summary refs log tree commit diff
path: root/synapse/config/_base.pyi (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Bring auto-accept invite logic into Synapse (#17147)devonh2024-05-211-0/+2
| | | | | | | | | | | | | | This PR ports the logic from the [synapse_auto_accept_invite](https://github.com/matrix-org/synapse-auto-accept-invite) module into synapse. I went with the naive approach of injecting the "module" next to where third party modules are currently loaded. If there is a better/preferred way to handle this, I'm all ears. It wasn't obvious to me if there was a better location to add this logic that would cleanly apply to all incoming invite events. Relies on https://github.com/element-hq/synapse/pull/17166 to fix linter errors.
* Re-type config paths in `ConfigError`s to be `StrSequence`s (#15615)Sean Quah2023-05-181-1/+2
| | | | | | Part of #14809. Signed-off-by: Sean Quah <seanq@matrix.org>
* Re-enable some linting (#14821)Erik Johnston2023-01-121-6/+4
| | | | | | | * Re-enable some linting * Newsfile * Remove comment
* Switch to ruff instead of flake8. (#14633)Patrick Cloke2022-12-211-0/+2
| | | | | ruff is a flake8-compatible Python linter written in Rust. It supports the flake8 plugins that we use and is significantly faster in testing.
* Remove backing code for groups/communities (#12558)Patrick Cloke2022-05-261-2/+0
| | | | Including handlers, configuration code, appservice support, and the GroupID construct.
* Reload cache factors from disk on SIGHUP (#12673)David Robertson2022-05-111-1/+14
|
* Add missing type hints to config classes. (#12402)Patrick Cloke2022-04-111-4/+1
|
* Add config settings for background update parameters (#11980)Shay2022-03-111-0/+2
|
* Add missing type hints to config base classes (#11377)Patrick Cloke2021-11-231-27/+60
|
* Move experimental & retention config out of the server module. (#11070)Patrick Cloke2021-10-151-0/+2
|
* Add support for evicting cache entries based on last access time. (#10205)Erik Johnston2021-07-051-0/+2
|
* Fix performance of responding to user key requests over federation (#10221)Erik Johnston2021-06-211-0/+2
| | | | | We were repeatedly looking up a config option in a loop (using the unclassed config style), which is expensive enough that it can cause large CPU usage.
* Standardise the module interface (#10062)Brendan Abolivier2021-06-181-0/+2
| | | This PR adds a common configuration section for all modules (see docs). These modules are then loaded at startup by the homeserver. Modules register their hooks and web resources using the new `register_[...]_callbacks` and `register_web_resource` methods of the module API.
* Remove support for ACME v1 (#10194)Brendan Abolivier2021-06-171-1/+0
| | | | | Fixes #9778 ACME v1 has been fully decommissioned for existing installs on June 1st 2021(see https://community.letsencrypt.org/t/end-of-life-plan-for-acmev1/88430/27), so we can now safely remove it from Synapse.
* Rename handler and config modules which end in handler/config. (#9816)Patrick Cloke2021-04-201-10/+10
|
* Port "Allow users to click account renewal links multiple times without ↵Andrew Morgan2021-04-191-0/+2
| | | | | hitting an 'Invalid Token' page #74" from synapse-dinsic (#9832) This attempts to be a direct port of https://github.com/matrix-org/synapse-dinsic/pull/74 to mainline. There was some fiddling required to deal with the changes that have been made to mainline since (mainly dealing with the split of `RegistrationWorkerStore` from `RegistrationStore`, and the changes made to `self.make_request` in test code).
* JWT OIDC secrets for Sign in with Apple (#9549)Richard van der Hoff2021-03-091-0/+2
| | | | | Apple had to be special. They want a client secret which is generated from an EC key. Fixes #9220. Also fixes #9212 while I'm here.
* Clean up `ShardedWorkerHandlingConfig` (#9466)Erik Johnston2021-02-241-0/+2
| | | | | | | | | | | | | | | | | * Split ShardedWorkerHandlingConfig This is so that we have a type level understanding of when it is safe to call `get_instance(..)` (as opposed to `should_handle(..)`). * Remove special cases in ShardedWorkerHandlingConfig. `ShardedWorkerHandlingConfig` tried to handle the various different ways it was possible to configure federation senders and pushers. This led to special cases that weren't hit during testing. To fix this the handling of the different cases is moved from there and `generic_worker` into the worker config class. This allows us to have the logic in one place and allows the rest of the code to ignore the different cases.
* Ratelimit 3PID /requestToken API (#9238)Erik Johnston2021-01-281-1/+1
|
* Merge branch 'social_login' into developRichard van der Hoff2021-01-271-0/+2
|\
| * Implement MSC2858 support (#9183)Richard van der Hoff2021-01-271-0/+2
| | | | | | Fixes #8928.
* | Precompute joined hosts and store in Redis (#9198)Erik Johnston2021-01-261-0/+2
|/
* Allow re-using a UI auth validation for a period of time (#8970)Patrick Cloke2020-12-181-2/+2
|
* Better formatting for config errors from modules (#8874)Richard van der Hoff2020-12-081-2/+5
| | | | | | | | | | The idea is that the parse_config method of extension modules can raise either a ConfigError or a JsonValidationError, and it will be magically turned into a legible error message. There's a few components to it: * Separating the "path" and the "message" parts of a ConfigError, so that we can fiddle with the path bit to turn it into an absolute path. * Generally improving the way ConfigErrors get printed. * Passing in the config path to load_module so that it can wrap any exceptions that get caught appropriately.
* Add experimental support for sharding event persister. Again. (#8294)Erik Johnston2020-09-141-0/+1
| | | | | | This is *not* ready for production yet. Caveats: 1. We should write some tests... 2. The stream token that we use for events can get stalled at the minimum position of all writers. This means that new events may not be processed and e.g. sent down sync streams if a writer isn't writing or is slow.
* Revert "Add experimental support for sharding event persister. (#8170)" (#8242)Brendan Abolivier2020-09-041-1/+0
| | | | | | | * Revert "Add experimental support for sharding event persister. (#8170)" This reverts commit 82c1ee1c22a87b9e6e3179947014b0f11c0a1ac3. * Changelog
* Add experimental support for sharding event persister. (#8170)Erik Johnston2020-09-021-0/+1
| | | | | | This is *not* ready for production yet. Caveats: 1. We should write some tests... 2. The stream token that we use for events can get stalled at the minimum position of all writers. This means that new events may not be processed and e.g. sent down sync streams if a writer isn't writing or is slow.
* Add ability to run multiple pusher instances (#7855)Erik Johnston2020-07-161-0/+5
| | | This reuses the same scheme as federation sender sharding
* Implement OpenID Connect-based login (#7256)Quentin Gliech2020-05-081-0/+2
|
* Add a confirmation step to the SSO login flowBrendan Abolivier2020-03-021-0/+2
|
* Refactor HomeserverConfig so it can be typechecked (#6137)Amber Brown2019-10-101-0/+135