- Feb 03, 2021
-
-
Patrick Cloke authored
Also add a few more IP ranges to the default blacklist.
-
- Feb 02, 2021
-
-
Richard van der Hoff authored
-
- Feb 01, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
fixes #9171
-
Richard van der Hoff authored
There's some prelimiary work here to pull out the construction of a jinja environment to a separate function. I wanted to load the template at display time rather than load time, so that it's easy to update on the fly. Honestly, I think we should do this with all our templates: the risk of ending up with malformed templates is far outweighed by the improved turnaround time for an admin trying to update them.
-
Richard van der Hoff authored
-
- Jan 29, 2021
-
-
Erik Johnston authored
-
- Jan 28, 2021
-
-
Erik Johnston authored
-
- Jan 27, 2021
-
-
Richard van der Hoff authored
We've decided to add a 'brand' field to help clients decide how to style the buttons. Also, fix up the allowed characters for idp_id, while I'm in the area.
-
Richard van der Hoff authored
-
- Jan 26, 2021
-
-
Patrick Cloke authored
The current configuration is handled for backwards compatibility, but is considered deprecated.
-
- Jan 21, 2021
-
-
Richard van der Hoff authored
... to avoid clashes with other SSO mechanisms
-
- Jan 20, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Jan 15, 2021
-
-
Richard van der Hoff authored
This is the final step for supporting multiple OIDC providers concurrently. First of all, we reorganise the config so that you can specify a list of OIDC providers, instead of a single one. Before: oidc_config: enabled: true issuer: "https://oidc_provider" # etc After: oidc_providers: - idp_id: prov1 issuer: "https://oidc_provider" - idp_id: prov2 issuer: "https://another_oidc_provider" The old format is still grandfathered in. With that done, it's then simply a matter of having OidcHandler instantiate a new OidcProvider for each configured provider.
-
- Jan 13, 2021
-
-
Richard van der Hoff authored
If a user tries to do UI Auth via SSO, but uses the wrong account on the SSO IdP, try to give them a better error. Previously, the UIA would claim to be successful, but then the operation in question would simply fail with "auth fail". Instead, serve up an error page which explains the failure.
-
- Jan 05, 2021
-
-
Richard van der Hoff authored
During login, if there are multiple IdPs enabled, offer the user a choice of IdPs.
-
- Dec 29, 2020
-
-
Jerin J Titus authored
Removes the trailing slash with causes issues with matrix.to/Element.
-
- Dec 18, 2020
-
-
Patrick Cloke authored
Adds a new setting `email.invite_client_location` which, if defined, is passed to the identity server during invites.
-
Richard van der Hoff authored
The final part (for now) of my work to implement a username picker in synapse itself. The idea is that we allow `UsernameMappingProvider`s to return `localpart=None`, in which case, rather than redirecting the browser back to the client, we redirect to a username-picker resource, which allows the user to enter a username. We *then* complete the SSO flow (including doing the client permission checks). The static resources for the username picker itself (in https://github.com/matrix-org/synapse/tree/rav/username_picker/synapse/res/username_picker) are essentially lifted wholesale from https://github.com/matrix-org/matrix-synapse-saml-mozilla/tree/master/matrix_synapse_saml_mozilla/res. As the comment says, we might want to think about making them customisable, but that can be a follow-up. Fixes #8876.
-
Patrick Cloke authored
-
- Dec 16, 2020
-
-
Patrick Cloke authored
Move it from the federation section to the server section to match ip_range_blacklist.
-
- Dec 09, 2020
-
-
Patrick Cloke authored
This defaults `ip_range_blacklist` to reserved IP ranges and also adds an `ip_range_whitelist` setting to override it.
-
- Dec 08, 2020
-
-
Richard van der Hoff authored
-
- Dec 04, 2020
-
-
Patrick Cloke authored
Authentication is done by checking a shared secret provided in the Synapse configuration file.
-
- Dec 02, 2020
-
-
Patrick Cloke authored
Replaces the `federation_ip_range_blacklist` configuration setting with an `ip_range_blacklist` setting with wider scope. It now applies to: * Federation * Identity servers * Push notifications * Checking key validitity for third-party invite events The old `federation_ip_range_blacklist` setting is still honored if present, but with reduced scope (it only applies to federation and identity servers).
-
- Nov 30, 2020
-
-
Andrew Morgan authored
Add a config option to change whether unread push notification counts are per-message or per-room (#8820) This PR adds a new config option to the `push` section of the homeserver config, `group_unread_count_by_room`. By default Synapse will group push notifications by room (so if you have 1000 unread messages, if they lie in 55 rooms, you'll see an unread count on your phone of 55). However, it is also useful to be able to send out the true count of unread messages if desired. If `group_unread_count_by_room` is set to `false`, then with the above example, one would see an unread count of 1000 (email anyone?).
-
- Nov 25, 2020
-
-
Andrew Morgan authored
This PR updates the push config's formatting to better align with our [code style guidelines](https://github.com/matrix-org/synapse/blob/develop/docs/code_style.md#configuration-file-format).
-
- Nov 19, 2020
-
-
Ben Banfield-Zanin authored
If the SAML metadata includes multiple IdPs it is necessary to specify which IdP to redirect users to for authentication.
-
- Nov 18, 2020
-
-
Marcus Schopen authored
Updates the sample configuration with the pysaml2 configuration for accepting clock skew/drift between the homeserver and IdP.
-
- Nov 14, 2020
-
-
Adrian Wannenmacher authored
Signed-off-by:
Adrian Wannenmacher <tfld@tfld.dev>
-
- Nov 13, 2020
-
-
Marcus Schopen authored
add some mdui:UIInfo element examples for saml2_config in homeserver.yaml
-
- Oct 30, 2020
-
-
Patrick Cloke authored
-
- Oct 23, 2020
-
-
Patrick Cloke authored
-
- Oct 09, 2020
-
-
Mateusz Przybyłowicz authored
Signed-off-by:
Mateusz Przybyłowicz <uamfhq@gmail.com>
-
- Oct 05, 2020
-
- Oct 02, 2020
-
-
Patrick Cloke authored
-
- Oct 01, 2020
-
-
BBBSnowball authored
This allows for connecting to certain IdPs, e.g. GitLab.
-
Richard van der Hoff authored
Add a pair of federation metrics to track the delays in sending PDUs to/from particular servers.
-
- Sep 30, 2020
-
-
Patrick Cloke authored
-