- Nov 18, 2022
-
-
David Robertson authored
Co-authored-by:
Patrick Cloke <clokep@users.noreply.github.com>
-
- Jun 01, 2022
-
-
Jacek Kuśnierz authored
-
- Mar 29, 2022
-
-
David Robertson authored
-
- Feb 28, 2022
-
-
Patrick Cloke authored
-
- Feb 23, 2022
-
-
Richard van der Hoff authored
The presence of this method was confusing, and mostly present for backwards compatibility. Let's get rid of it. Part of #11733
-
- Jan 12, 2022
-
-
David Robertson authored
* Deal with mypy errors w/ type-hinted pynacl 1.5.0 Fixes #11644. I really don't like that we're monkey patching pynacl SignedKey instances with alg and version objects. But I'm too scared to make the changes necessary right now. (Ideally I would replace `signedjson.types.SingingKey` with a runtime class which wraps or inherits from `nacl.signing.SigningKey`.) C.f. https://github.com/matrix-org/python-signedjson/issues/16
-
- Jan 10, 2022
-
-
David Robertson authored
* Deal with mypy errors w/ type-hinted pynacl 1.5.0 Fixes #11644. I really don't like that we're monkey patching pynacl SignedKey instances with alg and version objects. But I'm too scared to make the changes necessary right now. (Ideally I would replace `signedjson.types.SingingKey` with a runtime class which wraps or inherits from `nacl.signing.SigningKey`.) C.f. https://github.com/matrix-org/python-signedjson/issues/16
-
- Dec 14, 2021
-
-
Olivier Wilkinson (reivilibre) authored
This reverts commit 158d73eb.
-
- Dec 07, 2021
-
-
Sean Quah authored
Revert "Sort internal changes in changelog" Revert "Update CHANGES.md" Revert "1.49.0rc1" Revert "Revert "Move `glob_to_regex` and `re_word_boundary` to `matrix-python-common` (#11505) (#11527)" Revert "Refactors in `_generate_sync_entry_for_rooms` (#11515)" Revert "Correctly register shutdown handler for presence workers (#11518)" Revert "Fix `ModuleApi.looping_background_call` for non-async functions (#11524)" Revert "Fix 'delete room' admin api to work on incomplete rooms (#11523)" Revert "Correctly ignore invites from ignored users (#11511)" Revert "Fix the test breakage introduced by #11435 as a result of concurrent PRs (#11522)" Revert "Stabilise support for MSC2918 refresh tokens as they have now been merged into the Matrix specification. (#11435)" Revert "Save the OIDC session ID (sid) with the device on login (#11482)" Revert "Add admin API to get some information about federation status (#11407)" Revert "Include bundled aggregations in /sync and related fixes (#11478)" Revert "Move `glob_to_regex` and `re_word_boundary` to `matrix-python-common` (#11505)" Revert "Update backward extremity docs to make it clear that it does not indicate whether we have fetched an events' `prev_events` (#11469)" Revert "Support configuring the lifetime of non-refreshable access tokens separately to refreshable access tokens. (#11445)" Revert "Add type hints to `synapse/tests/rest/admin` (#11501)" Revert "Revert accidental commits to develop." Revert "Newsfile" Revert "Give `tests.server.setup_test_homeserver` (nominally!) the same behaviour" Revert "Move `tests.utils.setup_test_homeserver` to `tests.server`" Revert "Convert one of the `setup_test_homeserver`s to `make_test_homeserver_synchronous`" Revert "Disambiguate queries on `state_key` (#11497)" Revert "Comments on the /sync tentacles (#11494)" Revert "Clean up tests.storage.test_appservice (#11492)" Revert "Clean up `tests.storage.test_main` to remove use of legacy code. (#11493)" Revert "Clean up `tests.test_visibility` to remove legacy code. (#11495)" Revert "Minor cleanup on recently ported doc pages (#11466)" Revert "Add most of the missing type hints to `synapse.federation`. (#11483)" Revert "Avoid waiting for zombie processes in `synctl stop` (#11490)" Revert "Fix media repository failing when media store path contains symlinks (#11446)" Revert "Add type annotations to `tests.storage.test_appservice`. (#11488)" Revert "`scripts-dev/sign_json`: support for signing events (#11486)" Revert "Add MSC3030 experimental client and federation API endpoints to get the closest event to a given timestamp (#9445)" Revert "Port wiki pages to documentation website (#11402)" Revert "Add a license header and comment. (#11479)" Revert "Clean-up get_version_string (#11468)" Revert "Link background update controller docs to summary (#11475)" Revert "Additional type hints for config module. (#11465)" Revert "Register the login redirect endpoint for v3. (#11451)" Revert "Update openid.md" Revert "Remove mention of OIDC certification from Dex (#11470)" Revert "Add a note about huge pages to our Postgres doc (#11467)" Revert "Don't start Synapse master process if `worker_app` is set (#11416)" Revert "Expose worker & homeserver as entrypoints in `setup.py` (#11449)" Revert "Bundle relations of relations into the `/relations` result. (#11284)" Revert "Fix `LruCache` corruption bug with a `size_callback` that can return 0 (#11454)" Revert "Eliminate a few `Any`s in `LruCache` type hints (#11453)" Revert "Remove unnecessary `json.dumps` from `tests.rest.admin` (#11461)" Revert "Merge branch 'master' into develop" This reverts commit 26b5d232. This reverts commit bce4220f. This reverts commit 966b5d0f. This reverts commit 088d748f. This reverts commit 14d593f7. This reverts commit 2a3ec6fa. This reverts commit eccc49d7. This reverts commit b1ecd19c. This reverts commit 9c55dedc. This reverts commit 2d42e586. This reverts commit 2f053f3f. This reverts commit a15a893d. This reverts commit 8b4b153c. This reverts commit 494ebd73. This reverts commit a77c3698. This reverts commit 4eb77965. This reverts commit 637df95d. This reverts commit e5f426cd. This reverts commit 8cd68b81. This reverts commit 6cae125e. This reverts commit 7be88fbf. This reverts commit b3fd99b7. This reverts commit f7ec6e7d. This reverts commit 5640992d. This reverts commit d26808dd. This reverts commit f91624a5. This reverts commit 16d39a54. This reverts commit 8a4c2969. This reverts commit 49e1356e. This reverts commit d2279f47. This reverts commit b50e39df. This reverts commit 858d80bf. This reverts commit 435f0448. This reverts commit f61462e1. This reverts commit a6f1a3ab. This reverts commit 84dc50e1. This reverts commit ed635d32. This reverts commit 7b62791e. This reverts commit 153194c7. This reverts commit f44d729d. This reverts commit a265fbd3. This reverts commit b9fef1a7. This reverts commit b0eb64ff. This reverts commit f1795463. This reverts commit 70cbb1a5. This reverts commit 42bf0204. This reverts commit 379f2650. This reverts commit 7ff22d6d. This reverts commit 5a0b652d. This reverts commit 432a174b. This reverts commit b14f8a1b, reversing changes made to e713855d.
-
- Nov 29, 2021
-
-
Richard van der Hoff authored
If we tried to request multiple keys for the same server, we would end up dropping some of those requests.
-
- Nov 19, 2021
-
-
Richard van der Hoff authored
Fixes a bug introduced in #11129: objects signed by the local server, but with keys other than the current one, could not be successfully verified. We need to check the key id in the signature, and track down the right key.
-
- Oct 28, 2021
-
-
Shay authored
Fetch verify key locally rather than trying to do so over federation if origin and host are the same. (#11129) * add tests for fetching key locally * add logic to check if origin server is same as host and fetch verify key locally rather than over federation * add changelog * slight refactor, add docstring, change changelog entry * Make changelog entry one line * remove verify_json_locally and push locality check to process_request, add function process_request_locally * remove leftover code reference * refactor to add common call to 'verify_json and associated handling code * add type hint to process_json * add some docstrings + very slight refactor
-
- Jun 02, 2021
-
-
Erik Johnston authored
-
- Apr 14, 2021
-
-
Jonathan de Jong authored
Part of #9744 Removes all redundant `# -*- coding: utf-8 -*-` lines from files, as python 3 automatically reads source code as utf-8 now. `Signed-off-by:
Jonathan de Jong <jonathan@automatia.nl>`>
-
- Apr 09, 2021
-
-
Patrick Cloke authored
-
- Apr 08, 2021
-
-
Patrick Cloke authored
Records additional request information into the structured logs, e.g. the requester, IP address, etc.
-
- Feb 16, 2021
-
-
Eric Eastwood authored
- Update black version to the latest - Run black auto formatting over the codebase - Run autoformatting according to [`docs/code_style.md `](https://github.com/matrix-org/synapse/blob/80d6dc9783aa80886a133756028984dbf8920168/docs/code_style.md) - Update `code_style.md` docs around installing black to use the correct version
-
- Jan 04, 2021
-
-
Patrick Cloke authored
-
- Dec 02, 2020
-
-
Patrick Cloke authored
Replaces the `federation_ip_range_blacklist` configuration setting with an `ip_range_blacklist` setting with wider scope. It now applies to: * Federation * Identity servers * Push notifications * Checking key validitity for third-party invite events The old `federation_ip_range_blacklist` setting is still honored if present, but with reduced scope (it only applies to federation and identity servers).
-
- Oct 09, 2020
-
-
Patrick Cloke authored
All handlers now available via get_*_handler() methods on the HomeServer.
-
- Sep 28, 2020
-
-
Richard van der Hoff authored
-
- Sep 25, 2020
-
-
Richard van der Hoff authored
* Fix test_verify_json_objects_for_server_awaits_previous_requests It turns out that this wasn't really testing what it thought it was testing (in particular, `check_context` was turning failures into success, which was making the tests pass even though it wasn't clear they should have been. It was also somewhat overcomplex - we can test what it was trying to test without mocking out perspectives servers. * Fix warnings about finished logcontexts in the keyring We need to make sure that we finish the key fetching magic before we run the verifying code, to ensure that we don't mess up our logcontexts.
-
- Sep 04, 2020
-
-
Patrick Cloke authored
-
- Aug 27, 2020
-
-
Patrick Cloke authored
-
- Aug 03, 2020
-
-
Patrick Cloke authored
-
- Jul 30, 2020
-
-
Patrick Cloke authored
-
- Jul 09, 2020
-
-
Patrick Cloke authored
-
- Mar 24, 2020
-
-
Richard van der Hoff authored
* Pull Sentinel out of LoggingContext ... and drop a few unnecessary references to it * Factor out LoggingContext.current_context move `current_context` and `set_context` out to top-level functions. Mostly this means that I can more easily trace what's actually referring to LoggingContext, but I think it's generally neater. * move copy-to-parent into `stop` this really just makes `start` and `stop` more symetric. It also means that it behaves correctly if you manually `set_log_context` rather than using the context manager. * Replace `LoggingContext.alive` with `finished` Turn `alive` into `finished` and make it a bit better defined.
-
- Feb 07, 2020
-
-
Richard van der Hoff authored
... and use it in places where it's trivial to do so. This will make it easier to pass room versions into the FrozenEvent constructors.
-
- Jan 30, 2020
-
-
Richard van der Hoff authored
-
- Jan 06, 2020
-
-
Richard van der Hoff authored
Lift the restriction that *all* the keys used for signing v2 key responses be present in verify_keys. Fixes #6596.
-
- Oct 30, 2019
-
-
Erik Johnston authored
-
- Jul 23, 2019
-
-
Amber Brown authored
-
- Jul 19, 2019
-
-
Richard van der Hoff authored
There's an awful lot of deferreds and dictionaries flying around here. The whole thing can be made much simpler and achieve the same effect.
-
- Jul 03, 2019
-
-
Amber Brown authored
-
- Jun 20, 2019
-
-
Amber Brown authored
-
- Jun 10, 2019
-
-
Erik Johnston authored
Some keys are stored in the synapse database with a null valid_until_ms which caused an exception to be thrown when using that key. We fix this by treating nulls as zeroes, i.e. they keys will match verification requests with a minimum_valid_until_ms of zero (i.e. don't validate ts) but will not match requests with a non-zero minimum_valid_until_ms. Fixes #5391.
-
- Jun 06, 2019
-
-
Richard van der Hoff authored
There are a few changes going on here: * We make checking the signature on a key server response optional: if no verify_keys are specified, we trust to TLS to validate the connection. * We change the default config so that it does not require responses to be signed by the old key. * We replace the old 'perspectives' config with 'trusted_key_servers', which is also formatted slightly differently. * We emit a warning to the logs every time we trust a key server response signed by the old key.
-
- Jun 05, 2019
-
-
Richard van der Hoff authored
Also: * rename VerifyKeyRequest->VerifyJsonRequest * calculate key_ids on VerifyJsonRequest construction * refactor things to pass around VerifyJsonRequests instead of 4-tuples
-
- Jun 03, 2019
-
-
Richard van der Hoff authored
-