0
0
Fork 0
Commit Graph

640 Commits

Author SHA1 Message Date
Andrew Morgan 9fd6bd3184 Add details about why this proposal should exist 2019-07-23 15:25:41 +01:00
Andrew Morgan b26a9ed1fd Expand on why we can't trust dirty homeservers 2019-07-23 13:28:42 +01:00
Andrew Morgan 577021f12b resolve some comments 2019-07-23 11:48:01 +01:00
Richard van der Hoff 9e264fedc9 Updates
* preserve *all* of `create`
* don't preserve `notifications` or `algorithm`, and add some justifcation.
2019-07-22 16:47:49 +01:00
Andrew Morgan 887cd5e7d0 I really hope someone doesn't invest none-hash 2019-07-22 16:00:29 +01:00
Andrew Morgan 0444c8016b review comments 2019-07-22 15:33:49 +01:00
Richard van der Hoff 4503327450 Add some compatibility hacks. 2019-07-22 15:17:52 +01:00
Richard van der Hoff d324cac847 preserve powerlevel 2019-07-16 19:32:34 +01:00
Richard van der Hoff b49a950245
Update proposals/2176-update-redaction-rules.md
fix typo

Co-Authored-By: Kitsune Ral <Kitsune-Ral@users.sf.net>
2019-07-16 19:26:02 +01:00
Sorunome 9ebcff5758
fix typo, add section on html details element 2019-07-16 17:11:07 +02:00
Andrew Morgan 36cb8ed894 none -> m.none 2019-07-16 10:44:02 +01:00
Sorunome 1f786ae6dc
commit image into repo, fix typo 2019-07-15 20:52:24 +02:00
David Baker d9269b084f Exclude pubkey endpoints from auth 2019-07-15 16:58:24 +01:00
David Baker a1de6ff634 Hopefully clarify some bits 2019-07-15 10:26:24 +01:00
Richard van der Hoff cd5549d483 Proposal to update the redaction algorithm 2019-07-14 22:50:46 +01:00
Richard van der Hoff b09d48a9f7 Spec link 2019-07-14 20:22:39 +01:00
Richard van der Hoff 78d46b2890 Proposal to move the `redacts` key to a sane place 2019-07-14 20:20:09 +01:00
David Baker 25a47afa32
unnecessary capital mk. 2
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:55:40 +01:00
David Baker 6e061b1baf
unnecessary capital
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:55:11 +01:00
David Baker f474b31f5f
typo
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:54:45 +01:00
Andrew Morgan 3514437d24 Ability for client/server to decide on no hashing 2019-07-12 11:37:41 +01:00
David Baker 9bb6ad80d1 typo 2019-07-10 16:13:38 +01:00
Andrew Morgan ed67e26037 pepper must not be an empty string, append medium 2019-07-08 17:03:20 +01:00
Andrew Morgan 1963a24832 fix attacks paragraph 2019-07-08 13:27:38 +01:00
Andrew Morgan dd8a6549c9 Address review comments 2019-07-08 11:55:37 +01:00
David Baker 701d340da1 Remove exception for request/submitToken 2019-07-05 19:00:15 +01:00
David Baker bf8a1e5d5f Add way to get the HS to bind/unbind existing 3pids 2019-07-05 18:11:42 +01:00
Andrew Morgan 3702669424 update from comments 2019-07-05 15:59:29 +01:00
David Baker 30dcc28f9b try & clarify that HS signature isn't the only acceptable auth for unbind 2019-07-04 18:38:31 +01:00
Andrew Morgan f4a1e02884 simple method once more 2019-07-04 16:28:49 +01:00
Hubert Chathi 4d31ddc8c9 additions and clarifications
- indicate how to use MSC 1946 to store/share private keys
- add signing by devices to enable migrating from device verifications
- add information about signature upload failures and M_INVALID_SIGNATURE code
- add security consideration
2019-07-03 15:09:06 -04:00
Andrew Morgan 53bd384f2e Clarify salting 2019-07-03 09:59:38 +01:00
Hubert Chathi 3aaf181db2 rename some things and add clarification 2019-07-02 14:05:06 -04:00
David Baker 1a669348d8 http status code 2019-07-02 11:27:46 +01:00
David Baker d15c9df115
fullstop
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:25:26 +01:00
David Baker e28f7aad72
slash
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:25:12 +01:00
David Baker 4c72c37b80
slash
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:24:51 +01:00
