- Jun 06, 2019
-
-
Neil Johnson authored
Set default room version to v4.
-
Andrew Morgan authored
Sends password reset emails from the homeserver instead of proxying to the identity server. This is now the default behaviour for security reasons. If you wish to continue proxying password reset requests to the identity server you must now enable the email.trust_identity_server_for_password_resets option. This PR is a culmination of 3 smaller PRs which have each been separately reviewed: * #5308 * #5345 * #5368
-
Richard van der Hoff authored
There are a few changes going on here: * We make checking the signature on a key server response optional: if no verify_keys are specified, we trust to TLS to validate the connection. * We change the default config so that it does not require responses to be signed by the old key. * We replace the old 'perspectives' config with 'trusted_key_servers', which is also formatted slightly differently. * We emit a warning to the logs every time we trust a key server response signed by the old key.
-
Neil Johnson authored
1.0 upgrade/install notes
-
- Jun 05, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
fixes #4951
-
Neil Johnson authored
Improve documentation of monthly active user blocking and mau_trial_days
-
- May 31, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
Travis Ralston authored
-
- May 29, 2019
-
-
Amber Brown authored
-
Aaron Raimist authored
Signed-off-by:
Aaron Raimist <aaron@raim.ist>
-
Aaron Raimist authored
Signed-off-by:
Aaron Raimist <aaron@raim.ist>
-
- May 28, 2019
-
-
Brendan Abolivier authored
-
- May 24, 2019
-
-
Richard van der Hoff authored
-
- May 23, 2019
-
-
Andrew Morgan authored
Replaces DEFAULT_ROOM_VERSION constant with a method that first checks the config, then returns a hardcoded value if the option is not present. That hardcoded value is now located in the server.py config file.
-
- May 21, 2019
-
-
Amber Brown authored
-
Brendan Abolivier authored
-
- May 17, 2019
-
-
Richard van der Hoff authored
* Stop telling people to install the optional dependencies. They're optional. Also update the postgres docs a bit for clarity(?)
-
- May 16, 2019
-
-
Brendan Abolivier authored
-
- May 15, 2019
-
-
Amber Brown authored
-
- May 13, 2019
-
-
Andrew Morgan authored
-
- May 10, 2019
-
-
Richard van der Hoff authored
-
Gergely Polonkai authored
Signed-off-by:
Gergely Polonkai <gergely@polonkai.eu>
-
- May 09, 2019
-
-
colonelkrud authored
* Add AllowEncodedSlashes to apache Add `AllowEncodedSlashes On` to apache config to support encoding for v3 rooms. "The AllowEncodedSlashes setting is not inherited by virtual hosts, and virtual hosts are used in many default Apache configurations, such as the one in Ubuntu. The workaround is to add the AllowEncodedSlashes setting inside a <VirtualHost> container (/etc/apache2/sites-available/default in Ubuntu)." Source: https://stackoverflow.com/questions/4390436/need-to-allow-encoded-slashes-on-apache * change allowencodedslashes to nodecode
-
- May 08, 2019
-
-
Matthew Hodgson authored
This commit adds two config options: * `restrict_public_rooms_to_local_users` Requires auth to fetch the public rooms directory through the CS API and disables fetching it through the federation API. * `require_auth_for_profile_requests` When set to `true`, requires that requests to `/profile` over the CS API are authenticated, and only returns the user's profile if the requester shares a room with the profile's owner, as per MSC1301. MSC1301 also specifies a behaviour for federation (only returning the profile if the server asking for it shares a room with the profile's owner), but that's currently really non-trivial to do in a not too expensive way. Next step is writing down a MSC that allows a HS to specify which user sent the profile query. In this implementation, Synapse won't send a profile query over federation if it doesn't believe it already shares a room with the profile's owner, though. Groups have been intentionally omitted from this commit.
-
- May 07, 2019
-
-
Richard van der Hoff authored
This endpoint isn't much use for its intended purpose if you first need to get yourself an admin's auth token. I've restricted it to the `/_synapse/admin` path to make it a bit easier to lock down for those concerned about exposing this information. I don't imagine anyone is using it in anger currently.
-
- May 06, 2019
-
-
Travis Ralston authored
-
Richard van der Hoff authored
... after it got broken in 1565ebec.
-
- May 03, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- May 02, 2019
-
-
Richard van der Hoff authored
-
Brendan Abolivier authored
-
- May 01, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
- Apr 25, 2019
-
-
Andrew Morgan authored
-
- Apr 17, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-