Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Allow appservice users to /login (#8320) | Will Hunt | 2020-09-18 | 1 | -10/+39 |
| | | | | | Add ability for ASes to /login using the `uk.half-shot.msc2778.login.application_service` login `type`. Co-authored-by: Patrick Cloke <clokep@users.noreply.github.com> | ||||
* | Use admin_patterns for all admin APIs. (#8331) | Patrick Cloke | 2020-09-17 | 6 | -26/+19 |
| | | | This reduces duplication of the admin prefix in regular expressions. | ||||
* | Fix a potential bug of UnboundLocalError (#8329) | Jonathan de Jong | 2020-09-17 | 1 | -5/+8 |
| | | | Replaced with less buggier control flow | ||||
* | Use slots in attrs classes where possible (#8296) | Patrick Cloke | 2020-09-14 | 1 | -1/+1 |
| | | | | | slots use less memory (and attribute access is faster) while slightly limiting the flexibility of the class attributes. This focuses on objects which are instantiated "often" and for short periods of time. | ||||
* | Fix typos in comments. | Patrick Cloke | 2020-09-14 | 3 | -4/+4 |
| | |||||
* | Improve SAML error messages (#8248) | Patrick Cloke | 2020-09-14 | 1 | -12/+4 |
| | |||||
* | Show a confirmation page during user password reset (#8004) | Andrew Morgan | 2020-09-10 | 5 | -80/+157 |
| | | | | | This PR adds a confirmation step to resetting your user password between clicking the link in your email and your password actually being reset. This is to better align our password reset flow with the industry standard of requiring a confirmation from the user after email validation. | ||||
* | Do not error when thumbnailing invalid files (#8236) | Patrick Cloke | 2020-09-09 | 3 | -12/+76 |
| | | | | If a file cannot be thumbnailed for some reason (e.g. the file is empty), then catch the exception and convert it to a reasonable error message for the client. | ||||
* | Don't remember `enabled` of deleted push rules and properly return 404 for ↵ | reivilibre | 2020-09-09 | 1 | -2/+13 |
| | | | | | | | missing push rules in `.../actions` and `.../enabled` (#7796) Signed-off-by: Olivier Wilkinson (reivilibre) <olivier@librepush.net> Co-authored-by: Richard van der Hoff <1389908+richvdh@users.noreply.github.com> | ||||
* | Include method in thumbnail media name (#7124) | DeepBlueV7.X | 2020-09-08 | 2 | -1/+46 |
| | | | | | | | | | | | | | | This fixes an issue where different methods (crop/scale) overwrite each other. This first tries the new path. If that fails and we are looking for a remote thumbnail, it tries the old path. If that still isn't found, it continues as normal. This should probably be removed in the future, after some of the newer thumbnails were generated with the new path on most deployments. Then the overhead should be minimal if the other thumbnails need to be regenerated. Signed-off-by: Nicolas Werner <nicolas.werner@hotmail.de> | ||||
* | Add a config option for validating 'next_link' parameters against a domain ↵ | Andrew Morgan | 2020-09-08 | 1 | -9/+57 |
| | | | | | | | | | | | whitelist (#8275) This is a config option ported over from DINUM's Sydent: https://github.com/matrix-org/sydent/pull/285 They've switched to validating 3PIDs via Synapse rather than Sydent, and would like to retain this functionality. This original purpose for this change is phishing prevention. This solution could also potentially be replaced by a similar one to https://github.com/matrix-org/synapse/pull/8004, but across all `*/submit_token` endpoint. This option may still be useful to enterprise even with that safeguard in place though, if they want to be absolutely sure that their employees don't follow links to other domains. | ||||
* | Stop sub-classing object (#8249) | Patrick Cloke | 2020-09-04 | 8 | -9/+9 |
| | |||||
* | Re-implement unread counts (again) (#8059) | Brendan Abolivier | 2020-09-02 | 1 | -0/+1 |
| | |||||
* | Add /user/{user_id}/shared_rooms/ api (#7785) | Will Hunt | 2020-09-02 | 3 | -0/+74 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add shared_rooms api * Add changelog * Add . * Wrap response in {"rooms": } * linting * Add unstable_features key * Remove options from isort that aren't part of 5.x `-y` and `-rc` are now default behaviour and no longer exist. `dont-skip` is no longer required https://timothycrosley.github.io/isort/CHANGELOG/#500-penny-july-4-2020 * Update imports to make isort happy * Add changelog * Update tox.ini file with correct invocation * fix linting again for isort * Vendor prefix unstable API * Fix to match spec * import Codes * import Codes * Use FORBIDDEN * Update changelog.d/7785.feature Co-authored-by: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> * Implement get_shared_rooms_for_users * a comma * trailing whitespace * Handle the easy feedback * Switch to using runInteraction * Add tests * Feedback * Seperate unstable endpoint from v2 * Add upgrade node * a line * Fix style by adding a blank line at EOF. * Update synapse/storage/databases/main/user_directory.py Co-authored-by: Tulir Asokan <tulir@maunium.net> * Update synapse/storage/databases/main/user_directory.py Co-authored-by: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> * Update UPGRADE.rst Co-authored-by: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> * Fix UPGRADE/CHANGELOG unstable paths unstable unstable unstable Co-authored-by: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> Co-authored-by: Tulir Asokan <tulir@maunium.net> Co-authored-by: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> Co-authored-by: Patrick Cloke <clokep@users.noreply.github.com> Co-authored-by: Tulir Asokan <tulir@maunium.net> | ||||
* | Move and refactor LoginRestServlet helper methods (#8182) | Andrew Morgan | 2020-08-28 | 1 | -54/+6 |
| | | | | | | | This is split out from https://github.com/matrix-org/synapse/pull/7438, which had gotten rather large. `LoginRestServlet` has a couple helper methods, `login_submission_legacy_convert` and `login_id_thirdparty_from_phone`. They're primarily used for converting legacy user login submissions to "identifier" dicts ([see spec](https://matrix.org/docs/spec/client_server/r0.6.1#post-matrix-client-r0-login)). Identifying information such as usernames or 3PID information used to be top-level in the login body. They're now supposed to be put inside an [identifier](https://matrix.org/docs/spec/client_server/r0.6.1#identifier-types) parameter instead. #7438's purpose is to allow using the new identifier parameter during User-Interactive Authentication, which is currently handled in AuthHandler. That's why I've moved these helper methods there. I also moved the refactoring of these method from #7438 as they're relevant. | ||||
* | Do not propagate typing notifications from shadow-banned users. (#8176) | Patrick Cloke | 2020-08-26 | 1 | -11/+15 |
| | |||||
* | Remove unused parameter from, and add safeguard in, get_room_data (#8174) | Andrew Morgan | 2020-08-26 | 1 | -1/+0 |
| | | | | | | Small cleanup PR. * Removed the unused `is_guest` argument * Added a safeguard to a (currently) impossible code path, fixing static checking at the same time. | ||||
* | Search in columns 'name' and 'displayname' in the admin users endpoint (#7377) | Manuel Stahl | 2020-08-25 | 1 | -1/+3 |
| | | | | | * Search in columns 'name' and 'displayname' in the admin users endpoint Signed-off-by: Manuel Stahl <manuel.stahl@awesome-technologies.de> | ||||
* | Stop shadow-banned users from sending non-member events. (#8142) | Patrick Cloke | 2020-08-24 | 3 | -40/+66 |
| | |||||
* | Don't fail /submit_token requests on incorrect session ID if ↵ | Brendan Abolivier | 2020-08-24 | 2 | -0/+17 |
| | | | | | | | | | | | | | | | | | | | request_token_inhibit_3pid_errors is turned on (#7991) * Don't raise session_id errors on submit_token if request_token_inhibit_3pid_errors is set * Changelog * Also wait some time before responding to /requestToken * Incorporate review * Update synapse/storage/databases/main/registration.py Co-authored-by: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> * Incorporate review Co-authored-by: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> | ||||
* | Allow denying or shadow banning registrations via the spam checker (#8034) | Patrick Cloke | 2020-08-20 | 1 | -0/+5 |
| | |||||
* | Stop shadow-banned users from sending invites. (#8095) | Patrick Cloke | 2020-08-20 | 2 | -27/+43 |
| | |||||
* | Use the JSON encoder without whitespace in more places. (#8124) | Patrick Cloke | 2020-08-20 | 1 | -2/+2 |
| | |||||
* | Ensure a group ID is valid before trying to get rooms for it. (#8129) | Patrick Cloke | 2020-08-20 | 1 | -0/+4 |
| | |||||
* | Remove `ChainedIdGenerator`. (#8123) | Erik Johnston | 2020-08-19 | 1 | -1/+1 |
| | | | | | It's just a thin wrapper around two ID gens to make `get_current_token` and `get_next` return tuples. This can easily be replaced by calling the appropriate methods on the underlying ID gens directly. | ||||
* | Be stricter about JSON that is accepted by Synapse (#8106) | Patrick Cloke | 2020-08-19 | 3 | -10/+14 |
| | |||||
* | Iteratively encode JSON responses to avoid blocking the reactor. (#8013) | Patrick Cloke | 2020-08-18 | 1 | -3/+3 |
| | |||||
* | Use the default templates when a custom template file cannot be found (#8037) | Andrew Morgan | 2020-08-17 | 2 | -57/+18 |
| | | | Fixes https://github.com/matrix-org/synapse/issues/6583 | ||||
* | Convert pusher databases to async/await. (#8075) | Patrick Cloke | 2020-08-14 | 1 | -4/+5 |
| | |||||
* | Implement new experimental push rules (#7997) | Brendan Abolivier | 2020-08-10 | 1 | -2/+9 |
|\ | | | | | With an undocumented configuration setting to enable them for specific users. | ||||
| * | Merge branch 'develop' of github.com:matrix-org/synapse into ↵ | Brendan Abolivier | 2020-08-06 | 5 | -25/+23 |
| |\ | | | | | | | | | | babolivier/new_push_rules | ||||
| * | | Incorporate review | Brendan Abolivier | 2020-08-06 | 1 | -2/+2 |
| | | | |||||
| * | | Fix PUT /pushrules to use the right rule IDs | Brendan Abolivier | 2020-08-03 | 1 | -2/+9 |
| | | | |||||
* | | | Remove unnecessary maybeDeferred calls (#8044) | Patrick Cloke | 2020-08-07 | 3 | -6/+3 |
| | | | |||||
* | | | Add health check endpoint (#8048) | Erik Johnston | 2020-08-07 | 1 | -0/+31 |
| | | | |||||
* | | | Reduce unnecessary whitespace in JSON. (#7372) | David Vo | 2020-08-07 | 1 | -2/+2 |
| | | | |||||
* | | | Revert #7736 (#8039) | Brendan Abolivier | 2020-08-06 | 1 | -1/+0 |
| | | | |||||
* | | | Convert synapse.api to async/await (#8031) | Patrick Cloke | 2020-08-06 | 2 | -2/+2 |
| | | | |||||
* | | | Improve performance of the register endpoint (#8009) | Patrick Cloke | 2020-08-06 | 2 | -65/+129 |
| |/ |/| | |||||
* | | Rename database classes to make some sense (#8033) | Erik Johnston | 2020-08-05 | 2 | -2/+2 |
| | | |||||
* | | Fix async/await calls for broken media providers. (#8027) | Patrick Cloke | 2020-08-04 | 2 | -22/+20 |
| | | |||||
* | | Allow guests to operate in encrypted rooms (#7314) | Michael Albert | 2020-08-03 | 1 | -1/+1 |
|/ | | | Signed-off-by: Michael Albert <michael.albert@awesome-technologies.de> | ||||
* | Re-implement unread counts (#7736) | Brendan Abolivier | 2020-07-29 | 1 | -0/+1 |
| | |||||
* | Add an option to disable purge in delete room admin API (#7964) | Dirk Klimpel | 2020-07-28 | 1 | -1/+10 |
| | | | | | | Add option ```purge``` to ```POST /_synapse/admin/v1/rooms/<room_id>/delete``` Fixes: #3761 Signed-off-by: Dirk Klimpel dirk@klimpel.org | ||||
* | Convert the remaining media repo code to async / await. (#7947) | Patrick Cloke | 2020-07-27 | 5 | -107/+130 |
| | |||||
* | Support oEmbed for media previews. (#7920) | Patrick Cloke | 2020-07-27 | 1 | -45/+220 |
| | | | Fixes previews of Twitter URLs by using their oEmbed endpoint to grab content. | ||||
* | Do not convert async functions to Deferreds in the interactive_auth_handler ↵ | Patrick Cloke | 2020-07-24 | 1 | -26/+21 |
| | | | | (#7944) | ||||
* | Convert more of the media code to async/await (#7873) | Patrick Cloke | 2020-07-24 | 2 | -33/+42 |
| | |||||
* | Skip serializing /sync response if client has disconnected (#7927) | Richard van der Hoff | 2020-07-22 | 1 | -0/+6 |
| | | | ... it's a load of work which may be entirely redundant. | ||||
* | Add debugging to sync response generation (#7929) | Richard van der Hoff | 2020-07-22 | 1 | -0/+3 |
| | |||||
* | Add a default limit (of 100) to get/sync operations. (#7858) | Patrick Cloke | 2020-07-17 | 1 | -1/+10 |
| | |||||
* | Add admin endpoint to get members in a room. (#7842) | Michael Albert | 2020-07-16 | 2 | -0/+27 |
| | |||||
* | Allow moving typing off master (#7869) | Erik Johnston | 2020-07-16 | 1 | -0/+9 |
| | |||||
* | Ensure that calls to `json.dumps` are compatible with the standard library ↵ | Patrick Cloke | 2020-07-15 | 2 | -7/+10 |
| | | | | json. (#7836) | ||||
* | Allow accounts to be re-activated from the admin APIs. (#7847) | Patrick Cloke | 2020-07-15 | 1 | -1/+9 |
