Skip to content
This repository was archived by the owner on Apr 26, 2024. It is now read-only.

Commit 25939d2

Browse files
committed
Move msc2858 to an experimental config section
1 parent b587fd0 commit 25939d2

6 files changed

Lines changed: 42 additions & 10 deletions

File tree

synapse/config/_base.pyi

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ from synapse.config import (
99
consent_config,
1010
database,
1111
emailconfig,
12+
experimental,
1213
groups,
1314
jwt_config,
1415
key,
@@ -48,6 +49,7 @@ def path_exists(file_path: str): ...
4849

4950
class RootConfig:
5051
server: server.ServerConfig
52+
experimental: experimental.ExperimentalConfig
5153
tls: tls.TlsConfig
5254
database: database.DatabaseConfig
5355
logging: logger.LoggingConfig

synapse/config/experimental.py

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
# -*- coding: utf-8 -*-
2+
# Copyright 2021 The Matrix.org Foundation C.I.C.
3+
#
4+
# Licensed under the Apache License, Version 2.0 (the "License");
5+
# you may not use this file except in compliance with the License.
6+
# You may obtain a copy of the License at
7+
#
8+
# http://www.apache.org/licenses/LICENSE-2.0
9+
#
10+
# Unless required by applicable law or agreed to in writing, software
11+
# distributed under the License is distributed on an "AS IS" BASIS,
12+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
# See the License for the specific language governing permissions and
14+
# limitations under the License.
15+
16+
from synapse.config._base import Config
17+
from synapse.types import JsonDict
18+
19+
20+
class ExperimentalConfig(Config):
21+
"""Config section for enabling experimental features"""
22+
23+
section = "experimental"
24+
25+
# MSC2858 (multiple SSO identity providers)
26+
msc2858_enabled = False
27+
28+
def read_config(self, config: JsonDict, **kwargs):
29+
experimental = config.get("experimental_features")
30+
if not experimental:
31+
return
32+
33+
self.msc2858_enabled = experimental.get("msc2858_enabled", False)

synapse/config/homeserver.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@
2424
from .consent_config import ConsentConfig
2525
from .database import DatabaseConfig
2626
from .emailconfig import EmailConfig
27+
from .experimental import ExperimentalConfig
2728
from .federation import FederationConfig
2829
from .groups import GroupsConfig
2930
from .jwt_config import JWTConfig
@@ -57,6 +58,7 @@ class HomeServerConfig(RootConfig):
5758

5859
config_classes = [
5960
ServerConfig,
61+
ExperimentalConfig,
6062
TlsConfig,
6163
FederationConfig,
6264
CacheConfig,

synapse/config/sso.py

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -67,11 +67,6 @@ def read_config(self, config, **kwargs):
6767
login_fallback_url = self.public_baseurl + "_matrix/static/client/login"
6868
self.sso_client_whitelist.append(login_fallback_url)
6969

70-
# experimental support for MSC2858 (multiple SSO identity providers)
71-
self.experimental_msc2858_support_enabled = config.get(
72-
"experimental_msc2858_support_enabled", False
73-
)
74-
7570
def generate_config_section(self, **kwargs):
7671
return """\
7772
# Additional settings to use with single-sign on systems such as OpenID Connect,

synapse/rest/client/v1/login.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ def __init__(self, hs: "HomeServer"):
6161
self.saml2_enabled = hs.config.saml2_enabled
6262
self.cas_enabled = hs.config.cas_enabled
6363
self.oidc_enabled = hs.config.oidc_enabled
64-
self._msc2858_enabled = hs.config.sso.experimental_msc2858_support_enabled
64+
self._msc2858_enabled = hs.config.experimental.msc2858_enabled
6565

6666
self.auth = hs.get_auth()
6767

@@ -349,7 +349,7 @@ def __init__(self, hs: "HomeServer"):
349349
if hs.config.oidc_enabled:
350350
hs.get_oidc_handler()
351351
self._sso_handler = hs.get_sso_handler()
352-
self._msc2858_enabled = hs.config.sso.experimental_msc2858_support_enabled
352+
self._msc2858_enabled = hs.config.experimental.msc2858_enabled
353353

354354
def register(self, http_server: HttpServer) -> None:
355355
super().register(http_server)

tests/rest/client/v1/test_login.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -444,7 +444,7 @@ def test_get_login_flows(self):
444444

445445
self.assertCountEqual(channel.json_body["flows"], expected_flows)
446446

447-
@override_config({"experimental_msc2858_support_enabled": True})
447+
@override_config({"experimental_features": {"msc2858_enabled": True}})
448448
def test_get_msc2858_login_flows(self):
449449
"""The SSO flow should include IdP info if MSC2858 is enabled"""
450450
channel = self.make_request("GET", "/_matrix/client/r0/login")
@@ -629,7 +629,7 @@ def test_client_idp_redirect_msc2858_disabled(self):
629629
self.assertEqual(channel.code, 400, channel.result)
630630
self.assertEqual(channel.json_body["errcode"], "M_UNRECOGNIZED")
631631

632-
@override_config({"experimental_msc2858_support_enabled": True})
632+
@override_config({"experimental_features": {"msc2858_enabled": True}})
633633
def test_client_idp_redirect_to_unknown(self):
634634
"""If the client tries to pick an unknown IdP, return a 404"""
635635
channel = self.make_request(
@@ -640,7 +640,7 @@ def test_client_idp_redirect_to_unknown(self):
640640
self.assertEqual(channel.code, 404, channel.result)
641641
self.assertEqual(channel.json_body["errcode"], "M_NOT_FOUND")
642642

643-
@override_config({"experimental_msc2858_support_enabled": True})
643+
@override_config({"experimental_features": {"msc2858_enabled": True}})
644644
def test_client_idp_redirect_to_oidc(self):
645645
"""If the client pick a known IdP, redirect to it"""
646646
channel = self.make_request(

0 commit comments

Comments
 (0)