- Apr 09, 2021
-
-
Patrick Cloke authored
-
- Mar 04, 2021
-
-
Richard van der Hoff authored
This great big stack of commits is a a whole load of hoop-jumping to make it easier to store additional values in login tokens, and then to actually store the SSO Identity Provider in the login token. (Making use of that data will follow in a subsequent PR.)
-
- Feb 11, 2021
-
-
Patrick Cloke authored
This has the side-effect of being able to remove use of `inlineCallbacks` in the test-cases for cleaner tracebacks.
-
- Nov 30, 2020
-
-
Jonathan de Jong authored
Changes `@cache_in_self` to use underscore-prefixed attributes.
-
- Oct 09, 2020
-
-
Patrick Cloke authored
All handlers now available via get_*_handler() methods on the HomeServer.
-
- Sep 08, 2020
-
-
Patrick Cloke authored
-
- Sep 04, 2020
-
-
Patrick Cloke authored
-
- Aug 27, 2020
-
-
Patrick Cloke authored
-
- May 06, 2020
-
-
Andrew Morgan authored
-
- Apr 15, 2020
-
-
Patrick Cloke authored
-
- Jul 12, 2019
-
-
Richard van der Hoff authored
Record how long an access token is valid for, and raise a soft-logout once it expires.
-
- Jun 20, 2019
-
-
Amber Brown authored
-
- Aug 16, 2018
-
-
Neil Johnson authored
-
- Aug 14, 2018
-
-
Neil Johnson authored
-
Neil Johnson authored
-
- Aug 13, 2018
-
-
Amber Brown authored
-
- Aug 10, 2018
-
-
black authored
-
- Aug 02, 2018
-
-
Neil Johnson authored
-
- Aug 01, 2018
-
-
Neil Johnson authored
-
Neil Johnson authored
-
- Jul 31, 2018
-
-
Neil Johnson authored
-
- Jul 30, 2018
-
-
Neil Johnson authored
-
- Jul 09, 2018
-
-
Amber Brown authored
-
- Feb 02, 2017
-
-
Erik Johnston authored
This was broken when device list updates were implemented, as Mailer could no longer instantiate an AuthHandler due to a dependency on federation sending.
-
- Nov 29, 2016
-
-
Richard van der Hoff authored
The 'time' caveat on the access tokens was something of a lie, since we weren't enforcing it; more pertinently its presence stops us ever adding useful time caveats. Let's move in the right direction by not lying in our caveats.
-
- Aug 08, 2016
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
login with token (as used by CAS auth) was broken by 067596d3, such that it always returned a 401.
-
- Feb 19, 2016
-
-
Mark Haines authored
-
- Jan 07, 2016
-
-
Matthew Hodgson authored
-
- Aug 20, 2015
-
-
Daniel Wagner-Hall authored
I prefer the auth handler to worry about all auth, and register to call into it as needed, than to smatter auth logic between the two.
-
- Aug 19, 2015
-
-
Daniel Wagner-Hall authored
-
- Aug 18, 2015
-
-
Daniel Wagner-Hall authored
-
Daniel Wagner-Hall authored
I made the non-test seconds instead of ms, but not the test
-
Daniel Wagner-Hall authored
-
Daniel Wagner-Hall authored
This just replaces random bytes with macaroons. The macaroons are not inspected by the client or server. In particular, they claim to have an expiry time, but nothing verifies that they have not expired. Follow-up commits will actually enforce the expiration, and allow for token refresh. See https://bit.ly/matrix-auth for more information
-