- Oct 09, 2020
-
-
Patrick Cloke authored
All handlers now available via get_*_handler() methods on the HomeServer.
-
- Sep 28, 2020
-
-
Richard van der Hoff authored
-
- Sep 25, 2020
-
-
Richard van der Hoff authored
* Fix test_verify_json_objects_for_server_awaits_previous_requests It turns out that this wasn't really testing what it thought it was testing (in particular, `check_context` was turning failures into success, which was making the tests pass even though it wasn't clear they should have been. It was also somewhat overcomplex - we can test what it was trying to test without mocking out perspectives servers. * Fix warnings about finished logcontexts in the keyring We need to make sure that we finish the key fetching magic before we run the verifying code, to ensure that we don't mess up our logcontexts.
-
- Sep 04, 2020
-
-
Patrick Cloke authored
-
- Aug 27, 2020
-
-
Patrick Cloke authored
-
- Aug 03, 2020
-
-
Patrick Cloke authored
-
- Jul 30, 2020
-
-
Patrick Cloke authored
-
- Jul 09, 2020
-
-
Patrick Cloke authored
-
- Mar 24, 2020
-
-
Richard van der Hoff authored
* Pull Sentinel out of LoggingContext ... and drop a few unnecessary references to it * Factor out LoggingContext.current_context move `current_context` and `set_context` out to top-level functions. Mostly this means that I can more easily trace what's actually referring to LoggingContext, but I think it's generally neater. * move copy-to-parent into `stop` this really just makes `start` and `stop` more symetric. It also means that it behaves correctly if you manually `set_log_context` rather than using the context manager. * Replace `LoggingContext.alive` with `finished` Turn `alive` into `finished` and make it a bit better defined.
-
- Feb 07, 2020
-
-
Richard van der Hoff authored
... and use it in places where it's trivial to do so. This will make it easier to pass room versions into the FrozenEvent constructors.
-
- Jan 30, 2020
-
-
Richard van der Hoff authored
-
- Jan 06, 2020
-
-
Richard van der Hoff authored
Lift the restriction that *all* the keys used for signing v2 key responses be present in verify_keys. Fixes #6596.
-
- Oct 30, 2019
-
-
Erik Johnston authored
-
- Jul 23, 2019
-
-
Amber Brown authored
-
- Jul 19, 2019
-
-
Richard van der Hoff authored
There's an awful lot of deferreds and dictionaries flying around here. The whole thing can be made much simpler and achieve the same effect.
-
- Jul 03, 2019
-
-
Amber Brown authored
-
- Jun 20, 2019
-
-
Amber Brown authored
-
- Jun 10, 2019
-
-
Erik Johnston authored
Some keys are stored in the synapse database with a null valid_until_ms which caused an exception to be thrown when using that key. We fix this by treating nulls as zeroes, i.e. they keys will match verification requests with a minimum_valid_until_ms of zero (i.e. don't validate ts) but will not match requests with a non-zero minimum_valid_until_ms. Fixes #5391.
-
- Jun 06, 2019
-
-
Richard van der Hoff authored
There are a few changes going on here: * We make checking the signature on a key server response optional: if no verify_keys are specified, we trust to TLS to validate the connection. * We change the default config so that it does not require responses to be signed by the old key. * We replace the old 'perspectives' config with 'trusted_key_servers', which is also formatted slightly differently. * We emit a warning to the logs every time we trust a key server response signed by the old key.
-
- Jun 05, 2019
-
-
Richard van der Hoff authored
Also: * rename VerifyKeyRequest->VerifyJsonRequest * calculate key_ids on VerifyJsonRequest construction * refactor things to pass around VerifyJsonRequests instead of 4-tuples
-
- Jun 03, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
When handling incoming federation requests, make sure that we have an up-to-date copy of the signing key. We do not yet enforce the validity period for event signatures.
-
- May 24, 2019
-
-
Richard van der Hoff authored
The list of server names was redundant, since it was equivalent to the keys on the server_to_deferred map. This reduces the number of large lists being passed around, and has the benefit of deduplicating the entries in `wait_on`.
-
- May 23, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
Rather than have three methods which have to have the same interface, factor out a separate interface which is provided by three implementations. I find it easier to grok the code this way.
-
Richard van der Hoff authored
This is a first step to checking that the key is valid at the required moment. The idea here is that, rather than passing VerifyKey objects in and out of the storage layer, we instead pass FetchKeyResult objects, which simply wrap the VerifyKey and add a valid_until_ts field.
-
Richard van der Hoff authored
Storing server keys hammered the database a bit. This replaces the implementation which stored a single key, with one which can do many updates at once.
-
- May 10, 2019
-
-
Amber Brown authored
-
- Apr 11, 2019
-
-
Andrew Morgan authored
-
- Apr 08, 2019
-
-
Richard van der Hoff authored
make sure we store the name of the server the keys came from, rather than the origin server, after doing a fetch-from-perspectives.
-
- Apr 04, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Apr 03, 2019
-
-
Richard van der Hoff authored
This is a bit fiddly due to the keyring doing weird things with logcontexts.
-
- Jan 29, 2019
-
-
Erik Johnston authored
-
- Nov 27, 2018
-
-
Richard van der Hoff authored
* Add better diagnostics to flakey keyring test * fix interpolation fail * Check logcontexts before and after each test * update changelog * update changelog
-
- Aug 13, 2018
-
-
Amber Brown authored
-
- Aug 10, 2018
-
-
Amber Brown authored
-
black authored
-
- Jul 09, 2018
-
-
Amber Brown authored
-
- Jun 22, 2018
-
-
Amber Brown authored
-