summary refs log tree commit diff
path: root/synapse/rest/key (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Fixup synapse.rest to pass mypy (#6732)Erik Johnston2020-01-201-2/+3
|
* Back out ill-advised notary server hackery (#6657)Richard van der Hoff2020-01-081-22/+8
| | | | | | | | | | | This was ill-advised. We can't modify verify_keys here, because the response object has already been signed by the requested key. Furthermore, it's somewhat unnecessary because existing versions of Synapse (which get upset that the notary key isn't present in verify_keys) will fall back to a direct fetch via `/key/v2/server`. Also: more tests for fetching keys via perspectives: it would be nice if we actually tested when our fetcher can't talk to our notary impl.
* Workaround for error when fetching notary's own key (#6620)Richard van der Hoff2020-01-061-8/+22
| | | | | | | | | | | | | | * Kill off redundant SynapseRequestFactory We already get the Site via the Channel, so there's no need for a dedicated RequestFactory: we can just use the right constructor. * Workaround for error when fetching notary's own key As a notary server, when we return our own keys, include all of our signing keys in verify_keys. This is a workaround for #6596.
* Update black to 19.10b0 (#6304)Amber Brown2019-11-011-1/+1
| | | * update version of black and also fix the mypy config being overridden
* Fixup review commentsErik Johnston2019-08-231-2/+2
|
* Only sign when we respond to remote key requestsErik Johnston2019-08-211-13/+15
|
* Make the http server handle coroutine-making REST servlets (#5475)Amber Brown2019-06-291-18/+10
|
* Run Black. (#5482)Amber Brown2019-06-202-46/+38
|
* Notary server: make requests to origins in parallelRichard van der Hoff2019-06-041-10/+2
| | | | ... else we're guaranteed to time out.
* Fix remote_key_resourceRichard van der Hoff2019-05-231-3/+3
|
* Remove deprecated v1 key exchange endpoint (#4119)Amber Brown2018-10-312-106/+0
|
* Port rest/ to Python 3 (#3823)Amber Brown2018-09-123-5/+7
|
* run isortAmber Brown2018-07-094-17/+20
|
* Set Server header in SynapseRequestRichard van der Hoff2018-05-103-6/+0
| | | | | | | | | | | | (instead of everywhere that writes a response. Or rather, the subset of places which write responses where we haven't forgotten it). This also means that we don't have to have the mysterious version_string attribute in anything with a request handler. Unfortunately it does mean that we have to pass the version string wherever we instantiate a SynapseSite, which has been c&ped 150 times, but that is code that ought to be cleaned up anyway really.
* Remove redundant request_handler decoratorRichard van der Hoff2018-05-101-3/+5
| | | | | | This is needless complexity; we might as well use the wrapper directly. Also rename wrap_request_handler->wrap_json_request_handler.
* Add federation_domain_whitelist option (#2820)Matthew Hodgson2018-01-221-0/+8
| | | | | | Add federation_domain_whitelist gives a way to restrict which domains your HS is allowed to federate with. useful mainly for gracefully preventing a private but internet-connected HS from trying to federate to the wider public Matrix network
* replace 'except:' with 'except Exception:'Richard van der Hoff2017-10-231-1/+1
| | | | what could possibly go wrong
* Fix code for reporting old verify keys in synapseMark Haines2017-04-241-3/+2
|
* Improve comment formattingMark Haines2016-10-121-3/+6
|
* Add config option for adding additional TLS fingerprintsMark Haines2016-10-111-12/+4
|
* Don't print stack traces when failing to get remote keysErik Johnston2016-08-101-1/+3
|
* Report per request metrics for all of the things using request_handlerMark Haines2016-04-282-3/+2
|
* Use parse_json_object_from_request to parse JSON out of request bodiesMark Haines2016-03-111-10/+2
|
* copyrightsMatthew Hodgson2016-01-076-6/+6
|
* Remove syutil dependency in favour of smaller single-purpose librariesMark Haines2015-08-242-6/+6
|
* Implement minimum_valid_until_ts in the remote key resourceMark Haines2015-04-291-4/+55
|
* Copyright noticeMark Haines2015-04-241-0/+14
|
* Update to match the specification for key/v2Mark Haines2015-04-232-19/+24
|
* Implement remote key lookup apiMark Haines2015-04-223-8/+185
|
* Implement v2 key lookupMark Haines2015-04-201-1/+3
|
* Return a sha256 fingerprint rather than the entire tls certificateMark Haines2015-04-141-2/+8
|
* Add a version 2 of the key server apiMark Haines2015-04-142-0/+137
|
* Move server key api into rest/key/v1Mark Haines2015-04-143-0/+121