Skip to content
Snippets Groups Projects
Unverified Commit 683d6f75 authored by Patrick Cloke's avatar Patrick Cloke Committed by GitHub
Browse files

Rename handler and config modules which end in handler/config. (#9816)

parent eccacd72
No related branches found
No related tags found
No related merge requests found
Showing with 43 additions and 35 deletions
Rename some handlers and config modules to not duplicate the top-level module.
...@@ -1900,7 +1900,7 @@ saml2_config: ...@@ -1900,7 +1900,7 @@ saml2_config:
# sub-properties: # sub-properties:
# #
# module: The class name of a custom mapping module. Default is # module: The class name of a custom mapping module. Default is
# 'synapse.handlers.oidc_handler.JinjaOidcMappingProvider'. # 'synapse.handlers.oidc.JinjaOidcMappingProvider'.
# See https://github.com/matrix-org/synapse/blob/master/docs/sso_mapping_providers.md#openid-mapping-providers # See https://github.com/matrix-org/synapse/blob/master/docs/sso_mapping_providers.md#openid-mapping-providers
# for information on implementing a custom mapping provider. # for information on implementing a custom mapping provider.
# #
......
...@@ -106,7 +106,7 @@ A custom mapping provider must specify the following methods: ...@@ -106,7 +106,7 @@ A custom mapping provider must specify the following methods:
Synapse has a built-in OpenID mapping provider if a custom provider isn't Synapse has a built-in OpenID mapping provider if a custom provider isn't
specified in the config. It is located at specified in the config. It is located at
[`synapse.handlers.oidc_handler.JinjaOidcMappingProvider`](../synapse/handlers/oidc_handler.py). [`synapse.handlers.oidc.JinjaOidcMappingProvider`](../synapse/handlers/oidc.py).
## SAML Mapping Providers ## SAML Mapping Providers
...@@ -190,4 +190,4 @@ A custom mapping provider must specify the following methods: ...@@ -190,4 +190,4 @@ A custom mapping provider must specify the following methods:
Synapse has a built-in SAML mapping provider if a custom provider isn't Synapse has a built-in SAML mapping provider if a custom provider isn't
specified in the config. It is located at specified in the config. It is located at
[`synapse.handlers.saml_handler.DefaultSamlMappingProvider`](../synapse/handlers/saml_handler.py). [`synapse.handlers.saml.DefaultSamlMappingProvider`](../synapse/handlers/saml.py).
...@@ -7,16 +7,16 @@ from synapse.config import ( ...@@ -7,16 +7,16 @@ from synapse.config import (
auth, auth,
captcha, captcha,
cas, cas,
consent_config, consent,
database, database,
emailconfig, emailconfig,
experimental, experimental,
groups, groups,
jwt_config, jwt,
key, key,
logger, logger,
metrics, metrics,
oidc_config, oidc,
password_auth_providers, password_auth_providers,
push, push,
ratelimiting, ratelimiting,
...@@ -24,9 +24,9 @@ from synapse.config import ( ...@@ -24,9 +24,9 @@ from synapse.config import (
registration, registration,
repository, repository,
room_directory, room_directory,
saml2_config, saml2,
server, server,
server_notices_config, server_notices,
spam_checker, spam_checker,
sso, sso,
stats, stats,
...@@ -65,11 +65,11 @@ class RootConfig: ...@@ -65,11 +65,11 @@ class RootConfig:
api: api.ApiConfig api: api.ApiConfig
appservice: appservice.AppServiceConfig appservice: appservice.AppServiceConfig
key: key.KeyConfig key: key.KeyConfig
saml2: saml2_config.SAML2Config saml2: saml2.SAML2Config
cas: cas.CasConfig cas: cas.CasConfig
sso: sso.SSOConfig sso: sso.SSOConfig
oidc: oidc_config.OIDCConfig oidc: oidc.OIDCConfig
jwt: jwt_config.JWTConfig jwt: jwt.JWTConfig
auth: auth.AuthConfig auth: auth.AuthConfig
email: emailconfig.EmailConfig email: emailconfig.EmailConfig
worker: workers.WorkerConfig worker: workers.WorkerConfig
...@@ -78,9 +78,9 @@ class RootConfig: ...@@ -78,9 +78,9 @@ class RootConfig:
spamchecker: spam_checker.SpamCheckerConfig spamchecker: spam_checker.SpamCheckerConfig
groups: groups.GroupsConfig groups: groups.GroupsConfig
userdirectory: user_directory.UserDirectoryConfig userdirectory: user_directory.UserDirectoryConfig
consent: consent_config.ConsentConfig consent: consent.ConsentConfig
stats: stats.StatsConfig stats: stats.StatsConfig
servernotices: server_notices_config.ServerNoticesConfig servernotices: server_notices.ServerNoticesConfig
roomdirectory: room_directory.RoomDirectoryConfig roomdirectory: room_directory.RoomDirectoryConfig
thirdpartyrules: third_party_event_rules.ThirdPartyRulesConfig thirdpartyrules: third_party_event_rules.ThirdPartyRulesConfig
tracer: tracer.TracerConfig tracer: tracer.TracerConfig
......
