summary refs log tree commit diff
path: root/tests/handlers/test_oidc.py (follow)
Commit message (Expand)AuthorAgeFilesLines
* Use `getClientAddress` instead of `getClientIP`. (#12599)Patrick Cloke2022-05-041-2/+2
* Add type hints for `tests/unittest.py`. (#12347)Richard van der Hoff2022-04-011-3/+4
* Add type hints to some tests/handlers files. (#12224)Dirk Klimpel2022-03-151-44/+50
* Remove `HomeServer.get_datastore()` (#12031)Richard van der Hoff2022-02-231-3/+3
* Adds misc missing type hints (#11953)Patrick Cloke2022-02-111-7/+2
* Save the OIDC session ID (sid) with the device on login (#11482)Quentin Gliech2021-12-061-20/+115
* Rename handler and config modules which end in handler/config. (#9816)Patrick Cloke2021-04-201-4/+4
* Remove redundant "coding: utf-8" lines (#9786)Jonathan de Jong2021-04-141-1/+0
* Use mock from the stdlib. (#9772)Patrick Cloke2021-04-091-2/+1
* Add SSO attribute requirements for OIDC providers (#9609)Hubbe2021-03-161-0/+132
* JWT OIDC secrets for Sign in with Apple (#9549)Richard van der Hoff2021-03-091-24/+157
* Record the SSO Auth Provider in the login token (#9510)Richard van der Hoff2021-03-041-20/+16
* Support for form_post in OIDC responses (#9376)Richard van der Hoff2021-02-171-13/+13
* Update black, and run auto formatting over the codebase (#9381)Eric Eastwood2021-02-161-6/+20
* Clean up caching/locking of OIDC metadata load (#9362)Richard van der Hoff2021-02-161-26/+45
* Put OIDC callback URI under /_synapse/client. (#9288)Richard van der Hoff2021-02-011-9/+6
* Improve styling and wording of SSO redirect confirm template (#9272)Richard van der Hoff2021-02-011-10/+14
* Land support for multiple OIDC providers (#9110)Richard van der Hoff2021-01-151-2/+2
* Improve UsernamePickerTestCase (#9112)Richard van der Hoff2021-01-151-118/+2
* Store an IdP ID in the OIDC session (#9109)Richard van der Hoff2021-01-151-1/+2
* Split OidcProvider out of OidcHandler (#9107)Richard van der Hoff2021-01-141-45/+48
* Preparatory refactors of OidcHandler (#9067)Richard van der Hoff2021-01-131-24/+37
* Remove SynapseRequest.get_user_agent (#9069)Richard van der Hoff2021-01-121-2/+1
* Skip unit tests which require optional dependencies (#9031)Richard van der Hoff2021-01-071-1/+18
* Implement a username picker for synapse (#8942)Richard van der Hoff2020-12-181-1/+142
* Make `_make_callback_with_userinfo` asyncRichard van der Hoff2020-12-151-68/+83
* Remove spurious mocking of complete_sso_loginRichard van der Hoff2020-12-151-2/+0
* Test `get_extra_attributes` fallbackRichard van der Hoff2020-12-151-11/+21
* Preparatory refactoring of the SamlHandlerTestCase (#8938)Richard van der Hoff2020-12-151-11/+1
* Preparatory refactoring of the OidcHandlerTestCase (#8911)Richard van der Hoff2020-12-141-141/+145
* Merge tag 'v1.24.0rc2' into developPatrick Cloke2020-12-041-2/+1
|\
| * Fix a regression that mapping providers should be able to redirect users. (#8...Patrick Cloke2020-12-041-2/+1
* | Factor out FakeResponse from test_oidcRichard van der Hoff2020-12-021-16/+1
|/
* Fix a regression when grandfathering SAML users. (#8855)Patrick Cloke2020-12-021-0/+8
* Add basic SAML tests for mapping users. (#8800)Patrick Cloke2020-12-021-17/+17
* Support trying multiple localparts for OpenID Connect. (#8801)Patrick Cloke2020-11-251-1/+87
* Improve error checking for OIDC/SAML mapping providers (#8774)Patrick Cloke2020-11-191-20/+69
* Abstract shared SSO code. (#8765)Patrick Cloke2020-11-171-7/+7
* Fix handling of User-Agent headers with bad utf-8. (#8632)Erik Johnston2020-10-231-6/+18
* Add config option for always using "userinfo endpoint" for OIDC (#7658)BBBSnowball2020-10-011-2/+8
* Allow additional SSO properties to be passed to the client (#8413)Patrick Cloke2020-09-301-55/+105
* Allow existing users to login via OpenID Connect. (#8345)Tdxdxoz2020-09-251-0/+35
* Ensure that the OpenID Connect remote ID is a string. (#8190)Patrick Cloke2020-08-281-2/+39
* Allow denying or shadow banning registrations via the spam checker (#8034)Patrick Cloke2020-08-201-3/+15
* Support UI Authentication for OpenID Connect accounts (#7457)Patrick Cloke2020-05-151-5/+10
* Implement OpenID Connect-based login (#7256)Quentin Gliech2020-05-081-0/+565