        }
1998    }
1999
2000    /// Returns the path to the identity bundle
2001    pub fn tls_identity_path(&self) -> Option<&Path> {
2002        self.values.relay.tls_identity_path.as_deref()
2003    }
2004
2005    /// Returns the password for the identity bundle
2006    pub fn tls_identity_password(&self) -> Option<&str> {
2007        self.values.relay.tls_identity_password.as_deref()
2008    }
2009
2010    /// Returns `true` when project IDs should be overriden rather than validated.
2011    ///
2012    /// Defaults to `false`, which requires project ID validation.
2013    pub fn override_project_ids(&self) -> bool {
2014        self.values.relay.override_project_ids
2015    }
2016
2017    /// Returns `true` if Relay requires authentication for readiness.
2018    ///
2019    /// See [`ReadinessCondition`] for more information.
2020    pub fn requires_auth(&self) -> bool {
2021        match self.values.auth.ready {
2022            ReadinessCondition::Authenticated => self.relay_mode() == RelayMode::Managed,
2023            ReadinessCondition::Always => false,
2024        }
2025    }
2026
2027    /// Returns the interval at which Realy should try to re-authenticate with the upstream.
2028    ///
2029    /// Always disabled in processing mode.
2030    pub fn http_auth_interval(&self) -> Option<Duration> {
2031        if self.processing_enabled() {
2032            return None;
2033        }
2034
2035        match self.values.http.auth_interval {
2036            None | Some(0) => None,
2037            Some(secs) => Some(Duration::from_secs(secs)),
2038        }
2039    }
2040
2041    /// The maximum time of experiencing uninterrupted network failures until Relay considers that
2042    /// it has encountered a network outage.
2043    pub fn http_outage_grace_period(&self) -> Duration {
2044        Duration::from_secs(self.values.http.outage_grace_period)
2045    }
2046
2047    /// Time Relay waits before retrying an upstream request.
2048    ///
2049    /// Before going into a network outage, Relay may fail to make upstream
2050    /// requests. This is the time Relay waits before retrying the same request.
2051    pub fn http_retry_delay(&self) -> Duration {
2052        Duration::from_secs(self.values.http.retry_delay)
2053    }
2054
2055    /// Time of continued project request failures before Relay emits an error.
2056    pub fn http_project_failure_interval(&self) -> Duration {
2057        Duration::from_secs(self.values.http.project_failure_interval)
2058    }
2059
2060    /// Content encoding of upstream requests.
2061    pub fn http_encoding(&self) -> HttpEncoding {
2062        self.values.http.encoding
2063    }
2064
2065    /// Returns whether metrics should be sent globally through a shared endpoint.
2066    pub fn http_global_metrics(&self) -> bool {
2067        self.values.http.global_metrics
2068    }
2069
2070    /// Returns whether this Relay should emit outcomes.
2071    ///
2072    /// This is `true` either if `outcomes.emit_outcomes` is explicitly enabled, or if this Relay is
2073    /// in processing mode.
2074    pub fn emit_outcomes(&self) -> EmitOutcomes {
2075        if self.processing_enabled() {
2076            return EmitOutcomes::AsOutcomes;
2077        }
2078        self.values.outcomes.emit_outcomes
2079    }
2080
2081    /// Returns whether this Relay should emit client outcomes
2082    ///
2083    /// Relays that do not emit client outcomes will forward client recieved outcomes
2084    /// directly to the next relay in the chain as client report envelope.  This is only done
2085    /// if this relay emits outcomes at all. A relay that will not emit outcomes
2086    /// will forward the envelope unchanged.
2087    ///
2088    /// This flag can be explicitly disabled on processing relays as well to prevent the
2089    /// emitting of client outcomes to the kafka topic.
2090    pub fn emit_client_outcomes(&self) -> bool {
2091        self.values.outcomes.emit_client_outcomes
2092    }
2093
2094    /// Returns the maximum number of outcomes that are batched before being sent
2095    pub fn outcome_batch_size(&self) -> usize {
2096        self.values.outcomes.batch_size
2097    }
2098
2099    /// Returns the maximum interval that an outcome may be batched
2100    pub fn outcome_batch_interval(&self) -> Duration {
2101        Duration::from_millis(self.values.outcomes.batch_interval)
2102    }
2103
2104    /// The originating source of the outcome
2105    pub fn outcome_source(&self) -> Option<&str> {
2106        self.values.outcomes.source.as_deref()
2107    }
2108
2109    /// Returns the width of the buckets into which outcomes are aggregated, in seconds.
