Commit Graph

312 Commits

Author SHA1 Message Date
Quentin Gliech 97cd5d86ba docs: Remove requirement for arbitrary KIDs (#4807) 2025-07-23 12:38:47 +02:00
Kai A. Hiller 858b388eec KIDs must be stable across restarts 2025-07-23 12:31:38 +02:00
Kai A. Hiller da94650706 Fix wording 2025-07-23 09:43:43 +02:00
Kai A. Hiller 2ecc502b05 Adapt markdown formatting 2025-07-23 09:39:52 +02:00
Kai A. Hiller 5587dd37e3 docs: Remove requirement for arbitrary KIDs 2025-07-21 18:37:03 +02:00
Quentin Gliech cfa9a23d86 Merge branch 'main' into feat/allow_override_user 2025-07-21 17:03:35 +02:00
Quentin Gliech 832244675d Threaten to switch to using the modern API in a few releases. 2025-07-21 13:15:48 +02:00
mcalinghee 98912f4ada allow importing existing users when the localpart matches in upstream OAuth 2.0 logins 2025-07-21 09:52:24 +02:00
Quentin Gliech c649603830 Use the new dedicated Synapse API 2025-07-18 16:39:24 +02:00
Quentin Gliech b83c747f37 Allow skipping GDPR-erasure when deactivating a user through the admin API (#4744) 2025-07-17 09:15:25 +02:00
Andrew Ferrazzutti d807975137 Decouple (un)locking from (re/de)activation
Unify the admin API, CLI, and GraphQL API in not having the unlock
command also reactivate, or the deactivate command also lock.

Still let the unlock command of the CLI and GraphQL API to also
reactivate the target user, albeit as a non-default option.
2025-07-16 14:17:01 -04:00
Andrew Ferrazzutti 6c1afee13d Separate active state from lock state in admin API
- Allow the admin API to deactivate a user without locking it, and to
  unlock a user without reactivating it.
- Make unlock-and-reactivate flows unset the "deactivated_at" timestamp.
- Revert adding an "unlock" parameter on `ReactivateUserJob`, as the
  option is used only by the admin API which doesn't use a job.
2025-07-16 14:17:01 -04:00
Andrew Ferrazzutti 13a21cc018 Update schema 2025-07-16 14:17:01 -04:00
Andrew Ferrazzutti a8b8c8e31c Add admin API endpoint to reactivate user 2025-07-16 14:17:01 -04:00
Andrew Ferrazzutti 49f2daeaa9 Negate erase option and make optional
This makes it more intuitive for an empty request body to be equivalent
to the option being set to false.
2025-07-14 01:02:51 -04:00
Andrew Ferrazzutti bad090adb5 Merge with 'main' 2025-07-11 09:50:38 -04:00
Andrew Ferrazzutti 1101dd95e8 Force optional request body for JSON schema 2025-07-10 13:26:58 -04:00
Johannes Marbach 5bdc270a54 Fix link title
Signed-off-by: Johannes Marbach <n0-0ne+github@mailbox.org>
2025-07-10 11:31:59 +02:00
Andrew Morgan 2e101d9c4c Docs: fix link to build GitHub Actions workflow 2025-07-08 12:43:19 +01:00
Andrew Ferrazzutti 972c50d6a3 Require "erase" key in deactivation request body
If body is absent, treat "erase" as true.
If body is present, require "erase" to be present in the body.
2025-07-04 14:30:42 -04:00
Quentin Gliech 3bc3db1527 Add documentation for backchannel logout 2025-07-04 16:27:10 +02:00
Quentin Gliech 8d6621f00e Log out oauth & compat sessions when receiving a backchannel logout request 2025-07-04 16:27:10 +02:00
Quentin Gliech e28ffccc3a Backchannel logout behavior settings on upstream providers 2025-07-04 16:27:10 +02:00
Andrew Ferrazzutti aad422110c Add "erase" option to REST deactivate request body
This allows using the endpoint to deactivate a user without deleting it.

