This Week in Matrix 2019-12-13

2019-12-13 — This Week in Matrix — Ben Parsons

Matrix Live 🎙

Dept of Status of Matrix 🌡

Matthew notes:

We'd like to welcome Twitter to the world of decentralised communication protocols after Jack Dorsey's announcement this week that Twitter is building a decentralised social media team. It seems that the constraints they're working with are to focus on decentralised reputation (supporting different content filtering algorithms), incentive models (presumably some kind of token) and avoiding consensus-based standards processes. It's worth noting that we've been working on decentralised reputation stuff in Matrix for a while now - of which MSC2313 - Moderation policies as rooms is the most concrete result so far, and it's great to see Twitter thinking about how to adopted different filtering mechanisms for their content. It sounds as if they're approaching this from a blockchain/incentives angle however, so it remains to be seen whether they'll be interested in our work - especially as Matrix doesn't have a microblogging client yet (but only because nobody has made one yet). We'll be trying to talk to them whatever to see if we can be of use, eitherway :)

Dept of Spec 📜


anoa said:

Here's your weekly update for what happened in spec land!

While it may look quiet from the state changes list, there's actually been a flurry of activity on MSC2376 and MSC2385 (for disabling URL previews on a per-message basis), MSC2380 (for a method of querying the metadata of a piece of media without downloading it) and MSC2346 (for showing metadata about the bridges that are currently active in the room)! Now's the time to jump in if you want to have your say!


Merged MSCs

  • No MSCs were merged this week.

MSCs in Final Comment Period

  • No MSCs in FCP.

New MSCs

Spec Core Team:

The Spec Core Team is on the same track as last week with no specific 3 MSC focus, but working on bringing up a lot of MSCs across the board.

Dept of Servers 🏢


Neil announced:

Synapse 1.7.0 is out, check out all the details here, admins can now specify message retention policies at a server and room level. We also changed the defaults for the room directory to be privacy preserving by default.

Next up we’re taking a look at support for redacting room alias events 1, 2 as well as porting Sydent to python 3.

Deploying Synapse

Several packaging projects have been updated to deploy the new version:

Dept of Clients 📱


Alexandre Franke told us:

We gained the ability to save spellcheck language per room, which makes me quite happy as I keep switching between English speaking and French speaking ones and was growing tired of those red underlines and having to switch manually every time.

Data is stored in /user/{}/rooms/{}/account_data/org.gnome.fractal.language.

Continuum updates

yuforia said:

Continuum, Kotlin client for the desktop:

  • Updated to Kotlin Json and HTTP libraries, removed Moshi and Retrofit from dependencies

  • When there is an error when loading notifications, one can click to retry or view the cause


nheko said:

nheko mostly fixed bugs regarding the new file encryption this week and did some organizational stuff:

  • We fixed a compliance issue, where Riot couldn't decrypt our media
  • You can now actually see your encrypted images, when you sent them
  • We fixed some tests regarding our session key export
  • We fixed our coverage of our automated tests
  • We did some prepwork for device verification
  • A few minor usability fixes and code cleanups

RiotX v0.10.0

benoit told us:

RiotX v0.10.0 has been released on Tuesday, with some bug fixes and a new Breadcrumbs drawer to switch between rooms super super fast. Give it a try! Now we are implementing workflow when the access token get invalidated, with SoftLogout support. Also, we are still working on improving the initial sync management, which can be a long task on big account, and that causes some problem with the current implementation. Among various other subjects: support, room profile screen, verification in DM, cleanup dependencies to reach the F-Droid store, we are quite busy!

Riot-iOS 0.10.4

Manu reported:

This week, we released Riot-iOS 0.10.4 with a couple of hot fixes on device verification. In parallel, we have been still working on verification by DM both on UI and SDK sides. As a collateral effect, the aggregation of m.reference has been implemented in the SDK. This means the SDK is now ready for message threading !

Riot Web + Cross-Signing

Ryan said:

Cross-signing keys and secret storage can be created in Settings for advanced users with the cross-signing feature flag enabled in labs, though please keep in mind that these features are still in development. More work is still needed to change to verifying users instead of devices. More accessibility fixes have landed as well.

