Skip to content
This repository was archived by the owner on Apr 26, 2024. It is now read-only.

Commit 9ee3b97

Browse files
authored
Remove deprecated SAML2 callback URL since it does not work. (#9434)
Updates documentation from #9289 and removes a deprecated endpoint which didn't work as expected.
1 parent 90550f5 commit 9ee3b97

File tree

4 files changed

+16
-16
lines changed

4 files changed

+16
-16
lines changed

CHANGES.md

+2
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ Synapse 1.xx.0 (2021-xx-xx)
33

44
Note that this release drops support for ARMv7 in the official Docker images, due to repeated problems building for ARMv7 (and the associated maintenance burden this entails).
55

6+
This release also fixes the documentation included in v1.27.0 around the callback URI for SAML2 identity providers. If your server is configured to use single sign-on via a SAML2 IdP, you may need to make configuration changes. Please review [UPGRADE.rst](UPGRADE.rst) for more details on these changes.
7+
68
Removal warning
79
---------------
810

UPGRADE.rst

+12-11
Original file line numberDiff line numberDiff line change
@@ -88,20 +88,21 @@ for example:
8888
Upgrading to v1.27.0
8989
====================
9090

91-
Changes to callback URI for OAuth2 / OpenID Connect
92-
---------------------------------------------------
91+
Changes to callback URI for OAuth2 / OpenID Connect and SAML2
92+
-------------------------------------------------------------
9393

94-
This version changes the URI used for callbacks from OAuth2 identity providers. If
95-
your server is configured for single sign-on via an OpenID Connect or OAuth2 identity
96-
provider, you will need to add ``[synapse public baseurl]/_synapse/client/oidc/callback``
97-
to the list of permitted "redirect URIs" at the identity provider.
94+
This version changes the URI used for callbacks from OAuth2 and SAML2 identity providers:
9895

99-
See `docs/openid.md <docs/openid.md>`_ for more information on setting up OpenID
100-
Connect.
96+
* If your server is configured for single sign-on via an OpenID Connect or OAuth2 identity
97+
provider, you will need to add ``[synapse public baseurl]/_synapse/client/oidc/callback``
98+
to the list of permitted "redirect URIs" at the identity provider.
10199

102-
(Note: a similar change is being made for SAML2; in this case the old URI
103-
``[synapse public baseurl]/_matrix/saml2`` is being deprecated, but will continue to
104-
work, so no immediate changes are required for existing installations.)
100+
See `docs/openid.md <docs/openid.md>`_ for more information on setting up OpenID
101+
Connect.
102+
103+
* If your server is configured for single sign-on via a SAML2 identity provider, you will
104+
need to add ``[synapse public baseurl]/_synapse/client/saml2/authn_response`` as a permitted
105+
"ACS location" (also known as "allowed callback URLs") at the identity provider.
105106

106107
Changes to HTML templates
107108
-------------------------

changelog.d/9434.doc

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Fix erroneous documentation from v1.27.0 about updating the SAML2 callback URL.

synapse/rest/synapse/client/__init__.py

+1-5
Original file line numberDiff line numberDiff line change
@@ -54,11 +54,7 @@ def build_synapse_client_resource_tree(hs: "HomeServer") -> Mapping[str, Resourc
5454
if hs.config.saml2_enabled:
5555
from synapse.rest.synapse.client.saml2 import SAML2Resource
5656

57-
res = SAML2Resource(hs)
58-
resources["/_synapse/client/saml2"] = res
59-
60-
# This is also mounted under '/_matrix' for backwards-compatibility.
61-
resources["/_matrix/saml2"] = res
57+
resources["/_synapse/client/saml2"] = SAML2Resource(hs)
6258

6359
return resources
6460

0 commit comments

Comments
 (0)