- Apr 06, 2021
-
-
Andrew Morgan authored
At the moment, if you'd like to share presence between local or remote users, those users must be sharing a room together. This isn't always the most convenient or useful situation though. This PR adds a module to Synapse that will allow deployments to set up extra logic on where presence updates should be routed. The module must implement two methods, `get_users_for_states` and `get_interested_users`. These methods are given presence updates or user IDs and must return information that Synapse will use to grant passing presence updates around. A method is additionally added to `ModuleApi` which allows triggering a set of users to receive the current, online presence information for all users they are considered interested in. This is the equivalent of that user receiving presence information during an initial sync. The goal of this module is to be fairly generic and useful for a variety of applications, with hard requirements being: * Sending state for a specific set or all known users to a defined set of local and remote users. * The ability to trigger an initial sync for specific users, so they receive all current state.
-
- Mar 31, 2021
-
-
Denis Kasak authored
The regex should be terminated so that subdomain matches of another domain are not accepted. Just ensuring that someone doesn't shoot themselves in the foot by copying our example. Signed-off-by:
Denis Kasak <dkasak@termina.org.uk>
-
- Mar 30, 2021
-
-
Richard van der Hoff authored
`room_invite_state_types` was inconvenient as a configuration setting, because anyone that ever set it would not receive any new types that were added to the defaults. Here, we deprecate the old setting, and replace it with a couple of new settings under `room_prejoin_state`.
-
- Mar 29, 2021
-
-
Richard van der Hoff authored
I've reiterated the advice about using `oidc` to migrate, since I've seen a few people caught by this. I've also removed a couple of the examples as they are duplicating the OIDC documentation, and I think they might be leading people astray.
-
- Mar 23, 2021
-
-
Erik Johnston authored
It's legitimate behaviour to try and join a bunch of rooms at once.
-
- Mar 16, 2021
-
-
Hubbe authored
Allows limiting who can login using OIDC via the claims made from the IdP.
-
Richard van der Hoff authored
The stable format uses different brand identifiers, so we need to support two identifiers for each IdP.
-
Richard van der Hoff authored
... and complain if people try to turn it off.
-
- Mar 09, 2021
-
-
Richard van der Hoff authored
Apple had to be special. They want a client secret which is generated from an EC key. Fixes #9220. Also fixes #9212 while I'm here.
-
Erik Johnston authored
After 0764d0c6
-
- Feb 22, 2021
-
-
Andrew Morgan authored
The user directory sample config section was a little messy, and didn't adhere to our [recommended config format guidelines](https://github.com/matrix-org/synapse/blob/develop/docs/code_style.md#configuration-file-format). This PR cleans that up a bit.
-
- Feb 19, 2021
-
-
Andrew Morgan authored
This PR adds a homeserver config option, `user_directory.prefer_local_users`, that when enabled will show local users higher in user directory search results than remote users. This option is off by default. Note that turning this on doesn't necessarily mean that remote users will always be put below local users, but they should be assuming all other ranking factors (search query match, profile information present etc) are identical. This is useful for, say, University networks that are openly federating, but want to prioritise local students and staff in the user directory over other random users.
-
AndrewFerr authored
Add off-by-default configuration settings to: - disable putting an invitee's profile info in invite events - disable profile lookup via federation Signed-off-by:
Andrew Ferrazzutti <fair@miscworks.net>
-
- Feb 18, 2021
-
-
Rishabh Arya authored
-
- Feb 12, 2021
-
-
Andrew Morgan authored
Just a small change missed in 7950aa8a.
-
- Feb 11, 2021
-
-
Patrick Cloke authored
This breaks some people's configurations (if their Client-Server API is not accessed via port 443).
-
- Feb 04, 2021
-
-
Patrick Cloke authored
This fixes the Jinja2 templates for the mapping provider.
-
- Feb 03, 2021
-
-
Patrick Cloke authored
-
dykstranet authored
config: Add detail to auto_join_rooms comment Signed-off-by:
Gary Dykstra <gary@dykstranet.com>
-
Patrick Cloke authored
Also add a few more IP ranges to the default blacklist.
-
- Feb 02, 2021
-
-
Richard van der Hoff authored
-
- Feb 01, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
fixes #9171
-
Richard van der Hoff authored
There's some prelimiary work here to pull out the construction of a jinja environment to a separate function. I wanted to load the template at display time rather than load time, so that it's easy to update on the fly. Honestly, I think we should do this with all our templates: the risk of ending up with malformed templates is far outweighed by the improved turnaround time for an admin trying to update them.
-
Richard van der Hoff authored
-
- Jan 29, 2021
-
-
Erik Johnston authored
-
- Jan 28, 2021
-
-
Erik Johnston authored
-
- Jan 27, 2021
-
-
Richard van der Hoff authored
We've decided to add a 'brand' field to help clients decide how to style the buttons. Also, fix up the allowed characters for idp_id, while I'm in the area.
-
Richard van der Hoff authored
-
- Jan 26, 2021
-
-
Patrick Cloke authored
The current configuration is handled for backwards compatibility, but is considered deprecated.
-
- Jan 21, 2021
-
-
Richard van der Hoff authored
... to avoid clashes with other SSO mechanisms
-
- Jan 20, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Jan 15, 2021
-
-
Richard van der Hoff authored
This is the final step for supporting multiple OIDC providers concurrently. First of all, we reorganise the config so that you can specify a list of OIDC providers, instead of a single one. Before: oidc_config: enabled: true issuer: "https://oidc_provider" # etc After: oidc_providers: - idp_id: prov1 issuer: "https://oidc_provider" - idp_id: prov2 issuer: "https://another_oidc_provider" The old format is still grandfathered in. With that done, it's then simply a matter of having OidcHandler instantiate a new OidcProvider for each configured provider.
-
- Jan 13, 2021
-
-
Richard van der Hoff authored
If a user tries to do UI Auth via SSO, but uses the wrong account on the SSO IdP, try to give them a better error. Previously, the UIA would claim to be successful, but then the operation in question would simply fail with "auth fail". Instead, serve up an error page which explains the failure.
-
- Jan 05, 2021
-
-
Richard van der Hoff authored
During login, if there are multiple IdPs enabled, offer the user a choice of IdPs.
-
- Dec 29, 2020
-
-
Jerin J Titus authored
Removes the trailing slash with causes issues with matrix.to/Element.
-
- Dec 18, 2020
-
-
Patrick Cloke authored
Adds a new setting `email.invite_client_location` which, if defined, is passed to the identity server during invites.
-
Richard van der Hoff authored
The final part (for now) of my work to implement a username picker in synapse itself. The idea is that we allow `UsernameMappingProvider`s to return `localpart=None`, in which case, rather than redirecting the browser back to the client, we redirect to a username-picker resource, which allows the user to enter a username. We *then* complete the SSO flow (including doing the client permission checks). The static resources for the username picker itself (in https://github.com/matrix-org/synapse/tree/rav/username_picker/synapse/res/username_picker) are essentially lifted wholesale from https://github.com/matrix-org/matrix-synapse-saml-mozilla/tree/master/matrix_synapse_saml_mozilla/res. As the comment says, we might want to think about making them customisable, but that can be a follow-up. Fixes #8876.
-
Patrick Cloke authored
-