- Mar 20, 2019
-
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
- Mar 18, 2019
-
-
Andrew Morgan authored
-
- Mar 13, 2019
-
-
Andrew Morgan authored
-
Andrew Morgan authored
-
Andrew Morgan authored
-
- Feb 11, 2019
-
-
Richard van der Hoff authored
It's nothing to do with refreshing the certificates. No idea why it was here.
-
- Feb 01, 2019
-
-
Richard van der Hoff authored
... basically, carry on and fall back to SRV etc.
-
- Jan 31, 2019
-
-
Richard van der Hoff authored
-
- Jan 30, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
- Jan 29, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
two reasons for this. One, it saves a bunch of boilerplate. Two, it squashes unicode to IDNA-in-a-`str` (even on python 3) in a way that it turns out we rely on to give consistent behaviour between python 2 and 3.
-
- Jan 28, 2019
-
-
Richard van der Hoff authored
We don't want to be doing .well-known lookups on these guys.
-
Richard van der Hoff authored
Turns out that the library does a better job of parsing URIs than our reinvented wheel. Who knew. There are two things going on here. The first is that, unlike parse_server_name, URI.fromBytes will strip off square brackets from IPv6 literals, which means that it is valid input to ClientTLSOptionsFactory and HostnameEndpoint. The second is that we stay in `bytes` throughout (except for the argument to ClientTLSOptionsFactory), which avoids the weirdness of (sometimes) ending up with idna-encoded values being held in `unicode` variables. TBH it probably would have been ok but it made the tests fragile.
-
- Jan 25, 2019
-
-
Richard van der Hoff authored
Move the Host header logic down here so that (a) it is used if we reuse the agent elsewhere, and (b) we can mess about with it with .well-known.
-
- Jan 24, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
-
Richard van der Hoff authored
The problem here is that we have cut-and-pasted an impl from Twisted, and then failed to maintain it. It was fixed in Twisted in https://github.com/twisted/twisted/pull/1047/files; let's do the same here.
-
- Jan 22, 2019
-
-
Richard van der Hoff authored
-
Richard van der Hoff authored
this makes it easier to stub things out for tests.
-
Richard van der Hoff authored
it is only ever a bytes now, so let's enforce that.
-
Richard van der Hoff authored
... instead of the matrix_federation_endpoint
-
Richard van der Hoff authored
-
- Jan 18, 2019
-
-
Richard van der Hoff authored
* Remove redundant WrappedConnection The matrix federation client uses an HTTP connection pool, which times out its idle HTTP connections, so there is no need for any of this business.
-
- Jan 08, 2019
-
-
Erik Johnston authored
* Correctly retry and back off if we get a HTTPerror response * Refactor request sending to have better excpetions MatrixFederationHttpClient blindly reraised exceptions to the caller without differentiating "expected" failures (e.g. connection timeouts etc) versus more severe problems (e.g. programming errors). This commit adds a RequestSendFailed exception that is raised when "expected" failures happen, allowing the TransactionQueue to log them as warnings while allowing us to log other exceptions as actual exceptions.
-
- Sep 24, 2018
-
-
Oleg Girko authored
Older Twisted (18.4.0) returns TimeoutError instead of ConnectingCancelledError when connection times out. This change allows tests to be compatible with this behaviour. Signed-off-by:
Oleg Girko <ol@infoserver.lv>
-
- Sep 18, 2018
-
-
Richard van der Hoff authored
We want to wait until we have read the response body before we log the request as complete, otherwise a confusing thing happens where the request appears to have completed, but we later fail it. To do this, we factor the salient details of a request out to a separate object, which can then keep track of the txn_id, so that it can be logged.
-
- Sep 13, 2018
-
-
Amber Brown authored
-
- Aug 10, 2018
-
-
black authored
-
- Jul 09, 2018
-
-
Amber Brown authored
-
- Jul 04, 2018
-
-
Richard van der Hoff authored
We need to do a bit more validation when we get a server name, but don't want to be re-doing it all over the shop, so factor out a separate parse_and_validate_server_name, and do the extra validation. Also, use it to verify the server name in the config file.
-
- Jul 03, 2018
-
-
Richard van der Hoff authored
Make sure that server_names used in auth headers are sane, and reject them with a sensible error code, before they disappear off into the depths of the system.
-