Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

disable password change api, when password providers are used #145

Closed
wants to merge 1 commit into from

Conversation

dhoffend
Copy link
Contributor

This pull request is a workaround until matrix-org/synapse#5092 lands upstream. It's really a problem when you use password_providers and users are allowed to change their password but it will only updated locally. It's not only confusing but also a security risk because you can login using 2 different passwords (local and the one from password_provider)

@aaronraimist
Copy link
Contributor

It probably doesn’t make sense to include a workaround like this in the playbook. You can just run this change until your PR lands and then make a PR for the actual feature.

@dhoffend
Copy link
Contributor Author

That's okay for me. I just wanted to documented things I stumpled across.

@spantaleev
Copy link
Owner

I'd say, let's see what happens with the original PR for a proper way to disable password-changing regardless of the reverse-proxy being used (some people use Apache or Caddy, etc.).

As of right now, what you're proposing can also be done with configuration like this:

matrix_nginx_proxy_proxy_matrix_additional_server_configuration_blocks:
- "location /_matrix/client/r0/account/password { deny all; }"

Of course, if the original PR doesn't land, it may be nice to have the convenience variable that you're proposing.

spantaleev added a commit that referenced this pull request Jul 4, 2019
This is a new feature of Synapse v1.1.0.

Discussed in #145 (Github Pull Request).
@spantaleev
Copy link
Owner

Looks like this is not necessary anymore, thanks to your Synapse pull request becoming part of v1.1.0.

In da6edc9, I've added an option for controlling the new localdb_enabled setting and updated the documentation for all password providers.

@spantaleev spantaleev closed this Jul 4, 2019
spantaleev added a commit that referenced this pull request Jul 4, 2019
Fixes a problem introduced by da6edc9.

Related to #145 (Github Pull Request).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants