- Jun 03, 2021
-
-
Andrew Morgan authored
-
Andrew Morgan authored
So that they render nicely in mdbook (see #10086), and so that we no longer have a mix of structured text languages in our documentation (excluding files outside of `docs/`).
-
- Jun 02, 2021
-
-
Dirk Klimpel authored
Related to: #6681, #5956, #10040 Signed-off-by:
Dirk Klimpel <dirk@klimpel.org>
-
- May 27, 2021
-
-
Erik Johnston authored
-
Callum Brown authored
Implements MSC2414: https://github.com/matrix-org/matrix-doc/pull/2414 See #8551 Signed-off-by:
Callum Brown <callum@calcuode.com>
-
- May 26, 2021
-
-
Patrick Cloke authored
In lieu of just always enabling the unstable spaces endpoint and unstable room version.
-
Dirk Klimpel authored
Signed-off-by:
Dirk Klimpel <dirk@klimpel.org>
-
Aaron authored
* Update CAPTCHA documentation to mention turning off verify origin Signed-off-by:
Aaron Raimist <aaron@raim.ist>
-
- May 24, 2021
-
-
Jerin J Titus authored
Signed-off-by:
Jerin J Titus <72017981+jerinjtitus@users.noreply.github.com>
-
Patrick Cloke authored
The previous spaces_enabled flag now defaults to true and is exposed in the sample config.
-
Dirk Klimpel authored
-
- May 20, 2021
-
-
Javier Junquera Sánchez authored
Signed-off-by:
Javier Junquera Sánchez <javier@junquera.io>
-
- May 19, 2021
-
-
Savyasachee Jha authored
Signed-off-by:
Savyasachee Jha <savya.jha@hawkradius.com>
-
- May 18, 2021
-
-
Andrew Morgan authored
Use a database table to hold the users that should have full presence sent to them, instead of something in-memory (#9823)
-
- May 14, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
Add a config option which allows enabling opentracing by user id, eg for debugging requests made by a test user.
-
Andrew Morgan authored
-
- May 13, 2021
-
-
Patrick Cloke authored
-
- May 11, 2021
-
-
Patrick Cloke authored
MSC1772 specifies the m.room.create event should be sent as part of the invite_state. This was done optionally behind an experimental flag, but is now done by default due to MSC1772 being approved.
-
Aaron authored
Now that cross signing exists there is much less of a need for other people to look at devices and verify them individually. This PR adds a config option to allow you to prevent device display names from being shared with other servers. Signed-off-by:
Aaron Raimist <aaron@raim.ist>
-
- May 05, 2021
-
-
Erik Johnston authored
Synapse can be quite memory intensive, and unless care is taken to tune the GC thresholds it can end up thrashing, causing noticable performance problems for large servers. We fix this by limiting how often we GC a given generation, regardless of current counts/thresholds. This does not help with the reverse problem where the thresholds are set too high, but that should only happen in situations where they've been manually configured. Adds a `gc_min_seconds_between` config option to override the defaults. Fixes #9890.
-
- May 04, 2021
-
-
Andrew Morgan authored
Adds the `port` option with the default value to the sample config file.
-
- Apr 29, 2021
-
-
ThibF authored
Support the delete of a room through DELETE request and mark previous request as deprecated through documentation. Signed-off-by:
Thibault Ferrante <thibault.ferrante@pm.me>
-
- Apr 20, 2021
-
-
Patrick Cloke authored
-
- Apr 19, 2021
-
-
Andrew Morgan authored
Port "Allow users to click account renewal links multiple times without hitting an 'Invalid Token' page #74" from synapse-dinsic (#9832) This attempts to be a direct port of https://github.com/matrix-org/synapse-dinsic/pull/74 to mainline. There was some fiddling required to deal with the changes that have been made to mainline since (mainly dealing with the split of `RegistrationWorkerStore` from `RegistrationStore`, and the changes made to `self.make_request` in test code).
-
- Apr 13, 2021
-
-
Dirk Klimpel authored
-
- Apr 06, 2021
-
-
Andrew Morgan authored
At the moment, if you'd like to share presence between local or remote users, those users must be sharing a room together. This isn't always the most convenient or useful situation though. This PR adds a module to Synapse that will allow deployments to set up extra logic on where presence updates should be routed. The module must implement two methods, `get_users_for_states` and `get_interested_users`. These methods are given presence updates or user IDs and must return information that Synapse will use to grant passing presence updates around. A method is additionally added to `ModuleApi` which allows triggering a set of users to receive the current, online presence information for all users they are considered interested in. This is the equivalent of that user receiving presence information during an initial sync. The goal of this module is to be fairly generic and useful for a variety of applications, with hard requirements being: * Sending state for a specific set or all known users to a defined set of local and remote users. * The ability to trigger an initial sync for specific users, so they receive all current state.
-
Erik Johnston authored
Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com>
-
- Apr 01, 2021
-
-
Dirk Klimpel authored
-
- Mar 31, 2021
-
-
Denis Kasak authored
The regex should be terminated so that subdomain matches of another domain are not accepted. Just ensuring that someone doesn't shoot themselves in the foot by copying our example. Signed-off-by:
Denis Kasak <dkasak@termina.org.uk>
-
- Mar 30, 2021
-
-
Richard van der Hoff authored
`room_invite_state_types` was inconvenient as a configuration setting, because anyone that ever set it would not receive any new types that were added to the defaults. Here, we deprecate the old setting, and replace it with a couple of new settings under `room_prejoin_state`.
-
- Mar 29, 2021
-
-
Richard van der Hoff authored
I've reiterated the advice about using `oidc` to migrate, since I've seen a few people caught by this. I've also removed a couple of the examples as they are duplicating the OIDC documentation, and I think they might be leading people astray.
-
- Mar 26, 2021
-
-
Paul Tötterman authored
Fixes redirect loop Signed-off-by:
Paul Tötterman <paul.totterman@iki.fi>
-
- Mar 24, 2021
-
-
Ben Banfield-Zanin authored
-
- Mar 23, 2021
-
-
Erik Johnston authored
It's legitimate behaviour to try and join a bunch of rooms at once.
-
- Mar 16, 2021
-
-
Hubbe authored
Allows limiting who can login using OIDC via the claims made from the IdP.
-
Andrew Morgan authored
Fixes https://github.com/matrix-org/synapse/issues/9572 When a SSO user logs in for the first time, we create a local Matrix user for them. This goes through the register_user flow, which ends up triggering the spam checker. Spam checker modules don't currently have any way to differentiate between a user trying to sign up initially, versus an SSO user (whom has presumably already been approved elsewhere) trying to log in for the first time. This PR passes `auth_provider_id` as an argument to the `check_registration_for_spam` function. This argument will contain an ID of an SSO provider (`"saml"`, `"cas"`, etc.) if one was used, else `None`.
-
Richard van der Hoff authored
The stable format uses different brand identifiers, so we need to support two identifiers for each IdP.
-
Richard van der Hoff authored
... and complain if people try to turn it off.
-
- Mar 10, 2021
-
-
Jason Robinson authored
Mention that parse_config must exist and note the check_media_file_for_spam method.
-