Timo Kösters
f5273f7eb1
improvement: upgrade ruma and implement blurhashes
2021-07-20 15:25:16 +02:00
Timo Kösters
0fcefa4125
fix: ruma
2021-07-20 15:25:16 +02:00
Timo Kösters
e12b1ff863
improvement: locks
2021-07-14 13:21:25 +02:00
Timo Kösters
e15e6d4405
improvement: efficient /sync, mutex for federation transactions
2021-07-14 13:20:39 +02:00
Timo Kösters
1c25492a7e
fix: stuck messages
...
Conduit did not send the event in /sync because of a race condition.
There is a brief moment in time where Conduit accepted the event, but
did not store it yet. So when the client /syncs it updates the since
token without sending the event. I hope I fixed it by significantly
shortening the race-condition period.
2021-07-14 13:19:24 +02:00
Timo Kösters
ac0027756e
improvement: more efficient state res
2021-07-14 13:10:49 +02:00
Jonathan de Jong
9d4fa9a220
Sqlite
2021-07-14 07:07:08 +00:00
Timo Kösters
13c0beafa6
Merge branch 'lib-fix' into 'master'
...
Export conduits Config struct and fix clippy warnings
See merge request famedly/conduit!99
2021-07-11 11:42:07 +00:00
Devin Ragotzy
1bb84a8e2d
Fix docs for fetch_and_handle_events
2021-06-30 07:48:16 -04:00
Devin Ragotzy
98f1480e2b
Remove auth_cache using a closure to fetch events in state-res
2021-06-30 12:54:19 +02:00
Timo Kösters
05821d6fd5
improvement: pdu cache, /sync cache
2021-06-30 10:31:34 +02:00
Devin Ragotzy
09a8737f24
Export conduits Config struct and fix clipp warningsy
2021-06-29 16:02:12 -04:00
Jonas Platte
808741bcb6
Remove unnecessary Option-wrapping and successive unwrapping
2021-06-17 20:44:29 +02:00
Jonas Platte
b291e76572
Use try operator for Option more
2021-06-17 20:37:07 +02:00
Jonas Platte
f3e630c064
Fix lots of clippy lints
2021-06-17 20:34:14 +02:00
Jonas Platte
f6046871f4
Upgrade Ruma
2021-06-17 20:12:36 +02:00
Timo Kösters
67f9592b17
feat: /event_auth
2021-06-14 11:36:40 +02:00
Timo Kösters
3c9ea55938
feat: /state
2021-06-14 11:01:12 +02:00
Timo Kösters
cd4bc520d8
improvement: feature flags for sled, rocksdb
2021-06-12 15:13:04 +02:00
Timo Kösters
d0ee823254
feat: swappable database backend
2021-06-09 22:21:52 +02:00
Timo Kösters
5b5cc0574e
feat: implement /claim, handle to-device events
2021-05-28 13:46:15 +02:00
Gabriel Souza Franco
7db59c550f
fix: also return successful PDUs in /send/:txnId
2021-05-27 18:10:48 -03:00
Timo Kösters
daa1fc90a7
fix: state resolution bugs
2021-05-27 10:48:17 +02:00
Timo Kösters
e5c7119516
feat: forward federation errors to the client
2021-05-23 16:46:46 +02:00
Timo Kösters
989d843c40
fix: unauthorized pdus will be responded to with FORBIDDEN
2021-05-21 18:12:02 +02:00
Timo Kösters
09157b2096
improvement: federation get_keys and optimize signingkey storage
...
- get encryption keys over federation
- optimize signing key storage
- rate limit parsing of bad events
- rate limit signature fetching
- dependency bumps
2021-05-21 13:25:24 +02:00
Timo Kösters
ae41bc5067
fix: run state res with old current state again
...
