Andrew Morgan
9fd6bd3184
Add details about why this proposal should exist
2019-07-23 15:25:41 +01:00
Andrew Morgan
b26a9ed1fd
Expand on why we can't trust dirty homeservers
2019-07-23 13:28:42 +01:00
Andrew Morgan
577021f12b
resolve some comments
2019-07-23 11:48:01 +01:00
Richard van der Hoff
9e264fedc9
Updates
...
* preserve *all* of `create`
* don't preserve `notifications` or `algorithm`, and add some justifcation.
2019-07-22 16:47:49 +01:00
Andrew Morgan
887cd5e7d0
I really hope someone doesn't invest none-hash
2019-07-22 16:00:29 +01:00
Andrew Morgan
0444c8016b
review comments
2019-07-22 15:33:49 +01:00
Richard van der Hoff
4503327450
Add some compatibility hacks.
2019-07-22 15:17:52 +01:00
Richard van der Hoff
d324cac847
preserve powerlevel
2019-07-16 19:32:34 +01:00
Richard van der Hoff
b49a950245
Update proposals/2176-update-redaction-rules.md
...
fix typo
Co-Authored-By: Kitsune Ral <Kitsune-Ral@users.sf.net>
2019-07-16 19:26:02 +01:00
Sorunome
9ebcff5758
fix typo, add section on html details element
2019-07-16 17:11:07 +02:00
Andrew Morgan
36cb8ed894
none -> m.none
2019-07-16 10:44:02 +01:00
Sorunome
1f786ae6dc
commit image into repo, fix typo
2019-07-15 20:52:24 +02:00
David Baker
d9269b084f
Exclude pubkey endpoints from auth
2019-07-15 16:58:24 +01:00
David Baker
a1de6ff634
Hopefully clarify some bits
2019-07-15 10:26:24 +01:00
Richard van der Hoff
cd5549d483
Proposal to update the redaction algorithm
2019-07-14 22:50:46 +01:00
Richard van der Hoff
b09d48a9f7
Spec link
2019-07-14 20:22:39 +01:00
Richard van der Hoff
78d46b2890
Proposal to move the `redacts` key to a sane place
2019-07-14 20:20:09 +01:00
David Baker
25a47afa32
unnecessary capital mk. 2
...
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:55:40 +01:00
David Baker
6e061b1baf
unnecessary capital
...
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:55:11 +01:00
David Baker
f474b31f5f
typo
...
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:54:45 +01:00
Andrew Morgan
3514437d24
Ability for client/server to decide on no hashing
2019-07-12 11:37:41 +01:00
David Baker
9bb6ad80d1
typo
2019-07-10 16:13:38 +01:00
Andrew Morgan
ed67e26037
pepper must not be an empty string, append medium
2019-07-08 17:03:20 +01:00
Andrew Morgan
1963a24832
fix attacks paragraph
2019-07-08 13:27:38 +01:00
Andrew Morgan
dd8a6549c9
Address review comments
2019-07-08 11:55:37 +01:00
David Baker
701d340da1
Remove exception for request/submitToken
2019-07-05 19:00:15 +01:00
David Baker
bf8a1e5d5f
Add way to get the HS to bind/unbind existing 3pids
2019-07-05 18:11:42 +01:00
Andrew Morgan
3702669424
update from comments
2019-07-05 15:59:29 +01:00
David Baker
30dcc28f9b
try & clarify that HS signature isn't the only acceptable auth for unbind
2019-07-04 18:38:31 +01:00
Andrew Morgan
f4a1e02884
simple method once more
2019-07-04 16:28:49 +01:00
Hubert Chathi
4d31ddc8c9
additions and clarifications
...
