2020-02-05 19:06:39 +01:00
|
|
|
# Blacklisted until matrix-org/dendrite#862 is reverted due to Riot bug
|
2022-04-05 17:45:01 +02:00
|
|
|
|
2020-02-05 19:06:39 +01:00
|
|
|
Latest account data appears in v2 /sync
|
2020-02-11 13:13:38 +01:00
|
|
|
|
Federation for v3/v4 rooms (#954)
* Update gomatrixserverlib
* Default to room version 4
* Update gomatrixserverlib
* Limit prev_events and auth_events
* Fix auth_events, prev_events
* Fix linter issues
* Update gomatrixserverlib
* Fix getState
* Update sytest-whitelist
* Squashed commit of the following:
commit 067b87506357c996fd6ddb11271db9469ad4ce80
Author: Neil Alexander <neilalexander@users.noreply.github.com>
Date: Fri Apr 3 14:29:06 2020 +0100
Invites v2 endpoint (#952)
* Start converting v1 invite endpoint to v2
* Update gomatrixserverlib
* Early federationsender code for sending invites
* Sending invites sorta happens now
* Populate invite request with stripped state
* Remodel a bit, don't reflect received invites
* Handle invite_room_state
* Handle room versions a bit better
* Update gomatrixserverlib
* Tweak order in destinationQueue.next
* Revert check in processMessage
* Tweak federation sender destination queue code a bit
* Add comments
commit 955244c09298d0e6c870377dad3af2ffa1f5e578
Author: Ben B <benne@klimlive.de>
Date: Fri Apr 3 12:40:50 2020 +0200
use custom http client instead of the http DefaultClient (#823)
This commit replaces the default client from the http lib with a custom one.
The previously used default client doesn't come with a timeout. This could cause
unwanted locks.
That solution chosen here creates a http client in the base component dendrite
with a constant timeout of 30 seconds. If it should be necessary to overwrite
this, we could include the timeout in the dendrite configuration.
Here it would be a good idea to extend the type "Address" by a timeout and
create an http client for each service.
Closes #820
Signed-off-by: Benedikt Bongartz <benne@klimlive.de>
Co-authored-by: Kegsay <kegan@matrix.org>
* Update sytest-whitelist, sytest-blacklist
* Update go.mod/go.sum
* Add some error wrapping for debug
* Add a NOTSPEC to common/events.go
* Perform state resolution at send_join
* Set default room version to v2 again
* Tweak GetCapabilities
* Add comments to ResolveConflictsAdhoc
* Update sytest-blacklist
* go mod tidy
* Update sytest-whitelist, sytest-blacklist
* Update versions
* Updates from review comments
* Update sytest-blacklist, sytest-whitelist
* Check room versions compatible at make_join, add some comments, update gomatrixserverlib, other tweaks
* Set default room version back to v2
* Update gomatrixserverlib, sytest-whitelist
2020-04-09 16:46:06 +02:00
|
|
|
# Blacklisted because we don't support ignores yet
|
2022-04-05 17:45:01 +02:00
|
|
|
|
Federation for v3/v4 rooms (#954)
* Update gomatrixserverlib
* Default to room version 4
* Update gomatrixserverlib
* Limit prev_events and auth_events
* Fix auth_events, prev_events
* Fix linter issues
* Update gomatrixserverlib
* Fix getState
* Update sytest-whitelist
* Squashed commit of the following:
commit 067b87506357c996fd6ddb11271db9469ad4ce80
Author: Neil Alexander <neilalexander@users.noreply.github.com>
Date: Fri Apr 3 14:29:06 2020 +0100
Invites v2 endpoint (#952)
* Start converting v1 invite endpoint to v2
* Update gomatrixserverlib
* Early federationsender code for sending invites
* Sending invites sorta happens now
* Populate invite request with stripped state
* Remodel a bit, don't reflect received invites
* Handle invite_room_state
* Handle room versions a bit better
* Update gomatrixserverlib
* Tweak order in destinationQueue.next
* Revert check in processMessage
* Tweak federation sender destination queue code a bit
* Add comments
commit 955244c09298d0e6c870377dad3af2ffa1f5e578
Author: Ben B <benne@klimlive.de>
Date: Fri Apr 3 12:40:50 2020 +0200
use custom http client instead of the http DefaultClient (#823)
This commit replaces the default client from the http lib with a custom one.
The previously used default client doesn't come with a timeout. This could cause
unwanted locks.
That solution chosen here creates a http client in the base component dendrite
with a constant timeout of 30 seconds. If it should be necessary to overwrite
this, we could include the timeout in the dendrite configuration.
Here it would be a good idea to extend the type "Address" by a timeout and
create an http client for each service.
