- Aug 27, 2019
-
-
Olivier Wilkinson (reivilibre) authored
Signed-off-by:
Olivier Wilkinson (reivilibre) <olivier@librepush.net>
-
reivilibre authored
Admin API: Set adminship of a user
-
- Aug 22, 2019
-
-
Jorik Schellekens authored
Propagate opentracing contexts through EDUs Co-Authored-By:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
-
Richard van der Hoff authored
-
- Aug 13, 2019
-
-
Amber Brown authored
-
- Aug 01, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
- Jul 30, 2019
-
-
Richard van der Hoff authored
The `expire_access_token` didn't do what it sounded like it should do. What it actually did was make Synapse enforce the 'time' caveat on macaroons used as access tokens, but since our access token macaroons never contained such a caveat, it was always a no-op. (The code to add 'time' caveats was removed back in v0.18.5, in #1656)
-
- Jul 29, 2019
-
-
Amber Brown authored
-
- Jul 23, 2019
-
-
Jorik Schellekens authored
* Allow Jaeger to be configured * Update sample config
-
Amber Brown authored
-
- Jul 22, 2019
-
-
Jorik Schellekens authored
* Opentracing survival guide * Update decorator names in doc * Doc cleanup These are all alterations as a result of comments in #5703, it includes mostly typos and clarifications. The most interesting changes are: - Split developer and user docs into two sections - Add a high level description of OpenTracing * newsfile * Move contributer specific info to docstring. * Sample config. * Trailing whitespace. * Update 5703.misc * Apply suggestions from code review Mostly just rewording parts of the docs for clarity. Co-Authored-By:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
-
- Jul 19, 2019
-
-
Richard van der Hoff authored
A few fixes and removal of duplicated stuff, but mostly a bunch of the words on the config file.
-
- Jul 18, 2019
-
-
Richard van der Hoff authored
Clean up config settings and dead code. This is mostly about cleaning up the config format, to bring it into line with our conventions. In particular: * There should be a blank line after `## Section ##' headings * There should be a blank line between each config setting * There should be a `#`-only line between a comment and the setting it describes * We don't really do the `# #` style commenting-out of whole sections if we can help it * rename `tracer_enabled` to `enabled` While we're here, do more config parsing upfront, which makes it easier to use later on. Also removes redundant code from LogContextScopeManager. Also changes the changelog fragment to a `feature` - it's exciting!
-
Amber Brown authored
-
- Jul 17, 2019
-
-
Richard van der Hoff authored
This is basically a contrived way of adding a `Recommends` on `libpq5`, to fix #5653. The way this is supposed to happen in debhelper is to run `dh_shlibdeps`, which in turn runs `dpkg-shlibdeps`, which spits things out into `debian/<package>.substvars` whence they can later be included by `control`. Previously, we had disabled `dh_shlibdeps`, mostly because `dpkg-shlibdeps` gets confused about PIL's interdependent objects, but that's not really the right thing to do and there is another way to work around that. Since we don't always use postgres, we don't necessarily want a hard Depends on libpq5, so I've actually ended up adding an explicit invocation of `dpkg-shlibdeps` for `psycopg2`. I've also updated the build-depends list for the package, which was missing a couple of entries.
-
- Jul 12, 2019
-
-
Richard van der Hoff authored
Record how long an access token is valid for, and raise a soft-logout once it expires.
-
Ulrik Günther authored
Updates reverse_proxy.rst with information about nginx' URI normalisation.