2110    pub fn outcome_aggregator(&self) -> &OutcomeAggregatorConfig {
2111        &self.values.outcomes.aggregator
2112    }
2113
2114    /// Returns logging configuration.
2115    pub fn logging(&self) -> &relay_log::LogConfig {
2116        &self.values.logging
2117    }
2118
2119    /// Returns logging configuration.
2120    pub fn sentry(&self) -> &relay_log::SentryConfig {
2121        &self.values.sentry
2122    }
2123
2124    /// Returns the socket addresses for statsd.
2125    ///
2126    /// If stats is disabled an empty vector is returned.
2127    pub fn statsd_addrs(&self) -> anyhow::Result<Vec<SocketAddr>> {
2128        if let Some(ref addr) = self.values.metrics.statsd {
2129            let addrs = addr
2130                .as_str()
2131                .to_socket_addrs()
2132                .with_context(|| ConfigError::file(ConfigErrorKind::InvalidValue, &self.path))?
2133                .collect();
2134            Ok(addrs)
2135        } else {
2136            Ok(vec![])
2137        }
2138    }
2139
2140    /// Return the prefix for statsd metrics.
2141    pub fn metrics_prefix(&self) -> &str {
2142        &self.values.metrics.prefix
2143    }
2144
2145    /// Returns the default tags for statsd metrics.
2146    pub fn metrics_default_tags(&self) -> &BTreeMap<String, String> {
2147        &self.values.metrics.default_tags
2148    }
2149
2150    /// Returns the name of the hostname tag that should be attached to each outgoing metric.
2151    pub fn metrics_hostname_tag(&self) -> Option<&str> {
2152        self.values.metrics.hostname_tag.as_deref()
2153    }
2154
2155    /// Returns the global sample rate for all metrics.
2156    pub fn metrics_sample_rate(&self) -> f32 {
2157        self.values.metrics.sample_rate
2158    }
2159
2160    /// Returns whether local metric aggregation should be enabled.
2161    pub fn metrics_aggregate(&self) -> bool {
2162        self.values.metrics.aggregate
2163    }
2164
2165    /// Returns whether high cardinality tags should be removed before sending metrics.
2166    pub fn metrics_allow_high_cardinality_tags(&self) -> bool {
2167        self.values.metrics.allow_high_cardinality_tags
2168    }
2169
2170    /// Returns the interval for periodic metrics emitted from Relay.
2171    ///
2172    /// `None` if periodic metrics are disabled.
2173    pub fn metrics_periodic_interval(&self) -> Option<Duration> {
2174        match self.values.metrics.periodic_secs {
2175            0 => None,
2176            secs => Some(Duration::from_secs(secs)),
2177        }
2178    }
2179
2180    /// Returns the default timeout for all upstream HTTP requests.
2181    pub fn http_timeout(&self) -> Duration {
2182        Duration::from_secs(self.values.http.timeout.into())
2183    }
2184
2185    /// Returns the connection timeout for all upstream HTTP requests.
2186    pub fn http_connection_timeout(&self) -> Duration {
2187        Duration::from_secs(self.values.http.connection_timeout.into())
2188    }
2189
2190    /// Returns the failed upstream request retry interval.
2191    pub fn http_max_retry_interval(&self) -> Duration {
2192        Duration::from_secs(self.values.http.max_retry_interval.into())
2193    }
2194
2195    /// Returns the expiry timeout for cached projects.
2196    pub fn project_cache_expiry(&self) -> Duration {
2197        Duration::from_secs(self.values.cache.project_expiry.into())
2198    }
2199
2200    /// Returns `true` if the full project state should be requested from upstream.
2201    pub fn request_full_project_config(&self) -> bool {
2202        self.values.cache.project_request_full_config
2203    }
2204
2205    /// Returns the expiry timeout for cached relay infos (public keys).
