Merge branch 'master' into travis/clarification/lowercasing
commit
21a132d3a5
@ -0,0 +1 @@
|
||||
Correct examples of `client_secret` request body parameters so that they do not include invalid characters.
|
@ -0,0 +1 @@
|
||||
The v1 identity service API has been removed in favour of the v2 API, as per [MSC2713](https://github.com/matrix-org/matrix-doc/pull/2713).
|
@ -0,0 +1,66 @@
|
||||
{
|
||||
"Pin": "Rajszeg",
|
||||
"Folder": "Mappa",
|
||||
"Headphones": "Fejhallgató",
|
||||
"Anchor": "Horgony",
|
||||
"Bell": "Harang",
|
||||
"Trumpet": "Trombita",
|
||||
"Guitar": "Gitár",
|
||||
"Ball": "Labda",
|
||||
"Trophy": "Trófea",
|
||||
"Rocket": "Rakáta",
|
||||
"Aeroplane": "Repülő",
|
||||
"Bicycle": "Kerékpár",
|
||||
"Train": "Vonat",
|
||||
"Flag": "Zászló",
|
||||
"Telephone": "Telefon",
|
||||
"Hammer": "Kalapács",
|
||||
"Key": "Kulcs",
|
||||
"Lock": "Lakat",
|
||||
"Scissors": "Olló",
|
||||
"Paperclip": "Gémkapocs",
|
||||
"Pencil": "Ceruza",
|
||||
"Book": "Könyv",
|
||||
"Light Bulb": "Égő",
|
||||
"Gift": "Ajándék",
|
||||
"Clock": "Óra",
|
||||
"Hourglass": "Homokóra",
|
||||
"Umbrella": "Esernyő",
|
||||
"Thumbs Up": "Hüvelykujj fel",
|
||||
"Santa": "Télapó",
|
||||
"Spanner": "Csavarkulcs",
|
||||
"Glasses": "Szemüveg",
|
||||
"Hat": "Kalap",
|
||||
"Robot": "Robot",
|
||||
"Smiley": "Mosoly",
|
||||
"Heart": "Szív",
|
||||
"Cake": "Süti",
|
||||
"Pizza": "Pizza",
|
||||
"Corn": "Kukorica",
|
||||
"Strawberry": "Eper",
|
||||
"Apple": "Alma",
|
||||
"Banana": "Banán",
|
||||
"Fire": "Tűz",
|
||||
"Cloud": "Felhő",
|
||||
"Moon": "Hold",
|
||||
"Globe": "Földgömb",
|
||||
"Mushroom": "Gomba",
|
||||
"Cactus": "Kaktusz",
|
||||
"Tree": "Fa",
|
||||
"Flower": "Virág",
|
||||
"Butterfly": "Pillangó",
|
||||
"Octopus": "Polip",
|
||||
"Fish": "Hal",
|
||||
"Turtle": "Teknős",
|
||||
"Penguin": "Pingvin",
|
||||
"Rooster": "Kakas",
|
||||
"Panda": "Panda",
|
||||
"Rabbit": "Nyúl",
|
||||
"Elephant": "Elefánt",
|
||||
"Pig": "Malac",
|
||||
"Unicorn": "Egyszarvú",
|
||||
"Horse": "Ló",
|
||||
"Lion": "Oroszlán",
|
||||
"Cat": "Macska",
|
||||
"Dog": "Kutya"
|
||||
}
|
@ -1,302 +0,0 @@
|
||||
# Copyright 2018 New Vector Ltd
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
swagger: '2.0'
|
||||
info:
|
||||
title: "Matrix Identity Service Establishing Associations API"
|
||||
version: "1.0.0"
|
||||
host: localhost:8090
|
||||
schemes:
|
||||
- https
|
||||
basePath: /_matrix/identity/api/v1
|
||||
consumes:
|
||||
- application/json
|
||||
produces:
|
||||
- application/json
|
||||
paths:
|
||||
"/3pid/getValidated3pid":
|
||||
get:
|
||||
summary: Check whether ownership of a 3pid was validated.
|
||||
description: |-
|
||||
Determines if a given 3pid has been validated by a user.
|
||||
operationId: getValidated3pid
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: query
|
||||
type: string
|
||||
name: sid
|
||||
description: The Session ID generated by the `requestToken` call.
|
||||
required: true
|
||||
x-example: 1234
|
||||
- in: query
|
||||
type: string
|
||||
name: client_secret
|
||||
description: The client secret passed to the `requestToken` call.
|
||||
required: true
|
||||
x-example: monkeys_are_GREAT
|
||||
responses:
|
||||
200:
|
||||
description: Validation information for the session.
|
||||
examples:
|
||||
application/json: {
|
||||
"medium": "email",
|
||||
"validated_at": 1457622739026,
|
||||
"address": "louise@bobs.burgers"
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
medium:
|
||||
type: string
|
||||
description: The medium type of the 3pid.
|
||||
address:
|
||||
type: string
|
||||
description: The address of the 3pid being looked up.
|
||||
validated_at:
|
||||
type: integer
|
||||
description: |-
|
||||
Timestamp, in milliseconds, indicating the time that the 3pid
|
||||
was validated.
|
||||
required: ['medium', 'address', 'validated_at']
|
||||
400:
|
||||
description: |-
|
||||
The session has not been validated.
|
||||
|
||||
If the session has not been validated, then `errcode` will be
|
||||
`M_SESSION_NOT_VALIDATED`. If the session has timed out, then
|
||||
`errcode` will be `M_SESSION_EXPIRED`.
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_SESSION_NOT_VALIDATED",
|
||||
"error": "This validation session has not yet been completed"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
||||
404:
|
||||
description: The Session ID or client secret were not found.
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_NO_VALID_SESSION",
|
||||
"error": "No valid session was found matching that sid and client secret"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
||||
"/3pid/bind":
|
||||
post:
|
||||
summary: Publish an association between a session and a Matrix user ID.
|
||||
description: |-
|
||||
Publish an association between a session and a Matrix user ID.
|
||||
|
||||
Future calls to `/lookup` for any of the session\'s 3pids will return
|
||||
this association.
|
||||
|
||||
Note: for backwards compatibility with previous drafts of this
|
||||
specification, the parameters may also be specified as
|
||||
`application/x-form-www-urlencoded` data. However, this usage is
|
||||
deprecated.
|
||||
operationId: bind
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
type: object
|
||||
example: {
|
||||
"sid": "1234",
|
||||
"client_secret": "monkeys_are_GREAT",
|
||||
"mxid": "@ears:matrix.org"
|
||||
}
|
||||
properties:
|
||||
sid:
|
||||
type: string
|
||||
description: The Session ID generated by the `requestToken` call.
|
||||
client_secret:
|
||||
type: string
|
||||
description: The client secret passed to the `requestToken` call.
|
||||
mxid:
|
||||
type: string
|
||||
description: The Matrix user ID to associate with the 3pids.
|
||||
required: ["sid", "client_secret", "mxid"]
|
||||
responses:
|
||||
200:
|
||||
description: The association was published.
|
||||
examples:
|
||||
application/json: {
|
||||
"address": "louise@bobs.burgers",
|
||||
"medium": "email",
|
||||
"mxid": "@ears:matrix.org",
|
||||
"not_before": 1428825849161,
|
||||
"not_after": 4582425849161,
|
||||
"ts": 1428825849161,
|
||||
"signatures": {
|
||||
"matrix.org": {
|
||||
"ed25519:0": "ENiU2YORYUJgE6WBMitU0mppbQjidDLanAusj8XS2nVRHPu+0t42OKA/r6zV6i2MzUbNQ3c3MiLScJuSsOiVDQ"
|
||||
}
|
||||
}
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
address:
|
||||
type: string
|
||||
description: The 3pid address of the user being looked up.
|
||||
medium:
|
||||
type: string
|
||||
description: The medium type of the 3pid.
|
||||
mxid:
|
||||
type: string
|
||||
description: The Matrix user ID associated with the 3pid.
|
||||
not_before:
|
||||
type: integer
|
||||
description: A unix timestamp before which the association is not known to be valid.
|
||||
not_after:
|
||||
type: integer
|
||||
description: A unix timestamp after which the association is not known to be valid.
|
||||
ts:
|
||||
type: integer
|
||||
description: The unix timestamp at which the association was verified.
|
||||
signatures:
|
||||
type: object
|
||||
description: |-
|
||||
The signatures of the verifying identity servers which show that the
|
||||
association should be trusted, if you trust the verifying identity
|
||||
services.
|
||||
$ref: "../../schemas/server-signatures.yaml"
|
||||
required:
|
||||
- address
|
||||
- medium
|
||||
- mxid
|
||||
- not_before
|
||||
- not_after
|
||||
- ts
|
||||
- signatures
|
||||
400:
|
||||
description: |-
|
||||
The association was not published.
|
||||
|
||||
If the session has not been validated, then `errcode` will be
|
||||
`M_SESSION_NOT_VALIDATED`. If the session has timed out, then
|
||||
`errcode` will be `M_SESSION_EXPIRED`.
