- Apr 14, 2021
-
-
Jonathan de Jong authored
Part of #9744 Removes all redundant `# -*- coding: utf-8 -*-` lines from files, as python 3 automatically reads source code as utf-8 now. `Signed-off-by:
Jonathan de Jong <jonathan@automatia.nl>`>
-
- Apr 06, 2021
-
-
Patrick Cloke authored
-
- Feb 17, 2021
-
-
Dirk Klimpel authored
-
- Feb 16, 2021
-
-
Eric Eastwood authored
- Update black version to the latest - Run black auto formatting over the codebase - Run autoformatting according to [`docs/code_style.md `](https://github.com/matrix-org/synapse/blob/80d6dc9783aa80886a133756028984dbf8920168/docs/code_style.md) - Update `code_style.md` docs around installing black to use the correct version
-
- Oct 29, 2020
-
-
Erik Johnston authored
We do it this way round so that only the "owner" can delete the access token (i.e. `/logout/all` by the "owner" also deletes that token, but `/logout/all` by the "target user" doesn't). A future PR will add an API for creating such a token. When the target user and authenticated entity are different the `Processed request` log line will be logged with a: `{@admin:server as @bob:server} ...`. I'm not convinced by that format (especially since it adds spaces in there, making it harder to use `cut -d ' '` to chop off the start of log lines). Suggestions welcome.
-
- Aug 27, 2020
-
-
Patrick Cloke authored
-
- Aug 26, 2020
-
-
Patrick Cloke authored
-
- Aug 24, 2020
-
-
Brendan Abolivier authored
Don't fail /submit_token requests on incorrect session ID if request_token_inhibit_3pid_errors is turned on (#7991) * Don't raise session_id errors on submit_token if request_token_inhibit_3pid_errors is set * Changelog * Also wait some time before responding to /requestToken * Incorporate review * Update synapse/storage/databases/main/registration.py Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> * Incorporate review Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
-
- Aug 11, 2020
-
-
Patrick Cloke authored
-
- Jan 09, 2020
-
-
Manuel Stahl authored
Signed-off-by:
Manuel Stahl <manuel.stahl@awesome-technologies.de>
-
- Dec 18, 2019
-
-
Erik Johnston authored
This encapsulates config for a given database and is the way to get new connections.
-
- Aug 23, 2019
-
-
Half-Shot authored
-
- Jul 12, 2019
-
-
Richard van der Hoff authored
Record how long an access token is valid for, and raise a soft-logout once it expires.
-
- Jul 10, 2019
-
-
Richard van der Hoff authored
The 'token' param is no longer used anywhere except the tests, so let's kill that off too.
-
- Jun 20, 2019
-
-
Amber Brown authored
-
- May 10, 2019
-
-
Amber Brown authored
-
- Dec 14, 2018
-
-
Neil Johnson authored
Allow for the creation of a support user. A support user can access the server, join rooms, interact with other users, but does not appear in the user directory nor does it contribute to monthly active user limits.
-
- Aug 23, 2018
-
-
Erik Johnston authored
-
- Aug 13, 2018
-
-
Amber Brown authored
-
- Aug 10, 2018
-
-
black authored
-
- Jul 09, 2018
-
-
Amber Brown authored
-
- May 29, 2018
-
-
Richard van der Hoff authored
-
- May 22, 2018
-
-
Richard van der Hoff authored
When a user first syncs, we will send them a server notice asking them to consent to the privacy policy if they have not already done so.
-
- Nov 01, 2017
-
-
Richard van der Hoff authored
-
- Nov 30, 2016
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
We might as well treat all refresh_tokens as invalid. Just return a 403 from /tokenrefresh, so that we don't have a load of dead, untestable code hanging around. Still TODO: removing the table from the schema.
-
- Jul 26, 2016
-
-
Richard van der Hoff authored
-
- Jul 18, 2016
-
-
Richard van der Hoff authored
Add a 'devices' table to the storage, as well as a 'device_id' column to refresh_tokens. Allow the client to pass a device_id, and initial_device_display_name, to /login. If login is successful, then register the device in the devices table if it wasn't known already. If no device_id was supplied, make one up. Associate the device_id with the access token and refresh token, so that we can get at it again later. Ensure that the device_id is copied from the refresh token to the access_token when the token is refreshed.
-
- Feb 19, 2016
-
-
Mark Haines authored
-
- Jan 27, 2016
-
-
Erik Johnston authored
-
- Jan 07, 2016
-
-
Matthew Hodgson authored
-
- Jan 06, 2016
-
-
David Baker authored
-
- Aug 25, 2015
-
-
Daniel Wagner-Hall authored
-
Daniel Wagner-Hall authored
Removes device_id and ClientInfo device_id is never actually written, and the matrix.org DB has no non-null entries for it. Right now, it's just cluttering up code. This doesn't remove the columns from the database, because that's fiddly.
-
- Aug 20, 2015
-
-
Daniel Wagner-Hall authored
This allows refresh tokens to be exchanged for (access_token, refresh_token). It also starts issuing them on login, though no clients currently interpret them.
-
Daniel Wagner-Hall authored
We're about to have two kinds of token, access and refresh
-
- Jun 03, 2015
-
-
Erik Johnston authored
Before, caches were global and so different instances of the stores would share caches. This caused problems in the unit tests.
-
- Apr 01, 2015
-
-
Erik Johnston authored
-
- Mar 24, 2015
-
-
David Baker authored
-
David Baker authored
Don't test exact equality of the list: as long as it has the fields we expect, that's just fine. I added the user_id (as in database pkey) and it broke: no point testing what that comes out as: it's determined by the db.
-