summary refs log tree commit diff
path: root/scripts-dev/tail-synapse.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-02-11Remove redundant entries from docker configRichard van der Hoff3-24/+2
* no_tls is now redundant (#4613) * we don't need a dummy cert any more (#4618)
2019-02-11fix testsRichard van der Hoff2-3/+7
2019-02-11Infer no_tls from presence of TLS listenersRichard van der Hoff10-20/+27
Rather than have to specify `no_tls` explicitly, infer whether we need to load the TLS keys etc from whether we have any TLS-enabled listeners.
2019-02-11Don't create server contexts when TLS is disabledRichard van der Hoff3-3/+7
we aren't going to use them anyway.
2019-02-11Fail cleanly if listener config lacks a 'port'Richard van der Hoff2-0/+6
... otherwise we would fail with a mysterious KeyError or something later.
2019-02-11Logging improvements around TLS certsRichard van der Hoff3-22/+39
Log which file we're reading keys and certs from, and refactor the code a bit in preparation for other work
2019-02-11Move ClientTLSOptionsFactory init out of refresh_certificates (#4611)Richard van der Hoff5-9/+9
It's nothing to do with refreshing the certificates. No idea why it was here.
2019-02-11Clean up default listener configuration (#4586)Richard van der Hoff2-48/+82
Rearrange the comments to try to clarify them, and expand on what some of it means. Use a sensible default 'bind_addresses' setting. For the insecure port, only bind to localhost, and enable x_forwarded, since apparently it's for use behind a load-balancer.
2019-02-11Clarifications for reverse proxy docs (#4607)Richard van der Hoff6-62/+117
Factor out the reverse proxy info to a separate file, add some more info on reverse-proxying the federation port.
2019-02-11ACME Reprovisioning (#4522)Amber Brown5-25/+89
2019-02-11Be tolerant of blank TLS fingerprints config (#4589)Amber Brown2-1/+6
2019-02-08Allow "unavailable" presence status for /sync (#4592)Valentin Anger3-1/+4
* Allow "unavailable" presence status for /sync Closes #3772, closes #3779 Signed-off-by: Valentin Anger <valentin.an.1999@gmail.com> * Add changelog for PR 4592
2019-02-08Fix 'no unique or exclusion constraint' error (#4591)Richard van der Hoff2-6/+22
Add more tables to the list of tables which need a background update to complete before we can upsert into them, which fixes a race against the background updates.
2019-02-08Deduplicate some code in synapse.app (#4567)Amber Brown14-158/+83
2019-02-08make sure version is in body and wrap in linearizer queueHubert Chathi3-12/+100
also add tests
2019-02-07Update MSC1711 FAQ to be explicit about well-known (#4584)Erik Johnston2-13/+28
A surprising number of people are using the well-known method, and are simply copying the example configuration. This is problematic as the example includes an explicit port, which causes inbound federation requests to have the