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_SESSION_NOT_VALIDATED",
|
||||
"error": "This validation session has not yet been completed"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
||||
404:
|
||||
description: The Session ID or client secret were not found
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_NO_VALID_SESSION",
|
||||
"error": "No valid session was found matching that sid and client secret"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
||||
"/3pid/unbind":
|
||||
post:
|
||||
summary: Remove an association between a session and a Matrix user ID.
|
||||
description: |-
|
||||
Remove an association between a session and a Matrix user ID.
|
||||
|
||||
Future calls to `/lookup` for any of the session's 3pids will not
|
||||
return the removed association.
|
||||
|
||||
The identity server should authenticate the request in one of two
|
||||
ways:
|
||||
|
||||
1. The request is signed by the homeserver which controls the `user_id`.
|
||||
2. The request includes the `sid` and `client_secret` parameters,
|
||||
as per `/3pid/bind`, which proves ownership of the 3PID.
|
||||
|
||||
If this endpoint returns a JSON Matrix error, that error should be passed
|
||||
through to the client requesting an unbind through a homeserver, if the
|
||||
homeserver is acting on behalf of a client.
|
||||
operationId: unbind
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
type: object
|
||||
example: {
|
||||
"sid": "1234",
|
||||
"client_secret": "monkeys_are_GREAT",
|
||||
"mxid": "@ears:example.org",
|
||||
"threepid": {
|
||||
"medium": "email",
|
||||
"address": "monkeys_have_ears@example.org"
|
||||
}
|
||||
}
|
||||
properties:
|
||||
sid:
|
||||
type: string
|
||||
description: The Session ID generated by the `requestToken` call.
|
||||
client_secret:
|
||||
type: string
|
||||
description: The client secret passed to the `requestToken` call.
|
||||
mxid:
|
||||
type: string
|
||||
description: The Matrix user ID to remove from the 3pids.
|
||||
threepid:
|
||||
type: object
|
||||
title: 3PID
|
||||
description: |-
|
||||
The 3PID to remove. Must match the 3PID used to generate the session
|
||||
if using `sid` and `client_secret` to authenticate this request.
|
||||
properties:
|
||||
medium:
|
||||
type: string
|
||||
description: |-
|
||||
A medium from the [3PID Types](/appendices/#3pid-types) Appendix, matching the medium
|
||||
of the identifier to unbind.
|
||||
address:
|
||||
type: string
|
||||
description: The 3PID address to remove.
|
||||
required: ['medium', 'address']
|
||||
required: ["threepid", "mxid"]
|
||||
responses:
|
||||
200:
|
||||
description: The association was successfully removed.
|
||||
examples:
|
||||
application/json: {}
|
||||
schema:
|
||||
type: object
|
||||
400:
|
||||
description: |-
|
||||
If the response body is not a JSON Matrix error, the identity server
|
||||
does not support unbinds. If a JSON Matrix error is in the response
|
||||
body, the requesting party should respect the error.
|
||||
404:
|
||||
description: |-
|
||||
If the response body is not a JSON Matrix error, the identity server
|
||||
does not support unbinds. If a JSON Matrix error is in the response
|
||||
body, the requesting party should respect the error.
|
||||
403:
|
||||
description: |-
|
||||
The credentials supplied to authenticate the request were invalid.
|
||||
This may also be returned if the identity server does not support
|
||||
the chosen authentication method (such as blocking homeservers from
|
||||
unbinding identifiers).
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_FORBIDDEN",
|
||||
"error": "Invalid homeserver signature"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
||||
501:
|
||||
description: |-
|
||||
If the response body is not a JSON Matrix error, the identity server
|
||||
does not support unbinds. If a JSON Matrix error is in the response
|
||||
body, the requesting party should respect the error.
|
@ -1,177 +0,0 @@
|
||||
# Copyright 2018 New Vector Ltd
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
swagger: '2.0'
|
||||
info:
|
||||
title: "Matrix Identity Service Email Associations API"
|
||||
version: "1.0.0"
|
||||
host: localhost:8090
|
||||
schemes:
|
||||
- https
|
||||
basePath: /_matrix/identity/api/v1
|
||||
consumes:
|
||||
- application/json
|
||||
produces:
|
||||
- application/json
|
||||
paths:
|
||||
"/validate/email/requestToken":
|
||||
post:
|
||||
summary: Request a token for validating an email address.
|
||||
description: |-
|
||||
Create a session for validating an email address.
|
||||
|
||||
The identity server will send an email containing a token. If that
|
||||
token is presented to the identity server in the future, it indicates
|
||||
that that user was able to read the email for that email address, and
|
||||
so we validate ownership of the email address.
|
||||
|
||||
Note that homeservers offer APIs that proxy this API, adding
|
||||
additional behaviour on top, for example,
|
||||
`/register/email/requestToken` is designed specifically for use when
|
||||
registering an account and therefore will inform the user if the email
|
||||
address given is already registered on the server.
|
||||
|
||||
Note: for backwards compatibility with previous drafts of this
|
||||
specification, the parameters may also be specified as
|
||||
`application/x-form-www-urlencoded` data. However, this usage is
|
||||
deprecated.
|
||||
operationId: emailRequestToken
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
$ref: "definitions/request_email_validation.yaml"
|
||||
responses:
|
||||
200:
|
||||
description: Session created.
|
||||
schema:
|
||||
$ref: "definitions/sid.yaml"
|
||||
400:
|
||||
description: |
|
||||
An error ocurred. Some possible errors are:
|
||||
|
||||
- `M_INVALID_EMAIL`: The email address provided was invalid.
|
||||
- `M_EMAIL_SEND_ERROR`: The validation email could not be sent.
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_INVALID_EMAIL",
|
||||
"error": "The email address is not valid"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
||||
"/validate/email/submitToken":
|
||||
post:
|
||||
summary: Validate ownership of an email address.
|
||||
description: |-
|
||||
Validate ownership of an email address.
|
||||
|
||||
If the three parameters are consistent with a set generated by a
|
||||
`requestToken` call, ownership of the email address is considered to
|
||||
have been validated. This does not publish any information publicly, or
|
||||
associate the email address with any Matrix user ID. Specifically,
|
||||
calls to `/lookup` will not show a binding.
|
||||
|
||||
The identity server is free to match the token case-insensitively, or
|
||||
carry out other mapping operations such as unicode
|
||||
normalisation. Whether to do so is an implementation detail for the
|
||||
identity server. Clients must always pass on the token without
|
||||
modification.
|
||||
|
||||
Note: for backwards compatibility with previous drafts of this
|
||||
specification, the parameters may also be specified as
|
||||
`application/x-form-www-urlencoded` data. However, this usage is
|
||||
deprecated.
|
||||
operationId: emailSubmitTokenPost
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
type: object
|
||||
example: {
|
||||
"sid": "1234",
|
||||
"client_secret": "monkeys_are_GREAT",
|
||||
"token": "atoken"
|
||||
}
|
||||
properties:
|
||||
sid:
|
||||
type: string
|
||||
description: The session ID, generated by the `requestToken` call.
|
||||
client_secret:
|
||||
type: string
|
||||
description: The client secret that was supplied to the `requestToken` call.
