mirror of
https://github.com/element-hq/synapse.git
synced 2024-12-14 11:57:44 +00:00
fix listener docs - admin api only on main process (#17590)
This commit is contained in:
parent
8678516e79
commit
9eed8cd878
2 changed files with 5 additions and 3 deletions
1
changelog.d/17590.doc
Normal file
1
changelog.d/17590.doc
Normal file
|
@ -0,0 +1 @@
|
||||||
|
Clarify that the admin api resource is only loaded on the main process and not workers.
|
|
@ -509,7 +509,8 @@ Unix socket support (_Added in Synapse 1.89.0_):
|
||||||
|
|
||||||
Valid resource names are:
|
Valid resource names are:
|
||||||
|
|
||||||
* `client`: the client-server API (/_matrix/client), and the synapse admin API (/_synapse/admin). Also implies `media` and `static`.
|
* `client`: the client-server API (/_matrix/client). Also implies `media` and `static`.
|
||||||
|
If configuring the main process, the Synapse Admin API (/_synapse/admin) is also implied.
|
||||||
|
|
||||||
* `consent`: user consent forms (/_matrix/consent). See [here](../../consent_tracking.md) for more.
|
* `consent`: user consent forms (/_matrix/consent). See [here](../../consent_tracking.md) for more.
|
||||||
|
|
||||||
|
@ -1765,7 +1766,7 @@ rc_3pid_validation:
|
||||||
|
|
||||||
This option sets ratelimiting how often invites can be sent in a room or to a
|
This option sets ratelimiting how often invites can be sent in a room or to a
|
||||||
specific user. `per_room` defaults to `per_second: 0.3`, `burst_count: 10`,
|
specific user. `per_room` defaults to `per_second: 0.3`, `burst_count: 10`,
|
||||||
`per_user` defaults to `per_second: 0.003`, `burst_count: 5`, and `per_issuer`
|
`per_user` defaults to `per_second: 0.003`, `burst_count: 5`, and `per_issuer`
|
||||||
defaults to `per_second: 0.3`, `burst_count: 10`.
|
defaults to `per_second: 0.3`, `burst_count: 10`.
|
||||||
|
|
||||||
Client requests that invite user(s) when [creating a
|
Client requests that invite user(s) when [creating a
|
||||||
|
@ -1966,7 +1967,7 @@ max_image_pixels: 35M
|
||||||
---
|
---
|
||||||
### `remote_media_download_burst_count`
|
### `remote_media_download_burst_count`
|
||||||
|
|
||||||
Remote media downloads are ratelimited using a [leaky bucket algorithm](https://en.wikipedia.org/wiki/Leaky_bucket), where a given "bucket" is keyed to the IP address of the requester when requesting remote media downloads. This configuration option sets the size of the bucket against which the size in bytes of downloads are penalized - if the bucket is full, ie a given number of bytes have already been downloaded, further downloads will be denied until the bucket drains. Defaults to 500MiB. See also `remote_media_download_per_second` which determines the rate at which the "bucket" is emptied and thus has available space to authorize new requests.
|
Remote media downloads are ratelimited using a [leaky bucket algorithm](https://en.wikipedia.org/wiki/Leaky_bucket), where a given "bucket" is keyed to the IP address of the requester when requesting remote media downloads. This configuration option sets the size of the bucket against which the size in bytes of downloads are penalized - if the bucket is full, ie a given number of bytes have already been downloaded, further downloads will be denied until the bucket drains. Defaults to 500MiB. See also `remote_media_download_per_second` which determines the rate at which the "bucket" is emptied and thus has available space to authorize new requests.
|
||||||
|
|
||||||
Example configuration:
|
Example configuration:
|
||||||
```yaml
|
```yaml
|
||||||
|
|
Loading…
Reference in a new issue