David Baker 10858bf83b set account data after registration 2019-07-02 11:22:41 +01:00
David Baker 79dbad2914 remove acceptance token mention 2019-07-02 11:17:27 +01:00
David Baker ac6b9bdb7c s/deprecate/remove/ 2019-07-02 11:16:25 +01:00
David Baker 7f65364804
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:13:12 +01:00
David Baker 03e6ab0103 re-word double openid 2019-07-02 11:11:50 +01:00
David Baker d00dfb7822 exclude submittoken too 2019-07-02 11:04:06 +01:00
David Baker f02e4c2e9c
both registers are excluded from auth
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:00:39 +01:00
David Baker 5374030cc0 Drop application/x-form-www-urlencoded in v2 2019-07-02 10:59:08 +01:00
David Baker 2d11217d4e
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 10:56:32 +01:00
David Baker 8af35be13f
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 10:56:12 +01:00
Andrew Morgan 922a20ba26 small fixes 2019-07-01 16:30:07 +01:00
Andrew Morgan 6f81d3774b New hashing method 2019-07-01 16:23:28 +01:00
David Baker fe14d3c9f0 Spec terms response 2019-06-28 18:07:24 +01:00
David Baker 786d5bc281 rewrite UI auth tradeoffs 2019-06-28 10:25:24 +01:00
David Baker 45d630951c back to M_TERMS_NOT_SIGNED 2019-06-28 09:32:15 +01:00
David Baker 83bb3861ba line wrap 2019-06-28 09:31:53 +01:00
Travis Ralston 8897ea4bb1 Merge branch 'master' into travis/msc/integrations/discovery 2019-06-27 21:56:23 -06:00
Travis Ralston a2a7b7ff13 Merge branch 'master' into travis/msc/integrations/auth 2019-06-27 21:55:59 -06:00
Travis Ralston bfd8e52c23 Formatting 2019-06-27 20:45:23 -06:00
Travis Ralston d8283b9cdf Add option to use query string 2019-06-27 20:44:49 -06:00
Travis Ralston e80753e56c Add .well-known discovery 2019-06-27 18:24:42 -06:00
David Baker 4be283ccb3
Typing
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-27 17:31:15 +01:00
David Baker f95197b422 make the many-anded sentence a list 2019-06-27 17:30:36 +01:00
David Baker 10a6a59a12 Deprecate `bind_email` / `bind_msisdn` 2019-06-27 16:58:22 +01:00
David Baker b5326de1c4 Exclude requestToken endpoints from auth requirement 2019-06-27 16:34:46 +01:00
Sorunome 540aab82a1
accidentally formatted the wrong entry 2019-06-27 13:09:15 +02:00
Sorunome 6260871a21
spoiler fallback to uploaded media 2019-06-27 13:07:08 +02:00
David Baker 21b9eaf8de No custom HTTP headers
Use the obvious way: in the same place as the ID server address
2019-06-26 17:56:41 +01:00
David Baker 2694bb1090 Add really horrible custom HTTP header
for giving the IS token to the HS
2019-06-26 17:41:21 +01:00
David Baker 58cf083a6a backwards compat 2019-06-26 15:31:11 +01:00
David Baker 6273868323 Clarify v1 API deprecation 2019-06-26 15:29:24 +01:00
David Baker 4edf826c93 Capitalise on our identifiers 2019-06-26 15:29:23 +01:00
David Baker ba7047ce77
Clarify we must be accepting HS auth
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:51:11 +01:00
David Baker 1d75828c71 Clarify what to do if no (new) docs 2019-06-26 14:45:25 +01:00
David Baker af691b5a8a
Clarify this applies to 2134
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:37:06 +01:00
David Baker 57094276ce
Typing hard is
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:36:15 +01:00
Andrew Morgan 7549c5dd76 Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity 2019-06-26 10:57:07 +01:00
Andrew Morgan 0fd4fe2542 Add algo/pepper to err resp 2019-06-26 10:55:44 +01:00
Andrew Morgan dfb37fcce1 update with feedback 2019-06-25 18:55:18 +01:00
Andrew Morgan df88b13ce1
Update proposals/2134-identity-hash-lookup.md
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-06-25 18:15:02 +01:00
David Baker 9e0d8b9cb2 Use M_CONSENT_NOT_GIVEN
No idea where I got the other one from: we already have one in the
spec, so use it.