- indicate how to use MSC 1946 to store/share private keys
- add signing by devices to enable migrating from device verifications
- add information about signature upload failures and M_INVALID_SIGNATURE code
- add security consideration
2019-07-03 15:09:06 -04:00
Andrew Morgan
53bd384f2e
Clarify salting
2019-07-03 09:59:38 +01:00
Hubert Chathi
3aaf181db2
rename some things and add clarification
2019-07-02 14:05:06 -04:00
David Baker
1a669348d8
http status code
2019-07-02 11:27:46 +01:00
David Baker
d15c9df115
fullstop
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:25:26 +01:00
David Baker
e28f7aad72
slash
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:25:12 +01:00
David Baker
4c72c37b80
slash
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:24:51 +01:00
David Baker
10858bf83b
set account data after registration
2019-07-02 11:22:41 +01:00
David Baker
79dbad2914
remove acceptance token mention
2019-07-02 11:17:27 +01:00
David Baker
ac6b9bdb7c
s/deprecate/remove/
2019-07-02 11:16:25 +01:00
David Baker
7f65364804
Typo
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:13:12 +01:00
David Baker
03e6ab0103
re-word double openid
2019-07-02 11:11:50 +01:00
David Baker
d00dfb7822
exclude submittoken too
2019-07-02 11:04:06 +01:00
David Baker
f02e4c2e9c
both registers are excluded from auth
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:00:39 +01:00
David Baker
5374030cc0
Drop application/x-form-www-urlencoded in v2
2019-07-02 10:59:08 +01:00
David Baker
2d11217d4e
Typo
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 10:56:32 +01:00
David Baker
8af35be13f
Typo
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 10:56:12 +01:00
Andrew Morgan
922a20ba26
small fixes
2019-07-01 16:30:07 +01:00
Andrew Morgan
6f81d3774b
New hashing method
2019-07-01 16:23:28 +01:00
David Baker
fe14d3c9f0
Spec terms response
2019-06-28 18:07:24 +01:00
David Baker
786d5bc281
rewrite UI auth tradeoffs
2019-06-28 10:25:24 +01:00
David Baker
45d630951c
back to M_TERMS_NOT_SIGNED
2019-06-28 09:32:15 +01:00
David Baker
83bb3861ba
line wrap
2019-06-28 09:31:53 +01:00
Travis Ralston
8897ea4bb1
Merge branch 'master' into travis/msc/integrations/discovery
2019-06-27 21:56:23 -06:00
Travis Ralston
a2a7b7ff13
Merge branch 'master' into travis/msc/integrations/auth
2019-06-27 21:55:59 -06:00
Travis Ralston
bfd8e52c23
Formatting
2019-06-27 20:45:23 -06:00
Travis Ralston
d8283b9cdf
Add option to use query string
2019-06-27 20:44:49 -06:00
Travis Ralston
e80753e56c
Add .well-known discovery
2019-06-27 18:24:42 -06:00
David Baker
4be283ccb3
Typing
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-27 17:31:15 +01:00
David Baker
f95197b422
make the many-anded sentence a list
2019-06-27 17:30:36 +01:00
David Baker
10a6a59a12
Deprecate `bind_email` / `bind_msisdn`
2019-06-27 16:58:22 +01:00
David Baker
b5326de1c4
Exclude requestToken endpoints from auth requirement
2019-06-27 16:34:46 +01:00
Sorunome
540aab82a1
accidentally formatted the wrong entry
2019-06-27 13:09:15 +02:00
Sorunome
6260871a21
spoiler fallback to uploaded media
2019-06-27 13:07:08 +02:00
David Baker
21b9eaf8de
No custom HTTP headers
...
Use the obvious way: in the same place as the ID server address
2019-06-26 17:56:41 +01:00
David Baker
2694bb1090
Add really horrible custom HTTP header
...
for giving the IS token to the HS
2019-06-26 17:41:21 +01:00
David Baker
58cf083a6a
backwards compat
2019-06-26 15:31:11 +01:00
David Baker
6273868323
Clarify v1 API deprecation
2019-06-26 15:29:24 +01:00
David Baker
4edf826c93
Capitalise on our identifiers
2019-06-26 15:29:23 +01:00
David Baker
ba7047ce77
Clarify we must be accepting HS auth
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:51:11 +01:00
David Baker
1d75828c71
Clarify what to do if no (new) docs
2019-06-26 14:45:25 +01:00
David Baker
af691b5a8a
Clarify this applies to 2134
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:37:06 +01:00
David Baker
57094276ce
Typing hard is
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:36:15 +01:00
Andrew Morgan
7549c5dd76
Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity
2019-06-26 10:57:07 +01:00
Andrew Morgan
0fd4fe2542
Add algo/pepper to err resp
2019-06-26 10:55:44 +01:00
Andrew Morgan
dfb37fcce1
update with feedback
2019-06-25 18:55:18 +01:00
Andrew Morgan
df88b13ce1
Update proposals/2134-identity-hash-lookup.md
...
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-06-25 18:15:02 +01:00
David Baker
9e0d8b9cb2
Use M_CONSENT_NOT_GIVEN
...
No idea where I got the other one from: we already have one in the
spec, so use it.
2019-06-25 17:17:39 +01:00
David Baker
0dae2d5812
GET terms must be unauthed.
...
Detail process for new auth (don't register until consent given).
Specifically mention the authentication header.
2019-06-25 15:52:55 +01:00
Sorunome
4f83cc1c24
moved client spoiler conversion to potential issues
2019-06-25 16:19:29 +02:00
David Baker
6f374dc981
Re-write for OpenID auth
2019-06-25 14:58:15 +01:00
David Baker
2c09580e27
line wrap
2019-06-25 11:14:35 +01:00
Andrew Morgan
96e43aaf45
Define what characters lookup_pepper can consist of
2019-06-25 10:37:45 +01:00
Andrew Morgan
f951f312e1
Fix terrible wording
2019-06-25 10:30:29 +01:00
Andrew Morgan
fae6883cc0
Update with review comments
2019-06-25 10:18:11 +01:00
Andrew Morgan
0a4c83ddb9
no plural. 3pid -> 3PID
2019-06-24 17:54:23 +01:00
Andrew Morgan
36a35a33cc
Clarify how the spec defines hashing algs
2019-06-24 16:59:58 +01:00
Andrew Morgan
ee10576d60
Update with feedback
2019-06-24 15:43:19 +01:00
David Baker
abb407145a
HS docs must be added too
...
also, unbind must not error when called by HSes and proxy terms token
2019-06-24 15:30:19 +01:00
David Baker
8ae47557c9
s/Third Party/Accepted/
2019-06-24 15:22:19 +01:00
David Baker
2555801458
m.third_party_terms -> m.accepted_terms
...
as it will have the HS's terms too
2019-06-24 14:56:48 +01:00
David Baker
4ba9b2a599
perfix
2019-06-24 13:18:41 +01:00
David Baker
a63e4420eb
Linkify
...
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
2019-06-24 13:17:58 +01:00
Andrew Morgan
02ac0f3b33
Give the user control!
2019-06-24 11:56:04 +01:00
Andrew Morgan
acdb2b1b42
Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity
2019-06-24 11:47:53 +01:00
Andrew Morgan
e3ff80291f
http err codes and hash wording fixes
2019-06-24 11:47:00 +01:00
Travis Ralston
21e93a123e
Naming and capitalization
2019-06-21 11:36:16 -06:00
Andrew Morgan
53f025edfc
Specify optional pepper rotation period
2019-06-21 15:42:11 +01:00
Andrew Morgan
2383a55720
404 for deprecated endpoint
2019-06-21 15:40:26 +01:00
Andrew Morgan
c63edc7b97
Clean up wording around peppers and hashes
2019-06-21 14:12:50 +01:00
Andrew Morgan
e3b2ad38b5
pepper -> lookup_pepper
2019-06-21 12:17:01 +01:00
Andrew Morgan
1fea604ba9
Don't define error message
2019-06-21 11:32:23 +01:00
David Baker
9ca3ccc81c
Add requirments section for de-duping between services.
2019-06-21 09:35:26 +01:00
David Baker
d4ca0c237a
Specify ID grammar and add comma
2019-06-21 09:25:16 +01:00
David Baker
276e2b6843
Typo
...