Closes #820
Signed-off-by: Benedikt Bongartz <benne@klimlive.de>
Co-authored-by: Kegsay <kegan@matrix.org>
* Update sytest-whitelist, sytest-blacklist
* Update go.mod/go.sum
* Add some error wrapping for debug
* Add a NOTSPEC to common/events.go
* Perform state resolution at send_join
* Set default room version to v2 again
* Tweak GetCapabilities
* Add comments to ResolveConflictsAdhoc
* Update sytest-blacklist
* go mod tidy
* Update sytest-whitelist, sytest-blacklist
* Update versions
* Updates from review comments
* Update sytest-blacklist, sytest-whitelist
* Check room versions compatible at make_join, add some comments, update gomatrixserverlib, other tweaks
* Set default room version back to v2
* Update gomatrixserverlib, sytest-whitelist
2020-04-09 16:46:06 +02:00
|
|
|
Ignore invite in incremental sync
|
2020-04-14 19:36:08 +02:00
|
|
|
|
2020-07-15 13:02:34 +02:00
|
|
|
# Relies on a rejected PL event which will never be accepted into the DAG
|
2022-04-05 17:45:01 +02:00
|
|
|
|
|
|
|
# Caused by <https://github.com/matrix-org/sytest/pull/911>
|
|
|
|
|
2020-07-15 13:02:34 +02:00
|
|
|
Outbound federation requests missing prev_events and then asks for /state_ids and resolves the state
|
|
|
|
|
2022-04-05 17:45:01 +02:00
|
|
|
# We don't implement lazy membership loading yet
|
|
|
|
|
2020-10-05 18:47:08 +02:00
|
|
|
The only membership state included in a gapped incremental sync is for senders in the timeline
|
|
|
|
|
|
|
|
# Blacklisted out of flakiness after #1479
|
2022-04-05 17:45:01 +02:00
|
|
|
|
2020-10-05 18:47:08 +02:00
|
|
|
Invited user can reject local invite after originator leaves
|
|
|
|
Invited user can reject invite for empty room
|
2020-10-19 16:38:42 +02:00
|
|
|
If user leaves room, remote user changes device and rejoins we see update in /sync and /keys/changes
|
|
|
|
|
2020-11-16 11:51:55 +01:00
|
|
|
# Blacklisted due to flakiness
|
2022-04-05 17:45:01 +02:00
|
|
|
|
2020-12-04 15:09:21 +01:00
|
|
|
Forgotten room messages cannot be paginated
|
|
|
|
|
2021-03-02 12:40:20 +01:00
|
|
|
# Blacklisted due to flakiness after #1774
|
2022-04-05 17:45:01 +02:00
|
|
|
|
2021-03-23 12:33:36 +01:00
|
|
|
Local device key changes get to remote servers with correct prev_id
|
|
|
|
|
|
|
|
# Flakey
|
2022-04-05 17:45:01 +02:00
|
|
|
|
2021-07-12 17:11:26 +02:00
|
|
|
Local device key changes appear in /keys/changes
|
|
|
|
|
|
|
|
# we don't support groups
|
2022-04-05 17:45:01 +02:00
|
|
|
|
2021-07-12 17:11:26 +02:00
|
|
|
Remove group category
|
|
|
|
Remove group role
|
2021-10-21 16:35:36 +02:00
|
|
|
|
2022-03-03 12:40:53 +01:00
|
|
|
# Flakey
|
2022-04-05 17:45:01 +02:00
|
|
|
|
2022-03-03 12:40:53 +01:00
|
|
|
AS-ghosted users can use rooms themselves
|
2022-03-07 18:14:08 +01:00
|
|
|
AS-ghosted users can use rooms via AS
|
|
|
|
Events in rooms with AS-hosted room aliases are sent to AS server
|
2022-03-14 20:04:24 +01:00
|
|
|
Inviting an AS-hosted user asks the AS server
|
|
|
|
Accesing an AS-hosted room alias asks the AS server
|
2022-03-03 12:40:53 +01:00
|
|
|
|
|
|
|
# Flakey, need additional investigation
|
2022-04-05 17:45:01 +02:00
|
|
|
|
2022-03-03 12:40:53 +01:00
|
|
|
Messages that notify from another user increment notification_count
|
|
|
|
Messages that highlight from another user increment unread highlight count
|
2022-03-07 10:37:04 +01:00
|
|
|
Notifications can be viewed with GET /notifications
|
2022-04-05 17:45:01 +02:00
|
|
|
|
|
|
|
# More flakey
|
|
|
|
|
|
|
|
If remote user leaves room we no longer receive device updates
|
|
|
|
Local device key changes get to remote servers
|