matrix-synapse
https://github.com/matrix-org/synapse
Synapse is a reference "homeserver" implementation of Matrix from the core development team at matrix.org, written in Python/Twisted.
- Developed at network:messaging:matrix
- Sources inherited from project openSUSE:Factory
-
4
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:PowerPC/matrix-synapse && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
10719-Fix-instert-of-duplicate-key-into-event_json |
0000002973 2.9 KB | |
README.SUSE | 0000000131 131 Bytes | |
_service | 0000001115 1.09 KB | |
bump-dependencies.patch | 0000000502 502 Bytes | |
cargo_config | 0000000100 100 Bytes | |
matrix-synapse-1.4.1-paths.patch | 0000002578 2.52 KB | |
matrix-synapse-1.85.2.obscpio | 0035072525 33.4 MB | |
matrix-synapse-generate-config.sh | 0000000418 418 Bytes | |
matrix-synapse-test.spec | 0000002120 2.07 KB | |
matrix-synapse-user.conf | 0000000081 81 Bytes | |
matrix-synapse.changes | 0000525611 513 KB | |
matrix-synapse.obsinfo | 0000000104 104 Bytes | |
matrix-synapse.service | 0000000464 464 Bytes | |
matrix-synapse.spec | 0000016733 16.3 KB | |
matrix-synapse.tmpfiles.d | 0000000133 133 Bytes | |
series | 0000000057 57 Bytes | |
vendor.tar.zst | 0008787173 8.38 MB |
Revision 81 (latest revision is 101)
Dominique Leuenberger (dimstar_suse)
accepted
request 1097110
from
Dirk Mueller (dirkmueller)
(revision 81)
- Update to 1.85.2 - Bugfixes - Fix regression where using TLS for HTTP replication between workers did not work. Introduced in v1.85.0. (#15746) - Update to 1.85.1 Note: this release only fixes a bug that stopped some deployments from upgrading to v1.85.0. There is no need to upgrade to v1.85.1 if successfully running v1.85.0. - Bugfixes - Fix bug in schema delta that broke upgrades for some deployments. Introduced in v1.85.0. (#15738, #15739) - make use that the pythons define and use_python do not diverge by moving them closer to each other. - Update to 1.85.0 - Security - GHSA-26c5-ppr8-f33p / CVE-2023-32682 — Low Severity It may be possible for a deactivated user to login when using uncommon configurations. (boo#1212055) - GHSA-98px-6486-j7qc / CVE-2023-32683 — Low Severity A discovered oEmbed or image URL can bypass the url_preview_url_blacklist setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the url_preview_ip_range_blacklist setting (by default this only allows public IPs). (boo#1212054) - Features - Improve performance of backfill requests by performing
Comments 0