- Dec 04, 2019
-
-
Brendan Abolivier authored
-
Erik Johnston authored
Move things out of SQLBaseStore
-
Erik Johnston authored
This reverts commit 00f0d675. Its going to get removed soon, so lets not make merge conflicts.
-
Erik Johnston authored
-
Erik Johnston authored
Fix issue #6406 parameter mismatch
-
Brendan Abolivier authored
Filter state, events_before and events_after in /context requests
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Brendan Abolivier authored
-
Brendan Abolivier authored
Merge branch 'babolivier/context_filters' of github.com:matrix-org/synapse into babolivier/context_filters
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
Co-Authored-By:
Erik Johnston <erik@matrix.org>
-
Erik Johnston authored
make cross signing signature index non-unique
-
Neil Johnson authored
Ensure that the the default settings for the room directory are that the it is hidden from public view by default.
-
Richard van der Hoff authored
(hopefully) ... and deobfuscate the relevant bit of code.
-
Syam G Krishnan authored
Signed-off-by:
Syam G Krishnan <syamgk@gmail.com>
-
Syam G Krishnan authored
Signed-off-by:
Syam G Krishnan <syamgk01@gmail.com>
-
- Dec 03, 2019
-
-
Hubert Chathi authored
-
Brendan Abolivier authored
Implement part [MSC2228](https://github.com/matrix-org/matrix-doc/pull/2228). The parts that differ are: * the feature is hidden behind a configuration flag (`enable_ephemeral_messages`) * self-destruction doesn't happen for state events * only implement support for the `m.self_destruct_after` field (not the `m.self_destruct` one) * doesn't send synthetic redactions to clients because for this specific case we consider the clients to be able to destroy an event themselves, instead we just censor it (by pruning its JSON) in the database
-
Richard van der Hoff authored
-
Amber Brown authored
-
- Dec 02, 2019
-
-
Hubert Chathi authored
-
Hubert Chathi authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Filip Štědronský authored
Signed-Off-By:
Filip Štědronský <g@regnarg.cz>
-
- Nov 29, 2019
-
-
Andrew Morgan authored
-
Erik Johnston authored
Implement MSC 2367 - Membership Reasons
-
Brendan Abolivier authored
Discard retention policies when retrieving state
-
- Nov 28, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
Brendan Abolivier authored
Purge jobs don't delete the latest event in a room in order to keep the forward extremity and not break the room. On the other hand, get_state_events, when given an at_token argument calls filter_events_for_client to know if the user can see the event that matches that (sync) token. That function uses the retention policies of the events it's given to filter out those that are too old from a client's view. Some clients, such as Riot, when loading a room, request the list of members for the latest sync token it knows about, and get confused to the point of refusing to send any message if the server tells it that it can't get that information. This can happen very easily with the message retention feature turned on and a room with low activity so that the last event sent becomes too old according to the room's retention policy. An easy and clean fix for that issue is to discard the room's retention policies when retrieving state.
-