File moved
...@@ -20,17 +20,17 @@ from .auth import AuthConfig ...@@ -20,17 +20,17 @@ from .auth import AuthConfig
from .cache import CacheConfig from .cache import CacheConfig
from .captcha import CaptchaConfig from .captcha import CaptchaConfig
from .cas import CasConfig from .cas import CasConfig
from .consent_config import ConsentConfig from .consent import ConsentConfig
from .database import DatabaseConfig from .database import DatabaseConfig
from .emailconfig import EmailConfig from .emailconfig import EmailConfig
from .experimental import ExperimentalConfig from .experimental import ExperimentalConfig
from .federation import FederationConfig from .federation import FederationConfig
from .groups import GroupsConfig from .groups import GroupsConfig
from .jwt_config import JWTConfig from .jwt import JWTConfig
from .key import KeyConfig from .key import KeyConfig
from .logger import LoggingConfig from .logger import LoggingConfig
from .metrics import MetricsConfig from .metrics import MetricsConfig
from .oidc_config import OIDCConfig from .oidc import OIDCConfig
from .password_auth_providers import PasswordAuthProviderConfig from .password_auth_providers import PasswordAuthProviderConfig
from .push import PushConfig from .push import PushConfig
from .ratelimiting import RatelimitConfig from .ratelimiting import RatelimitConfig
...@@ -39,9 +39,9 @@ from .registration import RegistrationConfig ...@@ -39,9 +39,9 @@ from .registration import RegistrationConfig
from .repository import ContentRepositoryConfig from .repository import ContentRepositoryConfig
from .room import RoomConfig from .room import RoomConfig
from .room_directory import RoomDirectoryConfig from .room_directory import RoomDirectoryConfig
from .saml2_config import SAML2Config from .saml2 import SAML2Config
from .server import ServerConfig from .server import ServerConfig
from .server_notices_config import ServerNoticesConfig from .server_notices import ServerNoticesConfig
from .spam_checker import SpamCheckerConfig from .spam_checker import SpamCheckerConfig
from .sso import SSOConfig from .sso import SSOConfig
from .stats import StatsConfig from .stats import StatsConfig
......
File moved
...@@ -27,7 +27,10 @@ from synapse.util.stringutils import parse_and_validate_mxc_uri ...@@ -27,7 +27,10 @@ from synapse.util.stringutils import parse_and_validate_mxc_uri
from ._base import Config, ConfigError, read_file from ._base import Config, ConfigError, read_file
DEFAULT_USER_MAPPING_PROVIDER = "synapse.handlers.oidc_handler.JinjaOidcMappingProvider" DEFAULT_USER_MAPPING_PROVIDER = "synapse.handlers.oidc.JinjaOidcMappingProvider"
# The module that JinjaOidcMappingProvider is in was renamed, we want to
# transparently handle both the same.
LEGACY_USER_MAPPING_PROVIDER = "synapse.handlers.oidc_handler.JinjaOidcMappingProvider"
class OIDCConfig(Config): class OIDCConfig(Config):
...@@ -403,6 +406,8 @@ def _parse_oidc_config_dict( ...@@ -403,6 +406,8 @@ def _parse_oidc_config_dict(
""" """
ump_config = oidc_config.get("user_mapping_provider", {}) ump_config = oidc_config.get("user_mapping_provider", {})
ump_config.setdefault("module", DEFAULT_USER_MAPPING_PROVIDER) ump_config.setdefault("module", DEFAULT_USER_MAPPING_PROVIDER)
if ump_config.get("module") == LEGACY_USER_MAPPING_PROVIDER:
ump_config["module"] = DEFAULT_USER_MAPPING_PROVIDER
ump_config.setdefault("config", {}) ump_config.setdefault("config", {})
( (
......
