Skip to content
Snippets Groups Projects
  1. Aug 27, 2019
  2. Aug 22, 2019
  3. Aug 13, 2019
  4. Aug 01, 2019
  5. Jul 30, 2019
    • Richard van der Hoff's avatar
      Remove non-functional 'expire_access_token' setting (#5782) · 8c97f641
      Richard van der Hoff authored
      The `expire_access_token` didn't do what it sounded like it should do. What it
      actually did was make Synapse enforce the 'time' caveat on macaroons used as
      access tokens, but since our access token macaroons never contained such a
      caveat, it was always a no-op.
      
      (The code to add 'time' caveats was removed back in v0.18.5, in #1656)
      Unverified
      8c97f641
  6. Jul 29, 2019
  7. Jul 23, 2019
  8. Jul 22, 2019
    • Jorik Schellekens's avatar
      Opentracing Documentation (#5703) · 826e6ec3
      Jorik Schellekens authored
      
      * Opentracing survival guide
      
      * Update decorator names in doc
      
      * Doc cleanup
      
      These are all alterations as a result of comments in #5703, it
      includes mostly typos and clarifications. The most interesting
      changes are:
      
      - Split developer and user docs into two sections
      - Add a high level description of OpenTracing
      
      * newsfile
      
      * Move contributer specific info to docstring.
      
      * Sample config.
      
      * Trailing whitespace.
      
      * Update 5703.misc
      
      * Apply suggestions from code review
      
      Mostly just rewording parts of the docs for clarity.
      
      Co-Authored-By: default avatarRichard van der Hoff <1389908+richvdh@users.noreply.github.com>
      Unverified
      826e6ec3
  9. Jul 19, 2019
  10. Jul 18, 2019
    • Richard van der Hoff's avatar
      Clean up opentracing configuration options (#5712) · 82345bc0
      Richard van der Hoff authored
      Clean up config settings and dead code.
      
      This is mostly about cleaning up the config format, to bring it into line with our conventions. In particular:
       * There should be a blank line after `## Section ##' headings
       * There should be a blank line between each config setting
       * There should be a `#`-only line between a comment and the setting it describes
       * We don't really do the `#  #` style commenting-out of whole sections if we can help it
       * rename `tracer_enabled` to `enabled`
      
      While we're here, do more config parsing upfront, which makes it easier to use
      later on.
      
      Also removes redundant code from LogContextScopeManager.
      
      Also changes the changelog fragment to a `feature` - it's exciting!
      Unverified
      82345bc0
    • Amber Brown's avatar
      Support Prometheus_client 0.4.0+ (#5636) · 7ad1d763
      Amber Brown authored
      Unverified
      7ad1d763
  11. Jul 17, 2019
    • Richard van der Hoff's avatar
      Improve `Depends` specs in debian package. (#5675) · 1def2981
      Richard van der Hoff authored
      This is basically a contrived way of adding a `Recommends` on `libpq5`, to fix #5653.
      
      The way this is supposed to happen in debhelper is to run
      `dh_shlibdeps`, which in turn runs `dpkg-shlibdeps`, which spits things out
      into `debian/<package>.substvars` whence they can later be included by
      `control`.
      
      Previously, we had disabled `dh_shlibdeps`, mostly because `dpkg-shlibdeps`
      gets confused about PIL's interdependent objects, but that's not really the
      right thing to do and there is another way to work around that.
      
      Since we don't always use postgres, we don't necessarily want a hard Depends on
      libpq5, so I've actually ended up adding an explicit invocation of
      `dpkg-shlibdeps` for `psycopg2`.
      
      I've also updated the build-depends list for the package, which was missing a
      couple of entries.
      Unverified
      1def2981
  12. Jul 12, 2019
  13. Jul 11, 2019
    • Lrizika's avatar
      Improved docs on setting up Postgresql (#5661) · 39e9839a
      Lrizika authored
      Added that synapse_user needs a database to access before it can auth
      Noted you'll need to enable password auth, linked to pg_hba.conf docs
      39e9839a
    • Jorik Schellekens's avatar
      Add basic opentracing support (#5544) · 38a6d3ee
      Jorik Schellekens authored
      
      * Configure and initialise tracer
      
      Includes config options for the tracer and sets up JaegerClient.
      
      * Scope manager using LogContexts
      
      We piggy-back our tracer scopes by using log context.
      The current log context gives us the current scope. If new scope is
      created we create a stack of scopes in the context.
      
      * jaeger is a dependency now
      
      * Carrier inject and extraction for Twisted Headers
      
      * Trace federation requests on the way in and out.
      