2019-06-25 17:17:39 +01:00
David Baker 0dae2d5812 GET terms must be unauthed.
Detail process for new auth (don't register until consent given).

Specifically mention the authentication header.
2019-06-25 15:52:55 +01:00
Sorunome 4f83cc1c24
moved client spoiler conversion to potential issues 2019-06-25 16:19:29 +02:00
David Baker 6f374dc981 Re-write for OpenID auth 2019-06-25 14:58:15 +01:00
David Baker 2c09580e27 line wrap 2019-06-25 11:14:35 +01:00
Andrew Morgan 96e43aaf45 Define what characters lookup_pepper can consist of 2019-06-25 10:37:45 +01:00
Andrew Morgan f951f312e1 Fix terrible wording 2019-06-25 10:30:29 +01:00
Andrew Morgan fae6883cc0 Update with review comments 2019-06-25 10:18:11 +01:00
Andrew Morgan 0a4c83ddb9 no plural. 3pid -> 3PID 2019-06-24 17:54:23 +01:00
Andrew Morgan 36a35a33cc Clarify how the spec defines hashing algs 2019-06-24 16:59:58 +01:00
Andrew Morgan ee10576d60 Update with feedback 2019-06-24 15:43:19 +01:00
David Baker abb407145a HS docs must be added too
also, unbind must not error when called by HSes and proxy terms token
2019-06-24 15:30:19 +01:00
David Baker 8ae47557c9 s/Third Party/Accepted/ 2019-06-24 15:22:19 +01:00
David Baker 2555801458 m.third_party_terms -> m.accepted_terms
as it will have the HS's terms too
2019-06-24 14:56:48 +01:00
David Baker 4ba9b2a599 perfix 2019-06-24 13:18:41 +01:00
David Baker a63e4420eb
Linkify
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
2019-06-24 13:17:58 +01:00
Andrew Morgan 02ac0f3b33 Give the user control! 2019-06-24 11:56:04 +01:00
Andrew Morgan acdb2b1b42 Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity 2019-06-24 11:47:53 +01:00
Andrew Morgan e3ff80291f http err codes and hash wording fixes 2019-06-24 11:47:00 +01:00
Travis Ralston 21e93a123e Naming and capitalization 2019-06-21 11:36:16 -06:00
Andrew Morgan 53f025edfc Specify optional pepper rotation period 2019-06-21 15:42:11 +01:00
Andrew Morgan 2383a55720 404 for deprecated endpoint 2019-06-21 15:40:26 +01:00
Andrew Morgan c63edc7b97 Clean up wording around peppers and hashes 2019-06-21 14:12:50 +01:00
Andrew Morgan e3b2ad38b5 pepper -> lookup_pepper 2019-06-21 12:17:01 +01:00
Andrew Morgan 1fea604ba9 Don't define error message 2019-06-21 11:32:23 +01:00
David Baker 9ca3ccc81c Add requirments section for de-duping between services. 2019-06-21 09:35:26 +01:00
David Baker d4ca0c237a Specify ID grammar and add comma 2019-06-21 09:25:16 +01:00
David Baker 276e2b6843
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-21 09:14:24 +01:00
David Baker cf48030d1f One more tradeoff 2019-06-20 17:48:21 +01:00
David Baker 32c7fc638d you have a number now 2019-06-20 17:44:28 +01:00
David Baker 23af87e9fc Proposal for IS & IM TOS API 2019-06-20 17:41:19 +01:00
Andrew Morgan 1343e19a6d Specify hash algorithm and fallback considerations 2019-06-20 14:36:47 +01:00
Andrew Morgan f28476f0f3 line wrap and fix wording 2019-06-19 16:29:24 +01:00
Andrew Morgan 3ee27d3818 salt->pepper. 1 pepper/is. add multi-hash idea 2019-06-19 15:14:30 +01:00
Andrew Morgan f41ed02c9e remove sec concerns 2019-06-18 17:22:30 +01:00
Andrew Morgan 6bb4a9e911 Add per-is salt consideration 2019-06-18 17:09:06 +01:00