Matthew added:

as part of all the work around cross-signing, we're shifting device verification to happen in the context of DMs so verification is done per-user rather than per-device, and so you can track your verification history and generally massively improve the UX. valere made a great video of how this is shaping up between RiotX and Riot/Web...

Check out the video here

Dept of Ops 🛠

ma1sd 2.2.1 released

ma1uta said:

Release 2.2.0 of the ma1sd (fork mxisd) Changes:

  • support of the MSC2140 (hash lookup)
  • support of the MSC2134 (API v2)

and then...

ma1sd hotfix 2.2.1 released with a lot of bugfixes. Also the v2 API (MSC2140) was disabled by default because it breaks backward compatibility in lookup behaviour.

Dept of Bots 🤖

Matrix bot functionality in Python

Cos reported:

I have created a modular bot for writing Matrix bot functionality in Python easily. It already has bunch of modules ranging from weather to calendar integration and more will come. Even the location bot from last week's TWIM is now implemented as a module. I hope you find it useful. PR's of new modules are always welcome.

Mlrdb, LDAP sync bot, announced offered:

A Bot to sync LDAP groups to matrix rooms. Rooms will be created automatically and group member changes are reflected in the matrix rooms. The bot is currently in beta and documentation will be added in the next weeks. New features for simple integration will be added soon. Have a look at the repo:

Dept of Interesting Projects 🛰

mautrixfs - Matrix client as a FUSE filesystem

Tulir offered:

I've started a new project: mautrixfs is a Matrix client as a FUSE filesystem. It's very WIP and currently only supports reading events by ID. I'm hoping to have something more useful in a week or two.

tulir later added:

for media uploads, I just realized that my asynchronous uploads MSC would make it significantly easier to implement. It could have a file you read to allocate a mxc uri and then you could simply write the data to the file corresponding to that mxc uri

Matrix in the News 📰

Cos offered:

Finnish computer culture paper magazine Skrolli published two articles spanning 5 pages about Matrix in latest edition. For non-subscribers the digital edition readable with mobile app is free for limited time. Read more (in Finnish) at

skrolli article

Dept of Ping 🏓

RankHostnameMedian MS

That's all I know 🏁

See you next week, and be sure to stop by with your updates!

Synapse 1.7.0 released

2019-12-13 — General — Neil Johnson

Hello people, it’s Synapse 1.7.0 time.

This release includes some long requested features, most notably the ability to automatically delete message data after a predefined period. For more details take a look at the config here ─ it should be pretty self explanatory.

Another significant change this release is to explicitly set room directories to be private by default. Previously it was possible to inadvertently configure the directory to be visible to arbitrary Matrix servers and the internet in general.

This means that for those admins who want their room directories to be publicly searchable ( for instance) they need to explicitly say so in the config. For more details see the upgrade notes and our blog post explaining the situation in greater detail.

We also have early support for ephemeral messages, as well as the ability to specify a reason when rejecting an invite (amongst other actions).

Aside from all of that, we want to let you know about some changes on the horizon. Currently Synapse runs Sqlite by default. This is great in that it gets new admins going quickly without needing to install and configure Postgres. The downside of using Sqlite is that it offers very poor performance, especially once a server tries to join the federation. In truth Sqlite is only really there to demonstrate the service, but for anything other than the most trivial cases it is essential to migrate to Postgres.

Over the past few months we’ve been working to improve the migration path to Postgres such that finally we feel confident to actively encourage admins to migrate. What’s more, in a future release we will forcibly prevent SQLite-backed servers federating unless the admin explicitly sets a config flag to show that they understand the trade-off they are making.

Overall we see these changes as something that will improve everyone’s experience of the matrix federation. We’ll talk more about this closer to the time, but please expect a change in the coming months and if you are running SQLite, consider this a nudge to get yourself migrated.

As always, you can get the new update here or any of the sources mentioned at Also, check out our Synapse installation guide page

The changelog since 1.6.1 follows:

Synapse 1.7.0 (2019-12-13)

This release changes the default settings so that only local authenticated users can query the server's room directory. See the upgrade notes for details.

Support for SQLite versions before 3.11 is now deprecated. A future release will refuse to start if used with an SQLite version before 3.11.

Administrators are reminded that SQLite should not be used for production instances. Instructions for migrating to Postgres are available here. A future release of synapse will, by default, disable federation for servers using SQLite.

No significant changes since 1.7.0rc2.

Synapse 1.7.0rc2 (2019-12-11)


  • Fix incorrect error message for invalid requests when setting user's avatar URL. (#6497)
  • Fix support for SQLite 3.7. (#6499)
  • Fix regression where sending email push would not work when using a pusher worker. (#6507, #6509)

Synapse 1.7.0rc1 (2019-12-09)


  • Implement per-room message retention policies. (#5815, #6436)
  • Add etag and count fields to key backup endpoints to help clients guess if there are new keys. (#5858)
  • Add /admin/v2/users endpoint with pagination. Contributed by Awesome Technologies Innovationslabor GmbH. (#5925)
  • Require User-Interactive Authentication for /account/3pid/add, meaning the user's password will be required to add a third-party ID to their account. (#6119)
  • Implement the /_matrix/federation/unstable/net.atleastfornow/state/<context> API as drafted in MSC2314. (#6176)
  • Configure privacy-preserving settings by default for the room directory. (#6355)
  • Add ephemeral messages support by partially implementing MSC2228. (#6409)
  • Add support for MSC 2367, which allows specifying a reason on all membership events. (#6434)


  • Transfer non-standard power levels on room upgrade. (#6237)
  • Fix error from the Pillow library when uploading RGBA images. (#6241)
  • Correctly apply the event filter to the state, events_before and events_after fields in the response to /context requests. (#6329)
  • Fix caching devices for remote users when using workers, so that we don't attempt to refetch (and potentially fail) each time a user requests devices. (#6332)
  • Prevent account data syncs getting lost across TCP replication. (#6333)
  • Fix bug: TypeError in register_user() while using LDAP auth module. (#6406)
  • Fix an intermittent exception when handling read-receipts. (#6408)
  • Fix broken guest registration when there are existing blocks of numeric user IDs. (#6420)
  • Fix startup error when http proxy is defined. (#6421)
  • Fix error when using synapse_port_db on a vanilla synapse db. (#6449)
  • Fix uploading multiple cross signing signatures for the same user. (#6451)
  • Fix bug which lead to exceptions being thrown in a loop when a cross-signed device is deleted. (#6462)
  • Fix synapse_port_db not exiting with a 0 code if something went wrong during the port process. (#6470)
  • Improve sanity-checking when receiving events over federation. (#6472)
  • Fix inaccurate per-block Prometheus metrics. (#6491)
  • Fix small performance regression for sending invites. (#6493)
  • Back out cross-signing code added in Synapse 1.5.0, which caused a performance regression. (#6494)

Improved Documentation

  • Update documentation and variables in user contributed systemd reference file. (#6369, #6490)
  • Fix link in the user directory documentation. (#6388)
  • Add build instructions to the docker readme. (#6390)
  • Switch Ubuntu package install recommendation to use python3 packages in (#6443)
  • Write some docs for the quarantine_media api. (#6458)
  • Convert CONTRIBUTING.rst to markdown (among other small fixes). (#6461)

Deprecations and Removals

  • Remove admin/v1/users_paginate endpoint. Contributed by Awesome Technologies Innovationslabor GmbH. (#5925)
  • Remove fallback for federation with old servers which lack the /federation/v1/state_ids API. (#6488)

Internal Changes

  • Add benchmarks for structured logging and improve output performance. (#6266)
  • Improve the performance of outputting structured logging. (#6322)
  • Refactor some code in the event authentication path for clarity. (#6343, #6468, #6480)
  • Clean up some unnecessary quotation marks around the codebase. (#6362)
  • Complain on startup instead of 500'ing during runtime when public_baseurl isn't set when necessary. (#6379)
  • Add a test scenario to make sure room history purges don't break /messages in the future. (#6392)
  • Clarifications for the email configuration settings. (#6423)
  • Add more tests to the blacklist when running in worker mode. (#6429)
  • Refactor data store layer to support multiple databases in the future. (#6454, #6464, #6469, #6487)
  • Port to async/await. (#6482)
  • Port to async/await. (#6483)
  • Port SyncHandler to async/await. (#6484)

This Week in Matrix 2019-12-06

2019-12-06 — This Week in Matrix — Ben Parsons

Matrix Live 🎙

I chatted to Kilian from the new Nio project about his progress on a new iOS client.