| | |||||
* | Return the proper 403 Forbidden error during errors with JWT logins. (#7844) | Patrick Cloke | 2020-07-15 | 1 | -5/+3 |
| | |||||
* | Add delete room admin endpoint (#7613) | Dirk Klimpel | 2020-07-14 | 2 | -109/+50 |
| | | | | | | | | | | | | | | | | | | The Delete Room admin API allows server admins to remove rooms from server and block these rooms. `DELETE /_synapse/admin/v1/rooms/<room_id>` It is a combination and improvement of "[Shutdown room](https://github.com/matrix-org/synapse/blob/develop/docs/admin_api/shutdown_room.md)" and "[Purge room](https://github.com/matrix-org/synapse/blob/develop/docs/admin_api/purge_room.md)" API. Fixes: #6425 It also fixes a bug in [synapse/storage/data_stores/main/room.py](synapse/storage/data_stores/main/room.py) in ` get_room_with_stats`. It should return `None` if the room is unknown. But it returns an `IndexError`. https://github.com/matrix-org/synapse/blob/901b1fa561e3cc661d78aa96d59802cf2078cb0d/synapse/storage/data_stores/main/room.py#L99-L105 Related to: - #5575 - https://github.com/Awesome-Technologies/synapse-admin/issues/17 Signed-off-by: Dirk Klimpel dirk@klimpel.org | ||||
* | Add the option to validate the `iss` and `aud` claims for JWT logins. (#7827) | Patrick Cloke | 2020-07-14 | 1 | -6/+19 |
| | |||||
* | `update_membership` declaration: now always returns an event id. (#7809) | Richard van der Hoff | 2020-07-09 | 1 | -4/+2 |
| | |||||
* | Stop passing bytes when dumping JSON (#7799) | Patrick Cloke | 2020-07-08 | 1 | -1/+1 |
| | |||||
* | Add documentation for JWT login type and improve sample config. (#7776) | Patrick Cloke | 2020-07-06 | 1 | -21/+27 |
| | |||||
* | isort 5 compatibility (#7786) | Will Hunt | 2020-07-05 | 1 | -2/+1 |
| | | | The CI appears to use the latest version of isort, which is a problem when isort gets a major version bump. Rather than try to pin the version, I've done the necessary to make isort5 happy with synapse. | ||||
* | Merge different Resource implementation classes (#7732) | Erik Johnston | 2020-07-03 | 9 | -68/+25 |
| | |||||
* | Fix inconsistent handling of upper and lower cases of email addresses. (#7021) | Dirk Klimpel | 2020-07-03 | 3 | -16/+58 |
| | | | fixes #7016 | ||||
* | Merge branch 'master' into develop | Patrick Cloke | 2020-07-02 | 6 | -53/+22 |
|\ | |||||
| * | Ensure that HTML pages served from Synapse include headers to avoid embedding. | Patrick Cloke | 2020-07-02 | 6 | -53/+22 |
| | | |||||
* | | Back out MSC2625 implementation (#7761) | Brendan Abolivier | 2020-07-01 | 1 | -2/+2 |
| | | |||||
* | | Additional configuration options for auto-join rooms (#7763) | Patrick Cloke | 2020-06-30 | 1 | -2/+2 |
| | | |||||
* | | add org.matrix.login.jwt so that m.login.jwt can be deprecated (#7675) | Sorunome | 2020-06-24 | 1 | -1/+4 |
| | | |||||
* | | Support running multiple media repos. (#7706) | Erik Johnston | 2020-06-17 | 1 | -3/+15 |
| | | | | | | | | | | This requires a new config option to specify which media repo should be responsible for running background jobs to e.g. clear out expired URL preview caches. | ||||
* | | Fetch from the r0 media path instead of the unspecced v1. (#7714) | Patrick Cloke | 2020-06-17 | 1 | -4/+4 |
| | | |||||
* | | Implement unread counter (MSC2625) (#7673) | Brendan Abolivier | 2020-06-17 | 1 | -2/+2 |
|\ \ | | | | | | | Implementation of https://github.com/matrix-org/matrix-doc/pull/2625 | ||||
| * \ | Merge branch 'develop' into babolivier/mark_unread | Brendan Abolivier | 2020-06-15 | 1 | -3/+1 |
| |\ \ | |||||
| * \ \ | Merge branch 'develop' into babolivier/mark_unread | Brendan Abolivier | 2020-06-15 | 1 | -1/+3 |
| |\ \ \ | |||||
| * | | | | Use temporary prefixes as per the MSC | Brendan Abolivier | 2020-06-10 | 1 | -1/+1 |
| | | | | | |||||
| * | | | | Rename dont_push into mark_unread | Brendan Abolivier | 2020-06-10 | 1 | -2/+2 |
| | | | | | |||||
* | | | | | Replace all remaining six usage with native Python 3 equivalents (#7704) | Dagfinn Ilmari Mannsåker | 2020-06-16 | 10 | -52/+24 |
| | | | | | |||||
* | | | | | Merge branch 'master' into develop | Brendan Abolivier | 2020-06-16 | 1 | -3/+3 |
|\ \ \ \ \ | | |_|_|/ | |/| | | | |||||
| * | | | | Enable 3PID add/bind/unbind endpoints on r0 routes | Brendan Abolivier | 2020-06-15 | 1 | -3/+3 |
| |/ / / | |||||
* | | / | Update m.id.phone to use 'phone' instead of 'number' (#7687) | Andrew Morgan | 2020-06-15 | 1 | -2/+10 |
| |_|/ |/| | | | | | | | | | | | | | | | | | | | | | | | The spec [states](https://matrix.org/docs/spec/client_server/r0.6.1#phone-number) that `m.id.phone` requires the field `country` and `phone`. In Synapse, we've been enforcing `country` and `number`. I am not currently sure whether this affects any client implementations. This issue was introduced in #1994. | ||||
* | | | Replace iteritems/itervalues/iterkeys with native versions. (#7692) | Patrick Cloke | 2020-06-15 | 1 | -3/+1 |
| |/ |/| | |||||
* | | Remove "user_id" from GET /presence. (#7606) | Will Hunt | 2020-06-11 | 1 | -1/+3 |
|/ | |||||
* | Fix type information on `assert_*_is_admin` methods (#7645) | Richard van der Hoff | 2020-06-05 | 1 | -19/+14 |
| | | | These things don't return Deferreds. | ||||
* | Allow new users to be registered via the admin API even if the monthly ↵ | Dirk Klimpel | 2020-06-05 | 1 | -0/+2 |
| | | | | active user limit has been reached (#7263) | ||||
* | Add device management to admin API (#7481) | Dirk Klimpel | 2020-06-05 | 2 | -0/+169 |
| | | | | | | | | | | - Admin is able to - change displaynames - delete devices - list devices - get device informations Fixes #7330 | ||||
* | Support CS API v0.6.0 (#6585) | Andrew Morgan | 2020-06-05 | 1 | -15/+1 |
| | |||||
* | Performance improvements and refactor of Ratelimiter (#7595) | Andrew Morgan | 2020-06-05 | 2 | -59/+22 |
| | | | | | | | | | | While working on https://github.com/matrix-org/synapse/issues/5665 I found myself digging into the `Ratelimiter` class and seeing that it was both: * Rather undocumented, and * causing a *lot* of config checks This PR attempts to refactor and comment the `Ratelimiter` class, as well as encourage config file accesses to only be done at instantiation. Best to be reviewed commit-by-commit. | ||||
* | Fix encryption algorithm typos in tests/comments (#7637) | Andrew Morgan | 2020-06-04 | 1 | -4/+4 |
| | | | | | | | | @uhoreg has confirmed these were both typos. They are only in comments and tests though, rather than anything critical. Introduced in: * https://github.com/matrix-org/synapse/pull/7157 * https://github.com/matrix-org/synapse/pull/5726 | ||||