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-21 09:14:24 +01:00
David Baker
cf48030d1f
One more tradeoff
2019-06-20 17:48:21 +01:00
David Baker
32c7fc638d
you have a number now
2019-06-20 17:44:28 +01:00
David Baker
23af87e9fc
Proposal for IS & IM TOS API
2019-06-20 17:41:19 +01:00
Andrew Morgan
1343e19a6d
Specify hash algorithm and fallback considerations
2019-06-20 14:36:47 +01:00
Andrew Morgan
f28476f0f3
line wrap and fix wording
2019-06-19 16:29:24 +01:00
Andrew Morgan
3ee27d3818
salt->pepper. 1 pepper/is. add multi-hash idea
2019-06-19 15:14:30 +01:00
Andrew Morgan
f41ed02c9e
remove sec concerns
2019-06-18 17:22:30 +01:00
Andrew Morgan
6bb4a9e911
Add per-is salt consideration
2019-06-18 17:09:06 +01:00
Andrew Morgan
5049e552e7
Drop /api from the new endpoint
2019-06-18 17:05:46 +01:00
Andrew Morgan
bc9b6c3659
Add salt to example and signal link
2019-06-18 17:03:49 +01:00
Andrew Morgan
063b9f60e0
Require a salt to defend against rainbow tables
2019-06-18 16:50:47 +01:00
Andrew Morgan
d2b47a585d
Allow for changing the hashing algo and add at-rest details
2019-06-18 16:37:02 +01:00
Will Hunt
f8dbf2b360
Update proposals/2134-identity-hash-lookup.md
...
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-06-17 13:17:57 +01:00
Will Hunt
12431f1a4e
Base64 potential issue
2019-06-15 13:29:59 +01:00
Will Hunt
8b92df74ab
s/medium/address
2019-06-15 13:25:42 +01:00
Will Hunt
a8c26d208b
Wrap
2019-06-15 12:43:20 +01:00
Will Hunt
3eff76b00a
MSC 2134
2019-06-15 12:37:40 +01:00
Sorunome
26349417ba
update spoiler render idea
2019-06-11 21:13:16 +02:00
Travis Ralston
fc1d8f184d
Merge pull request #2078 from matrix-org/anoa/msc2078
...
MSC2078: Sending Third-Party Request Tokens via the Homeserver
2019-06-10 14:25:35 -06:00
Travis Ralston
65c3935419
Merge pull request #2076 from matrix-org/rav/proposal/enforce_key_validity_periods
...
MSC2076: Enforce key-validity periods when validating event signatures
2019-06-10 07:25:09 -06:00
Travis Ralston
19575eb4d4
Merge pull request #2077 from matrix-org/rav/proposal/room_v5
...
MSC2077: room v5
2019-06-10 07:24:41 -06:00
Matthew Hodgson
950415c72a
Merge branch 'master' into matthew/msc1779
2019-06-07 19:19:19 +01:00
Matthew Hodgson
be568ba9ab
link to the legalified version of MSC1779
2019-06-07 19:10:26 +01:00
Travis Ralston
9cf03325b9
Merge pull request #2046 from matrix-org/travis/1.0/msc1915-unbind
...
Spec 3PID unbind API
2019-06-07 07:33:33 -06:00
Andrew Morgan
45e271c0f7
be super explicit
2019-06-07 13:29:22 +01:00
Andrew Morgan
7f65704ebc
Update wording and answer review comments
2019-06-07 12:45:11 +01:00
Andrew Morgan
3e23dde341
Be clear that any 3PID token request can now be done by the hs
2019-06-05 21:49:02 +01:00
Andrew Morgan
9000247008
Merge branch 'anoa/msc2078' of github.com:matrix-org/matrix-doc into anoa/msc2078
...
* 'anoa/msc2078' of github.com:matrix-org/matrix-doc:
Update proposals/2078-homeserver-password-resets.md
2019-06-05 17:54:27 +01:00
Andrew Morgan
d3f21e0360
Address review comments
2019-06-05 17:54:18 +01:00
Andrew Morgan
e49518099d
Be explicit with request/responses
2019-06-05 17:37:09 +01:00
Andrew Morgan
395acf8e06
Update proposals/2078-homeserver-password-resets.md
...
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-06-05 15:58:14 +01:00
Andrew Morgan
6bb48723e8
The HS can send any URL
2019-06-05 15:43:57 +01:00
Andrew Morgan
6e0af5e64c
If no submit_url, just send it to the IS as before
2019-06-05 15:07:06 +01:00
Andrew Morgan
4174b61279
submit_url only if the user has to enter the code somewhere
2019-06-05 14:50:40 +01:00
Andrew Morgan
8259ae292a
Capitalise SMS
2019-06-05 14:39:36 +01:00
Andrew Morgan
7e18c5d5a8
Add new submit_url response field
2019-06-05 14:38:16 +01:00
Andrew Morgan
8cba7adcdf
Clarify conditions for attack
2019-06-05 13:52:02 +01:00
Andrew Morgan
085c5667a4
wrap lines
2019-06-05 13:42:23 +01:00
Andrew Morgan
1956f1a916
Revert "Remove attacker bit"
...