Dept of Status of Matrix 🌡

Yesterday we announced the availability of zipped hoodies! The resulting avalanche of orders was a shock for our local Post Office, who watched with surprise as I burst in, laden with packages like a mule.

Dept of Spec 📜

anoa offered:

Here's your news for what happened in spec-land last week!

Merged MSCs

MSCs in Final Comment Period

No MSCs are in FCP...

New MSCs

TravisR confirmed:

The spec core team is focused on implementing a bunch of MSCs so that we can make progress with the spec.

Dept of Servers 🏢


Neil told us:

This week we've mainly been tying up loose ends on the data centre migration. Outside of that one interesting feature to land on develop is that of configurable message retention. It means that as an admin you can set a default period after which messages will be removed from the server (a year say), what’s more the default is configurable on a per room basis via state events. Note, this feature applies to messages only, not media (on its way!). Configurable message retention will be make it into the next versioned release.


anoa said:

After 2 long years, matrix-synapse-ldap3 has finally gained another release: v0.1.4. If you want to allow users to sign in to Synapse using their LDAP accounts, then this is the module for you.

Get the release notes here:

Dept of Clients 📱


Alexandre Franke offered:

4.2.2 got released! Get it now off Flathub.

New features:

  • Translation strings have been updated


  • Newlines now work when markdown is enabled
  • Account settings can be accessed again
  • Redaction is working again
  • Compatibility with HTTP-only (non HTTPS) servers has been restored
  • Some crashes fixed

Under the hood:

  • Code refactor is still going

As if all that wasn't enough, how about this image of Fractal running on a Librem5, from Adrien Plazas:

Fractal on Librem5


Nico offered:

Nheko just merged support for encrypted files in e2ee chats. This allows you to send and receive encrypted files and even play videos and other media in the new timeline. Those changes are still on the development branch, but will be included in the next release, which should be 0.7.0. If you want to try it out, you can get development builds here.


yuforia announced:

koma, the Kotlin library behind the desktop client Continuum:

  • Rewrite all Moshi json adapters with kotlinx serializers, replace API interface declared using Retrofit with HTTP requests constructed using ktor. The majority of the changes needed to enable multiplatform support is now made.

RiotX 0.9.1

benoit reported:

Released v0.9.1 on Thursday! This version includes a new login flow and account creation flow. Read marker has been reworked, to simplify user experience on mobile. Also you can type and send user pills.

We are now working on room and user profiles, and link handling. Verification in DM development is progressing well. Also we implemented a first version of breadcrumbs, to switch between recent rooms very quickly.


Manu announced:

Riot-iOS 0.10.3 is on its way to Apple review. The release note is: This release includes bug fixes and improvements, like:

  • Ask permission before opening a widget and the integration manager.
  • Display room name, user name and user avatar in the Jitsi conference screen.
  • Support Welsh and Italian languages.


Manu reported:

let me share Messagerie:, an iOS app and, maybe, in the future, a MacOS app.

Messagerie is a chat app written to test SwiftUI and Combine to make a real and, hopefully, useful app. Messagerie misses a lot of things but it has:

  • Support of Matrix using SwiftMatrixSDK
  • E2EE
  • Multi-account (swipe the navigation bar to switch accounts)
  • Dark mode and auto-sizing fonts (well, they come for free)
  • 4 screens at the moment: a Matrix login screen, a room list, a room screen and a very early beginning of a SwiftUI text composer to post text message

This is a personal and a side project, but RiotX-iOS will probably take benefit from it.

Riot Web means Cross Signing!

Ryan announced:

Riot Web is largely focused on nudging cross-signing forward over the last week. Key verification and cross-signing setup continues to make progress. We've also fixed a few bugs and merged some accessibility improvements.

Dept of Ops 🛠


Slavi reported:

matrix-docker-ansible-deploy has been made more flexible in terms of how its services can be exposed to the web. Reverse-proxying using another local (in-machine or on-the-network) webserver should be easier. SSL-termination using Traefik is now also a possibility, although we're yet to confirm it as a success and document exactly how to do it. Read more in the CHANGELOG.

riot-desktop-builder docker image

Mathijs announced:

I created a dockerfile and corresponding docker image that can build the develop branch of riot-desktop for both windows and linux.

