- Dec 15, 2020
-
-
Richard van der Hoff authored
This was never used, so let's get rid of it.
-
Richard van der Hoff authored
this didn't seem to be doing a lot, so remove it.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
The two are equivalent, but really we want to check the HTTP result that got returned to the channel, not the code that the Request object *intended* to return to the channel.
-
Richard van der Hoff authored
* move simple_async_mock to test_utils ... so that it can be re-used * Remove references to `SamlHandler._map_saml_response_to_user` from tests This method is going away, so we can no longer use it as a test point. Instead, factor out a higher-level method which takes a SAML object, and verify correct behaviour by mocking out `AuthHandler.complete_sso_login`. * changelog
-
- Dec 14, 2020
-
-
Richard van der Hoff authored
-
Patrick Cloke authored
-
Richard van der Hoff authored
* Remove references to handler._auth_handler (and replace them with hs.get_auth_handler) * Factor out a utility function for building Requests * Remove mocks of `OidcHandler._map_userinfo_to_user` This method is going away, so mocking it out is no longer a valid approach. Instead, we mock out lower-level methods (eg _remote_id_from_userinfo), or simply allow the regular implementation to proceed and update the expectations accordingly. * Remove references to `OidcHandler._map_userinfo_to_user` from tests This method is going away, so we can no longer use it as a test point. Instead we build mock "callback" requests which we pass into `handle_oidc_callback`, and verify correct behaviour by mocking out `AuthHandler.complete_sso_login`.
-
- Dec 11, 2020
-
-
David Teller authored
Spam checker modules can now provide async methods. This is implemented in a backwards-compatible manner.
-
Patrick Cloke authored
-
Dirk Klimpel authored
-
Erik Johnston authored
Fixes #8866
-
- Dec 09, 2020
-
-
Patrick Cloke authored
This defaults `ip_range_blacklist` to reserved IP ranges and also adds an `ip_range_whitelist` setting to override it.
-
Patrick Cloke authored
-
Richard van der Hoff authored
* Consistently use room_id from federation request body Some federation APIs have a redundant `room_id` path param (see https://github.com/matrix-org/matrix-doc/issues/2330). We should make sure we consistently use either the path param or the body param, and the body param is easier. * Kill off some references to "context" Once upon a time, "rooms" were known as "contexts". I think this kills of the last references to "contexts".
-
- Dec 08, 2020
-
-
Aaron authored
Fixes / related to: https://github.com/matrix-org/synapse/issues/6533 This should do essentially the same thing as a robots.txt file telling robots to not index the media repo. https://developers.google.com/search/reference/robots_meta_tag Signed-off-by:
Aaron Raimist <aaron@raim.ist>
-
- Dec 07, 2020
-
-
Will Hunt authored
* Call set_avatar_url with target_user, not user_id Fixes https://github.com/matrix-org/synapse/issues/8871 * Create 8872.bugfix * Update synapse/rest/admin/users.py Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com> * Testing * Update changelog.d/8872.bugfix Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com> Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com> Co-authored-by:
Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
-
Patrick Cloke authored
-
- Dec 04, 2020
-
-
Patrick Cloke authored
Authentication is done by checking a shared secret provided in the Synapse configuration file.
-
Erik Johnston authored
This is so that we can choose which algorithm to use based on the room ID.
-
Patrick Cloke authored
Pusher URLs now must end in `/_matrix/push/v1/notify` per the specification.
-
Patrick Cloke authored
This was broken in #8801.
-
- Dec 03, 2020
-
-
Richard van der Hoff authored
The spec says we should return `M_FORBIDDEN` when someone tries to register and registration is disabled.
-
- Dec 02, 2020
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
During user-interactive auth, do not offer password auth to users with no password, nor SSO auth to users with no SSO. Fixes #7559.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
This is now only used in `test_typing`, so move it there.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
A few test cases were relying on being able to mount non-client servlets on the test resource. it's better to give them their own Resources.
-
Patrick Cloke authored
Replaces the `federation_ip_range_blacklist` configuration setting with an `ip_range_blacklist` setting with wider scope. It now applies to: * Federation * Identity servers * Push notifications * Checking key validitity for third-party invite events The old `federation_ip_range_blacklist` setting is still honored if present, but with reduced scope (it only applies to federation and identity servers).
-
Erik Johnston authored
We do state res with unpersisted events when calculating the new current state of the room, so that should be the only thing impacted. I don't think this is tooooo big of a deal as: 1. the next time a state event happens in the room the current state should correct itself; 2. in the common case all the unpersisted events' auth events will be pulled in by other state, so will still return the correct result (or one which is sufficiently close to not affect the result); and 3. we mostly use the state at an event to do important operations, which isn't affected by this.
-
Richard van der Hoff authored
Rather than using a single JsonResource, construct a resource tree, as we do in the prod code, and allow testcases to add extra resources by overriding `create_resource_dict`.
-
Patrick Cloke authored
This was broken in #8801 when abstracting code shared with OIDC. After this change both SAML and OIDC have a concept of grandfathering users, but with different implementations.
-
Patrick Cloke authored
-
Richard van der Hoff authored
The idea here is to abstract out all the conditional code which tests which methods a given password provider has, to provide a consistent interface.
-
Andrew Morgan authored
This PR adds a `room_version` argument to the `RestHelper`'s `create_room_as` function for tests. I plan to use this for testing knocking, which currently uses an unstable room version.
-
- Dec 01, 2020
-
-
Richard van der Hoff authored
The spec requires synapse to support `identifier` dicts for `m.login.password` user-interactive auth, which it did not (instead, it required an undocumented `user` parameter.) To fix this properly, we need to pull the code that interprets `identifier` into `AuthHandler.validate_login` so that it can be called from the UIA code. Fixes #5665.
-
Richard van der Hoff authored
Fix a minor bug where we would offer "m.login.password" login if a custom auth provider supported it, even if password login was disabled.
-