summary refs log tree commit diff
path: root/synapse/config/_base.pyi (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Add support for evicting cache entries based on last access time. (#10205)Erik Johnston2021-07-051-0/+2
|
* Fix performance of responding to user key requests over federation (#10221)Erik Johnston2021-06-211-0/+2
| | | | | We were repeatedly looking up a config option in a loop (using the unclassed config style), which is expensive enough that it can cause large CPU usage.
* Standardise the module interface (#10062)Brendan Abolivier2021-06-181-0/+2
| | | This PR adds a common configuration section for all modules (see docs). These modules are then loaded at startup by the homeserver. Modules register their hooks and web resources using the new `register_[...]_callbacks` and `register_web_resource` methods of the module API.
* Remove support for ACME v1 (#10194)Brendan Abolivier2021-06-171-1/+0
| | | | | Fixes #9778 ACME v1 has been fully decommissioned for existing installs on June 1st 2021(see https://community.letsencrypt.org/t/end-of-life-plan-for-acmev1/88430/27), so we can now safely remove it from Synapse.
* Rename handler and config modules which end in handler/config. (#9816)Patrick Cloke2021-04-201-10/+10
|
* Port "Allow users to click account renewal links multiple times without ↵Andrew Morgan2021-04-191-0/+2
| | | | | hitting an 'Invalid Token' page #74" from synapse-dinsic (#9832) This attempts to be a direct port of https://github.com/matrix-org/synapse-dinsic/pull/74 to mainline. There was some fiddling required to deal with the changes that have been made to mainline since (mainly dealing with the split of `RegistrationWorkerStore` from `RegistrationStore`, and the changes made to `self.make_request` in test code).
* JWT OIDC secrets for Sign in with Apple (#9549)Richard van der Hoff2021-03-091-0/+2
| | | | | Apple had to be special. They want a client secret which is generated from an EC key. Fixes #9220. Also fixes #9212 while I'm here.
* Clean up `ShardedWorkerHandlingConfig` (#9466)Erik Johnston2021-02-241-0/+2
| | | | | | | | | | | | | | | | | * Split ShardedWorkerHandlingConfig This is so that we have a type level understanding of when it is safe to call `get_instance(..)` (as opposed to `should_handle(..)`). * Remove special cases in ShardedWorkerHandlingConfig. `ShardedWorkerHandlingConfig` tried to handle the various different ways it was possible to configure federation senders and pushers. This led to special cases that weren't hit during testing. To fix this the handling of the different cases is moved from there and `generic_worker` into the worker config class. This allows us to have the logic in one place and allows the rest of the code to ignore the different cases.
* Ratelimit 3PID /requestToken API (#9238)Erik Johnston2021-01-281-1/+1
|
* Merge branch 'social_login' into developRichard van der Hoff2021-01-271-0/+2
|\
| * Implement MSC2858 support (#9183)Richard van der Hoff2021-01-271-0/+2
| | | | | | Fixes #8928.
* | Precompute joined hosts and store in Redis (#9198)Erik Johnston2021-01-261-0/+2
|/
* Allow re-using a UI auth validation for a period of time (#8970)Patrick Cloke2020-12-181-2/+2
|
* Better formatting for config errors from modules (#8874)Richard van der Hoff2020-12-081-2/+5
| | | | | | | | | | The idea is that the parse_config method of extension modules can raise either a ConfigError or a JsonValidationError, and it will be magically turned into a legible error message. There's a few components to it: * Separating the "path" and the "message" parts of a ConfigError, so that we can fiddle with the path bit to turn it into an absolute path. * Generally improving the way ConfigErrors get printed. * Passing in the config path to load_module so that it can wrap any exceptions that get caught appropriately.
* Add experimental support for sharding event persister. Again. (#8294)Erik Johnston2020-09-141-0/+1
| | | | | | This is *not* ready for production yet. Caveats: 1. We should write some tests... 2. The stream token that we use for events can get stalled at the minimum position of all writers. This means that new events may not be processed and e.g. sent down sync streams if a writer isn't writing or is slow.
* Revert "Add experimental support for sharding event persister. (#8170)" (#8242)Brendan Abolivier2020-09-041-1/+0
| | | | | | | * Revert "Add experimental support for sharding event persister. (#8170)" This reverts commit 82c1ee1c22a87b9e6e3179947014b0f11c0a1ac3. * Changelog
* Add experimental support for sharding event persister. (#8170)Erik Johnston2020-09-021-0/+1
| | | | | | This is *not* ready for production yet. Caveats: 1. We should write some tests... 2. The stream token that we use for events can get stalled at the minimum position of all writers. This means that new events may not be processed and e.g. sent down sync streams if a writer isn't writing or is slow.
* Add ability to run multiple pusher instances (#7855)Erik Johnston2020-07-161-0/+5
| | | This reuses the same scheme as federation sender sharding
* Implement OpenID Connect-based login (#7256)Quentin Gliech2020-05-081-0/+2
|
* Add a confirmation step to the SSO login flowBrendan Abolivier2020-03-021-0/+2
|
* Refactor HomeserverConfig so it can be typechecked (#6137)Amber Brown2019-10-101-0/+135