|
||||
token:
|
||||
type: string
|
||||
description: The token generated by the `requestToken` call and emailed to the user.
|
||||
required: ["sid", "client_secret", "token"]
|
||||
responses:
|
||||
200:
|
||||
description:
|
||||
The success of the validation.
|
||||
examples:
|
||||
application/json: {
|
||||
"success": true
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
success:
|
||||
type: boolean
|
||||
description: Whether the validation was successful or not.
|
||||
required: ['success']
|
||||
get:
|
||||
summary: Validate ownership of an email address.
|
||||
description: |-
|
||||
Validate ownership of an email address.
|
||||
|
||||
If the three parameters are consistent with a set generated by a
|
||||
`requestToken` call, ownership of the email address is considered to
|
||||
have been validated. This does not publish any information publicly, or
|
||||
associate the email address with any Matrix user ID. Specifically,
|
||||
calls to `/lookup` will not show a binding.
|
||||
|
||||
Note that, in contrast with the POST version, this endpoint will be
|
||||
used by end-users, and so the response should be human-readable.
|
||||
operationId: emailSubmitTokenGet
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: query
|
||||
type: string
|
||||
name: sid
|
||||
required: true
|
||||
description: The session ID, generated by the `requestToken` call.
|
||||
x-example: 1234
|
||||
- in: query
|
||||
type: string
|
||||
name: client_secret
|
||||
required: true
|
||||
description: The client secret that was supplied to the `requestToken` call.
|
||||
x-example: monkeys_are_GREAT
|
||||
- in: query
|
||||
type: string
|
||||
name: token
|
||||
required: true
|
||||
description: The token generated by the `requestToken` call and emailed to the user.
|
||||
x-example: atoken
|
||||
responses:
|
||||
200:
|
||||
description: Email address is validated.
|
||||
"3xx":
|
||||
description: |-
|
||||
Email address is validated, and the `next_link` parameter was
|
||||
provided to the `requestToken` call. The user must be redirected
|
||||
to the URL provided by the `next_link` parameter.
|
||||
"4xx":
|
||||
description:
|
||||
Validation failed.
|
@ -1,97 +0,0 @@
|
||||
# Copyright 2018 New Vector Ltd
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
swagger: '2.0'
|
||||
info:
|
||||
title: "Matrix Identity Service Ephemeral Invitation Signing API"
|
||||
version: "1.0.0"
|
||||
host: localhost:8090
|
||||
schemes:
|
||||
- https
|
||||
basePath: /_matrix/identity/api/v1
|
||||
consumes:
|
||||
- application/json
|
||||
produces:
|
||||
- application/json
|
||||
paths:
|
||||
"/sign-ed25519":
|
||||
post:
|
||||
summary: Sign invitation details
|
||||
description: |-
|
||||
Sign invitation details.
|
||||
|
||||
The identity server will look up `token` which was stored in a call
|
||||
to `store-invite`, and fetch the sender of the invite.
|
||||
operationId: blindlySignStuff
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
type: object
|
||||
example: {
|
||||
"mxid": "@foo:bar.com",
|
||||
"token": "sometoken",
|
||||
"private_key": "base64encodedkey"
|
||||
}
|
||||
properties:
|
||||
mxid:
|
||||
type: string
|
||||
description: The Matrix user ID of the user accepting the invitation.
|
||||
token:
|
||||
type: string
|
||||
description: The token from the call to `store-invite`.
|
||||
private_key:
|
||||
type: string
|
||||
description: The private key, encoded as [Unpadded base64](/appendices/#unpadded-base64).
|
||||
required: ["mxid", "token", "private_key"]
|
||||
responses:
|
||||
200:
|
||||
description: The signed JSON of the mxid, sender, and token.
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
mxid:
|
||||
type: string
|
||||
description: The Matrix user ID of the user accepting the invitation.
|
||||
sender:
|
||||
type: string
|
||||
description: The Matrix user ID of the user who sent the invitation.
|
||||
signatures:
|
||||
type: object
|
||||
description: The signature of the mxid, sender, and token.
|
||||
$ref: "../../schemas/server-signatures.yaml"
|
||||
token:
|
||||
type: string
|
||||
description: The token for the invitation.
|
||||
required: ['mxid', 'sender', 'signatures', 'token']
|
||||
examples:
|
||||
application/json: {
|
||||
"mxid": "@foo:bar.com",
|
||||
"sender": "@baz:bar.com",
|
||||
"signatures": {
|
||||
"my.id.server": {
|
||||
"ed25519:0": "def987"
|
||||
}
|
||||
},
|
||||
"token": "abc123"
|
||||
}
|
||||
404:
|
||||
description: The token was not found.
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_UNRECOGNIZED",
|
||||
"error": "Didn't recognize token"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
@ -1,171 +0,0 @@
|
||||
# Copyright 2016 OpenMarket Ltd
|
||||
# Copyright 2017 Kamax.io
|
||||
# Copyright 2017 New Vector Ltd
|
||||
# Copyright 2018 New Vector Ltd
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
swagger: '2.0'
|
||||
info:
|
||||
title: "Matrix Identity Service Lookup API"
|
||||
version: "1.0.0"
|
||||
host: localhost:8090
|
||||
schemes:
|
||||
- https
|
||||
basePath: /_matrix/identity/api/v1
|
||||
consumes:
|
||||
- application/json
|
||||
produces:
|
||||
- application/json
|
||||
paths:
|
||||
"/lookup":
|
||||
get:
|
||||
summary: Look up the Matrix user ID for a 3pid.
|
||||
description: Look up the Matrix user ID for a 3pid.
|
||||
operationId: lookupUser
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: query
|
||||
type: string
|
||||
name: medium
|
||||
required: true
|
||||
description: The medium type of the 3pid. See the [3PID Types](/appendices/#3pid-types) Appendix.
|
||||
x-example: "email"
|
||||
- in: query
|
||||
type: string
|
||||
name: address
|
||||
required: true
|
||||
description: The address of the 3pid being looked up. See the [3PID Types](/appendices/#3pid-types) Appendix.
|
||||
x-example: "louise@bobs.burgers"
|
||||
responses:
|
||||
200:
|
||||
description:
|
||||
The association for that 3pid, or an empty object if no association is known.
|
||||
examples:
|
||||
application/json: {
|
||||
"address": "louise@bobs.burgers",
|
||||
"medium": "email",
|
||||
"mxid": "@ears:matrix.org",
|
||||
"not_before": 1428825849161,
|
||||
"not_after": 4582425849161,
|
||||
"ts": 1428825849161,
|
||||
"signatures": {
|
||||
"matrix.org": {
|
||||
"ed25519:0": "ENiU2YORYUJgE6WBMitU0mppbQjidDLanAusj8XS2nVRHPu+0t42OKA/r6zV6i2MzUbNQ3c3MiLScJuSsOiVDQ"
|
||||
}
|
||||
}
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
address:
|
||||
type: string
|
||||
description: The 3pid address of the user being looked up, matching the address requested.
|
||||
medium:
|
||||
type: string
|
||||
description: A medium from the [3PID Types](/appendices/#3pid-types) Appendix, matching the medium requested.
|
||||
mxid:
|
||||
type: string
|
||||
description: The Matrix user ID associated with the 3pid.
|
||||
not_before:
|
||||
type: integer
|
||||
description: A unix timestamp before which the association is not known to be valid.
|
||||
not_after:
|
||||
type: integer
|
||||
description: A unix timestamp after which the association is not known to be valid.
|
||||
ts:
|
||||
type: integer
|
||||
description: The unix timestamp at which the association was verified.
|
||||
signatures:
|
||||
type: object
|
||||
description: The signatures of the verifying identity servers which show that the association should be trusted, if you trust the verifying identity servers.
|
||||
$ref: "../../schemas/server-signatures.yaml"
|
||||
required:
|
||||
- address
|
||||
- medium
|
||||
- mxid
|
||||
- not_before
|
||||
- not_after
|
||||
- ts
|
||||
- signatures
|
||||
"/bulk_lookup":
|
||||
post:
|
||||
summary: Lookup Matrix user IDs for a list of 3pids.
|
||||
description: Lookup Matrix user IDs for a list of 3pids.