Andrew Morgan 5049e552e7 Drop /api from the new endpoint 2019-06-18 17:05:46 +01:00
Andrew Morgan bc9b6c3659 Add salt to example and signal link 2019-06-18 17:03:49 +01:00
Andrew Morgan 063b9f60e0 Require a salt to defend against rainbow tables 2019-06-18 16:50:47 +01:00
Andrew Morgan d2b47a585d Allow for changing the hashing algo and add at-rest details 2019-06-18 16:37:02 +01:00
Will Hunt f8dbf2b360
Update proposals/2134-identity-hash-lookup.md
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-06-17 13:17:57 +01:00
Will Hunt 12431f1a4e Base64 potential issue 2019-06-15 13:29:59 +01:00
Will Hunt 8b92df74ab s/medium/address 2019-06-15 13:25:42 +01:00
Will Hunt a8c26d208b Wrap 2019-06-15 12:43:20 +01:00
Will Hunt 3eff76b00a MSC 2134 2019-06-15 12:37:40 +01:00
Sorunome 26349417ba
update spoiler render idea 2019-06-11 21:13:16 +02:00
Travis Ralston fc1d8f184d
Merge pull request #2078 from matrix-org/anoa/msc2078
MSC2078: Sending Third-Party Request Tokens via the Homeserver
2019-06-10 14:25:35 -06:00
Travis Ralston 65c3935419
Merge pull request #2076 from matrix-org/rav/proposal/enforce_key_validity_periods
MSC2076: Enforce key-validity periods when validating event signatures
2019-06-10 07:25:09 -06:00
Travis Ralston 19575eb4d4
Merge pull request #2077 from matrix-org/rav/proposal/room_v5
MSC2077: room v5
2019-06-10 07:24:41 -06:00
Matthew Hodgson 950415c72a
Merge branch 'master' into matthew/msc1779 2019-06-07 19:19:19 +01:00
Matthew Hodgson be568ba9ab link to the legalified version of MSC1779 2019-06-07 19:10:26 +01:00
Travis Ralston 9cf03325b9
Merge pull request #2046 from matrix-org/travis/1.0/msc1915-unbind
Spec 3PID unbind API
2019-06-07 07:33:33 -06:00
Andrew Morgan 45e271c0f7 be super explicit 2019-06-07 13:29:22 +01:00
Andrew Morgan 7f65704ebc Update wording and answer review comments 2019-06-07 12:45:11 +01:00
Andrew Morgan 3e23dde341 Be clear that any 3PID token request can now be done by the hs 2019-06-05 21:49:02 +01:00
Andrew Morgan 9000247008 Merge branch 'anoa/msc2078' of github.com:matrix-org/matrix-doc into anoa/msc2078
* 'anoa/msc2078' of github.com:matrix-org/matrix-doc:
  Update proposals/2078-homeserver-password-resets.md
2019-06-05 17:54:27 +01:00
Andrew Morgan d3f21e0360 Address review comments 2019-06-05 17:54:18 +01:00
Andrew Morgan e49518099d Be explicit with request/responses 2019-06-05 17:37:09 +01:00
Andrew Morgan 395acf8e06
Update proposals/2078-homeserver-password-resets.md
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-06-05 15:58:14 +01:00
Andrew Morgan 6bb48723e8 The HS can send any URL 2019-06-05 15:43:57 +01:00
Andrew Morgan 6e0af5e64c If no submit_url, just send it to the IS as before 2019-06-05 15:07:06 +01:00
Andrew Morgan 4174b61279 submit_url only if the user has to enter the code somewhere 2019-06-05 14:50:40 +01:00
Andrew Morgan 8259ae292a Capitalise SMS 2019-06-05 14:39:36 +01:00
Andrew Morgan 7e18c5d5a8 Add new submit_url response field 2019-06-05 14:38:16 +01:00
Andrew Morgan 8cba7adcdf Clarify conditions for attack 2019-06-05 13:52:02 +01:00
Andrew Morgan 085c5667a4 wrap lines 2019-06-05 13:42:23 +01:00
Andrew Morgan 1956f1a916 Revert "Remove attacker bit"
This reverts commit c9711acbc5.
