Skip to content
This repository has been archived by the owner on Apr 26, 2024. It is now read-only.

Fix bug where synapse fails to start if no_tls set #4524

Merged
merged 3 commits into from
Jan 30, 2019

Conversation

erikjohnston
Copy link
Member

Introduced in #4495

@erikjohnston erikjohnston requested a review from a team January 30, 2019 12:17
@erikjohnston erikjohnston removed the request for review from a team January 30, 2019 12:44
@codecov-io
Copy link

codecov-io commented Jan 30, 2019

Codecov Report

Merging #4524 into develop will increase coverage by 0.03%.
The diff coverage is 0%.

@@             Coverage Diff             @@
##           develop    #4524      +/-   ##
===========================================
+ Coverage     74.7%   74.73%   +0.03%     
===========================================
  Files          337      337              
  Lines        34447    34447              
  Branches      5615     5615              
===========================================
+ Hits         25732    25745      +13     
+ Misses        7124     7111      -13     
  Partials      1591     1591

@erikjohnston erikjohnston requested a review from a team January 30, 2019 12:48
Copy link
Member

@richvdh richvdh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@erikjohnston erikjohnston merged commit 43c6fca into develop Jan 30, 2019
richvdh pushed a commit that referenced this pull request Feb 14, 2019
* implement `reload` by sending the HUP signal

According to the 0.99 release info* synapse now uses the HUP signal to reload certificates:

> Synapse will now reload TLS certificates from disk upon SIGHUP. (#4495, #4524)

So the matrix-synapse.service unit file should include a reload directive.

Signed-off-by: Дамјан Георгиевски <[email protected]>
@erikjohnston erikjohnston deleted the erikj/fix_no_tls branch March 5, 2019 13:52
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants