mirror of
https://github.com/matrix-org/matrix-spec
synced 2026-04-29 13:54:10 +02:00
Compare commits
48 commits
580c6ae1fd
...
166aceedb3
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
166aceedb3 | ||
|
|
a2a9a02efa | ||
|
|
32b1f0514d | ||
|
|
7bcc3ecb81 | ||
|
|
866c05f487 | ||
|
|
7470c72d94 | ||
|
|
643a6dca2d | ||
|
|
cbf1854b93 | ||
|
|
2c734c3c5b | ||
|
|
075d203ecd | ||
|
|
4ed55a60ec | ||
|
|
67743d5715 | ||
|
|
338047ec7b | ||
|
|
0439707624 | ||
|
|
f4e6e6dea9 | ||
|
|
73fcf366a0 | ||
|
|
0a1efd8c9c | ||
|
|
2c6ddafb43 | ||
|
|
fc81171081 | ||
|
|
c74befd111 | ||
|
|
ca9c376076 | ||
|
|
fe46e0c363 | ||
|
|
a8c326962a | ||
|
|
fca171427f | ||
|
|
81273df88e | ||
|
|
65b1db721d | ||
|
|
c39c7d0680 | ||
|
|
23ff7f1343 | ||
|
|
8a2c58b1b1 | ||
|
|
817ec5380f | ||
|
|
029be205b9 | ||
|
|
fe880fdaf4 | ||
|
|
71ce620fc0 | ||
|
|
cb6d039c57 | ||
|
|
c7581356bf | ||
|
|
7fd49a2808 | ||
|
|
e283c35dbd | ||
|
|
1916e53f8c | ||
|
|
02a1aeefbc | ||
|
|
3adbfa30da | ||
|
|
4ff9a851e6 | ||
|
|
844dd6f8ae | ||
|
|
dfc61ffc71 | ||
|
|
60339adb2d | ||
|
|
ae06f37470 | ||
|
|
10587366e9 | ||
|
|
eedecf863a | ||
|
|
cb83c5a76e |
16
.github/workflows/main.yml
vendored
16
.github/workflows/main.yml
vendored
|
|
@ -2,6 +2,7 @@ name: "Spec"
|
||||||
|
|
||||||
env:
|
env:
|
||||||
HUGO_VERSION: 0.139.0
|
HUGO_VERSION: 0.139.0
|
||||||
|
PYTHON_VERSION: 3.13
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
|
|
@ -40,7 +41,7 @@ jobs:
|
||||||
- name: "➕ Setup Python"
|
- name: "➕ Setup Python"
|
||||||
uses: actions/setup-python@v5
|
uses: actions/setup-python@v5
|
||||||
with:
|
with:
|
||||||
python-version: '3.9'
|
python-version: ${{ env.PYTHON_VERSION }}
|
||||||
cache: 'pip'
|
cache: 'pip'
|
||||||
cache-dependency-path: scripts/requirements.txt
|
cache-dependency-path: scripts/requirements.txt
|
||||||
- name: "➕ Install dependencies"
|
- name: "➕ Install dependencies"
|
||||||
|
|
@ -59,7 +60,7 @@ jobs:
|
||||||
- name: "➕ Setup Python"
|
- name: "➕ Setup Python"
|
||||||
uses: actions/setup-python@v5
|
uses: actions/setup-python@v5
|
||||||
with:
|
with:
|
||||||
python-version: '3.9'
|
python-version: ${{ env.PYTHON_VERSION }}
|
||||||
cache: 'pip'
|
cache: 'pip'
|
||||||
cache-dependency-path: scripts/requirements.txt
|
cache-dependency-path: scripts/requirements.txt
|
||||||
- name: "➕ Install dependencies"
|
- name: "➕ Install dependencies"
|
||||||
|
|
@ -78,7 +79,7 @@ jobs:
|
||||||
- name: "➕ Setup Python"
|
- name: "➕ Setup Python"
|
||||||
uses: actions/setup-python@v5
|
uses: actions/setup-python@v5
|
||||||
with:
|
with:
|
||||||
python-version: '3.9'
|
python-version: ${{ env.PYTHON_VERSION }}
|
||||||
cache: 'pip'
|
cache: 'pip'
|
||||||
cache-dependency-path: scripts/requirements.txt
|
cache-dependency-path: scripts/requirements.txt
|
||||||
- name: "➕ Install dependencies"
|
- name: "➕ Install dependencies"
|
||||||
|
|
@ -120,7 +121,7 @@ jobs:
|
||||||
- name: "➕ Setup Python"
|
- name: "➕ Setup Python"
|
||||||
uses: actions/setup-python@v5
|
uses: actions/setup-python@v5
|
||||||
with:
|
with:
|
||||||
python-version: '3.9'
|
python-version: ${{ env.PYTHON_VERSION }}
|
||||||
cache: 'pip'
|
cache: 'pip'
|
||||||
cache-dependency-path: scripts/requirements.txt
|
cache-dependency-path: scripts/requirements.txt
|
||||||
- name: "➕ Install dependencies"
|
- name: "➕ Install dependencies"
|
||||||
|
|
@ -172,7 +173,7 @@ jobs:
|
||||||
- name: "➕ Setup Python"
|
- name: "➕ Setup Python"
|
||||||
uses: actions/setup-python@v5
|
uses: actions/setup-python@v5
|
||||||
with:
|
with:
|
||||||
python-version: '3.9'
|
python-version: ${{ env.PYTHON_VERSION }}
|
||||||
- name: "➕ Install towncrier"
|
- name: "➕ Install towncrier"
|
||||||
run: "pip install 'towncrier'"
|
run: "pip install 'towncrier'"
|
||||||
- name: "Generate changelog"
|
- name: "Generate changelog"
|
||||||
|
|
@ -283,10 +284,11 @@ jobs:
|
||||||
npm i
|
npm i
|
||||||
npm run get-proposals
|
npm run get-proposals
|
||||||
- name: "⚙️ hugo"
|
- name: "⚙️ hugo"
|
||||||
|
env:
|
||||||
|
HUGO_PARAMS_VERSION_STATUS: "historical"
|
||||||
# Create a baseURL like `/v1.2` out of the `v1.2` tag
|
# Create a baseURL like `/v1.2` out of the `v1.2` tag
|
||||||
run: |
|
run: |
|
||||||
echo -e '[params.version]\nstatus="historical"' > historical.toml
|
hugo --baseURL "/${GITHUB_REF/refs\/tags\//}" -d "spec"
|
||||||
hugo --config config.toml,historical.toml --baseURL "/${GITHUB_REF/refs\/tags\//}" -d "spec"
|
|
||||||
|
|
||||||
- name: "📥 Spec definition download"
|
- name: "📥 Spec definition download"
|
||||||
uses: actions/download-artifact@v4
|
uses: actions/download-artifact@v4
|
||||||
|
|
|
||||||
|
|
@ -316,13 +316,19 @@ Custom SCSS for the Matrix spec
|
||||||
h2 {
|
h2 {
|
||||||
font-weight: $font-weight-bold;
|
font-weight: $font-weight-bold;
|
||||||
font-size: 1.3rem;
|
font-size: 1.3rem;
|
||||||
margin: 3rem 0 .5rem 0;
|
margin: 1.5rem 0 1rem 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
h3 {
|
h3 {
|
||||||
font-weight: $font-weight-bold;
|
font-weight: $font-weight-bold;
|
||||||
font-size: 1.1rem;
|
font-size: 1.1rem;
|
||||||
margin: 1.5rem 0 .75rem 0;
|
margin: 1.5rem 0 1rem 0;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Reduce top margin of h3 if previous sibling is a h2 */
|
||||||
|
h2 + h3 {
|
||||||
|
margin-top: 1rem;
|
||||||
}
|
}
|
||||||
|
|
||||||
hr {
|
hr {
|
||||||
|
|
@ -367,11 +373,6 @@ Custom SCSS for the Matrix spec
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// add some space between two tables when they are right next to each other
|
|
||||||
& + table {
|
|
||||||
margin-top: 4rem;
|
|
||||||
}
|
|
||||||
|
|
||||||
caption {
|
caption {
|
||||||
caption-side: top;
|
caption-side: top;
|
||||||
color: $dark;
|
color: $dark;
|
||||||
|
|
@ -443,6 +444,17 @@ Custom SCSS for the Matrix spec
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Have consistent spacing around tables and examples */
|
||||||
|
table, .highlight {
|
||||||
|
margin-top: 0;
|
||||||
|
margin-bottom: 2rem;
|
||||||
|
|
||||||
|
/* We don't need the margin on the last child of the .rendered-data block */
|
||||||
|
&:last-child {
|
||||||
|
margin-bottom: 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
pre {
|
pre {
|
||||||
border: 0;
|
border: 0;
|
||||||
border-left: solid 5px $secondary;
|
border-left: solid 5px $secondary;
|
||||||
|
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Clarify that arbitrary unicode is allowed in user/room IDs and room aliases.
|
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Correct null value handling for the AS Registration's `url` property.
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
The `POST /_matrix/client/v3/rooms/{roomId}/initialSync` endpoint is no longer deprecated, as it is still used for peeking.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Clarify wording in the `/join` endpoints' summaries and descriptions. Contributed by @HarHarLinks.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Clarify formats of string types.
|
|
||||||
|
|
@ -1,2 +0,0 @@
|
||||||
Document the `instance_id` field of `Protocol Instance` in the responses to
|
|
||||||
`GET /_matrix/client/v3/thirdparty/protocols` and `GET /_matrix/client/v3/thirdparty/protocol/{protocol}`.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Applying redactions is a SHOULD for clients.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Remove `server_name` parameter from `/_matrix/client/v3/join/{roomIdOrAlias}` and `/_matrix/client/v3/knock/{roomIdOrAlias}` as per [MSC4213](https://github.com/matrix-org/matrix-spec-proposals/pull/4213).
|
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Clarify behaviour when the `topic` key of a `m.room.topic` event is absent, null, or empty.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Fix the example of the `GET /sync` endpoint and the `m.room.member` example used in several places.
|
||||||
|
|
@ -0,0 +1,2 @@
|
||||||
|
Clarify the format of third-party invites, including the fact that identity
|
||||||
|
server public keys can be encoded using standard or URL-safe base64.
|
||||||
1
changelogs/client_server/newsfragments/2095.feature
Normal file
1
changelogs/client_server/newsfragments/2095.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add `m.topic` content block to enable rich text in `m.room.topic` events as per [MSC3765](https://github.com/matrix-org/matrix-spec-proposals/pull/3765).
