- Dec 04, 2019
-
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
Co-Authored-By:
Erik Johnston <erik@matrix.org>
-
Erik Johnston authored
make cross signing signature index non-unique
-
Neil Johnson authored
Ensure that the the default settings for the room directory are that the it is hidden from public view by default.
-
Richard van der Hoff authored
(hopefully) ... and deobfuscate the relevant bit of code.
-
- Dec 03, 2019
-
-
Hubert Chathi authored
-
Brendan Abolivier authored
Implement part [MSC2228](https://github.com/matrix-org/matrix-doc/pull/2228). The parts that differ are: * the feature is hidden behind a configuration flag (`enable_ephemeral_messages`) * self-destruction doesn't happen for state events * only implement support for the `m.self_destruct_after` field (not the `m.self_destruct` one) * doesn't send synthetic redactions to clients because for this specific case we consider the clients to be able to destroy an event themselves, instead we just censor it (by pruning its JSON) in the database
-
Richard van der Hoff authored
-
Amber Brown authored
-
- Dec 02, 2019
-
-
Hubert Chathi authored
-
Hubert Chathi authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Filip Štědronský authored
Signed-Off-By:
Filip Štědronský <g@regnarg.cz>
-
- Nov 29, 2019
-
-
Andrew Morgan authored
-
Erik Johnston authored
Implement MSC 2367 - Membership Reasons
-
Brendan Abolivier authored
Discard retention policies when retrieving state
-
- Nov 28, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
Brendan Abolivier authored
Purge jobs don't delete the latest event in a room in order to keep the forward extremity and not break the room. On the other hand, get_state_events, when given an at_token argument calls filter_events_for_client to know if the user can see the event that matches that (sync) token. That function uses the retention policies of the events it's given to filter out those that are too old from a client's view. Some clients, such as Riot, when loading a room, request the list of members for the latest sync token it knows about, and get confused to the point of refusing to send any message if the server tells it that it can't get that information. This can happen very easily with the message retention feature turned on and a room with low activity so that the last event sent becomes too old according to the room's retention policy. An easy and clean fix for that issue is to discard the room's retention policies when retrieving state.
-
Richard van der Hoff authored
-
Erik Johnston authored
-
Andrew Morgan authored
-
Erik Johnston authored
-
Erik Johnston authored
-
Andrew Morgan authored
-
Erik Johnston authored
-
Andrew Morgan authored
-
Richard van der Hoff authored
Cf #6422
-
- Nov 27, 2019
-
-
Amber Brown authored
-
Hubert Chathi authored
-
Richard van der Hoff authored
-
Brendan Abolivier authored
Implement message retention policies (MSC1763)
-
Richard van der Hoff authored
Guess I only tested this on python 2 :/ Fixes #6419.
-
- Nov 26, 2019
-
-
Richard van der Hoff authored
-
Andrew Morgan authored
-