18 Apr 2024 |
clokep | In reply to @reivilibre.element:librepush.net isn't that exactly what the feature is intended to do? You say hijacking, others say migrating from not-SSO to SSO? Yes, this is exactly what it was designed to do. Granted it was designed before "social" auth was supported. | 11:22:50 |
clokep | You really shouldn't setup SSO to social things unless you really want open registration. | 11:23:30 |
clokep | Synapse has very little ways to limit logins otherwise. | 11:23:42 |
clokep | * Synapse has very few ways to limit logins otherwise. | 11:23:49 |
| Tom Foster [he/him] [conduwuit] changed their display name from Tom Foster [conduwuit] to Tom Foster [he/him] [conduwuit]. | 19:23:50 |
19 Apr 2024 |
| honestyallan changed their display name from honestyallan to Honesty-Allan. | 08:50:04 |
21 Apr 2024 |
| ~#!/usr/mittwerk changed their profile picture. | 10:45:35 |
| dangui ismael kone joined the room. | 15:39:12 |
dangui ismael kone | hi | 16:16:13 |
dangui ismael kone | have question. did recording audio or video conversation have been already implemented ? | 16:16:58 |
Cat | I actually dont see how Synapse and VOIP relates. Because last i checked all Synapse does is provide matrix the rest is handled by the clients involved. I mean maby Synapse has something to do with telling about TURN servers but still. | 16:19:01 |
Cat | And i mean arent SFUs a completely separate thing from Synapse so that overlap isnt there either as far as i know. | 16:19:27 |
| Martix joined the room. | 19:51:11 |
22 Apr 2024 |
| Andrew F changed their display name from Andrew F (back on April 22) to Andrew F. | 07:16:45 |
| honestyallan changed their display name from Honesty-Allan to honestyallan. | 08:20:07 |
| Midhun [Maintainer] changed their display name from Midhun to Midhun [Maintainer]. | 12:13:53 |
Brad Murray | Is there going to a post-mortem or a quick summary for the curious on today's matrix.org downtime? Just curious if there's anything interesting for us to operationally learn from. | 17:06:13 |
richvdh | unrelatedly: how does one actually edit the "editable" environment created by scripts-dev/complement.sh --editable ? | 18:11:30 |
23 Apr 2024 |
| Dorron Zherka set a profile picture. | 08:52:52 |
Erik | Hi everyone. Synapse 1.105.1 has just been released.
The following issues are fixed in 1.105.1.
See the advisories for more details. If you have any questions, email security@element.io.
notes | docker | debs | pypi
| 16:08:06 |
24 Apr 2024 |
| avdb ⚡️ joined the room. | 04:56:11 |
avdb ⚡️ | How does Synapse deal with key backups for SSO users? | 04:58:32 |
avdb ⚡️ | Or like ... UIA for SSO in general | 05:00:20 |
| cybernet1k joined the room. | 11:00:12 |
| cybernet1k set a profile picture. | 11:03:31 |
Tom Foster [he/him] [conduwuit] | In reply to @avdb13:kurosaki.cx How does Synapse deal with key backups for SSO users? IIRC, the user still gets a normal account inside Synapse, so internally in Synapse they're treated the same as any other user, they just can bypass password login. | 11:22:13 |
Olivier 'reivilibre' | eyes on the changelog please: https://github.com/element-hq/synapse/blob/release-v1.106/CHANGES.md | 13:42:26 |
Mikoto ⚡️ | In reply to@tom:doctoruwu.uk IIRC, the user still gets a normal account inside Synapse, so internally in Synapse they're treated the same as any other user, they just can bypass password login. indeed, guess my question would be better formulated like this: Conduit stores local and remote users (users with on account on other homeservers) in the same database, this is causing some obscure bugs even though my implementation set the password to some random value that is not an argon2 hash for SSO accounts | 14:46:13 |
Mikoto ⚡️ | maybe I should take this discussion to the conduwuit room | 14:46:22 |
Tom Foster [he/him] [conduwuit] | In reply to @mikoto:kurosaki.cx indeed, guess my question would be better formulated like this: Conduit stores local and remote users (users with on account on other homeservers) in the same database, this is causing some obscure bugs even though my implementation set the password to some random value that is not an argon2 hash for SSO accounts This is the Synapse Dev room, yeah... though last time I checked, all Conduit's implementation does is skip password login for a normal local user, so theoretically should work the same way. | 15:38:06 |