summary refs log tree commit diff
path: root/scripts-dev/mypy_synapse_plugin.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2021-04-16Fix old-style uses of self.make_request in dinum test codeAndrew Morgan8-73/+43
2021-04-16lintAndrew Morgan3-24/+8
2021-03-23Port "Allow providing credentials to HTTPS_PROXY (#9657)" from mainline (#95)Andrew Morgan4-34/+183
* Allow providing credentials to HTTPS_PROXY (#9657) Addresses https://github.com/matrix-org/synapse-dinsic/issues/70 This PR causes `ProxyAgent` to attempt to extract credentials from an `HTTPS_PROXY` env var. If credentials are found, a `Proxy-Authorization` header ([details](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Proxy-Authorization)) is sent to the proxy server to authenticate against it. The headers are *not* passed to the remote server. Also added some type hints. * lint
2021-03-23Stabilise all knock-related unstable identifiers that would be in state (#96)Andrew Morgan2-5/+10
2021-03-22Port "Add support for no_proxy and case insensitive env variables" from ↵Andrew Morgan48-154/+398
mainline to dinsic (#93) This PR is simply porting https://github.com/matrix-org/synapse/pull/9372 to dinsic. I also had to bring in https://github.com/matrix-org/synapse/pull/8821 and https://github.com/matrix-org/synapse/pull/9084 for this code to work properly - a sign that we should merge mainline into dinsic again soon.
2021-03-19Remove extraneous print (#94)Andrew Morgan1-1/+0
2021-03-19Fix the pipeline to use knock v7 Complement branch (#92)Andrew Morgan1-3/+3
2021-03-19Cap mypy tests at twisted==20.3.0 (#90)Andrew Morgan1-0/+3
2021-03-18Change knock room version to v7 (#88)Andrew Morgan5-18/+18
2021-03-02Allow knock->knock transitions (#86)Andrew Morgan1-2/+0
Small change to the event auth rules that allows transitioning from knock->knock (in case you want to update your knock reason, or change profile information etc). Coincides with the same commit in [the mainline PR](https://github.com/matrix-org/synapse/pull/6739) and [this update on MSC2403](https://github.com/matrix-org/matrix-doc/pull/2403/commits/49a72862a93d814219968cff814ff63926181645).
2021-03-01change check_threepid_can_be_invited to async (#85)Mathieu Velten1-5/+2
2021-02-19Add a config option to prioritise local users in user directory search ↵Andrew Morgan4-9/+158
results (#84) * Add a config option to prioritise local users in user directory search results (#9383) This PR adds a homeserver config option, `user_directory.prefer_local_users`, that when enabled will show local users higher in user directory search results than remote users. This option is off by default. Note that turning this on doesn't necessarily mean that remote users will always be put below local users, but they should be assuming all other ranking factors (search query match, profile information present etc) are identical. This is useful for, say, University networks that are openly federating, but want to prioritise local students and staff in the user directory over other random users. * Don't mix simple and english psql query types
2021-02-17Send a ver query parameter for make_knock (#83)Andrew Morgan4-7/+33
This informs the remote server of the room versions we support. If the room we're trying to knock on has a version that is not one of our supported room versions, the remote server will return an unsupported room version error. Noticed in https://github.com/matrix-org/matrix-doc/pull/2403#discussion_r577042144 Ported from https://github.com/matrix-org/synapse/pull/6739
2021-02-10Show knock rooms in the public room directory and inform clients they can be ↵Andrew Morgan2-6/+10
knocked on (#82) This PR implements the ["Changes regarding the Public Rooms Directory"](https://github.com/Sorunome/matrix-doc/blob/soru/knock/proposals/2403-knock.md#changes-regarding-the-public-rooms-directory) section of knocking MSC2403. Specifically, it: * Allows rooms with `join_rule` "knock" to be returned by the query behind the public rooms directory * Adds the field `join_rule` to each room entry returned by a public rooms directory query, so clients can know whether to attempt a join or knock on a room This PR is a clone of [the mainline PR](https://github.com/matrix-org/synapse/pull/9359). Complement tests for this change: https://github.com/matrix-org/complement/pull/72.
2021-02-09Add knocking support (#81)Andrew Morgan34-117/+1567
Implement knocking as defined by https://github.com/matrix-org/matrix-doc/pull/2403 This is the base knocking stuff, taken from https://github.com/matrix-org/synapse/pull/6739 and does not include any public room directory changes. While knocking hasn't merged yet on mainline due to waiting on getting Complement into Synapse's CI, the code has been well-tested.
2021-02-09Add complement running monolith synapse to buildkite pipeline (#80)Andrew Morgan1-0/+36
2021-02-09Fix Python Old-Deps CI step (#79)Andrew Morgan4-5/+12
* Fix the Python 3.5 old-deps build. (#9146) setuptools 51.0.0 dropped support for Python 3.5. * Fix Python 3.5 old deps build by using a compatible pip version. (#9217) Co-authored-by: Dan Callahan <danc@element.io> pip 21.0 stopped supporting Python 3.5. Co-authored-by: Patrick Cloke <clokep@users.noreply.github.com>
2021-01-29Remove riot email registration backwards compatibility hackAndrew Morgan1-10/+0
This was causing a LoginError to be propagated up to the registration servlet, which was expecting a InteractiveAuthIncompleteError in order to store a password_hash from the client for the session. DINUM relies on this happening. More info here: https://github.com/matrix-org/synapse/issues/9263
2021-01-21Add a parameter to enable/disable freeze feature (#78)Mathieu Velten2-1/+10
2021-01-19Ensure we read account validity templates from custom template dir if ↵Andrew Morgan2-1/+55
provided (#77)
2021-01-18Change check_3pid_allowed to async (#76)Mathieu Velten1-13/+10
2021-01-13Move `complete_sso_ui_auth` into SSOHandlerRichard van der Hoff2-28/+13
since we're hacking on this code anyway, may as well move it out of the cluttered AuthHandler.
2021-01-13Give the user a better error when they present bad SSO credsRichard van der Hoff5-5/+65
If a user tries to do UI Auth via SSO, but uses the wrong account on the SSO IdP, try to give them a better error. Previously, the UIA would claim to be successful, but then the operation in question would simply fail with "auth fail". Instead, serve up an error page which explains the failure.
2021-01-13Add a test for UI-Auth-via-SSO (#9082)Richard van der Hoff4-42/+227
* Add complete test for UI-Auth-via-SSO. * review comments
2021-01-13Reduce scope of exception handler. (#9106)Patrick Cloke2-5/+6
Removes a bare `except Exception` clause and replaces it with catching a specific exception around the portion that might throw.
2021-01-13Add json