matrix-synapse

Edit Package matrix-synapse
https://github.com/matrix-org/synapse

Synapse is a reference "homeserver" implementation of Matrix from the core development team at matrix.org, written in Python/Twisted.

Refresh
Refresh
Source Files
Filename Size Changed
10719-Fix-instert-of-duplicate-key-into-event_json.patch 0000002973 2.9 KB
README.SUSE 0000000131 131 Bytes
_service 0000001115 1.09 KB
bump-dependencies.patch 0000000502 502 Bytes
cargo_config 0000000100 100 Bytes
matrix-synapse-1.4.1-paths.patch 0000002578 2.52 KB
matrix-synapse-1.85.2.obscpio 0035072525 33.4 MB
matrix-synapse-generate-config.sh 0000000418 418 Bytes
matrix-synapse-test.spec 0000002120 2.07 KB
matrix-synapse-user.conf 0000000081 81 Bytes
matrix-synapse.changes 0000525611 513 KB
matrix-synapse.obsinfo 0000000104 104 Bytes
matrix-synapse.service 0000000464 464 Bytes
matrix-synapse.spec 0000016733 16.3 KB
matrix-synapse.tmpfiles.d 0000000133 133 Bytes
series 0000000057 57 Bytes
vendor.tar.zst 0008787173 8.38 MB
Revision 81 (latest revision is 99)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1097110 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 81)
- Update to 1.85.2
  - Bugfixes
    - Fix regression where using TLS for HTTP replication between
      workers did not work. Introduced in v1.85.0. (#15746)

- Update to 1.85.1
  Note: this release only fixes a bug that stopped some deployments
  from upgrading to v1.85.0. There is no need to upgrade to v1.85.1
  if successfully running v1.85.0.
  - Bugfixes
    - Fix bug in schema delta that broke upgrades for some
      deployments. Introduced in v1.85.0. (#15738, #15739)

- make use that the pythons define and use_python do not diverge by
  moving them closer to each other.

- Update to 1.85.0
  - Security
    - GHSA-26c5-ppr8-f33p / CVE-2023-32682 — Low Severity It may be
      possible for a deactivated user to login when using uncommon
      configurations. (boo#1212055)
    - GHSA-98px-6486-j7qc / CVE-2023-32683 — Low Severity A
      discovered oEmbed or image URL can bypass the
      url_preview_url_blacklist setting potentially allowing server
      side request forgery or bypassing network policies. Impact is
      limited to IP addresses allowed by the
      url_preview_ip_range_blacklist setting (by default this only
      allows public IPs). (boo#1212054) 
  - Features
    - Improve performance of backfill requests by performing
Comments 0
openSUSE Build Service is sponsored by