...@@ -25,7 +25,10 @@ from ._util import validate_config ...@@ -25,7 +25,10 @@ from ._util import validate_config
logger = logging.getLogger(__name__) logger = logging.getLogger(__name__)
DEFAULT_USER_MAPPING_PROVIDER = ( DEFAULT_USER_MAPPING_PROVIDER = "synapse.handlers.saml.DefaultSamlMappingProvider"
# The module that DefaultSamlMappingProvider is in was renamed, we want to
# transparently handle both the same.
LEGACY_USER_MAPPING_PROVIDER = (
"synapse.handlers.saml_handler.DefaultSamlMappingProvider" "synapse.handlers.saml_handler.DefaultSamlMappingProvider"
) )
...@@ -97,6 +100,8 @@ class SAML2Config(Config): ...@@ -97,6 +100,8 @@ class SAML2Config(Config):
# Use the default user mapping provider if not set # Use the default user mapping provider if not set
ump_dict.setdefault("module", DEFAULT_USER_MAPPING_PROVIDER) ump_dict.setdefault("module", DEFAULT_USER_MAPPING_PROVIDER)
if ump_dict.get("module") == LEGACY_USER_MAPPING_PROVIDER:
ump_dict["module"] = DEFAULT_USER_MAPPING_PROVIDER
# Ensure a config is present # Ensure a config is present
ump_dict["config"] = ump_dict.get("config") or {} ump_dict["config"] = ump_dict.get("config") or {}
......
File moved
...@@ -37,10 +37,7 @@ from twisted.web.client import readBody ...@@ -37,10 +37,7 @@ from twisted.web.client import readBody
from twisted.web.http_headers import Headers from twisted.web.http_headers import Headers
from synapse.config import ConfigError from synapse.config import ConfigError
from synapse.config.oidc_config import ( from synapse.config.oidc import OidcProviderClientSecretJwtKey, OidcProviderConfig
OidcProviderClientSecretJwtKey,
OidcProviderConfig,
)
from synapse.handlers.sso import MappingException, UserAttributes from synapse.handlers.sso import MappingException, UserAttributes
from synapse.http.site import SynapseRequest from synapse.http.site import SynapseRequest
from synapse.logging.context import make_deferred_yieldable from synapse.logging.context import make_deferred_yieldable
......
File moved
...@@ -30,7 +30,7 @@ from synapse.api.errors import ( ...@@ -30,7 +30,7 @@ from synapse.api.errors import (
) )
from synapse.config import ConfigError from synapse.config import ConfigError
from synapse.config.captcha import CaptchaConfig from synapse.config.captcha import CaptchaConfig
from synapse.config.consent_config import ConsentConfig from synapse.config.consent import ConsentConfig
from synapse.config.emailconfig import ThreepidBehaviour from synapse.config.emailconfig import ThreepidBehaviour
from synapse.config.ratelimiting import FederationRateLimitConfig from synapse.config.ratelimiting import FederationRateLimitConfig
from synapse.config.registration import RegistrationConfig from synapse.config.registration import RegistrationConfig
......
...@@ -70,7 +70,7 @@ from synapse.handlers.acme import AcmeHandler ...@@ -70,7 +70,7 @@ from synapse.handlers.acme import AcmeHandler
from synapse.handlers.admin import AdminHandler from synapse.handlers.admin import AdminHandler
from synapse.handlers.appservice import ApplicationServicesHandler from synapse.handlers.appservice import ApplicationServicesHandler
from synapse.handlers.auth import AuthHandler, MacaroonGenerator from synapse.handlers.auth import AuthHandler, MacaroonGenerator
from synapse.handlers.cas_handler import CasHandler from synapse.handlers.cas import CasHandler
from synapse.handlers.deactivate_account import DeactivateAccountHandler from synapse.handlers.deactivate_account import DeactivateAccountHandler
from synapse.handlers.device import DeviceHandler, DeviceWorkerHandler from synapse.handlers.device import DeviceHandler, DeviceWorkerHandler
from synapse.handlers.devicemessage import DeviceMessageHandler from synapse.handlers.devicemessage import DeviceMessageHandler
...@@ -145,8 +145,8 @@ logger = logging.getLogger(__name__) ...@@ -145,8 +145,8 @@ logger = logging.getLogger(__name__)
if TYPE_CHECKING: if TYPE_CHECKING:
from txredisapi import RedisProtocol from txredisapi import RedisProtocol
from synapse.handlers.oidc_handler import OidcHandler from synapse.handlers.oidc import OidcHandler
from synapse.handlers.saml_handler import SamlHandler from synapse.handlers.saml import SamlHandler
T = TypeVar("T", bound=Callable[..., Any]) T = TypeVar("T", bound=Callable[..., Any])
...@@ -696,13 +696,13 @@ class HomeServer(metaclass=abc.ABCMeta): ...@@ -696,13 +696,13 @@ class HomeServer(metaclass=abc.ABCMeta):
@cache_in_self @cache_in_self
def get_saml_handler(self) -> "SamlHandler": def get_saml_handler(self) -> "SamlHandler":
from synapse.handlers.saml_handler import SamlHandler from synapse.handlers.saml import SamlHandler
return SamlHandler(self) return SamlHandler(self)
@cache_in_self @cache_in_self
def get_oidc_handler(self) -> "OidcHandler": def get_oidc_handler(self) -> "OidcHandler":
from synapse.handlers.oidc_handler import OidcHandler from synapse.handlers.oidc import OidcHandler
return OidcHandler(self) return OidcHandler(self)
......
...@@ -13,7 +13,7 @@ ...@@ -13,7 +13,7 @@
# limitations under the License. # limitations under the License.
from unittest.mock import Mock from unittest.mock import Mock
from synapse.handlers.cas_handler import CasResponse from synapse.handlers.cas import CasResponse
from tests.test_utils import simple_async_mock from tests.test_utils import simple_async_mock
from tests.unittest import HomeserverTestCase, override_config from tests.unittest import HomeserverTestCase, override_config
......
...@@ -499,7 +499,7 @@ class OidcHandlerTestCase(HomeserverTestCase): ...@@ -499,7 +499,7 @@ class OidcHandlerTestCase(HomeserverTestCase):
self.assertRenderedError("fetch_error") self.assertRenderedError("fetch_error")
# Handle code exchange failure # Handle code exchange failure
from synapse.handlers.oidc_handler import OidcError from synapse.handlers.oidc import OidcError
self.provider._exchange_code = simple_async_mock( self.provider._exchange_code = simple_async_mock(
raises=OidcError("invalid_request") raises=OidcError("invalid_request")
...@@ -583,7 +583,7 @@ class OidcHandlerTestCase(HomeserverTestCase): ...@@ -583,7 +583,7 @@ class OidcHandlerTestCase(HomeserverTestCase):
body=b'{"error": "foo", "error_description": "bar"}', body=b'{"error": "foo", "error_description": "bar"}',
) )
) )
from synapse.handlers.oidc_handler import OidcError from synapse.handlers.oidc import OidcError
exc = self.get_failure(self.provider._exchange_code(code), OidcError) exc = self.get_failure(self.provider._exchange_code(code), OidcError)
self.assertEqual(exc.value.error, "foo") self.assertEqual(exc.value.error, "foo")
...@@ -1126,7 +1126,7 @@ class OidcHandlerTestCase(HomeserverTestCase): ...@@ -1126,7 +1126,7 @@ class OidcHandlerTestCase(HomeserverTestCase):
client_redirect_url: str, client_redirect_url: str,
ui_auth_session_id: str = "", ui_auth_session_id: str = "",
) -> str: ) -> str:
from synapse.handlers.oidc_handler import OidcSessionData from synapse.handlers.oidc import OidcSessionData
return self.handler._token_generator.generate_oidc_session_token( return self.handler._token_generator.generate_oidc_session_token(
state=state, state=state,
...@@ -1152,7 +1152,7 @@ async def _make_callback_with_userinfo( ...@@ -1152,7 +1152,7 @@ async def _make_callback_with_userinfo(
userinfo: the OIDC userinfo dict userinfo: the OIDC userinfo dict
client_redirect_url: the URL to redirect to on success. client_redirect_url: the URL to redirect to on success.
""" """
from synapse.handlers.oidc_handler import OidcSessionData from synapse.handlers.oidc import OidcSessionData
handler = hs.get_oidc_handler() handler = hs.get_oidc_handler()
provider = handler._providers["oidc"] provider = handler._providers["oidc"]
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment