summary refs log tree commit diff
path: root/synapse/config/emailconfig.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove debug logging and make diff nicerAndrew Morgan2019-06-061-1/+1
|
* lintAndrew Morgan2019-06-061-1/+1
|
* update endpointAndrew Morgan2019-06-061-2/+7
|
* Merge branch 'anoa/hs_password_reset_sending_email' into anoa/hs_password_resetAndrew Morgan2019-06-061-35/+29
|\
| * Remove CI testAndrew Morgan2019-06-061-2/+2
| |
| * test for ciAndrew Morgan2019-06-061-3/+3
| |
| * Address review commentsAndrew Morgan2019-06-061-35/+29
| |
* | Merge branch 'anoa/hs_password_reset_sending_email' into anoa/hs_password_resetAndrew Morgan2019-06-061-42/+72
|\|
| * infer ability to reset password from email configAndrew Morgan2019-06-051-1/+9
| |
| * Update templates and make password reset option workAndrew Morgan2019-06-051-2/+3
| |
| * Move templates. New option to disable password resetsAndrew Morgan2019-06-051-2/+2
| |
| * Revert "Modify check for smtp settings to be kinder to CI"Andrew Morgan2019-06-051-7/+14
| | | | | | | | This reverts commit 6d2d3c9fd3fb5cf2f954cc9ec0929832a3112124.
| * Change template_dir to originate from synapse root dirAndrew Morgan2019-06-051-1/+1
| |
| * silly linting rulesAndrew Morgan2019-06-051-1/+2
| |
| * Modify check for smtp settings to be kinder to CIAndrew Morgan2019-06-051-14/+6
| |
| * Fix validation token lifetime email_ prefixAndrew Morgan2019-06-041-1/+1
| |
| * Merge branch 'develop' into anoa/hs_password_reset_sending_emailAndrew Morgan2019-06-041-40/+65
| |\
| | * Only parse from email if providedBrendan Abolivier2019-06-041-4/+5
| | |
| | * LintBrendan Abolivier2019-06-041-1/+0
| | |
| | * Make account validity renewal emails work when email notifs are disabledBrendan Abolivier2019-06-041-42/+57
| | |
| * | Ability to send password reset emailsAndrew Morgan2019-06-041-52/+140
| |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This changes the default behaviour of Synapse to send password reset emails itself rather than through an identity server. The reasoning behind the change is to prevent a malicious identity server from being able to initiate a password reset attempt and then answering it, successfully resetting their password, all without the user's knowledge. This also aides in decentralisation by putting less trust on the identity server itself, which traditionally is quite centralised. If users wish to continue with the old behaviour of proxying password reset requests through the user's configured identity server, they can do so by setting email.enable_password_reset_from_is to True in Synapse's config. Users should be able that with that option disabled (the default), password resets will now no longer work unless email sending has been enabled and set up correctly.
* / Reimplementation of /submitToken on the homeserver side. Only used by ↵Andrew Morgan2019-06-061-52/+161
|/ | | | | | | | | | | | | | password resets This PR creates an endpoint GET/POST /_matrix/identity/api/v1/validate/email/submitToken which mirrors the same endpoint on the identity server used for submitting tokens used for validating 3PID addresses. When the token is submitted, it is checked along with the client_secret and session_id in the db and if it matches and isn't expired, we mark the session as validated. Then, when the user attempts to change their password, we check if the session is valid, and if so allow it. We also delete the session at this point, as as far as I can tell there's no further use for it.
* Don't crash on lack of expiry templatesBrendan Abolivier2019-04-181-2/+6
|
* Send out emails with links to extend an account's validity periodBrendan Abolivier2019-04-171-1/+6
|
* Calculate absolute path for email templatesRichard van der Hoff2018-10-191-22/+18
|
* Put the warning blob at the top of the fileRichard van der Hoff2018-10-171-6/+9
|
* Ship the email templates as package_dataRichard van der Hoff2018-10-171-3/+30
| | | | | | | | | | move the example email templates into the synapse package so that they can be used as package data, which should mean that all of the packaging mechanisms (pip, docker, debian, arch, etc) should now come with the example templates. In order to grandfather in people who relied on the templates being in the old place, check for that situation and fall back to using the defaults if the templates directory does not exist.
* Support authenticated SMTPDaniel Dent2017-04-051-0/+16
| | | | | | Closes (SYN-714) #1385 Signed-off-by: Daniel Dent <matrixcontrib@contactdaniel.net>
* Allow configuring the Riot URL used in notification emailsAdrian Perez de Castro2017-01-131-0/+7
| | | | | | | | | | The URLs used for notification emails were hardcoded to use either matrix.to or vector.im; but for self-hosted setups where Riot is also self-hosted it may be desirable to allow configuring an alternative Riot URL. Fixes #1809. Signed-off-by: Adrian Perez de Castro <aperez@igalia.com>
* brand the email from headerMatthew Hodgson2016-06-021-1/+1
|
* More consistent config namingDavid Baker2016-05-101-1/+1
|
* Add config option to not send email notifs for new usersDavid Baker2016-05-101-0/+4
|
* fix layout; handle app naming in synapse, not jinjaMatthew Hodgson2016-05-051-0/+5
|
* fix assorted typos in default configMatthew Hodgson2016-05-041-3/+3
|
* Try imports in configDavid Baker2016-04-291-0/+7
|
* Default enable email notifs to FalseDavid Baker2016-04-291-1/+1
|
* Nicer get() shorthandDavid Baker2016-04-291-3/+2
|
* Remove redundant docstringDavid Baker2016-04-291-4/+0
|
* Correct default template and add text templateDavid Baker2016-04-291-1/+2
|
* Send mail notifs with a plaintext part tooDavid Baker2016-04-291-0/+2
|
* pep8David Baker2016-04-281-1/+1
|
* Hopefully all remaining bits for email notifsDavid Baker2016-04-271-1/+8
| | | | Add public facing base url to the server so synapse knows what URL to use when converting mxc to http urls for use in emails
* Generate mails from a templateDavid Baker2016-04-201-10/+25
|
* Send a rather basic email notifDavid Baker2016-04-201-0/+62
Also pep8 fixes