This reverts commit c9711acbc5
.
2019-06-05 12:59:58 +01:00
Andrew Morgan
c9711acbc5
Remove attacker bit
2019-06-05 12:52:01 +01:00
Andrew Morgan
4e692735f5
Update some wording
2019-06-05 11:25:26 +01:00
Andrew Morgan
cf932ad4f8
msc2078 - proposal for homeservers sending passwords reset requests
2019-06-05 11:20:28 +01:00
Richard van der Hoff
40b10f254b
clarifications
2019-06-05 07:18:25 +01:00
Richard van der Hoff
3347a480eb
fix typo
2019-06-05 00:07:05 +01:00
Richard van der Hoff
d2ccd6b268
MSC2077: room v5
2019-06-04 23:53:42 +01:00
Richard van der Hoff
37b1e171fc
MSC2076: Enforce key-validity periods when validating event signatures
2019-06-04 23:51:10 +01:00
Travis Ralston
b92b147797
Merge pull request #1719 from uhoreg/olm_unwedging
...
MSC1719: olm session unwedging
2019-06-04 11:14:15 -06:00
Hubert Chathi
fee2ebf682
fix typo
...
Co-Authored-By: Shamil K <me@noteness.in>
2019-06-02 16:09:47 -04:00
Travis Ralston
dda7afa845
Merge pull request #1717 from uhoreg/e2e_verification
...
MSC1717: common definitions for key verification methods
2019-06-02 10:45:39 -06:00
Hubert Chathi
da5ce919f2
add sharing secrets, and a bunch of cleanups
2019-05-31 12:16:59 -04:00
Hubert Chathi
6929579360
add some clarifications
2019-05-29 15:18:54 -04:00
Hubert Chathi
ffb70a2fab
fix typo
...
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
2019-05-29 15:01:35 -04:00
Hubert Chathi
84f0d9d7e4
add clarification
2019-05-28 20:07:45 -04:00
Travis Ralston
0463084924
Spec 3PID unbind API
...
As per [MSC1915](https://github.com/matrix-org/matrix-doc/pull/1915 )
Implementation proof:
* https://github.com/matrix-org/synapse/pull/4982
* https://github.com/matrix-org/sydent/pull/160
The only alteration made which differs from the proposal is clarity on how to handle homeservers not knowing the `id_server`. All other differences are unintentional.
2019-05-28 15:05:41 -06:00
Hubert Chathi
ac08c84612
remove duplicate consideration
...
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-05-23 14:39:46 -04:00
Hubert Chathi
dd74baa5d0
clarify wording
2019-05-22 12:54:01 -04:00
Hubert Chathi
d39baba21b
add a security note
2019-05-22 12:44:04 -04:00
Hubert Chathi
7705006260
1 hour seems to be fine
2019-05-22 12:43:43 -04:00
Sorunome
273af2a2e0
wrap long lines
2019-05-22 17:30:18 +02:00
Sorunome
6f3bcb56d3
add rendering idea
2019-05-22 15:35:32 +02:00
Sorunome
ebb1351a9f
linebreak consistency
2019-05-22 15:22:22 +02:00
Sorunome
d750115fdc
fix up some things
2019-05-22 15:20:30 +02:00
Sorunome
70d3fd809e
add spoiler msc
2019-05-22 14:46:31 +02:00
Hubert Chathi
7bad359b0d
switch to the 3-key system, and some wording improvements
2019-05-21 13:57:55 -04:00
Matthew Hodgson
37871106c6
MSC2002: Proposal for adopting MSC1884 as v4 rooms ( #2002 )
2019-05-21 16:21:46 +01:00
Brendan Abolivier
e71b3ac754
Add details to what an unrecognised request is
2019-05-01 16:53:29 +01:00
Travis Ralston
62748a026d
Rename 0000-leave-reasons.md to 1983-leave-reasons.md
2019-04-30 15:14:54 -06:00
Travis Ralston
97786da4ad
Create 0000-leave-reasons.md
2019-04-30 15:13:28 -06:00
Brendan Abolivier
c1721cb6f7
Merge branch 'master' into babolivier/standardised-federation-response-format
2019-04-29 10:25:39 +01:00
Brendan Abolivier
661d69858e
Add fallback
2019-04-29 10:24:46 +01:00
Richard van der Hoff
2ae122903f
Use the right name
...
