diff --git a/synapse/app/federation_reader.py b/synapse/app/federation_reader.py
index 99e8a4cf6a..2c99ce8c64 100644
--- a/synapse/app/federation_reader.py
+++ b/synapse/app/federation_reader.py
@@ -92,7 +92,10 @@ class FederationReaderServer(HomeServer):
# is not specified since federation resource includes openid
# resource.
resources.update({
- FEDERATION_PREFIX: TransportLayerServer(self, servlet_groups=["openid"]),
+ FEDERATION_PREFIX: TransportLayerServer(
+ self,
+ servlet_groups=["openid"],
+ ),
})
root_resource = create_resource_tree(resources, NoResource())
diff --git a/synapse/config/server.py b/synapse/config/server.py
index eebbfccafe..4eefd06f4a 100644
--- a/synapse/config/server.py
+++ b/synapse/config/server.py
@@ -330,7 +330,7 @@ class ServerConfig(Config):
- names: [federation] # Federation APIs
compress: false
-
+
# # If federation is disabled synapse can still expose the open ID endpoint
# # to allow integrations to authenticate users
# - names: [openid]
diff --git a/tests/app/test_openid_listener.py b/tests/app/test_openid_listener.py
index 46a3b61a3c..590abc1e92 100644
--- a/tests/app/test_openid_listener.py
+++ b/tests/app/test_openid_listener.py
@@ -61,7 +61,10 @@ class FederationReaderOpenIDListenerTests(HomeserverTestCase):
return
raise
- request, channel = self.make_request("GET", "/_matrix/federation/v1/openid/userinfo")
+ request, channel = self.make_request(
+ "GET",
+ "/_matrix/federation/v1/openid/userinfo",
+ )
self.render(request)
self.assertEqual(channel.code, 401)
@@ -107,7 +110,10 @@ class SynapseHomeserverOpenIDListenerTests(HomeserverTestCase):
return
raise
- request, channel = self.make_request("GET", "/_matrix/federation/v1/openid/userinfo")
+ request, channel = self.make_request(
+ "GET",
+ "/_matrix/federation/v1/openid/userinfo",
+ )
self.render(request)
self.assertEqual(channel.code, 401)
|