summary refs log tree commit diff
path: root/synapse/module_api (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Record the SSO Auth Provider in the login token (#9510)Richard van der Hoff2021-03-041-4/+27
| | | This great big stack of commits is a a whole load of hoop-jumping to make it easier to store additional values in login tokens, and then to actually store the SSO Identity Provider in the login token. (Making use of that data will follow in a subsequent PR.)
* Fix additional type hints from Twisted upgrade. (#9518)Patrick Cloke2021-03-031-2/+2
|
* Update black, and run auto formatting over the codebase (#9381)Eric Eastwood2021-02-161-2/+7
| | | | | | | - Update black version to the latest - Run black auto formatting over the codebase - Run autoformatting according to [`docs/code_style.md `](https://github.com/matrix-org/synapse/blob/80d6dc9783aa80886a133756028984dbf8920168/docs/code_style.md) - Update `code_style.md` docs around installing black to use the correct version
* Improve styling and wording of SSO redirect confirm template (#9272)Richard van der Hoff2021-02-011-2/+8
|
* Add admin API for logging in as a user (#8617)Erik Johnston2020-11-171-1/+4
|
* Allow modules to create and send events into rooms (#8479)Andrew Morgan2020-10-091-1/+29
| | | | | This PR allows Synapse modules making use of the `ModuleApi` to create and send non-membership events into a room. This can useful to have modules send messages, or change power levels in a room etc. Note that they must send event through a user that's already in the room. The non-membership event limitation is currently arbitrary, as it's another chunk of work and not necessary at the moment.
* Combine `SpamCheckerApi` with the more generic `ModuleApi`. (#8464)Richard van der Hoff2020-10-071-1/+28
| | | | | Lots of different module apis is not easy to maintain. Rather than adding yet another ModuleApi(hs, hs.get_auth_handler()) incantation, first add an hs.get_module_api() method and use it where possible.
* Allow ThirdPartyEventRules modules to manipulate public room state (#8292)Andrew Morgan2020-10-051-0/+67
| | | | | This PR allows `ThirdPartyEventRules` modules to view, manipulate and block changes to the state of whether a room is published in the public rooms directory. While the idea of whether a room is in the public rooms list is not kept within an event in the room, `ThirdPartyEventRules` generally deal with controlling which modifications can happen to a room. Public rooms fits within that idea, even if its toggle state isn't controlled through a state event.
* Stop sub-classing object (#8249)Patrick Cloke2020-09-041-1/+1
|
* Do not assume calls to runInteraction return Deferreds. (#8133)Patrick Cloke2020-08-201-3/+7
|
* Convert synapse.api to async/await (#8031)Patrick Cloke2020-08-061-2/+6
|
* Rename database classes to make some sense (#8033)Erik Johnston2020-08-051-1/+1
|
* Wrap register_device coroutine in an ensureDeferred (#7684)Andrew Morgan2020-06-161-5/+7
| | | | | | | Fixes https://github.com/matrix-org/synapse/issues/7683 Broke in: #7649 We had a `yield` acting on a coroutine. To be fair this one is a bit difficult to notice as there's a function in the middle that just passes the coroutine along.
* Convert the registration handler to async/await. (#7649)Patrick Cloke2020-06-081-2/+6
|
* Convert auth handler to async/await (#7261)Patrick Cloke2020-04-151-2/+4
|
* Do not allow a deactivated user to login via SSO. (#7240)Patrick Cloke2020-04-091-1/+21
|
* Factor out complete_sso_login and expose it to the Module APIBrendan Abolivier2020-03-031-0/+19
|
* Cleanups and additions to the module APIRichard van der Hoff2020-01-122-6/+59
| | | | | | | | | | | Add some useful things, such as error types and logcontext handling, to the API. Make `hs` a private member to dissuade people from using it (hopefully they aren't already). Add a couple of new methods (`record_user_external_id` and `generate_short_term_login_token`).
* Move DB pool and helper functions into dedicated Database classErik Johnston2019-12-051-1/+1
|
* Remove unnecessary parentheses around return statements (#5931)Andrew Morgan2019-08-301-1/+1
| | | | | Python will return a tuple whether there are parentheses around the returned values or not. I'm just sick of my editor complaining about this all over the place :)
* Replace returnValue with return (#5736)Amber Brown2019-07-231-1/+1
|
* Remove access-token support from RegistrationHandler.register (#5641)Richard van der Hoff2019-07-081-8/+2
| | | | | | | | Nothing uses this now, so we can remove the dead code, and clean up the API. Since we're changing the shape of the return value anyway, we take the opportunity to give the method a better name.
* Update ModuleApi to avoid register(generate_token=True) (#5640)Richard van der Hoff2019-07-081-8/+56
| | | | | | | | * Update ModuleApi to avoid register(generate_token=True) This is the only place this is still used, so I'm trying to kill it off. * changelog
* Run Black. (#5482)Amber Brown2019-06-201-3/+3
|
* Allow password providers to bind emails (#4947)Andrew Morgan2019-03-281-4/+5
| | | This PR allows password provider modules to bind email addresses when a user is registering and is motivated by matrix-org/matrix-synapse-ldap3#58
* Support 3PID login in password providers (#4931)Andrew Morgan2019-03-261-3/+15
| | | | | Adds a new method, check_3pid_auth, which gives password providers the chance to allow authentication with third-party identifiers such as email or msisdn.
* Fix registration on workers (#4682)Erik Johnston2019-02-201-1/+1
| | | | | | | | | | * Move RegistrationHandler init to HomeServer * Move post registration actions to RegistrationHandler * Add post regisration replication endpoint * Newsfile
* Delete devices in various logout situationsRichard van der Hoff2017-11-291-2/+12
| | | | | | | | | | | | | Make sure that we delete devices whenever a user is logged out due to any of the following situations: * /logout * /logout_all * change password * deactivate account (by the user or by an admin) * invalidate access token from a dynamic module Fixes #2672.
* Add more hooks to ModuleApiRichard van der Hoff2017-11-021-0/+34
| | | | add `get_user_by_req` and `invalidate_access_token`
* Factor _AccountHandler proxy out to ModuleApiRichard van der Hoff2017-11-021-0/+79
We're going to need to use this from places that aren't password auth, so let's move it to a proper class.