2206    pub fn relay_cache_expiry(&self) -> Duration {
2207        Duration::from_secs(self.values.cache.relay_expiry.into())
2208    }
2209
2210    /// Returns the maximum number of buffered envelopes
2211    pub fn envelope_buffer_size(&self) -> usize {
2212        self.values
2213            .cache
2214            .envelope_buffer_size
2215            .try_into()
2216            .unwrap_or(usize::MAX)
2217    }
2218
2219    /// Returns the expiry timeout for cached misses before trying to refetch.
2220    pub fn cache_miss_expiry(&self) -> Duration {
2221        Duration::from_secs(self.values.cache.miss_expiry.into())
2222    }
2223
2224    /// Returns the grace period for project caches.
2225    pub fn project_grace_period(&self) -> Duration {
2226        Duration::from_secs(self.values.cache.project_grace_period.into())
2227    }
2228
2229    /// Returns the refresh interval for a project.
2230    ///
2231    /// Validates the refresh time to be between the grace period and expiry.
2232    pub fn project_refresh_interval(&self) -> Option<Duration> {
2233        self.values
2234            .cache
2235            .project_refresh_interval
2236            .map(Into::into)
2237            .map(Duration::from_secs)
2238    }
2239
2240    /// Returns the duration in which batchable project config queries are
2241    /// collected before sending them in a single request.
2242    pub fn query_batch_interval(&self) -> Duration {
2243        Duration::from_millis(self.values.cache.batch_interval.into())
2244    }
2245
2246    /// Returns the duration in which downstream relays are requested from upstream.
2247    pub fn downstream_relays_batch_interval(&self) -> Duration {
2248        Duration::from_millis(self.values.cache.downstream_relays_batch_interval.into())
2249    }
2250
2251    /// Returns the interval in seconds in which local project configurations should be reloaded.
2252    pub fn local_cache_interval(&self) -> Duration {
2253        Duration::from_secs(self.values.cache.file_interval.into())
2254    }
2255
2256    /// Returns the interval in seconds in which fresh global configs should be
2257    /// fetched from  upstream.
2258    pub fn global_config_fetch_interval(&self) -> Duration {
2259        Duration::from_secs(self.values.cache.global_config_fetch_interval.into())
2260    }
2261
2262    /// Returns the path of the buffer file if the `cache.persistent_envelope_buffer.path` is configured.
2263    ///
2264    /// In case a partition with id > 0 is supplied, the filename of the envelopes path will be
2265    /// suffixed with `.{partition_id}`.
2266    pub fn spool_envelopes_path(&self, partition_id: u8) -> Option<PathBuf> {
2267        let mut path = self
2268            .values
2269            .spool
2270            .envelopes
2271            .path
2272            .as_ref()
2273            .map(|path| path.to_owned())?;
2274
2275        if partition_id == 0 {
2276            return Some(path);
2277        }
2278
2279        let file_name = path.file_name().and_then(|f| f.to_str())?;
2280        let new_file_name = format!("{file_name}.{partition_id}");
2281        path.set_file_name(new_file_name);
2282
2283        Some(path)
2284    }
2285
2286    /// The maximum size of the buffer, in bytes.
2287    pub fn spool_envelopes_max_disk_size(&self) -> usize {
2288        self.values.spool.envelopes.max_disk_size.as_bytes()
2289    }
2290
2291    /// Number of encoded envelope bytes that need to be accumulated before
2292    /// flushing one batch to disk.
2293    pub fn spool_envelopes_batch_size_bytes(&self) -> usize {
2294        self.values.spool.envelopes.batch_size_bytes.as_bytes()
2295    }
2296
2297    /// Returns the time after which we drop envelopes as a [`Duration`] object.
2298    pub fn spool_envelopes_max_age(&self) -> Duration {
2299        Duration::from_secs(self.values.spool.envelopes.max_envelope_delay_secs)
2300    }
2301
2302    /// Returns the refresh frequency for disk usage monitoring as a [`Duration`] object.
2303    pub fn spool_disk_usage_refresh_frequency_ms(&self) -> Duration {
2304        Duration::from_millis(self.values.spool.envelopes.disk_usage_refresh_frequency_ms)
2305    }
2306
2307    /// Returns the maximum number of envelopes that can be put in the bounded buffer.
2308    pub fn spool_max_backpressure_envelopes(&self) -> usize {
2309        self.values.spool.envelopes.max_backpressure_envelopes
2310    }
2311
2312    /// Returns the relative memory usage up to which the disk buffer will unspool envelopes.
2313    pub fn spool_max_backpressure_memory_percent(&self) -> f32 {
2314        self.values.spool.envelopes.max_backpressure_memory_percent
2315    }
2316
2317    /// Returns the number of partitions for the buffer.
2318    pub fn spool_partitions(&self) -> NonZeroU8 {
2319        self.values.spool.envelopes.partitions
2320    }
2321
2322    /// Returns the maximum size of an event payload in bytes.
2323    pub fn max_event_size(&self) -> usize {
2324        self.values.limits.max_event_size.as_bytes()
2325    }
2326
2327    /// Returns the maximum size of each attachment.
2328    pub fn max_attachment_size(&self) -> usize {
2329        self.values.limits.max_attachment_size.as_bytes()
2330    }
2331
2332    /// Returns the maximum combined size of attachments or payloads containing attachments
2333    /// (minidump, unreal, standalone attachments) in bytes.
2334    pub fn max_attachments_size(&self) -> usize {
2335        self.values.limits.max_attachments_size.as_bytes()
2336    }
2337
2338    /// Returns the maximum combined size of client reports in bytes.
2339    pub fn max_client_reports_size(&self) -> usize {
2340        self.values.limits.max_client_reports_size.as_bytes()
2341    }
2342
2343    /// Returns the maximum payload size of a monitor check-in in bytes.
2344    pub fn max_check_in_size(&self) -> usize {
2345        self.values.limits.max_check_in_size.as_bytes()
2346    }
2347
2348    /// Returns the maximum payload size of a log in bytes.
2349    pub fn max_log_size(&self) -> usize {
2350        self.values.limits.max_log_size.as_bytes()
2351    }
2352
2353    /// Returns the maximum payload size of a span in bytes.
2354    pub fn max_span_size(&self) -> usize {
2355        self.values.limits.max_span_size.as_bytes()
2356    }
2357
2358    /// Returns the maximum payload size of an item container in bytes.
2359    pub fn max_container_size(&self) -> usize {
2360        self.values.limits.max_container_size.as_bytes()
2361    }
2362
2363    /// Returns the maximum size of an envelope payload in bytes.
2364    ///
2365    /// Individual item size limits still apply.
2366    pub fn max_envelope_size(&self) -> usize {
2367        self.values.limits.max_envelope_size.as_bytes()
2368    }
2369
2370    /// Returns the maximum number of sessions per envelope.
2371    pub fn max_session_count(&self) -> usize {
2372        self.values.limits.max_session_count
2373    }
2374
2375    /// Returns the maximum number of standalone spans per envelope.
2376    pub fn max_span_count(&self) -> usize {
2377        self.values.limits.max_span_count
2378    }
2379
2380    /// Returns the maximum number of logs per envelope.
2381    pub fn max_log_count(&self) -> usize {
2382        self.values.limits.max_log_count
2383    }
2384
2385    /// Returns the maximum number of trace metrics per envelope.
2386    pub fn max_trace_metric_count(&self) -> usize {
2387        self.values.limits.max_trace_metric_count
2388    }
2389
2390    /// Returns the maximum payload size of a statsd metric in bytes.
2391    pub fn max_statsd_size(&self) -> usize {
2392        self.values.limits.max_statsd_size.as_bytes()
2393    }
2394
2395    /// Returns the maximum payload size of metric buckets in bytes.
2396    pub fn max_metric_buckets_size(&self) -> usize {
2397        self.values.limits.max_metric_buckets_size.as_bytes()
2398    }
2399
2400    /// Returns the maximum payload size for general API requests.
2401    pub fn max_api_payload_size(&self) -> usize {
2402        self.values.limits.max_api_payload_size.as_bytes()
2403    }
2404
2405    /// Returns the maximum payload size for file uploads and chunks.