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-04-25 20:49:58 -04:00
Andrew Morgan
c230c2fd2f
Merge pull request #1967 from aqtusia/master
...
Replace /bind with /3pid/bind
2019-04-25 13:30:10 -07:00
Andrew Morgan
5792e5f4de
Merge pull request #1954 from matrix-org/neilj/Remove-prev_content-from-the-essential-keys-list2
...
MSC1954: Proposal to remove prev_content from the essential keys list
2019-04-21 02:00:18 -07:00
Neil Johnson
911fb94ea0
typos
2019-04-15 17:08:09 +01:00
aqtusia
2eb9708f7f
Replace /unbind with /3pid/unbind
2019-04-14 18:21:59 +02:00
Neil Johnson
b41fbc86b6
add further potential issues and security concerns
2019-04-09 13:56:45 +01:00
Travis Ralston
0bab70c14e
Assign MSC number
2019-04-08 21:37:35 -06:00
Travis Ralston
d6d0f9780d
Proposal for basic integration manager authentication APIs
2019-04-08 21:36:16 -06:00
Travis Ralston
b12e92440e
Merge pull request #1930 from matrix-org/travis/msc/tombstone-notif
...
MSC1930: Add a push rule for m.room.tombstone events
2019-04-08 11:25:52 -06:00
Travis Ralston
cecf75c9a9
Merge pull request #1884 from matrix-org/rav/proposal/no_slash_in_event_id
...
MSC1884: Proposal to replace slashes in event IDs
2019-04-08 11:25:26 -06:00
J. Ryan Stinnett
13d63685d3
Spelling
...
Co-Authored-By: turt2live <travpc@gmail.com>
2019-04-08 07:05:38 -06:00
Travis Ralston
2dcda7d564
Add a mention that clients should re-query .well-known
2019-04-07 21:17:14 -06:00
Travis Ralston
dffe19bb76
Rename file to match MSC number
2019-04-07 21:07:46 -06:00
Travis Ralston
cc10444d4b
Assign MSC number
2019-04-07 21:06:42 -06:00
Travis Ralston
29a9982447
Proposal for integration manager discovery
2019-04-07 21:05:59 -06:00
Travis Ralston
99cd064f26
Update original MSC as per proposal guidelines
2019-04-05 16:37:27 -06:00
Neil Johnson
743eeca27a
MSC to remove prev_content from the essential keys list
2019-04-05 15:19:22 +01:00
Matthew Hodgson
efcbf2f807
Merge branch 'master' into matthew/msc1779
2019-04-03 00:36:23 +01:00
Matthew Hodgson
88f533f0db
incorporate further feedback
2019-04-01 10:27:30 +01:00
Matthew Hodgson
417f3a3e8b
incorporate further feedback from vdh
2019-04-01 00:58:10 +01:00
Hubert Chathi
9dcf2d6a28
Update proposals/1884-replace-slashes-in-event_ids.md
...
Co-Authored-By: ara4n <matthew@arasphere.net>
2019-04-01 00:43:31 +01:00
Matthew Hodgson
207d6cf851
update MSC1884 to reflect new conclusions following discussion on the PR
2019-03-30 13:12:18 +00:00
Hubert Chathi
979827bad3
rename to match MSC number
2019-03-27 21:57:13 -04:00
Hubert Chathi
63c6d030fd
draft of secure server-side storage
2019-03-27 21:48:12 -04:00
Hubert Chathi
4e95f8062a
add examples for federation endpoints
2019-03-26 16:51:46 -04:00
Hubert Chathi
696e568fb2
add some clarifications
2019-03-26 15:10:14 -04:00
David Baker
410a5dbbff
Update proposals/1915-unbind-identity-server-param.md
...
Co-Authored-By: erikjohnston <erikj@jki.re>
2019-03-18 09:36:01 +00:00
Erik Johnston
bd4fab7a15
Be more explicit identity server selection and errors
2019-03-18 09:28:46 +00:00
Travis Ralston
0e07a6d243
Proposal to have a push rule for m.room.tombstone events
2019-03-15 13:32:38 -06:00
Richard van der Hoff
1c4262e556
Apply suggestions from code review
...
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-03-15 13:40:44 -04:00
Richard van der Hoff
87824c1c96
Update proposals/1219-storing-megolm-keys-serverside.md
...
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-03-15 13:38:19 -04:00
Hubert Chathi
1749a91344
make MSC mentions into links
2019-03-13 23:41:43 -04:00
Hubert Chathi
4842a718d8
fill in some of the other sections
2019-03-13 23:39:00 -04:00
Hubert Chathi
f9a00fc943
clarify that not understanding a verification method should not auto-cancel
2019-03-13 23:25:11 -04:00
Erik Johnston
60f1cf79de
Update wording and add deactivate account API
2019-03-12 14:30:16 +00:00
David Baker
77110b46df
Update proposals/1915-unbind-identity-server-param.md
...
Co-Authored-By: erikjohnston <erikj@jki.re>
2019-03-08 12:14:08 +00:00
Erik Johnston
ee6513d608
Add alternative sid/client_secret authentication
2019-03-07 16:52:58 +00:00
Erik Johnston
f92925ed45
Add a 3PID unbind API
2019-03-06 11:32:28 +00:00
Richard van der Hoff
82258fc0fc
Proposal for changing event ids. Again.
2019-02-13 23:11:14 +00:00
Hubert Chathi
ca7aa8b0ba
fill in more details, including federation bits
2019-02-12 20:12:17 -05:00
Erik Johnston
7eb8b5d7f3
Add proposal for invite error code
2019-02-08 14:36:12 +00:00
manuroe
0051c6a377
Key backup: Return {hash, count} for key upload requests
...
This is this tuple that allows the client to check if it has locally all keys of the backup
2019-02-07 23:32:29 -05:00
manuroe
7cde3193e5
Key backup: Explain `hash` better
2019-02-07 23:32:29 -05:00
manuroe
82ff866b58
Key backup: Add `hash` to represent stored keys
...
so that a matrix client A can check it is synchronised with the backup.
If not, that means that another client B has pushed keys client A does not have locally. Client A should then propose to the end user to retrieve keys from the backup.
2019-02-07 23:32:29 -05:00
manuroe
ed945d6744
Key backup: Expose the number of keys stored in the backup
...
so that matrix clients can compare it with the number of keys they have locally.
2019-02-07 23:32:29 -05:00
Hubert Chathi
e7f7926023
add algorithm and version to the example
...
since they're marked as required
2019-02-07 23:30:01 -05:00
manuroe
d43b595b5e
Key backup: Fix PR remarks on `PUT /room_keys/version/{version}`
2019-02-07 23:30:01 -05:00
manuroe
2099308d4c
Key backup: add `PUT /room_keys/version/{version}` to allow matrix clients to add signatures to an existing backup
2019-02-07 23:30:01 -05:00
manuroe
e02b345c62
Revert "Key backup: add `PUT /room_keys/version/{version}` to allow matrix clients to add signatures to an existing backup"
...
This reverts commit c9b38cbe53
.
2019-02-06 11:45:11 +01:00
manuroe
c9b38cbe53
Key backup: add `PUT /room_keys/version/{version}` to allow matrix clients to add signatures to an existing backup
2019-02-06 11:37:19 +01:00
Travis Ralston
f5134b2d8b
Merge pull request #1819 from matrix-org/neilj/msc-remove-presence-lists
...
MSC:1819 Remove Presence Lists
2019-02-01 12:00:42 -07:00
Travis Ralston
1cf9086c26
Merge pull request #1831 from matrix-org/travis/msc/wk-before-srv
...
MSC1831: Change the order of .well-known and SRV discovery techniques
2019-02-01 11:52:59 -07:00
Travis Ralston
41e50d553e
Merge pull request #1830 from matrix-org/travis/spec/x509-wk
...
Specify .well-known s2s discovery and X.509 validation
2019-02-01 08:36:55 -07:00
Travis Ralston
6421582bf2
Clarifications and alter the error handling of .well-known
...
Note that MSC1831 changes the order, so the changes to MSC1708 might not make sense when combining all the proposals together. However, independently the change should make sense.