2019-06-05 12:59:58 +01:00
Andrew Morgan c9711acbc5 Remove attacker bit 2019-06-05 12:52:01 +01:00
Andrew Morgan 4e692735f5 Update some wording 2019-06-05 11:25:26 +01:00
Andrew Morgan cf932ad4f8 msc2078 - proposal for homeservers sending passwords reset requests 2019-06-05 11:20:28 +01:00
Richard van der Hoff 40b10f254b clarifications 2019-06-05 07:18:25 +01:00
Richard van der Hoff 3347a480eb fix typo 2019-06-05 00:07:05 +01:00
Richard van der Hoff d2ccd6b268 MSC2077: room v5 2019-06-04 23:53:42 +01:00
Richard van der Hoff 37b1e171fc MSC2076: Enforce key-validity periods when validating event signatures 2019-06-04 23:51:10 +01:00
Travis Ralston b92b147797
Merge pull request #1719 from uhoreg/olm_unwedging
MSC1719: olm session unwedging
2019-06-04 11:14:15 -06:00
Hubert Chathi fee2ebf682
fix typo
Co-Authored-By: Shamil K <me@noteness.in>
2019-06-02 16:09:47 -04:00
Travis Ralston dda7afa845
Merge pull request #1717 from uhoreg/e2e_verification
MSC1717: common definitions for key verification methods
2019-06-02 10:45:39 -06:00
Hubert Chathi da5ce919f2 add sharing secrets, and a bunch of cleanups 2019-05-31 12:16:59 -04:00
Hubert Chathi 6929579360 add some clarifications 2019-05-29 15:18:54 -04:00
Hubert Chathi ffb70a2fab
fix typo
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
2019-05-29 15:01:35 -04:00
Hubert Chathi 84f0d9d7e4 add clarification 2019-05-28 20:07:45 -04:00
Travis Ralston 0463084924 Spec 3PID unbind API
As per [MSC1915](https://github.com/matrix-org/matrix-doc/pull/1915)

Implementation proof: 
* https://github.com/matrix-org/synapse/pull/4982
* https://github.com/matrix-org/sydent/pull/160

The only alteration made which differs from the proposal is clarity on how to handle homeservers not knowing the `id_server`. All other differences are unintentional.
2019-05-28 15:05:41 -06:00
Hubert Chathi ac08c84612
remove duplicate consideration
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-05-23 14:39:46 -04:00
Hubert Chathi dd74baa5d0 clarify wording 2019-05-22 12:54:01 -04:00
Hubert Chathi d39baba21b add a security note 2019-05-22 12:44:04 -04:00
Hubert Chathi 7705006260 1 hour seems to be fine 2019-05-22 12:43:43 -04:00
Sorunome 273af2a2e0
wrap long lines 2019-05-22 17:30:18 +02:00
Sorunome 6f3bcb56d3
add rendering idea 2019-05-22 15:35:32 +02:00
Sorunome ebb1351a9f
linebreak consistency 2019-05-22 15:22:22 +02:00
Sorunome d750115fdc
fix up some things 2019-05-22 15:20:30 +02:00
Sorunome 70d3fd809e
add spoiler msc 2019-05-22 14:46:31 +02:00
Hubert Chathi 7bad359b0d switch to the 3-key system, and some wording improvements 2019-05-21 13:57:55 -04:00
Matthew Hodgson 37871106c6 MSC2002: Proposal for adopting MSC1884 as v4 rooms (#2002) 2019-05-21 16:21:46 +01:00
Brendan Abolivier e71b3ac754 Add details to what an unrecognised request is 2019-05-01 16:53:29 +01:00
Travis Ralston 62748a026d
Rename 0000-leave-reasons.md to 1983-leave-reasons.md 2019-04-30 15:14:54 -06:00
Travis Ralston 97786da4ad
Create 0000-leave-reasons.md 2019-04-30 15:13:28 -06:00
Brendan Abolivier c1721cb6f7 Merge branch 'master' into babolivier/standardised-federation-response-format 2019-04-29 10:25:39 +01:00
Brendan Abolivier 661d69858e Add fallback 2019-04-29 10:24:46 +01:00
Richard van der Hoff 2ae122903f
Use the right name
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-04-25 20:49:58 -04:00
