summary refs log tree commit diff
path: root/scripts/generate_signing_key.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-12-20Change EventContext to use the Storage class (#6564)Erik Johnston15-53/+64
2019-12-19Explode on duplicate delta file names. (#6565)Erik Johnston2-0/+19
2019-12-19Port some admin handlers to async/await (#6559)Erik Johnston4-56/+46
2019-12-19Improve diagnostics on database upgrade failure (#6570)Richard van der Hoff3-8/+7
`Failed to upgrade database` is not helpful, and it's unlikely that UPGRADE.rst has anything useful.
2019-12-19Fix sdnotify with acme enabled (#6571)Richard van der Hoff2-3/+8
If acme was enabled, the sdnotify startup hook would never be run because we would try to add it to a hook which had already fired. There's no need to delay it: we can sdnotify as soon as we've started the listeners.
2019-12-19Add an export_signing_key script (#6546)Richard van der Hoff5-22/+130
I want to do some key rotation, and it is silly that we don't have a way to do this.
2019-12-18Clean up startup for the pusher (#6558)Richard van der Hoff7-43/+45
* Remove redundant python2 support code `str.decode()` doesn't exist on python3, so presumably this code was doing nothing * Filter out pushers with corrupt data When we get a row with unparsable json, drop the row, rather than returning a row with null `data`, which will then cause an explosion later on. * Improve logging when we can't start a pusher Log the ID to help us understand the problem * Make email pusher setup more robust We know we'll have a `data` member, since that comes from the database. What we *don't* know is if that is a dict, and if that has a `brand` member, and if that member is a string.
2019-12-18Add delta file to fix missing default table data (#6555)Andrew Morgan4-15/+24
2019-12-18Add database config class (#6513)Erik Johnston19-209/+287
This encapsulates config for a given database and is the way to get new connections.
2019-12-18too many parens v1.7.1 github/release-v1.7.1 release-v1.7.1Richard van der Hoff1-1/+1
2019-12-181.7.1Richard van der Hoff14-15/+25
2019-12-17Fix bug where we added duplicate event IDs as auth_events (#6560)Erik Johnston2-7/+9
2019-12-17Remove unused `get_pagination_rows` methods. (#6557)Erik Johnston4-18/+1
Remove unused get_pagination_rows methods
2019-12-16Add auth events as per spec. (#6556)Erik Johnston2-67/+35
Previously we tried to be clever and filter out some unnecessary event IDs to keep the auth chain small, but that had some annoying interactions with state res v2 so we stop doing that for now.
2019-12-16Add auth events as per spec. (#6556)Erik Johnston2-67/+35
Previously we tried to be clever and filter out some unnecessary event IDs to keep the auth chain small, but that had some annoying interactions with state res v2 so we stop doing that for now.
2019-12-16Add option to allow profile queries without sharing a room (#6523)Will Hunt5-1/+28
2019-12-16Incorporate reviewBrendan Abolivier2-6/+1
2019-12-16Update changelog.d/6553.bugfixBrendan Abolivier1-1/+1
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-12-16LintBrendan Abolivier1-2/+1
2019-12-16Add test caseBrendan Abolivier1-0/+133
2019-12-16Exclude rejected state events when calculating state at backwards extrems ↵Richard van der Hoff2-1/+2
(#6527) This fixes a weird bug where, if you were determined enough, you could end up with a rejected event forming part of the state at a backwards-extremity. Authing that backwards extrem would then lead to us trying to pull the rejected event from the db (with allow_rejected=False), which would fail with a 404.
2019-12-16Persist auth/state events at backwards extremities when we fetch them (#6526)Richard van der Hoff3-165/+83
The main point here is to make sure that the state returned by _get_state_in_room has been authed before we try to use it as state in the room.
2019-12-16sanity-checking for events used in state res (#6531)Richard van der Hoff6-43/+128
When we perform state resolution, check that all of the events involved are in the right room.
2019-12-16Sanity-check room ids in event auth (#6530)Richard van der Hoff2-0/+14
When we do an event auth operation, check that all of the events involved are in the right room.
2019-12-16Check the room_id of events when fetching room state/auth (#6524)Richard van der Hoff2-24/+56
When we request the state/auth_events to populate a backwards extremity (on backfill or in the case of missing events in a transaction push), we should check that the returned events are in the right room rather than blindly using them in the room state or auth chain. Given that _get_events_from_store_or_dest takes a room_id, it seems clear that it should be sanity-checking the room_id of the requested events, so let's do it there.
2019-12-16Add `include_event_in_state` to _get_state_for_room (#6521)Richard van der Hoff2-18/+22
Make it return the state *after* the requested event, rather than the one before it. This is a bit easier and requires fewer calls to get_events_from_store_or_dest.
2019-12-16Move get_state methods into FederationHandler (#6503)Richard van der Hoff3-86/+107
This is a non-functional refactor as a precursor to some other work.
2019-12-16Refactor get_events_from_store_or_dest to return a dict (#6501)Richard van der Hoff2-29/+16
There was a bunch of unnecessary conversion back and forth between dict and list going on here. We can simplify a bunch of the code.
2019-12-16