Compare commits

...

1 Commits

Author SHA1 Message Date
Quentin Gliech
9b40b33263 Do not check for internal account lock for MSC3861 delegated auth 2023-08-31 13:24:20 +03:00
2 changed files with 1 additions and 11 deletions

1
changelog.d/16215.bugfix Normal file
View File

@@ -0,0 +1 @@
Fix a bug where admin tokens stopped working with MSC3861 auth delegation was enabled.

View File

@@ -282,17 +282,6 @@ class MSC3861DelegatedAuth(BaseAuth):
"Impersonation not possible by a non admin user",
)
# Deny the request if the user account is locked.
if not allow_locked and await self.store.get_user_locked_status(
requester.user.to_string()
):
raise AuthError(
401,
"User account has been locked",
errcode=Codes.USER_LOCKED,
additional_fields={"soft_logout": True},
)
if not allow_guest and requester.is_guest:
raise OAuthInsufficientScopeError([SCOPE_MATRIX_API])