- Oct 15, 2021
-
-
Patrick Cloke authored
-
- Oct 13, 2021
-
-
Azrenbeth authored
Co-authored-by:
Azrenbeth <7782548+Azrenbeth@users.noreply.github.com> Co-authored-by:
Brendan Abolivier <babolivier@matrix.org>
-
- Sep 21, 2021
-
-
David Robertson authored
It's a simplification, but one that'll help make the user directory logic easier to follow with the other changes upcoming. It's not strictly required for those changes, but this will help simplify the resulting logic that listens for `m.room.member` events and generally make the logic easier to follow. This means the config option `search_all_users` ends up controlling the search query only, and not the data we store. The cost of doing so is an extra row in the `user_directory` and `user_directory_search` tables for each local user which - belongs to no public rooms - belongs to no private rooms of size ≥ 2 I think the cost of this will be marginal (since they'll already have entries in `users` and `profiles` anyway). As a small upside, a homeserver whose directory was built with this change can toggle `search_all_users` without having to rebuild their directory. Co-authored-by:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
-
- Sep 13, 2021
-
-
BramvdnHeuvel authored
-
- Sep 06, 2021
-
-
Azrenbeth authored
-
- Aug 31, 2021
-
-
Patrick Cloke authored
This adds configuration options (under an `oembed` section) to configure which URLs are matched to use oEmbed for URL previews.
-
- Aug 21, 2021
-
-
Callum Brown authored
Signed-off-by:
Callum Brown <callum@calcuode.com> This is part of my GSoC project implementing [MSC3231](https://github.com/matrix-org/matrix-doc/pull/3231).
-
- Aug 17, 2021
-
-
Azrenbeth authored
Port the PresenceRouter module interface to the new generic interface introduced in v1.37.0
-
Brendan Abolivier authored
Several configuration sections are using separate settings for custom template directories, which can be confusing. This PR adds a new top-level configuration for a custom template directory which is then used for every module. The only exception is the consent templates, since the consent template directory require a specific hierarchy, so it's probably better that it stays separate from everything else.
-
- Aug 06, 2021
-
-
Richard van der Hoff authored
This is mostly useful in case the server offers TLS, but doesn't present a valid certificate.
-
- Aug 03, 2021
-
-
Kento Okamoto authored
Per issue #9812 using `url_preview_ip_range_blacklist` with a proxy via `HTTPS_PROXY` or `HTTP_PROXY` environment variables has some inconsistent bahavior than mentioned. This PR changes the following: - Changes the Sample Config file to include a note mentioning that `url_preview_ip_range_blacklist` and `ip_range_blacklist` is ignored when using a proxy - Changes some logic in synapse/config/repository.py to send a warning when both `*ip_range_blacklist` configs and a proxy environment variable are set and but no longer throws an error. Signed-off-by:
Kento Okamoto <kentokamoto@protonmail.com>
-
Richard van der Hoff authored
-
- Aug 02, 2021
-
-
Toni Spets authored
Setting the value will help PostgreSQL free up memory by recycling the connections in the connection pool. Signed-off-by:
Toni Spets <toni.spets@iki.fi>
-
- Jul 20, 2021
-
-
Brendan Abolivier authored
Port the third-party event rules interface to the generic module interface introduced in v1.37.0
-
- Jul 16, 2021
-
-
Brendan Abolivier authored
This adds an API for third-party plugin modules to implement account validity, so they can provide this feature instead of Synapse. The module implementing the current behaviour for this feature can be found at https://github.com/matrix-org/synapse-email-account-validity. To allow for a smooth transition between the current feature and the new module, hooks have been added to the existing account validity endpoints to allow their behaviours to be overridden by a module.
-
- Jul 08, 2021
-
-
Cristina authored
Fixes #9602
-
Dirk Klimpel authored
Signed-off-by:
Dirk Klimpel <dirk@klimpel.org>
-
- Jul 07, 2021
-
-
Dirk Klimpel authored
Signed-off-by:
Dirk Klimpel <dirk@klimpel.org>
-
- Jul 05, 2021
-
-
Erik Johnston authored
-
- Jun 21, 2021
-
-
jkanefendt authored
Implemented config option sso.update_profile_information to keep user's display name in sync with the SSO displayname. Signed-off-by:
Johannes Kanefendt <johannes.kanefendt@krzn.de>
-
- Jun 18, 2021
-
-
Brendan Abolivier authored
This PR adds a common configuration section for all modules (see docs). These modules are then loaded at startup by the homeserver. Modules register their hooks and web resources using the new `register_[...]_callbacks` and `register_web_resource` methods of the module API.