Dept of Bots 🤖


anoa announced:

msc_resolver2 is back and now isn't annoying with all new features like:

  • actually showing you the MSC title when it links it
  • not posting the same links multiple times
  • not posting a link when you've already linked the msc in the original message
  • ignoring edits
  • ignoring content of replies

rejoice! Code is

malobot - send or receive location messages

Cos said:

It would be cool to be able to share location in Matrix rooms. This bot by cos solves the egg part in chicken and egg problem of having no clients able to send or receive location messages. Next we need a mobile client that can send location updates. Which one will be the first?

Dept of Ping 🏓

RankHostnameMedian MS

Final Thoughts 💭

swedneck made a room for discussing how matrix could be used to implement forums:

Mathijs pointed out that there is a Matrix feature which enables spoilers.

That's all I know 🏁

See you next week, and be sure to stop by with your updates!

Zipped Hoodies Now Available

2019-12-05 — Merch — Ben Parsons

Matrix merch is some of the most sought-after apparel and adhesive labeling available in the world today. We supply discerning customers with t-shirts, hoodies and stickers which remind them which decentralised, federated, end-to-end encrypted communications protocol is the best choice.

This is all very well, but we wondered whether it would be possible to have a warm, hooded garment which promotes the wearers preference of chat system, and also has a zip on the front.

Today, we’re proud to announce a breakthrough in this area: Matrix Zipped Hoodies are available now from!

Grab yours now from!

zipped hoodies

This Week in Matrix 2019-11-29

2019-11-29 — This Week in Matrix — Ben Parsons

Matrix Live 🎙

Dept of Spec 📜


anoa announced:

Here's what happened in spec land this week:

Merged MSCs:

Final Comment Period:

New MSCs:

The Spec Core Team have chosen the following three MSCs to focus on for next week: MSC 1270 (URL resolver in media), MSC 2366 (accept in verification), and MSC 1849 (aggregations/edits)

Dept of Servers 🏢

Synapse v1.6.1

Neil offered:

This week we put out Synapse 1.6.0, and 1.6.1 checkout all the juicy details in the blog post. Aside from that message retention and ephemeral message support continues and we expect the latter to merge early next week.

The next big thing we’ll be looking at is sharding out the Synapse master process so that instances running in worker mode can make full use of the CPU power available. This will make a big difference to

Deploying Synapse

Several packaging projects have been updated to deploy the new version

Additionally, from JCG:

Synapse 1.6.1 has been packaged for VoidLinux, FreeBSD and Alpine Linux, with NixOS waiting to have the PR updating it to 1.6.1 merged. Synapse 1.6.0 has been packaged for Debian Unstable and Ubuntu 20.04.

Docker for synapse-ldap

JCG announced:

The container image with the updated LDAP auth provider over at has been updated to 1.6.0 too.

Matrix over Yggdrasil

Neil Alexander:

Timothée has been working on a university project to integrate the Yggdrasil library into the CoAP proxy, which allows Matrix homeservers to federate over a pure Yggdrasil connection instead of using IP. The Yggdrasil portion gives full reachability and traffic forwarding between nodes in the mesh even in complicated topologies, and end-to-end encryption as an additional benefit

As a reminder,

Yggdrasil is a proof-of-concept mesh network that is designed to avoid the scaling issues that we've seen in the past with existing mesh systems. It uses a spanning tree-based topology and aims to make all nodes in the mesh fully routable, even at massive scale

If you'd like to know more, come chat to the folk in, and read

Department of Matrix jobs 👩‍💻

New Vector (the startup which the original Matrix team founded in order to hire folks to work on Matrix as their day job) are currently hiring people so if you ever wanted to work on Matrix full time get in touch.

Neil says:

You can read all about it here but we are particularly keen to speak to people who want to hack on Synapse or work in Operations.

We are remote friendly though find it easier to hire people in some territories than others, so if you have any questions just ask.

You can apply via the site, or alternatively reach out to (engineering) or (design).

