Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Convert remote key resource REST layer to async/await. (#7020) | Patrick Cloke | 2020-03-05 | 1 | -7/+4 |
| | |||||
* | Clarify list/set/dict/tuple comprehensions and enforce via flake8 (#6957) | Patrick Cloke | 2020-02-21 | 1 | -1/+1 |
| | | | | Ensure good comprehension hygiene using flake8-comprehensions. | ||||
* | Fixup synapse.rest to pass mypy (#6732) | Erik Johnston | 2020-01-20 | 1 | -2/+3 |
| | |||||
* | Back out ill-advised notary server hackery (#6657) | Richard van der Hoff | 2020-01-08 | 1 | -22/+8 |
| | | | | | | | | | | | This was ill-advised. We can't modify verify_keys here, because the response object has already been signed by the requested key. Furthermore, it's somewhat unnecessary because existing versions of Synapse (which get upset that the notary key isn't present in verify_keys) will fall back to a direct fetch via `/key/v2/server`. Also: more tests for fetching keys via perspectives: it would be nice if we actually tested when our fetcher can't talk to our notary impl. | ||||
* | Workaround for error when fetching notary's own key (#6620) | Richard van der Hoff | 2020-01-06 | 1 | -8/+22 |
| | | | | | | | | | | | | | | * Kill off redundant SynapseRequestFactory We already get the Site via the Channel, so there's no need for a dedicated RequestFactory: we can just use the right constructor. * Workaround for error when fetching notary's own key As a notary server, when we return our own keys, include all of our signing keys in verify_keys. This is a workaround for #6596. | ||||
* | Update black to 19.10b0 (#6304) | Amber Brown | 2019-11-01 | 1 | -1/+1 |
| | | | * update version of black and also fix the mypy config being overridden | ||||
* | Fixup review comments | Erik Johnston | 2019-08-23 | 1 | -2/+2 |
| | |||||
* | Only sign when we respond to remote key requests | Erik Johnston | 2019-08-21 | 1 | -13/+15 |
| | |||||
* | Make the http server handle coroutine-making REST servlets (#5475) | Amber Brown | 2019-06-29 | 1 | -18/+10 |
| | |||||
* | Run Black. (#5482) | Amber Brown | 2019-06-20 | 2 | -46/+38 |
| | |||||
* | Notary server: make requests to origins in parallel | Richard van der Hoff | 2019-06-04 | 1 | -10/+2 |
| | | | | ... else we're guaranteed to time out. | ||||
* | Fix remote_key_resource | Richard van der Hoff | 2019-05-23 | 1 | -3/+3 |
| | |||||
* | Port rest/ to Python 3 (#3823) | Amber Brown | 2018-09-12 | 2 | -4/+6 |
| | |||||
* | run isort | Amber Brown | 2018-07-09 | 3 | -13/+14 |
| | |||||
* | Set Server header in SynapseRequest | Richard van der Hoff | 2018-05-10 | 2 | -4/+0 |
| | | | | | | | | | | | | (instead of everywhere that writes a response. Or rather, the subset of places which write responses where we haven't forgotten it). This also means that we don't have to have the mysterious version_string attribute in anything with a request handler. Unfortunately it does mean that we have to pass the version string wherever we instantiate a SynapseSite, which has been c&ped 150 times, but that is code that ought to be cleaned up anyway really. | ||||
* | Remove redundant request_handler decorator | Richard van der Hoff | 2018-05-10 | 1 | -3/+5 |
| | | | | | | This is needless complexity; we might as well use the wrapper directly. Also rename wrap_request_handler->wrap_json_request_handler. | ||||
* | Add federation_domain_whitelist option (#2820) | Matthew Hodgson | 2018-01-22 | 1 | -0/+8 |
| | | | | | | Add federation_domain_whitelist gives a way to restrict which domains your HS is allowed to federate with. useful mainly for gracefully preventing a private but internet-connected HS from trying to federate to the wider public Matrix network | ||||
* | replace 'except:' with 'except Exception:' | Richard van der Hoff | 2017-10-23 | 1 | -1/+1 |
| | | | | what could possibly go wrong | ||||
* | Fix code for reporting old verify keys in synapse | Mark Haines | 2017-04-24 | 1 | -3/+2 |
| | |||||
* | Improve comment formatting | Mark Haines | 2016-10-12 | 1 | -3/+6 |
| | |||||
* | Add config option for adding additional TLS fingerprints | Mark Haines | 2016-10-11 | 1 | -12/+4 |
| | |||||
* | Don't print stack traces when failing to get remote keys | Erik Johnston | 2016-08-10 | 1 | -1/+3 |
| | |||||
* | Report per request metrics for all of the things using request_handler | Mark Haines | 2016-04-28 | 1 | -2/+2 |
| | |||||
* | Use parse_json_object_from_request to parse JSON out of request bodies | Mark Haines | 2016-03-11 | 1 | -10/+2 |
| | |||||
* | copyrights | Matthew Hodgson | 2016-01-07 | 3 | -3/+3 |
| | |||||
* | Remove syutil dependency in favour of smaller single-purpose libraries | Mark Haines | 2015-08-24 | 1 | -3/+3 |
| | |||||
* | Implement minimum_valid_until_ts in the remote key resource | Mark Haines | 2015-04-29 | 1 | -4/+55 |
| | |||||
* | Copyright notice | Mark Haines | 2015-04-24 | 1 | -0/+14 |
| | |||||
* | Update to match the specification for key/v2 | Mark Haines | 2015-04-23 | 2 | -19/+24 |
| | |||||
* | Implement remote key lookup api | Mark Haines | 2015-04-22 | 3 | -8/+185 |
| | |||||
* | Implement v2 key lookup | Mark Haines | 2015-04-20 | 1 | -1/+3 |
| | |||||
* | Return a sha256 fingerprint rather than the entire tls certificate | Mark Haines | 2015-04-14 | 1 | -2/+8 |
| | |||||
* | Add a version 2 of the key server api | Mark Haines | 2015-04-14 | 2 | -0/+137 |