summary refs log tree commit diff
path: root/scripts-dev/check_auth.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-09-25Threepid validity checks on msisdns should not be dependent on ↵Neil Johnson2-29/+35
'threepid_behaviour_email'. (#6104) Fixes #6103
2019-09-25Stop advertising unsupported flows for registration (#6107)Richard van der Hoff5-16/+83
If email or msisdn verification aren't supported, let's stop advertising them for registration. Fixes #6100.
2019-09-25Refactor the user-interactive auth handling (#6105)Richard van der Hoff5-141/+265
Pull the checkers out to their own classes, rather than having them lost in a massive 1000-line class which does everything. This is also preparation for some more intelligent advertising of flows, as per #6100
2019-09-25Refactor code for calculating registration flows (#6106)Richard van der Hoff4-83/+145
because, frankly, it looked like it was written by an axe-murderer. This should be a non-functional change, except that where `m.login.dummy` was previously advertised *before* `m.login.terms`, it will now be advertised afterwards. AFAICT that should have no effect, and will be more consistent with the flows that involve passing a 3pid.
2019-09-24remove unused parameter to get_user_id_by_threepid (#6099)Richard van der Hoff2-1/+2
Added in #5377, apparently in error
2019-09-24Incorporate reviewBrendan Abolivier1-3/+3
2019-09-24Add sid to next_link for email validation (#6097)J. Ryan Stinnett2-0/+11
2019-09-24Fix loggingBrendan Abolivier1-1/+1
2019-09-24docstrings and commentsRichard van der Hoff1-7/+21
2019-09-23Add submit_url response parameter to msisdn /requestToken (#6079)Andrew Morgan4-1/+16
Second part of solving #6076 Fixes #6076 We return a submit_url parameter on calls to POST */msisdn/requestToken so that clients know where to submit token information to.
2019-09-23Add an unstable feature flag for separate add/bind 3pid APIs (#6044)Andrew Morgan2-0/+3
Add a m.separate_add_and_bind flag set to True. See MSC2290's Backward Compatibility section for details.
2019-09-23Use the federation blacklist for requests to untrusted Identity Servers (#6000)Andrew Morgan5-4/+28
Uses a SimpleHttpClient instance equipped with the federation_ip_range_blacklist list for requests to identity servers provided by user input. Does not use a blacklist when contacting identity servers specified by account_threepid_delegates. The homeserver trusts the latter and we don't want to prevent homeserver admins from specifying delegates that are on internal IP addresses. Fixes #5935
2019-09-23Add m.id_access_token to /versions unstable_features (MSC2264) (#5974)Andrew Morgan2-0/+4
Adds a flag to /versions' unstable_features section indicating that this Synapse understands what an id_access_token is, as per MSC2264. Fixes #5927
2019-09-23Add m.require_identity_server to /versions unstable_flags (#5972)Andrew Morgan2-1/+14
As MSC2263 states, m.require_identity_server must be set to false when it does not require an identity server to be provided by the client for the purposes of email registration or password reset. Adds an m.require_identity_server flag to /versionss unstable_flags section. This will advertise that Synapse no longer needs id_server as a parameter.
2019-09-23Add POST submit_token endpoint for MSISDN (#6078)Andrew Morgan3-2