@@ -64,13 +64,19 @@ class VerifyKeyRequest(object):
64
64
65
65
Attributes:
66
66
server_name(str): The name of the server to verify against.
67
+
67
68
key_ids(set[str]): The set of key_ids to that could be used to verify the
68
69
JSON object
70
+
69
71
json_object(dict): The JSON object to verify.
72
+
70
73
deferred(Deferred[str, str, nacl.signing.VerifyKey]):
71
74
A deferred (server_name, key_id, verify_key) tuple that resolves when
72
75
a verify key has been fetched. The deferreds' callbacks are run with no
73
76
logcontext.
77
+
78
+ If we are unable to find a key which satisfies the request, the deferred
79
+ errbacks with an M_UNAUTHORIZED SynapseError.
74
80
"""
75
81
76
82
server_name = attr .ib ()
@@ -771,31 +777,8 @@ def _handle_key_deferred(verify_request):
771
777
SynapseError if there was a problem performing the verification
772
778
"""
773
779
server_name = verify_request .server_name
774
- try :
775
- with PreserveLoggingContext ():
776
- _ , key_id , verify_key = yield verify_request .deferred
777
- except KeyLookupError as e :
778
- logger .warn (
779
- "Failed to download keys for %s: %s %s" ,
780
- server_name ,
781
- type (e ).__name__ ,
782
- str (e ),
783
- )
784
- raise SynapseError (
785
- 502 , "Error downloading keys for %s" % (server_name ,), Codes .UNAUTHORIZED
786
- )
787
- except Exception as e :
788
- logger .exception (
789
- "Got Exception when downloading keys for %s: %s %s" ,
790
- server_name ,
791
- type (e ).__name__ ,
792
- str (e ),
793
- )
794
- raise SynapseError (
795
- 401 ,
796
- "No key for %s with id %s" % (server_name , verify_request .key_ids ),
797
- Codes .UNAUTHORIZED ,
798
- )
780
+ with PreserveLoggingContext ():
781
+ _ , key_id , verify_key = yield verify_request .deferred
799
782
800
783
json_object = verify_request .json_object
801
784
0 commit comments