Moritz Poldrack

Results 109 comments of Moritz Poldrack

Leaving said private chat is also not possible: ``` level=info msg="User requested to leave join" room_id="!RooMIdeNTIfIEr:server.com" user_id="@user:server.com" level=error msg="Failed to leave room" error="user \"@user:server.com\" is not a member of room...

Since these are private chat rooms it's not that easy to rejoin…

okay, now for the scariest part…

A number of these can probably be added to the [`.git-blame-ignore-revs`](https://docs.github.com/en/repositories/working-with-files/using-files/viewing-a-file#ignore-commits-in-the-blame-view) file

Note: I do not feel comfortable doing the UI part, so I would request assistance on that part.

In order to enhance the user experience of offen when an OIDC provider is available by implementing Single Sign-On (SSO) with OpenID Connect (OIDC), this way users can seamlessly log...

Thank you for the review. In OIDC something like this is returned: ```json { "iss": "https://id.moritz.sh/application/o/codimd/", "sub": "1af2deecbcff74e06f140b10373d0907f3436f0c9451fe24df5c5e5963ebeb29", "aud": "b7bFpUvCVbUN00eNCFrNI6dyaYpCJcwuWT2gtCzm", "exp": 1704413169, "iat": 1704411369, "auth_time": 1704411369, "acr": "goauthentik.io/providers/oauth2/default", "amr": [...

> should a deployment support users signing in with OIDC and default user accounts, or should a deployment always use a single method I would argue that it's the latter....

I will likely be able to get back to it in May :)

Since this is technically a DoS vulnerability, I just took the liberty of calculating its score. ![image](https://github.com/t2bot/matrix-media-repo/assets/33086936/61dd5c7e-fbf4-44e2-ba40-01d90ff33833)