Ver código fonte

Force TLS certificate verification in registration script. (#16530)

If using the script remotely, there's no particularly convincing reason
to disable certificate verification, as this makes the connection
interceptible.

If on the other hand, the script is used locally (the most common use
case), you can simply target the HTTP listener and avoid TLS altogether.
This is what the script already attempts to do if passed a homeserver
configuration YAML file.
tags/v1.96.0rc1
Denis Kasak 6 meses atrás
committed by GitHub
pai
commit
3a0aa6fe76
Nenhuma chave conhecida encontrada para esta assinatura no banco de dados ID da chave GPG: 4AEE18F83AFDEB23
2 arquivos alterados com 3 adições e 2 exclusões
  1. +1
    -0
      changelog.d/16530.bugfix
  2. +2
    -2
      synapse/_scripts/register_new_matrix_user.py

+ 1
- 0
changelog.d/16530.bugfix Ver arquivo

@@ -0,0 +1 @@
Force TLS certificate verification in user registration script.

+ 2
- 2
synapse/_scripts/register_new_matrix_user.py Ver arquivo

@@ -50,7 +50,7 @@ def request_registration(
url = "%s/_synapse/admin/v1/register" % (server_location.rstrip("/"),)

# Get the nonce
r = requests.get(url, verify=False)
r = requests.get(url)

if r.status_code != 200:
_print("ERROR! Received %d %s" % (r.status_code, r.reason))
@@ -88,7 +88,7 @@ def request_registration(
}

_print("Sending registration request...")
r = requests.post(url, json=data, verify=False)
r = requests.post(url, json=data)

if r.status_code != 200:
_print("ERROR! Received %d %s" % (r.status_code, r.reason))


Carregando…
Cancelar
Salvar