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms in profile look-ups are defined through their join rule and history visibility.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms in user directory queries are defined through their join rule and history visibility.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Rooms published in `/publicRooms` don't necessarily have `public` join rules or `world_readable` history visibility.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms with respect to call invites are defined through their join rule.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms have no specific meaning with respect to moderation policy lists.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms with respect to presence are defined through their join rule.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Spaces are subject to the same access mechanisms as rooms.
|
||||||
1
changelogs/client_server/newsfragments/2122.feature
Normal file
1
changelogs/client_server/newsfragments/2122.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Include device keys with Olm-encrypted events as per [MSC4147](https://github.com/matrix-org/matrix-spec-proposals/pull/4147).
|
||||||
1
changelogs/client_server/newsfragments/2125.feature
Normal file
1
changelogs/client_server/newsfragments/2125.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add `/_matrix/client/v1/room_summary/{roomIdOrAlias}` and extend `/_matrix/client/v1/rooms/{roomId}/hierarchy` with the new optional properties `allowed_room_ids`, `encryption` and `room_version` as per [MSC3266](https://github.com/matrix-org/matrix-spec-proposals/pull/3266).
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Clarify that Well-Known URIs are available on the server name's hostname. Contributed by @HarHarLinks.
|
||||||
1
changelogs/client_server/newsfragments/2141.feature
Normal file
1
changelogs/client_server/newsfragments/2141.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add the OAuth 2.0 based authentication API, as per [MSC3861](https://github.com/matrix-org/matrix-spec-proposals/pull/3861) and its sub-proposals.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Fix typo: as->has.
|
||||||
1
changelogs/client_server/newsfragments/2149.feature
Normal file
1
changelogs/client_server/newsfragments/2149.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add the OAuth 2.0 based authentication API, as per [MSC3861](https://github.com/matrix-org/matrix-spec-proposals/pull/3861) and its sub-proposals.
|
||||||
1
changelogs/client_server/newsfragments/2158.feature
Normal file
1
changelogs/client_server/newsfragments/2158.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add `/_matrix/client/v1/room_summary/{roomIdOrAlias}` and extend `/_matrix/client/v1/rooms/{roomId}/hierarchy` with the new optional properties `allowed_room_ids`, `encryption` and `room_version` as per [MSC3266](https://github.com/matrix-org/matrix-spec-proposals/pull/3266).
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Clarify that public keys can be encoded using standard or URL-safe base64.
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Generate the changelog release info with Hugo, rather than the changelog generation script.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Update release steps documentation.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Remove unused `release_date` from Hugo config.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Clarify that v1.0 of Matrix was a release prior to the current global versioning system.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Fix syntax highlighting and click-to-copy buttons for code blocks by purging less CSS.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Fix the version of the Identity Service API when Matrix 1.0 was introduced.
|
|
||||||
1
changelogs/internal/newsfragments/2081.clarification
Normal file
1
changelogs/internal/newsfragments/2081.clarification
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Adjust margins in rendered endpoints.
|
||||||
1
changelogs/internal/newsfragments/2088.clarification
Normal file
1
changelogs/internal/newsfragments/2088.clarification
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Replace Hugo shortcodes in OpenAPI output.
|
||||||
1
changelogs/internal/newsfragments/2115.clarification
Normal file
1
changelogs/internal/newsfragments/2115.clarification
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add [well-known funding manifest urls](https://floss.fund/funding-manifest/) to spec to authorise https://matrix.org/funding.json. Contributed by @HarHarLinks.
|
||||||
1
changelogs/internal/newsfragments/2123.clarification
Normal file
1
changelogs/internal/newsfragments/2123.clarification
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Fix the historical info box when generating the historical spec in CI.
|
||||||
1
changelogs/internal/newsfragments/2137.clarification
Normal file
1
changelogs/internal/newsfragments/2137.clarification
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Update the header navigation menu with links to modern matrix.org. Contributed by @HarHarLinks.
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Fix various typos throughout the specification.
|
|
||||||
|
|
@ -1 +0,0 @@
|
||||||
Remove the `origin` field in `PUT /send_join` responses, because it was never sent in the first place.
|
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Add a note to the invite endpoints that invites to local users may be received twice over federation if the homeserver is already in the room.
|
||||||
|
|
@ -0,0 +1,2 @@
|
||||||
|
Clarify the format of third-party invites, including the fact that identity
|
||||||
|
server public keys can be encoded using standard or URL-safe base64.
|
||||||
1
changelogs/server_server/newsfragments/2095.feature
Normal file
1
changelogs/server_server/newsfragments/2095.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add `m.topic` content block to enable rich text in `m.room.topic` events as per [MSC3765](https://github.com/matrix-org/matrix-spec-proposals/pull/3765).
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Clarify that auth event of `content.join_authorised_via_users_server` is only necessary for `m.room.member` with a `membership` of `join`.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Rooms published in `/publicRooms` don't necessarily have `public` join rules or `world_readable` history visibility.
|
||||||
1
changelogs/server_server/newsfragments/2125.feature
Normal file
1
changelogs/server_server/newsfragments/2125.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Extend `/_matrix/federation/v1/hierarchy/{roomId}` with the new optional properties `encryption` and `room_version` as per [MSC3266](https://github.com/matrix-org/matrix-spec-proposals/pull/3266).
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Clarify that Well-Known URIs are available on the server name's hostname. Contributed by @HarHarLinks.
|
||||||
|
|
@ -23,15 +23,15 @@ description = "Home of the Matrix specification for decentralised communication"
|
||||||
[menus]
|
[menus]
|
||||||
[[menus.main]]
|
[[menus.main]]
|
||||||
name = 'Foundation'
|
name = 'Foundation'
|
||||||
url = 'https://matrix.org/foundation/'
|
url = 'https://matrix.org/foundation/about/'
|
||||||
weight = 10
|
weight = 10
|
||||||
[[menus.main]]
|
[[menus.main]]
|
||||||
name = 'FAQs'
|
name = 'User Docs'
|
||||||
url = 'https://matrix.org/faq'
|
url = 'https://matrix.org/docs/'
|
||||||
weight = 20
|
weight = 20
|
||||||
[[menus.main]]
|
[[menus.main]]
|
||||||
name = 'Blog'
|
name = 'Blog'
|
||||||
url = 'https://matrix.org/blog/posts'
|
url = 'https://matrix.org/blog/'
|
||||||
weight = 30
|
weight = 30
|
||||||
|
|
||||||
[markup]
|
[markup]
|
||||||
|
|
@ -67,7 +67,7 @@ current_version_url = "https://spec.matrix.org/latest"
|
||||||
# The following is used when status = "stable", and is displayed in various UI elements on a released version
|
# The following is used when status = "stable", and is displayed in various UI elements on a released version
|
||||||
# of the spec.
|
# of the spec.
|
||||||
# major = "1"
|
# major = "1"
|
||||||
# minor = "13"
|
# minor = "14"
|
||||||
|
|
||||||
# User interface configuration
|
# User interface configuration
|
||||||
[params.ui]
|
[params.ui]
|
||||||
|
|
|
||||||
|
|
@ -492,10 +492,10 @@ via the query string). It is expected that the application service use
|
||||||
the transactions pushed to it to handle events rather than syncing with
|
the transactions pushed to it to handle events rather than syncing with
|
||||||
the user implied by `sender_localpart`.
|
the user implied by `sender_localpart`.
|
||||||
|
|
||||||
#### Application service room directories
|
#### Published room directories
|
||||||
|
|
||||||
Application services can maintain their own room directories for their
|
Application services can maintain their own published room directories for
|
||||||
defined third-party protocols. These room directories may be accessed by
|
their defined third-party protocols. These directories may be accessed by
|
||||||
clients through additional parameters on the `/publicRooms`
|
clients through additional parameters on the `/publicRooms`
|
||||||
client-server endpoint.
|
client-server endpoint.
|
||||||
|
|
||||||
|
|
|
||||||
93
content/changelog/v1.14.md
Normal file
93
content/changelog/v1.14.md
Normal file
|
|
@ -0,0 +1,93 @@
|
||||||
|
---
|
||||||
|
title: v1.14 Changelog
|
||||||
|
linkTitle: v1.14
|
||||||
|
type: docs
|
||||||
|
layout: changelog
|
||||||
|
outputs:
|
||||||
|
- html
|
||||||
|
- checklist
|
||||||
|
date: 2025-03-27
|
||||||
|
---
|
||||||
|
|
||||||
|
## Client-Server API
|
||||||
|
|
||||||
|
**New Endpoints**
|
||||||
|
|
||||||
|
- Add `POST /_matrix/client/v3/users/{userId}/report`, as per [MSC4260](https://github.com/matrix-org/matrix-spec-proposals/pull/4260). ([#2093](https://github.com/matrix-org/matrix-spec/issues/2093))
|
||||||
|
|
||||||
|
**Removed Endpoints**
|
||||||
|
|
||||||
|
- Remove `server_name` parameter from `/_matrix/client/v3/join/{roomIdOrAlias}` and `/_matrix/client/v3/knock/{roomIdOrAlias}`, as per [MSC4213](https://github.com/matrix-org/matrix-spec-proposals/pull/4213). ([#2059](https://github.com/matrix-org/matrix-spec/issues/2059))
|
||||||
|
|
||||||
|
**Spec Clarifications**
|
||||||
|
|
||||||
|
- The `POST /_matrix/client/v3/rooms/{roomId}/initialSync` endpoint is no longer deprecated, as it is still used for peeking. ([#2036](https://github.com/matrix-org/matrix-spec/issues/2036))
|
||||||
|
- Clarify wording in the `/join` endpoints' summaries and descriptions. Contributed by @HarHarLinks. ([#2038](https://github.com/matrix-org/matrix-spec/issues/2038))
|
||||||
|
- Clarify formats of string types. ([#2046](https://github.com/matrix-org/matrix-spec/issues/2046))
|
||||||
|
- Fix various typos throughout the specification. ([#2047](https://github.com/matrix-org/matrix-spec/issues/2047), [#2048](https://github.com/matrix-org/matrix-spec/issues/2048), [#2080](https://github.com/matrix-org/matrix-spec/issues/2080), [#2091](https://github.com/matrix-org/matrix-spec/issues/2091))
|
||||||
|
- Document the `instance_id` field of `Protocol Instance` in the responses to `GET /_matrix/client/v3/thirdparty/protocols` and `GET /_matrix/client/v3/thirdparty/protocol/{protocol}`. ([#2051](https://github.com/matrix-org/matrix-spec/issues/2051))
|
||||||
|
- Applying redactions is a SHOULD for clients. ([#2055](https://github.com/matrix-org/matrix-spec/issues/2055))
|
||||||
|
- Clarify which rooms are returned from `/hierarchy`. ([#2064](https://github.com/matrix-org/matrix-spec/issues/2064))
|
||||||
|
- Clients can choose which history visibility options they offer to users when creating rooms. ([#2072](https://github.com/matrix-org/matrix-spec/issues/2072))
|
||||||
|
|
||||||
|
|
||||||
|
## Server-Server API
|
||||||
|
|
||||||
|
**Spec Clarifications**
|
||||||
|
|
||||||
|
- Remove the `origin` field in `PUT /send_join` responses, because it was never sent in the first place. ([#2050](https://github.com/matrix-org/matrix-spec/issues/2050))
|
||||||
|
- Clarify that `m.join_rules` should be in the `auth_events` of an `m.room.member` event with a `membership` of `knock`. ([#2063](https://github.com/matrix-org/matrix-spec/issues/2063))
|
||||||
|
- Remove an erroneous `room_id` field in a few examples. ([#2076](https://github.com/matrix-org/matrix-spec/issues/2076))
|
||||||
|
|
||||||
|
|
||||||
|
## Application Service API
|
||||||
|
|
||||||
|
No significant changes.
|
||||||
|
|
||||||
|
|
||||||
|
## Identity Service API
|
||||||
|
|
||||||
|
No significant changes.
|
||||||
|
|
||||||
|
|
||||||
|
## Push Gateway API
|
||||||
|
|
||||||
|
No significant changes.
|
||||||
|
|
||||||
|
|
||||||
|
## Room Versions
|
||||||
|
|
||||||
|
**Backwards Compatible Changes**
|
||||||
|
|
||||||
|
- Update the default room version to 11, as per [MSC4239](https://github.com/matrix-org/matrix-spec-proposals/pull/4239). ([#2105](https://github.com/matrix-org/matrix-spec/issues/2105))
|
||||||
|
|
||||||
|
**Spec Clarifications**
|
||||||
|
|
||||||
|
- For room versions 6 and 7, clarify in the authorization rules that `m.federate` must be checked and that events with rejected auth events must be rejected, for parity with all the other room versions. ([#2065](https://github.com/matrix-org/matrix-spec/issues/2065))
|
||||||
|
- Fix various typos throughout the specification. ([#2066](https://github.com/matrix-org/matrix-spec/issues/2066))
|
||||||
|
- Refactor PDU definitions to reduce duplication. ([#2070](https://github.com/matrix-org/matrix-spec/issues/2070))
|
||||||
|
- Clarify the maximum `depth` value for room versions 6, 7, 8, 9, 10, and 11. ([#2114](https://github.com/matrix-org/matrix-spec/issues/2114))
|
||||||
|
|
||||||
|
|
||||||
|
## Appendices
|
||||||
|
|
||||||
|
**Spec Clarifications**
|
||||||
|
|
||||||
|
- Clarify that arbitrary unicode is allowed in user/room IDs and room aliases. ([#1506](https://github.com/matrix-org/matrix-spec/issues/1506))
|
||||||
|
|
||||||
|
|
||||||
|
## Internal Changes/Tooling
|
||||||
|
|
||||||
|
**Spec Clarifications**
|
||||||
|
|
||||||
|
- Generate the changelog release info with Hugo, rather than the changelog generation script. ([#2033](https://github.com/matrix-org/matrix-spec/issues/2033))
|
||||||
|
- Update release steps documentation. ([#2041](https://github.com/matrix-org/matrix-spec/issues/2041))
|
||||||
|
- Remove unused `release_date` from Hugo config. ([#2042](https://github.com/matrix-org/matrix-spec/issues/2042))
|
||||||
|
- Clarify that v1.0 of Matrix was a release prior to the current global versioning system. ([#2045](https://github.com/matrix-org/matrix-spec/issues/2045))
|
||||||
|
- Fix syntax highlighting and click-to-copy buttons for code blocks by purging less CSS. ([#2049](https://github.com/matrix-org/matrix-spec/issues/2049))
|
||||||
|
- Fix the version of the Identity Service API when Matrix 1.0 was introduced. ([#2061](https://github.com/matrix-org/matrix-spec/issues/2061))
|
||||||
|
- Fix parsing of nested slices in `resolve-refs` and `resolve-allof` partials. ([#2069](https://github.com/matrix-org/matrix-spec/issues/2069))
|
||||||
|
- Deduplicate the definition of `RoomKeysUpdateResponse`. ([#2073](https://github.com/matrix-org/matrix-spec/issues/2073))
|
||||||
|
- Deduplicate the definitions of `Invite3pid`. ([#2074](https://github.com/matrix-org/matrix-spec/issues/2074))
|
||||||
|
- Support more locations for examples in OpenAPI definitions and JSON schemas. ([#2076](https://github.com/matrix-org/matrix-spec/issues/2076))
|
||||||
|
- Add link to the git commit for the unstable changelog. ([#2078](https://github.com/matrix-org/matrix-spec/issues/2078))
|
||||||
|
|
@ -371,15 +371,23 @@ valid data was obtained, but no server is available to serve the client.
|
||||||
No further guess should be attempted and the user should make a
|
No further guess should be attempted and the user should make a
|
||||||
conscientious decision what to do next.
|
conscientious decision what to do next.
|
||||||
|
|
||||||
### Well-known URI
|
### Well-known URIs
|
||||||
|
|
||||||
|
Matrix facilitates automatic discovery for the Client-Server API base URL and more via the
|
||||||
|
[RFC 8615](https://datatracker.ietf.org/doc/html/rfc8615) "Well-Known URI" method.
|
||||||
|
This method uses JSON files at a predetermined location on the root path `/.well-known/` to
|
||||||
|
specify parameter values.
|
||||||
|
|
||||||
{{% boxes/note %}}
|
{{% boxes/note %}}
|
||||||
|
Diverging from the rest of the endpoints in the Client-Server spec, these files can not be provided
|
||||||
|
on the base URL that the Client-Server API is reachable on, as it is yet to be discovered.
|
||||||
|
Instead, they can be reached via HTTPS on the [server name](/appendices/#server-name)'s hostname as domain.
|
||||||
|
|
||||||
Servers hosting the `.well-known` JSON file SHOULD offer CORS headers,
|
Servers hosting the `.well-known` JSON file SHOULD offer CORS headers,
|
||||||
as per the [CORS](#web-browser-clients) section in this specification.
|
as per the [CORS](#web-browser-clients) section in this specification.
|
||||||
{{% /boxes/note %}}
|
{{% /boxes/note %}}
|
||||||
|
|
||||||
The `.well-known` method uses a JSON file at a predetermined location to
|
The flow for auto-discovery is as follows:
|
||||||
specify parameter values. The flow for this method is as follows:
|
|
||||||
|
|
||||||
1. Extract the [server name](/appendices/#server-name) from the user's Matrix ID by splitting the
|
1. Extract the [server name](/appendices/#server-name) from the user's Matrix ID by splitting the
|
||||||
Matrix ID at the first colon.
|
Matrix ID at the first colon.
|
||||||
|
|
@ -415,16 +423,23 @@ specify parameter values. The flow for this method is as follows:
|
||||||
|
|
||||||
{{% http-api spec="client-server" api="wellknown" %}}
|
{{% http-api spec="client-server" api="wellknown" %}}
|
||||||
|
|
||||||
{{% http-api spec="client-server" api="versions" %}}
|
|
||||||
|
|
||||||
{{% http-api spec="client-server" api="support" %}}
|
{{% http-api spec="client-server" api="support" %}}
|
||||||
|
|
||||||
|
### API Versions
|
||||||
|
|
||||||
|
Upon connecting, the Matrix client and server need to negotiate which version of the specification
|
||||||
|
they commonly support, as the API evolves over time. The server advertises its supported versions
|
||||||
|
and optionally unstable features to the client, which can then go on to make requests to the
|
||||||
|
endpoints it supports.
|
||||||
|
|
||||||
|
{{% http-api spec="client-server" api="versions" %}}
|
||||||
|
|
||||||
## Client Authentication
|
## Client Authentication
|
||||||
|
|
||||||
Most API endpoints require the user to identify themselves by presenting
|
Most API endpoints require the user to identify themselves by presenting
|
||||||
previously obtained credentials in the form of an access token.
|
previously obtained credentials in the form of an access token.
|
||||||
An access token is typically obtained via the [Login](#login) or
|
An access token is typically obtained via the [Login](#login) or
|
||||||
[Registration](#account-registration-and-management) processes. Access tokens
|
[Registration](#account-registration) processes. Access tokens
|
||||||
can expire; a new access token can be generated by using a refresh token.
|
can expire; a new access token can be generated by using a refresh token.
|
||||||
|
|
||||||
{{% boxes/note %}}
|
{{% boxes/note %}}
|
||||||
|
|
@ -479,7 +494,7 @@ used to generate a new access token and refresh token, the new access
|
||||||
and refresh tokens are now bound to the device associated with the
|
and refresh tokens are now bound to the device associated with the
|
||||||
initial refresh token.
|
initial refresh token.
|
||||||
|
|
||||||
By default, the [Login](#login) and [Registration](#account-registration-and-management)
|
By default, the [Login](#login) and [Registration](#account-registration)
|
||||||
processes auto-generate a new `device_id`. A client is also free to
|
processes auto-generate a new `device_id`. A client is also free to
|
||||||
generate its own `device_id` or, provided the user remains the same,
|
generate its own `device_id` or, provided the user remains the same,
|
||||||
reuse a device: in either case the client should pass the `device_id` in
|
reuse a device: in either case the client should pass the `device_id` in
|
||||||
|
|
@ -545,9 +560,11 @@ specifying the device ID it is already using to the login API.
|
||||||
with an `M_USER_LOCKED` error code, cannot obtain a new access token until
|
with an `M_USER_LOCKED` error code, cannot obtain a new access token until
|
||||||
the account has been [unlocked](#account-locking).
|
the account has been [unlocked](#account-locking).
|
||||||
|
|
||||||
### User-Interactive Authentication API
|
### Legacy API
|
||||||
|
|
||||||
#### Overview
|
#### User-Interactive Authentication API
|
||||||
|
|
||||||
|
##### Overview
|
||||||
|
|
||||||
Some API endpoints require authentication that interacts with the user.
|
Some API endpoints require authentication that interacts with the user.
|
||||||
The homeserver may provide many different ways of authenticating, such
|
The homeserver may provide many different ways of authenticating, such
|
||||||
|
|
@ -571,7 +588,7 @@ the flows in order must result in an HTTP 401 response, as defined
|
||||||
below. When all stages in a flow are complete, authentication is
|
below. When all stages in a flow are complete, authentication is
|
||||||
complete and the API call succeeds.
|
complete and the API call succeeds.
|
||||||
|
|
||||||
#### User-interactive API in the REST API
|
##### User-interactive API in the REST API
|
||||||
|
|
||||||
In the REST API described in this specification, authentication works by
|
In the REST API described in this specification, authentication works by
|
||||||
the client and server exchanging JSON dictionaries. The server indicates
|
the client and server exchanging JSON dictionaries. The server indicates
|
||||||
|
|
@ -749,7 +766,7 @@ auth by offering a stage with only the `m.login.dummy` auth type, but they
|
||||||
must still give a 401 response to requests with no auth data.
|
must still give a 401 response to requests with no auth data.
|
||||||
{{% /boxes/note %}}
|
{{% /boxes/note %}}
|
||||||
|
|
||||||
#### Example
|
**Example**
|
||||||
|
|
||||||
At a high level, the requests made for an API call completing an auth
|
At a high level, the requests made for an API call completing an auth
|
||||||
flow with three stages will resemble the following diagram:
|
flow with three stages will resemble the following diagram:
|
||||||
|
|
@ -791,7 +808,7 @@ flow with three stages will resemble the following diagram:
|
||||||
|_______________________|
|
|_______________________|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Authentication types
|
##### Authentication types
|
||||||
|
|
||||||
This specification defines the following auth types:
|
This specification defines the following auth types:
|
||||||
- `m.login.password`
|
- `m.login.password`
|
||||||
|
|
@ -802,7 +819,7 @@ This specification defines the following auth types:
|
||||||
- `m.login.dummy`
|
- `m.login.dummy`
|
||||||
- `m.login.registration_token`
|
- `m.login.registration_token`
|
||||||
|
|
||||||
##### Password-based
|
###### Password-based
|
||||||
|
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|
|
@ -861,7 +878,7 @@ explicitly as follows:
|
||||||
In the case that the homeserver does not know about the supplied 3PID,
|
In the case that the homeserver does not know about the supplied 3PID,
|
||||||
the homeserver must respond with 403 Forbidden.
|
the homeserver must respond with 403 Forbidden.
|
||||||
|
|
||||||
##### Google ReCaptcha
|
###### Google ReCaptcha
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|---------------------|------------------------------------------------------|
|
|---------------------|------------------------------------------------------|
|
||||||
|
|
@ -878,7 +895,7 @@ follows:
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
##### Single Sign-On
|
###### Single Sign-On
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|---------------|--------------------------------------------------------------------------------------|
|
|---------------|--------------------------------------------------------------------------------------|
|
||||||
|
|
@ -888,7 +905,7 @@ A client wanting to complete authentication using SSO should use the
|
||||||
[Fallback](#fallback) mechanism. See [SSO during User-Interactive
|
[Fallback](#fallback) mechanism. See [SSO during User-Interactive
|
||||||
Authentication](#sso-during-user-interactive-authentication) for more information.
|
Authentication](#sso-during-user-interactive-authentication) for more information.
|
||||||
|
|
||||||
##### Email-based (identity / homeserver)
|
###### Email-based (identity / homeserver)
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|--------------------------|------------------------------------------------------------------------------------------------------------------|
|
|--------------------------|------------------------------------------------------------------------------------------------------------------|
|
||||||
|
|
@ -917,7 +934,7 @@ follows:
|
||||||
Note that `id_server` (and therefore `id_access_token`) is optional if
|
Note that `id_server` (and therefore `id_access_token`) is optional if
|
||||||
the [`/requestToken`](#post_matrixclientv3registeremailrequesttoken) request did not include them.
|
the [`/requestToken`](#post_matrixclientv3registeremailrequesttoken) request did not include them.
|
||||||
|
|
||||||
##### Phone number/MSISDN-based (identity / homeserver)
|
###### Phone number/MSISDN-based (identity / homeserver)
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|------------------|----------------------------------------------------------------------------------------------------------------|
|
|------------------|----------------------------------------------------------------------------------------------------------------|
|
||||||
|
|
@ -946,7 +963,7 @@ follows:
|
||||||
Note that `id_server` (and therefore `id_access_token`) is optional if
|
Note that `id_server` (and therefore `id_access_token`) is optional if
|
||||||
the [`/requestToken`](#post_matrixclientv3registermsisdnrequesttoken) request did not include them.
|
the [`/requestToken`](#post_matrixclientv3registermsisdnrequesttoken) request did not include them.
|
||||||
|
|
||||||
##### Dummy Auth
|
###### Dummy Auth
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|------------------|------------------------------------------------------------------------|
|
|------------------|------------------------------------------------------------------------|
|
||||||
|
|
@ -972,7 +989,7 @@ just the type and session, if provided:
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
##### Token-authenticated registration
|
###### Token-authenticated registration
|
||||||
|
|
||||||
{{% added-in v="1.2" %}}
|
{{% added-in v="1.2" %}}
|
||||||
|
|
||||||
|
|
@ -1016,7 +1033,7 @@ in the registration process that their token has expired.
|
||||||
|
|
||||||
{{% http-api spec="client-server" api="registration_tokens" %}}
|
{{% http-api spec="client-server" api="registration_tokens" %}}
|
||||||
|
|
||||||
##### Terms of service at registration
|
###### Terms of service at registration
|
||||||
|
|
||||||
{{% added-in v="1.11" %}}
|
{{% added-in v="1.11" %}}
|
||||||
|
|
||||||
|
|
@ -1139,7 +1156,7 @@ user during registration, if applicable.
|
||||||
|
|
||||||
{{% definition path="api/client-server/definitions/m.login.terms_params" %}}
|
{{% definition path="api/client-server/definitions/m.login.terms_params" %}}
|
||||||
|
|
||||||
#### Fallback
|
##### Fallback
|
||||||
|
|
||||||
Clients cannot be expected to be able to know how to process every
|
Clients cannot be expected to be able to know how to process every
|
||||||
single login type. If a client does not know how to handle a given login
|
single login type. If a client does not know how to handle a given login
|
||||||
|
|
@ -1180,7 +1197,7 @@ with just the session ID:
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
##### Example
|
**Example**
|
||||||
|
|
||||||
A client webapp might use the following JavaScript to open a popup
|
A client webapp might use the following JavaScript to open a popup
|
||||||
window which will handle unknown login types:
|
window which will handle unknown login types:
|
||||||
|
|
@ -1236,7 +1253,7 @@ function unknownLoginType(homeserverUrl, apiEndpoint, loginType, sessionID, onCo
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Identifier types
|
##### Identifier types
|
||||||
|
|
||||||
Some authentication mechanisms use a user identifier object to identify
|
Some authentication mechanisms use a user identifier object to identify
|
||||||
a user. The user identifier object has a `type` field to indicate the
|
a user. The user identifier object has a `type` field to indicate the
|
||||||
|
|
@ -1249,7 +1266,7 @@ This specification defines the following identifier types:
|
||||||
- `m.id.thirdparty`
|
- `m.id.thirdparty`
|
||||||
- `m.id.phone`
|
- `m.id.phone`
|
||||||
|
|
||||||
##### Matrix User ID
|
###### Matrix User ID
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|-------------|--------------------------------------------|
|
|-------------|--------------------------------------------|
|
||||||
|
|
@ -1266,7 +1283,7 @@ ID.
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
##### Third-party ID
|
###### Third-party ID
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|-------------------|---------------------------------------------------------------------------|
|
|-------------------|---------------------------------------------------------------------------|
|
||||||
|
|
@ -1286,7 +1303,7 @@ ID media.
