-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
matrix_encryption_disabler support #1621
Comments
This doesn't work right now, because matrix_encryption_disabler expects to get registered in `homeserver.yaml` using the `third_party_event_rules` configuration key, not in `modules`. Hopefully digitalentity/matrix_encryption_disabler#1 will address this problem. Related to matrix-org/synapse#4401 Will fix #1621
digitalentity/matrix_encryption_disabler#1 has been fixed, the plugin now supports new Synapse Module API. |
Related to matrix-org/synapse#4401 Fixes #1621
Thanks! We can now easily install your plugin and auto-enable it for the homeserver domain with a single configuration line: matrix_synapse_ext_encryption_disabler_enabled: true
# We apply these defaults, but users can customize these settings too.
# matrix_synapse_ext_encryption_disabler_deny_encryption_for_users_of: ["{{ matrix_domain }}"]
# matrix_synapse_ext_encryption_disabler_deny_encryption_for_rooms_of: ["{{ matrix_domain }}"] I've tested it and it seems to work well! It prevents enabling encryption both during initial room creation and with a subsequent attempt to encrypt the room. Thank you for creating this plugin! 🙇 Until now, I've been using matrix-corporal to deny encryption creation attempts with the following configuration: # When matrix-corporal is acting as the primary authentication provider,
# you need to set up the REST authentication password provider module
# to make Interactive User Authentication work.
# This is necessary for certain user actions (like E2EE, device management, etc).
#
# See configuring-playbook-rest-auth.md
matrix_synapse_ext_password_provider_rest_auth_enabled: true
matrix_synapse_ext_password_provider_rest_auth_endpoint: "http://matrix-corporal:41080/_matrix/corporal"
matrix_corporal_enabled: true
# See matrix_aux_file_definitions
matrix_corporal_policy_provider_config: |
{
"Type": "static_file",
"Path": "/etc/matrix-corporal/policy.json"
}
# If you need to change matrix-corporal's user id from the default (matrix-corporal).
# In any case, you need to make sure this Matrix user is created on your server.
matrix_corporal_corporal_user_id_local_part: "matrix-corporal"
matrix_aux_file_definitions:
- dest: "{{ matrix_corporal_config_dir_path }}/policy.json"
content: |
{
"schemaVersion": 1,
"identificationStamp": "stamp-1",
"flags": {
"allowCustomUserDisplayNames": false,
"allowCustomUserAvatars": false,
"forbidRoomCreation": false,
"forbidEncryptedRoomCreation": true,
"forbidUnencryptedRoomCreation": false,
"allowCustomPassthroughUserPasswords": true,
"allowUnauthenticatedPasswordResets": false,
"allow3pidLogin": false
},
"managedCommunityIds": [],
"managedRoomIds": [],
"users": []
} This is more complicated, but also worked well for denying What
|
Exactly my motivation for creating this plugin. I like FluffyChat for UI/UX, but it doesn't have an option to opt out of e2ee which makes a solution with Thanks for considering my plugin for your deployment! |
matrix_encryption_disabler allows homeserver administrators to force-disable E2EE for rooms hosted on their server.
Related to matrix-org/synapse#4401
The text was updated successfully, but these errors were encountered: