summary refs log tree commit diff
path: root/synapse/handlers/deactivate_account.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Run Black. (#5482)Amber Brown2019-06-201-5/+7
|
* Don't send renewal emails to deactivated usersBrendan Abolivier2019-06-141-0/+6
|
* Track deactivated accounts in the database (#5378)Brendan Abolivier2019-06-141-0/+4
|
* Correctly handle id_server paramErik Johnston2019-04-021-0/+1
|
* Allowing specifying IS to use in unbind API.Erik Johnston2019-04-011-1/+4
| | | | | | | | | | By default the homeserver will use the identity server used during the binding of the 3PID to unbind the 3PID. However, we need to allow clients to explicitly ask the homeserver to unbind via a particular identity server, for the case where the 3PID was bound out of band from the homeserver. Implements MSC915.
* Use flagsErik Johnston2019-03-201-0/+1
|
* Give some more things logcontexts (#4077)Richard van der Hoff2018-10-231-2/+2
|
* Don't fail requests to unbind 3pids for non supporting ID serversErik Johnston2018-08-081-2/+11
| | | | | | | | | | Older identity servers may not support the unbind 3pid request, so we shouldn't fail the requests if we received one of 400/404/501. The request still fails if we receive e.g. 500 responses, allowing clients to retry requests on transient identity server errors that otherwise do support the API. Fixes #3661
* run isortAmber Brown2018-07-091-3/+4
|
* add GDPR erase param to deactivate APIMatthew Hodgson2018-06-261-0/+1
|
* Merge pull request #3441 from matrix-org/erikj/redo_erasureErik Johnston2018-06-251-1/+6
|\ | | | | Fix user erasure and re-enable
| * Revert "Revert "Merge pull request #3431 from ↵Erik Johnston2018-06-251-1/+6
| | | | | | | | | | | | matrix-org/rav/erasure_visibility"" This reverts commit 1d009013b3c3e814177afc59f066e02a202b21cd.
* | Remove all global reactor imports & pass it around explicitly (#3424)Amber Brown2018-06-251-2/+2
|/
* Revert "Merge pull request #3431 from matrix-org/rav/erasure_visibility"Richard van der Hoff2018-06-221-6/+1
| | | | | This reverts commit ce0d911156b355c5bf452120bfb08653dad96497, reversing changes made to b4a5d767a94f1680d07edfd583aae54ce422573e.
* mark accounts as erased when requestedRichard van der Hoff2018-06-121-1/+6
|
* Fix commentDavid Baker2018-06-041-1/+1
|
* Merge remote-tracking branch 'origin/develop' into dbkr/unbindDavid Baker2018-05-241-0/+4
|\
| * Remove users from user directory on deactivateDavid Baker2018-05-241-0/+4
| |
* | pep8David Baker2018-05-241-3/+6
| |
* | Hit the 3pid unbind endpoint on deactivationDavid Baker2018-05-231-1/+21
|/
* comment typoDavid Baker2018-05-221-1/+1
|
* Catch failure to part user from roomDavid Baker2018-05-101-7/+13
|
* Many docstringsDavid Baker2018-05-101-0/+24
|
* Oops, don't call function passed to run_in_backgroundDavid Baker2018-05-101-1/+1
|
* Prefix internal functionsDavid Baker2018-05-091-7/+7
|
* Indent failDavid Baker2018-05-091-1/+1
|
* Part deactivated users in the backgroundDavid Baker2018-05-091-1/+34
| | | | | One room at a time so we don't take out the whole server with leave events, and restart at server restart.
* Part user from rooms on account deactivateDavid Baker2018-05-081-1/+15
| | | | | | | This implements this very crudely: this probably isn't viable because parting a user from all their rooms could take a long time, and if the HS gets restarted in that time the process will be aborted.
* Delete devices in various logout situationsRichard van der Hoff2017-11-291-0/+8
| | | | | | | | | | | | | Make sure that we delete devices whenever a user is logged out due to any of the following situations: * /logout * /logout_all * change password * deactivate account (by the user or by an admin) * invalidate access token from a dynamic module Fixes #2672.
* Move deactivate_account into its own handlerRichard van der Hoff2017-11-291-0/+44
Non-functional refactoring to move deactivate_account. This means that we'll be able to properly deactivate devices and access tokens without introducing a dependency loop.