Skip to content
Snippets Groups Projects
  1. Aug 15, 2019
    • Erik Johnston's avatar
      Retry well known on fail. · e6e136de
      Erik Johnston authored
      If we have recently seen a valid well-known for a domain we want to
      retry on (non-final) errors a few times, to handle temporary blips in
      networking/etc.
      e6e136de
  2. Aug 13, 2019
    • Erik Johnston's avatar
      Retry well-known lookup before expiry. · 17e1e807
      Erik Johnston authored
      This gives a bit of a grace period where we can attempt to refetch a
      remote `well-known`, while still using the cached result if that fails.
      
      Hopefully this will make the well-known resolution a bit more torelant
      of failures, rather than it immediately treating failures as "no result"
      and caching that for an hour.
      17e1e807
  3. Aug 07, 2019
  4. Aug 06, 2019
    • Erik Johnston's avatar
      Add a lower bound for TTL on well known results. · af9f1c07
      Erik Johnston authored
      It costs both us and the remote server for us to fetch the well known
      for every single request we send, so we add a minimum cache period. This
      is set to 5m so that we still honour the basic premise of "refetch
      frequently".
      af9f1c07
  5. Jul 31, 2019
  6. Jul 23, 2019
  7. Jul 03, 2019
  8. Jun 24, 2019
  9. Jun 20, 2019
  10. Jun 10, 2019
  11. Jun 06, 2019
    • Richard van der Hoff's avatar
      Stop hardcoding trust of old matrix.org key (#5374) · 9fbb20a5
      Richard van der Hoff authored
      There are a few changes going on here:
      
      * We make checking the signature on a key server response optional: if no
        verify_keys are specified, we trust to TLS to validate the connection.
      
      * We change the default config so that it does not require responses to be
        signed by the old key.
      
      * We replace the old 'perspectives' config with 'trusted_key_servers', which
        is also formatted slightly differently.
      
      * We emit a warning to the logs every time we trust a key server response
        signed by the old key.
      Unverified
      9fbb20a5
  12. Jun 05, 2019
  13. May 13, 2019
  14. May 10, 2019
  15. Apr 25, 2019
  16. Mar 20, 2019
  17. Mar 18, 2019
  18. Mar 13, 2019
  19. Feb 11, 2019
  20. Feb 01, 2019
  21. Jan 31, 2019
  22. Jan 30, 2019
  23. Jan 29, 2019
  24. Jan 28, 2019
    • Richard van der Hoff's avatar
      Handle IP literals explicitly · 0fd5b3b5
      Richard van der Hoff authored
      We don't want to be doing .well-known lookups on these guys.
      0fd5b3b5
    • Richard van der Hoff's avatar
      Fix idna and ipv6 literal handling in MatrixFederationAgent (#4487) · d8400191
      Richard van der Hoff authored
      Turns out that the library does a better job of parsing URIs than our
      reinvented wheel. Who knew.
      
      There are two things going on here. The first is that, unlike
      parse_server_name, URI.fromBytes will strip off square brackets from IPv6
      literals, which means that it is valid input to ClientTLSOptionsFactory and
      HostnameEndpoint.
      
      The second is that we stay in `bytes` throughout (except for the argument to
      ClientTLSOptionsFactory), which avoids the weirdness of (sometimes) ending up
      with idna-encoded values being held in `unicode` variables. TBH it probably
      would have been ok but it made the tests fragile.
      Unverified
      d8400191
  25. Jan 25, 2019
  26. Jan 24, 2019
Loading