|
||||
operationId: lookupUsers
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
type: object
|
||||
example: {
|
||||
"threepids":
|
||||
[
|
||||
["email","user@example.org"],
|
||||
["msisdn", "123456789"],
|
||||
["email","user2@example.org"]
|
||||
]
|
||||
}
|
||||
properties:
|
||||
threepids:
|
||||
type: array
|
||||
items:
|
||||
type: array
|
||||
title: 3PID mappings
|
||||
minItems: 2
|
||||
maxItems: 2
|
||||
items:
|
||||
# TODO: Give real names to these values. Adding a `title` does not work.
|
||||
#- type: 3PID Medium
|
||||
#- type: 3PID Address
|
||||
- type: string
|
||||
- type: string
|
||||
description: |-
|
||||
An array of arrays containing the [3PID Types](/appendices/#3pid-types) with the `medium`
|
||||
in first position and the `address` in second position.
|
||||
required:
|
||||
- "threepids"
|
||||
responses:
|
||||
200:
|
||||
description: A list of known 3PID mappings for the supplied 3PIDs.
|
||||
examples:
|
||||
application/json: {
|
||||
"threepids": [
|
||||
["email","user@example.org", "@bla:example.org"],
|
||||
["msisdn", "123456789", "@blah2:example.com"]
|
||||
]
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
threepids:
|
||||
type: array
|
||||
items:
|
||||
type: array
|
||||
title: 3PID mappings
|
||||
minItems: 3
|
||||
maxItems: 3
|
||||
items:
|
||||
# TODO: Give real names to these values. Adding a `title` does not work.
|
||||
#- type: 3PID Medium
|
||||
#- type: 3PID Address
|
||||
#- type: Matrix User ID
|
||||
- type: string
|
||||
- type: string
|
||||
- type: string
|
||||
description: |-
|
||||
An array of array containing the [3PID Types](/appendices/#3pid-types) with the `medium`
|
||||
in first position, the `address` in second position and Matrix user
|
||||
ID in third position.
|
||||
required:
|
||||
- "threepids"
|
@ -1,179 +0,0 @@
|
||||
# Copyright 2018 New Vector Ltd
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
swagger: '2.0'
|
||||
info:
|
||||
title: "Matrix Identity Service Phone Number Associations API"
|
||||
version: "1.0.0"
|
||||
host: localhost:8090
|
||||
schemes:
|
||||
- https
|
||||
basePath: /_matrix/identity/api/v1
|
||||
consumes:
|
||||
- application/json
|
||||
produces:
|
||||
- application/json
|
||||
paths:
|
||||
"/validate/msisdn/requestToken":
|
||||
post:
|
||||
summary: Request a token for validating a phone number.
|
||||
description: |-
|
||||
Create a session for validating a phone number.
|
||||
|
||||
The identity server will send an SMS message containing a token. If
|
||||
that token is presented to the identity server in the future, it
|
||||
indicates that that user was able to read the SMS for that phone
|
||||
number, and so we validate ownership of the phone number.
|
||||
|
||||
Note that homeservers offer APIs that proxy this API, adding
|
||||
additional behaviour on top, for example,
|
||||
`/register/msisdn/requestToken` is designed specifically for use when
|
||||
registering an account and therefore will inform the user if the phone
|
||||
number given is already registered on the server.
|
||||
|
||||
Note: for backwards compatibility with previous drafts of this
|
||||
specification, the parameters may also be specified as
|
||||
`application/x-form-www-urlencoded` data. However, this usage is
|
||||
deprecated.
|
||||
operationId: msisdnRequestToken
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
$ref: "definitions/request_msisdn_validation.yaml"
|
||||
responses:
|
||||
200:
|
||||
description: Session created.
|
||||
schema:
|
||||
$ref: "definitions/sid.yaml"
|
||||
400:
|
||||
description: |
|
||||
An error ocurred. Some possible errors are:
|
||||
|
||||
- `M_INVALID_ADDRESS`: The phone number provided was invalid.
|
||||
- `M_SEND_ERROR`: The validation SMS could not be sent.
|
||||
- `M_DESTINATION_REJECTED`: The identity server cannot deliver an
|
||||
SMS to the provided country or region.
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_INVALID_ADDRESS",
|
||||
"error": "The phone number is not valid"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
||||
"/validate/msisdn/submitToken":
|
||||
post:
|
||||
summary: Validate ownership of a phone number.
|
||||
description: |-
|
||||
Validate ownership of a phone number.
|
||||
|
||||
If the three parameters are consistent with a set generated by a
|
||||
`requestToken` call, ownership of the phone number is considered to
|
||||
have been validated. This does not publish any information publicly, or
|
||||
associate the phone number address with any Matrix user
|
||||
ID. Specifically, calls to `/lookup` will not show a binding.
|
||||
|
||||
The identity server is free to match the token case-insensitively, or
|
||||
carry out other mapping operations such as unicode
|
||||
normalisation. Whether to do so is an implementation detail for the
|
||||
identity server. Clients must always pass on the token without
|
||||
modification.
|
||||
|
||||
Note: for backwards compatibility with previous drafts of this
|
||||
specification, the parameters may also be specified as
|
||||
`application/x-form-www-urlencoded` data. However, this usage is
|
||||
deprecated.
|
||||
operationId: msisdnSubmitTokenPost
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
type: object
|
||||
example: {
|
||||
"sid": "1234",
|
||||
"client_secret": "monkeys_are_GREAT",
|
||||
"token": "atoken"
|
||||
}
|
||||
properties:
|
||||
sid:
|
||||
type: string
|
||||
description: The session ID, generated by the `requestToken` call.
|
||||
client_secret:
|
||||
type: string
|
||||
description: The client secret that was supplied to the `requestToken` call.
|
||||
token:
|
||||
type: string
|
||||
description: The token generated by the `requestToken` call and sent to the user.
|
||||
required: ["sid", "client_secret", "token"]
|
||||
responses:
|
||||
200:
|
||||
description:
|
||||
The success of the validation.
|
||||
examples:
|
||||
application/json: {
|
||||
"success": true
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
success:
|
||||
type: boolean
|
||||
description: Whether the validation was successful or not.
|
||||
required: ['success']
|
||||
get:
|
||||
summary: Validate ownership of a phone number.
|
||||
description: |-
|
||||
Validate ownership of a phone number.
|
||||
|
||||
If the three parameters are consistent with a set generated by a
|
||||
`requestToken` call, ownership of the phone number address is
|
||||
considered to have been validated. This does not publish any
|
||||
information publicly, or associate the phone number with any Matrix
|
||||
user ID. Specifically, calls to `/lookup` will not show a binding.
|
||||
|
||||
Note that, in contrast with the POST version, this endpoint will be
|
||||
used by end-users, and so the response should be human-readable.
|
||||
operationId: msisdnSubmitTokenGet
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: query
|
||||
type: string
|
||||
name: sid
|
||||
required: true
|
||||
description: The session ID, generated by the `requestToken` call.
|
||||
x-example: 1234
|
||||
- in: query
|
||||
type: string
|
||||
name: client_secret
|
||||
required: true
|
||||
description: The client secret that was supplied to the `requestToken` call.
|
||||
x-example: monkeys_are_GREAT
|
||||
- in: query
|
||||
type: string
|
||||
name: token
|
||||
required: true
|
||||
description: The token generated by the `requestToken` call and sent to the user.
|
||||
x-example: atoken
|
||||
responses:
|
||||
200:
|
||||
description: Phone number is validated.
|
||||
"3xx":
|
||||
description: |-
|
||||
Phone number address is validated, and the `next_link` parameter
|
||||
was provided to the `requestToken` call. The user must be
|
||||
redirected to the URL provided by the `next_link` parameter.
|
||||
"4xx":
|
||||
description:
|
||||
Validation failed.
|
@ -1,46 +0,0 @@
|
||||
# Copyright 2018 Kamax Sàrl
|
||||
# Copyright 2018 New Vector Ltd
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
swagger: "2.0"
|
||||
info:
|
||||
title: "Matrix Identity Service Ping API"
|
||||
version: "1.0.0"
|
||||
host: localhost:8090
|
||||
schemes:
|
||||
- https
|
||||
basePath: /_matrix/identity
|
||||
produces:
|
||||
- application/json
|
||||
paths:
|
||||
"/api/v1":
|
||||
get:
|
||||
summary: Checks that an identity server is available at this API endpoint.
