- Nov 29, 2021
-
-
David Robertson authored
This would have caught the bug #11438 introduced in #11217 and fixed in #11439.
-
- Nov 26, 2021
-
-
reivilibre authored
Update MSC2918 refresh token support to confirm with the latest revision: accept the `refresh_tokens` parameter in the request body rather than in the URL parameters. (#11430)
-
Sean Quah authored
Also refactor the stream ID trackers/generators a bit and try to document them better.
-
reivilibre authored
Support expiry of refresh tokens and expiry of the overall session when refresh tokens are in use. (#11425)
-
Sean Quah authored
The previous fix for the ongoing event fetches counter (8eec25a1) was both insufficient and incorrect. When the database is unreachable, `_do_fetch` never gets run and so `_event_fetch_ongoing` is never decremented. The previous fix also moved the `_event_fetch_ongoing` decrement outside of the `_event_fetch_lock` which allowed race conditions to corrupt the counter.
-
- Nov 25, 2021
-
-
Brendan Abolivier authored
Co-authored-by:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
-
- Nov 24, 2021
-
-
Brendan Abolivier authored
Co-authored-by:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
-
- Nov 23, 2021
-
-
reivilibre authored
Rename unstable `access_token_lifetime` configuration option to `refreshable_access_token_lifetime` to make it clear it only concerns refreshable access tokens. (#11388)
-
Patrick Cloke authored
-
Shay authored
Remove code invalidated by deprecated config flag 'trust_identity_servers_for_password_resets' (#11395) * remove background update code related to deprecated config flag * changelog entry * update changelog * Delete 11394.removal Duplicate, wrong number * add no-op background update and change newfragment so it will be consolidated with associated work * remove unused code * Remove code associated with deprecated flag from legacy docker dynamic config file Co-authored-by:
reivilibre <oliverw@matrix.org>
-
- Nov 22, 2021
-
-
Kostas authored
Allows specifying a different claim (from the default "sub") to use when calculating the localpart of the Matrix ID used during the JWT login.
-
Patrick Cloke authored
Instead of only known relation types. This also reworks the background update for thread relations to crawl events and search for any relation type, not just threaded relations.
-
- Nov 19, 2021
-
-
Dirk Klimpel authored
Instead of having admins poke into the database directly. Can currently run jobs to populate stats and to populate the user directory.
-
Patrick Cloke authored
If `room_list_publication_rules` was configured with a rule with a non-wildcard alias and a room was created with an alias then an internal server error would have been thrown. This fixes the error and properly applies the publication rules during room creation.
-
Sean Quah authored
Also tighten validation of server names by forbidding invalid characters in IPv6 addresses and empty domain labels.
-
Hubert Chathi authored
-
Richard van der Hoff authored
Fixes a bug introduced in #11129: objects signed by the local server, but with keys other than the current one, could not be successfully verified. We need to check the key id in the signature, and track down the right key.
-
- Nov 18, 2021
-
-
Shay authored
Remove legacy code related to deprecated `trust_identity_server_for_password_resets` config flag (#11333) * remove code legacy code related to deprecated config flag "trust_identity_server_for_password_resets" from synapse/config/emailconfig.py * remove legacy code supporting depreciated config flag "trust_identity_server_for_password_resets" from synapse/config/registration.py * remove legacy code supporting depreciated config flag "trust_identity_server_for_password_resets" from synapse/handlers/identity.py * add tests to ensure config error is thrown and synapse refuses to start when depreciated config flag is found * add changelog * slightly change behavior to only check for deprecated flag if set to 'true' * Update changelog.d/11333.misc Co-authored-by:
reivilibre <oliverw@matrix.org> Co-authored-by:
reivilibre <oliverw@matrix.org>
-
Dirk Klimpel authored
-
Patrick Cloke authored
Adds validation to the Client-Server API to ensure that the potential thread head does not relate to another event already. This results in not allowing a thread to "fork" into other threads. If the target event is unknown for some reason (maybe it isn't visible to your homeserver), but is the target of other events it is assumed that the thread can be created from it. Otherwise, it is rejected as an unknown event.
-
- Nov 17, 2021
-
-
reivilibre authored
-
- Nov 16, 2021
-
-
Patrick Cloke authored
-
Sean Quah authored
Different users may be allowed to see different rooms within a space, so sharing responses between users is inadvisable.
-
Patrick Cloke authored
-
David Robertson authored
-
- Nov 15, 2021
-
-
Andrew Morgan authored
Co-authored-by:
Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
-
David Robertson authored
It already seems to pass mypy. I wonder what changed, given that it was on the exclusion list. So this commit consists of me ensuring `--disallow-untyped-defs` passes and a minor fixup to a function that returned either `True` or `None`.
-
Tulir Asokan authored
* Add support for the stable version of MSC2778 Signed-off-by:
Tulir Asokan <tulir@maunium.net> * Expect m.login.application_service in login and password provider tests Signed-off-by:
Tulir Asokan <tulir@maunium.net>
-
- Nov 12, 2021
-
-
David Robertson authored
* Prefer `HTTPStatus` over plain `int` This is an Opinion that no-one has seemed to object to yet. * `--disallow-untyped-defs` for `tests.rest.client.test_directory` * Improve synapse's annotations for deleting aliases * Test case for deleting a room alias * Changelog
-
Shay authored
* change display names/avatar URLS to None if they contain null bytes * add changelog * add POC test, requested changes * add a saner test and remove old one * update test to verify that display name has been changed to None * make test less fragile
-
David Robertson authored
* Annotate HomeserverTestCase.servlets * Correct annotation of federation_auth_origin * Use AnyStr custom_headers instead of a Union This allows (str, str) and (bytes, bytes). This disallows (str, bytes) and (bytes, str) * DomainSpecificString.SIGIL is a ClassVar
-
Dirk Klimpel authored
Signed-off-by:
Dirk Klimpel <dirk@klimpel.org>
-
- Nov 10, 2021
-
-
Richard van der Hoff authored
as of #11012, these parameters are unused.
-
- Nov 09, 2021
-
-
Andrew Morgan authored
Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com>
-
David Robertson authored
Co-authored-by:
Dirk Klimpel <5740567+dklimpel@users.noreply.github.com> Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
-
Patrick Cloke authored
Adds experimental support for `relation_types` and `relation_senders` fields for filters.
-
Erik Johnston authored
When fetching remote devices for the first time, we did not correctly include the cross signing keys in the returned results. c.f. #11159
-
rogersheu authored
Co-authored-by:
reivilibre <olivier@librepush.net>
-
- Nov 08, 2021
-
-
Erik Johnston authored
Fixes #11259
-
Richard van der Hoff authored
We might as well use a default value for `public_baseurl` based on `server_name` - in many cases, it will be correct.
-