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
##### Phone number
|
###### Phone number
|
||||||
|
|
||||||
| Type | Description |
|
| Type | Description |
|
||||||
|--------------|-------------------------------------------|
|
|--------------|-------------------------------------------|
|
||||||
|
|
@ -1312,7 +1329,7 @@ The `country` is the two-letter uppercase ISO-3166-1 alpha-2 country
|
||||||
code that the number in `phone` should be parsed as if it were dialled
|
code that the number in `phone` should be parsed as if it were dialled
|
||||||
from.
|
from.
|
||||||
|
|
||||||
### Login
|
#### Login
|
||||||
|
|
||||||
A client can obtain access tokens using the [`/login`](#post_matrixclientv3login) API.
|
A client can obtain access tokens using the [`/login`](#post_matrixclientv3login) API.
|
||||||
|
|
||||||
|
|
@ -1384,7 +1401,7 @@ a token for their user ID if supported by the homeserver using
|
||||||
|
|
||||||
{{% http-api spec="client-server" api="logout" %}}
|
{{% http-api spec="client-server" api="logout" %}}
|
||||||
|
|
||||||
#### Appservice Login
|
##### Appservice Login
|
||||||
|
|
||||||
{{% added-in v="1.2" %}}
|
{{% added-in v="1.2" %}}
|
||||||
|
|
||||||
|
|
@ -1421,7 +1438,7 @@ If the access token does correspond to an appservice, but the user id does
|
||||||
not lie within its namespace then the homeserver will respond with an
|
not lie within its namespace then the homeserver will respond with an
|
||||||
errcode of `M_EXCLUSIVE`.
|
errcode of `M_EXCLUSIVE`.
|
||||||
|
|
||||||
#### Login Fallback
|
##### Login Fallback
|
||||||
|
|
||||||
If a client does not recognize any or all login flows it can use the
|
If a client does not recognize any or all login flows it can use the
|
||||||
fallback login API:
|
fallback login API:
|
||||||
|
|
@ -1441,11 +1458,13 @@ forwarded to the login endpoint during the login process. For example:
|
||||||
|
|
||||||
GET /_matrix/static/client/login/?device_id=GHTYAJCE
|
GET /_matrix/static/client/login/?device_id=GHTYAJCE
|
||||||
|
|
||||||
### Account registration and management
|
#### Account registration
|
||||||
|
|
||||||
{{% http-api spec="client-server" api="registration" %}}
|
{{% http-api spec="client-server" api="registration" %}}
|
||||||
|
|
||||||
#### Notes on password management
|
#### Account management
|
||||||
|
|
||||||
|
##### Password management
|
||||||
|
|
||||||
{{% boxes/warning %}}
|
{{% boxes/warning %}}
|
||||||
Clients SHOULD enforce that the password provided is suitably complex.
|
Clients SHOULD enforce that the password provided is suitably complex.
|
||||||
|
|
@ -1454,6 +1473,106 @@ number and a symbol and be at a minimum 8 characters in length. Servers
|
||||||
MAY reject weak passwords with an error code `M_WEAK_PASSWORD`.
|
MAY reject weak passwords with an error code `M_WEAK_PASSWORD`.
|
||||||
{{% /boxes/warning %}}
|
{{% /boxes/warning %}}
|
||||||
|
|
||||||
|
{{% http-api spec="client-server" api="password_management" %}}
|
||||||
|
|
||||||
|
##### Account deactivation
|
||||||
|
|
||||||
|
{{% http-api spec="client-server" api="account_deactivation" %}}
|
||||||
|
|
||||||
|
### OAuth 2.0 API
|
||||||
|
|
||||||
|
#### Scope
|
||||||
|
|
||||||
|
The client requests a scope in the OAuth 2.0 authorization flow, which is then
|
||||||
|
associated to the generated access and refresh tokens. This provides a framework
|
||||||
|
for obtaining user consent.
|
||||||
|
|
||||||
|
A scope is defined in [RFC 6749 section 3.3](https://datatracker.ietf.org/doc/html/rfc6749#section-3.3)
|
||||||
|
as a string containing a list of space-separated scope tokens.
|
||||||
|
|
||||||
|
{{% boxes/note %}}
|
||||||
|
The framework encourages the practice of obtaining additional user consent when
|
||||||
|
a client asks for a new scope that was not granted previously. This could be
|
||||||
|
used by future MSCs to replace the legacy [User-Interactive Authentication API](#user-interactive-authentication-api).
|
||||||
|
{{% /boxes/note %}}
|
||||||
|
|
||||||
|
##### Scope token format
|
||||||
|
|
||||||
|
All scope tokens related to Matrix should start with `urn:matrix:` and use the
|
||||||
|
`:` delimiter for further sub-division.
|
||||||
|
|
||||||
|
Scope tokens related to mapping of Client-Server API access levels should start
|
||||||
|
with `urn:matrix:client:`.
|
||||||
|
|
||||||
|
{{% boxes/note %}}
|
||||||
|
For MSCs that build on this namespace, unstable subdivisions should be used
|
||||||
|
whilst in development. For example, if MSCXXXX wants to introduce the
|
||||||
|
`urn:matrix:client:foo` scope, it could use
|
||||||
|
`urn:matrix:client:com.example.mscXXXX.foo` during development.
|
||||||
|
If it needs to introduce multiple scopes, like `urn:matrix:client:foo` and
|
||||||
|
`urn:matrix:client:bar`, it could use
|
||||||
|
`urn:matrix:client:com.example.mscXXXX:foo` and
|
||||||
|
`urn:matrix:client:com.example.mscXXXX:bar`.
|
||||||
|
{{% /boxes/note %}}
|
||||||
|
|
||||||
|
##### Allocated scope tokens
|
||||||
|
|
||||||
|
This specification defines the following scope tokens:
|
||||||
|
- [`urn:matrix:client:api:*`](#full-client-server-api-readwrite-access)
|
||||||
|
- [`urn:matrix:client:device:<device_id>`](#device-id-allocation)
|
||||||
|
|
||||||
|
###### Full client-server API read/write access
|
||||||
|
|
||||||
|
| Scope | Purpose |
|
||||||
|
|---------------------------|---------------------------------------------|
|
||||||
|
| `urn:matrix:client:api:*` | Grants full access to the Client-Server API. |
|
||||||
|
|
||||||
|
{{% boxes/note %}}
|
||||||
|
This token matches the behavior of the legacy authentication API. Future MSCs
|
||||||
|
could introduce more fine-grained scope tokens like
|
||||||
|
`urn:matrix:client:api:read:*` for read-only access.
|
||||||
|
{{% /boxes/note %}}
|
||||||
|
|
||||||
|
###### Device ID allocation
|
||||||
|
|
||||||
|
| Scope | Purpose |
|
||||||
|
|----------------------------------------|----------------------------------------------------------------------------------------------|
|
||||||
|
| `urn:matrix:client:device:<device_id>` | Allocates the given `device_id` and associates it to the generated access and refresh tokens. |
|
||||||
|
|
||||||
|
Contrary to the legacy login and registration APIs where the homeserver is
|
||||||
|
typically the one generating a `device_id` and providing it to the client, with
|
||||||
|
the OAuth 2.0 API, the client is responsible for allocating the `device_id`.
|
||||||
|
|
||||||
|
There MUST be exactly one `urn:matrix:client:device:<device_id>` token in the
|
||||||
|
requested scope in the login flow.
|
||||||
|
|
||||||
|
When generating a new `device_id`, the client SHOULD generate a random string
|
||||||
|
with enough entropy. It SHOULD only use characters from the unreserved character
|
||||||
|
list defined by [RFC 3986 section 2.3](https://datatracker.ietf.org/doc/html/rfc3986#section-2.3):
|
||||||
|
|
||||||
|
```
|
||||||
|
unreserved = a-z / A-Z / 0-9 / "-" / "." / "_" / "~"
|
||||||
|
```
|
||||||
|
|
||||||
|
Using this alphabet, a 10 character string is enough to stand a sufficient
|
||||||
|
chance of being unique per user. The homeserver MAY reject a request for a
|
||||||
|
`device_id` that is not long enough or contains characters outside the
|
||||||
|
unreserved list.
|
||||||
|
|
||||||
|
In any case it MUST only use characters allowed by the OAuth 2.0 scope
|
||||||
|
definition in [RFC 6749 section 3.3](https://datatracker.ietf.org/doc/html/rfc6749#section-3.3),
|
||||||
|
which is defined as the following ASCII ranges:
|
||||||
|
|
||||||
|
```
|
||||||
|
%x21 / %x23-5B / %x5D-7E
|
||||||
|
```
|
||||||
|
|
||||||
|
This definition matches:
|
||||||
|
- alphanumeric characters: `A-Z`, `a-z`, `0-9`
|
||||||
|
- the following characters: ``! # $ % & ' ( ) * + , - . / : ; < = > ? @ [ ] ^ _ ` { | } ~``
|
||||||
|
|
||||||
|
### Account moderation
|
||||||
|
|
||||||
#### Account locking
|
#### Account locking
|
||||||
|
|
||||||
{{% added-in v="1.12" %}}
|
{{% added-in v="1.12" %}}
|
||||||
|
|
@ -2831,10 +2950,42 @@ re-invited.
|
||||||
|
|
||||||
{{% http-api spec="client-server" api="banning" %}}
|
{{% http-api spec="client-server" api="banning" %}}
|
||||||
|
|
||||||
### Listing rooms
|
### Published room directory
|
||||||
|
|
||||||
|
Homeservers MAY publish a room directory to allow users to discover rooms. A room
|
||||||
|
can have one of two visibility settings in the directory:
|
||||||
|
|
||||||
|
- `public`: The room will be shown in the published room directory.
|
||||||
|
- `private`: The room will be hidden from the published room directory.
|
||||||
|
|
||||||
|
Clients can define a room's initial visibility in the directory via the `visibility`
|
||||||
|
parameter in [`/createRoom`](#post_matrixclientv3createroom). Irrespective of room
|
||||||
|
creation, clients can query and change a room's visibility in the directory through
|
||||||
|
the endpoints listed below, provided that the server permits this.
|
||||||
|
|
||||||
|
{{% boxes/warning %}}
|
||||||
|
The visibility setting merely defines whether a room is included in the published
|
||||||
|
room directory or not. It doesn't make any guarantees about the room's
|
||||||
|
[join rule](#mroomjoin_rules) or [history visibility](#room-history-visibility).
|
||||||
|
|
||||||
|
In particular, a visibility setting of `public` should not be confused with a `public`
|
||||||
|
join rule. Rooms with a join rule of `knock`, for instance, could reasonably be published
|
||||||
|
in the directory, too.
|
||||||
|
|
||||||
|
Similarly, a visibility setting of `public` does not necessarily imply a `world_readable`
|
||||||
|
history visibility.
|
||||||
|
|
||||||
|
To increase performance or by preference, servers MAY apply additional filters when listing the
|
||||||
|
directory, for instance, by automatically excluding rooms with `invite` join rules
|
||||||
|
that are not `world_readable` regardless of their visibility.
|
||||||
|
{{% /boxes/warning %}}
|
||||||
|
|
||||||
{{% http-api spec="client-server" api="list_public_rooms" %}}
|
{{% http-api spec="client-server" api="list_public_rooms" %}}
|
||||||
|
|
||||||
|
### Room Summaries
|
||||||
|
|
||||||
|
{{% http-api spec="client-server" api="room_summary" %}}
|
||||||
|
|
||||||
## User Data
|
## User Data
|
||||||
|
|
||||||
### User Directory
|
### User Directory
|
||||||
|
|
@ -2847,10 +2998,15 @@ re-invited.
|
||||||
|
|
||||||
#### Server behaviour
|
#### Server behaviour
|
||||||
|
|
||||||
Homeservers MUST at a minimum allow profile look-up for:
|
Homeservers MUST at a minimum allow profile look-up for users who are
|
||||||
|
visible to the requester based on their membership in rooms known to the
|
||||||
|
homeserver. This means:
|
||||||
|
|
||||||
- users that share a room with the requesting user
|
- users that share a room with the requesting user
|
||||||
- users that reside in public rooms known to the homeserver
|
- users who are joined to rooms known to the homeserver that have a
|
||||||
|
`public` [join rule](#mroomjoin_rules)
|
||||||
|
- users who are joined to rooms known to the homeserver that have a
|
||||||
|
`world_readable` [history visibility](#room-history-visibility)
|
||||||
|
|
||||||
In all other cases, homeservers MAY deny profile look-up by responding with
|
In all other cases, homeservers MAY deny profile look-up by responding with
|
||||||
403 and an error code of `M_FORBIDDEN`.
|
403 and an error code of `M_FORBIDDEN`.
|
||||||
|
|
|
||||||
|
|
@ -528,7 +528,7 @@ messages, Alice only sends one request event (an event with type
|
||||||
`m.room.message` with `msgtype: m.key.verification.request`, rather than an
|
`m.room.message` with `msgtype: m.key.verification.request`, rather than an
|
||||||
event with type `m.key.verification.request`), to the room. In addition, Alice
|
event with type `m.key.verification.request`), to the room. In addition, Alice
|
||||||
does not send an `m.key.verification.cancel` event to tell Bob's other devices
|
does not send an `m.key.verification.cancel` event to tell Bob's other devices
|
||||||
that the request as already been accepted; instead, when Bob's other devices
|
that the request has already been accepted; instead, when Bob's other devices
|
||||||
see his `m.key.verification.ready` event, they will know that the request has
|
see his `m.key.verification.ready` event, they will know that the request has
|
||||||
already been accepted, and that they should ignore the request.
|
already been accepted, and that they should ignore the request.
|
||||||
|
|
||||||
|
|
@ -1512,40 +1512,11 @@ message.
|
||||||
|
|
||||||
The plaintext payload is of the form:
|
The plaintext payload is of the form:
|
||||||
|
|
||||||
```json
|
{{% definition path="api/client-server/definitions/olm_payload" %}}
|
||||||
{
|
|
||||||
"type": "<type of the plaintext event>",
|
|
||||||
"content": "<content for the plaintext event>",
|
|
||||||
"sender": "<sender_user_id>",
|
|
||||||
"recipient": "<recipient_user_id>",
|
|
||||||
"recipient_keys": {
|
|
||||||
"ed25519": "<our_ed25519_key>"
|
|
||||||
},
|
|
||||||
"keys": {
|
|
||||||
"ed25519": "<sender_ed25519_key>"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
The type and content of the plaintext message event are given in the
|
The type and content of the plaintext message event are given in the
|
||||||
payload.
|
payload.
|
||||||
|
|
||||||
Other properties are included in order to prevent an attacker from
|
|
||||||
publishing someone else's curve25519 keys as their own and subsequently
|
|
||||||
claiming to have sent messages which they didn't. `sender` must
|
|
||||||
correspond to the user who sent the event, `recipient` to the local
|
|
||||||
user, and `recipient_keys` to the local ed25519 key.
|
|
||||||
|
|
||||||
Clients must confirm that the `sender_key` property in the cleartext
|
|
||||||
`m.room.encrypted` event body, and the `keys.ed25519` property in the
|
|
||||||
decrypted plaintext, match the keys returned by
|
|
||||||
[`/keys/query`](#post_matrixclientv3keysquery) for
|
|
||||||
the given user. Clients must also verify the signature of the keys from the
|
|
||||||
`/keys/query` response. Without this check, a client cannot be sure that
|
|
||||||
the sender device owns the private part of the ed25519 key it claims to
|
|
||||||
have in the Olm payload. This is crucial when the ed25519 key corresponds
|
|
||||||
to a verified device.
|
|
||||||
|
|
||||||
If a client has multiple sessions established with another device, it
|
If a client has multiple sessions established with another device, it
|
||||||
should use the session from which it last received and successfully
|
should use the session from which it last received and successfully
|
||||||
decrypted a message. For these purposes, a session that has not received
|
decrypted a message. For these purposes, a session that has not received
|
||||||
|
|
@ -1555,6 +1526,68 @@ maximum number of olm sessions that it will maintain for each device,
|
||||||
and expiring sessions on a Least Recently Used basis. The maximum number
|
and expiring sessions on a Least Recently Used basis. The maximum number
|
||||||
of olm sessions maintained per device should be at least 4.
|
of olm sessions maintained per device should be at least 4.
|
||||||
|
|
||||||
|
###### Validation of incoming decrypted events
|
||||||
|
|
||||||
|
{{% changed-in v="1.15" %}} Existing checks made more explicit, and checks for `sender_device_keys` added.
|
||||||
|
|
||||||
|
After decrypting an incoming encrypted event, clients MUST apply the
|
||||||
|
following checks:
|
||||||
|
|
||||||
|
1. The `sender` property in the decrypted content must match the
|
||||||
|
`sender` of the event.
|
||||||
|
2. The `keys.ed25519` property in the decrypted content must match
|
||||||
|
the `sender_key` property in the cleartext `m.room.encrypted`
|
||||||
|
event body.
|
||||||
|
3. The `recipient` property in the decrypted content must match
|
||||||
|
the user ID of the local user.
|
||||||
|
4. The `recipient_keys.ed25519` property in the decrypted content
|
||||||
|
must match the client device's [Ed25519 signing key](#device-keys).
|
||||||
|
5. Where `sender_device_keys` is present in the decrypted content:
|
||||||
|
1. `sender_device_keys.user_id` must also match the `sender`
|
||||||
|
of the event.
|
||||||
|
2. `sender_device_keys.keys.ed25519:<device_id>` must also match
|
||||||
|
the `sender_key` property in the cleartext `m.room.encrypted`
|
||||||
|
event body.
|
||||||
|
3. `sender_device_keys.keys.curve25519:<device_id>` must match
|
||||||
|
the Curve25519 key used to establish the Olm session.
|
||||||
|
4. The `sender_device_keys` structure must have a valid signature
|
||||||
|
from the key with ID `ed25519:<device_id>` (i.e., the sending
|
||||||
|
device's Ed25519 key).
|
||||||
|
|
||||||
|
Any event that does not comply with these checks MUST be discarded.
|
||||||
|
|
||||||
|
###### Verification of the sending user for incoming events
|
||||||
|
|
||||||
|
{{% added-in v="1.15" %}}
|
||||||
|
|
||||||
|
In addition, for each Olm session, clients MUST verify that the
|
||||||
|
Curve25519 key used to establish the Olm session does indeed belong
|
||||||
|
to the claimed `sender`. This requires a signed "device keys" structure
|
||||||
|
for that Curve25519 key, which can be obtained in one of two ways:
|
||||||
|
|
||||||
|
1. An Olm message may be received with a `sender_device_keys` property
|
||||||
|
in the decrypted content.
|
||||||
|
2. The keys are returned via a [`/keys/query`](#post_matrixclientv3keysquery)
|
||||||
|
request. Note that both the Curve25519 key **and** the Ed25519 key in
|
||||||
|
the returned device keys structure must match those used in an
|
||||||
|
Olm-encrypted event as above. (In particular, the Ed25519 key must
|
||||||
|
be present in the **encrypted** content of an Olm-encrypted event
|
||||||
|
to prevent an attacker from claiming another user's Curve25519 key
|
||||||
|
as their own.)
|
||||||
|
|
||||||
|
Ownership of the Curve25519 key is then established in one of two ways:
|
||||||
|
|
||||||
|
1. Via [cross-signing](#cross-signing). For this to be sufficient, the
|
||||||
|
device keys structure must be signed by the sender's self-signing key,
|
||||||
|
and that self-signing key must itself have been validated (either via
|
||||||
|
[explicit verification](#device-verification) or a "trust on first use" (TOFU) mechanism).
|
||||||
|
2. Via explicit verification of the device's Ed25519 signing key, as
|
||||||
|
contained in the device keys structure. This is no longer recommended.
|
||||||
|
|
||||||
|
A failure to complete these verifications does not necessarily mean that
|
||||||
|
the session is bogus; however it is the case that there is no proof that
|
||||||
|
the claimed sender is accurate, and the user should be warned accordingly.
|
||||||
|
|
||||||
###### Recovering from undecryptable messages
|
###### Recovering from undecryptable messages
|
||||||
|
|
||||||
Occasionally messages may be undecryptable by clients due to a variety
|
Occasionally messages may be undecryptable by clients due to a variety
|
||||||
|
|
|
||||||
|
|
@ -43,11 +43,8 @@ setting at that time was more restrictive.
|
||||||
|
|
||||||
#### Client behaviour
|
#### Client behaviour
|
||||||
|
|
||||||
Clients that implement this module MUST present to the user the possible
|
Clients may want to display a notice that events may be read by
|
||||||
options for setting history visibility when creating a room.
|
non-joined people if the history visibility is set to `world_readable`.
|
||||||
|
|
||||||
Clients may want to display a notice that their events may be read by
|
|
||||||
non-joined people if the value is set to `world_readable`.
|
|
||||||
|
|
||||||
#### Server behaviour
|
#### Server behaviour
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -18,8 +18,9 @@ the entity making the decisions on filtering is best positioned to
|
||||||
interpret the rules how it sees fit.
|
interpret the rules how it sees fit.
|
||||||
|
|
||||||
Moderation policy lists are stored as room state events. There are no
|
Moderation policy lists are stored as room state events. There are no
|
||||||
restrictions on how the rooms can be configured (they could be public,
|
restrictions on how the rooms can be configured in terms of
|
||||||
private, encrypted, etc).
|
[join rules](#mroomjoin_rules), [history visibility](#room-history-visibility),
|
||||||
|
encryption, etc.
|
||||||
|
|
||||||
There are currently 3 kinds of entities which can be affected by rules:
|
There are currently 3 kinds of entities which can be affected by rules:
|
||||||
`user`, `server`, and `room`. All 3 are described with
|
`user`, `server`, and `room`. All 3 are described with
|
||||||
|
|
|
||||||
|
|
@ -68,5 +68,7 @@ will cause the server to automatically set their presence to `online`.
|
||||||
|
|
||||||
#### Security considerations
|
#### Security considerations
|
||||||
|
|
||||||
Presence information is shared with all users who share a room with the
|
Presence information is published to all users who share a room with the
|
||||||
target user. In large public rooms this could be undesirable.
|
target user. If the target user is a member of a room with a `public`
|
||||||
|
[join rule](#mroomjoin_rules), any other user in the federation is
|
||||||
|
able to gain access to the target user's presence. This could be undesirable.
|
||||||
|
|
|
||||||
|
|
@ -29,3 +29,9 @@ is in before accepting a report.
|
||||||
based on whether or not the reporting user is joined to the room. This is
|
based on whether or not the reporting user is joined to the room. This is
|
||||||
because users can be exposed to harmful content without being joined to a
|
because users can be exposed to harmful content without being joined to a
|
||||||
room. For instance, through room directories or invites.
|
room. For instance, through room directories or invites.
|
||||||
|
|
||||||
|
{{% added-in v="1.14" %}} Similarly, servers MUST NOT restrict user reports
|
||||||
|
based on whether or not the reporting user is joined to any rooms that the
|
||||||
|
reported user is joined to. This is because users can be exposed to harmful
|
||||||
|
content without being joined to a room. For instance, through user
|
||||||
|
directories or invites.
|
||||||
|
|
|
||||||
|
|
@ -26,9 +26,10 @@ on certain keys of certain event types.
|
||||||
|
|
||||||
The supported keys to search over are:
|
The supported keys to search over are:
|
||||||
|
|
||||||
- `content.body` in `m.room.message`
|
- `content.body` in [`m.room.message`](/client-server-api/#mroommessage)
|
||||||
- `content.name` in `m.room.name`
|
- `content.name` in [`m.room.name`](/client-server-api/#mroomname)
|
||||||
- `content.topic` in `m.room.topic`
|
- In [`m.room.topic`](/client-server-api/#mroomtopic), `content.topic`
|
||||||
|
as well as the `body` of the `text/plain` representation in `content['m.topic']`.
|
||||||
|
|
||||||
The search will *not* include rooms that are end to end encrypted.
|
The search will *not* include rooms that are end to end encrypted.
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -58,7 +58,7 @@ available on all their clients. Unless the user specifies otherwise,
|
||||||
clients will try to use the default key to decrypt secrets.
|
clients will try to use the default key to decrypt secrets.
|
||||||
|
|
||||||
Clients that want to present a simplified interface to users by not supporting
|
Clients that want to present a simplified interface to users by not supporting
|
||||||
multiple keys should use the default key if one is specified. If not default
|
multiple keys should use the default key if one is specified. If no default
|
||||||
key is specified, the client may behave as if there is no key is present at
|
key is specified, the client may behave as if there is no key is present at
|
||||||
all. When such a client creates a key, it should mark that key as being the
|
all. When such a client creates a key, it should mark that key as being the
|
||||||
default key.
|
default key.
|
||||||
|
|
|
||||||
|
|
@ -2,8 +2,8 @@
|
||||||
|
|
||||||
{{% added-in v="1.2" %}}
|
{{% added-in v="1.2" %}}
|
||||||
|
|
||||||
Often used to group rooms of similar subject matter (such as a public "Official
|
Often used to group rooms of similar subject matter (such as an "Official
|
||||||
matrix.org rooms" space or personal "Work stuff" space), spaces are a way to
|
matrix.org rooms" space or a "Work stuff" space), spaces are a way to
|
||||||
organise rooms while being represented as rooms themselves.
|
organise rooms while being represented as rooms themselves.
|
||||||
|
|
||||||
A space is defined by the [`m.space` room type](#types), making it known as a
|
A space is defined by the [`m.space` room type](#types), making it known as a
|
||||||
|
|
@ -18,11 +18,11 @@ In the default power level structure, this would be `100`. Clients might wish to
|
||||||
go a step further and explicitly ignore notification counts on space-rooms.
|
go a step further and explicitly ignore notification counts on space-rooms.
|
||||||
|
|
||||||
Membership of a space is defined and controlled by the existing mechanisms which
|
Membership of a space is defined and controlled by the existing mechanisms which
|
||||||
govern a room: [`m.room.member`](#mroommember), [`m.room.history_visibility`](#mroomhistory_visibility),
|
govern a room: [`m.room.member`](/client-server-api#mroommember), [`m.room.history_visibility`](/client-server-api#mroomhistory_visibility),
|
||||||
and [`m.room.join_rules`](#mroomjoin_rules). Public spaces are encouraged to have
|
and [`m.room.join_rules`](/client-server-api#mroomjoin_rules). Canonical aliases and invites, including
|
||||||
a similar setup to public rooms: `world_readable` history visibility, published
|
third-party invites, still work just as they do in normal rooms as well. Furthermore,
|
||||||
canonical alias, and suitably public `join_rule`. Invites, including third-party
|
spaces can also be published in the [room directory](/client-server-api#published-room-directory) to make them
|
||||||
invites, still work just as they do in normal rooms as well.
|
discoverable.
|
||||||
|
|
||||||
All other aspects of regular rooms are additionally carried over, such as the
|
All other aspects of regular rooms are additionally carried over, such as the
|
||||||
ability to set arbitrary state events, hold room account data, etc. Spaces are
|
ability to set arbitrary state events, hold room account data, etc. Spaces are
|
||||||
|
|
@ -87,10 +87,9 @@ the state of `#space:example.org` would consist of:
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
No state events in the child rooms themselves would be required (though they
|
No state events in the child rooms themselves would be required (though they can also
|
||||||
can also be present). This allows for users
|
be present). This allows for users to define spaces without needing explicit permission
|
||||||
to define personal/private spaces to organise their own rooms without needing explicit
|
from the room moderators/admins.
|
||||||
permission from the room moderators/admins.
|
|
||||||
|
|
||||||
Child rooms can be removed from a space by omitting the `via` key of `content` on the
|
Child rooms can be removed from a space by omitting the `via` key of `content` on the
|
||||||
relevant state event, such as through redaction or otherwise clearing the `content`.
|
relevant state event, such as through redaction or otherwise clearing the `content`.
|
||||||
|
|
|
||||||
|
|
@ -5,8 +5,8 @@ This module adds in support for inviting new members to a room where
|
||||||
their Matrix user ID is not known, instead addressing them by a third-party
|
their Matrix user ID is not known, instead addressing them by a third-party
|
||||||
identifier such as an email address. There are two flows here; one
|
identifier such as an email address. There are two flows here; one
|
||||||
if a Matrix user ID is known for the third-party identifier, and one if
|
if a Matrix user ID is known for the third-party identifier, and one if
|
||||||
not. Either way, the client calls [`/invite`](#post_matrixclientv3roomsroomidinvite) with the details of the
|
not. Either way, the client calls [`/invite`](#thirdparty_post_matrixclientv3roomsroomidinvite)
|
||||||
third-party identifier.
|
with the details of the third-party identifier.
|
||||||
|
|
||||||
The homeserver asks the identity server whether a Matrix user ID is
|
The homeserver asks the identity server whether a Matrix user ID is
|
||||||
known for that identifier:
|
known for that identifier:
|
||||||
|
|
@ -37,10 +37,12 @@ A client asks a server to invite a user by their third-party identifier.
|
||||||
|
|
||||||
#### Server behaviour
|
#### Server behaviour
|
||||||
|
|
||||||
Upon receipt of an [`/invite`](#post_matrixclientv3roomsroomidinvite), the server is expected to look up the
|
Upon receipt of an [`/invite`](#thirdparty_post_matrixclientv3roomsroomidinvite),
|
||||||
third-party identifier with the provided identity server. If the lookup
|
the server is expected to look up the third-party identifier with the provided
|
||||||
yields a result for a Matrix User ID then the normal invite process can
|
identity server by making a call to [`/_matrix/identity/v2/lookup`](/identity-service-api/#post_matrixidentityv2lookup).
|
||||||
be initiated. This process ends up looking like this:
|
If the lookup yields a result for a Matrix User ID then the normal [invite
|
||||||
|
process](/server-server-api/#inviting-to-a-room) can be initiated. This process
|
||||||
|
ends up looking like this:
|
||||||
|
|
||||||
```
|
```
|
||||||
+---------+ +-------------+ +-----------------+
|
+---------+ +-------------+ +-----------------+
|
||||||
|
|
@ -66,10 +68,11 @@ be initiated. This process ends up looking like this:
|
||||||
| | |
|
| | |
|
||||||
```
|
```
|
||||||
|
|
||||||
However, if the lookup does not yield a bound User ID, the homeserver
|
However, if the lookup does not yield a bound User ID, the homeserver must store
|
||||||
must store the invite on the identity server and emit a valid
|
the invite on the identity server with a call to
|
||||||
`m.room.third_party_invite` event to the room. This process ends up
|
[`/_matrix/identity/v2/store-invite`](/identity-service-api/#post_matrixidentityv2store-invite)
|
||||||
looking like this:
|
and emit a valid [`m.room.third_party_invite`](#mroomthird_party_invite) event
|
||||||
|
to the room. This process ends up looking like this:
|
||||||
|
|
||||||
```
|
```
|
||||||
+---------+ +-------------+ +-----------------+
|
+---------+ +-------------+ +-----------------+
|
||||||
|
|
@ -101,15 +104,18 @@ looking like this:
|
||||||
| | |
|
| | |
|
||||||
```
|
```
|
||||||
|
|
||||||
All homeservers MUST verify the signature in the event's
|
The third-party user will then need to verify their identity, which results in a
|
||||||
`content.third_party_invite.signed` object.