On top of this, Neil Alexander, creator of Seaglass and maintainer of Yggdrasil, will be joining New Vector. He said:

I shall most likely be working with the backend team on Synapse/Dendrite and I think there's a couple of other things like the coap-proxy too

Dept of Bridges 🌉


Tulir said:

I made two pull requests to Sorunome's mx-puppet-bridge projects:


Half-Shot offered:

My fellow comrades, today we have released 0.14.0-rc1 of the IRC bridge. The changes are massive and vast, and frankly it probably could have been done in 2 or 3 releases. At any rate, this release contains support for PostgreSQL Datastores and Sentry monitoring, amongst other small quality of life changes. The bridge has also had a total refactor using Typescript, and it's a little bit nicer to look at now.

Dept of Clients 📱

Redesign of Ditto is out!

Annie told us:

  • Ditto is now redesigned with a fresh new look!
  • Functionality:
    • Login, send / receive messages, logout
  • On Deck:
    • Notifications, writing a new message (in that order)

Come chat about UX and things you'd like to see in Ditto!
Matrix room:


ditto client

swedneck asked if being purple in colour, the project used libpurple? The answer is no, it uses React Native, and he was widely rebuked for doing so.

nio, new client for iOS

kilian offered:

I spent the last few days building my Matrix client Nio 😄 Apple just approved a very early first alpha for TestFlight distribution. It really doesn't do a lot aside from account authentication and displaying recent chats and messages. It is able to handle e2e encryption, but unfortunately doesn't persist the encryption keys right now (meaning it loses them and re-requests them from other clients on being restarted). It's built on SwiftUI and runs on iOS (iPhone and iPad). The app will likely not run as-is on macOS in the future, but I'd love to also build a separate version of Nio for macOS once the iOS app is functional.

Website: Repo: TestFlight:

nio client

Note that this is not connected to the existing Matrix project, matrix-nio.

Continuum and koma, client and library in Kotlin

yuforia reported:

koma, Kotlin library:

  • Start replacing Retrofit with Ktor, which is JetBrain's HTTP library for building projects that can be compiled to Native, JVM, and JavaScript. Currently, coexistence of both libraries causes the package size of applications based on Koma to increase to some extent, this will no longer be the case after the transition is complete.

Continuum, desktop client based on koma, version 0.9.31:

  • Implement minimal XML parsing without adding additional dependencies to extract user ID and name from formatted_body used by Riot
  • Display mentioned users with highlight and avatar.

continuum client

Riot Web

Ryan reported:

  • Continued work on setting up cross-signing and secret storage keys in labs
  • Device verification is moving to the user info panel and happening via DMs also in labs
  • Fixes for system theme and read receipts
  • Improved signing for Windows builds
  • Converting tests towards native promises


From Manu:

We have a new bottom sheet that we are going to use a lot in the coming designs. We used it in the widget permission screen. Meanwhile we are working on user verification by DM


From Manu:

We made a release this week with all the work around privacy for the use of an Integration Manager and widgets.


From Manu:

All flows for registration and login are now supported. Please test them on your specific homeserver configuration in case we miss something. We are also working on user verification by DM.

Dept of Ops 🛠


Mathijs reported:

mvgorcum/docker-matrix:v1.6.1 is now on docker-hub

matrix-docker-ansible-deploy riot-web image

Slavi announced:

matrix-docker-ansible-deploy has switched from the bubuntux/riot-web Docker image to the official vectorim/riot-web image. There should be no visible changes for users. We're just hoping for faster releases by keeping closer to upstream.

Dept of Ping 🏓

RankHostnameMedian MS

That's all I know 🏁

See you next week, and be sure to stop by with your updates!

Synapse 1.6.0 released

2019-11-26 — General — Neil Johnson

Synapse 1.6.0 has landed and is here to brighten your day!

1.6.0's most notable feature is that of label based filtering. It allows for messages to be tagged with a given label so that clients can filter on the label, this means that clients can subscribe to specific topics in a room, such as #lunch.

Completely separately, from here on in new rooms will be version 5 by default, all this means in practice is that servers will respect server signing key validity periods. This won't make a lot of difference in day to day operation, but it is an important security consideration and we now have sufficient penetration across the federation to make version 5 the default.

Aside from that there are a bunch of bug fixes and improvements, including fixing a bug that in some cases prevented messages being decrypted shortly after a restart (#6363) and generally improving the room upgrade experience (#6232, #6235).

