Skip to content
Snippets Groups Projects
user_admin_api.md 34.7 KiB
Newer Older
  • Learn to ignore specific revisions
  • 
        - `format` - string - The format to use when sending notifications to the
          Push Gateway.
    
      - `device_display_name` - string -  A string that will allow the user to identify
        what device owns this pusher.
    
      - `profile_tag` - string - This string determines which set of device specific rules
        this pusher executes.
    
      - `kind` - string -  The kind of pusher. "http" is a pusher that sends HTTP pokes.
      - `lang` - string - The preferred language for receiving notifications
        (e.g. 'en' or 'en-US')
    
      - `profile_tag` - string - This string determines which set of device specific rules
        this pusher executes.
    
      - `pushkey` - string - This is a unique identifier for this pusher.
        Max length, 512 bytes.
    
    - `total` - integer - Number of pushers.
    
    See also the
    [Client-Server API Spec on pushers](https://matrix.org/docs/spec/client_server/latest#get-matrix-client-r0-pushers).
    
    
    ## Controlling whether a user is shadow-banned
    
    
    Shadow-banning is a useful tool for moderating malicious or egregiously abusive users.
    A shadow-banned users receives successful responses to their client-server API requests,
    but the events are not propagated into rooms. This can be an effective tool as it
    (hopefully) takes longer for the user to realise they are being moderated before
    pivoting to another account.
    
    Shadow-banning a user should be used as a tool of last resort and may lead to confusing
    or broken behaviour for the client. A shadow-banned user will not receive any
    notification and it is generally more appropriate to ban or kick abusive users.
    A shadow-banned user will be unable to contact anyone on the server.
    
    
    To shadow-ban a user the API is:
    
    
    ```
    POST /_synapse/admin/v1/users/<user_id>/shadow_ban
    ```
    
    
    To un-shadow-ban a user the API is:
    
    ```
    DELETE /_synapse/admin/v1/users/<user_id>/shadow_ban
    ```
    
    
    To use it, you will need to authenticate by providing an `access_token` for a
    
    server admin: [Admin API](../usage/administration/admin_api)
    
    An empty JSON dict is returned in both cases.
    
    
    **Parameters**
    
    The following parameters should be set in the URL:
    
    - `user_id` - The fully qualified MXID: for example, `@user:server.com`. The user must
      be local.
    
    ## Override ratelimiting for users
    
    This API allows to override or disable ratelimiting for a specific user.
    There are specific APIs to set, get and delete a ratelimit.
    
    ### Get status of ratelimit
    
    The API is:
    
    ```
    GET /_synapse/admin/v1/users/<user_id>/override_ratelimit
    ```
    
    To use it, you will need to authenticate by providing an `access_token` for a
    
    server admin: [Admin API](../usage/administration/admin_api)
    
    
    A response body like the following is returned:
    
    ```json
    {
      "messages_per_second": 0,
      "burst_count": 0
    }
    ```
    
    **Parameters**
    
    The following parameters should be set in the URL:
    
    - `user_id` - The fully qualified MXID: for example, `@user:server.com`. The user must
      be local.
    
    **Response**
    
    The following fields are returned in the JSON response body:
    
    - `messages_per_second` - integer - The number of actions that can
      be performed in a second. `0` mean that ratelimiting is disabled for this user.
    - `burst_count` - integer - How many actions that can be performed before
      being limited.
    
    If **no** custom ratelimit is set, an empty JSON dict is returned.
    
    ```json
    {}
    ```
    
    ### Set ratelimit
    
    The API is:
    
    ```
    POST /_synapse/admin/v1/users/<user_id>/override_ratelimit
    ```
    
    To use it, you will need to authenticate by providing an `access_token` for a
    
    server admin: [Admin API](../usage/administration/admin_api)
    
    
    A response body like the following is returned:
    
    ```json
    {
      "messages_per_second": 0,
      "burst_count": 0
    }
    ```
    
    **Parameters**
    
    The following parameters should be set in the URL:
    
    - `user_id` - The fully qualified MXID: for example, `@user:server.com`. The user must
      be local.
    
    Body parameters:
    
    - `messages_per_second` - positive integer, optional. The number of actions that can
      be performed in a second. Defaults to `0`.
    - `burst_count` - positive integer, optional. How many actions that can be performed
      before being limited. Defaults to `0`.
    
    To disable users' ratelimit set both values to `0`.
    
    **Response**
    
    The following fields are returned in the JSON response body:
    
    - `messages_per_second` - integer - The number of actions that can
      be performed in a second.
    - `burst_count` - integer - How many actions that can be performed before
      being limited.
    
    ### Delete ratelimit
    
    The API is:
    
    ```
    DELETE /_synapse/admin/v1/users/<user_id>/override_ratelimit
    ```
    
    To use it, you will need to authenticate by providing an `access_token` for a
    
    server admin: [Admin API](../usage/administration/admin_api)
    
    
    An empty JSON dict is returned.
    
    ```json
    {}
    ```
    
    **Parameters**
    
    The following parameters should be set in the URL:
    
    - `user_id` - The fully qualified MXID: for example, `@user:server.com`. The user must
      be local.
    
    
    ### Check username availability
    
    Checks to see if a username is available, and valid, for the server. See [the client-server 
    API](https://matrix.org/docs/spec/client_server/r0.6.0#get-matrix-client-r0-register-available)
    for more information.
    
    This endpoint will work even if registration is disabled on the server, unlike 
    `/_matrix/client/r0/register/available`.
    
    The API is:
    
    ```
    
    GET /_synapse/admin/v1/username_available?username=$localpart
    
    ```
    
    The request and response format is the same as the [/_matrix/client/r0/register/available](https://matrix.org/docs/spec/client_server/r0.6.0#get-matrix-client-r0-register-available) API.
    
    To use it, you will need to authenticate by providing an `access_token` for a
    server admin: [Admin API](../usage/administration/admin_api)