* | Advertise the token login type when OpenID Connect is enabled. (#7631) | Patrick Cloke | 2020-06-04 | 1 | -8/+3 |
| | |||||
* | Clean up exception handling in SAML2ResponseResource (#7614) | Richard van der Hoff | 2020-06-03 | 1 | -13/+13 |
| | | | | | | | | | | | | | * Expose `return_html_error`, and allow it to take a Jinja2 template instead of a raw string * Clean up exception handling in SAML2ResponseResource * use the existing code in `return_html_error` instead of re-implementing it (giving it a jinja2 template rather than inventing a new form of template) * do the exception-catching in the REST layer rather than in the handler layer, to make sure we catch all exceptions. | ||||
* | Fix a bug in automatic user creation with m.login.jwt. (#7585) | Olof Johansson | 2020-06-01 | 1 | -7/+8 |
| | |||||
* | Email notifications for new users when creating via the Admin API. (#7267) | Dirk Klimpel | 2020-06-01 | 1 | -0/+16 |
| | |||||
* | Add option to move event persistence off master (#7517) | Erik Johnston | 2020-05-22 | 1 | -2/+9 |
| | |||||
* | Add ability to wait for replication streams (#7542) | Erik Johnston | 2020-05-22 | 3 | -10/+22 |
| | | | | | | | The idea here is that if an instance persists an event via the replication HTTP API it can return before we receive that event over replication, which can lead to races where code assumes that persisting an event immediately updates various caches (e.g. current state of the room). Most of Synapse doesn't hit such races, so we don't do the waiting automagically, instead we do so where necessary to avoid unnecessary delays. We may decide to change our minds here if it turns out there are a lot of subtle races going on. People probably want to look at this commit by commit. | ||||
* | Use a non-empty RelayState for user interactive auth with SAML. (#7552) | Patrick Cloke | 2020-05-22 | 1 | -1/+4 |
| | |||||
* | Hash passwords earlier in the password reset process (#7538) | Patrick Cloke | 2020-05-20 | 3 | -7/+31 |
| | | | | This now matches the logic of the registration process as modified in 56db0b1365965c02ff539193e26c333b7f70d101 / #7523. | ||||
* | Merge tag 'v1.13.0rc3' into develop | Patrick Cloke | 2020-05-18 | 2 | -24/+28 |
|\ | | | | | | | | | | | | | | | Synapse 1.13.0rc3 (2020-05-18) Bugfixes: - Hash passwords as early as possible during registration. #7523 | ||||
| * | Hash passwords earlier in the registration process (#7523) | Patrick Cloke | 2020-05-18 | 2 | -24/+28 |
| | | |||||
* | | Merge pull request #7519 from matrix-org/rav/kill_py2_code | Richard van der Hoff | 2020-05-18 | 1 | -18/+9 |
|\ \ | | | | | | | Kill off some old python 2 code | ||||
| * | | remove miscellaneous PY2 code | Richard van der Hoff | 2020-05-15 | 1 | -18/+9 |
| | | | |||||
* | | | Support UI Authentication for OpenID Connect accounts (#7457) | Patrick Cloke | 2020-05-15 | 2 | -16/+34 |
|/ / | |||||
* | | Allow expired accounts to logout (#7443) | Andrew Morgan | 2020-05-14 | 1 | -3/+3 |
| | | |||||
* | | Merge tag 'v1.13.0rc2' into develop | Richard van der Hoff | 2020-05-14 | 1 | -1/+0 |
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Synapse 1.13.0rc2 (2020-05-14) ============================== Bugfixes -------- - Fix a long-standing bug which could cause messages not to be sent over federation, when state events with state keys matching user IDs (such as custom user statuses) were received. ([\#7376](https://github.com/matrix-org/synapse/issues/7376)) - Restore compatibility with non-compliant clients during the user interactive authentication process, fixing a problem introduced in v1.13.0rc1. ([\#7483](https://github.com/matrix-org/synapse/issues/7483)) Internal Changes ---------------- - Fix linting errors in new version of Flake8. ([\#7470](https://github.com/matrix-org/synapse/issues/7470)) | ||||
| * | Do not validate that the client dict is stable during UI Auth. (#7483) | Patrick Cloke | 2020-05-13 | 1 | -1/+0 |
| | | | | | | | | This backs out some of the validation for the client dictionary and logs if this changes during a user interactive authentication session instead. | ||||
* | | Merge branch 'release-v1.13.0' into develop | Andrew Morgan | 2020-05-11 | 1 | -0/+1 |
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * release-v1.13.0: Don't UPGRADE database rows RST indenting Put rollback instructions in upgrade notes Fix changelog typo Oh yeah, RST Absolute URL it is then Fix upgrade notes link Provide summary of upgrade issues in changelog. Fix ) Move next version notes from changelog to upgrade notes Changelog fixes 1.13.0rc1 Documentation on setting up redis (#7446) Rework UI Auth session validation for registration (#7455) Fix errors from malformed log line (#7454) Drop support for redis.dbid (#7450) | ||||
| * | Rework UI Auth session validation for registration (#7455) | Patrick Cloke | 2020-05-08 | 1 | -0/+1 |
| | | | | | | | | Be less strict about validation of UI authentication sessions during registration to match client expecations. | ||||
* | | Implement OpenID Connect-based login (#7256) | Quentin Gliech | 2020-05-08 | 3 | -3/+83 |
| | | |||||
* | | Add room details admin endpoint (#7317) | Manuel Stahl | 2020-05-07 | 2 | -1/+27 |
|/ | |||||
* | Persist user interactive authentication sessions (#7302) | Patrick Cloke | 2020-04-30 | 2 | -4/+4 |
| | | | | | By persisting the user interactive authentication sessions to the database, this fixes situations where a user hits different works throughout their auth session and also allows sessions to persist through restarts of Synapse. | ||||
* | Return total number of users and profile attributes in admin users endpoint ↵ | Manuel Stahl | 2020-04-28 | 1 | -4/+4 |
| | | | | | (#6881) Signed-off-by: Manuel Stahl <manuel.stahl@awesome-technologies.de> | ||||
* | Revert "Revert "Merge pull request #7315 from ↵ | Brendan Abolivier | 2020-04-23 | 2 | -2/+27 |
| | | | | | | matrix-org/babolivier/request_token"" This reverts commit 1adf6a55870aa08de272591ff49db9dc49738076. | ||||
* | Extend room admin api with additional attributes (#7225) | Dirk Klimpel | 2020-04-22 | 1 | -1/+14 |
| | |||||
* | Merge branch 'release-v1.12.4' into develop | Richard van der Hoff | 2020-04-22 | 1 | -0/+8 |
|\ | |||||
| * | Support GET account_data requests on a worker (#7311) | Richard van der Hoff | 2020-04-21 | 1 | -0/+8 |