As ever, you can get the new update here or any of the sources mentioned at Also, check out our Synapse installation guide page

The changelog since 1.5.1 follows:

Synapse 1.6.0 (2019-11-26)


  • Fix phone home stats reporting. (#6418)

Synapse 1.6.0rc2 (2019-11-25)


  • Fix a bug which could cause the background database update hander for event labels to get stuck in a loop raising exceptions. (#6407)

Synapse 1.6.0rc1 (2019-11-20)


  • Add federation support for cross-signing. (#5727)
  • Increase default room version from 4 to 5, thereby enforcing server key validity period checks. (#6220)
  • Add support for outbound http proxying via http_proxy/HTTPS_PROXY env vars. (#6238)
  • Implement label-based filtering on /sync and /messages (MSC2326). (#6301, #6310, #6340)


  • Fix LruCache callback deduplication for Python 3.8. Contributed by @V02460. (#6213)
  • Remove a room from a server's public rooms list on room upgrade. (#6232, #6235)
  • Delete keys from key backup when deleting backup versions. (#6253)
  • Make notification of cross-signing signatures work with workers. (#6254)
  • Fix exception when remote servers attempt to join a room that they're not allowed to join. (#6278)
  • Prevent errors from appearing on Synapse startup if git is not installed. (#6284)
  • Appservice requests will no longer contain a double slash prefix when the appservice url provided ends in a slash. (#6306)
  • Fix /purge_room admin API. (#6307)
  • Fix the hidden field in the devices table for SQLite versions prior to 3.23.0. (#6313)
  • Fix bug which casued rejected events to be persisted with the wrong room state. (#6320)
  • Fix bug where rc_login ratelimiting would prematurely kick in. (#6335)
  • Prevent the server taking a long time to start up when guest registration is enabled. (#6338)
  • Fix bug where upgrading a guest account to a full user would fail when account validity is enabled. (#6359)
  • Fix to_device stream ID getting reset every time Synapse restarts, which had the potential to cause unable to decrypt errors. (#6363)
  • Fix permission denied error when trying to generate a config file with the docker image. (#6389)

Improved Documentation

  • Contributor documentation now mentions script to run linters. (#6164)
  • Modify to update the terms private key and public key to secret key and site key respectively. Contributed by Yash Jipkate. (#6257)
  • Update Email section to talk about account_threepid_delegates. (#6272)
  • Fix a small typo in account_threepid_delegates configuration option. (#6273)

Internal Changes

  • Add a CI job to test the synapse_port_db script. (#6140, #6276)
  • Convert EventContext to an attrs. (#6218)
  • Move persist_events out from main data store. (#6240, #6300)
  • Reduce verbosity of user/room stats. (#6250)
  • Reduce impact of debug logging. (#6251)
  • Expose some homeserver functionality to spam checkers. (#6259)
  • Change cache descriptors to always return deferreds. (#6263, #6291)
  • Fix incorrect comment regarding the functionality of an if statement. (#6269)
  • Update CI to run isort over the scripts and scripts-dev directories. (#6270)
  • Replace every instance of logger.warn method with logger.warning as the former is deprecated. (#6271, #6314)
  • Port replication http server endpoints to async/await. (#6274)
  • Port room rest handlers to async/await. (#6275)
  • Remove redundant CLI parameters on CI's flake8 step. (#6277)
  • Port to async/await. (#6279)
  • Port receipt and read markers to async/wait. (#6280)
  • Split out state storage into separate data store. (#6294, #6295)
  • Refactor EventContext for clarity. (#6298)
  • Update the version of black used to 19.10b0. (#6304)
  • Add some documentation about worker replication. (#6305)
  • Move admin endpoints into separate files. Contributed by Awesome Technologies Innovationslabor GmbH. (#6308)
  • Document the use of for code style enforcement & extend it to run on specified paths only. (#6312)
  • Add optional python dependencies and dependant binary libraries to snapcraft packaging. (#6317)
  • Remove the dependency on psutil and replace functionality with the stdlib resource module. (#6318, #6336)
  • Improve documentation for EventContext fields. (#6319)
  • Add some checks that we aren't using state from rejected events. (#6330)
  • Add continuous integration for python 3.8. (#6341)
  • Correct spacing/case of various instances of the word "homeserver". (#6357)
  • Temporarily blacklist the failing unit test PurgeRoomTestCase.test_purge_room. (#6361)
NextPage 2