Skip to content
Snippets Groups Projects
  1. Feb 16, 2021
  2. Feb 11, 2021
  3. Feb 03, 2021
  4. Feb 01, 2021
  5. Jan 29, 2021
  6. Jan 15, 2021
    • Richard van der Hoff's avatar
      Land support for multiple OIDC providers (#9110) · 9de6b941
      Richard van der Hoff authored
      This is the final step for supporting multiple OIDC providers concurrently.
      
      First of all, we reorganise the config so that you can specify a list of OIDC providers, instead of a single one. Before:
      
          oidc_config:
             enabled: true
             issuer: "https://oidc_provider"
             # etc
      
      After:
      
          oidc_providers:
           - idp_id: prov1
             issuer: "https://oidc_provider"
      
           - idp_id: prov2
             issuer: "https://another_oidc_provider"
      
      The old format is still grandfathered in.
      
      With that done, it's then simply a matter of having OidcHandler instantiate a new OidcProvider for each configured provider.
      Unverified
      9de6b941
    • Richard van der Hoff's avatar
      Improve UsernamePickerTestCase (#9112) · 0dd2649c
      Richard van der Hoff authored
      * make the OIDC bits of the test work at a higher level - via the REST api instead of poking the OIDCHandler directly.
      * Move it to test_login.py, where I think it fits better.
      Unverified
      0dd2649c
    • Richard van der Hoff's avatar
      Store an IdP ID in the OIDC session (#9109) · 4575ad0b
      Richard van der Hoff authored
      Again in preparation for handling more than one OIDC provider, add a new caveat to the macaroon used as an OIDC session cookie, which remembers which OIDC provider we are talking to. In future, when we get a callback, we'll need it to make sure we talk to the right IdP.
      
      As part of this, I'm adding an idp_id and idp_name field to the OIDC configuration object. They aren't yet documented, and we'll just use the old values by default.
      Unverified
      4575ad0b
  7. Jan 14, 2021
  8. Jan 13, 2021
  9. Jan 12, 2021
    • Dirk Klimpel's avatar
      Remove user's avatar URL and displayname when deactivated. (#8932) · 7a2e9b54
      Dirk Klimpel authored
      This only applies if the user's data is to be erased.
      Unverified
      7a2e9b54
    • Richard van der Hoff's avatar
      Remove SynapseRequest.get_user_agent (#9069) · 2ec8ca5e
      Richard van der Hoff authored
      SynapseRequest is in danger of becoming a bit of a dumping-ground for "useful stuff relating to Requests",
      which isn't really its intention (its purpose is to override render, finished and connectionLost to set up the 
      LoggingContext and write the right entries to the request log).
      
      Putting utility functions inside SynapseRequest means that lots of our code ends up requiring a
      SynapseRequest when there is nothing synapse-specific about the Request at all, and any old
      twisted.web.iweb.IRequest will do. This increases code coupling and makes testing more difficult.
      
      In short: move get_user_agent out to a utility function.
      Unverified
      2ec8ca5e
  10. Jan 07, 2021
  11. Jan 03, 2021
  12. Dec 18, 2020
  13. Dec 17, 2020
  14. Dec 16, 2020
  15. Dec 15, 2020
  16. Dec 14, 2020
  17. Dec 11, 2020
  18. Dec 09, 2020
  19. Dec 04, 2020
  20. Dec 02, 2020
  21. Dec 01, 2020
    • Richard van der Hoff's avatar
      Support "identifier" dicts in UIA (#8848) · 4d949655
      Richard van der Hoff authored
      The spec requires synapse to support `identifier` dicts for `m.login.password`
      user-interactive auth, which it did not (instead, it required an undocumented
      `user` parameter.)
      
      To fix this properly, we need to pull the code that interprets `identifier`
      into `AuthHandler.validate_login` so that it can be called from the UIA code.
      
      Fixes #5665.
      Unverified
      4d949655
Loading