- Dec 08, 2020
-
-
Richard van der Hoff authored
The idea is that the parse_config method of extension modules can raise either a ConfigError or a JsonValidationError, and it will be magically turned into a legible error message. There's a few components to it: * Separating the "path" and the "message" parts of a ConfigError, so that we can fiddle with the path bit to turn it into an absolute path. * Generally improving the way ConfigErrors get printed. * Passing in the config path to load_module so that it can wrap any exceptions that get caught appropriately.
-
Richard van der Hoff authored
* SsoHandler: remove inheritance from BaseHandler * Simplify the flow for SSO UIA We don't need to do all the magic for mapping users when we are doing UIA, so let's factor that out.
-
Richard van der Hoff authored
-
- Dec 07, 2020
-
-
Will Hunt authored
* Call set_avatar_url with target_user, not user_id Fixes https://github.com/matrix-org/synapse/issues/8871 * Create 8872.bugfix * Update synapse/rest/admin/users.py Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com> * Testing * Update changelog.d/8872.bugfix Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com> Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
-
Patrick Cloke authored
-
Patrick Cloke authored
-
Patrick Cloke authored
-
- Dec 04, 2020
-
-
Patrick Cloke authored
Authentication is done by checking a shared secret provided in the Synapse configuration file.
-
Erik Johnston authored
This is so that we can choose which algorithm to use based on the room ID.
-
Patrick Cloke authored
Pusher URLs now must end in `/_matrix/push/v1/notify` per the specification.
-
Patrick Cloke authored
Instead return the proper 400 error.
-
Patrick Cloke authored
Synapse 1.24.0rc2 (2020-12-04) ============================== Bugfixes -------- - Fix a regression in v1.24.0rc1 which failed to allow SAML mapping providers which were unable to redirect users to an additional page. ([\#8878](https://github.com/matrix-org/synapse/issues/8878)) Internal Changes ---------------- - Add support for the `prometheus_client` newer than 0.9.0. Contributed by Jordan Bancino. ([\#8875](https://github.com/matrix-org/synapse/issues/8875))
-
Patrick Cloke authored
-
Patrick Cloke authored
This was broken in #8801.
-
Jordan Bancino authored
This removes the version pin of the `prometheus_client` dependency, in direct response to #8831. If merged, this will close #8831 As far as I can tell, no other changes are needed, but as I'm no synapse expert, I'm relying heavily on CI and maintainer reviews for this. My very primitive test of synapse with prometheus_client v0.9.0 on my home server didn't bring up any issues, so we'll see what happens. Signed-off-by: Jordan Bancino
-
Richard van der Hoff authored
the constructor is called with a `module_api`.
-
- Dec 03, 2020
-
-
Richard van der Hoff authored
The spec says we should return `M_FORBIDDEN` when someone tries to register and registration is disabled.
-
Richard van der Hoff authored
Remove some unnecessary mocking from the unit tests
-
- Dec 02, 2020
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
UIA: offer only available auth flows
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
During user-interactive auth, do not offer password auth to users with no password, nor SSO auth to users with no SSO. Fixes #7559.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
This is now only used in `test_typing`, so move it there.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
A few test cases were relying on being able to mount non-client servlets on the test resource. it's better to give them their own Resources.
-
Patrick Cloke authored
Replaces the `federation_ip_range_blacklist` configuration setting with an `ip_range_blacklist` setting with wider scope. It now applies to: * Federation * Identity servers * Push notifications * Checking key validitity for third-party invite events The old `federation_ip_range_blacklist` setting is still honored if present, but with reduced scope (it only applies to federation and identity servers).
-
Erik Johnston authored
We do state res with unpersisted events when calculating the new current state of the room, so that should be the only thing impacted. I don't think this is tooooo big of a deal as: 1. the next time a state event happens in the room the current state should correct itself; 2. in the common case all the unpersisted events' auth events will be pulled in by other state, so will still return the correct result (or one which is sufficiently close to not affect the result); and 3. we mostly use the state at an event to do important operations, which isn't affected by this.
-
Richard van der Hoff authored
Rather than using a single JsonResource, construct a resource tree, as we do in the prod code, and allow testcases to add extra resources by overriding `create_resource_dict`.
-
Johanna Dorothea Reichmann authored
The official dashboard uses data from these rules, but they were never added to the synapse-v2.rules. They are mentioned in this issue: https://github.com/matrix-org/synapse/issues/7917#issuecomment-661330409 , but never got added to the rules. Adding them results in all graphs in the "Event persist rate" section to function as intended. Signed-off-by:
Johanna Dorothea Reichmann <transcaffeine@finallycoffee.eu>
-
David Florness authored
Raise a proper 400 error if the `mac` field is missing.
-
Patrick Cloke authored
-
Patrick Cloke authored
-
Patrick Cloke authored
This was broken in #8801 when abstracting code shared with OIDC. After this change both SAML and OIDC have a concept of grandfathering users, but with different implementations.
-
Patrick Cloke authored
-