summary refs log tree commit diff
path: root/synapse/handlers/federation.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2021-01-13Link to GH profile and fix tenseErik Johnston1-1/+1
2021-01-13Fix link in changelogErik Johnston1-1/+1
2021-01-13Fixup changelogErik Johnston1-9/+6
2021-01-13 1.25.0Erik Johnston4-4/+16
2021-01-12Announce Python / PostgreSQL deprecation policies (#9085)Dan Callahan2-0/+50
Fixes #8782
2021-01-12Don't apply the IP range blacklist to proxy connections (#9084)Marcus4-3/+145
It is expected that the proxy would be on a private IP address so the configured proxy should be connected to regardless of the IP range blacklist.
2021-01-12Fix failures in Debian packaging (#9079)Dan Callahan3-4/+21
Debian package builds were failing for two reasons: 1. Python versions prior to 3.7 throw exceptions when attempting to print Unicode characters under a "C" locale. (#9076) 2. We depended on `dh-systemd` which no longer exists in Debian Bullseye, but is necessary in Ubuntu Xenial. (#9073) Setting `LANG="C.UTF-8"` in the build environment fixes the first issue. See also: https://bugs.python.org/issue19846 The second issue is a bit trickier. The dh-systemd package was merged into debhelper version 9.20160709 and a transitional package left in its wake. The transitional dh-systemd package was removed in Debian Bullseye. However, Ubuntu Xenial ships an older debhelper, and still needs dh-systemd. Thus, builds were failing on Bullseye since we depended on a package which had ceased existing, but we couldn't remove it from the debian/control file and our build scripts because we still needed it for Ubuntu Xenial. We can fix the debian/control issue by listing dh-systemd as an alternative to the newer versions of debhelper. Since dh-systemd declares that it depends on debhelper, Ubuntu Xenial will select its older dh-systemd which will in turn pull in its older debhelper, resulting in no change from the status quo. All other supported releases will satisfy the debhelper dependency constraint and skip the dh-systemd alternative. Build scripts were fixed by unconditionally attempting to install dh-systemd on all releases and suppressing failures. Once we drop support for Ubuntu Xenial, we can revert most of this commit and rely on the version constraint on debhelper in debian/control. Fixes #9076 Fixes #9073 Signed-off-by: Dan Callahan <danc@element.io>
2021-01-06More updates to changes for consistency. v1.25.0rc1Patrick Cloke1-1/+1
2021-01-06A few more tweaks to changes.Patrick Cloke1-2/+2
2021-01-06Some manual tweaks to the changes file.Patrick Cloke1-23/+18
2021-01-061.25.0rc1Patrick Cloke80-79/+92
2021-01-05Fix-up assertions about last stream token in push (#9020)Patrick Cloke5-14/+8
The last stream token is always known and we do not need to handle none.
2021-01-04Add type hints to the receipts and user directory handlers. (#8976)Patrick Cloke4-32/+64
2021-01-04Add type hints to the crypto module. (#8999)Patrick Cloke9-113/+158
2021-01-04Add link to Synapse dev room to the relevant README section (#9002)Eric Eastwood2-0/+3
2021-01-03Use the SSO handler helpers for CAS registration/login. (#8856)Patrick Cloke4-39/+199
2020-12-30Fix RoomDirectoryFederationTests and make them actually run (#8998)Andrew Morgan3-21/+19
The `RoomDirectoryFederationTests` tests were not being run unless explicitly called as an `__init__.py` file was not present in `tests/federation/transport/`. Thus the folder was not a python module, and `trial` did not look inside for any test cases to run. This was found while working on #6739. This PR adds a `__init__.py` and also fixes the test in a couple ways: - Switch to subclassing `unittest.FederatingHomeserverTestCase` instead, which sets up federation endpoints for us. - Supply a `federation_auth_origin` to `make_request` in order to more act like the request is coming from another server, instead of just an unauthenicated client requesting a federation endpoint. I found that the second point makes no difference to the test passing, but felt like the right thing to do if we're testing over federation.
2020-12-30Check if group IDs are valid before using them. (#8977)Patrick Cloke3-4/+47
2020-12-30Add additional type hints to the storage module. (#8980)Patrick Cloke12-148/+224
2020-12-30Doc/move database setup instructions in install md (#8987)Shashank Sabniveesu2-121/+141
2020-12-29Add type hints to admin and room list handlers. (#8973)Patrick Cloke5-70/+100
2020-12-29Validate input parameters for the sendToDevice API. (#8975)Patrick Cloke2-1/+3
This makes the "messages" key in the content required. This is currently optional in the spec, but that seems to be an error.
2020-12-29Update the value of group_creation_prefix in sample config. (#8992)Jerin J Titus3-2/+3
Removes the trailing slash with causes issues with matrix.to/Element.
2020-12-29Allow redacting events on workers (#8994)Patrick Cloke4-34/+16
Adds the redacts endpoint to workers that have the client listener.
2020-12-29Drop the unused local_invites table. (#8979)Patrick Cloke3-1/+19
This table has been unused since Synapse v1.17.0.
2020-12-22Support PyJWT v2.0.0. (#8986)Patrick Cloke2-4/+13
Tests were broken due to an API changing. The code used in Synapse proper should be compatible with both versions already.
2020-12-18Refactor the CAS handler in prep for using the abstracted SSO code. (#8958)Patrick Cloke4-69/+162
This makes the CAS handler look more like the SAML/OIDC handlers: * Render errors to users instead of throwing JSON errors. * Internal reorganization.
2020-12-18Send the location of the web client to the IS when inviting via 3PIDs. (#8930)Patrick Cloke4-0/+34
Adds a new setting `email.invite_client_location` which, if defined, is passed to the identity server during invites.
2020-12-18Allow server admin to get admin bit in rooms where local user is an admin ↵Erik Johnston5-3/+294
(#8756) This adds an admin API that allows a server admin to get power in a room if a local user has power in a room. Will also invite the user if they're not in the room and its a private room. Can specify another user (rather than the admin user) to be granted power. Co-authored-by: Matthew Hodgson <matthew@matrix.org>
2020-12-18Fix mainline ordering in state res v2 (#8971)Erik Johnston3-2/+58
This had two effects 1) it'd give the wrong answer and b) would iterate *all* power levels in the auth chain of each event. The latter of which can be *very* expensive for certain types of IRC bridge rooms that have large numbers of power level changes.
2020-12-18Implement a username picker for synapse (#8942)Richard van der Hoff14-59/+683
The final part (for now) of my work to implement a username picker in synapse itself. The idea is that we allow `UsernameMappingProvider`s to return `localpart=None`, in which case, rather than redirecting the browser back to the client, we redirect to a username-picker resource, which allows the user to enter a username. We *then* complete the SSO flow (including doing the client permission checks). The static resources for the username picker itself (in https://github.com/matrix-org/synapse/tree/rav/username_picker/synapse/res/username_picker) are essentially lifted wholesale from https://github.com/matrix-org/matrix-synapse-saml-mozilla/tree/master/matrix_synapse_saml_mozilla/res. As the comment says, we might want to think about making them customisable, but that can be a follow-up. Fixes #8876.
2020-12-18Allow re-using a UI auth validation for a period of time (#8970)Patrick Cloke10-49/+193
2020-12-18Ensure that a URL exists in the content during push. (#8965)Patrick Cloke3-2/+7
This fixes an KeyError exception, after this PR the content is just considered unknown.
2020-12-18