| | | |||||
* | | Reduce logging verbosity of URL cache cleanup. (#7295) | Michael Kaye | 2020-04-22 | 1 | -2/+7 |
| | | |||||
* | | Use a template for the SSO success page to allow for customization. (#7279) | Patrick Cloke | 2020-04-17 | 1 | -1/+24 |
| | | |||||
* | | Allow specifying the value of Accept-Language header for URL previews (#7265) | Andrew Morgan | 2020-04-15 | 1 | -2/+6 |
| | | |||||
* | | Improve error responses when a remote server doesn't allow you to access its ↵ | Andrew Morgan | 2020-04-06 | 1 | -13/+20 |
| | | | | | | | | public rooms list (#6899) | ||||
* | | Support CAS in UI Auth flows. (#7186) | Patrick Cloke | 2020-04-03 | 2 | -9/+39 |
| | | |||||
* | | Support SAML in the user interactive authentication workflow. (#7102) | Patrick Cloke | 2020-04-01 | 5 | -30/+50 |
| | | |||||
* | | Admin API to join users to a room. (#7051) | Dirk Klimpel | 2020-03-27 | 2 | -4/+82 |
| | | |||||
* | | Add options to prevent users from changing their profile. (#7096) | Dirk Klimpel | 2020-03-27 | 1 | -0/+16 |
| | | |||||
* | | Ensure is_verified on /_matrix/client/r0/room_keys/keys is a boolean (#7150) | Andrew Morgan | 2020-03-27 | 1 | -1/+1 |
| | | |||||
* | | Refactor the CAS code (move the logic out of the REST layer to a handler) ↵ | Patrick Cloke | 2020-03-26 | 1 | -155/+16 |
| | | | | | | | | (#7136) | ||||
* | | Allow server admins to define and enforce a password policy (MSC2000). (#7118) | Dirk Klimpel | 2020-03-26 | 3 | -0/+62 |
| | | |||||
* | | Validate that the session is not modified during UI-Auth (#7068) | Patrick Cloke | 2020-03-26 | 4 | -8/+14 |
| | | |||||
* | | Fix CAS redirect url (#6634) | Naugrimm | 2020-03-24 | 1 | -11/+16 |
| | | | | | | Build the same service URL when requesting the CAS ticket and when calling the proxyValidate URL. | ||||
* | | Set Referrer-Policy to no-referrer for media (#7009) | Dionysis Grigoropoulos | 2020-03-23 | 1 | -0/+3 |
| | | |||||
* | | Clean-up some auth/login REST code (#7115) | Patrick Cloke | 2020-03-20 | 2 | -41/+20 |
| | | |||||
* | | Convert some of the media REST code to async/await (#7110) | Patrick Cloke | 2020-03-20 | 3 | -111/+90 |
|/ | |||||
* | Add an option to the set password API to choose whether to logout other ↵ | Patrick Cloke | 2020-03-18 | 2 | -3/+8 |
| | | | | devices. (#7085) | ||||
* | Set charset to utf-8 when adding headers for certain text content types (#7044) | The Stranjer | 2020-03-17 | 1 | -1/+24 |
| | | | | Fixes #7043 | ||||
* | Remove special casing of `m.room.aliases` events (#7034) | Patrick Cloke | 2020-03-17 | 1 | -12/+0 |
| | |||||
* | Revert "Add options to disable setting profile info for prevent changes. ↵ | Richard van der Hoff | 2020-03-17 | 1 | -16/+0 |
| | | | | | | | (#7053)" This reverts commit 54dd28621b070ca67de9f773fe9a89e1f4dc19da, reversing changes made to 6640460d054e8f4444046a34bdf638921b31c01e. | ||||
* | Add options to disable setting profile info for prevent changes. (#7053) | Brendan Abolivier | 2020-03-10 | 1 | -0/+16 |
|\ | |||||
| * | updates after review | dklimpel | 2020-03-09 | 1 | -6/+12 |
| | | |||||
| * | add disable_3pid_changes | dklimpel | 2020-03-08 | 1 | -0/+10 |
| | | |||||
* | | SAML2: render a comprehensible error page if something goes wrong | Brendan Abolivier | 2020-03-10 | 1 | -1/+17 |
| | | | | | | | | | | | | If an error happened while processing a SAML AuthN response, or a client ends up doing a `GET` request to `/authn_response`, then render a customisable error page rather than a confusing error. | ||||
* | | Convert remote key resource REST layer to async/await. (#7020) | Patrick Cloke | 2020-03-05 | 1 | -7/+4 |
| | | |||||
* | | Merge branch 'master' into develop | Brendan Abolivier | 2020-03-03 | 1 | -30/+13 |
|\ \ | |/ |/| | |||||
| * | Factor out complete_sso_login and expose it to the Module API | Brendan Abolivier | 2020-03-03 | 1 | -56/+2 |
| | | |||||
| * | Add a whitelist for the SSO confirmation step. | Richard van der Hoff | 2020-03-02 | 1 | -8/+18 |
| | | |||||
| * | Merge remote-tracking branch 'origin/release-v1.11.1' into release-v1.11.1 | Richard van der Hoff | 2020-03-02 | 1 | -4/+2 |
| |\ | |||||
| | * | Fixed set a user as an admin with the new API (#6928) | Dirk Klimpel | 2020-03-02 | 1 | -4/+2 |
| | | | | | | | | | | | | Fix #6910 | ||||
| * | | Add a confirmation step to the SSO login flow | Brendan Abolivier | 2020-03-02 | 1 | -6/+34 |
| |/ | |||||
* | | Fixed set a user as an admin with the new API (#6928) | Dirk Klimpel | 2020-02-28 | 1 | -4/+2 |
| | | | | | | Fix #6910 | ||||
* | | Ensure 'deactivated' parameter is a boolean on user admin API, Fix error ↵ | Andrew Morgan | 2020-02-26 | 2 | -4/+8 |
| | | | | | | | | handling of call to deactivate user (#6990) | ||||
* | | Clarify list/set/dict/tuple comprehensions and enforce via flake8 (#6957) | Patrick Cloke | 2020-02-21 | 6 | -30/+28 |
|/ | | | | Ensure good comprehension hygiene using flake8-comprehensions. | ||||
* | Merge pull request #6949 from matrix-org/rav/list_room_aliases_peekable | Richard van der Hoff | 2020-02-19 | 1 | -6/+6 |
|\ | | | | | Make room alias lists peekable | ||||
| * | Add `allow_departed_users` param to `check_in_room_or_world_readable` | Richard van der Hoff | 2020-02-19 | 1 | -6/+6 |
| | | | | | | | | | | | | | | ... and set it everywhere it's called. while we're here, rename it for consistency with `check_user_in_room` (and to help check that I haven't missed any instances) | ||||
* | | Move MSC2432 stuff onto unstable prefix (#6948) | Richard van der Hoff | 2020-02-19 | 2 | -1/+9 |
|/ | | | it's not in the spec yet, so needs to be unstable. Also add a feature flag for it. Also add a test for admin users. | ||||
* | Implement GET /_matrix/client/r0/rooms/{roomId}/aliases (#6939) | Richard van der Hoff | 2020-02-18 | 1 | -0/+23 |
| | | | | | per matrix-org/matrix-doc#2432 | ||||
* | Remove m.lazy_load_members from unstable features since it is in CS r0.5.0 ↵ | Aaron Raimist | 2020-02-13 | 1 | -1/+0 |
| | | | | | | | (#6877) Fixes #5528 | ||||
* | Return a 404 for admin api user lookup if user not found (#6901) | Andrew Morgan | 2020-02-12 | 1 | -1/+4 |
| | |||||
* | Admin api to add an email address (#6789) | Dirk Klimpel | 2020-02-07 | 1 | -0/+39 |
| | |||||
* | Allow URL-encoded user IDs on user admin api paths (#6825) | Andrew Morgan | 2020-02-03 | 1 | -2/+2 |
| | |||||
* | MSC2260: Block direct sends of m.room.aliases events (#6794) | Richard van der Hoff | 2020-01-30 | 1 | -0/+12 |