|
||||
description: |-
|
||||
Checks that an identity server is available at this API endpoint.
|
||||
|
||||
To discover that an identity server is available at a specific URL,
|
||||
this endpoint can be queried and will return an empty object.
|
||||
|
||||
This is primarly used for auto-discovery and health check purposes
|
||||
by entities acting as a client for the identity server.
|
||||
operationId: ping
|
||||
deprecated: true
|
||||
responses:
|
||||
200:
|
||||
description: An identity server is ready to serve requests.
|
||||
examples:
|
||||
application/json: {}
|
||||
schema:
|
||||
type: object
|
@ -1,129 +0,0 @@
|
||||
# Copyright 2016 OpenMarket Ltd
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
swagger: '2.0'
|
||||
info:
|
||||
title: "Matrix Identity Service Public Key API"
|
||||
version: "1.0.0"
|
||||
host: localhost:8090
|
||||
schemes:
|
||||
- https
|
||||
basePath: /_matrix/identity/api/v1
|
||||
consumes:
|
||||
- application/json
|
||||
produces:
|
||||
- application/json
|
||||
paths:
|
||||
"/pubkey/{keyId}":
|
||||
get:
|
||||
summary: Get a public key.
|
||||
description: |-
|
||||
Get the public key for the passed key ID.
|
||||
operationId: getPubKey
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: path
|
||||
type: string
|
||||
name: keyId
|
||||
required: true
|
||||
description: |-
|
||||
The ID of the key. This should take the form algorithm:identifier
|
||||
where algorithm identifies the signing algorithm, and the identifier
|
||||
is an opaque string.
|
||||
x-example: "ed25519:0"
|
||||
responses:
|
||||
200:
|
||||
description:
|
||||
The public key exists.
|
||||
examples:
|
||||
application/json: {
|
||||
"public_key": "VXuGitF39UH5iRfvbIknlvlAVKgD1BsLDMvBf0pmp7c"
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
public_key:
|
||||
type: string
|
||||
description: Unpadded Base64 encoded public key.
|
||||
required: ['public_key']
|
||||
404:
|
||||
description:
|
||||
The public key was not found.
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_NOT_FOUND",
|
||||
"error": "The public key was not found"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
||||
"/pubkey/isvalid":
|
||||
get:
|
||||
summary: Check whether a long-term public key is valid.
|
||||
description: |-
|
||||
Check whether a long-term public key is valid. The response should always
|
||||
be the same, provided the key exists.
|
||||
operationId: isPubKeyValid
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: query
|
||||
type: string
|
||||
name: public_key
|
||||
required: true
|
||||
description: |-
|
||||
The unpadded base64-encoded public key to check.
|
||||
x-example: "VXuGitF39UH5iRfvbIknlvlAVKgD1BsLDMvBf0pmp7c"
|
||||
responses:
|
||||
200:
|
||||
description:
|
||||
The validity of the public key.
|
||||
examples:
|
||||
application/json: {
|
||||
"valid": true
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
valid:
|
||||
type: boolean
|
||||
description: Whether the public key is recognised and is currently valid.
|
||||
required: ['valid']
|
||||
"/pubkey/ephemeral/isvalid":
|
||||
get:
|
||||
summary: Check whether a short-term public key is valid.
|
||||
description: |-
|
||||
Check whether a short-term public key is valid.
|
||||
operationId: isEphemeralPubKeyValid
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: query
|
||||
type: string
|
||||
name: public_key
|
||||
required: true
|
||||
description: |-
|
||||
The unpadded base64-encoded public key to check.
|
||||
x-example: "VXuGitF39UH5iRfvbIknlvlAVKgD1BsLDMvBf0pmp7c"
|
||||
responses:
|
||||
200:
|
||||
description:
|
||||
The validity of the public key.
|
||||
examples:
|
||||
application/json: {
|
||||
"valid": true
|
||||
}
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
valid:
|
||||
type: boolean
|
||||
description: Whether the public key is recognised and is currently valid.
|
||||
required: ['valid']
|
@ -1,161 +0,0 @@
|
||||
# Copyright 2018 New Vector Ltd
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
swagger: '2.0'
|
||||
info:
|
||||
title: "Matrix Identity Service Store Invitations API"
|
||||
version: "1.0.0"
|
||||
host: localhost:8090
|
||||
schemes:
|
||||
- https
|
||||
basePath: /_matrix/identity/api/v1
|
||||
consumes:
|
||||
- application/json
|
||||
produces:
|
||||
- application/json
|
||||
paths:
|
||||
"/store-invite":
|
||||
post:
|
||||
summary: Store pending invitations to a user's 3pid.
|
||||
description: |-
|
||||
Store pending invitations to a user's 3pid.
|
||||
|
||||
In addition to the request parameters specified below, an arbitrary
|
||||
number of other parameters may also be specified. These may be used in
|
||||
the invite message generation described below.
|
||||
|
||||
The service will generate a random token and an ephemeral key used for
|
||||
accepting the invite.
|
||||
|
||||
The service also generates a `display_name` for the inviter, which is
|
||||
a redacted version of `address` which does not leak the full contents
|
||||
of the `address`.
|
||||
|
||||
The service records persistently all of the above information.
|
||||
|
||||
It also generates an email containing all of this data, sent to the
|
||||
`address` parameter, notifying them of the invitation.
|
||||
|
||||
Also, the generated ephemeral public key will be listed as valid on
|
||||
requests to `/_matrix/identity/api/v1/pubkey/ephemeral/isvalid`.
|
||||
|
||||
Currently, invites may only be issued for 3pids of the `email` medium.
|
||||
|
||||
Optional fields in the request should be populated to the best of the
|
||||
server's ability. Identity servers may use these variables when notifying
|
||||
the `address` of the pending invite for display purposes.
|
||||
operationId: storeInvite
|
||||
deprecated: true
|
||||
parameters:
|
||||
- in: body
|
||||
name: body
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
medium:
|
||||
type: string
|
||||
description: The literal string `email`.
|
||||
example: "email"
|
||||
address:
|
||||
type: string
|
||||
description: The email address of the invited user.
|
||||
example: "foo@example.com"
|
||||
room_id:
|
||||
type: string
|
||||
description: The Matrix room ID to which the user is invited
|
||||
example: "!something:example.org"
|
||||
sender:
|
||||
type: string
|
||||
description: The Matrix user ID of the inviting user
|
||||
example: "@bob:example.com"
|
||||
room_alias:
|
||||
type: string
|
||||
description: |-
|
||||
The Matrix room alias for the room to which the user is
|
||||
invited. This should be retrieved from the `m.room.canonical_alias`
|
||||
state event.
|
||||
example: "#somewhere:exmaple.org"
|
||||
room_avatar_url:
|
||||
type: string
|
||||
description: |-
|
||||
The Content URI for the room to which the user is invited. This should
|
||||
be retrieved from the `m.room.avatar` state event.
|
||||
example: "mxc://example.org/s0meM3dia"
|
||||
room_join_rules:
|
||||
type: string
|
||||
description: |-
|
||||
The `join_rule` for the room to which the user is invited. This should
|
||||
be retrieved from the `m.room.join_rules` state event.
|
||||
example: "public"
|
||||
room_name:
|
||||
type: string
|
||||
description: |-
|
||||
The name of the room to which the user is invited. This should be retrieved
|
||||
from the `m.room.name` state event.
|
||||
example: "Bob's Emporium of Messages"
|
||||
sender_display_name:
|
||||
type: string
|
||||
description: The display name of the user ID initiating the invite.
|
||||
example: "Bob Smith"
|
||||
sender_avatar_url:
|
||||
type: string
|
||||
description: The Content URI for the avatar of the user ID initiating the invite.
|
||||
example: "mxc://example.org/an0th3rM3dia"
|
||||
required: ["medium", "address", "room_id", "sender"]
|
||||
responses:
|
||||
200:
|
||||
description: The invitation was stored.
|
||||
schema:
|
||||
type: object
|
||||
properties:
|
||||
token:
|
||||
type: string
|
||||
description: |
|
||||
The generated token. Must be a string consisting of the
|
||||
characters `[0-9a-zA-Z.=_-]`. Its length must not exceed
|
||||
255 characters and it must not be empty.
|
||||
public_keys:
|
||||
type: array
|
||||
description: |
|
||||
A list of [server's long-term public key, generated ephemeral
|
||||
public key].
|
||||
items:
|
||||
type: string
|
||||
display_name:
|
||||
type: string
|
||||
description: The generated (redacted) display_name.
|
||||
required: ['token', 'public_keys', 'display_name']
|
||||
example:
|
||||
application/json: {
|
||||
"token": "sometoken",
|
||||
"public_keys": [
|
||||
"serverpublickey",
|
||||
"ephemeralpublickey"
|
||||
],
|
||||
"display_name": "f...@b..."
|
||||
}
|
||||
400:
|
||||
description: |
|
||||
An error has occured.
|
||||
|
||||
If the 3pid is already bound to a Matrix user ID, the error code
|
||||
will be `M_THREEPID_IN_USE`. If the medium is unsupported, the
|
||||
error code will be `M_UNRECOGNIZED`.
|
||||
examples:
|
||||
application/json: {
|
||||
"errcode": "M_THREEPID_IN_USE",
|
||||
"error": "Binding already known",
|
||||
"mxid": "@alice:example.com"
|
||||
}
|
||||
schema:
|
||||
$ref: "../client-server/definitions/errors/error.yaml"
|
@ -0,0 +1,427 @@
|
||||
# Proposal for Matrix "spaces" (formerly known as "groups as rooms (take 2)")
|
||||
|
||||
This MSC, and related proposals, supercede
|
||||
[MSC1215](https://github.com/matrix-org/matrix-doc/issues/1215).
|
||||
|
||||
## Background and objectives
|
||||
|
||||
Collecting rooms together into groups is useful for a number of
|
||||
purposes. Examples include:
|
||||
|
||||
* Allowing users to discover different rooms related to a particular topic:
|
||||
for example "official matrix.org rooms".
|
||||
* Allowing administrators to manage permissions across a number of rooms: for
|
||||
example "a new employee has joined my company and needs access to all of our
|
||||
rooms".
|
||||
* Letting users classify their rooms: for example, separating "work" from
|
||||
"personal" rooms.
|
||||
|
||||
We refer to such collections of rooms as "spaces".
|
||||
|
||||
Synapse and Element-Web currently implement an unspecced "groups" API (referred
|
||||
to as "`/r0/groups`" in this document) which attempts to provide this
|
||||
functionality (see
|
||||
[MSC971](https://github.com/matrix-org/matrix-doc/issues/971)). However,
|
||||
this is a complex API which has various problems (see
|
||||
[appendix](#appendix-problems-with-the-r0groups-api)).
|
||||
|
||||
This proposal suggests a new approach where spaces are themselves represented
|
||||
by rooms, rather than a custom first-class entity. This requires minimal
|
||||
server changes.
|
||||
|
||||
The existing `/r0/groups` API would be deprecated in Synapse and remain
|
||||
unspecified.
|
||||
|
||||
## Proposal
|
||||
|
||||
Each space is represented by its own room, known as a "space-room". The rooms
|
||||
within the space are determined by state events within the space-room.
|
||||
|
||||
Space-rooms are distinguished from regular messaging rooms by the presence of
|
||||
a `'type': 'm.space'` property in the content of the `m.room.create` event.
|
||||
The value of the `type` property uses the Standardised Identifier Grammar from
|
||||
[MSC2758](https://github.com/matrix-org/matrix-doc/pull/2758). This allows clients to offer slightly customised user experience
|
||||
depending on the purpose of the room. Currently, no server-side behaviour is
|
||||
expected to depend on this property. A `type` property on the `m.room.create`
|
||||
event is used to ensure that a room cannot change between being a space-room
|
||||
and a non-space room. For more information, see the "Rejected Alternatives"
|
||||
section below. Additionally, no client behaviour is recommended for handling
|
||||
unknown room types given the potential for legacy data: clients are free to
|
||||
make their own decisions about hiding unknown room types from users, though
|
||||
should note that a future conversation-like type (for example) might be
|
||||
introduced and could be considered "unknown" by older versions of their client.
|
||||
|
||||
As with regular rooms, public spaces are expected to have an alias, for example
|
||||
`#foo:matrix.org`, which can be used to refer to the space.
|
||||
|
||||
Space-rooms may have `m.room.name`, `m.room.avatar` and `m.room.topic` state
|
||||
events in the same way as a normal room.
|
||||
|
||||
Normal messages within a space-room are discouraged (but not blocked by the
|
||||
server): user interfaces are not expected to have a way to enter or display
|
||||
such messages. Space-rooms should be created with a power level for
|
||||
`events_default` of 100, to prevent the rooms accidentally/maliciously
|
||||
clogging up with messages from random members of the space.
|
||||
|
||||
### Membership of spaces
|
||||
|
||||
Users can be members of spaces (represented by `m.room.member` state events as
|
||||
normal). The existing [`m.room.history_visibility`
|
||||
mechanism](https://matrix.org/docs/spec/client_server/r0.6.1#room-history-visibility)
|
||||
controls whether membership of the space is required to view the room list,
|
||||
membership list, etc. "Public" or "community" spaces would be set to
|
||||
`world_readable` to allow clients to see the directory of rooms within the
|
||||
space by peeking into the space-room (thus avoiding the need to add
|
||||
`m.room.member` events to the event graph within the room).
|
||||
|
||||
Join rules, invites and 3PID invites work as for a normal room. In order for
|
||||
clients to distinguish space invites from room invites, all invites must now
|
||||
include the `m.room.create` event in their `invite_state` and `knock_state`.
|
||||
|
||||
### Relationship between rooms and spaces
|
||||
|
||||
The intention is that rooms and spaces form a hierarchy, which clients can use
|
||||
to structure the user's room list into a tree view. The parent/child
|
||||
relationship can be expressed in one of two ways:
|
||||
|
||||
1. The admins of a space can advertise rooms and subspaces for their space by
|
||||
setting `m.space.child` state events. The `state_key` is the ID of a child
|
||||
room or space, and the content must contain a `via` key which gives a list
|
||||
of candidate servers that can be used to join the room. Something like:
|
||||
|
||||
```jsonc
|
||||
// a child room
|
||||
{
|
||||
"type": "m.space.child",
|
||||
"state_key": "!abcd:example.com",
|
||||
"content": {
|
||||
"via": ["example.com", "test.org"]
|
||||
}
|
||||
}
|
||||
|
||||
// a child room with an ordering.
|
||||
{
|
||||
"type": "m.space.child",
|
||||
"state_key": "!efgh:example.com",
|
||||
"content": {
|
||||
"via": ["example.com"],
|
||||
"order": "abcd"
|
||||
}
|
||||
}
|
||||
|
||||
// no longer a child room
|
||||
{
|
||||
"type": "m.space.child",
|
||||
"state_key": "!jklm:example.com",
|
||||
"content": {}
|
||||
}
|
||||
```
|
||||
|
||||
Children where `via` is not present or invalid (not an array) are ignored.
|
||||
|
||||
The `order` key is a string which is used to provide a default ordering of
|
||||
siblings in the room list. (Rooms are sorted based on a lexicographic
|
||||
ordering of the Unicode codepoints of the characters in `order` values.
|
||||
Rooms with no `order` come last, in ascending numeric order of the
|
||||
`origin_server_ts` of their `m.room.create` events, or ascending
|
||||
lexicographic order of their `room_id`s in case of equal
|
||||
`origin_server_ts`. `order`s which are not strings, or do not consist
|
||||
solely of ascii characters in the range `\x20` (space) to `\x7E` (`~`), or
|
||||
consist of more than 50 characters, are forbidden and the field should be
|
||||
ignored if received.)
|
||||
|
||||
2. Separately, rooms can claim parents via the `m.space.parent` state
|
||||
event.