2019-02-01 08:18:12 -07:00
Travis Ralston
00de03bddb
Merge remote-tracking branch 'origin/travis/msc/wk-before-srv' into travis/msc/wk-before-srv
2019-01-31 10:53:22 -07:00
Travis Ralston
2fe6b2cb5c
Plagiarize from richvdh for a better explanation
2019-01-31 10:53:06 -07:00
Travis Ralston
ab7876cbef
Update 1831-srv-after-wellknown.md
2019-01-31 09:55:58 -07:00
Travis Ralston
0e90cf6a0c
Proposal to change the order of .well-known and SRV discovery techniques
2019-01-31 09:38:58 -07:00
Travis Ralston
ccce6c196d
Specify how capabilities work in the c2s API
...
Original proposals:
* https://github.com/matrix-org/matrix-doc/pull/1753
* https://github.com/matrix-org/matrix-doc/pull/1804
Implementation proof:
* https://github.com/matrix-org/synapse/pull/4472
* https://github.com/matrix-org/matrix-js-sdk/pull/830
There is one change to MSC1753 which is included in this commit. MSC1804 remains unchanged. In the original proposal, the change password capability being present was an indication that password changes were possible. It was found that this doesn't really communicate the state very well to clients in that lack of a capability (or a 404, etc) would mean that users would erroneously not be able to change their passwords. A simple boolean flag was added to assist clients in detecting this capability.
2019-01-30 19:43:55 -07:00
Travis Ralston
72a2871021
Merge pull request #1804 from matrix-org/travis/msc/room-version-client-advertising
...
MSC1804: Advertising capable room versions to clients
2019-01-30 17:06:24 -07:00
Erik Johnston
1c0742ed6a
MSC 1659 Proposal: Change Event IDs to Hashes ( #1659 )
2019-01-30 17:08:21 +00:00
Hubert Chathi
ca0baa54df
various fixes
...
- fix typo
- make property name plural since it may contain multiple items
- mention that users will appear in sync when they upload keys
2019-01-30 11:26:21 -05:00
Neil Johnson
2eae933ed6
hard wrap to 80 chars
2019-01-30 11:28:53 +00:00
Neil Johnson
4f13f5289e
Update 1819-remove-presence-lists.md
...
Add references to exactly what this proposal would remove
2019-01-30 11:20:38 +00:00
Richard van der Hoff
5151aa0aa7
Update proposals/1819-remove-presence-lists.md
...
Co-Authored-By: neilisfragile <neil@matrix.org>
2019-01-30 10:44:15 +00:00
Travis Ralston
2c3ba0b135
Merge pull request #1813 from matrix-org/erikj/make_membership_room_ver
...
MSC 1813 - Federation Make Membership Room Version
2019-01-29 10:17:48 -07:00
Richard van der Hoff
de57d3950f
Relax the requirement for a content-type on .well-known ( #1824 )
...
The main reason for this is that Apache etc won't stick a content-type on by
default, because they don't know it's JSON, so requiring it seems like it will
require unnecessary hoop-humping for everyone who wants to use a .well-known.
2019-01-29 14:46:27 +00:00
Neil Johnson
9f517f33ce
Create 1819-remove-presence-lists.md
2019-01-28 17:59:17 +00:00
Travis Ralston
577edeb53b
Say that !stable == unstable
2019-01-25 09:27:23 -07:00
Travis Ralston
052d68d83d
Merge pull request #1791 from matrix-org/travis/spec/rver-upgrades
...
Add room version upgrades
2019-01-23 19:04:24 -07:00
Travis Ralston
50eba23669
Update MSC to match how room versions work
...
As per 1773.
2019-01-22 18:24:04 -07:00
Erik Johnston
3ec3adbc24
Proposal for add room_version to make_* fed APIs
2019-01-22 10:55:27 +00:00
Travis Ralston
f308871ed9
Merge pull request #1794 from matrix-org/erikj/fed_invite_v2
...
MSC 1794 - Federation v2 Invite API
2019-01-21 07:59:07 -07:00
Hubert Chathi
41c14c9e7d
uhoreg tweaks
...
Co-Authored-By: ara4n <matthew@arasphere.net>
2019-01-18 22:56:19 +00:00
Matthew Hodgson
20b9a33b12
clarify 100% threshold for new spec core team additions
2019-01-18 22:39:44 +00:00