-
- Jun 17, 2021
-
-
Brendan Abolivier authored
Fixes #9778 ACME v1 has been fully decommissioned for existing installs on June 1st 2021(see https://community.letsencrypt.org/t/end-of-life-plan-for-acmev1/88430/27), so we can now safely remove it from Synapse.
-
- Jun 16, 2021
-
-
Patrick Cloke authored
Dangerous actions means deactivating an account, modifying an account password, or adding a 3PID. Other actions (deleting devices, uploading keys) can re-use the same UI auth session if ui_auth.session_timeout is configured.
-
- Jun 10, 2021
-
-
Aaron Raimist authored
Signed-off-by:
Aaron Raimist <aaron@raim.ist>
-
- May 26, 2021
-
-
Patrick Cloke authored
In lieu of just always enabling the unstable spaces endpoint and unstable room version.
-
- May 24, 2021
-
-
Jerin J Titus authored
Signed-off-by:
Jerin J Titus <72017981+jerinjtitus@users.noreply.github.com>
-
Patrick Cloke authored
The previous spaces_enabled flag now defaults to true and is exposed in the sample config.
-
- May 14, 2021
-
-
Richard van der Hoff authored
Add a config option which allows enabling opentracing by user id, eg for debugging requests made by a test user.
-
- May 11, 2021
-
-
Patrick Cloke authored
MSC1772 specifies the m.room.create event should be sent as part of the invite_state. This was done optionally behind an experimental flag, but is now done by default due to MSC1772 being approved.
-
Aaron Raimist authored
Now that cross signing exists there is much less of a need for other people to look at devices and verify them individually. This PR adds a config option to allow you to prevent device display names from being shared with other servers. Signed-off-by:
Aaron Raimist <aaron@raim.ist>
-
- May 05, 2021
-
-
Erik Johnston authored
Synapse can be quite memory intensive, and unless care is taken to tune the GC thresholds it can end up thrashing, causing noticable performance problems for large servers. We fix this by limiting how often we GC a given generation, regardless of current counts/thresholds. This does not help with the reverse problem where the thresholds are set too high, but that should only happen in situations where they've been manually configured. Adds a `gc_min_seconds_between` config option to override the defaults. Fixes #9890.
-
- May 04, 2021
-
-
Andrew Morgan authored
Adds the `port` option with the default value to the sample config file.
-
- Apr 20, 2021
-
-
Patrick Cloke authored
-
- Apr 19, 2021
-
-
Andrew Morgan authored
Port "Allow users to click account renewal links multiple times without hitting an 'Invalid Token' page #74" from synapse-dinsic (#9832) This attempts to be a direct port of https://github.com/matrix-org/synapse-dinsic/pull/74 to mainline. There was some fiddling required to deal with the changes that have been made to mainline since (mainly dealing with the split of `RegistrationWorkerStore` from `RegistrationStore`, and the changes made to `self.make_request` in test code).
-
- Apr 06, 2021
-
-
Andrew Morgan authored
At the moment, if you'd like to share presence between local or remote users, those users must be sharing a room together. This isn't always the most convenient or useful situation though. This PR adds a module to Synapse that will allow deployments to set up extra logic on where presence updates should be routed. The module must implement two methods, `get_users_for_states` and `get_interested_users`. These methods are given presence updates or user IDs and must return information that Synapse will use to grant passing presence updates around. A method is additionally added to `ModuleApi` which allows triggering a set of users to receive the current, online presence information for all users they are considered interested in. This is the equivalent of that user receiving presence information during an initial sync. The goal of this module is to be fairly generic and useful for a variety of applications, with hard requirements being: * Sending state for a specific set or all known users to a defined set of local and remote users. * The ability to trigger an initial sync for specific users, so they receive all current state.
-
- Mar 31, 2021
-
-
Denis Kasak authored
The regex should be terminated so that subdomain matches of another domain are not accepted. Just ensuring that someone doesn't shoot themselves in the foot by copying our example. Signed-off-by:
Denis Kasak <dkasak@termina.org.uk>
-
- Mar 30, 2021
-
-
Richard van der Hoff authored
`room_invite_state_types` was inconvenient as a configuration setting, because anyone that ever set it would not receive any new types that were added to the defaults. Here, we deprecate the old setting, and replace it with a couple of new settings under `room_prejoin_state`.
-
- Mar 29, 2021
-
-
Richard van der Hoff authored
I've reiterated the advice about using `oidc` to migrate, since I've seen a few people caught by this. I've also removed a couple of the examples as they are duplicating the OIDC documentation, and I think they might be leading people astray.
-
- Mar 23, 2021
-
-
Erik Johnston authored
It's legitimate behaviour to try and join a bunch of rooms at once.
-
- Mar 16, 2021
-
-
Hubbe authored
Allows limiting who can login using OIDC via the claims made from the IdP.
-