mirror of
https://github.com/matrix-org/matrix-spec
synced 2026-03-01 17:24:10 +01:00
Adjust wording so the validation reads nicer
This commit is contained in:
parent
521bf40761
commit
aa3abad39a
|
|
@ -39,7 +39,7 @@ paths:
|
|||
|
||||
Servers MUST apply certain validation to ensure they don't accidentally sign non-invite
|
||||
events from a malicious server. A specific error code is not mandated, but servers SHOULD
|
||||
use `M_INVALID_PARAM` for errors from all the following validation checks:
|
||||
return `M_INVALID_PARAM` if:
|
||||
|
||||
* The invite event fails a [signature check](/server-server-api/#validating-hashes-and-signatures-on-received-events).
|
||||
* The event type is not `m.room.member`.
|
||||
|
|
@ -48,7 +48,8 @@ paths:
|
|||
* The `state_key` is not a user ID on the receiving server.
|
||||
|
||||
The `invite_room_state` has additional validation, which servers MAY apply to room versions
|
||||
1 through 11 and SHOULD apply to all other room versions:
|
||||
1 through 11 and SHOULD apply to all other room versions. As with the above errors, servers
|
||||
SHOULD return `M_INVALID_PARAM` if:
|
||||
|
||||
* The `m.room.create` event is missing from `invite_room_state`.
|
||||
* One or more entries in `invite_room_state` are not formatted according
|
||||
|
|
|
|||
|
|
@ -43,7 +43,7 @@ paths:
|
|||
|
||||
Servers MUST apply certain validation to ensure they don't accidentally sign non-invite
|
||||
events from a malicious server. A specific error code is not mandated, but servers SHOULD
|
||||
use `M_INVALID_PARAM` for errors from all the following validation checks:
|
||||
return `M_INVALID_PARAM` if:
|
||||
|
||||
* The invite event fails a [signature check](/server-server-api/#validating-hashes-and-signatures-on-received-events).
|
||||
* The event type is not `m.room.member`.
|
||||
|
|
@ -52,7 +52,8 @@ paths:
|
|||
* The `state_key` is not a user ID on the receiving server.
|
||||
|
||||
The `invite_room_state` has additional validation, which servers MAY apply to room versions
|
||||
1 through 11 and SHOULD apply to all other room versions:
|
||||
1 through 11 and SHOULD apply to all other room versions. As with the above errors, servers
|
||||
SHOULD return `M_INVALID_PARAM` if:
|
||||
|
||||
* The `m.room.create` event is missing from `invite_room_state`.
|
||||
* One or more entries in `invite_room_state` are not formatted according
|
||||
|
|
|
|||
|
|
@ -251,8 +251,7 @@ paths:
|
|||
fields for a PDU.**
|
||||
|
||||
The receiving server MUST apply certain validation before accepting the event.
|
||||
A specific error code is not mandated, but servers SHOULD use `M_INVALID_PARAM`
|
||||
for errors from all the following validation checks:
|
||||
A specific error code is not mandated, but servers SHOULD return `M_INVALID_PARAM` if:
|
||||
|
||||
* The join event fails a [signature check](/server-server-api/#validating-hashes-and-signatures-on-received-events).
|
||||
* The event type is not `m.room.member`.
|
||||
|
|
|
|||
|
|
@ -40,8 +40,7 @@ paths:
|
|||
fields for a PDU.**
|
||||
|
||||
The receiving server MUST apply certain validation before accepting the event.
|
||||
A specific error code is not mandated, but servers SHOULD use `M_INVALID_PARAM`
|
||||
for errors from all the following validation checks:
|
||||
A specific error code is not mandated, but servers SHOULD return `M_INVALID_PARAM` if:
|
||||
|
||||
* The join event fails a [signature check](/server-server-api/#validating-hashes-and-signatures-on-received-events).
|
||||
* The event type is not `m.room.member`.
|
||||
|
|
|
|||
|
|
@ -217,8 +217,7 @@ paths:
|
|||
fields for a PDU.**
|
||||
|
||||
The receiving server MUST apply certain validation before accepting the event.
|
||||
A specific error code is not mandated, but servers SHOULD use `M_INVALID_PARAM`
|
||||
for errors from all the following validation checks:
|
||||
A specific error code is not mandated, but servers SHOULD return `M_INVALID_PARAM` if:
|
||||
|
||||
* The knock event fails a [signature check](/server-server-api/#validating-hashes-and-signatures-on-received-events).
|
||||
* The event type is not `m.room.member`.
|
||||
|
|
|
|||
|
|
@ -166,8 +166,7 @@ paths:
|
|||
fields for a PDU.**
|
||||
|
||||
The receiving server MUST apply certain validation before accepting the event.
|
||||
A specific error code is not mandated, but servers SHOULD use `M_INVALID_PARAM`
|
||||
for errors from all the following validation checks:
|
||||
A specific error code is not mandated, but servers SHOULD return `M_INVALID_PARAM` if:
|
||||
|
||||
* The leave event fails a [signature check](/server-server-api/#validating-hashes-and-signatures-on-received-events).
|
||||
* The event type is not `m.room.member`.
|
||||
|
|
|
|||
|
|
@ -40,8 +40,7 @@ paths:
|
|||
fields for a PDU.**
|
||||
|
||||
The receiving server MUST apply certain validation before accepting the event.
|
||||
A specific error code is not mandated, but servers SHOULD use `M_INVALID_PARAM`
|
||||
for errors from all the following validation checks:
|
||||
A specific error code is not mandated, but servers SHOULD return `M_INVALID_PARAM` if:
|
||||
|
||||
* The leave event fails a [signature check](/server-server-api/#validating-hashes-and-signatures-on-received-events).
|
||||
* The event type is not `m.room.member`.
|
||||
|
|
|
|||
Loading…
Reference in a new issue