Commit Graph

4262 Commits (2d11217d4ed1282d4c80e97faffd544de2b34bcb)
 

Author SHA1 Message Date
David Baker 2d11217d4e
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
5 years ago
David Baker 8af35be13f
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
5 years ago
David Baker fe14d3c9f0 Spec terms response 5 years ago
David Baker 786d5bc281 rewrite UI auth tradeoffs 5 years ago
David Baker 45d630951c back to M_TERMS_NOT_SIGNED 5 years ago
David Baker 83bb3861ba line wrap 5 years ago
David Baker 4be283ccb3
Typing
Co-Authored-By: Travis Ralston <travpc@gmail.com>
5 years ago
David Baker f95197b422 make the many-anded sentence a list 5 years ago
David Baker 10a6a59a12 Deprecate `bind_email` / `bind_msisdn` 5 years ago
David Baker b5326de1c4 Exclude requestToken endpoints from auth requirement 5 years ago
David Baker 21b9eaf8de No custom HTTP headers
Use the obvious way: in the same place as the ID server address
5 years ago
David Baker 2694bb1090 Add really horrible custom HTTP header
for giving the IS token to the HS
5 years ago
David Baker 58cf083a6a backwards compat 5 years ago
David Baker 6273868323 Clarify v1 API deprecation 5 years ago
David Baker 4edf826c93 Capitalise on our identifiers 5 years ago
David Baker ba7047ce77
Clarify we must be accepting HS auth
Co-Authored-By: Travis Ralston <travpc@gmail.com>
5 years ago
David Baker 1d75828c71 Clarify what to do if no (new) docs 5 years ago
David Baker af691b5a8a
Clarify this applies to 2134
Co-Authored-By: Travis Ralston <travpc@gmail.com>
5 years ago
David Baker 57094276ce
Typing hard is
Co-Authored-By: Travis Ralston <travpc@gmail.com>
5 years ago
David Baker 9e0d8b9cb2 Use M_CONSENT_NOT_GIVEN
No idea where I got the other one from: we already have one in the
spec, so use it.
5 years ago
David Baker 0dae2d5812 GET terms must be unauthed.
Detail process for new auth (don't register until consent given).

Specifically mention the authentication header.
5 years ago
David Baker 6f374dc981 Re-write for OpenID auth 5 years ago
David Baker 2c09580e27 line wrap 5 years ago
David Baker abb407145a HS docs must be added too
also, unbind must not error when called by HSes and proxy terms token
5 years ago
David Baker 8ae47557c9 s/Third Party/Accepted/ 5 years ago
David Baker 2555801458 m.third_party_terms -> m.accepted_terms
as it will have the HS's terms too
5 years ago
David Baker 4ba9b2a599 perfix 5 years ago
David Baker a63e4420eb
Linkify
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
5 years ago
David Baker 9ca3ccc81c Add requirments section for de-duping between services. 5 years ago
David Baker d4ca0c237a Specify ID grammar and add comma 5 years ago
David Baker 276e2b6843
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
5 years ago
David Baker cf48030d1f One more tradeoff 5 years ago
David Baker 32c7fc638d you have a number now 5 years ago
David Baker 23af87e9fc Proposal for IS & IM TOS API 5 years ago
Travis Ralston ace94f02b7
Merge pull request #2132 from jimmycuadra/clarify-m.key.verification.start
Clarify the distinction between *m.key.verification.start* and its *m.sas.v1* variant.
5 years ago
Jimmy Cuadra 8246383330 Fix typos in changelog entry. 5 years ago
Travis Ralston 204601d9a4
Merge pull request #2133 from matrix-org/travis/fix-olm-2
Fix link to Olm signing specification
5 years ago
Travis Ralston ffdd8dfe01
Merge pull request #2137 from matrix-org/identity_service/release-r0.2.1
Identity r0.2.1
5 years ago
Travis Ralston d09af5b191 Identity r0.2.1 5 years ago
Travis Ralston 954a5607c3
Merge pull request #2136 from ma1uta/master
Fix typo.
5 years ago
Travis Ralston c63b5aff69
Create 2136.clarification 5 years ago
Anatoly Sablin 802b90d113 Typo. 5 years ago
Jimmy Cuadra 8affb23e5e Address feedback from code review.
* Switch "an SAS" back to "a SAS"
* Remove the `next_method` field from m.key.verification.start$m.sas.v1
  but add additional clarification to its description on
  m.key.verification.start that it is never present for methods that
  verify keys both ways.
5 years ago
Travis Ralston 6f460ad70a minus spec
according to the apache .htaccess we use
5 years ago
Travis Ralston 33ca891e71 Fix link to Olm signing specification
See https://github.com/matrix-org/matrix.org/issues/478
5 years ago
Jimmy Cuadra 5384b61d95 Fix style issues brought up during code review.
Signed-off-by: Jimmy Cuadra <jimmy@jimmycuadra.com>
5 years ago
Jimmy Cuadra bc71dacaf4 Clarify the distinction between *m.key.verification.start* and its *m.sas.v1* variant.
Currently the *m.key.verification.start* event appears twice with the
exact same title, in the "Key verification framework" section and the
"Short Authentication (SAS) verification" section. It's not immediately
clear that the first occurrence describes the format of the event in
general terms and that the second occurrence describes the fields when
the *m.sas.v1* verification method is being used. This is a similar
relationship to the *m.room.message* event and its various *msgtype*
variants.

This commit does three things:

* It tweaks the generation of the documentation to change the title
  of the second occurrence of *m.key.verification.start* to
  distinguish it from the first.
* It updates the language in the description of the two versions of the
  event to better describe the relationship between the two.
* It adds the optional `next_method` field to the schema of the
  *m.sas.v1* variant, as specified in the general form of
  *m.key.verification.start*.

Signed-off-by: Jimmy Cuadra <jimmy@jimmycuadra.com>
5 years ago
Travis Ralston b807e1cbe5
Merge pull request #2129 from jimmycuadra/conditionally-required-url-fields
Remove the "required" designation from the `url` field of certain m.room.message msgtypes.
5 years ago
Matthew Hodgson aadf1cc733
Merge pull request #2131 from jimmycuadra/e2ee-easier-typo
Fix typo in key verification framework section.
5 years ago
Jimmy Cuadra b885714d94 Remove the "required" designation from the `url` field of certain
m.room.message msgtypes.

Now that content referenced by the *m.audio*, *m.file*, *m.image*, and
*m.video* message types can be encrypted, the `url` field is required
*only* if the content is unencrypted. The "required" designation in the
event schemas (which prefixes the field description with "Required" in
bold in the generated HTML) is used to indicate fields which must always
be present, and this is no longer the case.

Signed-off-by: Jimmy Cuadra <jimmy@jimmycuadra.com>
5 years ago