summary refs log tree commit diff
path: root/synapse/rest/client/v2_alpha/auth.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Flatten the synapse.rest.client package (#10600)reivilibre2021-08-171-143/+0
|
* Remove redundant "coding: utf-8" lines (#9786)Jonathan de Jong2021-04-141-1/+0
| | | | | | | Part of #9744 Removes all redundant `# -*- coding: utf-8 -*-` lines from files, as python 3 automatically reads source code as utf-8 now. `Signed-off-by: Jonathan de Jong <jonathan@automatia.nl>`
* UI Auth via SSO: redirect the user to an appropriate SSO. (#9081)Richard van der Hoff2021-01-121-32/+1
| | | | | | | If we have integrations with multiple identity providers, when the user does a UI Auth, we need to redirect them to the right one. There are a few steps to this. First of all we actually need to store the userid of the user we are trying to validate in the UIA session, since the /auth/sso/fallback/web request is unauthenticated. Then, once we get the /auth/sso/fallback/web request, we can fish the user id out of the session, and use it to look up the external id mappings, and hence pick an SSO provider for them.
* Kill off `HomeServer.get_ip_from_request()` (#9080)Richard van der Hoff2021-01-121-2/+2
| | | Homeserver.get_ip_from_request() used to be a bit more complicated, but now it is totally redundant. Let's get rid of it.
* Combine the SSO Redirect Servlets (#9015)Richard van der Hoff2021-01-041-20/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | * Implement CasHandler.handle_redirect_request ... to make it match OidcHandler and SamlHandler * Clean up interface for OidcHandler.handle_redirect_request Make it accept `client_redirect_url=None`. * Clean up interface for `SamlHandler.handle_redirect_request` ... bring it into line with CAS and OIDC by making it take a Request parameter, move the magic for `client_redirect_url` for UIA into the handler, and fix the return type to be a `str` rather than a `bytes`. * Define a common protocol for SSO auth provider impls * Give SsoIdentityProvider an ID and register them * Combine the SSO Redirect servlets Now that the SsoHandler knows about the identity providers, we can combine the various *RedirectServlets into a single implementation which delegates to the right IdP. * changelog
* Remove unused OPTIONS handlers. (#8621)Patrick Cloke2020-10-221-3/+0
| | | | The handling of OPTIONS requests was consolidated in #7534, but the endpoint specific handlers were not removed.
* Convert additional templates to Jinja (#8444)Patrick Cloke2020-10-021-110/+26
| | | This converts a few more of our inline HTML templates to Jinja. This is somewhat part of #7280 and should make it a bit easier to customize these in the future.
* Simplify super() calls to Python 3 syntax. (#8344)Patrick Cloke2020-09-181-1/+1
| | | | | | | This converts calls like super(Foo, self) -> super(). Generated with: sed -i "" -Ee 's/super\([^\(]+\)/super()/g' **/*.py
* Ensure that HTML pages served from Synapse include headers to avoid embedding.Patrick Cloke2020-07-021-15/+3
|
* Use a non-empty RelayState for user interactive auth with SAML. (#7552)Patrick Cloke2020-05-221-1/+4
|
* Support UI Authentication for OpenID Connect accounts (#7457)Patrick Cloke2020-05-151-4/+15
|
* Persist user interactive authentication sessions (#7302)Patrick Cloke2020-04-301-2/+2
| | | | | By persisting the user interactive authentication sessions to the database, this fixes situations where a user hits different works throughout their auth session and also allows sessions to persist through restarts of Synapse.
