Skip to content
Snippets Groups Projects
  1. Sep 04, 2019
  2. Aug 30, 2019
  3. Aug 28, 2019
  4. Aug 23, 2019
  5. Aug 20, 2019
  6. Aug 15, 2019
    • Erik Johnston's avatar
      Refactor MatrixFederationAgent to retry SRV. · f299c541
      Erik Johnston authored
      This refactors MatrixFederationAgent to move the SRV lookup into the
      endpoint code, this has two benefits:
      	1. Its easier to retry different host/ports in the same way as
      	   HostnameEndpoint.
      	2. We avoid SRV lookups if we have a free connection in the pool
      f299c541
    • Erik Johnston's avatar
      Retry well known on fail. · e6e136de
      Erik Johnston authored
      If we have recently seen a valid well-known for a domain we want to
      retry on (non-final) errors a few times, to handle temporary blips in
      networking/etc.
      e6e136de
  7. Aug 13, 2019
    • Erik Johnston's avatar
      Retry well-known lookup before expiry. · 17e1e807
      Erik Johnston authored
      This gives a bit of a grace period where we can attempt to refetch a
      remote `well-known`, while still using the cached result if that fails.
      
      Hopefully this will make the well-known resolution a bit more torelant
      of failures, rather than it immediately treating failures as "no result"
      and caching that for an hour.
      17e1e807
  8. Aug 07, 2019
  9. Aug 06, 2019
    • Erik Johnston's avatar
      Add a lower bound for TTL on well known results. · af9f1c07
      Erik Johnston authored
      It costs both us and the remote server for us to fetch the well known
      for every single request we send, so we add a minimum cache period. This
      is set to 5m so that we still honour the basic premise of "refetch
      frequently".
      af9f1c07
  10. Aug 01, 2019
  11. Jul 31, 2019
  12. Jul 30, 2019
    • Richard van der Hoff's avatar
      Remove non-functional 'expire_access_token' setting (#5782) · 8c97f641
      Richard van der Hoff authored
      The `expire_access_token` didn't do what it sounded like it should do. What it
      actually did was make Synapse enforce the 'time' caveat on macaroons used as
      access tokens, but since our access token macaroons never contained such a
      caveat, it was always a no-op.
      
      (The code to add 'time' caveats was removed back in v0.18.5, in #1656)
      Unverified
      8c97f641
  13. Jul 29, 2019
  14. Jul 26, 2019
  15. Jul 25, 2019
  16. Jul 24, 2019
  17. Jul 23, 2019
  18. Jul 19, 2019
  19. Jul 18, 2019
  20. Jul 17, 2019
  21. Jul 12, 2019
  22. Jul 11, 2019
    • Richard van der Hoff's avatar
      Clean up exception handling for access_tokens (#5656) · 0a4001eb
      Richard van der Hoff authored
      First of all, let's get rid of `TOKEN_NOT_FOUND_HTTP_STATUS`. It was a hack we
      did at one point when it was possible to return either a 403 or a 401 if the
      creds were missing. We always return a 401 in these cases now (thankfully), so
      it's not needed.
      
      Let's also stop abusing `AuthError` for these cases. Honestly they have nothing
      that relates them to the other places that `AuthError` is used, other than the
      fact that they are loosely under the 'Auth' banner. It makes no sense for them
      to share exception classes.
      
      Instead, let's add a couple of new exception classes: `InvalidClientTokenError`
      and `MissingClientTokenError`, for the `M_UNKNOWN_TOKEN` and `M_MISSING_TOKEN`
      cases respectively - and an `InvalidClientCredentialsError` base class for the
      two of them.
      Unverified
      0a4001eb
  23. Jul 10, 2019
  24. Jul 09, 2019
  25. Jul 08, 2019
  26. Jul 05, 2019
Loading