summary refs log tree commit diff
path: root/tests/handlers/test_auth.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Save the OIDC session ID (sid) with the device on login (#11482)Quentin Gliech2021-12-061-3/+3
| | | As a step towards allowing back-channel logout for OIDC.
* Rename `get_access_token_for_user_id` method to ↵reivilibre2021-11-171-5/+5
| | | | `create_access_token_for_user_id` (#11369)
* Use direct references for configuration variables (part 4). (#10893)Patrick Cloke2021-09-231-1/+1
|
* Change the format of access tokens away from macaroons (#5588)Richard van der Hoff2021-05-121-20/+23
|
* Remove redundant "coding: utf-8" lines (#9786)Jonathan de Jong2021-04-141-1/+0
| | | | | | | Part of #9744 Removes all redundant `# -*- coding: utf-8 -*-` lines from files, as python 3 automatically reads source code as utf-8 now. `Signed-off-by: Jonathan de Jong <jonathan@automatia.nl>`
* Use mock from the stdlib. (#9772)Patrick Cloke2021-04-091-1/+1
|
* Record the SSO Auth Provider in the login token (#9510)Richard van der Hoff2021-03-041-20/+29
| | | This great big stack of commits is a a whole load of hoop-jumping to make it easier to store additional values in login tokens, and then to actually store the SSO Identity Provider in the login token. (Making use of that data will follow in a subsequent PR.)
* Convert some test cases to use HomeserverTestCase. (#9377)Patrick Cloke2021-02-111-79/+54
| | | | This has the side-effect of being able to remove use of `inlineCallbacks` in the test-cases for cleaner tracebacks.
* Simplify the way the `HomeServer` object caches its internal attributes. ↵Jonathan de Jong2020-11-301-3/+3
| | | | | (#8565) Changes `@cache_in_self` to use underscore-prefixed attributes.
* Remove the deprecated Handlers object (#8494)Patrick Cloke2020-10-091-9/+2
| | | All handlers now available via get_*_handler() methods on the HomeServer.
* Allow for make_awaitable's return value to be re-used. (#8261)Patrick Cloke2020-09-081-10/+10
|
* Stop sub-classing object (#8249)Patrick Cloke2020-09-041-1/+1
|
* Convert stats and related calls to async/await (#8192)Patrick Cloke2020-08-271-10/+11
|
* Stop Auth methods from polling the config on every req. (#7420)Andrew Morgan2020-05-061-9/+14
|
* Convert auth handler to async/await (#7261)Patrick Cloke2020-04-151-28/+52
|
* Implement access token expiry (#5660)Richard van der Hoff2019-07-121-5/+15
| | | | Record how long an access token is valid for, and raise a soft-logout once it expires.
* Run Black. (#5482)Amber Brown2019-06-201-5/+5
|
* add new error type ResourceLimitNeil Johnson2018-08-161-5/+5
|
* fix off by 1 errorsNeil Johnson2018-08-141-1/+0
|
* fix off by 1s on mauNeil Johnson2018-08-141-1/+38
|
* Run tests under PostgreSQL (#3423)Amber Brown2018-08-131-1/+1
|
* Run black.black2018-08-101-12/+4
|
* do mau checks based on monthly_active_users tableNeil Johnson2018-08-021-4/+4
|
* fix test for py3Neil Johnson2018-08-011-0/+4
|
* make count_monthly_users async synapse/handlers/auth.pyNeil Johnson2018-08-011-17/+22
|
* coding styleNeil Johnson2018-07-311-2/+2
|
* limit register and sign in on number of monthly usersNeil Johnson2018-07-301-1/+48
|
* run isortAmber Brown2018-07-091-0/+2
|
* Fix email push in pusher workerErik Johnston2017-02-021-7/+5
| | | | | | This was broken when device list updates were implemented, as Mailer could no longer instantiate an AuthHandler due to a dependency on federation sending.
* Stop putting a time caveat on access tokensRichard van der Hoff2016-11-291-3/+3
| | | | | | | | The 'time' caveat on the access tokens was something of a lie, since we weren't enforcing it; more pertinently its presence stops us ever adding useful time caveats. Let's move in the right direction by not lying in our caveats.
* PEP8Richard van der Hoff2016-08-081-0/+1
|
* Fix login with m.login.tokenRichard van der Hoff2016-08-081-4/+49
| | | | | login with token (as used by CAS auth) was broken by 067596d, such that it always returned a 401.
* Fix flake8 warnings for testsMark Haines2016-02-191-1/+0
|
* copyrightsMatthew Hodgson2016-01-071-1/+1
|
* Move token generation to auth handlerDaniel Wagner-Hall2015-08-201-0/+70
I prefer the auth handler to worry about all auth, and register to call into it as needed, than to smatter auth logic between the two.