2406    pub fn max_api_file_upload_size(&self) -> usize {
2407        self.values.limits.max_api_file_upload_size.as_bytes()
2408    }
2409
2410    /// Returns the maximum payload size for chunks
2411    pub fn max_api_chunk_upload_size(&self) -> usize {
2412        self.values.limits.max_api_chunk_upload_size.as_bytes()
2413    }
2414
2415    /// Returns the maximum payload size for a profile
2416    pub fn max_profile_size(&self) -> usize {
2417        self.values.limits.max_profile_size.as_bytes()
2418    }
2419
2420    /// Returns the maximum payload size for a trace metric.
2421    pub fn max_trace_metric_size(&self) -> usize {
2422        self.values.limits.max_trace_metric_size.as_bytes()
2423    }
2424
2425    /// Returns the maximum payload size for a compressed replay.
2426    pub fn max_replay_compressed_size(&self) -> usize {
2427        self.values.limits.max_replay_compressed_size.as_bytes()
2428    }
2429
2430    /// Returns the maximum payload size for an uncompressed replay.
2431    pub fn max_replay_uncompressed_size(&self) -> usize {
2432        self.values.limits.max_replay_uncompressed_size.as_bytes()
2433    }
2434
2435    /// Returns the maximum message size for an uncompressed replay.
2436    ///
2437    /// This is greater than max_replay_compressed_size because
2438    /// it can include additional metadata about the replay in
2439    /// addition to the recording.
2440    pub fn max_replay_message_size(&self) -> usize {
2441        self.values.limits.max_replay_message_size.as_bytes()
2442    }
2443
2444    /// Returns the maximum number of active requests
2445    pub fn max_concurrent_requests(&self) -> usize {
2446        self.values.limits.max_concurrent_requests
2447    }
2448
2449    /// Returns the maximum number of active queries
2450    pub fn max_concurrent_queries(&self) -> usize {
2451        self.values.limits.max_concurrent_queries
2452    }
2453
2454    /// The maximum number of seconds a query is allowed to take across retries.
2455    pub fn query_timeout(&self) -> Duration {
2456        Duration::from_secs(self.values.limits.query_timeout)
2457    }
2458
2459    /// The maximum number of seconds to wait for pending envelopes after receiving a shutdown
2460    /// signal.
2461    pub fn shutdown_timeout(&self) -> Duration {
2462        Duration::from_secs(self.values.limits.shutdown_timeout)
2463    }
2464
2465    /// Returns the server keep-alive timeout in seconds.
2466    ///
2467    /// By default keep alive is set to a 5 seconds.
2468    pub fn keepalive_timeout(&self) -> Duration {
2469        Duration::from_secs(self.values.limits.keepalive_timeout)
2470    }
2471
2472    /// Returns the server idle timeout in seconds.
2473    pub fn idle_timeout(&self) -> Option<Duration> {
2474        self.values.limits.idle_timeout.map(Duration::from_secs)
2475    }
2476
2477    /// Returns the maximum connections.
2478    pub fn max_connections(&self) -> Option<usize> {
2479        self.values.limits.max_connections
2480    }
2481
2482    /// TCP listen backlog to configure on Relay's listening socket.
2483    pub fn tcp_listen_backlog(&self) -> u32 {
2484        self.values.limits.tcp_listen_backlog
2485    }
2486
2487    /// Returns the number of cores to use for thread pools.
2488    pub fn cpu_concurrency(&self) -> usize {
2489        self.values.limits.max_thread_count
2490    }
2491
2492    /// Returns the number of tasks that can run concurrently in the worker pool.
2493    pub fn pool_concurrency(&self) -> usize {
2494        self.values.limits.max_pool_concurrency
2495    }
2496
2497    /// Returns the maximum size of a project config query.
2498    pub fn query_batch_size(&self) -> usize {
2499        self.values.cache.batch_size
2500    }
2501
2502    /// Get filename for static project config.
2503    pub fn project_configs_path(&self) -> PathBuf {
2504        self.path.join("projects")
2505    }
2506
2507    /// True if the Relay should do processing.
2508    pub fn processing_enabled(&self) -> bool {
2509        self.values.processing.enabled
2510    }
2511
2512    /// Level of normalization for Relay to apply to incoming data.
