- Jul 19, 2019
-
-
Amber Brown authored
-
- Jul 18, 2019
-
-
Amber Brown authored
-
Neil Johnson authored
-
Neil Johnson authored
-
Richard van der Hoff authored
Clean up config settings and dead code. This is mostly about cleaning up the config format, to bring it into line with our conventions. In particular: * There should be a blank line after `## Section ##' headings * There should be a blank line between each config setting * There should be a `#`-only line between a comment and the setting it describes * We don't really do the `# #` style commenting-out of whole sections if we can help it * rename `tracer_enabled` to `enabled` While we're here, do more config parsing upfront, which makes it easier to use later on. Also removes redundant code from LogContextScopeManager. Also changes the changelog fragment to a `feature` - it's exciting!
-
Amber Brown authored
-
Andrew Morgan authored
Fixes #5594 Forbid viewing relations on an event once it has been redacted.
-
Richard van der Hoff authored
* Convert BaseFederationServlet._wrap to async Empirically, this fixes some lost stacktraces. It should be safe because the wrapped function is called from JsonResource._async_render, which is already async. * Convert the rest of synapse.federation.transport.server to async We may as well do the whole file while we're here. * changelog * flake8
-
- Jul 17, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
This is basically a contrived way of adding a `Recommends` on `libpq5`, to fix #5653. The way this is supposed to happen in debhelper is to run `dh_shlibdeps`, which in turn runs `dpkg-shlibdeps`, which spits things out into `debian/<package>.substvars` whence they can later be included by `control`. Previously, we had disabled `dh_shlibdeps`, mostly because `dpkg-shlibdeps` gets confused about PIL's interdependent objects, but that's not really the right thing to do and there is another way to work around that. Since we don't always use postgres, we don't necessarily want a hard Depends on libpq5, so I've actually ended up adding an explicit invocation of `dpkg-shlibdeps` for `psycopg2`. I've also updated the build-depends list for the package, which was missing a couple of entries.
-
Richard van der Hoff authored
We can now use `_get_events_from_cache_or_db` rather than going right back to the database, which means that (a) we can benefit from caching, and (b) it opens the way forward to more extensive checks on the original event. We now always require the original event to exist before we will serve up a redaction.
-
Richard van der Hoff authored
Ensures that redactions are correctly authenticated for recent room versions. There are a few things going on here: * `_fetch_event_rows` is updated to return a dict rather than a list of rows. * Rather than returning multiple copies of an event which was redacted multiple times, it returns the redactions as a list within the dict. * It also returns the actual rejection reason, rather than merely the fact that it was rejected, so that we don't have to query the table again in `_get_event_from_row`. * The redaction handling is factored out of `_get_event_from_row`, and now checks if any of the redactions are valid.
-
Richard van der Hoff authored
A couple of changes here: * get rid of a redundant `allow_rejected` condition - we should already have filtered out any rejected events before we get to that point in the code, and the redundancy is confusing. Instead, let's stick in an assertion just to make double-sure we aren't leaking rejected events by mistake. * factor out a `_get_events_from_cache_or_db` method, which is going to be important for a forthcoming fix to redactions.
-
- Jul 16, 2019
-
-
Erik Johnston authored
Create basic admin command app
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
Co-Authored-By:
Aaron Raimist <aaron@raim.ist>
-
- Jul 15, 2019
-
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Andrew Morgan authored
Return `This account has been deactivated` instead of `Invalid password` when a user is deactivated.
-
Erik Johnston authored
Add basic function to get all data for a user out of synapse
-
- Jul 12, 2019
-
-
Richard van der Hoff authored
... and certain other changelog-related fixes
-
Richard van der Hoff authored
Record how long an access token is valid for, and raise a soft-logout once it expires.
-
Erik Johnston authored
-
Andrew Morgan authored
-
Richard van der Hoff authored
-
Ulrik Günther authored
Updates reverse_proxy.rst with information about nginx' URI normalisation.
-
Slavi Pantaleev authored
This adds a missing space, without which log lines appear uglier. Signed-off-by:
Slavi Pantaleev <slavi@devture.com>
-
Slavi Pantaleev authored
Alpine Linux 3.8 is still supported, but it seems like it's quite outdated now. While Python should be the same on both, all other libraries, etc., are much newer in Alpine 3.9 and 3.10. Signed-off-by:
Slavi Pantaleev <slavi@devture.com>
-
Richard van der Hoff authored
It's useful to be able to tweak the homeserver config to be used for each test. This PR adds a mechanism to do so.
-
- Jul 11, 2019
-
-
Amber Brown authored
-
Lrizika authored
Added that synapse_user needs a database to access before it can auth Noted you'll need to enable password auth, linked to pg_hba.conf docs
-
Andrew Morgan authored
-
Richard van der Hoff authored
First of all, let's get rid of `TOKEN_NOT_FOUND_HTTP_STATUS`. It was a hack we did at one point when it was possible to return either a 403 or a 401 if the creds were missing. We always return a 401 in these cases now (thankfully), so it's not needed. Let's also stop abusing `AuthError` for these cases. Honestly they have nothing that relates them to the other places that `AuthError` is used, other than the fact that they are loosely under the 'Auth' banner. It makes no sense for them to share exception classes. Instead, let's add a couple of new exception classes: `InvalidClientTokenError` and `MissingClientTokenError`, for the `M_UNKNOWN_TOKEN` and `M_MISSING_TOKEN` cases respectively - and an `InvalidClientCredentialsError` base class for the two of them.
-