- Feb 02, 2021
-
-
Richard van der Hoff authored
-
- Feb 01, 2021
-
-
Richard van der Hoff authored
-
Oliver Hanikel authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
fixes #9171
-
Richard van der Hoff authored
There's some prelimiary work here to pull out the construction of a jinja environment to a separate function. I wanted to load the template at display time rather than load time, so that it's easy to update on the fly. Honestly, I think we should do this with all our templates: the risk of ending up with malformed templates is far outweighed by the improved turnaround time for an admin trying to update them.
-
Richard van der Hoff authored
-
Richard van der Hoff authored
Fixes #8966. * Factor out build_synapse_client_resource_tree Start a function which will mount resources common to all workers. * Move sso init into build_synapse_client_resource_tree ... so that we don't have to do it for each worker * Fix SSO-login-via-a-worker Expose the SSO login endpoints on workers, like the documentation says. * Update workers config for new endpoints Add documentation for endpoints recently added (#8942, #9017, #9262) * remove submit_token from workers endpoints list this *doesn't* work on workers (yet). * changelog * Add a comment about the odd path for SAML2Resource
-
- Jan 29, 2021
-
-
Erik Johnston authored
-
- Jan 28, 2021
-
-
Erik Johnston authored
-
- Jan 27, 2021
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
We've decided to add a 'brand' field to help clients decide how to style the buttons. Also, fix up the allowed characters for idp_id, while I'm in the area.
-
Richard van der Hoff authored
-
Erik Johnston authored
-
- Jan 26, 2021
-
-
Patrick Cloke authored
The current configuration is handled for backwards compatibility, but is considered deprecated.
-
- Jan 25, 2021
-
-
Patrick Cloke authored
This expands the current shadow-banning feature to be usable via the admin API and adds documentation for it. A shadow-banned users receives successful responses to their client-server API requests, but the events are not propagated into rooms. Shadow-banning a user should be used as a tool of last resort and may lead to confusing or broken behaviour for the client.
-
- Jan 23, 2021
-
-
Jason Robinson authored
Also add a warning on the admin API documentation. Signed-off-by:
Jason Robinson <jasonr@matrix.org>
-
- Jan 21, 2021
-
-
Richard van der Hoff authored
... to avoid clashes with other SSO mechanisms
-
- Jan 20, 2021
-
-
Richard van der Hoff authored
-
rht authored
Signed-off-by:
rht <rhtbot@protonmail.com>
-
Richard van der Hoff authored
-
- Jan 18, 2021
-
-
Patrick Cloke authored
-
Matthew Hodgson authored
-
- Jan 15, 2021
-
-
Richard van der Hoff authored
This is the final step for supporting multiple OIDC providers concurrently. First of all, we reorganise the config so that you can specify a list of OIDC providers, instead of a single one. Before: oidc_config: enabled: true issuer: "https://oidc_provider" # etc After: oidc_providers: - idp_id: prov1 issuer: "https://oidc_provider" - idp_id: prov2 issuer: "https://another_oidc_provider" The old format is still grandfathered in. With that done, it's then simply a matter of having OidcHandler instantiate a new OidcProvider for each configured provider.
-
Patrick Cloke authored
Protecting media stops it from being quarantined when e.g. all media in a room is quarantined. This is useful for sticker packs and other media that is uploaded by server administrators, but used by many people.
-
- Jan 13, 2021
-
-
Richard van der Hoff authored
If a user tries to do UI Auth via SSO, but uses the wrong account on the SSO IdP, try to give them a better error. Previously, the UIA would claim to be successful, but then the operation in question would simply fail with "auth fail". Instead, serve up an error page which explains the failure.
-
Patrick Cloke authored
-
- Jan 12, 2021
-
-
Dirk Klimpel authored
This only applies if the user's data is to be erased.
-
- Jan 11, 2021
-
-
Jason Robinson authored
* docs updates * prettify SQL * add missing copyright * cursor_to_dict * update touched files copyright years Signed-off-by:
Jason Robinson <jasonr@matrix.org>
-
Jason Robinson authored
Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com>
-
David Teller authored
For remote users, only the rooms which the server knows about are returned. Local users have all of their joined rooms returned.
-
Erik Johnston authored
-
- Jan 09, 2021
-
-
Jason Robinson authored
Signed-off-by:
Jason Robinson <jasonr@matrix.org>
-
- Jan 08, 2021
-
-
Christopher Rücker authored
This PR adds the missing user_mapping_provider section in oidc.md Signed-off-by:
Christopher Rücker <chris-ruecker@protonmail.com>
-
- Jan 07, 2021
-
-
- Jan 05, 2021
-
-
Richard van der Hoff authored
During login, if there are multiple IdPs enabled, offer the user a choice of IdPs.
-
- Dec 29, 2020
-
-
Jerin J Titus authored
Removes the trailing slash with causes issues with matrix.to/Element.
-
Patrick Cloke authored
Adds the redacts endpoint to workers that have the client listener.
-
- Dec 18, 2020
-
-
Patrick Cloke authored
This makes the CAS handler look more like the SAML/OIDC handlers: * Render errors to users instead of throwing JSON errors. * Internal reorganization.
-
Patrick Cloke authored
Adds a new setting `email.invite_client_location` which, if defined, is passed to the identity server during invites.
-