Merge pull request #163 from aaronraimist/synapse-0.99.3.1

Update Synapse (0.99.3 -> 0.99.3.1)
This commit is contained in:
Slavi Pantaleev 2019-05-03 22:10:20 +03:00 committed by GitHub
commit 6bea3237c9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 12 additions and 5 deletions

View File

@ -1,4 +1,4 @@
matrix_synapse_docker_image: "matrixdotorg/synapse:v0.99.3-py3" matrix_synapse_docker_image: "matrixdotorg/synapse:v0.99.3.2"
matrix_synapse_base_path: "{{ matrix_base_data_path }}/synapse" matrix_synapse_base_path: "{{ matrix_base_data_path }}/synapse"
matrix_synapse_config_dir_path: "{{ matrix_synapse_base_path }}/config" matrix_synapse_config_dir_path: "{{ matrix_synapse_base_path }}/config"

View File

@ -521,9 +521,10 @@ max_upload_size: "{{ matrix_synapse_max_upload_size_mb }}M"
# height: 600 # height: 600
# method: scale # method: scale
# Is the preview URL API enabled? If enabled, you *must* specify # Is the preview URL API enabled?
# an explicit url_preview_ip_range_blacklist of IPs that the spider is #
# denied from accessing. # 'false' by default: uncomment the following to enable it (and specify a
# url_preview_ip_range_blacklist blacklist).
# #
url_preview_enabled: {{ matrix_synapse_url_preview_enabled|to_json }} url_preview_enabled: {{ matrix_synapse_url_preview_enabled|to_json }}
@ -534,7 +535,13 @@ url_preview_enabled: {{ matrix_synapse_url_preview_enabled|to_json }}
# to connect to, otherwise anyone in any Matrix room could cause your # to connect to, otherwise anyone in any Matrix room could cause your
# synapse to issue arbitrary GET requests to your internal services, # synapse to issue arbitrary GET requests to your internal services,
# causing serious security issues. # causing serious security issues.
#
# (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly
# listed here, since they correspond to unroutable addresses.)
#
# This must be specified if url_preview_enabled is set. It is recommended that
# you uncomment the following list as a starting point.
#
url_preview_ip_range_blacklist: url_preview_ip_range_blacklist:
- '127.0.0.0/8' - '127.0.0.0/8'
- '10.0.0.0/8' - '10.0.0.0/8'