I'm a bit torn on the "auth check based on the current state of the
room". It can mean multiple things:
1. The state of the room before the homeserver looked at the event at
all. But that means if a message event from a user arrives, but we
didn't see their join event before, we soft fail the message (even
though we would find the join event when going through the auth events
of the event and doing state res)
2. The state of the room after doing state-res with the event and our
previous room state. We need to do this state resolution to find the new
room state anyway, so we could just use the new room state for the auth
check. The problem is that if the incoming event is a membership leave
event, the new room state does not allow another leave event. This is
obviously the wrong option.
3. The state of the room after doing state-res with the state **before**
the event and our previous room state. This will mean a lot more
calculations because we have to run state-res again
We used 2. before and now use 1. again
2021-05-17 10:58:44 +02:00
Timo Kösters
f62258ba35
improvement: bug fixes and refactors
...
- power level content override adds to the default event instead of
replacing it
- sending code refactored to make edus possible
- remove presence events when restarting conduit
- remove room_id field from read receipts over /sync
- handle incoming read receipts
- fix array bounds bug in server_server.rs
2021-05-12 20:15:24 +02:00
Jonas Platte
a0457000ff
Upgrade Ruma
2021-05-08 01:54:28 +02:00
Timo Kösters
cf94b8e712
improvement: uiaa works like in synapse
2021-05-04 19:05:30 +02:00
Jonas Platte
8bfaf09f37
Clean up reqwest::Response to http::Response conversion
2021-04-29 21:28:00 +02:00
Jonas Platte
2e1d7d12ca
Refactor usage of CanonicalJsonValue
2021-04-26 19:03:51 +02:00
Timo Kösters
58463bba93
feat: send invites over federation
2021-04-25 14:10:21 +02:00
Timo Kösters
226045ea4b
improvement: warning on misconfigured reverse proxy
2021-04-24 12:29:02 +02:00
Jonas Platte
d8b484beed
Upgrade ruma
2021-04-24 12:22:36 +02:00
Timo Kösters
6e84d317b2
improvement: update ruma
2021-04-24 12:17:44 +02:00
Timo Kösters
1f84013b2a
feat: verify signatures for incoming requests
2021-04-24 12:17:44 +02:00
Timo Kösters
8c72909bb8
Merge branch 'tls-name' into 'master'
...
Validate TLS certificates according to Matrix spec
See merge request famedly/conduit!60
2021-04-23 05:22:07 +00:00
Timo Kösters
2f440e644d
fix: clippy
2021-04-21 10:59:07 +02:00
Timo Kösters
71ed1b295a
feat: /devices route
2021-04-21 10:51:56 +02:00
Gabriel Souza Franco
ed253e236c
chore: document FedDest, fix tests
2021-04-21 00:35:44 -03:00
Timo Kösters
d4e0ba245b
fix: bug when fetching events over federation
2021-04-19 11:55:27 +02:00
Timo Kösters
eedac4fd96
feat: make_join, send_join and /directory
2021-04-16 18:18:29 +02:00
Gabriel Souza Franco
7faa021ff5
chore: code formatting and cleanup
2021-04-16 12:18:22 -03:00
Gabriel Souza Franco
b4c001de2f
chore: cleanup string-based code in find_actual_destination
2021-04-16 00:27:26 -03:00
Gabriel Souza Franco
0b56589dce
feat: add handling of tls cert for delegated hosts
2021-04-15 22:07:27 -03:00
Timo Kösters
c1953efa6b
chore: code cleanup
2021-04-14 10:43:31 +02:00
Timo Kösters
5951294638
feat: join cursed rooms
...
this removes several restrictions and tries to continue verifying a pdu
event if some auth events fail (it drops/ignores bad pdus)
2021-04-14 09:39:06 +02:00
Timo Kösters
8b40e0a85f
improvement: fetch signing keys in parallel when joining a room
2021-04-13 22:54:01 +02:00
Timo Kösters
5049d0e01b
improvement: check signatures on join
2021-04-13 18:17:51 +02:00