From 9b40b33263e590c7a7842dc548faf2c8633939a4 Mon Sep 17 00:00:00 2001 From: Quentin Gliech Date: Thu, 31 Aug 2023 12:08:14 +0200 Subject: Do not check for internal account lock for MSC3861 delegated auth --- synapse/api/auth/msc3861_delegated.py | 11 ----------- 1 file changed, 11 deletions(-) (limited to 'synapse/api/auth') diff --git a/synapse/api/auth/msc3861_delegated.py b/synapse/api/auth/msc3861_delegated.py index 14cba50c90..3cf00dd539 100644 --- a/synapse/api/auth/msc3861_delegated.py +++ b/synapse/api/auth/msc3861_delegated.py @@ -282,17 +282,6 @@ class MSC3861DelegatedAuth(BaseAuth): "Impersonation not possible by a non admin user", ) - # Deny the request if the user account is locked. - if not allow_locked and await self.store.get_user_locked_status( - requester.user.to_string() - ): - raise AuthError( - 401, - "User account has been locked", - errcode=Codes.USER_LOCKED, - additional_fields={"soft_logout": True}, - ) - if not allow_guest and requester.is_guest: raise OAuthInsufficientScopeError([SCOPE_MATRIX_API]) -- cgit 1.5.1