issues
search
matrix-org
/
matrix-federation-tester
Tester for matrix federation written in golang.
78
stars
17
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Use go modules instead of gb
#46
babolivier
closed
5 years ago
1
Infer SNI from serverHost
#45
anoadragon453
closed
5 years ago
5
Unhelpful output when .well-known lacks an m.server field
#44
thegcat
closed
5 years ago
3
fed tester follows SRV records which point to CNAMEs
#43
richvdh
closed
5 years ago
0
Print well-known result information
#42
anoadragon453
closed
5 years ago
0
`cannot unmarshal number` when /key request gives a 404
#41
richvdh
closed
5 years ago
1
ConnectionErrors "invalid character '<' looking for beginning of value"
#40
Bubu
closed
5 years ago
4
Federation Tester complains about invalid certs when using SRV to an IP address
#39
anoadragon453
closed
5 years ago
7
Add minimum Go version to README
#38
anoadragon453
closed
5 years ago
0
Consider adding support for Synapse 0.34 backwards-compatibility SRV records
#37
richvdh
closed
4 years ago
5
Travis config
#36
richvdh
closed
5 years ago
0
Cert check should check for hostname after resolving well-known
#35
alexte
closed
5 years ago
7
SRV records should be looked up for root domain, not server hostname
#34
karthanistyr
closed
5 years ago
4
Fix issue with certs not being marked as valid for SRV
#33
anoadragon453
closed
5 years ago
4
Add field for reporting descriptive errors during testing
#32
anoadragon453
closed
5 years ago
0
Federation tester doesn't work with multi domain reversed proxy server
#31
altshiftzero
closed
5 years ago
1
AllChecksOK does not mean that all checks are ok
#30
richvdh
closed
5 years ago
4
Fedtester sometimes takes forever to complete a test
#29
anoadragon453
closed
5 years ago
2
Federation tester sends the wrong SNI
#28
richvdh
closed
5 years ago
0
Certs marked as valid on matrix.example.org, but invalid on example.org
#27
anoadragon453
closed
5 years ago
3
Certs are marked as invalid if port specified
#26
anoadragon453
closed
5 years ago
0
Remove TLSFingerprint checks
#25
anoadragon453
closed
5 years ago
0
Don't validate certificates when checking well-known URI
#24
anoadragon453
closed
5 years ago
4
fed tester seems to be testing the cert in ip:port instead of hostname:port if .well-known is used
#23
Bubu
closed
5 years ago
1
Update gomatrixserverlib
#22
anoadragon453
closed
5 years ago
0
Federation tester doesn't appear to be matching server names correctly with .well-known enabled
#21
turt2live
closed
5 years ago
1
fedtester writes all its output on one line
#20
richvdh
closed
5 years ago
2
Stop serverName from breaking when using well-known
#19
anoadragon453
closed
5 years ago
0
remove check on tls_fingerprints
#18
richvdh
closed
5 years ago
0
Well known support with new Info field
#17
anoadragon453
closed
5 years ago
0
Human-readable errors for known configuration issues
#16
anoadragon453
opened
5 years ago
0
Require actual X509 certs on Synapse release v0.99+
#15
anoadragon453
closed
5 years ago
1
Validate federation certificates
#14
anoadragon453
closed
5 years ago
0
distinguish between dead server and dead tester
#13
ara4n
closed
5 years ago
1
Add link to federation tester in the README
#12
turt2live
closed
6 years ago
0
AllChecksOk ignores ipv6 problems
#11
ara4n
closed
5 years ago
0
we should time out requests to non-responsive servers rather than letting the upstream proxy return a 504
#10
richvdh
closed
5 years ago
1
`run.sh` assumes installation in $HOME
#9
lukebarnard1
opened
6 years ago
0
missing time-out because of firewall drop
#8
ghost
closed
5 years ago
1
Support ipv6
#7
mprasil
closed
6 years ago
2
give the federation tester a UI
#6
richvdh
closed
5 years ago
3
CORs headers
#5
NegativeMjark
closed
7 years ago
0
Use mixed case for Ed25519
#4
NegativeMjark
closed
7 years ago
0
Add prometheus metrics and debug API
#3
NegativeMjark
closed
7 years ago
1
Add precommit hooks
#2
NegativeMjark
closed
7 years ago
1
A federation tester with an HTTP API.
#1
NegativeMjark
closed
7 years ago
2
Previous