Apply the federation_ip_range_blacklist to key revocation.

pull/8821/head
Patrick Cloke 2020-11-25 13:32:27 -05:00
parent 8741ba4073
commit 1adfd358f5
3 changed files with 3 additions and 3 deletions

View File

@ -650,7 +650,7 @@ acme:
# servers provided by user input.
#
# As of Synapse v1.24.0 this option also affects any outbound requests to push
# servers provided by user input.
# servers provided by user input and to key revocation requests.
#
# (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly
# listed here, since they correspond to unroutable addresses.)

View File

@ -84,7 +84,7 @@ class FederationConfig(Config):
# servers provided by user input.
#
# As of Synapse v1.24.0 this option also affects any outbound requests to push
# servers provided by user input.
# servers provided by user input and to key revocation requests.
#
# (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly
# listed here, since they correspond to unroutable addresses.)

View File

@ -140,7 +140,7 @@ class FederationHandler(BaseHandler):
self._message_handler = hs.get_message_handler()
self._server_notices_mxid = hs.config.server_notices_mxid
self.config = hs.config
self.http_client = hs.get_simple_http_client()
self.http_client = hs.get_proxied_blacklisted_http_client()
self._instance_name = hs.get_instance_name()
self._replication = hs.get_replication_data_handler()