Andrew Morgan c230c2fd2f
Merge pull request #1967 from aqtusia/master
Replace /bind with /3pid/bind
2019-04-25 13:30:10 -07:00
Andrew Morgan 5792e5f4de
Merge pull request #1954 from matrix-org/neilj/Remove-prev_content-from-the-essential-keys-list2
MSC1954: Proposal to remove prev_content from the essential keys list
2019-04-21 02:00:18 -07:00
Neil Johnson 911fb94ea0
typos 2019-04-15 17:08:09 +01:00
aqtusia 2eb9708f7f
Replace /unbind with /3pid/unbind 2019-04-14 18:21:59 +02:00
Neil Johnson b41fbc86b6 add further potential issues and security concerns 2019-04-09 13:56:45 +01:00
Travis Ralston 0bab70c14e Assign MSC number 2019-04-08 21:37:35 -06:00
Travis Ralston d6d0f9780d Proposal for basic integration manager authentication APIs 2019-04-08 21:36:16 -06:00
Travis Ralston b12e92440e
Merge pull request #1930 from matrix-org/travis/msc/tombstone-notif
MSC1930: Add a push rule for m.room.tombstone events
2019-04-08 11:25:52 -06:00
Travis Ralston cecf75c9a9
Merge pull request #1884 from matrix-org/rav/proposal/no_slash_in_event_id
MSC1884: Proposal to replace slashes in event IDs
2019-04-08 11:25:26 -06:00
J. Ryan Stinnett 13d63685d3
Spelling
Co-Authored-By: turt2live <travpc@gmail.com>
2019-04-08 07:05:38 -06:00
Travis Ralston 2dcda7d564 Add a mention that clients should re-query .well-known 2019-04-07 21:17:14 -06:00
Travis Ralston dffe19bb76 Rename file to match MSC number 2019-04-07 21:07:46 -06:00
Travis Ralston cc10444d4b Assign MSC number 2019-04-07 21:06:42 -06:00
Travis Ralston 29a9982447 Proposal for integration manager discovery 2019-04-07 21:05:59 -06:00
Travis Ralston 99cd064f26 Update original MSC as per proposal guidelines 2019-04-05 16:37:27 -06:00
Neil Johnson 743eeca27a MSC to remove prev_content from the essential keys list 2019-04-05 15:19:22 +01:00
Matthew Hodgson efcbf2f807
Merge branch 'master' into matthew/msc1779 2019-04-03 00:36:23 +01:00
Matthew Hodgson 88f533f0db incorporate further feedback 2019-04-01 10:27:30 +01:00
Matthew Hodgson 417f3a3e8b incorporate further feedback from vdh 2019-04-01 00:58:10 +01:00
Hubert Chathi 9dcf2d6a28
Update proposals/1884-replace-slashes-in-event_ids.md
Co-Authored-By: ara4n <matthew@arasphere.net>
2019-04-01 00:43:31 +01:00
Matthew Hodgson 207d6cf851 update MSC1884 to reflect new conclusions following discussion on the PR 2019-03-30 13:12:18 +00:00
Hubert Chathi 979827bad3 rename to match MSC number 2019-03-27 21:57:13 -04:00
Hubert Chathi 63c6d030fd draft of secure server-side storage 2019-03-27 21:48:12 -04:00
Hubert Chathi 4e95f8062a add examples for federation endpoints 2019-03-26 16:51:46 -04:00
Hubert Chathi 696e568fb2 add some clarifications 2019-03-26 15:10:14 -04:00
David Baker 410a5dbbff
Update proposals/1915-unbind-identity-server-param.md
Co-Authored-By: erikjohnston <erikj@jki.re>
2019-03-18 09:36:01 +00:00
Erik Johnston bd4fab7a15 Be more explicit identity server selection and errors 2019-03-18 09:28:46 +00:00
Travis Ralston 0e07a6d243 Proposal to have a push rule for m.room.tombstone events 2019-03-15 13:32:38 -06:00
Richard van der Hoff 1c4262e556
Apply suggestions from code review
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-03-15 13:40:44 -04:00
Richard van der Hoff 87824c1c96
Update proposals/1219-storing-megolm-keys-serverside.md
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-03-15 13:38:19 -04:00
Hubert Chathi 1749a91344 make MSC mentions into links 2019-03-13 23:41:43 -04:00
Hubert Chathi 4842a718d8 fill in some of the other sections 2019-03-13 23:39:00 -04:00
Hubert Chathi f9a00fc943 clarify that not understanding a verification method should not auto-cancel 2019-03-13 23:25:11 -04:00
Erik Johnston 60f1cf79de Update wording and add deactivate account API 2019-03-12 14:30:16 +00:00
David Baker 77110b46df
Update proposals/1915-unbind-identity-server-param.md
Co-Authored-By: erikjohnston <erikj@jki.re>
2019-03-08 12:14:08 +00:00
Erik Johnston ee6513d608 Add alternative sid/client_secret authentication 2019-03-07 16:52:58 +00:00
Erik Johnston f92925ed45 Add a 3PID unbind API 2019-03-06 11:32:28 +00:00
Richard van der Hoff 82258fc0fc Proposal for changing event ids. Again. 2019-02-13 23:11:14 +00:00
Hubert Chathi ca7aa8b0ba fill in more details, including federation bits 2019-02-12 20:12:17 -05:00
Erik Johnston 7eb8b5d7f3 Add proposal for invite error code 2019-02-08 14:36:12 +00:00
manuroe 0051c6a377 Key backup: Return {hash, count} for key upload requests
This is this tuple that allows the client to check if it has locally all keys of the backup
2019-02-07 23:32:29 -05:00
manuroe 7cde3193e5 Key backup: Explain `hash` better 2019-02-07 23:32:29 -05:00
manuroe 82ff866b58 Key backup: Add `hash` to represent stored keys
so that a matrix client A can check it is synchronised with the backup.
If not, that means that another client B has pushed keys client A does not have locally. Client A should then propose to the end user to retrieve  keys from the backup.
2019-02-07 23:32:29 -05:00
manuroe ed945d6744 Key backup: Expose the number of keys stored in the backup
so that matrix clients can compare it with the number of keys they have locally.
2019-02-07 23:32:29 -05:00
Hubert Chathi e7f7926023 add algorithm and version to the example
since they're marked as required
2019-02-07 23:30:01 -05:00
manuroe d43b595b5e Key backup: Fix PR remarks on `PUT /room_keys/version/{version}` 2019-02-07 23:30:01 -05:00
manuroe 2099308d4c Key backup: add `PUT /room_keys/version/{version}` to allow matrix clients to add signatures to an existing backup 2019-02-07 23:30:01 -05:00
manuroe e02b345c62 Revert "Key backup: add `PUT /room_keys/version/{version}` to allow matrix clients to add signatures to an existing backup"
This reverts commit c9b38cbe53.
2019-02-06 11:45:11 +01:00
manuroe c9b38cbe53 Key backup: add `PUT /room_keys/version/{version}` to allow matrix clients to add signatures to an existing backup 2019-02-06 11:37:19 +01:00
Travis Ralston f5134b2d8b
Merge pull request #1819 from matrix-org/neilj/msc-remove-presence-lists
MSC:1819 Remove Presence Lists
2019-02-01 12:00:42 -07:00
Travis Ralston 1cf9086c26
Merge pull request #1831 from matrix-org/travis/msc/wk-before-srv
MSC1831: Change the order of .well-known and SRV discovery techniques
2019-02-01 11:52:59 -07:00
Travis Ralston 41e50d553e
Merge pull request #1830 from matrix-org/travis/spec/x509-wk
Specify .well-known s2s discovery and X.509 validation
2019-02-01 08:36:55 -07:00
Travis Ralston 6421582bf2 Clarifications and alter the error handling of .well-known
Note that MSC1831 changes the order, so the changes to MSC1708 might not make sense when combining all the proposals together. However, independently the change should make sense.
