- Dec 07, 2020
-
-
Patrick Cloke authored
-
- Dec 04, 2020
-
-
Patrick Cloke authored
Authentication is done by checking a shared secret provided in the Synapse configuration file.
-
Erik Johnston authored
This is so that we can choose which algorithm to use based on the room ID.
-
Patrick Cloke authored
Pusher URLs now must end in `/_matrix/push/v1/notify` per the specification.
-
Patrick Cloke authored
Instead return the proper 400 error.
-
Patrick Cloke authored
Synapse 1.24.0rc2 (2020-12-04) ============================== Bugfixes -------- - Fix a regression in v1.24.0rc1 which failed to allow SAML mapping providers which were unable to redirect users to an additional page. ([\#8878](https://github.com/matrix-org/synapse/issues/8878)) Internal Changes ---------------- - Add support for the `prometheus_client` newer than 0.9.0. Contributed by Jordan Bancino. ([\#8875](https://github.com/matrix-org/synapse/issues/8875))
-
Patrick Cloke authored
-
Patrick Cloke authored
This was broken in #8801.
-
Jordan Bancino authored
This removes the version pin of the `prometheus_client` dependency, in direct response to #8831. If merged, this will close #8831 As far as I can tell, no other changes are needed, but as I'm no synapse expert, I'm relying heavily on CI and maintainer reviews for this. My very primitive test of synapse with prometheus_client v0.9.0 on my home server didn't bring up any issues, so we'll see what happens. Signed-off-by: Jordan Bancino
-
Richard van der Hoff authored
the constructor is called with a `module_api`.
-
- Dec 03, 2020
-
-
Richard van der Hoff authored
The spec says we should return `M_FORBIDDEN` when someone tries to register and registration is disabled.
-
Richard van der Hoff authored
Remove some unnecessary mocking from the unit tests
-
- Dec 02, 2020
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
UIA: offer only available auth flows
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
During user-interactive auth, do not offer password auth to users with no password, nor SSO auth to users with no SSO. Fixes #7559.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
This is now only used in `test_typing`, so move it there.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
A few test cases were relying on being able to mount non-client servlets on the test resource. it's better to give them their own Resources.
-
Patrick Cloke authored
Replaces the `federation_ip_range_blacklist` configuration setting with an `ip_range_blacklist` setting with wider scope. It now applies to: * Federation * Identity servers * Push notifications * Checking key validitity for third-party invite events The old `federation_ip_range_blacklist` setting is still honored if present, but with reduced scope (it only applies to federation and identity servers).
-
Erik Johnston authored
We do state res with unpersisted events when calculating the new current state of the room, so that should be the only thing impacted. I don't think this is tooooo big of a deal as: 1. the next time a state event happens in the room the current state should correct itself; 2. in the common case all the unpersisted events' auth events will be pulled in by other state, so will still return the correct result (or one which is sufficiently close to not affect the result); and 3. we mostly use the state at an event to do important operations, which isn't affected by this.
-
Richard van der Hoff authored
Rather than using a single JsonResource, construct a resource tree, as we do in the prod code, and allow testcases to add extra resources by overriding `create_resource_dict`.
-
Johanna Dorothea Reichmann authored
The official dashboard uses data from these rules, but they were never added to the synapse-v2.rules. They are mentioned in this issue: https://github.com/matrix-org/synapse/issues/7917#issuecomment-661330409 , but never got added to the rules. Adding them results in all graphs in the "Event persist rate" section to function as intended. Signed-off-by:
Johanna Dorothea Reichmann <transcaffeine@finallycoffee.eu>
-
David Florness authored
Raise a proper 400 error if the `mac` field is missing.
-
Patrick Cloke authored
-
Patrick Cloke authored
-
Patrick Cloke authored
This was broken in #8801 when abstracting code shared with OIDC. After this change both SAML and OIDC have a concept of grandfathering users, but with different implementations.
-
Patrick Cloke authored
-
Richard van der Hoff authored
The idea here is to abstract out all the conditional code which tests which methods a given password provider has, to provide a consistent interface.
-
Andrew Morgan authored
This PR adds a `room_version` argument to the `RestHelper`'s `create_room_as` function for tests. I plan to use this for testing knocking, which currently uses an unstable room version.
-
- Dec 01, 2020
-
-
Richard van der Hoff authored
The spec requires synapse to support `identifier` dicts for `m.login.password` user-interactive auth, which it did not (instead, it required an undocumented `user` parameter.) To fix this properly, we need to pull the code that interprets `identifier` into `AuthHandler.validate_login` so that it can be called from the UIA code. Fixes #5665.
-
Richard van der Hoff authored
It's important that we make sure our background updates happen in a defined order, to avoid disasters like #6923. Add an ordering to all of the background updates that have landed since #7190.
-
Nicolas Chamo authored
-
Richard van der Hoff authored
Fix a minor bug where we would offer "m.login.password" login if a custom auth provider supported it, even if password login was disabled.
-