- Jun 06, 2019
-
-
Andrew Morgan authored
fixes #5153
-
Neil Johnson authored
Set default room version to v4.
-
Andrew Morgan authored
Sends password reset emails from the homeserver instead of proxying to the identity server. This is now the default behaviour for security reasons. If you wish to continue proxying password reset requests to the identity server you must now enable the email.trust_identity_server_for_password_resets option. This PR is a culmination of 3 smaller PRs which have each been separately reviewed: * #5308 * #5345 * #5368
-
Richard van der Hoff authored
There are a few changes going on here: * We make checking the signature on a key server response optional: if no verify_keys are specified, we trust to TLS to validate the connection. * We change the default config so that it does not require responses to be signed by the old key. * We replace the old 'perspectives' config with 'trusted_key_servers', which is also formatted slightly differently. * We emit a warning to the logs every time we trust a key server response signed by the old key.
-
Neil Johnson authored
1.0 upgrade/install notes
-
Andrew Morgan authored
* Regen sample config before kicking off agents * Add changelog
-
Richard van der Hoff authored
Fixes some warnings, and a scary-looking stacktrace when sytest kills the process.
-
Brendan Abolivier authored
-
- Jun 05, 2019
-
-
Richard van der Hoff authored
Previously, setting this option would cause an exception at startup.
-
Neil Johnson authored
* Update _matrix/client/versions to reference support for r0.5.0
-
Erik Johnston authored
* Fix background updates to handle redactions/rejections In background updates based on current state delta stream we need to handle that we may not have all the events (or at least that `get_events` may raise an exception).
-
Richard van der Hoff authored
-
Richard van der Hoff authored
fixes #4951
-
Richard van der Hoff authored
-
Neil Johnson authored
* group together key validity refactors
-
Neil Johnson authored
Improve documentation of monthly active user blocking and mau_trial_days
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
Richard van der Hoff authored
Implements [MSC2077](https://github.com/matrix-org/matrix-doc/pull/2077) and fixes #5247 and #4364.
-
Richard van der Hoff authored
Also: * rename VerifyKeyRequest->VerifyJsonRequest * calculate key_ids on VerifyJsonRequest construction * refactor things to pass around VerifyJsonRequests instead of 4-tuples
-
Richard van der Hoff authored
-
Richard van der Hoff authored
Remove some spurious stuff, clarify some other stuff
-
Richard van der Hoff authored
it's a bit confusing
-
- Jun 04, 2019
-
-
Richard van der Hoff authored
Fixes a regression introduced in #5335.
-
Richard van der Hoff authored
FederationClient.get_pdu is called in a loop to fetch a batch of PDUs. A failure to fetch one should not result in a failure of the whole batch. Add the missing `continue`.
-
Richard van der Hoff authored
We have too many things called get_event, and it's hard to figure out what we mean. Also remove some unused params from the signature, and add some logging.
-
Brendan Abolivier authored
-
Richard van der Hoff authored
It takes at least 20 minutes to work through the long_retries schedule (11 attempts, each with a 60 second timeout, and 60 seconds between each request), so if the notary server isn't returning within the timeout, we'll just end up blocking whatever request is happening for 20 minutes. Ain't nobody got time for that.
-
Richard van der Hoff authored
-
Amber Brown authored
-
- Jun 03, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
When handling incoming federation requests, make sure that we have an up-to-date copy of the signing key. We do not yet enforce the validity period for event signatures.
-
Erik Johnston authored
-
Erik Johnston authored
This reverts commit 4bd67db1.
-
Erik Johnston authored
-
Amber Brown authored
-
Amber Brown authored
-
Erik Johnston authored
-
- Jun 01, 2019
-
-
Richard van der Hoff authored
These end up in join events everywhere, so let's limit them. Fixes #5079
-