|
||||
|
||||
Similar to `m.space.child`, the `state_key` is the ID of the parent space,
|
||||
and the content must contain a `via` key which gives a list of candidate
|
||||
servers that can be used to join the parent.
|
||||
|
||||
```jsonc
|
||||
{
|
||||
"type": "m.space.parent",
|
||||
"state_key": "!space:example.com",
|
||||
"content": {
|
||||
"via": ["example.com"],
|
||||
"canonical": true
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
Parents where `via` is not present or invalid (not an array) are ignored.
|
||||
|
||||
`canonical` determines whether this is the main parent for the space. When
|
||||
a user joins a room with a canonical parent, clients may switch to view the
|
||||
room in the context of that space, peeking into it in order to find other
|
||||
rooms and group them together. In practice, well behaved rooms should only
|
||||
have one `canonical` parent, but given this is not enforced: if multiple
|
||||
are present the client should select the one with the lowest room ID, as
|
||||
determined via a lexicographic ordering of the Unicode code-points.
|
||||
|
||||
To avoid abuse where a room admin falsely claims that a room is part of a
|
||||
space that it should not be, clients could ignore such `m.space.parent`
|
||||
events unless either (a) there is a corresponding `m.space.child` event in
|
||||
the claimed parent, or (b) the sender of the `m.space.child` event has a
|
||||
sufficient power-level to send such an `m.space.child` event in the
|
||||
parent. (It is not necessarily required that that user currently be a
|
||||
member of the parent room - only the `m.room.power_levels` event is
|
||||
inspected.) [Checking the power-level rather than requiring an *actual*
|
||||
`m.space.child` event in the parent allows for "secret" rooms (see below).]
|
||||
|
||||
Where the parent space also claims a parent, clients can recursively peek
|
||||
into the grandparent space, and so on.
|
||||
|
||||
This structure means that rooms can end up appearing multiple times in the
|
||||
room list hierarchy, given they can be children of multiple different spaces
|
||||
(or have multiple parents in different spaces).
|
||||
|
||||
In a typical hierarchy, we expect *both* parent->child and child->parent
|
||||
relationships to exist, so that the space can be discovered from the room, and
|
||||
vice versa. Occasions when the relationship only exists in one direction
|
||||
include:
|
||||
|
||||
* User-curated lists of rooms: in this case the space will not be listed as a
|
||||
parent of the room.
|
||||
|
||||
* "Secret" rooms: rooms where the admin does not want the room to be
|
||||
advertised as part of a given space, but *does* want the room to form part
|
||||
of the hierarchy of that space for those in the know.
|
||||
|
||||
Cycles in the parent->child and child->parent relationships are *not*
|
||||
permitted, but clients (and servers) should be aware that they may be
|
||||
encountered, and MUST spot and break cycles rather than infinitely looping.
|
||||
|
||||
### Suggested children
|
||||
|
||||
Space admins can mark particular children of a space as "suggested". This
|
||||
mainly serves as a hint to clients that that they can be displayed differently
|
||||
(for example by showing them eagerly in the room list), though future
|
||||
server-side interfaces (such as the summary API proposed in
|
||||
[MSC2946](https://github.com/matrix-org/matrix-doc/pull/2946)) might also
|
||||
make use of it.
|
||||
|
||||
A suggested child is identified by a `"suggested": true` property in the
|
||||
`m.space.child` event:
|
||||
|
||||
|
||||
```jsonc
|
||||
{
|
||||
"type": "m.space.child",
|
||||
"state_key": "!abcd:example.com",
|
||||
"content": {
|
||||
"via": ["example.com", "test.org"],
|
||||
"suggested": true
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
A child which is missing the `suggested` property is treated identically to a
|
||||
child with `"suggested": false`. A suggested child may be a room or a subspace.
|
||||
|
||||
### Extended "room invite state"
|
||||
|
||||
The specification is currently vague about what room state should be available
|
||||
to users that have been invited to a room, though the Federation API spec does
|
||||
recommend that the `invite_room_state` sent over federation via [PUT
|
||||
`/_matrix/federation/v2/invite`](https://matrix.org/docs/spec/server_server/r0.1.4#put-matrix-federation-v2-invite-roomid-eventid)
|
||||
should include "the join rules, canonical alias, avatar, and name of the room".
|
||||
|
||||
This MSC proposes adding `m.room.create` to that list, so that the recipient of
|
||||
an invite can distinguish invites to spaces from other invites.
|
||||
|
||||
## Future extensions
|
||||
|
||||
The following sections are not blocking parts of this proposal, but are
|
||||
included as a useful reference for how we imagine it will be extended in future.
|
||||
|
||||
### Auto-joined children
|
||||
|
||||
We could add an `auto_join` flag to `m.space.child` events to allow a space
|
||||
admin to list the sub-spaces and rooms in that space which should be
|
||||
automatically joined by members of that space.
|
||||
|
||||
This would be distinct from a force-join: the user could subsequently part any
|
||||
auto-joined room if they desire.
|
||||
|
||||
Joining would be performed by the client. This could possibly be sped up by
|
||||
using a summary API (such as that proposed in
|
||||
[MSC2946](https://github.com/matrix-org/matrix-doc/pull/2946)) to get a summary
|
||||
of the spacetree to be joined, and then using a batch join API to join
|
||||
whichever subset of it makes most sense for the client's UX.
|
||||
|
||||
Obviously auto-joining can be a DoS vector, and we consider it to be antisocial
|
||||
for a space to try to autojoin its members to more than 100 children (in total).
|
||||
|
||||
Clients could display the auto-joined children in the room list whenever the
|
||||
space appears in the list - thus helping users discover other rooms in a space
|
||||
even if they're not joined to that space. For instance, if you join
|
||||
`#matrix:matrix.org`, your client could show that room in the context of its
|
||||
parent space, with that space's auto-joined children shown alongside it as
|
||||
siblings.
|
||||
|
||||
### Restricting access to the spaces membership list
|
||||
|
||||
In the existing `/r0/groups` API, the group server has total control over the
|
||||
visibility of group membership, as seen by a given querying user. In other
|
||||
words, arbitrary users can see entirely different views of a group at the
|
||||
server's discretion.
|
||||
|
||||
Whilst this is very powerful for mapping arbitrary organisational structures
|
||||
into Matrix, it may be overengineered. Instead, the common case is (we believe)
|
||||
a space where some users are publicly visible as members, and others are not.
|
||||
|
||||
One way of achieving this would be to create a separate space for the
|
||||
private members - e.g. have `#foo:matrix.org` and `#foo-private:matrix.org`.
|
||||
`#foo-private:matrix.org` is set up with `m.room.history_visibility` to not to
|
||||
allow peeking; you have to be joined to see the members.
|
||||
|
||||
It's worth noting that any member of a space can currently see who else is a
|
||||
member of that space, which might pose privacy problems for sensitive spaces.
|
||||
While the server itself will inevitably track the space membership in state
|
||||
events, a future MSC could restrict the membership from being sent to clients.
|
||||
This is essentially the same as
|
||||
[matrix-doc#1653](https://github.com/matrix-org/matrix-doc/issues/1653).
|
||||
|
||||
### Flair
|
||||
|
||||
("Flair" is a term we use to describe a small badge which appears next to a
|
||||
user's displayname to advertise their membership of a space.)
|
||||
|
||||
The flair image for a group is given by the room avatar. (In future it might
|
||||
preferable to use hand-crafted small resolution images: see
|
||||
[matrix-doc#1778](https://github.com/matrix-org/matrix-doc/issues/1778).
|
||||
|
||||
One way this might be implemented is:
|
||||
|
||||
* User publishes the spaces they wish to announce on their profile
|
||||
([MSC1769](https://github.com/matrix-org/matrix-doc/issues/1769)
|
||||
as an `m.flair` state event: it lists the spaces which they are advertising.
|
||||
|
||||
* When a client wants to know the current flair for a set of users (i.e.
|
||||
those which it is currently displaying in the timeline), it peeks the
|
||||
profile rooms of those users. (Ideally there would be an API to support
|
||||
peeking multiple rooms at once to facilitate this.)
