summary refs log tree commit diff
path: root/scripts-dev/convert_server_keys.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-02-25Increase expected state events in tests for new room by oneAndrew Morgan1-1/+6
2020-02-24Move buildkite config to the pipelines repo (#5943)Amber Brown2-0/+16
Note: I kept it in the repo for now ~anoa
2020-02-24Add m.id_access_token flag (#5930)Andrew Morgan2-1/+7
Adds a flag to `/versions`' `unstable_features` section indicating that this Synapse understands what an `id_access_token` is, as per https://github.com/matrix-org/synapse/issues/5927#issuecomment-523566043 Fixes #5927
2020-02-24Removed unused jenkins/ folder and script (#5938)Amber Brown2-16/+1
2020-02-24Revert "Use the v2 lookup API for 3PID invites (#5897)"Andrew Morgan10-320/+183
This reverts commit 978f263e7c5d1eb440efaf07abc5009408ade25d, reversing changes made to 4f6ee99818d9c338944a10585d0aea4c7349d456.
2020-02-14Blacklist some flaky testsAndrew Morgan1-0/+6
2020-02-14Pin black to 19.3b0Andrew Morgan1-1/+1
2020-02-14Fix with isort==4.3.21 and black==19.3b0Andrew Morgan13-24/+19
2020-02-14Delete duplicate user deactivationAndrew Morgan1-7/+0
2020-02-14Fix account_validity incorrect email response contentAndrew Morgan1-2/+5
2020-02-14Fix incorrect run_in_background import statementAndrew Morgan1-1/+1
2020-02-14Fix signedjson deleted methodAndrew Morgan1-4/+12
2020-02-11Dinsic Blacking with black==18.6b2Andrew Morgan353-10315/+8823
2020-01-24Fix resetting password via a phone number (#21) dinsic_2020-02-10Andrew Morgan2-1/+2
2020-01-22Validate client_secret parameter according to spec (#20)Andrew Morgan4-1/+34
2019-12-19Improve diagnostics on database upgrade failure (#6570)Richard van der Hoff3-8/+7
`Failed to upgrade database` is not helpful, and it's unlikely that UPGRADE.rst has anything useful.
2019-12-19Fix sdnotify with acme enabled (#6571)Richard van der Hoff2-3/+8
If acme was enabled, the sdnotify startup hook would never be run because we would try to add it to a hook which had already fired. There's no need to delay it: we can sdnotify as soon as we've started the listeners.
2019-12-19Add an export_signing_key script (#6546)Richard van der Hoff5-22/+130
I want to do some key rotation, and it is silly that we don't have a way to do this.
2019-12-18Clean up startup for the pusher (#6558)Richard van der Hoff7-43/+45
* Remove redundant python2 support code `str.decode()` doesn't exist on python3, so presumably this code was doing nothing * Filter out pushers with corrupt data When we get a row with unparsable json, drop the row, rather than returning a row with null `data`, which will then cause an explosion later on. * Improve logging when we can't start a pusher Log the ID to help us understand the problem * Make email pusher setup more robust We know we'll have a `data` member, since that comes from the database. What we *don't* know is if that is a dict, and if that has a `brand` member, and if that member is a string.
2019-12-18Add delta file to fix missing default table data (#6555)Andrew Morgan4-15/+24
2019-12-18Add database config class (#6513)Erik Johnston19-209/+287
This encapsulates config for a given database and is the way to get new connections.
2019-12-18too many parens v1.7.1 github/release-v1.7.1 release-v1.7.1Richard van der Hoff1-1/+1
2019-12-181.7.1Richard van der Hoff14-15/+25
2019-12-17Fix bug where we added duplicate event IDs as auth_events (#6560)Erik Johnston2-7/+9
2019-12-17Remove unused `get_pagination_rows` methods. (#6557)Erik Johnston4-18/+1
Remove unused get_pagination_rows methods
2019-12-16Add auth events as per spec. (#6556)Erik Johnston2-67/+35
Previously we tried to be clever and filter out some unnecessary event IDs to keep the auth chain small, but that had some annoying interactions with state res v2 so we stop doing that for now.
2019-12-16Add auth events as per spec. (#6556)Erik Johnston2-67/+35
Previously we tried to be clever and filter out some unnecessary event IDs to keep the auth chain small, but that had some annoying interactions with state res v2 so we stop doing that for now.
2019-12-16Add option to allow profile queries without sharing a room (#6523)Will Hunt5-1/+28
2019-12-16Incorporate reviewBrendan Abolivier2-6/+1
2019-12-16Update changelog.d/6553.bugfixBrendan Abolivier1-1/+1
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-12-16LintBrendan Abolivier1-2/+1
2019-12-16Add test caseBrendan Abolivier1-0/+133
2019-12-16Exclude rejected state events when calculating state at backwards extrems ↵Richard van der Hoff2-1/+2
(#6527) This fixes a weird bug where, if you were determined enough, you could end up with a rejected event forming part of the state at a backwards-extremity. Authing that backwards extrem would then lead to us trying to pull the rejected event from the db (with allow_rejected=False), which would fail with a 404.
2019-12-16Persist auth/state events at backwards extremities when we fetch them (#6526)Richard van der Hoff3-165/+83
The main point here is to make sure that the state returned by _get_state_in_room has been authed before we try to use it as state in the room.
2019-12-16sanity-checking for events used in state res (#6531)Richard van der Hoff6-43/+128
When we perform state resolution, check that all of the events involved are in the right room.
2019-12-16Sanity-check room ids in event auth (#6530)Richard van der Hoff2-0/+14
When we do an event auth operation, check that all of the events involved are in the right room.
2019-12-16Check the room_id of events when fetching room state/auth (#6524)Richard van der Hoff2-24/+56
When we request the state/auth_events to populate a backwards extremity (on backfill or in the case of missing events in a transaction push), we should check that the returned events are in the