| | | | | | as per MSC2260 | ||||
* | Add `rooms.room_version` column (#6729) | Erik Johnston | 2020-01-27 | 1 | -1/+2 |
| | | | This is so that we don't have to rely on pulling it out from `current_state_events` table. | ||||
* | Validate client_secret parameter (#6767) | Andrew Morgan | 2020-01-24 | 2 | -5/+21 |
| | |||||
* | a bit of debugging for media storage providers (#6757) | Richard van der Hoff | 2020-01-23 | 2 | -0/+7 |
| | | | | | | * a bit of debugging for media storage providers * changelog | ||||
* | Minor fixes to user admin api (#6761) | Richard van der Hoff | 2020-01-23 | 1 | -9/+5 |
| | | | | * don't insist on a password (this is valid if you have an SSO login) * fix reference to undefined `requester` | ||||
* | Remove unnecessary abstractions in admin handler (#6751) | Andrew Morgan | 2020-01-22 | 1 | -10/+9 |
| | |||||
* | Admin API to list, filter and sort rooms (#6720) | Andrew Morgan | 2020-01-22 | 4 | -2/+100 |
| | |||||
* | Fix typo in _select_thumbnail | Brendan Abolivier | 2020-01-22 | 1 | -1/+1 |
| | |||||
* | Fix and add test to deprecated quarantine media admin api (#6756) | Andrew Morgan | 2020-01-22 | 1 | -1/+1 |
| | |||||
* | Fixup synapse.rest to pass mypy (#6732) | Erik Johnston | 2020-01-20 | 9 | -33/+45 |
| | |||||
* | Fix `/events/:event_id` deprecated API. (#6731) | Erik Johnston | 2020-01-20 | 1 | -1/+1 |
| | |||||
* | Fix changing password via user admin API. (#6730) | Erik Johnston | 2020-01-20 | 1 | -2/+2 |
| | |||||
* | Merge pull request #6714 from matrix-org/babolivier/retention_select_event | Brendan Abolivier | 2020-01-17 | 1 | -1/+1 |
|\ | | | | | Fix instantiation of message retention purge jobs | ||||
| * | Remove get_room_event_after_stream_ordering entirely | Brendan Abolivier | 2020-01-16 | 1 | -1/+1 |
| | | |||||
* | | Add org.matrix.e2e_cross_signing to unstable_features in /versions as per ↵ | Neil Johnson | 2020-01-16 | 1 | -0/+2 |
| | | | | | | | | MSC1756 (#6712) | ||||
* | | Remove duplicate session check in web fallback servlet (#6702) | Andrew Morgan | 2020-01-15 | 1 | -4/+0 |
|/ | |||||
* | Quarantine media by ID or user ID (#6681) | Andrew Morgan | 2020-01-13 | 1 | -2/+66 |
| | |||||
* | Allow admin users to create or modify users without a shared secret (#6495) | Manuel Stahl | 2020-01-09 | 2 | -0/+144 |
| | | | Signed-off-by: Manuel Stahl <manuel.stahl@awesome-technologies.de> | ||||
* | Back out ill-advised notary server hackery (#6657) | Richard van der Hoff | 2020-01-08 | 1 | -22/+8 |
| | | | | | | | | | | | This was ill-advised. We can't modify verify_keys here, because the response object has already been signed by the requested key. Furthermore, it's somewhat unnecessary because existing versions of Synapse (which get upset that the notary key isn't present in verify_keys) will fall back to a direct fetch via `/key/v2/server`. Also: more tests for fetching keys via perspectives: it would be nice if we actually tested when our fetcher can't talk to our notary impl. | ||||
* | Workaround for error when fetching notary's own key (#6620) | Richard van der Hoff | 2020-01-06 | 1 | -8/+22 |
| | | | | | | | | | | | | | | * Kill off redundant SynapseRequestFactory We already get the Site via the Channel, so there's no need for a dedicated RequestFactory: we can just use the right constructor. * Workaround for error when fetching notary's own key As a notary server, when we return our own keys, include all of our signing keys in verify_keys. This is a workaround for #6596. | ||||
* | Remove unused, undocumented "content repo" resource (#6628) | Richard van der Hoff | 2020-01-03 | 2 | -103/+0 |
| | | | | | | This looks like it got half-killed back in #888. Fixes #6567. | ||||
* | Clean up startup for the pusher (#6558) | Richard van der Hoff | 2019-12-18 | 1 | -17/+16 |
| | | | | | | | | | | | | | | | | | | | | | | | * Remove redundant python2 support code `str.decode()` doesn't exist on python3, so presumably this code was doing nothing * Filter out pushers with corrupt data When we get a row with unparsable json, drop the row, rather than returning a row with null `data`, which will then cause an explosion later on. * Improve logging when we can't start a pusher Log the ID to help us understand the problem * Make email pusher setup more robust We know we'll have a `data` member, since that comes from the database. What we *don't* know is if that is a dict, and if that has a `brand` member, and if that member is a string. | ||||
* | Back out change preventing setting null avatar URLs | Erik Johnston | 2019-12-11 | 1 | -6/+6 |
| | |||||
* | Better errors regarding changing avatar_url (#6497) | Andrew Morgan | 2019-12-09 | 1 | -3/+8 |
| | |||||
* | Merge branch 'develop' of github.com:matrix-org/synapse into ↵ | Erik Johnston | 2019-12-06 | 35 | -727/+509 |
|\ | | | | | | | erikj/make_database_class | ||||
| * | Replace /admin/v1/users_paginate endpoint with /admin/v2/users (#5925) | Manuel Stahl | 2019-12-05 | 2 | -56/+31 |
| | | |||||
| * | Port rest.client.v2 | Erik Johnston | 2019-12-05 | 23 | -505/+361 |
| | | |||||
| * | Port rest/v1 to async/await | Erik Johnston | 2019-12-05 | 10 | -166/+117 |
| | | |||||
* | | Move background update handling out of store | Erik Johnston | 2019-12-05 | 1 | -1/+1 |
|/ | |||||
* | Merge branch 'develop' into babolivier/context_filters | Brendan Abolivier | 2019-12-04 | 10 | -582/+752 |
|\ | |||||
| * | Fix: Pillow error when uploading RGBA image (#3325) (#6241) | Filip Štědronský | 2019-12-02 | 1 | -1/+4 |
| | | | | | | Signed-Off-By: Filip Štědronský <g@regnarg.cz> | ||||
| * | Add User-Interactive Auth to /account/3pid/add (#6119) | Andrew Morgan | 2019-11-29 | 1 | -0/+5 |
| | | |||||
| * | MSC2367 Allow reason field on all member events | Erik Johnston | 2019-11-28 | 1 | -1/+1 |
| | | |||||
| * | add etag and count to key backup endpoints (#5858) | Hubert Chathi | 2019-11-27 | 1 | -4/+4 |
| | | |||||
| * | Fix startup error when http proxy is defined. (#6421) | Richard van der Hoff | 2019-11-26 | 1 | -2/+2 |
| | | | | | | | | | | Guess I only tested this on python 2 :/ Fixes #6419. | ||||
| * | Clean up newline quote marks around the codebase (#6362) | Andrew Morgan | 2019-11-21 | 1 | -1/+1 |
| | | |||||
| * | Move admin endpoints into separate files (#6308) | Manuel Stahl | 2019-11-20 | 4 | -555/+621 |
| | | |||||
| * | Merge pull request #6335 from matrix-org/erikj/rc_login_cleanups | Brendan Abolivier | 2019-11-20 | 1 | -17/+94 |
| |\ | | | | | | | Only do `rc_login` ratelimiting on succesful login. | ||||
| | * | Lint | Brendan Abolivier | 2019-11-20 | 1 | -1/+3 |
| | | | |||||
| | * | Apply suggestions from code review | Erik Johnston | 2019-11-18 | 1 | -1/+1 |
| | | | | | | | | | | | | Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> Co-Authored-By: Brendan Abolivier <babolivier@matrix.org> | ||||
| | * | Only do `rc_login` ratelimiting on succesful login. | Erik Johnston | 2019-11-06 | 1 | -18/+93 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We were doing this in a number of places which meant that some login code paths incremented the counter multiple times. It was also applying ratelimiting to UIA endpoints, which was probably not intentional. In particular, some custom auth modules were calling `check_user_exists`, which incremented the counters, meaning that people would fail to login sometimes. | ||||
| * | | Merge pull request #6334 from matrix-org/rav/url_preview_limit_title_2 | Richard van der Hoff | 2019-11-05 | 1 | -1/+2 |
| |\ \ | | | | | | | | | Fix exception when OpenGraph tag values are ints | ||||
| | * | | Fix exception when OpenGraph tag values are ints | Richard van der Hoff | 2019-11-05 | 1 | -1/+2 |
| | | | | |||||
| * | | | Merge branch 'develop' into rav/url_preview_limit_title | Richard van der Hoff | 2019-11-05 | 13 | -159/+146 |
| |\ \ \ | | |/ / | |/| / | | |/ | |||||
| * | | Apply suggestions from code review | Richard van der Hoff | 2019-11-05 | 1 | -1/+1 |
| | | | | | | | | | | | | Co-Authored-By: Brendan Abolivier <babolivier@matrix.org> Co-Authored-By: Erik Johnston <erik@matrix.org> | ||||
| * | | Strip overlong OpenGraph data from url preview | Richard van der Hoff | 2019-11-05 | 1 | -1/+19 |
| | | | | | | | | | | | | ... to stop people causing DoSes with malicious web pages | ||||
* | | | Update copyrights | Brendan Abolivier | 2019-11-05 | 1 | -0/+3 |
| |/ |/| | |||||
* | | Merge pull request #6301 from matrix-org/babolivier/msc2326 | Brendan Abolivier | 2019-11-01 | 1 | -0/+3 |
|\ \ | | | | | | | Implement MSC2326 (label based filtering) | ||||
| * | | Add unstable feature flag | Brendan Abolivier | 2019-11-01 | 1 | -0/+3 |
| | | | |||||
* | | | Support for routing outbound HTTP requests via a proxy (#6239) | Richard van der Hoff | 2019-11-01 | 2 | -1/+3 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The `http_proxy` and `HTTPS_PROXY` env vars can be set to a `host[:port]` value which should point to a proxy. The address of the proxy should be excluded from IP blacklists such as the `url_preview_ip_range_blacklist`. The proxy will then be used for * push * url previews * phone-home stats * recaptcha validation * CAS auth validation It will *not* be used for: * Application Services * Identity servers * Outbound federation * In worker configurations, connections from workers to masters Fixes #4198. | ||||
* | | | Update black to 19.10b0 (#6304) | Amber Brown | 2019-11-01 | 4 | -11/+12 |
| | | | | | | | | | * update version of black and also fix the mypy config being overridden | ||||
* | | | Remove usage of deprecated logger.warn method from codebase (#6271) | Andrew Morgan | 2019-10-31 | 8 | -30/+32 |
| | | | | | | | | | Replace every instance of `logger.warn` with `logger.warning` as the former is deprecated. | ||||
* | | | Merge pull request #6280 from matrix-org/erikj/receipts_async_await | Erik Johnston | 2019-10-30 | 2 | -15/+9 |
|\ \ \ | | | | | | | | | Port receipt and read markers to async/wait | ||||
| * | | | Port receipt and read markers to async/wait | Erik Johnston | 2019-10-29 | 2 | -15/+9 |
| |/ / | |||||
* / / | Port room rest handlers to async/await | Erik Johnston | 2019-10-29 | 1 | -94/+72 |
|/ / | |||||
* | | Address codestyle concerns | Michael Kaye | 2019-10-24 | 2 | -2/+9 |
| | | |||||
* | | Delay printf until logging is required. | Michael Kaye | 2019-10-24 | 2 | -9/+9 |
|/ | | | | | Using % will cause the string to be generated even if debugging is off. | ||||
* | Merge branch 'develop' into cross-signing_sig_upload | Hubert Chathi | 2019-10-18 | 17 | -346/+585 |
|\ | |||||
| * | Merge branch 'develop' into uhoreg/e2e_cross-signing_merged | Hubert Chathi | 2019-10-18 | 17 | -346/+585 |
| |\ | |||||
| | * | Merge pull request #6196 from matrix-org/erikj/await | Erik Johnston | 2019-10-18 | 5 | -114/+84 |
| | |\ | | | | | | | | | Move rest/admin to use async/await. | ||||
| | | * | Port synapse/rest/client/_base.py to async/await | Erik Johnston | 2019-10-11 | 1 | -9/+5 |
| | | | | |||||
| | | * | Add maybe_awaitable and fix __init__ bugs | Erik Johnston | 2019-10-11 | 1 | -2/+5 |
| | | | | |||||
| | | * | Port synaps/rest/client/users.py to async/await | Erik Johnston | 2019-10-11 | 1 | -11/+7 |
| | | | | |||||
| | | * | Port synaps/rest/client/server_notice_servlet.py to async/await | Erik Johnston | 2019-10-11 | 1 | -6/+3 |
| | | | | |||||
| | | * | Port synaps/rest/client/media.py to async/await | Erik Johnston | 2019-10-11 | 1 | -16/+11 |
| | | | | |||||
| | | * | Port rest/admin/__init__.py to async/await | Erik Johnston | 2019-10-11 | 1 | -72/+55 |
| | | | | |||||
| | * | | Merge pull request #6189 from matrix-org/uhoreg/e2e_backup_optional_version | Hubert Chathi | 2019-10-11 | 1 | -1/+1 |
| | |\ \ | | | | | | | | | | | make version optional in body of e2e backup version update | ||||
| | | * | | make version optional in body of e2e backup version update | Hubert Chathi | 2019-10-09 | 1 | -1/+1 |
| | | | | | | | | | | | | | | | | | | | | to agree with latest version of the MSC | ||||
| | * | | | cas: support setting display name (#6114) | Valérian Rousset | 2019-10-11 | 1 | -1/+3 |
| | | |/ | | |/| | | | | | Now, the CAS server can return an attribute stating what's the desired displayname, instead of using the username directly. | ||||
| | * | | Fix store_url_cache using bytes | Erik Johnston | 2019-10-10 | 1 | -2/+2 |
| | | | | |||||
| | * | | send 404 as http-status when filter-id is unknown to the server (#2380) | krombel | 2019-10-10 | 2 | -22/+31 |
| | |/ | | | | | | | | | | | | | | | | | | | This fixed the weirdness of 400 vs 404 as http status code in the case the filter id is not known by the server. As e.g. matrix-js-sdk expects 404 to catch this situation this leads to unwanted behaviour. | ||||
| | * | add M_TOO_LARGE error code for uploading a too large file (#6151) | Anshul Angaria | 2019-10-08 | 1 | -2/+6 |
| | | | | | | | | | Fixes #6109 | ||||