      The span is created in _started_processing and closed in
      _finished_processing because we need a meaningful log context.
      
      * Create logcontext for new scope.
      
      Instead of having a stack of scopes in a logcontext we create a new
      context for a new scope if the current logcontext already has a scope.
      
      * Remove scope from logcontext if logcontext is top level
      
      * Disable tracer if not configured
      
      * typo
      
      * Remove dependence on jaeger internals
      
      * bools
      
      * Set service name
      
      * :Explicitely state that the tracer is disabled
      
      * Black is the new black
      
      * Newsfile
      
      * Code style
      
      * Use the new config setup.
      
      * Generate config.
      
      * Copyright
      
      * Rename config to opentracing
      
      * Remove user whitelisting
      
      * Empty whitelist by default
      
      * User ConfigError instead of RuntimeError
      
      * Use isinstance
      
      * Use tag constants for opentracing.
      
      * Remove debug comment and no need to explicitely record error
      
      * Two errors a "s(c)entry"
      
      * Docstrings!
      
      * Remove debugging brainslip
      
      * Homeserver Whitlisting
      
      * Better opentracing config comment
      
      * linting
      
      * Inclue worker name in service_name
      
      * Make opentracing an optional dependency
      
      * Neater config retreival
      
      * Clean up dummy tags
      
      * Instantiate tracing as object instead of global class
      
      * Inlcude opentracing as a homeserver member.
      
      * Thread opentracing to the request level
      
      * Reference opetnracing through hs
      
      * Instantiate dummy opentracin g for tests.
      
      * About to revert, just keeping the unfinished changes just in case
      
      * Revert back to global state, commit number:
      
      9ce4a3d9067bf9889b86c360c05ac88618b85c4f
      
      * Use class level methods in tracerutils
      
      * Start and stop requests spans in a place where we
      have access to the authenticated entity
      
      * Seen it, isort it
      
      * Make sure to close the active span.
      
      * I'm getting black and blue from this.
      
      * Logger formatting
      
      Co-Authored-By: default avatarErik Johnston <erik@matrix.org>
      
      * Outdated comment
      
      * Import opentracing at the top
      
      * Return a contextmanager
      
      * Start tracing client requests from the servlet
      
      * Return noop context manager if not tracing
      
      * Explicitely say that these are federation requests
      
      * Include servlet name in client requests
      
      * Use context manager
      
      * Move opentracing to logging/
      
      * Seen it, isort it again!
      
      * Ignore twisted return exceptions on context exit
      
      * Escape the scope
      
      * Scopes should be entered to make them useful.
      
      * Nicer decorator names
      
      * Just one init, init?
      
      * Don't need to close something that isn't open
      
      * Docs make you smarter
      Unverified
      38a6d3ee
  14. Jul 03, 2019
  15. Jun 28, 2019
  16. Jun 27, 2019
  17. Jun 26, 2019
  18. Jun 25, 2019
  19. Jun 24, 2019
  20. Jun 22, 2019
  21. Jun 21, 2019
  22. Jun 20, 2019
  23. Jun 17, 2019
  24. Jun 14, 2019
  25. Jun 11, 2019
  26. Jun 06, 2019
    • Neil Johnson's avatar
      Set default room version to v4. (#5379) · a1186501
      Neil Johnson authored
      Set default room version to v4.
      Unverified
      a1186501
    • Andrew Morgan's avatar
      Add ability to perform password reset via email without trusting the identity server (#5377) · 3719680e
      Andrew Morgan authored
      Sends password reset emails from the homeserver instead of proxying to the identity server. This is now the default behaviour for security reasons. If you wish to continue proxying password reset requests to the identity server you must now enable the email.trust_identity_server_for_password_resets option.
      
      This PR is a culmination of 3 smaller PRs which have each been separately reviewed:
      
      * #5308
      * #5345
      * #5368
      Unverified
      3719680e
    • Richard van der Hoff's avatar
      Stop hardcoding trust of old matrix.org key (#5374) · 9fbb20a5
      Richard van der Hoff authored
      There are a few changes going on here:
      
      * We make checking the signature on a key server response optional: if no
        verify_keys are specified, we trust to TLS to validate the connection.
      
      * We change the default config so that it does not require responses to be
        signed by the old key.
      
      * We replace the old 'perspectives' config with 'trusted_key_servers', which
        is also formatted slightly differently.
      
      * We emit a warning to the logs every time we trust a key server response
        signed by the old key.
      Unverified
      9fbb20a5
Loading