Apply the federation_ip_range_blacklist to key revocation.
parent
8741ba4073
commit
1adfd358f5
|
@ -650,7 +650,7 @@ acme:
|
|||
# servers provided by user input.
|
||||
#
|
||||
# As of Synapse v1.24.0 this option also affects any outbound requests to push
|
||||
# servers provided by user input.
|
||||
# servers provided by user input and to key revocation requests.
|
||||
#
|
||||
# (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly
|
||||
# listed here, since they correspond to unroutable addresses.)
|
||||
|
|
|
@ -84,7 +84,7 @@ class FederationConfig(Config):
|
|||
# servers provided by user input.
|
||||
#
|
||||
# As of Synapse v1.24.0 this option also affects any outbound requests to push
|
||||
# servers provided by user input.
|
||||
# servers provided by user input and to key revocation requests.
|
||||
#
|
||||
# (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly
|
||||
# listed here, since they correspond to unroutable addresses.)
|
||||
|
|
|
@ -140,7 +140,7 @@ class FederationHandler(BaseHandler):
|
|||
self._message_handler = hs.get_message_handler()
|
||||
self._server_notices_mxid = hs.config.server_notices_mxid
|
||||
self.config = hs.config
|
||||
self.http_client = hs.get_simple_http_client()
|
||||
self.http_client = hs.get_proxied_blacklisted_http_client()
|
||||
self._instance_name = hs.get_instance_name()
|
||||
self._replication = hs.get_replication_data_handler()
|
||||
|
||||
|
|
Loading…
Reference in New Issue