2513    pub fn normalization_level(&self) -> NormalizationLevel {
2514        self.values.normalization.level
2515    }
2516
2517    /// The path to the GeoIp database required for event processing.
2518    pub fn geoip_path(&self) -> Option<&Path> {
2519        self.values
2520            .geoip
2521            .path
2522            .as_deref()
2523            .or(self.values.processing.geoip_path.as_deref())
2524    }
2525
2526    /// Maximum future timestamp of ingested data.
2527    ///
2528    /// Events past this timestamp will be adjusted to `now()`. Sessions will be dropped.
2529    pub fn max_secs_in_future(&self) -> i64 {
2530        self.values.processing.max_secs_in_future.into()
2531    }
2532
2533    /// Maximum age of ingested sessions. Older sessions will be dropped.
2534    pub fn max_session_secs_in_past(&self) -> i64 {
2535        self.values.processing.max_session_secs_in_past.into()
2536    }
2537
2538    /// Configuration name and list of Kafka configuration parameters for a given topic.
2539    pub fn kafka_configs(
2540        &self,
2541        topic: KafkaTopic,
2542    ) -> Result<KafkaTopicConfig<'_>, KafkaConfigError> {
2543        self.values.processing.topics.get(topic).kafka_configs(
2544            &self.values.processing.kafka_config,
2545            &self.values.processing.secondary_kafka_configs,
2546        )
2547    }
2548
2549    /// Whether to validate the topics against Kafka.
2550    pub fn kafka_validate_topics(&self) -> bool {
2551        self.values.processing.kafka_validate_topics
2552    }
2553
2554    /// All unused but configured topic assignments.
2555    pub fn unused_topic_assignments(&self) -> &relay_kafka::Unused {
2556        &self.values.processing.topics.unused
2557    }
2558
2559    /// Configuration of the attachment upload service.
2560    pub fn upload(&self) -> &UploadServiceConfig {
2561        &self.values.processing.upload
2562    }
2563
2564    /// Redis servers to connect to for project configs, cardinality limits,
2565    /// rate limiting, and metrics metadata.
2566    pub fn redis(&self) -> Option<RedisConfigsRef<'_>> {
2567        let redis_configs = self.values.processing.redis.as_ref()?;
2568
2569        Some(build_redis_configs(
2570            redis_configs,
2571            self.cpu_concurrency() as u32,
2572            self.pool_concurrency() as u32,
2573        ))
2574    }
2575
2576    /// Chunk size of attachments in bytes.
2577    pub fn attachment_chunk_size(&self) -> usize {
2578        self.values.processing.attachment_chunk_size.as_bytes()
2579    }
2580
2581    /// Maximum metrics batch size in bytes.
2582    pub fn metrics_max_batch_size_bytes(&self) -> usize {
2583        self.values.aggregator.max_flush_bytes
2584    }
2585
2586    /// Default prefix to use when looking up project configs in Redis. This is only done when
2587    /// Relay is in processing mode.
2588    pub fn projectconfig_cache_prefix(&self) -> &str {
2589        &self.values.processing.projectconfig_cache_prefix
2590    }
2591
2592    /// Maximum rate limit to report to clients in seconds.
2593    pub fn max_rate_limit(&self) -> Option<u64> {
2594        self.values.processing.max_rate_limit.map(u32::into)
2595    }
2596
2597    /// Cache vacuum interval for the cardinality limiter in memory cache.
2598    ///
2599    /// The cache will scan for expired values based on this interval.
2600    pub fn cardinality_limiter_cache_vacuum_interval(&self) -> Duration {
2601        Duration::from_secs(self.values.cardinality_limiter.cache_vacuum_interval)
2602    }
2603
2604    /// Interval to refresh internal health checks.
2605    pub fn health_refresh_interval(&self) -> Duration {
2606        Duration::from_millis(self.values.health.refresh_interval_ms)
2607    }
2608
2609    /// Maximum memory watermark in bytes.
2610    pub fn health_max_memory_watermark_bytes(&self) -> u64 {
2611        self.values
2612            .health
2613            .max_memory_bytes
2614            .as_ref()
2615            .map_or(u64::MAX, |b| b.as_bytes() as u64)
2616    }
2617
2618    /// Maximum memory watermark as a percentage of maximum system memory.
