incorporate further feedback

rav/proposal/no_slash_in_event_id
Matthew Hodgson 5 years ago
parent 417f3a3e8b
commit 88f533f0db

@ -80,10 +80,10 @@ right encoding.
However, the current uses of standard Base64 encodings are not exposed to However, the current uses of standard Base64 encodings are not exposed to
common CS API developers, and so whilst this might be slightly confusing common CS API developers, and so whilst this might be slightly confusing
for the minority of expert homeserver developers, the confusion does not for the minority of expert homeserver developers, the confusion does not
exist today for client developers. Therefore it seems safe to standardise exist today for client developers (except those implementing E2EE).
(except those implementing E2EE) on URL-safe Base64 for identifiers exposed Therefore it seems safe to standardise on URL-safe Base64 for identifiers
to the client developers, who form by far the majority of the Matrix exposed to the client developers, who form by far the majority of the
ecosystem today, and expect as simple an API as possible. Matrix ecosystem today, and expect as simple an API as possible.
A potential extension would be to change *all* Base64 encodings to be A potential extension would be to change *all* Base64 encodings to be
URL-safe. This would address the inconsistency. However, it feels like a URL-safe. This would address the inconsistency. However, it feels like a
@ -139,9 +139,9 @@ solutions to that are also possible).
There are two main questions here: There are two main questions here:
1. Whether it's worth forcing manual CS API users to juggle escaping of 1. Whether it's worth forcing CS API developers to juggle escaping of
machine-selected IDs in order to remind them to escape all variables in machine-selected IDs during manual use of the API in order to remind them
their URIs correctly. to escape all variables in their URIs correctly when writing code.
2. Whether it's a significant problem for E2EE & SS API developers to have to 2. Whether it's a significant problem for E2EE & SS API developers to have to
handle strings which are a mix of standard Base64 and URL-safe Base64 handle strings which are a mix of standard Base64 and URL-safe Base64
@ -156,10 +156,11 @@ developers test their clients against a 'torture room' full of exotic IDs and
data, or by improving warnings in the spec... rather than (ab)using data, or by improving warnings in the spec... rather than (ab)using
machine-selected IDs as a reminder. machine-selected IDs as a reminder.
Meanwhile, given we have many more CS API developers than SS or E2EE Meanwhile, given we have many more people manually invoking the CS API than
developers, and we wish to make the CS API particularly easy for developers to developing on the SS or E2EE APIs, and we wish to make the CS API particularly
manually invoke, it feels we should not prioritise consistency of encodings easy for developers to manually invoke, it feels we should not prioritise
for SS/E2EE developers over the usability of the CS API. consistency of encodings for SS/E2EE developers over the usability of the CS
API.
Therefore, on balance, it seems plausible that changing the format of event IDs Therefore, on balance, it seems plausible that changing the format of event IDs
does solve sufficient problems to make it desirable. does solve sufficient problems to make it desirable.

Loading…
Cancel
Save