TODO: make the request body optional.
2025-07-03 13:22:17 -04:00
Quentin Gliech 6ba9823482 README, contribution and release documentation (#4675) 2025-06-12 09:17:22 +02:00
Quentin Gliech 2c8f8f3623 Apply suggestions from code review
Co-authored-by: Will Lewis <1543626+wrjlewis@users.noreply.github.com>
2025-06-12 09:11:03 +02:00
Quentin Gliech af9765b0e2 Update the contributing guidelines 2025-06-11 15:57:12 +02:00
Quentin Gliech b0b940a20e Release documentation 2025-06-11 15:16:41 +02:00
Quentin Gliech 1546318084 Remove optional features from mas-iana & regenerate
Also ignores 'TEMPORARY' items in the IANA registry
2025-06-10 14:25:38 +02:00
Quentin Gliech 8df03bf185 Support for experimental plan management tab in UI (#4549) 2025-06-10 14:14:24 +02:00
Quentin Gliech ed31b2f4f9 Admin API to un-revoke and edit registration tokens (#4637) 2025-06-06 12:56:43 +02:00
Hugh Nimmo-Smith 037d90bb1a Update schemas 2025-06-06 10:45:23 +01:00
Quentin Gliech 52942ee94e Admin API to edit registration tokens 2025-06-05 18:22:16 +02:00
Quentin Gliech c8f2a2146c Admin API to un-revoke a user registration token. 2025-06-05 16:56:42 +02:00
Quentin Gliech 50b41a6613 Add secrets.encryption_file config option (#4617) 2025-06-05 15:14:55 +02:00
Quentin Gliech ae71b75ce1 config: Refactor parsing of secrets section (#4602) 2025-06-05 15:13:00 +02:00
Kai A. Hiller 187838802d Update encryption secret warning in docs 2025-06-04 14:50:54 +02:00
Kai A. Hiller 3ac2e983bb Skip encryption serialization if None
Signed-off-by: Kai A. Hiller <git@kaialexhiller.de>
2025-06-04 11:53:43 +02:00
Kai A. Hiller fbee4bfe8c Document secrets.encryption_file
Signed-off-by: Kai A. Hiller <git@kaialexhiller.de>
2025-06-04 11:42:51 +02:00
Quentin Gliech 12e9d025d7 Add whether the registration is valid or not in the admin API 2025-06-03 17:42:55 +02:00
Quentin Gliech 5d13691acd CLI tool to issue user registration tokens 2025-06-03 17:42:55 +02:00
Quentin Gliech 723302fd97 Admin API to revoke user registration tokens 2025-06-03 17:42:54 +02:00
Quentin Gliech aa7c6b35bc Admin API to create a new user registration token 2025-06-03 17:42:54 +02:00
Quentin Gliech 6000719b29 Admin API to get individual user registration tokens 2025-06-03 17:42:54 +02:00
Quentin Gliech 322c8545bb Admin API to list user registration tokens 2025-06-03 17:42:54 +02:00
Quentin Gliech 685f4761cd Add config flag to require registration tokens for password registrations 2025-06-03 17:42:53 +02:00
Kai A. Hiller c8cbb7329e Add secrets.encryption_file config option
Signed-off-by: Kai A. Hiller <git@kaialexhiller.de>
2025-06-02 18:39:19 +02:00
Kai A. Hiller ec693edb72 Refactor key options in secret config
Signed-off-by: Kai A. Hiller <git@kaialexhiller.de>
2025-06-02 14:06:43 +02:00
Kai A. Hiller e92d16c35c Refactor password options in secret config
Signed-off-by: Kai A. Hiller <git@kaialexhiller.de>
2025-06-02 14:06:43 +02:00
Kai A. Hiller b0fcf0bf78 Add KeyConfig doc comment
Signed-off-by: Kai A. Hiller <git@kaialexhiller.de>
2025-06-02 14:06:43 +02:00