- Dec 02, 2020
-
-
Richard van der Hoff authored
-
Patrick Cloke authored
Replaces the `federation_ip_range_blacklist` configuration setting with an `ip_range_blacklist` setting with wider scope. It now applies to: * Federation * Identity servers * Push notifications * Checking key validitity for third-party invite events The old `federation_ip_range_blacklist` setting is still honored if present, but with reduced scope (it only applies to federation and identity servers).
-
- Nov 17, 2020
-
-
Erik Johnston authored
-
- Oct 29, 2020
-
-
Erik Johnston authored
We do it this way round so that only the "owner" can delete the access token (i.e. `/logout/all` by the "owner" also deletes that token, but `/logout/all` by the "target user" doesn't). A future PR will add an API for creating such a token. When the target user and authenticated entity are different the `Processed request` log line will be logged with a: `{@admin:server as @bob:server} ...`. I'm not convinced by that format (especially since it adds spaces in there, making it harder to use `cut -d ' '` to chop off the start of log lines). Suggestions welcome.
-
- Oct 09, 2020
-
-
Patrick Cloke authored
All handlers now available via get_*_handler() methods on the HomeServer.
-
- Sep 04, 2020
-
-
Patrick Cloke authored
-
- Aug 27, 2020
-
-
Patrick Cloke authored
-
- Aug 24, 2020
-
-
Will Hunt authored
Add new method ratelimiter.can_requester_do_action and ensure that appservices are exempt from being ratelimited. Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com> Co-authored-by:
Erik Johnston <erik@matrix.org>
-
- Aug 21, 2020
-
-
Will Hunt authored
Add new method ratelimiter.can_requester_do_action and ensure that appservices are exempt from being ratelimited. Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com> Co-authored-by:
Erik Johnston <erik@matrix.org>
-
- Aug 06, 2020
-
-
Patrick Cloke authored
-
- Jun 05, 2020
-
-
Andrew Morgan authored
While working on https://github.com/matrix-org/synapse/issues/5665 I found myself digging into the `Ratelimiter` class and seeing that it was both: * Rather undocumented, and * causing a *lot* of config checks This PR attempts to refactor and comment the `Ratelimiter` class, as well as encourage config file accesses to only be done at instantiation. Best to be reviewed commit-by-commit.
-
- May 06, 2020
-
-
Andrew Morgan authored
-
- Apr 15, 2020
-
-
Patrick Cloke authored
-
- Feb 07, 2020
-
-
Richard van der Hoff authored
... and use it in places where it's trivial to do so. This will make it easier to pass room versions into the FrozenEvent constructors.
-
- Nov 05, 2019
-
-
Brendan Abolivier authored
-
- Nov 01, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
- Oct 30, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
- Sep 11, 2019
-
-
Jason Robinson authored
This allows support users to be created even on MAU limits via the admin API. Support users are excluded from MAU after creation, so it makes sense to exclude them in creation - except if the whole host is in disabled state. Signed-off-by:
Jason Robinson <jasonr@matrix.org>
-
- Jul 12, 2019
-
-
Richard van der Hoff authored
Record how long an access token is valid for, and raise a soft-logout once it expires.
-
- Jul 11, 2019
-
-
Richard van der Hoff authored
First of all, let's get rid of `TOKEN_NOT_FOUND_HTTP_STATUS`. It was a hack we did at one point when it was possible to return either a 403 or a 401 if the creds were missing. We always return a 401 in these cases now (thankfully), so it's not needed. Let's also stop abusing `AuthError` for these cases. Honestly they have nothing that relates them to the other places that `AuthError` is used, other than the fact that they are loosely under the 'Auth' banner. It makes no sense for them to share exception classes. Instead, let's add a couple of new exception classes: `InvalidClientTokenError` and `MissingClientTokenError`, for the `M_UNKNOWN_TOKEN` and `M_MISSING_TOKEN` cases respectively - and an `InvalidClientCredentialsError` base class for the two of them.
-
- Jul 10, 2019
-
-
Richard van der Hoff authored
this is only used in one place, so it's clearer if we inline it and reduce the API surface. Also, fixes a buglet where we would create an access token even if we were about to block the user (we would never return the AT, so the user could never use it, but it was still created and added to the db.)
-
Richard van der Hoff authored
The 'token' param is no longer used anywhere except the tests, so let's kill that off too.
-
- Jun 20, 2019
-
-
Amber Brown authored
-
- May 10, 2019
-
-
Amber Brown authored
-
- Mar 19, 2019
-
-
Richard van der Hoff authored
Fixes a bug where hs_disabled_message was not enforced for 3pid-based requests if there was no server_notices_mxid configured.
-
- Mar 05, 2019
-
-
Brendan Abolivier authored
* Rate-limiting for registration * Add unit test for registration rate limiting * Add config parameters for rate limiting on auth endpoints * Doc * Fix doc of rate limiting function Co-Authored-By:
babolivier <contact@brendanabolivier.com> * Incorporate review * Fix config parsing * Fix linting errors * Set default config for auth rate limiting * Fix tests * Add changelog * Advance reactor instead of mocked clock * Move parameters to registration specific config and give them more sensible default values * Remove unused config options * Don't mock the rate limiter un MAU tests * Rename _register_with_store into register_with_store * Make CI happy * Remove unused import * Update sample config * Fix ratelimiting test for py2 * Add non-guest test
-
- Jan 10, 2019
-
-
Richard van der Hoff authored
-
- Dec 14, 2018
-
-
Neil Johnson authored
Allow for the creation of a support user. A support user can access the server, join rooms, interact with other users, but does not appear in the user directory nor does it contribute to monthly active user limits.
-
- Oct 24, 2018
-
-
Richard van der Hoff authored
Fixes a bug introduced in https://github.com/matrix-org/synapse/pull/1783 which meant that single backslashes were not allowed in event field filters. The intention here is to allow single-backslashes, but disallow double-backslashes.
-
- Sep 06, 2018
-
-
Amber Brown authored
-
- Aug 31, 2018
-
-
Neil Johnson authored
-
- Aug 24, 2018
-
-
Erik Johnston authored
-
- Aug 18, 2018
-
-
Neil Johnson authored
-
Neil Johnson authored
-
- Aug 16, 2018
-
-
Neil Johnson authored
-
- Aug 15, 2018
-
-
Neil Johnson authored
-
Neil Johnson authored
-
- Aug 13, 2018
-
-
Neil Johnson authored
-