- Mar 22, 2021
-
-
Andrew Morgan authored
Addresses https://github.com/matrix-org/synapse-dinsic/issues/70 This PR causes `ProxyAgent` to attempt to extract credentials from an `HTTPS_PROXY` env var. If credentials are found, a `Proxy-Authorization` header ([details](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Proxy-Authorization)) is sent to the proxy server to authenticate against it. The headers are *not* passed to the remote server. Also added some type hints.
-
Ankit Dobhal authored
- Merge 'isinstance' calls. - Remove unnecessary dict call outside of comprehension. - Use 'sys.exit()' calls.
-
Erik Johnston authored
-
Brendan Abolivier authored
Implement MSC3026: busy presence state
-
- Mar 19, 2021
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
Richard van der Hoff authored
-
- Mar 18, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Patrick Cloke authored
-
Richard van der Hoff authored
This is very bare-bones for now: federation will come soon, while pagination is descoped for now but will come later.
-
Brendan Abolivier authored
-
Dirk Klimpel authored
-
Erik Johnston authored
Currently federation catchup will send the last *local* event that we failed to send to the remote. This can cause issues for large rooms where lots of servers have sent events while the remote server was down, as when it comes back up again it'll be flooded with events from various points in the DAG. Instead, let's make it so that all the servers send the most recent events, even if its not theirs. The remote should deduplicate the events, so there shouldn't be much overhead in doing this. Alternatively, the servers could only send local events if they were also extremities and hope that the other server will send the event over, but that is a bit risky.
-
Brendan Abolivier authored
-
- Mar 17, 2021
-
-
Andrew Morgan authored
This bug was discovered by DINUM. We were modifying `serialized_event["content"]`, which - if you've got `USE_FROZEN_DICTS` turned on or are [using a third party rules module](https://github.com/matrix-org/synapse/blob/17cd48fe5171d50da4cb59db647b993168e7dfab/synapse/events/third_party_rules.py#L73-L76) - will raise a 500 if you try to a edit a reply to a message. `serialized_event["content"]` could be set to the edit event's content, instead of a copy of it, which is bad as we attempt to modify it. Instead, we also end up modifying the original event's content. DINUM uses a third party rules module, which meant the event's content got frozen and thus an exception was raised. To be clear, the problem is not that the event's content was frozen. In fact doing so helped us uncover the fact we weren't copying event content correctly.
-
Patrick Cloke authored
By splitting this to two separate methods the callers know what methods they can expect on the handler.
-
Hubert Chathi authored
Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com>
-
Erik Johnston authored
We had two functions named `get_forward_extremities_for_room` and `get_forward_extremeties_for_room` that took different paramters. We rename one of them to avoid confusion.
-
Richard van der Hoff authored
* Populate `internal_metadata.outlier` based on `events` table Rather than relying on `outlier` being in the `internal_metadata` column, populate it based on the `events.outlier` column. * Move `outlier` out of InternalMetadata._dict Ultimately, this will allow us to stop writing it to the database. For now, we have to grandfather it back in so as to maintain compatibility with older versions of Synapse.
-
Patrick Cloke authored
-
- Mar 16, 2021
-
-
Jonathan de Jong authored
* Adds B00 to ignored checks. * Fixes remaining issues.
-
Hubbe authored
Allows limiting who can login using OIDC via the claims made from the IdP.
-
Dirk Klimpel authored
Instead of if the user does not have a password hash. This allows a SSO user to add a password to their account, but only if the local password database is configured.
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
Fixes https://github.com/matrix-org/synapse/issues/9572 When a SSO user logs in for the first time, we create a local Matrix user for them. This goes through the register_user flow, which ends up triggering the spam checker. Spam checker modules don't currently have any way to differentiate between a user trying to sign up initially, versus an SSO user (whom has presumably already been approved elsewhere) trying to log in for the first time. This PR passes `auth_provider_id` as an argument to the `check_registration_for_spam` function. This argument will contain an ID of an SSO provider (`"saml"`, `"cas"`, etc.) if one was used, else `None`.
-
Mathieu Velten authored
Co-authored-by:
Will Hunt <willh@matrix.org> Co-authored-by:
Erik Johnston <erik@matrix.org>
-
Patrick Cloke authored
* Handle an empty cookie as an invalid macaroon. * Newsfragment
-
Richard van der Hoff authored
The stable format uses different brand identifiers, so we need to support two identifiers for each IdP.
-
Richard van der Hoff authored
... and complain if people try to turn it off.
-
Andrew Morgan authored
There's no need to do aggregation bundling for state events. Doing so can cause performance issues.
-
Richard van der Hoff authored
* Fix Internal Server Error on `GET /saml2/authn_response` Seems to have been introduced in #8765 (Synapse 1.24.0) * Fix newsfile
-
- Mar 15, 2021
-
-
Patrick Cloke authored
-
Patrick Cloke authored
-