-
- Jul 11, 2019
-
-
Lrizika authored
Added that synapse_user needs a database to access before it can auth Noted you'll need to enable password auth, linked to pg_hba.conf docs
-
Jorik Schellekens authored
* Configure and initialise tracer Includes config options for the tracer and sets up JaegerClient. * Scope manager using LogContexts We piggy-back our tracer scopes by using log context. The current log context gives us the current scope. If new scope is created we create a stack of scopes in the context. * jaeger is a dependency now * Carrier inject and extraction for Twisted Headers * Trace federation requests on the way in and out. The span is created in _started_processing and closed in _finished_processing because we need a meaningful log context. * Create logcontext for new scope. Instead of having a stack of scopes in a logcontext we create a new context for a new scope if the current logcontext already has a scope. * Remove scope from logcontext if logcontext is top level * Disable tracer if not configured * typo * Remove dependence on jaeger internals * bools * Set service name * :Explicitely state that the tracer is disabled * Black is the new black * Newsfile * Code style * Use the new config setup. * Generate config. * Copyright * Rename config to opentracing * Remove user whitelisting * Empty whitelist by default * User ConfigError instead of RuntimeError * Use isinstance * Use tag constants for opentracing. * Remove debug comment and no need to explicitely record error * Two errors a "s(c)entry" * Docstrings! * Remove debugging brainslip * Homeserver Whitlisting * Better opentracing config comment * linting * Inclue worker name in service_name * Make opentracing an optional dependency * Neater config retreival * Clean up dummy tags * Instantiate tracing as object instead of global class * Inlcude opentracing as a homeserver member. * Thread opentracing to the request level * Reference opetnracing through hs * Instantiate dummy opentracin g for tests. * About to revert, just keeping the unfinished changes just in case * Revert back to global state, commit number: 9ce4a3d9067bf9889b86c360c05ac88618b85c4f * Use class level methods in tracerutils * Start and stop requests spans in a place where we have access to the authenticated entity * Seen it, isort it * Make sure to close the active span. * I'm getting black and blue from this. * Logger formatting Co-Authored-By:
Erik Johnston <erik@matrix.org> * Outdated comment * Import opentracing at the top * Return a contextmanager * Start tracing client requests from the servlet * Return noop context manager if not tracing * Explicitely say that these are federation requests * Include servlet name in client requests * Use context manager * Move opentracing to logging/ * Seen it, isort it again! * Ignore twisted return exceptions on context exit * Escape the scope * Scopes should be entered to make them useful. * Nicer decorator names * Just one init, init? * Don't need to close something that isn't open * Docs make you smarter
-
- Jul 03, 2019
-
-
Amber Brown authored
-
- Jun 28, 2019
-
-
Amber Brown authored
-
- Jun 27, 2019
-
-
Daniel Hoffend authored
Signed-off-by:
Daniel Hoffend <dh@dotlan.net>
-
Andrew Morgan authored
Helps address #5444
-
- Jun 26, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Jun 25, 2019
-
-
Richard van der Hoff authored
-
- Jun 24, 2019
-
-
Andrew Morgan authored
Fixes #5533 Adds information about how to install and run black on the codebase.
-
Brendan Abolivier authored
-
Richard van der Hoff authored
This is helpful when generating a config file for running synapse under docker.
-
Richard van der Hoff authored
Because sticking it in the same place as the config isn't necessarily the right thing to do.
-
- Jun 22, 2019
-
-
Richard van der Hoff authored
This has no useful purpose on python3, and is generally a source of confusion.
-
- Jun 21, 2019
-
-
Erik Johnston authored
E_TOO_MANY_NEGATIVES Co-Authored-By:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
-
Erik Johnston authored
-
- Jun 20, 2019
-
-
Amber Brown authored
-
- Jun 17, 2019
-
-
Amber Brown authored
-
- Jun 14, 2019
-
-
Brendan Abolivier authored
-
- Jun 11, 2019
-
-
Neil Johnson authored
Add FAQ questions to federate.md. Add a health warning making it clear that the 1711 upgrade FAQ is now out of date.
-
- Jun 06, 2019
-
-
Neil Johnson authored
Set default room version to v4.
-
Andrew Morgan authored
Sends password reset emails from the homeserver instead of proxying to the identity server. This is now the default behaviour for security reasons. If you wish to continue proxying password reset requests to the identity server you must now enable the email.trust_identity_server_for_password_resets option. This PR is a culmination of 3 smaller PRs which have each been separately reviewed: * #5308 * #5345 * #5368
-