- May 15, 2020
-
-
Richard van der Hoff authored
Make sure that the AccountDataStream presents complete updates, in the right order. This is much the same fix as #7337 and #7358, but applied to a different stream.
-
Andrew Morgan authored
-
Patrick Cloke authored
-
Erik Johnston authored
This is required as both event persistence and the background update needs access to this function. It should be perfectly safe for two workers to write to that table at the same time.
-
Andrew Morgan authored
-
Erik Johnston authored
This allows us to have the logic on both master and workers, which is necessary to move event persistence off master. We also combine the instantiation of ID generators from DataStore and slave stores to the base worker stores. This allows us to select which process writes events independently of the master/worker splits.
-
Patrick Cloke authored
-
Andrew Morgan authored
-
Richard van der Hoff authored
also a small clarification to nginx
-
Jeff Peeler authored
The specific headers that are passed using this new configuration format are Host and X-Forwarded-For, which should be all that's required. Note that for production another matcher should be added in the first section to properly handle the base_url lookup: reverse_proxy /.well-known/matrix/* http://localhost:8008 Signed-off-by:
Jeff Peeler <jpeeler@gmail.com>
-
Patrick Cloke authored
-
Patrick Cloke authored
-
Andrew Morgan authored
-
- May 14, 2020
-
-
Patrick Cloke authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
These PRs have gone straight to `master` and aren't really relevant to the release, so it doesn't make sense to have changelog entries for them.
-
Richard van der Hoff authored
* general updates to CONTRIBUTING.md * notes on updating your PR * Notes on squash-merging or otherwise * document git branching model
-
Patrick Cloke authored
In a new room version, the "notifications" key of power level events are subject to restricted auth rules.
-
Andrew Morgan authored
-
Richard van der Hoff authored
-
Andrew Morgan authored
-
Erik Johnston authored
This is so that the logic can happen on both master and workers when we move event persistence out.
-
Erik Johnston authored
-
Richard van der Hoff authored
Synapse 1.13.0rc2 (2020-05-14) ============================== Bugfixes -------- - Fix a long-standing bug which could cause messages not to be sent over federation, when state events with state keys matching user IDs (such as custom user statuses) were received. ([\#7376](https://github.com/matrix-org/synapse/issues/7376)) - Restore compatibility with non-compliant clients during the user interactive authentication process, fixing a problem introduced in v1.13.0rc1. ([\#7483](https://github.com/matrix-org/synapse/issues/7483)) Internal Changes ---------------- - Fix linting errors in new version of Flake8. ([\#7470](https://github.com/matrix-org/synapse/issues/7470))
-
Richard van der Hoff authored
-
Richard van der Hoff authored
Fix a bug where the `get_joined_users` cache could be corrupted by custom status events (or other state events with a state_key matching the user ID). The bug was introduced by #2229, but has largely gone unnoticed since then. Fixes #7099, #7373.
-
- May 13, 2020
-
-
Patrick Cloke authored
This backs out some of the validation for the client dictionary and logs if this changes during a user interactive authentication session instead.
-
Erik Johnston authored
This is safe as we can now write to cache invalidation stream on workers, and is required for when we move event persistence off master.
-
Paul Tötterman authored
Signed-off-by:
Paul Tötterman <paul.totterman@iki.fi>
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
The aim here is to get to a stage where we have a `PersistEventStore` that holds all the write methods used during event persistence, so that we can take that class out of the `DataStore` mixin and instansiate it separately. This will allow us to instansiate it on processes other than master, while also ensuring it is only available on processes that are configured to write to events stream. This is a bit of an architectural change, where we end up with multiple classes per data store (rather than one per data store we have now). We end up having: 1. Storage classes that provide high level APIs that can talk to multiple data stores. 2. Data store modules that consist of classes that must point at the same database instance. 3. Classes in a data store that can be instantiated on processes depending on config.
-
Patrick Cloke authored
This is a cherry-pick of 1a1da60a (#7470) to the release-v1.13.0 branch.
-
Erik Johnston authored
Before all streams were only written to from master, so only master needed to respond to `REPLICATE` commands. Before all instances wrote to the cache invalidation stream, but didn't respond to `REPLICATE`. This was a bug, which could lead to missed rows from cache invalidation stream if an instance is restarted, however all the caches would be empty in that case so it wasn't a problem.
-
Erik Johnston authored
Proactively send out `POSITION` commands (as if we had just received a `REPLICATE`) when we connect to Redis. This is important as other instances won't notice we've connected to issue a `REPLICATE` command (unlike for direct TCP connections). This is only currently an issue if master process reconnects without restarting (if it restarts then it won't have written anything and so other instances probably won't have missed anything).
-
- May 12, 2020
-
-
Patrick Cloke authored
-
Erik Johnston authored
-
- May 11, 2020
-
-
Patrick Cloke authored
-
Patrick Cloke authored
-