- Jan 18, 2021
-
-
Richard van der Hoff authored
* Factor out a common TestHtmlParser Looks like I'm doing this in a few different places. * Improve OIDC login test Complete the OIDC login flow, rather than giving up halfway through. * Ensure that OIDC login works with multiple OIDC providers * Fix bugs in handling clientRedirectUrl - don't drop duplicate query-params, or params with no value - allow utf-8 in query-params
-
- Jan 15, 2021
-
-
Richard van der Hoff authored
0dd2649c (#9112) changed the signature of `auth_via_oidc`. Meanwhile, 26d10331 (#9091) introduced a new test which relied on the old signature of `auth_via_oidc`. The two branches were never tested together until they landed in develop.
-
Richard van der Hoff authored
* make the OIDC bits of the test work at a higher level - via the REST api instead of poking the OIDCHandler directly. * Move it to test_login.py, where I think it fits better.
-
- Jan 13, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
* Add complete test for UI-Auth-via-SSO. * review comments
-
- Jan 12, 2021
-
-
Dirk Klimpel authored
This only applies if the user's data is to be erased.
-
- Jan 07, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
black seems to want to reformat this, despite `black --check` being happy with it :/
-
Richard van der Hoff authored
If we are lacking an optional dependency, skip the tests that rely on it.
-
- Jan 04, 2021
-
-
Richard van der Hoff authored
* Implement CasHandler.handle_redirect_request ... to make it match OidcHandler and SamlHandler * Clean up interface for OidcHandler.handle_redirect_request Make it accept `client_redirect_url=None`. * Clean up interface for `SamlHandler.handle_redirect_request` ... bring it into line with CAS and OIDC by making it take a Request parameter, move the magic for `client_redirect_url` for UIA into the handler, and fix the return type to be a `str` rather than a `bytes`. * Define a common protocol for SSO auth provider impls * Give SsoIdentityProvider an ID and register them * Combine the SSO Redirect servlets Now that the SsoHandler knows about the identity providers, we can combine the various *RedirectServlets into a single implementation which delegates to the right IdP. * changelog
-
- Dec 22, 2020
-
-
Patrick Cloke authored
Tests were broken due to an API changing. The code used in Synapse proper should be compatible with both versions already.
-
- Dec 18, 2020
-
-
Patrick Cloke authored
-
- Dec 15, 2020
-
-
Richard van der Hoff authored
despite the warnings saying "don't implement get_extra_attributes", we had implemented it, so the tests weren't doing what we thought they were.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
This was never used, so let's get rid of it.
-
Richard van der Hoff authored
this didn't seem to be doing a lot, so remove it.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
The two are equivalent, but really we want to check the HTTP result that got returned to the channel, not the code that the Request object *intended* to return to the channel.
-
- Dec 11, 2020
-
-
Erik Johnston authored
Fixes #8866
-
- Dec 03, 2020
-
-
Richard van der Hoff authored
The spec says we should return `M_FORBIDDEN` when someone tries to register and registration is disabled.
-
- Dec 02, 2020
-
-
Richard van der Hoff authored
During user-interactive auth, do not offer password auth to users with no password, nor SSO auth to users with no SSO. Fixes #7559.
-
Patrick Cloke authored
Replaces the `federation_ip_range_blacklist` configuration setting with an `ip_range_blacklist` setting with wider scope. It now applies to: * Federation * Identity servers * Push notifications * Checking key validitity for third-party invite events The old `federation_ip_range_blacklist` setting is still honored if present, but with reduced scope (it only applies to federation and identity servers).
-
Andrew Morgan authored
This PR adds a `room_version` argument to the `RestHelper`'s `create_room_as` function for tests. I plan to use this for testing knocking, which currently uses an unstable room version.
-
- Dec 01, 2020
-
-
Richard van der Hoff authored
The spec requires synapse to support `identifier` dicts for `m.login.password` user-interactive auth, which it did not (instead, it required an undocumented `user` parameter.) To fix this properly, we need to pull the code that interprets `identifier` into `AuthHandler.validate_login` so that it can be called from the UIA code. Fixes #5665.
-
- Nov 30, 2020
-
-
Jonathan de Jong authored
Changes `@cache_in_self` to use underscore-prefixed attributes.
-
- Nov 25, 2020
-
-
Dirk Klimpel authored
These are now only available via `/_synapse/admin/v1`.
-
- Nov 16, 2020
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
remove the stubbing out of `request.process`, so that `requestReceived` also renders the request via the appropriate resource. Replace render() with a stub for now.
-
Richard van der Hoff authored
Some tests want to set some custom HTTP request headers, so provide a way to do that before calling requestReceived().
-
- Nov 15, 2020
-
-
Richard van der Hoff authored
Where we want to render a request against a specific Resource, call the global make_request() function rather than the one in HomeserverTestCase, allowing us to pass in an appropriate `Site`.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Oct 29, 2020
-
-
Erik Johnston authored
We do it this way round so that only the "owner" can delete the access token (i.e. `/logout/all` by the "owner" also deletes that token, but `/logout/all` by the "target user" doesn't). A future PR will add an API for creating such a token. When the target user and authenticated entity are different the `Processed request` log line will be logged with a: `{@admin:server as @bob:server} ...`. I'm not convinced by that format (especially since it adds spaces in there, making it harder to use `cut -d ' '` to chop off the start of log lines). Suggestions welcome.
-
- Oct 20, 2020
-
-
Andrew Morgan authored
-
- Oct 13, 2020
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
Support returning a new event dict from `check_event_allowed`.
-
Erik Johnston authored
Should fix #3365.
-
- Oct 09, 2020
-
-
Andrew Morgan authored
This PR allows Synapse modules making use of the `ModuleApi` to create and send non-membership events into a room. This can useful to have modules send messages, or change power levels in a room etc. Note that they must send event through a user that's already in the room. The non-membership event limitation is currently arbitrary, as it's another chunk of work and not necessary at the moment.
-