- Jun 15, 2020
-
-
Hubert Chathi authored
-
Patrick Cloke authored
-
- Jun 10, 2020
-
-
Andrew Morgan authored
Fixes https://github.com/matrix-org/synapse/issues/2431 Adds config option `encryption_enabled_by_default_for_room_type`, which determines whether encryption should be enabled with the default encryption algorithm in private or public rooms upon creation. Whether the room is private or public is decided based upon the room creation preset that is used. Part of this PR is also pulling out all of the individual instances of `m.megolm.v1.aes-sha2` into a constant variable to eliminate typos ala https://github.com/matrix-org/synapse/pull/7637 Based on #7637
-
- Jun 05, 2020
-
-
Patrick Cloke authored
-
Travis Ralston authored
Fixes https://github.com/matrix-org/synapse/issues/3177
-
Dirk Klimpel authored
Allow new users to be registered via the admin API even if the monthly active user limit has been reached (#7263)
-
Dirk Klimpel authored
- Admin is able to - change displaynames - delete devices - list devices - get device informations Fixes #7330
-
WGH authored
Closes #4382 Signed-off-by:
Maxim Plotnikov <wgh@torlan.ru>
-
Andrew Morgan authored
While working on https://github.com/matrix-org/synapse/issues/5665 I found myself digging into the `Ratelimiter` class and seeing that it was both: * Rather undocumented, and * causing a *lot* of config checks This PR attempts to refactor and comment the `Ratelimiter` class, as well as encourage config file accesses to only be done at instantiation. Best to be reviewed commit-by-commit.
-
- Jun 04, 2020
-
-
Andrew Morgan authored
@uhoreg has confirmed these were both typos. They are only in comments and tests though, rather than anything critical. Introduced in: * https://github.com/matrix-org/synapse/pull/7157 * https://github.com/matrix-org/synapse/pull/5726
-
- Jun 03, 2020
-
-
Andrew Morgan authored
Calls `self.get_success` on all deferred methods instead of abusing `self.pump()`. This has the benefit of working with coroutines, as well as checking that method execution completed successfully. There are also a few small cleanups that I made in the process.
-
- Jun 01, 2020
-
-
Olof Johansson authored
-
Brendan Abolivier authored
It looks like `user_device_resync` was ignoring cross-signing keys from the results received from the remote server. This patch fixes this, by processing these keys using the same process `_handle_signing_key_updates` does (and effectively factor that part out of that function).
-
Dirk Klimpel authored
-
- May 27, 2020
-
-
Erik Johnston authored
-
Erik Johnston authored
This mostly applise to `*stateGroupCache*` and co. Broke in #6391.
-
Erik Johnston authored
This is already correctly done when we instansiate the cache, but wasn't when it got reloaded (which always happens at least once on startup).
-
- May 26, 2020
-
-
Richard van der Hoff authored
A couple of changes of significance: * remove the `_last_ack < federation_position` condition, so that updates will still be correctly processed after restart * Correctly wire up send_federation_ack to the right class.
-
- May 22, 2020
-
-
Richard van der Hoff authored
These are surprisingly expensive, and we only really need to do them at startup.
-
Erik Johnston authored
Broke in #7534.
-
Patrick Cloke authored
-
Erik Johnston authored
The idea here is that if an instance persists an event via the replication HTTP API it can return before we receive that event over replication, which can lead to races where code assumes that persisting an event immediately updates various caches (e.g. current state of the room). Most of Synapse doesn't hit such races, so we don't do the waiting automagically, instead we do so where necessary to avoid unnecessary delays. We may decide to change our minds here if it turns out there are a lot of subtle races going on. People probably want to look at this commit by commit.
-
Erik Johnston authored
Mainly because sometimes the email push code raises exceptions where the stack traces have gotten lost, which is hopefully fixed by this.
-
- May 21, 2020
-
-
Brendan Abolivier authored
When a call to `user_device_resync` fails, we don't currently mark the remote user's device list as out of sync, nor do we retry to sync it. https://github.com/matrix-org/synapse/pull/6776 introduced some code infrastructure to mark device lists as stale/out of sync. This commit uses that code infrastructure to mark device lists as out of sync if processing an incoming device list update makes the device handler realise that the device list is out of sync, but we can't resync right now. It also adds a looping call to retry all failed resync every 30s. This shouldn't cause too much spam in the logs as this commit also removes the "Failed to handle device list update for..." warning logs when catching `NotRetryingDestination`. Fixes #7418
-
- May 18, 2020
-
-
Richard van der Hoff authored
-
- May 15, 2020
-
-
Richard van der Hoff authored
Make sure that the AccountDataStream presents complete updates, in the right order. This is much the same fix as #7337 and #7358, but applied to a different stream.
-
Patrick Cloke authored
-
Patrick Cloke authored
-
- May 14, 2020
-
-
Patrick Cloke authored
-
Patrick Cloke authored
In a new room version, the "notifications" key of power level events are subject to restricted auth rules.
-
Andrew Morgan authored
-
Richard van der Hoff authored
Fix a bug where the `get_joined_users` cache could be corrupted by custom status events (or other state events with a state_key matching the user ID). The bug was introduced by #2229, but has largely gone unnoticed since then. Fixes #7099, #7373.
-
- May 13, 2020
-
-
Patrick Cloke authored
This backs out some of the validation for the client dictionary and logs if this changes during a user interactive authentication session instead.
-
Erik Johnston authored
-
Erik Johnston authored
The aim here is to get to a stage where we have a `PersistEventStore` that holds all the write methods used during event persistence, so that we can take that class out of the `DataStore` mixin and instansiate it separately. This will allow us to instansiate it on processes other than master, while also ensuring it is only available on processes that are configured to write to events stream. This is a bit of an architectural change, where we end up with multiple classes per data store (rather than one per data store we have now). We end up having: 1. Storage classes that provide high level APIs that can talk to multiple data stores. 2. Data store modules that consist of classes that must point at the same database instance. 3. Classes in a data store that can be instantiated on processes depending on config.
-
Patrick Cloke authored
This is a cherry-pick of 1a1da60a (#7470) to the release-v1.13.0 branch.
-
- May 12, 2020
-
-
Erik Johnston authored
-
- May 11, 2020
-
-
Amber Brown authored
-
- May 08, 2020
-
-
Patrick Cloke authored
Be less strict about validation of UI authentication sessions during registration to match client expecations.
-
Andrew Morgan authored
-