| | * | Log responder we are using. (#6139) | Michael Kaye | 2019-10-07 | 1 | -1/+1 |
| | | | | | | | | | This prevents us logging "Responding to media request with responder %s". | ||||
| | * | media/thumbnailer: Better quality for 1-bit / 8-bit color palette images (#2142) | Robert Swain | 2019-10-04 | 1 | -3/+11 |
| | | | | | | | | | | | | | | | | | | Pillow will use nearest neighbour as the resampling algorithm if the source image is either 1-bit or a color palette using 8 bits. If we convert to RGB before scaling, we'll probably get a better result. | ||||
| | * | Land improved room list based on room stats (#6019) | Erik Johnston | 2019-10-02 | 1 | -0/+8 |
| | | | | | | | | | | | | Use room_stats and room_state for room directory search | ||||
| | * | Merge pull request #6108 from matrix-org/erikj/remove_get_user_by_req-span | Erik Johnston | 2019-09-27 | 1 | -0/+18 |
| | |\ | | | | | | | | | Add some helpful opentracing tags and remove get_user_by_req span | ||||
| | | * | isort | Erik Johnston | 2019-09-25 | 1 | -1/+1 |
| | | | | |||||
| | | * | Add tags for event_id and txn_id in event sending | Erik Johnston | 2019-09-25 | 1 | -0/+18 |
| | | | | | | | | | | | | | | | | This will make it easier to search for sending event requests. | ||||
| | * | | Kill off half-implemented password-reset via sms (#6101) | Richard van der Hoff | 2019-09-26 | 1 | -64/+1 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | Doing a password reset via SMS has never worked, and in any case is a silly idea because msisdn recycling is a thing. See also matrix-org/matrix-doc#2303. | ||||
| | * | | Stop advertising unsupported flows for registration (#6107) | Richard van der Hoff | 2019-09-25 | 1 | -3/+29 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | If email or msisdn verification aren't supported, let's stop advertising them for registration. Fixes #6100. | ||||
| | * | | Refactor code for calculating registration flows (#6106) | Richard van der Hoff | 2019-09-25 | 1 | -62/+62 |
| | |/ | | | | | | | | | | | | | | | | | | | | | | | | | because, frankly, it looked like it was written by an axe-murderer. This should be a non-functional change, except that where `m.login.dummy` was previously advertised *before* `m.login.terms`, it will now be advertised afterwards. AFAICT that should have no effect, and will be more consistent with the flows that involve passing a 3pid. | ||||
| | * | Merge remote-tracking branch 'origin/develop' into rav/saml_mapping_work | Richard van der Hoff | 2019-09-24 | 3 | -75/+316 |
| | |\ | |||||
| | | * | Add an unstable feature flag for separate add/bind 3pid APIs (#6044) | Andrew Morgan | 2019-09-23 | 1 | -0/+2 |
| | | | | | | | | | | | | Add a m.separate_add_and_bind flag set to True. See MSC2290's Backward Compatibility section for details. | ||||
| | | * | Add m.id_access_token to /versions unstable_features (MSC2264) (#5974) | Andrew Morgan | 2019-09-23 | 1 | -0/+3 |
| | | | | | | | | | | | | | | | | | | | | Adds a flag to /versions' unstable_features section indicating that this Synapse understands what an id_access_token is, as per MSC2264. Fixes #5927 | ||||
| | | * | Add m.require_identity_server to /versions unstable_flags (#5972) | Andrew Morgan | 2019-09-23 | 1 | -1/+13 |
| | | | | | | | | | | | | | | | | | | | | As MSC2263 states, m.require_identity_server must be set to false when it does not require an identity server to be provided by the client for the purposes of email registration or password reset. Adds an m.require_identity_server flag to /versionss unstable_flags section. This will advertise that Synapse no longer needs id_server as a parameter. | ||||
| | | * | Add POST submit_token endpoint for MSISDN (#6078) | Andrew Morgan | 2019-09-23 | 1 | -2/+45 |
| | | | | | | | | | | | | First part of solving #6076 | ||||
| | | * | Implement MSC2290 (#6043) | Andrew Morgan | 2019-09-23 | 2 | -72/+95 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | Implements MSC2290. This PR adds two new endpoints, /unstable/account/3pid/add and /unstable/account/3pid/bind. Depending on the progress of that MSC the unstable prefix may go away. This PR also removes the blacklist on some 3PID tests which occurs in #6042, as the corresponding Sytest PR changes them to use the new endpoints. Finally, it also modifies the account deactivation code such that it doesn't just try to deactivate 3PIDs that were bound to the user's account, but any 3PIDs that were bound through the homeserver on that user's account. | ||||
| | | * | Disable /register/available if registration is disabled (#6082) | Andrew Morgan | 2019-09-23 | 1 | -0/+5 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes #6066 This register endpoint should be disabled if registration is disabled, otherwise we're giving anyone the ability to check if a username exists on a server when we don't need to be. Error code is 403 (Forbidden) as that's the same returned by /register when registration is disabled. | ||||
| | | * | Allow HS to send emails when adding an email to the HS (#6042) | Andrew Morgan | 2019-09-20 | 2 | -51/+225 |
| | | | | |||||
| | | * | Remove trailing slash ability from password reset's submit_token endpoint ↵ | Andrew Morgan | 2019-09-20 | 1 | -1/+1 |
| | | | | | | | | | | | | | | | | | | | | (#6074) Remove trailing slash ability from the password reset submit_token endpoint. Since we provide the link in an email, and have never sent it with a trailing slash, there's no point for us to accept them on the endpoint. | ||||
| | | * | Drop support for bind param on POST /account/3pid (MSC2290) (#6067) | Andrew Morgan | 2019-09-20 | 1 | -4/+0 |
| | | | | | | | | | | | | As per [MSC2290](https://github.com/matrix-org/matrix-doc/pull/2290/files#diff-05cde9463e9209b701312b3baf2fb2ebR151), we're dropping the bind parameter from `/account/3pid`. This endpoint can now only be used for adding threepid's to the user's account on the homeserver. | ||||
| | | * | Use unstable prefix for 3PID unbind API (#6062) | J. Ryan Stinnett | 2019-09-19 | 1 | -1/+1 |
| | | | | |||||
| | | * | Remove POST method from password reset submit_token endpoint (#6056) | Andrew Morgan | 2019-09-19 | 1 | -17/+0 |
| | | | | | | | | | | | | Removes the POST method from `/password_reset/<medium>/submit_token/` as it's only used by phone number verification which Synapse does not support yet. | ||||
| | * | | Merge branch 'develop' into rav/saml_mapping_work | Richard van der Hoff | 2019-09-19 | 44 | -425/+732 |
| | |\| |