- Jun 23, 2021
-
-
Michael[tm] Smith authored
* Drop Origin & Accept from Access-Control-Allow-Headers value This change drops the Origin and Accept header names from the value of the Access-Control-Allow-Headers response header sent by Synapse. Per the CORS protocol, it’s not necessary or useful to include those header names. Details: Per-spec at https://fetch.spec.whatwg.org/#forbidden-header-name, Origin is a “forbidden header name” set by the browser and that frontend JavaScript code is never allowed to set. So the value of Access-Control-Allow-Headers isn’t relevant to Origin or in general to other headers set by the browser itself — the browser never ever consults the Access-Control-Allow-Headers value to confirm that it’s OK for the request to include an Origin header. And per-spec at https://fetch.spec.whatwg.org/#cors-safelisted-request-header, Accept is a “CORS-safelisted request-header”, which means that browsers allow requests to contain the Accept header regardless of whether the Access-Control-Allow-Headers value contains "Accept". So it’s unnecessary for the Access-Control-Allow-Headers to explicitly include Accept. Browsers will not perform a CORS preflight for requests containing an Accept request header. Related: https://github.com/matrix-org/matrix-doc/pull/3225 Signed-off-by:
Michael[tm] Smith <mike@w3.org>
-
- Jun 22, 2021
-
-
Erik Johnston authored
Introduced in #6739
-
Brendan Abolivier authored
So admins aren't surprised if things break when we remove this code in a couple of months.
-
Eric Eastwood authored
Work on https://github.com/matrix-org/matrix-doc/pull/2716
-
- Jun 21, 2021
-
-
jkanefendt authored
Implemented config option sso.update_profile_information to keep user's display name in sync with the SSO displayname. Signed-off-by:
Johannes Kanefendt <johannes.kanefendt@krzn.de>
-
Erik Johnston authored
We were repeatedly looking up a config option in a loop (using the unclassed config style), which is expensive enough that it can cause large CPU usage.
-
Andrew Morgan authored
An accidental mis-ordering of operations during #6739 technically allowed an incoming knock event over federation in before checking it against any configured Third Party Access Rules modules. This PR corrects that by performing the TPAR check *before* persisting the event.
-
Richard van der Hoff authored
* Defer stdio redirection until we are about to start the reactor * Catch and handle exceptions during startup
-
- Jun 18, 2021
-
-
Andrew Morgan authored
This PR will run a new "Deploy release-specific documentation" job whenever a push to a branch name matching `release-v*` occurs. Doing so will create/add to a folder named `vX.Y` on the `gh-pages` branch. Doing so will allow us to build up `major.minor` releases of the docs as we release Synapse. This is especially useful for having a mechanism for keeping around documentation of old/removed features (for those running older versions of Synapse), without needing to clutter the latest copy of the docs. After a [discussion](https://matrix.to/#/!XaqDhxuTIlvldquJaV:matrix.org/$rKmkBmQle8OwTlGcoyu0BkcWXdnHW3_oap8BMgclwIY?via=matrix.org&via=vector.modular.im&via=envs.net) in #synapse-dev, we wanted to use tags to trigger the documentation deployments, which I agreed with. However, I soon realised that the bash-foo required to turn a tag of `v1.2.3rc1` into `1.2` was a lot more complex than the branch's `release-v1.2`. So, I've gone with the latter for simplicity. In the future we'll have some UI on the website to switch between versions, but for now you can simply just change 'develop' to 'v1.2' in the URL.
-
Patrick Cloke authored
This could cause a minor data leak if someone defined a non-restricted join rule with an allow key or used a restricted join rule in an older room version, but this is unlikely. Additionally this starts adding unit tests to the spaces summary handler.
-
Brendan Abolivier authored
-
Brendan Abolivier authored
This PR adds a common configuration section for all modules (see docs). These modules are then loaded at startup by the homeserver. Modules register their hooks and web resources using the new `register_[...]_callbacks` and `register_web_resource` methods of the module API.
-
Richard van der Hoff authored
Fixes: #9480
-
- Jun 17, 2021
-
-
Brendan Abolivier authored
Fixes #9778 ACME v1 has been fully decommissioned for existing installs on June 1st 2021(see https://community.letsencrypt.org/t/end-of-life-plan-for-acmev1/88430/27), so we can now safely remove it from Synapse.
-
Patrick Cloke authored
Adds a "type" field and generalize "space" to "room_id".
