Skip to content
Snippets Groups Projects
  1. Dec 16, 2020
  2. Dec 15, 2020
  3. Dec 04, 2020
  4. Dec 02, 2020
    • Patrick Cloke's avatar
      Apply an IP range blacklist to push and key revocation requests. (#8821) · 30fba621
      Patrick Cloke authored
      Replaces the `federation_ip_range_blacklist` configuration setting with an
      `ip_range_blacklist` setting with wider scope. It now applies to:
      
      * Federation
      * Identity servers
      * Push notifications
      * Checking key validitity for third-party invite events
      
      The old `federation_ip_range_blacklist` setting is still honored if present, but
      with reduced scope (it only applies to federation and identity servers).
      30fba621
  5. Nov 30, 2020
    • Andrew Morgan's avatar
      Add a config option to change whether unread push notification counts are... · 17fa58bd
      Andrew Morgan authored
      Add a config option to change whether unread push notification counts are per-message or per-room (#8820)
      
      This PR adds a new config option to the `push` section of the homeserver config, `group_unread_count_by_room`. By default Synapse will group push notifications by room (so if you have 1000 unread messages, if they lie in 55 rooms, you'll see an unread count on your phone of 55).
      
      However, it is also useful to be able to send out the true count of unread messages if desired. If `group_unread_count_by_room` is set to `false`, then with the above example, one would see an unread count of 1000 (email anyone?).
      17fa58bd
  6. Oct 29, 2020
    • Erik Johnston's avatar
      Add ability for access tokens to belong to one user but grant access to another user. (#8616) · f21e24ff
      Erik Johnston authored
      We do it this way round so that only the "owner" can delete the access token (i.e. `/logout/all` by the "owner" also deletes that token, but `/logout/all` by the "target user" doesn't).
      
      A future PR will add an API for creating such a token.
      
      When the target user and authenticated entity are different the `Processed request` log line will be logged with a: `{@admin:server as @bob:server} ...`. I'm not convinced by that format (especially since it adds spaces in there, making it harder to use `cut -d ' '` to chop off the start of log lines). Suggestions welcome.
      f21e24ff
  7. Oct 23, 2020
  8. Oct 19, 2020
  9. Sep 04, 2020
  10. Aug 27, 2020
  11. Jul 06, 2020
    • reivilibre's avatar
      Don't ignore `set_tweak` actions with no explicit `value`. (#7766) · 57feeab3
      reivilibre authored
      * Fix spec compliance; tweaks without values are valid
      
      (default to True, which is only concretely specified for
      `highlight`, but it seems only reasonable to generalise)
      
      * Changelog for 7766.
      
      * Add documentation to `tweaks_for_actions`
      
      May as well tidy up when I'm here.
      
      * Add a test for `tweaks_for_actions`
      57feeab3
  12. Jul 01, 2020
  13. Jun 15, 2020
  14. Apr 22, 2020
  15. Apr 16, 2020
  16. Feb 21, 2020
  17. Dec 18, 2019
    • Richard van der Hoff's avatar
      Clean up startup for the pusher (#6558) · d6752ce5
      Richard van der Hoff authored
      * Remove redundant python2 support code
      
      `str.decode()` doesn't exist on python3, so presumably this code was doing
      nothing
      
      * Filter out pushers with corrupt data
      
      When we get a row with unparsable json, drop the row, rather than returning a
      row with null `data`, which will then cause an explosion later on.
      
      * Improve logging when we can't start a pusher
      
      Log the ID to help us understand the problem
      
      * Make email pusher setup more robust
      
      We know we'll have a `data` member, since that comes from the database. What we
      *don't* know is if that is a dict, and if that has a `brand` member, and if
      that member is a string.
      d6752ce5
  18. Nov 01, 2019
    • Richard van der Hoff's avatar
      Support for routing outbound HTTP requests via a proxy (#6239) · 1cb84c64
      Richard van der Hoff authored
      The `http_proxy` and `HTTPS_PROXY` env vars can be set to a `host[:port]` value which should point to a proxy.
      
      The address of the proxy should be excluded from IP blacklists such as the `url_preview_ip_range_blacklist`.
      
      The proxy will then be used for
       * push
       * url previews
       * phone-home stats
       * recaptcha validation
       * CAS auth validation
      
      It will *not* be used for:
       * Application Services
       * Identity servers
       * Outbound federation
       * In worker configurations, connections from workers to masters
      
      Fixes #4198.
      1cb84c64
  19. Jul 03, 2019
  20. Jun 20, 2019
  21. Jun 11, 2019
  22. Jun 07, 2019
  23. May 13, 2019
  24. May 02, 2019
  25. May 01, 2019
  26. Mar 19, 2019
    • Richard van der Hoff's avatar
      Fix email test · 8c1774e8
      Richard van der Hoff authored
      The Mailer expects the config object to have `email_smtp_pass` and
      `email_riot_base_url` attributes (and it won't by default, because the default
      config impl doesn't set any of the attributes unless email_enable_notifs is
      set).
      8c1774e8
  27. Nov 19, 2018
  28. Nov 05, 2018
  29. Oct 30, 2018
Loading