- Aug 27, 2020
-
-
Patrick Cloke authored
-
Patrick Cloke authored
-
Andrew Morgan authored
-
- Aug 26, 2020
-
-
Patrick Cloke authored
-
- Aug 25, 2020
-
-
Erik Johnston authored
-
- Aug 24, 2020
-
-
Brendan Abolivier authored
Don't fail /submit_token requests on incorrect session ID if request_token_inhibit_3pid_errors is turned on (#7991) * Don't raise session_id errors on submit_token if request_token_inhibit_3pid_errors is set * Changelog * Also wait some time before responding to /requestToken * Incorporate review * Update synapse/storage/databases/main/registration.py Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> * Incorporate review Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
-
- Aug 19, 2020
-
-
Patrick Cloke authored
-
Erik Johnston authored
The function is used for two purposes: 1) for subscribers of streams to get a token they can use to get further updates with, and 2) for replication to track position of the writers of the stream. For streams with a single writer the two scenarios produce the same result, however the situation becomes complicated for streams with multiple writers. The current `MultiWriterIdGenerator` does not correctly handle the first case (which is not an issue as its only used for the `caches` stream which nothing subscribes to outside of replication).
-
- Aug 18, 2020
-
-
Patrick Cloke authored
-
- Aug 17, 2020
-
-
Patrick Cloke authored
-
Patrick Cloke authored
-
- Aug 14, 2020
-
-
Patrick Cloke authored
-
- Aug 12, 2020
-
-
Patrick Cloke authored
-
Patrick Cloke authored
-
- Aug 11, 2020
-
-
Patrick Cloke authored
-
- Aug 10, 2020
-
-
Richard van der Hoff authored
I think this would have caught all the cases in https://github.com/matrix-org/synapse/issues/7642 - and I think a 500 makes more sense here than a 403
-
- Aug 07, 2020
-
-
Patrick Cloke authored
-
Patrick Cloke authored
-
- Aug 05, 2020
-
-
Erik Johnston authored
-
- Jul 30, 2020
-
-
Patrick Cloke authored
-
- Jul 28, 2020
-
-
Patrick Cloke authored
-
- Jul 27, 2020
-
-
Patrick Cloke authored
-
Patrick Cloke authored
-
- Jul 24, 2020
-
-
Patrick Cloke authored
-
- Jul 22, 2020
-
-
Patrick Cloke authored
-
- Jul 14, 2020
-
-
Dirk Klimpel authored
The Delete Room admin API allows server admins to remove rooms from server and block these rooms. `DELETE /_synapse/admin/v1/rooms/<room_id>` It is a combination and improvement of "[Shutdown room](https://github.com/matrix-org/synapse/blob/develop/docs/admin_api/shutdown_room.md)" and "[Purge room](https://github.com/matrix-org/synapse/blob/develop/docs/admin_api/purge_room.md)" API. Fixes: #6425 It also fixes a bug in [synapse/storage/data_stores/main/room.py](synapse/storage/data_stores/main/room.py) in ` get_room_with_stats`. It should return `None` if the room is unknown. But it returns an `IndexError`. https://github.com/matrix-org/synapse/blob/901b1fa561e3cc661d78aa96d59802cf2078cb0d/synapse/storage/data_stores/main/room.py#L99-L105 Related to: - #5575 - https://github.com/Awesome-Technologies/synapse-admin/issues/17 Signed-off-by:
Dirk Klimpel <dirk@klimpel.org>
-
- Jul 08, 2020
-
-
Richard van der Hoff authored
... instead of duplicating `config.signing_key[0]` everywhere
-
- Jul 01, 2020
-
-
Brendan Abolivier authored
-
- Jun 12, 2020
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
- Jun 10, 2020
-
-
Brendan Abolivier authored
-
- Jun 03, 2020
-
-
Andrew Morgan authored
Calls `self.get_success` on all deferred methods instead of abusing `self.pump()`. This has the benefit of working with coroutines, as well as checking that method execution completed successfully. There are also a few small cleanups that I made in the process.
-
- May 22, 2020
-
-
Richard van der Hoff authored
These are surprisingly expensive, and we only really need to do them at startup.
-
Erik Johnston authored
The idea here is that if an instance persists an event via the replication HTTP API it can return before we receive that event over replication, which can lead to races where code assumes that persisting an event immediately updates various caches (e.g. current state of the room). Most of Synapse doesn't hit such races, so we don't do the waiting automagically, instead we do so where necessary to avoid unnecessary delays. We may decide to change our minds here if it turns out there are a lot of subtle races going on. People probably want to look at this commit by commit.
-
- May 14, 2020
-
-
Richard van der Hoff authored
Fix a bug where the `get_joined_users` cache could be corrupted by custom status events (or other state events with a state_key matching the user ID). The bug was introduced by #2229, but has largely gone unnoticed since then. Fixes #7099, #7373.
-
- May 13, 2020
-
-
Erik Johnston authored
The aim here is to get to a stage where we have a `PersistEventStore` that holds all the write methods used during event persistence, so that we can take that class out of the `DataStore` mixin and instansiate it separately. This will allow us to instansiate it on processes other than master, while also ensuring it is only available on processes that are configured to write to events stream. This is a bit of an architectural change, where we end up with multiple classes per data store (rather than one per data store we have now). We end up having: 1. Storage classes that provide high level APIs that can talk to multiple data stores. 2. Data store modules that consist of classes that must point at the same database instance. 3. Classes in a data store that can be instantiated on processes depending on config.
-
- May 11, 2020
-
-
Amber Brown authored
-
- May 07, 2020
-
-
Manuel Stahl authored
-
- May 04, 2020
-
-
Erik Johnston authored
This will be used to coordinate stream IDs across multiple writers. Functions as the equivalent of both `StreamIdGenerator` and `SlavedIdTracker`.
-
- Apr 28, 2020
-
-
Manuel Stahl authored
Signed-off-by:
Manuel Stahl <manuel.stahl@awesome-technologies.de>
-