2019-02-01 08:18:12 -07:00
Travis Ralston 00de03bddb Merge remote-tracking branch 'origin/travis/msc/wk-before-srv' into travis/msc/wk-before-srv 2019-01-31 10:53:22 -07:00
Travis Ralston 2fe6b2cb5c Plagiarize from richvdh for a better explanation 2019-01-31 10:53:06 -07:00
Travis Ralston ab7876cbef
Update 1831-srv-after-wellknown.md 2019-01-31 09:55:58 -07:00
Travis Ralston 0e90cf6a0c Proposal to change the order of .well-known and SRV discovery techniques 2019-01-31 09:38:58 -07:00
Travis Ralston ccce6c196d Specify how capabilities work in the c2s API
Original proposals:
* https://github.com/matrix-org/matrix-doc/pull/1753
* https://github.com/matrix-org/matrix-doc/pull/1804

Implementation proof:
* https://github.com/matrix-org/synapse/pull/4472
* https://github.com/matrix-org/matrix-js-sdk/pull/830

There is one change to MSC1753 which is included in this commit. MSC1804 remains unchanged. In the original proposal, the change password capability being present was an indication that password changes were possible. It was found that this doesn't really communicate the state very well to clients in that lack of a capability (or a 404, etc) would mean that users would erroneously not be able to change their passwords. A simple boolean flag was added to assist clients in detecting this capability.
2019-01-30 19:43:55 -07:00
Travis Ralston 72a2871021
Merge pull request #1804 from matrix-org/travis/msc/room-version-client-advertising
MSC1804: Advertising capable room versions to clients
2019-01-30 17:06:24 -07:00
Erik Johnston 1c0742ed6a
MSC 1659 Proposal: Change Event IDs to Hashes (#1659) 2019-01-30 17:08:21 +00:00
Hubert Chathi ca0baa54df various fixes
- fix typo
- make property name plural since it may contain multiple items
- mention that users will appear in sync when they upload keys
2019-01-30 11:26:21 -05:00
Neil Johnson 2eae933ed6 hard wrap to 80 chars 2019-01-30 11:28:53 +00:00
Neil Johnson 4f13f5289e
Update 1819-remove-presence-lists.md
Add references to exactly what this proposal would remove
2019-01-30 11:20:38 +00:00
Richard van der Hoff 5151aa0aa7
Update proposals/1819-remove-presence-lists.md
Co-Authored-By: neilisfragile <neil@matrix.org>
2019-01-30 10:44:15 +00:00
Travis Ralston 2c3ba0b135
Merge pull request #1813 from matrix-org/erikj/make_membership_room_ver
MSC 1813 - Federation Make Membership Room Version
2019-01-29 10:17:48 -07:00
Richard van der Hoff de57d3950f
Relax the requirement for a content-type on .well-known (#1824)
The main reason for this is that Apache etc won't stick a content-type on by
default, because they don't know it's JSON, so requiring it seems like it will
require unnecessary hoop-humping for everyone who wants to use a .well-known.
2019-01-29 14:46:27 +00:00
Neil Johnson 9f517f33ce
Create 1819-remove-presence-lists.md 2019-01-28 17:59:17 +00:00
Travis Ralston 577edeb53b Say that !stable == unstable 2019-01-25 09:27:23 -07:00
Travis Ralston 052d68d83d
Merge pull request #1791 from matrix-org/travis/spec/rver-upgrades
Add room version upgrades
2019-01-23 19:04:24 -07:00
Travis Ralston 50eba23669 Update MSC to match how room versions work
As per 1773.
2019-01-22 18:24:04 -07:00
Erik Johnston 3ec3adbc24 Proposal for add room_version to make_* fed APIs 2019-01-22 10:55:27 +00:00
Travis Ralston f308871ed9
Merge pull request #1794 from matrix-org/erikj/fed_invite_v2
MSC 1794 - Federation v2 Invite API
2019-01-21 07:59:07 -07:00
Hubert Chathi 41c14c9e7d
uhoreg tweaks
Co-Authored-By: ara4n <matthew@arasphere.net>
2019-01-18 22:56:19 +00:00
Matthew Hodgson 20b9a33b12 clarify 100% threshold for new spec core team additions 2019-01-18 22:39:44 +00:00