Skip to content
Snippets Groups Projects
  1. Oct 29, 2020
    • Erik Johnston's avatar
      Add ability for access tokens to belong to one user but grant access to another user. (#8616) · f21e24ff
      Erik Johnston authored
      We do it this way round so that only the "owner" can delete the access token (i.e. `/logout/all` by the "owner" also deletes that token, but `/logout/all` by the "target user" doesn't).
      
      A future PR will add an API for creating such a token.
      
      When the target user and authenticated entity are different the `Processed request` log line will be logged with a: `{@admin:server as @bob:server} ...`. I'm not convinced by that format (especially since it adds spaces in there, making it harder to use `cut -d ' '` to chop off the start of log lines). Suggestions welcome.
      Unverified
      f21e24ff
  2. Oct 23, 2020
  3. Oct 19, 2020
  4. Sep 04, 2020
  5. Aug 27, 2020
  6. Jul 06, 2020
    • reivilibre's avatar
      Don't ignore `set_tweak` actions with no explicit `value`. (#7766) · 57feeab3
      reivilibre authored
      * Fix spec compliance; tweaks without values are valid
      
      (default to True, which is only concretely specified for
      `highlight`, but it seems only reasonable to generalise)
      
      * Changelog for 7766.
      
      * Add documentation to `tweaks_for_actions`
      
      May as well tidy up when I'm here.
      
      * Add a test for `tweaks_for_actions`
      Unverified
      57feeab3
  7. Jul 01, 2020
  8. Jun 15, 2020
  9. Apr 22, 2020
  10. Apr 16, 2020
  11. Feb 21, 2020
  12. Dec 18, 2019
    • Richard van der Hoff's avatar
      Clean up startup for the pusher (#6558) · d6752ce5
      Richard van der Hoff authored
      * Remove redundant python2 support code
      
      `str.decode()` doesn't exist on python3, so presumably this code was doing
      nothing
      
      * Filter out pushers with corrupt data
      
      When we get a row with unparsable json, drop the row, rather than returning a
      row with null `data`, which will then cause an explosion later on.
      
      * Improve logging when we can't start a pusher
      
      Log the ID to help us understand the problem
      
      * Make email pusher setup more robust
      
      We know we'll have a `data` member, since that comes from the database. What we
      *don't* know is if that is a dict, and if that has a `brand` member, and if
      that member is a string.
      Unverified
      d6752ce5
  13. Nov 01, 2019
    • Richard van der Hoff's avatar
      Support for routing outbound HTTP requests via a proxy (#6239) · 1cb84c64
      Richard van der Hoff authored
      The `http_proxy` and `HTTPS_PROXY` env vars can be set to a `host[:port]` value which should point to a proxy.
      
      The address of the proxy should be excluded from IP blacklists such as the `url_preview_ip_range_blacklist`.
      
      The proxy will then be used for
       * push
       * url previews
       * phone-home stats
       * recaptcha validation
       * CAS auth validation
      
      It will *not* be used for:
       * Application Services
       * Identity servers
       * Outbound federation
       * In worker configurations, connections from workers to masters
      
      Fixes #4198.
      Unverified
      1cb84c64
  14. Jul 03, 2019
  15. Jun 20, 2019
  16. Jun 11, 2019
  17. Jun 07, 2019
  18. May 13, 2019
  19. May 02, 2019
  20. May 01, 2019
  21. Mar 19, 2019
    • Richard van der Hoff's avatar
      Fix email test · 8c1774e8
      Richard van der Hoff authored
      The Mailer expects the config object to have `email_smtp_pass` and
      `email_riot_base_url` attributes (and it won't by default, because the default
      config impl doesn't set any of the attributes unless email_enable_notifs is
      set).
      8c1774e8
  22. Nov 19, 2018
  23. Nov 05, 2018
  24. Oct 30, 2018
Loading