- Jul 13, 2020
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Jul 10, 2020
-
-
Patrick Cloke authored
-
Patrick Cloke authored
-
Sorunome authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Erik Johnston authored
-
Erik Johnston authored
The replication client requires that arguments are given as keyword arguments, which was not done in this case. We also pull out the logic so that we can catch and handle any exceptions raised, rather than leaving them unhandled.
-
Erik Johnston authored
When fetching the state of a room over federation we receive the event IDs of the state and auth chain. We then fetch those events that we don't already have. However, we used a function that recursively fetched any missing auth events for the fetched events, which can lead to a lot of recursion if the server is missing most of the auth chain. This work is entirely pointless because would have queued up the missing events in the auth chain to be fetched already. Let's just diable the recursion, since it only gets called from one place anyway.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Jul 09, 2020
-
-
Patrick Cloke authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
use `Failure()` to fish out the real exception.
-
Richard van der Hoff authored
It seems auth_events can be either a list or a tuple, depending on Things.
-
Patrick Cloke authored
-
Richard van der Hoff authored
Fixes #2181. The basic premise is that, when we fail to reject an invite via the remote server, we can generate our own out-of-band leave event and persist it as an outlier, so that we have something to send to the client.
- Jul 08, 2020
-
-
Richard van der Hoff authored
... instead of duplicating `config.signing_key[0]` everywhere
-
Richard van der Hoff authored
This reverts commit e0c01296. As discussed at https://github.com/matrix-org/synapse/pull/7801#pullrequestreview-444652786, I don't think this is an improvement.
-
Patrick Cloke authored
-
Patrick Cloke authored
-
Dirk Heinrichs authored
* Starting with apt 1.6, https support has moved into the main package and apt-transport-https has become a transitional dummy package. Signed-off-by:
Dirk Heinrichs <dirk.heinrichs@altum.de>
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Nicolai Søborg authored
* Change Caddy links Current links points to Caddy v1 which is deprecated. Signed-off-by:
Nicolai Søborg <git@xn--sb-lka.org>
-
- Jul 07, 2020
-
-
Richard van der Hoff authored
This table is no longer used, so we may as well stop populating it. Removing it would prevent people rolling back to older releases of Synapse, so that can happen in a future release.
-
Erik Johnston authored
-
- Jul 06, 2020
-
-
Juho Vanhanen authored
* Add libwebp dependency to Dockerfile Signed-off-by:
Juho Vanhanen <juho@vanhanen.io>
-
Patrick Cloke authored
-
Patrick Cloke authored
-
reivilibre authored
* Fix spec compliance; tweaks without values are valid (default to True, which is only concretely specified for `highlight`, but it seems only reasonable to generalise) * Changelog for 7766. * Add documentation to `tweaks_for_actions` May as well tidy up when I'm here. * Add a test for `tweaks_for_actions`
-
Oliver Kurz authored
Fixes https://github.com/matrix-org/synapse/issues/7641 The package was pinned to <0.8.0 without an obvious reasoning with 7ad1d763 in https://github.com/matrix-org/synapse/pull/5636 while the version selection looks to just try to exclude an arbitrary next minor version number that might introduce API breaking changes. Selecting the next minor number might be a good conservative selection. Downstream distributions already reported success patching out the version requirements. This also fixes the integration of upgraded packages into openSUSE packages, e.g. for openSUSE Tumbleweed which already ships prometheus_client >= 0.8 . Signed-off-by:
Oliver Kurz <okurz@suse.de> Co-authored-by:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
-
- Jul 05, 2020
-
-
Will Hunt authored
The CI appears to use the latest version of isort, which is a problem when isort gets a major version bump. Rather than try to pin the version, I've done the necessary to make isort5 happy with synapse.
-