Skip to content
Snippets Groups Projects
  1. Jan 18, 2021
  2. Jan 15, 2021
  3. Jan 14, 2021
  4. Jan 12, 2021
  5. Jan 11, 2021
  6. Jan 07, 2021
  7. Dec 18, 2020
  8. Dec 17, 2020
  9. Dec 11, 2020
  10. Dec 04, 2020
  11. Dec 02, 2020
    • Richard van der Hoff's avatar
      Remove redundant mocking · 90cf1eec
      Richard van der Hoff authored
      90cf1eec
    • Patrick Cloke's avatar
      Apply an IP range blacklist to push and key revocation requests. (#8821) · 30fba621
      Patrick Cloke authored
      Replaces the `federation_ip_range_blacklist` configuration setting with an
      `ip_range_blacklist` setting with wider scope. It now applies to:
      
      * Federation
      * Identity servers
      * Push notifications
      * Checking key validitity for third-party invite events
      
      The old `federation_ip_range_blacklist` setting is still honored if present, but
      with reduced scope (it only applies to federation and identity servers).
      Unverified
      30fba621
    • Erik Johnston's avatar
      Correctly handle unpersisted events when calculating auth chain difference. (#8827) · c5b6abd5
      Erik Johnston authored
      We do state res with unpersisted events when calculating the new current state of the room, so that should be the only thing impacted. I don't think this is tooooo big of a deal as:
      
      1. the next time a state event happens in the room the current state should correct itself;
      2. in the common case all the unpersisted events' auth events will be pulled in by other state, so will still return the correct result (or one which is sufficiently close to not affect the result); and
      3. we mostly use the state at an event to do important operations, which isn't affected by this.
      Unverified
      c5b6abd5
  12. Nov 25, 2020
  13. Nov 17, 2020
  14. Nov 16, 2020
  15. Oct 29, 2020
    • Erik Johnston's avatar
      Add ability for access tokens to belong to one user but grant access to another user. (#8616) · f21e24ff
      Erik Johnston authored
      We do it this way round so that only the "owner" can delete the access token (i.e. `/logout/all` by the "owner" also deletes that token, but `/logout/all` by the "target user" doesn't).
      
      A future PR will add an API for creating such a token.
      
      When the target user and authenticated entity are different the `Processed request` log line will be logged with a: `{@admin:server as @bob:server} ...`. I'm not convinced by that format (especially since it adds spaces in there, making it harder to use `cut -d ' '` to chop off the start of log lines). Suggestions welcome.
      Unverified
      f21e24ff
  16. Oct 27, 2020
  17. Oct 26, 2020
  18. Oct 22, 2020
  19. Oct 21, 2020
  20. Oct 15, 2020
  21. Oct 14, 2020
  22. Oct 13, 2020
  23. Oct 12, 2020
    • Erik Johnston's avatar
      Make event persisters periodically announce position over replication. (#8499) · 8de3703d
      Erik Johnston authored
      Currently background proccesses stream the events stream use the "minimum persisted position" (i.e. `get_current_token()`) rather than the vector clock style tokens. This is broadly fine as it doesn't matter if the background processes lag a small amount. However, in extreme cases (i.e. SyTests) where we only write to one event persister the background processes will never make progress.
      
      This PR changes it so that the `MultiWriterIDGenerator` keeps the current position of a given instance as up to date as possible (i.e using the latest token it sees if its not in the process of persisting anything), and then periodically announces that over replication. This then allows the "minimum persisted position" to advance, albeit with a small lag.
      Unverified
      8de3703d
  24. Oct 07, 2020
  25. Oct 02, 2020
    • Erik Johnston's avatar
      Add logging on startup/shutdown (#8448) · e3debf96
      Erik Johnston authored
      This is so we can tell what is going on when things are taking a while to start up.
      
      The main change here is to ensure that transactions that are created during startup get correctly logged like normal transactions.
      Unverified
      e3debf96
  26. Sep 30, 2020
    • Erik Johnston's avatar
      Make token serializing/deserializing async (#8427) · 7941372e
      Erik Johnston authored
      The idea is that in future tokens will encode a mapping of instance to position. However, we don't want to include the full instance name in the string representation, so instead we'll have a mapping between instance name and an immutable integer ID in the DB that we can use instead. We'll then do the lookup when we serialize/deserialize the token (we could alternatively pass around an `Instance` type that includes both the name and ID, but that turns out to be a lot more invasive).
      Unverified
      7941372e
    • Richard van der Hoff's avatar
      Rewrite BucketCollector · 6d2d42f8
      Richard van der Hoff authored
      This was a bit unweildy for what I wanted: in particular, I wanted to assign
      each measurement straight into a bucket, rather than storing an intermediate
      Counter which didn't do any bucketing at all.
      
      I've replaced it with something that is hopefully a bit easier to use.
      
      (I'm not entirely sure what the difference between a HistogramMetricFamily and
      a GaugeHistogramMetricFamily is, but given our counters can go down as well as
      up the latter *sounds* more accurate?)
      6d2d42f8
  27. Sep 29, 2020
  28. Sep 28, 2020
Loading