-
Richard van der Hoff authored
Fixes #8518 by telling the ResponseCache not to cache the /sync response if the next_batch param is the same as the since token.
-
Richard van der Hoff authored
As I've written in various places in the past (#7113, #9865) I'm pretty sure this is doing nothing useful at all.
-
Marcus authored
Reformat all files with the new version. Signed-off-by:
Marcus Hoffmann <bubu@bubu1.eu>
-
Andrew Morgan authored
Fixes https://github.com/matrix-org/synapse/issues/10030. We were expecting milliseconds where we should have provided a value in seconds. The impact of this bug isn't too bad. The code is intended to count the number of remote servers that the homeserver can see and report that as a metric. This metric is supposed to run initially 1 second after server startup, and every 60s as well. Instead, it ran 1,000 seconds after server startup, and every 60s after startup. This fix allows for the correct metrics to be collected immediately, as well as preventing a random collection 1,000s in the future after startup.
-
Eric Eastwood authored
Follow-up to https://github.com/matrix-org/synapse/pull/10156#discussion_r650292223
-
Richard van der Hoff authored
-
- Jun 16, 2021
-
-
Patrick Cloke authored
-
Patrick Cloke authored
Dangerous actions means deactivating an account, modifying an account password, or adding a 3PID. Other actions (deleting devices, uploading keys) can re-use the same UI auth session if ui_auth.session_timeout is configured.
-
Michael Kaye authored
This doc is short but a useful guide to what the request log lines mean. Co-authored-by:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com> Co-authored-by:
Erik Johnston <erik@matrix.org> Co-authored-by:
Daniele Sluijters <daenney@users.noreply.github.com>
-
Erik Johnston authored
It can be helpful to know when trying to track down slow requests.
-
Lukas Lihotzki authored
`expires_in` must be an integer according to the OpenAPI spec: https://github.com/matrix-org/matrix-doc/blob/master/data/api/client-server/definitions/openid_token.yaml#L32 True division (`/`) returns a float instead (`"expires_in": 3600.0`). Floor division (`//`) returns an integer, so the response is spec compliant. Signed-off-by:
Lukas Lihotzki <lukas@lihotzki.de>
-
Dirk Klimpel authored
* Fix broken links in documentation * newsfile
-
Richard van der Hoff authored
* Trace event persistence When we persist a batch of events, set the parent opentracing span to the that from the request, so that we can trace all the way in. * changelog * When we force tracing, set a baggage item ... so that we can check again later. * Link in both directions between persist_events spans
-
- Jun 15, 2021
-
-
Erik Johnston authored
-
Patrick Cloke authored
The stable prefixes have been supported since v1.34.0. The unstable prefixes are not supported by any known clients.
-
Patrick Cloke authored
* Room version 7 for knocking. * Stable prefixes and endpoints (both client and federation) for knocking. * Removes the experimental configuration flag.
-
Michael Kutzner authored
Add 'federation_ip_range_whitelist'. This allows backwards-compatibility, If 'federation_ip_range_blacklist' is set. Otherwise 'ip_range_whitelist' will be used for federation servers. Signed-off-by:
Michael Kutzner <1mikure@gmail.com>
-
- Jun 14, 2021
-
-
Richard van der Hoff authored
some cleanup, pulled out of #10134.
-
Richard van der Hoff authored
This is the first of two PRs which seek to address #8518. This first PR lays the groundwork by extending ResponseCache; a second PR (#10158) will update the SyncHandler to actually use it, and fix the bug. The idea here is that we allow the callback given to ResponseCache.wrap to decide whether its result should be cached or not. We do that by (optionally) passing a ResponseCacheContext into it, which it can modify.
-
- Jun 11, 2021
-
-
Richard van der Hoff authored
-
Erik Johnston authored
Synapse 1.36.0rc2 (2021-06-11) ============================== Bugfixes -------- - Fix a bug which caused presence updates to stop working some time after a restart, when using a presence writer worker. Broke in v1.33.0. ([\#10149](https://github.com/matrix-org/synapse/issues/10149)) - Fix a bug when using federation sender worker where it would send out more presence updates than necessary, leading to high resource usage. Broke in v1.33.0. ([\#10163](https://github.com/matrix-org/synapse/issues/10163)) - Fix a bug where Synapse could send the same presence update to a remote twice. ([\#10165](https://github.com/matrix-org/synapse/issues/10165))
-
Erik Johnston authored
-
Erik Johnston authored
It turns out that we were sending the same presence state to a remote potentially multiple times.
-