|
||||
|
||||
* The client must check that the user is *actually* a member of the advertised
|
||||
spaces. Nominally it can do this by peeking the membership list of the
|
||||
space; however for efficiency we could expose a dedicated Client-Server API
|
||||
to do this check (and both servers and clients can cache the results fairly
|
||||
aggressively.)
|
||||
|
||||
## Related MSCs
|
||||
|
||||
* [MSC2946](https://github.com/matrix-org/matrix-doc/issues/2946): Spaces
|
||||
Summary API.
|
||||
|
||||
* [MSC2962](https://github.com/matrix-org/matrix-doc/issues/2962): Managing
|
||||
power levels via Spaces.
|
||||
|
||||
* [MSC3083](https://github.com/matrix-org/matrix-doc/issues/3083): Restricting
|
||||
room membership based on space membership.
|
||||
|
||||
* [MSC2753](https://github.com/matrix-org/matrix-doc/issues/2753) for
|
||||
effective peeking over the C/S API.
|
||||
|
||||
* [MSC2444](https://github.com/matrix-org/matrix-doc/issues/2444) (or similar)
|
||||
for effective peeking over Federation.
|
||||
|
||||
## Security considerations
|
||||
|
||||
None at present.
|
||||
|
||||
## Potential issues
|
||||
|
||||
* If the membership of a space would be large (for example: an organisation of
|
||||
several thousand people), this membership has to be copied entirely into the
|
||||
room, rather than querying/searching incrementally.
|
||||
|
||||
* If the membership list is based on an external service such as LDAP, it is
|
||||
hard to keep the space membership in sync with the LDAP directory. In
|
||||
practice, it might be possible to do so via a nightly "synchronisation" job
|
||||
which searches the LDAP directory, or via "AD auditing".
|
||||
|
||||
* No allowance is made for exposing different 'views' of the membership list to
|
||||
different querying users. (It may be possible to simulate this behaviour
|
||||
using smaller spaces).
|
||||
|
||||
* The requirement that `m.space.parent` links be ignored unless the sender has a
|
||||
high PL in the parent room could lead to suprising effects where a parent
|
||||
link suddenly ceases to take effect because a user loses their PL in the
|
||||
parent room. This is mitigated in the general case by honouring the parent
|
||||
link when there is a corresponding `m.space.child` event, however it remains
|
||||
a problem for "secret" rooms.
|
||||
|
||||
* The `via` servers listed in the `m.space.child` and `m.space.parent` events
|
||||
could get out of date, and will need to be updated from time to time. This
|
||||
remains an unsolved problem.
|
||||
|
||||
## Rejected alternatives
|
||||
|
||||
### Use a separate state event for type of room
|
||||
|
||||
[MSC1840](https://github.com/matrix-org/matrix-doc/pull/1840) proposes the use
|
||||
of a separate `m.room.type` state event to distinguish different room types.
|
||||
This implies that rooms can dynamically switch between being a Space, and
|
||||
being a regular non-Space room. That is not a usecase we consider useful, and
|
||||
allowing it would impose significant complexity on client and server
|
||||
implementations. Specifically, client and server implementations who store
|
||||
spaces separately from rooms would have to support migrating back and forth
|
||||
between them and dealing with the ambiguities of `room_id`s no longer pointing
|
||||
to valid spaces, etc.
|
||||
|
||||
### Use a different sigil/twigil for spaces
|
||||
|
||||
Groups used + as a sigil to differentiate them from rooms (e.g. +matrix:matrix.org).
|
||||
We considered doing similar for Spaces, e.g. a #+ twigil or reuse the + sigil,
|
||||
but concluded that the resulting complexity and exoticism is not worth it.
|
||||
This means that clients such as matrix.to have to peek into rooms to find out their
|
||||
`type` before being able to display an appropriate UI, and users will not know
|
||||
whether #matrix:matrix.org is a room or a space without using a client (e.g. if
|
||||
reading an advert). It also means that if the client UI requires a space alias the
|
||||
client will need to validate the entered data serverside.
|
||||
|
||||
## Unstable prefix
|
||||
|
||||
The following mapping will be used for identifiers in this MSC during
|
||||
development:
|
||||
|
||||
Proposed final identifier | Purpose | Development identifier
|
||||
------------------------------- | ------- | ----
|
||||
`type` | property in `m.room.create` | `org.matrix.msc1772.type`
|
||||
`m.space` | value of `type` in `m.room.create` | `org.matrix.msc1772.space`
|
||||
`m.space.child` | event type | `org.matrix.msc1772.space.child`
|
||||
`m.space.parent` | event type | `org.matrix.msc1772.space.parent`
|
||||
|
||||
## History
|
||||
|
||||
* This replaces [MSC1215](https://docs.google.com/document/d/1ZnAuA_zti-K2-RnheXII1F1-oyVziT4tJffdw1-SHrE).
|
||||
* Other thoughts that led into this are [documented](https://docs.google.com/document/d/1hljmD-ytdCRL37t-D_LvGDA3a0_2MwowSPIiZRxcabs).
|
||||
|
||||
## Appendix: problems with the `/r0/groups` API
|
||||
|
||||
The existing `/r0/groups` API, as proposed in
|
||||
[MSC971](https://github.com/matrix-org/matrix-doc/issues/971), has various
|
||||
problems, including:
|
||||
|
||||
* It is a large API surface to implement, maintain and spec - particularly for
|
||||
all the different clients out there.
|
||||
* Much of the API overlaps significantly with mechanisms we already have for
|
||||
managing rooms:
|
||||
* Tracking membership identity
|
||||
* Tracking membership hierarchy
|
||||
* Inviting/kicking/banning user
|
||||
* Tracking key/value metadata
|
||||
* There are membership management features which could benefit rooms which
|
||||
would also benefit groups and vice versa (e.g. "auditorium mode")
|
||||
* The current implementations on Riot Web/iOS/Android all suffer bugs and
|
||||
issues which have been solved previously for rooms.
|
||||
* no local-echo of invites
|
||||
* failures to set group avatars
|
||||
* ability to specify multiple admins
|
||||
* It doesn't support pushing updates to clients (particularly for flair
|
||||
membership): https://github.com/vector-im/riot-web/issues/5235
|
||||
* It doesn't support third-party invites.
|
||||
* Groups could benefit from other features which already exist today for rooms
|
||||
* e.g. Room Directories
|
||||
* Groups are centralised, rather than being replicated across all
|
||||
participating servers.
|
@ -0,0 +1,40 @@
|
||||
# MSC3122: Deprecate starting key verifications without requesting first
|
||||
|
||||
Currently, the [Key verification
|
||||
framework](https://spec.matrix.org/unstable/client-server-api/#key-verification-framework)
|
||||
allows a device to begin a verification via to-device messages by sending an
|
||||
`m.key.verification.start` event without first sending or receiving an
|
||||
`m.key.verification.request` message. (The last sentence of the 5th paragraph
|
||||
of the Key verification framework in the unstable spec, as of the time of
|
||||
writing.) However, doing so does not provide a good user experience, and
|
||||
allowing this adds unnecessary complexity to implementations.
|
||||
|
||||
We propose to deprecate allowing this behaviour.
|
||||
|
||||
Note that verifications in DMs do not allow this behaviour. Currently, Element
|
||||
Web is the only client known to do this.
|
||||
|
||||
## Proposal
|
||||
|
||||
The ability to begin a key verification by sending an
|
||||
`m.key.verification.start` event as a to-device event without a prior
|
||||
`m.key.verification.request` is deprecated. New clients should not begin
|
||||
verifications in this way, but will still need to accept verifications begun in
|
||||
this way, until it is removed from the spec.
|
||||
|
||||
## Potential issues
|
||||
|
||||
None.
|
||||
|
||||
## Alternatives
|
||||
|
||||
We could do nothing and leave it in the spec. But we should clean up cruft when
|
||||
possible.
|
||||
|
||||
## Security considerations
|
||||
|
||||
None.
|
||||
|
||||
## Unstable prefix
|
||||
|
||||
No unstable prefix is required since we are simply deprecating behaviour.
|
Loading…
Reference in New Issue