2619    pub fn health_max_memory_watermark_percent(&self) -> f32 {
2620        self.values.health.max_memory_percent
2621    }
2622
2623    /// Health check probe timeout.
2624    pub fn health_probe_timeout(&self) -> Duration {
2625        Duration::from_millis(self.values.health.probe_timeout_ms)
2626    }
2627
2628    /// Refresh frequency for polling new memory stats.
2629    pub fn memory_stat_refresh_frequency_ms(&self) -> u64 {
2630        self.values.health.memory_stat_refresh_frequency_ms
2631    }
2632
2633    /// Maximum amount of COGS measurements buffered in memory.
2634    pub fn cogs_max_queue_size(&self) -> u64 {
2635        self.values.cogs.max_queue_size
2636    }
2637
2638    /// Resource ID to use for Relay COGS measurements.
2639    pub fn cogs_relay_resource_id(&self) -> &str {
2640        &self.values.cogs.relay_resource_id
2641    }
2642
2643    /// Returns configuration for the default metrics aggregator.
2644    pub fn default_aggregator_config(&self) -> &AggregatorServiceConfig {
2645        &self.values.aggregator
2646    }
2647
2648    /// Returns configuration for non-default metrics aggregator.
2649    pub fn secondary_aggregator_configs(&self) -> &Vec<ScopedAggregatorConfig> {
2650        &self.values.secondary_aggregators
2651    }
2652
2653    /// Returns aggregator config for a given metrics namespace.
2654    pub fn aggregator_config_for(&self, namespace: MetricNamespace) -> &AggregatorServiceConfig {
2655        for entry in &self.values.secondary_aggregators {
2656            if entry.condition.matches(Some(namespace)) {
2657                return &entry.config;
2658            }
2659        }
2660        &self.values.aggregator
2661    }
2662
2663    /// Return the statically configured Relays.
2664    pub fn static_relays(&self) -> &HashMap<RelayId, RelayInfo> {
2665        &self.values.auth.static_relays
2666    }
2667
2668    /// Returns the max age a signature is considered valid, in seconds.
2669    pub fn signature_max_age(&self) -> Duration {
2670        Duration::from_secs(self.values.auth.signature_max_age)
2671    }
2672
2673    /// Returns `true` if unknown items should be accepted and forwarded.
2674    pub fn accept_unknown_items(&self) -> bool {
2675        let forward = self.values.routing.accept_unknown_items;
2676        forward.unwrap_or_else(|| !self.processing_enabled())
2677    }
2678}
2679
2680impl Default for Config {
2681    fn default() -> Self {
2682        Self {
2683            values: ConfigValues::default(),
2684            credentials: None,
2685            path: PathBuf::new(),
2686        }
2687    }
2688}
2689
2690#[cfg(test)]
2691mod tests {
2692
2693    use super::*;
2694
2695    /// Regression test for renaming the envelope buffer flags.
2696    #[test]
2697    fn test_event_buffer_size() {
2698        let yaml = r###"
2699cache:
2700    event_buffer_size: 1000000
2701    event_expiry: 1800
2702"###;
2703
2704        let values: ConfigValues = serde_yaml::from_str(yaml).unwrap();
2705        assert_eq!(values.cache.envelope_buffer_size, 1_000_000);
2706        assert_eq!(values.cache.envelope_expiry, 1800);
2707    }
2708
2709    #[test]
2710    fn test_emit_outcomes() {
2711        for (serialized, deserialized) in &[
2712            ("true", EmitOutcomes::AsOutcomes),
2713            ("false", EmitOutcomes::None),
2714            ("\"as_client_reports\"", EmitOutcomes::AsClientReports),
2715        ] {
2716            let value: EmitOutcomes = serde_json::from_str(serialized).unwrap();
2717            assert_eq!(value, *deserialized);
2718            assert_eq!(serde_json::to_string(&value).unwrap(), *serialized);
2719        }
2720    }
2721
2722    #[test]
2723    fn test_emit_outcomes_invalid() {
2724        assert!(serde_json::from_str::<EmitOutcomes>("asdf").is_err());
2725    }
2726}