* Use a template for the SSO success page to allow for customization. (#7279)Patrick Cloke2020-04-171-1/+24
|
* Support CAS in UI Auth flows. (#7186)Patrick Cloke2020-04-031-5/+23
|
* Support SAML in the user interactive authentication workflow. (#7102)Patrick Cloke2020-04-011-24/+18
|
* Clean-up some auth/login REST code (#7115)Patrick Cloke2020-03-201-33/+20
|
* Remove duplicate session check in web fallback servlet (#6702)Andrew Morgan2020-01-151-4/+0
|
* Port rest.client.v2Erik Johnston2019-12-051-6/+3
|
* Replace returnValue with return (#5736)Amber Brown2019-07-231-2/+2
|
* Run Black. (#5482)Amber Brown2019-06-201-37/+25
|
* Unify v1 and v2 REST client APIs (#5226)Amber Brown2019-06-031-2/+2
|
* Drop support for v2_alpha API prefix (#5190)Richard van der Hoff2019-05-151-9/+9
|
* switch from google.com to recaptcha.net for reCAPTCHA (#4731)Matthew Hodgson2019-02-251-1/+1
| | | | | | | | * add trivial clarification about jemalloc * switch from google.com to recaptcha.net because https://developers.google.com/recaptcha/docs/faq#can-i-use-recaptcha-globally
* Fix registration on workers (#4682)Erik Johnston2019-02-201-1/+1
| | | | | | | | | | * Move RegistrationHandler init to HomeServer * Move post registration actions to RegistrationHandler * Add post regisration replication endpoint * Newsfile
* Fix fallback auth on Python 3 (#4197)Amber Brown2018-11-191-22/+16
|
* Remove duplicate slashes in generated consent URLsTravis Ralston2018-11-151-2/+2
|
* Include a version query string arg for the consent routeTravis Ralston2018-10-311-2/+4
|
* Merge branch 'develop' into travis/login-termsTravis Ralston2018-10-241-1/+1
|\
| * Fix a number of flake8 errorsRichard van der Hoff2018-10-241-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | Broadly three things here: * disable W504 which seems a bit whacko * remove a bunch of `as e` expressions from exception handlers that don't use them * use `r""` for strings which include backslashes Also, we don't use pep8 any more, so we can get rid of the duplicate config there.
* | pep8Travis Ralston2018-10-151-3/+0
| |
* | Rely on the lack of ?u to represent public accessTravis Ralston2018-10-121-2/+2
| | | | | | also general cleanup
* | Use a flag rather than a new route for the public policyTravis Ralston2018-10-031-2/+2
| | | | | | This also means that the template now has optional parameters, which will need to be documented somehow.
* | Flesh out the fallback auth for termsTravis Ralston2018-10-031-7/+67
| |
* | Incorporate Dave's work for GDPR login flowsTravis Ralston2018-10-031-0/+20
|/ | | As per https://github.com/vector-im/riot-web/issues/7168#issuecomment-419996117
* run isortAmber Brown2018-07-091-3/+2
|
* Set Server header in SynapseRequestRichard van der Hoff2018-05-101-2/+0
| | | | | | | | | | | | (instead of everywhere that writes a response. Or rather, the subset of places which write responses where we haven't forgotten it). This also means that we don't have to have the mysterious version_string attribute in anything with a request handler. Unfortunately it does mean that we have to pass the version string wherever we instantiate a SynapseSite, which has been c&ped 150 times, but that is code that ought to be cleaned up anyway really.
* window.postmessage for Interactive Auth fallbackRichard van der Hoff2016-10-061-1/+3
| | | | | If you're a webapp running the fallback in an iframe, you can't set set a window.onAuthDone function. Let's post a message back to window.opener instead.
* Split out the auth handlerDavid Baker2016-06-021-1/+1
|
* Catch the exceptions thrown by twisted when you write to a closed connectionMark Haines2016-02-121-2/+3
|
* copyrightsMatthew Hodgson2016-01-071-1/+1
|
* Host /unstable and /r0 versions of r0 APIsDaniel Wagner-Hall2015-12-011-2/+2
|
* pep8David Baker2015-04-021-0/+1
|
* Completely replace fallback auth for C/S V2:David Baker2015-04-011-0/+189
* Now only the auth part goes to fallback, not the whole operation * Auth fallback is a normal API endpoint, not a static page * Params like the recaptcha pubkey can just live in the config Involves a little engineering on JsonResource so its servlets aren't always forced to return JSON. I should document this more, in fact I'll do that now.