summary refs log tree commit diff
path: root/synapse/rest/client/v2_alpha/keys.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Flatten the synapse.rest.client package (#10600)reivilibre2021-08-171-344/+0
|
* Add a return type to parse_string. (#10438)Patrick Cloke2021-07-211-1/+1
| | | | And set the required attribute in a few places which will error if a parameter is not provided.
* Always require users to re-authenticate for dangerous operations. (#10184)Patrick Cloke2021-06-161-0/+3
| | | | | | | Dangerous actions means deactivating an account, modifying an account password, or adding a 3PID. Other actions (deleting devices, uploading keys) can re-use the same UI auth session if ui_auth.session_timeout is configured.
* Limit the number of in-flight /keys/query requests from a single device. ↵Patrick Cloke2021-06-091-1/+4
| | | | (#10144)
* Remove redundant "coding: utf-8" lines (#9786)Jonathan de Jong2021-04-141-1/+0
| | | | | | | Part of #9744 Removes all redundant `# -*- coding: utf-8 -*-` lines from files, as python 3 automatically reads source code as utf-8 now. `Signed-off-by: Jonathan de Jong <jonathan@automatia.nl>`
* Update black, and run auto formatting over the codebase (#9381)Eric Eastwood2021-02-161-1/+4
| | | | | | | - Update black version to the latest - Run black auto formatting over the codebase - Run autoformatting according to [`docs/code_style.md `](https://github.com/matrix-org/synapse/blob/80d6dc9783aa80886a133756028984dbf8920168/docs/code_style.md) - Update `code_style.md` docs around installing black to use the correct version
* Kill off `HomeServer.get_ip_from_request()` (#9080)Richard van der Hoff2021-01-121-5/+1
| | | Homeserver.get_ip_from_request() used to be a bit more complicated, but now it is totally redundant. Let's get rid of it.
* Add support for MSC2697: Dehydrated devices (#8380)Hubert Chathi2020-10-071-15/+22
| | | | This allows a user to store an offline device on the server and then restore it at a subsequent login.
* Make token serializing/deserializing async (#8427)Erik Johnston2020-09-301-1/+2
| | | The idea is that in future tokens will encode a mapping of instance to position. However, we don't want to include the full instance name in the string representation, so instead we'll have a mapping between instance name and an immutable integer ID in the DB that we can use instead. We'll then do the lookup when we serialize/deserialize the token (we could alternatively pass around an `Instance` type that includes both the name and ID, but that turns out to be a lot more invasive).
* Simplify super() calls to Python 3 syntax. (#8344)Patrick Cloke2020-09-181-6/+6
| | | | | | | This converts calls like super(Foo, self) -> super(). Generated with: sed -i "" -Ee 's/super\([^\(]+\)/super()/g' **/*.py
* Fix encryption algorithm typos in tests/comments (#7637)Andrew Morgan2020-06-041-4/+4
| | | | | | | | @uhoreg has confirmed these were both typos. They are only in comments and tests though, rather than anything critical. Introduced in: * https://github.com/matrix-org/synapse/pull/7157 * https://github.com/matrix-org/synapse/pull/5726
* Support SAML in the user interactive authentication workflow. (#7102)Patrick Cloke2020-04-011-1/+5
|
* Validate that the session is not modified during UI-Auth (#7068)Patrick Cloke2020-03-261-1/+1
|
* Port rest.client.v2Erik Johnston2019-12-051-27/+19
|
* update with newer coding styleHubert Chathi2019-09-041-2/+2
|
* make black happyHubert Chathi2019-09-041-0/+1
|
* allow uploading signatures of master key signed by devicesHubert Chathi2019-09-041-1/+1
|
* implement device signature uploading/fetchingHubert Chathi2019-09-041-0/+50
|
* Merge branch 'develop' into cross-signing_keysHubert Chathi2019-09-041-6/+6
|\
| * Opentrace device lists (#5853)Jorik Schellekens2019-09-031-2/+2
| | | | | | Trace device list changes.
| * Remove unnecessary parentheses around return statements (#5931)Andrew Morgan2019-08-301-4/+4
| | | | | | | | | | Python will return a tuple whether there are parentheses around the returned values or not. I'm just sick of my editor complaining about this all over the place :)
* | Merge branch 'uhoreg/e2e_cross-signing_merged' into cross-signing_keysHubert Chathi2019-08-281-1/+12
|\|
| * Opentrace e2e keys (#5855)Jorik Schellekens2019-08-221-1/+12
| | | | | | Add opentracing tags and logs for e2e keys
* | apply PR review suggestionsHubert Chathi2019-08-211-1/+1
| |
* | Merge branch 'cross-signing_hidden' into cross-signing_keysHubert Chathi2019-08-011-4/+4
|\|
| * Replace returnValue with return (#5736)Amber Brown2019-07-231-4/+4
| |
* | allow uploading keys for cross-signingHubert Chathi2019-07-251-3/+43
|/
* Run Black. (#5482)Amber Brown2019-06-201-14/+13
|
* Unify v1 and v2 REST client APIs (#5226)Amber Brown2019-06-031-5/+5
|
* run isortAmber Brown2018-07-091-2/+5
|
* register some /unstable endpoints in /r0 as wellKrombel2017-10-261-14/+4
|
* Add left section to /keys/changesErik Johnston2017-09-081-4/+2
|
* sets aren't JSON serializableErik Johnston2017-02-021-1/+1
|
* Include newly joined users in /keys/changes APIErik Johnston2017-02-011-1/+1
|
* CommentErik Johnston2017-02-011-1/+1
|
* CommentErik Johnston2017-02-011-1/+12
|
* Implement /keys/changesErik Johnston2017-02-011-0/+38
|
* Remove unspecced GET endpoints for e2e keysRichard van der Hoff2016-12-121-39/+4
| | | | | | | | GET /keys/claim is a terrible idea, since it isn't idempotent; also it throws 500 errors if you call it without all the right params. GET /keys/query is arguable, but it's unspecced, so let's get rid of it too to stop people relying on unspecced APIs.
