!NasysSDfxKxZBzJJoE:matrix.org

#matrix-spec

1052 Members
Discussion of specific Matrix Spec Change proposals | https://matrix.org/docs/spec/proposals | Design draft folder at: https://drive.google.com/drive/folders/0B4wHq8qP86r2ck15MHEwMmlNVUk 336 Servers

Load older messages


SenderMessageTime
14 Jan 2020
@andrewm:amorgan.xyzanoa
In reply to @sorunome:sorunome.de
(.python3) sorunome@sorunome-desktop famedly/synapse $ git pull origin matrix-org-hostfixes
fatal: couldn't find remote ref matrix-org-hostfixes

whaaaaa

you typo'd hotfixes here
15:06:31
@andrewm:amorgan.xyzanoa the branch is matrix-org-hotfixes 15:06:41
@sorunome:sorunome.deSorunomejust noticed, thanks15:06:41
@sorunome:sorunome.deSorunomeokay, also works on that branch15:07:31
@sorunome:sorunome.deSorunomeso it is something with the other setup stuffs, then15:07:42
@andrewm:amorgan.xyzanoayeah, only thing I can think here is the session is getting mangled somehow. The request parameters are coming in fine, and google is giving us back a 200 for the recaptcha.15:07:48
* @andrewm:amorgan.xyzanoa tries to put in some logging15:08:03
@andrewm:amorgan.xyzanoa So it turns out the issue is due to this failing with workers. The session dict contains your sessions on one worker, while this auth stuff exists on a separate worker, and thus one editing it doesn't affect the other. 15:32:49
@andrewm:amorgan.xyzanoaThankfully it looks like the fix is fairly easy, but I need to write some stuff up and fix the worker docs, and then fix it on matrix.org15:33:13
@andrewm:amorgan.xyzanoaAnd the latter will probably not happen today15:33:19
@andrewm:amorgan.xyzanoa(as it's getting late for an architecture rejig)15:33:33
@sorunome:sorunome.deSorunomea few thoughts on https://github.com/matrix-org/matrix-doc/issues/2408 would be cool ^.^15:59:32
@andrewm:amorgan.xyzanoaIssue concerning the web fallback above for reference: https://github.com/matrix-org/synapse/issues/670516:45:17
@mscbot:amorgan.xyzmscbot[MSC2409] "MSC2409: Proposal to send EDUs to appservices " has been created: https://github.com/matrix-org/matrix-doc/pull/240918:54:13
@kaie:matrix.orgkaie joined the room.20:01:08
@kaie:matrix.orgkaie left the room.20:52:13
@yan:yetanothernerd.xyzYan Minari joined the room.23:41:54
15 Jan 2020
@nep:pink.packageloss.eunephele joined the room.17:40:34
@nep:pink.packageloss.eunepheleHey, benpa linked me here for a idea i had: I would like to split off the client-server spec into one client-server and one instant messaging spec, the idea beeing here that normal "chat" clients can follow both, but other clients that for instance could act like a bugtracker don't have to concern themselves with this. The "easy" endpoints that is, ones that could be done just aswell by callling state or event endpoints directly with specific content would then where they concern the im stuff also be defined in the im spec i.e client-server: m.room.create instant messaging: m.room.topic m.room.name m.room.message 17:44:06
@nep:pink.packageloss.eunepheleI would also like this im spec to have seperate versioning, that then is included in the messages so clients can have an easier time verifying content that is /not/ valid based on a given spec version17:45:13
@travis:t2l.ioTravisRin theory that's what the feature modules section deals with. The spec isn't very clear: but the schemas for topics and such are only there for if/when you use them, not to imply they're required for a room.17:45:14
@nep:pink.packageloss.eunepheleI understand that they aren't required, i would like some more seperation between those parts though, also so that the client-server spec doesn't have to concern itself much with the im stuff and can explain stuff more generally17:46:14
@nep:pink.packageloss.eunepheleThis should also make it easier for a third party vendor to build a specification for a third-party use case and then base it explicitly on the "cs spec version blah" instead of having to specify which parts apply 17:46:59
@nep:pink.packageloss.eunepheleThe seperate versioning is moreso important i think, it is kind of annoying trying to validate events when new cs versions keep making more stuff legal, but without any indication that a message follows a new spec version :)17:48:23
17 Jan 2020
@sorunome:sorunome.deSorunome how come synapse expects m.login.token to be a macron? Don't see anything specific to that in the spec 10:37:19
@sorunome:sorunome.deSorunome also, how come synapse implements m.login.jwt? Don't see anything of that in the specs, either 10:37:32
@richvdh:sw1v.orgrichvdh
In reply to @sorunome:sorunome.de
how come synapse expects m.login.token to be a macron? Don't see anything specific to that in the spec
well, the only thing that is valid to pass into m.login.token is something that synapse has generated
10:55:44
@sorunome:sorunome.deSorunome
In reply to @richvdh:sw1v.org
well, the only thing that is valid to pass into m.login.token is something that synapse has generated
synapse doc allows custom auth providers for that endpoint which never get called
10:56:03
@richvdh:sw1v.orgrichvdhwhich doc10:56:28
@sorunome:sorunome.deSorunome
In reply to @sorunome:sorunome.de
also, how come synapse implements m.login.jwt? Don't see anything of that in the specs, either
ironically soru wrote an auth provider to do just this on m.login.token only to find out that it was already built-in in synapse
10:56:35

Show newer messages


Back to Room ListRoom Version: 5