- Sep 19, 2019
-
-
Andrew Morgan authored
Removes the POST method from `/password_reset/<medium>/submit_token/` as it's only used by phone number verification which Synapse does not support yet.
-
- Sep 18, 2019
-
-
Jorik Schellekens authored
-
Jorik Schellekens authored
-
J. Ryan Stinnett authored
This checks whether the current platform supports thread resource usage tracking before logging a warning to avoid log spam. Fixes https://github.com/matrix-org/synapse/issues/6055
-
Richard van der Hoff authored
this was apparently broken by #6040.
-
- Sep 17, 2019
-
-
Andrew Morgan authored
3PID invites require making a request to an identity server to check that the invited 3PID has an Matrix ID linked, and if so, what it is. These requests are being made on behalf of a user. The user will supply an identity server and an access token for that identity server. The homeserver will then forward this request with the access token (using an `Authorization` header) and, if the given identity server doesn't support v2 endpoints, will fall back to v1 (which doesn't require any access tokens). Requires: ~~#5976~~
-
dstipp authored
Converting some of the rst documentation to markdown. Attempted to preserve whitespace and line breaks to minimize cosmetic change.
-
Erik Johnston authored
Broke in #5971 Basically the bug is that if get_current_state_deltas returns no new updates and we then take the max pos, its possible that we miss an update that happens in between the two calls. (e.g. get_current_state_deltas looks up to stream pos 5, then an event persists and so getting the max stream pos returns 6, meaning that next time we check for things with a stream pos bigger than 6)
-
Richard van der Hoff authored
Track the time that a server started failing at, for general analysis purposes.
-
- Sep 13, 2019
-
-
Amber Brown authored
-
Travis Ralston authored
-
- Sep 12, 2019
-
-
Amber Brown authored
-
Richard van der Hoff authored
Essentially the intention here is to end up blacklisting servers which never respond to federation requests. Fixes https://github.com/matrix-org/synapse/issues/5113.
-
Richard van der Hoff authored
This was intended to introduce an element of jitter; instead it gave you a 30/60 chance of resetting to zero.
-
David Baker authored
Fix SSO fallback login
-
David Baker authored
-
David Baker authored
Well, it worked, but forgot to remove the thing saying login was unavailable.
-
Sorunome authored
This PR adds the optional `report_stats_endpoint` to configure where stats are reported to, if enabled.
-
Jorik Schellekens authored
* Blow up config if opentracing is missing
-
Jason Robinson authored
Ensure support users can be registered even if MAU limit is reached
-
- Sep 11, 2019
-
-
Jason Robinson authored
This allows support users to be created even on MAU limits via the admin API. Support users are excluded from MAU after creation, so it makes sense to exclude them in creation - except if the whole host is in disabled state. Signed-off-by:
Jason Robinson <jasonr@matrix.org>
-
Andrew Morgan authored
This is a redo of https://github.com/matrix-org/synapse/pull/5897 but with `id_access_token` accepted. Implements [MSC2134](https://github.com/matrix-org/matrix-doc/pull/2134) plus Identity Service v2 authentication ala [MSC2140](https://github.com/matrix-org/matrix-doc/pull/2140). Identity lookup-related functions were also moved from `RoomMemberHandler` to `IdentityHandler`.
-
Erik Johnston authored
Allow use of different ratelimits for admin redactions.
-
Richard van der Hoff authored
* remove some unused code * make things which were constants into constants for efficiency and clarity
-
Erik Johnston authored
-
Andrew Morgan authored
Some small fixes to `room_member.py` found while doing other PRs. 1. Add requester to the base `_remote_reject_invite` method. 2. `send_membership_event`'s docstring was out of date and took in a `remote_room_hosts` arg that was not used and no calling function provided.
-
Jorik Schellekens authored
-
Erik Johnston authored
Co-Authored-By:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
-
Andrew Morgan authored
Two things I missed while implementing [MSC2140](https://github.com/matrix-org/matrix-doc/pull/2140/files#diff-c03a26de5ac40fb532de19cb7fc2aaf7R80). 1. Access tokens should be provided to the identity server as `access_token`, not `id_access_token`, even though the homeserver may accept the tokens as `id_access_token`. 2. Access tokens must be sent to the identity server in a query parameter, the JSON body is not allowed. We now send the access token as part of an `Authorization: ...` header, which fixes both things. The breaking code was added in https://github.com/matrix-org/synapse/pull/5892 Sytest PR: https://github.com/matrix-org/sytest/pull/697
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
This is useful to allow room admins to quickly deal with a large number of abusive messages.
-
Andrew Morgan authored
Remove origin parameter from add_display_name_to_third_party_invite and add params to docstring (#6010) Another small fixup noticed during work on a larger PR. The `origin` field of `add_display_name_to_third_party_invite` is not used and likely was just carried over from the `on_PUT` method of `FederationThirdPartyInviteExchangeServlet` which, like all other servlets, provides an `origin` argument. Since it's not used anywhere in the handler function though, we should remove it from the function arguments.
-
- Sep 10, 2019
-
-
Erik Johnston authored
Use account_threepid_delegate for 3pid validation
-
Andrew Morgan authored
-
Andrew Morgan authored
-
- Sep 09, 2019
-
-
Jason Robinson authored
Only count real users when checking for auto-creation of auto-join room
-
Erik Johnston authored
Censor redactions in DB after a month
-