-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Decouple access token tracking from device tracking #89
Comments
Probably not as it hurts self-healing. If Synapse returns a 401/403 for some other reason and we mark the token as expired, but it isn't really, then we break the client until they refresh their token. If instead we don't mark it as expired, then yes we will stop polling due to the 401/403, but they can "kick" the server by using the token again, which will then hopefully return 200 OK when used again. The cost of this is a /whoami call but that feels fine to me. |
Do we need to invalidate though? In the general case, expired tokens won't be used anymore by clients. We don't need to eagerly update the cache when we get 401/403d from a poller. This is similar to the above point, as it again allows clients to kick/refresh/reset things by using the token again (though in the general case we wouldn't expect them to). The risk with this though is that we are then creating >1 token which can be used to access the user's data, which is completely antithetical to refreshing tokens in the first place :/ bah. |
Plan to work on the dmr/oidc branch for this.
|
This is causing cyclic import pain. Remove it, rather than port it to the newer migration infrastructure. This means that users must run the migration before upgrading to the any version which includes this change.
A step towards #51.
Use:
Rationale:
Implementation:
since
parameter in particular.Questions:
expired BOOLEAN NOT NULL
field?The text was updated successfully, but these errors were encountered: