- Nov 09, 2021
-
-
Patrick Cloke authored
Adds experimental support for `relation_types` and `relation_senders` fields for filters.
-
- Sep 29, 2021
-
-
Patrick Cloke authored
-
- Sep 24, 2021
-
-
Jason Robinson authored
If the MAU count had been reached, Synapse incorrectly blocked appservice users even though they've been explicitly configured not to be tracked (the default). This was due to bypassing the relevant if as it was chained behind another earlier hit if as an elif. Signed-off-by:
Jason Robinson <jasonr@matrix.org>
-
- Sep 23, 2021
-
-
Patrick Cloke authored
-
- Jun 24, 2021
-
-
Quentin Gliech authored
This implements refresh tokens, as defined by MSC2918 This MSC has been implemented client side in Hydrogen Web: vector-im/hydrogen-web#235 The basics of the MSC works: requesting refresh tokens on login, having the access tokens expire, and using the refresh token to get a new one. Signed-off-by:
Quentin Gliech <quentingliech@gmail.com>
-
- May 12, 2021
-
-
Brendan Abolivier authored
* Correctly ratelimit invites when creating a room Also allow ratelimiting for more than one action at a time.
-
Richard van der Hoff authored
-
- Apr 14, 2021
-
-
Jonathan de Jong authored
Part of #9744 Removes all redundant `# -*- coding: utf-8 -*-` lines from files, as python 3 automatically reads source code as utf-8 now. `Signed-off-by:
Jonathan de Jong <jonathan@automatia.nl>`>
-
- Apr 09, 2021
-
-
Patrick Cloke authored
-
- Mar 30, 2021
-
-
Erik Johnston authored
This should fix a class of bug where we forget to check if e.g. the appservice shouldn't be ratelimited. We also check the `ratelimit_override` table to check if the user has ratelimiting disabled. That table is really only meant to override the event sender ratelimiting, so we don't use any values from it (as they might not make sense for different rate limits), but we do infer that if ratelimiting is disabled for the user we should disabled all ratelimits. Fixes #9663
-
- Feb 16, 2021
-
-
Eric Eastwood authored
- Update black version to the latest - Run black auto formatting over the codebase - Run autoformatting according to [`docs/code_style.md `](https://github.com/matrix-org/synapse/blob/80d6dc9783aa80886a133756028984dbf8920168/docs/code_style.md) - Update `code_style.md` docs around installing black to use the correct version
-
Patrick Cloke authored
And convert some inlineDeferreds to async-friendly functions.
-
- Dec 02, 2020
-
-
Richard van der Hoff authored
-
Patrick Cloke authored
Replaces the `federation_ip_range_blacklist` configuration setting with an `ip_range_blacklist` setting with wider scope. It now applies to: * Federation * Identity servers * Push notifications * Checking key validitity for third-party invite events The old `federation_ip_range_blacklist` setting is still honored if present, but with reduced scope (it only applies to federation and identity servers).
-
- Nov 17, 2020
-
-
Erik Johnston authored
-
- Oct 29, 2020
-
-
Erik Johnston authored
We do it this way round so that only the "owner" can delete the access token (i.e. `/logout/all` by the "owner" also deletes that token, but `/logout/all` by the "target user" doesn't). A future PR will add an API for creating such a token. When the target user and authenticated entity are different the `Processed request` log line will be logged with a: `{@admin:server as @bob:server} ...`. I'm not convinced by that format (especially since it adds spaces in there, making it harder to use `cut -d ' '` to chop off the start of log lines). Suggestions welcome.
-
- Oct 09, 2020
-
-
Patrick Cloke authored
All handlers now available via get_*_handler() methods on the HomeServer.
-
- Sep 04, 2020
-
-
Patrick Cloke authored
-
- Aug 27, 2020
-
-
Patrick Cloke authored
-
- Aug 24, 2020
-
-
Will Hunt authored
Add new method ratelimiter.can_requester_do_action and ensure that appservices are exempt from being ratelimited. Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com> Co-authored-by:
Erik Johnston <erik@matrix.org>
-
- Aug 21, 2020
-
-
Will Hunt authored
Add new method ratelimiter.can_requester_do_action and ensure that appservices are exempt from being ratelimited. Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com> Co-authored-by:
Erik Johnston <erik@matrix.org>
-
- Aug 06, 2020
-
-
Patrick Cloke authored
-
- Jun 05, 2020
-
-
Andrew Morgan authored
While working on https://github.com/matrix-org/synapse/issues/5665 I found myself digging into the `Ratelimiter` class and seeing that it was both: * Rather undocumented, and * causing a *lot* of config checks This PR attempts to refactor and comment the `Ratelimiter` class, as well as encourage config file accesses to only be done at instantiation. Best to be reviewed commit-by-commit.
-
- May 06, 2020
-
-
Andrew Morgan authored
-
- Apr 15, 2020
-
-
Patrick Cloke authored
-
- Feb 07, 2020
-
-
Richard van der Hoff authored
... and use it in places where it's trivial to do so. This will make it easier to pass room versions into the FrozenEvent constructors.
-
- Nov 05, 2019
-
-
Brendan Abolivier authored
-
- Nov 01, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
- Oct 30, 2019
-
-
Brendan Abolivier authored
-
Brendan Abolivier authored
-
- Sep 11, 2019
-
-
Jason Robinson authored
This allows support users to be created even on MAU limits via the admin API. Support users are excluded from MAU after creation, so it makes sense to exclude them in creation - except if the whole host is in disabled state. Signed-off-by:
Jason Robinson <jasonr@matrix.org>
-
- Jul 12, 2019
-
-
Richard van der Hoff authored
Record how long an access token is valid for, and raise a soft-logout once it expires.
-
- Jul 11, 2019
-
-
Richard van der Hoff authored
First of all, let's get rid of `TOKEN_NOT_FOUND_HTTP_STATUS`. It was a hack we did at one point when it was possible to return either a 403 or a 401 if the creds were missing. We always return a 401 in these cases now (thankfully), so it's not needed. Let's also stop abusing `AuthError` for these cases. Honestly they have nothing that relates them to the other places that `AuthError` is used, other than the fact that they are loosely under the 'Auth' banner. It makes no sense for them to share exception classes. Instead, let's add a couple of new exception classes: `InvalidClientTokenError` and `MissingClientTokenError`, for the `M_UNKNOWN_TOKEN` and `M_MISSING_TOKEN` cases respectively - and an `InvalidClientCredentialsError` base class for the two of them.
-
- Jul 10, 2019
-
-
Richard van der Hoff authored
this is only used in one place, so it's clearer if we inline it and reduce the API surface. Also, fixes a buglet where we would create an access token even if we were about to block the user (we would never return the AT, so the user could never use it, but it was still created and added to the db.)
-
Richard van der Hoff authored
The 'token' param is no longer used anywhere except the tests, so let's kill that off too.
-
- Jun 20, 2019
-
-
Amber Brown authored
-
- May 10, 2019
-
-
Amber Brown authored
-
- Mar 19, 2019
-
-
Richard van der Hoff authored
Fixes a bug where hs_disabled_message was not enforced for 3pid-based requests if there was no server_notices_mxid configured.
-
- Mar 05, 2019
-
-
Brendan Abolivier authored
* Rate-limiting for registration * Add unit test for registration rate limiting * Add config parameters for rate limiting on auth endpoints * Doc * Fix doc of rate limiting function Co-Authored-By:
babolivier <contact@brendanabolivier.com> * Incorporate review * Fix config parsing * Fix linting errors * Set default config for auth rate limiting * Fix tests * Add changelog * Advance reactor instead of mocked clock * Move parameters to registration specific config and give them more sensible default values * Remove unused config options * Don't mock the rate limiter un MAU tests * Rename _register_with_store into register_with_store * Make CI happy * Remove unused import * Update sample config * Fix ratelimiting test for py2 * Add non-guest test
-