* Allow guest access to endpoints for E2ERichard van der Hoff2016-11-251-5/+5
| | | | | Expose /devices, /keys, and /sendToDevice to guest users, so that they can use E2E.
* Move the E2E key handling into the e2e handlerMark Haines2016-09-131-112/+16
|
* Add a timeout parameter for end2end key queries.Mark Haines2016-09-121-26/+51
| | | | | | | | | | Add a timeout parameter for controlling how long synapse will wait for responses from remote servers. For servers that fail include how they failed to make it easier to debug. Fetch keys from different servers in parallel rather than in series. Set the default timeout to 10s.
* Merge branch 'rav/null_default_device_displayname' into developRichard van der Hoff2016-08-031-3/+1
|\
| * Default device_display_name to nullRichard van der Hoff2016-08-031-3/+1
| | | | | | | | | | | | It turns out that it's more useful to return a null device display name (and let clients decide how to handle it: eg, falling back to device_id) than using a constant string like "unknown device".
* | Move e2e query logic into a handlerRichard van der Hoff2016-08-011-39/+7
|/
* key upload tweaksRichard van der Hoff2016-07-271-7/+5
| | | | | | | 1. Add v2_alpha URL back in, since things seem to be using it. 2. Don't reject the request if the device_id in the upload request fails to match that in the access_token.
* Delete e2e keys on device deleteRichard van der Hoff2016-07-271-4/+9
|
* Make the device id on e2e key upload optionalRichard van der Hoff2016-07-261-12/+35
| | | | | | | | | | | | We should now be able to get our device_id from the access_token, so the device_id on the upload request is optional. Where it is supplied, we should check that it matches. For active access_tokens without an associated device_id, we ought to register the device in the devices table. Also update the table on upgrade so that all of the existing e2e keys are associated with real devices.
* Add `create_requester` functionRichard van der Hoff2016-07-261-6/+4
| | | | | Wrap the `Requester` constructor with a function which provides sensible defaults, and use it throughout
* Use parse_json_object_from_request to parse JSON out of request bodiesMark Haines2016-03-111-15/+7
|
* Introduce a Requester objectDaniel Wagner-Hall2016-01-111-8/+8
| | | | | | | | | This tracks data about the entity which made the request. This is instead of passing around a tuple, which requires call-site modifications every time a new piece of optional context is passed around. I tried to introduce a User object. I gave up.
* copyrightsMatthew Hodgson2016-01-071-1/+1
|
* Update endpoints to reflect current specDaniel Wagner-Hall2015-12-021-1/+1
|
* Host /unstable and /r0 versions of r0 APIsDaniel Wagner-Hall2015-12-011-6/+8
|
* Allow guests to register and call /events?room_id=Daniel Wagner-Hall2015-11-041-3/+3
| | | | | | | This follows the same flows-based flow as regular registration, but as the only implemented flow has no requirements, it auto-succeeds. In the future, other flows (e.g. captcha) may be required, so clients should treat this like the regular registration flow choices.
* Merge pull request #248 from matrix-org/deviceidDaniel Wagner-Hall2015-08-251-3/+3
|\ | | | | Remove completely unused concepts from codebase
| * Remove completely unused concepts from codebaseDaniel Wagner-Hall2015-08-251-3/+3
| | | | | | | | | | | | | | | | | | | | Removes device_id and ClientInfo device_id is never actually written, and the matrix.org DB has no non-null entries for it. Right now, it's just cluttering up code. This doesn't remove the columns from the database, because that's fiddly.
* | Remove syutil dependency in favour of smaller single-purpose librariesMark Haines2015-08-241-1/+2
|/
* Get the end-to-end key federation workingMark Haines2015-07-241-5/+5
|
* Add federation support for end-to-end key requestsMark Haines2015-07-231-30/+70
|
* Query for all the ones we were asked about, not just the last...David Baker2015-07-211-1/+1
|
* s/take/claim/ for end to end key APIsMark Haines2015-07-201-5/+5
|
* Assume that each device for a user has only one of each type of keyMark Haines2015-07-101-3/+3
|
* Don't bother with a timeout for one time keys on the server.Mark Haines2015-07-091-18/+7
|
* Add client API for uploading and querying keys for end to end encryptionMark Haines2015-07-061-0/+287