commit matrix-synapse for openSUSE:Factory
Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package matrix-synapse for openSUSE:Factory checked in at 2021-06-29 22:43:35 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/matrix-synapse (Old) and /work/SRC/openSUSE:Factory/.matrix-synapse.new.2625 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "matrix-synapse" Tue Jun 29 22:43:35 2021 rev:38 rq:903072 version:1.37.0 Changes: -------- --- /work/SRC/openSUSE:Factory/matrix-synapse/matrix-synapse.changes 2021-06-16 20:36:53.431330036 +0200 +++ /work/SRC/openSUSE:Factory/.matrix-synapse.new.2625/matrix-synapse.changes 2021-06-29 22:44:18.782957051 +0200 @@ -1,0 +2,113 @@ +Tue Jun 29 10:44:06 UTC 2021 - Marcus Rueckert <mrueckert@suse.de> + +- Update to 1.37.0 + This release deprecates the current spam checker interface. See + the upgrade notes for more information on how to update to the + new generic module interface. + + This release also removes support for fetching and renewing TLS + certificates using the ACME v1 protocol, which has been fully + decommissioned by Let's Encrypt on June 1st 2021. Admins + previously using this feature should use a reverse proxy to + handle TLS termination, or use an external ACME client (such as + certbot) to retrieve a certificate and key and provide them to + Synapse using the tls_certificate_path and tls_private_key_path + configuration settings. + + - Features + - Implement "room knocking" as per MSC2403. Contributed by + @Sorunome and anoa. (#6739, #9359, #10167, #10212, #10227) + - Add experimental support for backfilling history into rooms + (MSC2716). (#9247) + - Implement a generic interface for third-party plugin modules. + (#10062, #10206) + - Implement config option sso.update_profile_information to + sync SSO users' profile information with the identity + provider each time they login. Currently only displayname is + supported. (#10108) + - Ensure that errors during startup are written to the logs and + the console. (#10191) + - Bugfixes + - Fix a bug introduced in Synapse v1.25.0 that prevented the + ip_range_whitelist configuration option from working for + federation and identity servers. Contributed by @mikure. + (#10115) + - Remove a broken import line in Synapse's admin_cmd worker. + Broke in Synapse v1.33.0. (#10154) + - Fix a bug introduced in Synapse v1.21.0 which could cause + /sync to return immediately with an empty response. (#10157, + #10158) + - Fix a minor bug in the response to + /_matrix/client/r0/user/{user}/openid/request_token causing + expires_in to be a float instead of an integer. Contributed + by @lukaslihotzki. (#10175) + - Always require users to re-authenticate for dangerous + operations: deactivating an account, modifying an account + password, and adding 3PIDs. (#10184) + - Fix a bug introduced in Synpase v1.7.2 where remote server + count metrics collection would be incorrectly delayed on + startup. Found by @heftig. (#10195) + - Fix a bug introduced in Synapse v1.35.1 where an allow key of + a m.room.join_rules event could be applied for incorrect room + versions and configurations. (#10208) + - Fix performance regression in responding to user key requests + over federation. Introduced in Synapse v1.34.0rc1. (#10221) + - Improved Documentation + - Add a new guide to decoding request logs. (#8436) + - Mention in the sample homeserver config that you may need to + configure max upload size in your reverse proxy. Contributed + by @aaronraimist. (#10122) + - Fix broken links in documentation. (#10180) + - Deploy a snapshot of the documentation website upon each new + Synapse release. (#10198) + - Deprecations and Removals + - The current spam checker interface is deprecated in favour of + a new generic modules system. See the upgrade notes for more + information on how to update to the new system. (#10062, + #10210, #10238) + - Stop supporting the unstable spaces prefixes from MSC1772. + (#10161) + - Remove Synapse's support for automatically fetching and + renewing certificates using the ACME v1 protocol. This + protocol has been fully turned off by Let's Encrypt for + existing installations on June 1st 2021. Admins previously + using this feature should use a reverse proxy to handle TLS + termination, or use an external ACME client (such as certbot) + to retrieve a certificate and key and provide them to Synapse + using the tls_certificate_path and tls_private_key_path + configuration settings. (#10194) + - Internal Changes + - Update the database schema versioning to support gradual + migration away from legacy tables. (#9933) + - Add type hints to the federation servlets. (#10080) + - Improve OpenTracing for event persistence. (#10134, #10193) + - Clean up the interface for injecting OpenTracing over HTTP. + (#10143) + - Limit the number of in-flight /keys/query requests from a + single device. (#10144) + - Refactor EventPersistenceQueue. (#10145) + - Document SYNAPSE_TEST_LOG_LEVEL to see the logger output when + running tests. (#10148) + - Update the Complement build tags in GitHub Actions to test + currently experimental features. (#10155) + - Add a synapse_federation_soft_failed_events_total metric to + track how often events are soft failed. (#10156) + - Fetch the corresponding complement branch when performing CI. + (#10160) + - Add some developer documentation about boolean columns in + database schemas. (#10164) + - Add extra logging fields to better debug where events are + being soft failed. (#10168) + - Add debug logging for when we enter and exit Measure blocks. + (#10183) + - Improve comments in structured logging code. (#10188) + - Update MSC3083 support with modifications from the MSC. + (#10189) + - Remove redundant DNS lookup limiter. (#10190) + - Upgrade black linting tool to 21.6b0. (#10197) + - Expose OpenTracing trace id in response headers. (#10199) +- refresh patches to apply cleanly again: + dont-bump-cryptography-with-system-openssl.patch + matrix-synapse-1.4.1-paths.patch + +------------------------------------------------------------------- Old: ---- matrix-synapse-1.36.0.obscpio New: ---- matrix-synapse-1.37.0.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ matrix-synapse-test.spec ++++++ --- /var/tmp/diff_new_pack.Rwwl7k/_old 2021-06-29 22:44:19.354957806 +0200 +++ /var/tmp/diff_new_pack.Rwwl7k/_new 2021-06-29 22:44:19.358957811 +0200 @@ -27,7 +27,7 @@ %define pkgname matrix-synapse Name: %{pkgname}-test -Version: 1.36.0 +Version: 1.37.0 Release: 0 Summary: Test package for %{pkgname} License: Apache-2.0 ++++++ matrix-synapse.spec ++++++ --- /var/tmp/diff_new_pack.Rwwl7k/_old 2021-06-29 22:44:19.374957832 +0200 +++ /var/tmp/diff_new_pack.Rwwl7k/_new 2021-06-29 22:44:19.378957838 +0200 @@ -29,8 +29,6 @@ %bcond_with opentracing # matrix-synapse-ldap isn't packaged on openSUSE. %bcond_with ldap -# txacme is broken in openSUSE. -%bcond_with acme # sentry-sdk isn't packaged on openSUSE. %bcond_with sentry @@ -52,7 +50,7 @@ %define pkgname matrix-synapse %define eggname matrix_synapse Name: %{pkgname} -Version: 1.36.0 +Version: 1.37.0 Release: 0 Summary: Matrix protocol reference homeserver License: Apache-2.0 @@ -92,7 +90,7 @@ %requires_eq %{use_python}-PyYAML BuildRequires: %{use_python}-Twisted >= 20.3.0 %requires_eq %{use_python}-Twisted -BuildRequires: ((%{use_python}-attrs >= 19.1.0 with %{use_python}-attrs < 21.1.0) or %{use_python}-attrs > 21.1.0) +BuildRequires: ((%{use_python}-attrs >= 19.2.0 with %{use_python}-attrs < 21.1.0) or %{use_python}-attrs > 21.1.0) %requires_eq %{use_python}-attrs BuildRequires: %{use_python}-bcrypt >= 3.2.0 %requires_eq %{use_python}-bcrypt @@ -154,10 +152,6 @@ BuildRequires: %{use_python}-psycopg2 >= 2.8 %requires_eq %{use_python}-psycopg2 %endif -%if %{with acme} -BuildRequires: %{use_python}-txacme >= 0.9.2 -%requires_eq %{use_python}-txacme -%endif %if %{with saml} BuildRequires: %{use_python}-pysaml2 >= 4.5.0 %requires_eq %{use_python}-pysaml2 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.Rwwl7k/_old 2021-06-29 22:44:19.414957885 +0200 +++ /var/tmp/diff_new_pack.Rwwl7k/_new 2021-06-29 22:44:19.418957890 +0200 @@ -4,11 +4,11 @@ <param name="versionformat">@PARENT_TAG@</param> <param name="url">https://github.com/matrix-org/synapse.git</param> <param name="scm">git</param> - <param name="revision">v1.36.0</param> + <param name="revision">v1.37.0</param> <param name="versionrewrite-pattern">v(.*)</param> <param name="versionrewrite-replacement">\1</param> <!-- - <param name="revision">v1.37.0rc1</param> + <param name="revision">v1.38.0rc1</param> <param name="versionrewrite-pattern">v([\.\d]+)(rc.*)</param> <param name="versionrewrite-replacement">\1~\2</param> --> ++++++ dont-bump-cryptography-with-system-openssl.patch ++++++ --- /var/tmp/diff_new_pack.Rwwl7k/_old 2021-06-29 22:44:19.422957896 +0200 +++ /var/tmp/diff_new_pack.Rwwl7k/_new 2021-06-29 22:44:19.426957901 +0200 @@ -2,7 +2,7 @@ =================================================================== --- synapse.orig/synapse/python_dependencies.py +++ synapse/synapse/python_dependencies.py -@@ -86,7 +86,8 @@ REQUIREMENTS = [ +@@ -84,7 +84,8 @@ REQUIREMENTS = [ "typing-extensions>=3.7.4", # We enforce that we have a `cryptography` version that bundles an `openssl` # with the latest security patches. ++++++ matrix-synapse-1.36.0.obscpio -> matrix-synapse-1.37.0.obscpio ++++++ /work/SRC/openSUSE:Factory/matrix-synapse/matrix-synapse-1.36.0.obscpio /work/SRC/openSUSE:Factory/.matrix-synapse.new.2625/matrix-synapse-1.37.0.obscpio differ: char 49, line 1 ++++++ matrix-synapse-1.4.1-paths.patch ++++++ --- /var/tmp/diff_new_pack.Rwwl7k/_old 2021-06-29 22:44:19.450957933 +0200 +++ /var/tmp/diff_new_pack.Rwwl7k/_new 2021-06-29 22:44:19.450957933 +0200 @@ -50,7 +50,7 @@ =================================================================== --- synapse.orig/synapse/config/server.py +++ synapse/synapse/config/server.py -@@ -726,7 +726,7 @@ class ServerConfig(Config): +@@ -729,7 +729,7 @@ class ServerConfig(Config): bind_port = 8448 unsecure_port = 8008 @@ -63,8 +63,8 @@ =================================================================== --- synapse.orig/synapse/config/tls.py +++ synapse/synapse/config/tls.py -@@ -236,7 +236,7 @@ class TlsConfig(Config): - If the TLS paths are not specified the default will be certs in the +@@ -200,7 +200,7 @@ class TlsConfig(Config): + """If the TLS paths are not specified the default will be certs in the config directory""" - base_key_name = os.path.join(config_dir_path, server_name) @@ -72,12 +72,3 @@ if bool(tls_certificate_path) != bool(tls_private_key_path): raise ConfigError( -@@ -255,7 +255,7 @@ class TlsConfig(Config): - acme_enabled = bool(acme_domain) - acme_domain = "matrix.example.com" - -- default_acme_account_file = os.path.join(data_dir_path, "acme_account.key") -+ default_acme_account_file = os.path.join('/etc/matrix-synapse/keys.d', "acme_account.key") - - # this is to avoid the max line length. Sorrynotsorry - proxypassline = ( ++++++ matrix-synapse.obsinfo ++++++ --- /var/tmp/diff_new_pack.Rwwl7k/_old 2021-06-29 22:44:19.486957980 +0200 +++ /var/tmp/diff_new_pack.Rwwl7k/_new 2021-06-29 22:44:19.486957980 +0200 @@ -1,5 +1,5 @@ name: matrix-synapse -version: 1.36.0 -mtime: 1623768122 -commit: 1c8045f67477599fabc5759205c018e44d770078 +version: 1.37.0 +mtime: 1624958203 +commit: 88f9e8d62e0573b5b6f1c3a8bfe4d87f9aebde47
participants (1)
-
Source-Sync