|
request to [`/_matrix/federation/v1/3pid/onbind`](/server-server-api/#put_matrixfederationv13pidonbind)
|
||||||
|
from the identity server to the homeserver that bound the third-party identifier
|
||||||
|
to a user. The homeserver then exchanges the `m.room.third_party_invite` event
|
||||||
|
in the room for a complete [`m.room.member`](#mroommember) event with
|
||||||
|
`content.membership: invite` and a `content.third_party_invite` property for the
|
||||||
|
user that has bound the third-party identifier. If the invitee is on a different
|
||||||
|
homeserver than the inviting user, the invitee's homeserver makes a request to
|
||||||
|
[`/_matrix/federation/v1/exchange_third_party_invite/{roomId}`](/server-server-api/#put_matrixfederationv1exchange_third_party_inviteroomid).
|
||||||
|
|
||||||
The third-party user will then need to verify their identity, which
|
All homeservers MUST verify the signature in the `m.room.member` event's
|
||||||
results in a call from the identity server to the homeserver that bound
|
`content.third_party_invite.signed` object.
|
||||||
the third-party identifier to a user. The homeserver then exchanges the
|
|
||||||
`m.room.third_party_invite` event in the room for a complete
|
|
||||||
`m.room.member` event for `membership: invite` for the user that has
|
|
||||||
bound the third-party identifier.
|
|
||||||
|
|
||||||
If a homeserver is joining a room for the first time because of an
|
If a homeserver is joining a room for the first time because of an
|
||||||
`m.room.third_party_invite`, the server which is already participating
|
`m.room.third_party_invite`, the server which is already participating
|
||||||
|
|
@ -193,8 +199,8 @@ at any time - the completion is not shown in the diagram.
|
||||||
|
|
||||||
H1 MUST verify the request from H3 to ensure the `signed` property is
|
H1 MUST verify the request from H3 to ensure the `signed` property is
|
||||||
correct as well as the `key_validity_url` as still being valid. This is
|
correct as well as the `key_validity_url` as still being valid. This is
|
||||||
done by making a request to the [identity server
|
done by making a request to the identity server's
|
||||||
/isvalid](/identity-service-api/#get_matrixidentityv2pubkeyisvalid)
|
[`/pubkey/isvalid`](/identity-service-api/#get_matrixidentityv2pubkeyisvalid)
|
||||||
endpoint, using the provided URL rather than constructing a new one. The
|
endpoint, using the provided URL rather than constructing a new one. The
|
||||||
query string and response for the provided URL must match the Identity
|
query string and response for the provided URL must match the Identity
|
||||||
Service Specification.
|
Service Specification.
|
||||||
|
|
|
||||||
|
|
@ -202,11 +202,13 @@ specific user, and should be set to the Matrix user ID of that user. Invites
|
||||||
without an `invitee` field are defined to be intended for any member of the
|
without an `invitee` field are defined to be intended for any member of the
|
||||||
room other than the sender of the event.
|
room other than the sender of the event.
|
||||||
|
|
||||||
Clients should consider an incoming call if they see a non-expired invite event where the `invitee` field is either
|
Clients should consider an incoming call if they see a non-expired invite event
|
||||||
absent or equal to their user's Matrix ID, however they should evaluate whether or not to ring based on their
|
where the `invitee` field is either absent or equal to their user's Matrix ID.
|
||||||
user's trust relationship with the callers and/or where the call was placed. As a starting point, it is
|
They should, however, evaluate whether or not to ring based on their user's trust
|
||||||
suggested that clients ignore call invites from users in public rooms. It is strongly recommended that
|
relationship with the callers and/or where the call was placed. As a starting
|
||||||
when clients do not ring for an incoming call invite, they still display the call invite in the room and
|
point, it is RECOMMENDED that clients ignore call invites in rooms with a
|
||||||
|
[join rule](#mroomjoin_rules) of `public`. When clients suppress ringing for an
|
||||||
|
incoming call invite, they SHOULD still display the call invite in the room and
|
||||||
annotate that it was ignored.
|
annotate that it was ignored.
|
||||||
|
|
||||||
##### Glare
|
##### Glare
|
||||||
|
|
|
||||||
|
|
@ -52,7 +52,7 @@ stable and unstable periodically for a variety of reasons, including
|
||||||
discovered security vulnerabilities and age.
|
discovered security vulnerabilities and age.
|
||||||
|
|
||||||
Clients should not ask room administrators to upgrade their rooms if the
|
Clients should not ask room administrators to upgrade their rooms if the
|
||||||
room is running a stable version. Servers SHOULD use **room version 10** as
|
room is running a stable version. Servers SHOULD use **room version 11** as
|
||||||
the default room version when creating new rooms.
|
the default room version when creating new rooms.
|
||||||
|
|
||||||
The available room versions are:
|
The available room versions are:
|
||||||
|
|
|
||||||
4
content/rooms/fragments/v6-event-format.md
Normal file
4
content/rooms/fragments/v6-event-format.md
Normal file
|
|
@ -0,0 +1,4 @@
|
||||||
|
|
||||||
|
Events in rooms of this version have the following structure:
|
||||||
|
|
||||||
|
{{% definition path="api/server-server/definitions/pdu_v6" %}}
|
||||||
|
|
@ -51,7 +51,7 @@ inconsistencies may occur.
|
||||||
|
|
||||||
Events in version 1 rooms have the following structure:
|
Events in version 1 rooms have the following structure:
|
||||||
|
|
||||||
{{% definition path="api/server-server/definitions/pdu" %}}
|
{{% definition path="api/server-server/definitions/pdu_v1" %}}
|
||||||
|
|
||||||
#### Deprecated event content schemas
|
#### Deprecated event content schemas
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -281,7 +281,7 @@ completeness.
|
||||||
|
|
||||||
### Event format
|
### Event format
|
||||||
|
|
||||||
{{% rver-fragment name="v4-event-format" %}}
|
{{% rver-fragment name="v6-event-format" %}}
|
||||||
|
|
||||||
### State resolution
|
### State resolution
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -49,7 +49,7 @@ completeness.
|
||||||
|
|
||||||
Events in rooms of this version have the following structure:
|
Events in rooms of this version have the following structure:
|
||||||
|
|
||||||
{{% definition path="api/server-server/definitions/pdu" %}}
|
{{% definition path="api/server-server/definitions/pdu_v1" %}}
|
||||||
|
|
||||||
#### Deprecated event content schemas
|
#### Deprecated event content schemas
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -39,6 +39,13 @@ in [room version 5](/rooms/v5).
|
||||||
|
|
||||||
[See above](#redactions).
|
[See above](#redactions).
|
||||||
|
|
||||||
|
### Event format
|
||||||
|
|
||||||
|
{{% added-in v=6 %}} Through enforcement of [Canonical JSON](#canonical-json),
|
||||||
|
the `depth` limit has been reduced in this room version.
|
||||||
|
|
||||||
|
{{% rver-fragment name="v6-event-format" %}}
|
||||||
|
|
||||||
### Authorization rules
|
### Authorization rules
|
||||||
|
|
||||||
{{% added-in v=6 %}} Rule 4, which related specifically to events
|
{{% added-in v=6 %}} Rule 4, which related specifically to events
|
||||||
|
|
@ -88,14 +95,20 @@ The rules are as follows:
|
||||||
version, reject.
|
version, reject.
|
||||||
4. If `content` has no `creator` property, reject.
|
4. If `content` has no `creator` property, reject.
|
||||||
5. Otherwise, allow.
|
5. Otherwise, allow.
|
||||||
2. Reject if event has `auth_events` that:
|
2. Considering the event's `auth_events`:
|
||||||
1. have duplicate entries for a given `type` and `state_key` pair
|
1. If there are duplicate entries for a given `type` and `state_key` pair,
|
||||||
2. have entries whose `type` and `state_key` don't match those
|
reject.
|
||||||
|
2. If there are entries whose `type` and `state_key` don't match those
|
||||||
specified by the [auth events
|
specified by the [auth events
|
||||||
selection](/server-server-api#auth-events-selection)
|
selection](/server-server-api#auth-events-selection)
|
||||||
algorithm described in the server specification.
|
algorithm described in the server specification, reject.
|
||||||
3. If event does not have a `m.room.create` in its `auth_events`,
|
3. If there are entries which were themselves rejected under the [checks
|
||||||
reject.
|
performed on receipt of a
|
||||||
|
PDU](/server-server-api/#checks-performed-on-receipt-of-a-pdu), reject.
|
||||||
|
4. If there is no `m.room.create` event among the entries, reject.
|
||||||
|
3. If the `content` of the `m.room.create` event in the room state has the
|
||||||
|
property `m.federate` set to `false`, and the `sender` domain of the event
|
||||||
|
does not match the `sender` domain of the create event, reject.
|
||||||
4. If type is `m.room.member`:
|
4. If type is `m.room.member`:
|
||||||
1. If there is no `state_key` property, or no `membership` property in
|
1. If there is no `state_key` property, or no `membership` property in
|
||||||
`content`, reject.
|
`content`, reject.
|
||||||
|
|
@ -223,10 +236,6 @@ completeness.
|
||||||
|
|
||||||
{{% rver-fragment name="v4-event-ids" %}}
|
{{% rver-fragment name="v4-event-ids" %}}
|
||||||
|
|
||||||
### Event format
|
|
||||||
|
|
||||||
{{% rver-fragment name="v4-event-format" %}}
|
|
||||||
|
|
||||||
#### Deprecated event content schemas
|
#### Deprecated event content schemas
|
||||||
|
|
||||||
{{% rver-fragment name="v1-deprecated-formatting-off-spec" %}}
|
{{% rver-fragment name="v1-deprecated-formatting-off-spec" %}}
|
||||||
|
|
|
||||||
|
|
@ -74,14 +74,20 @@ The rules are as follows:
|
||||||
version, reject.
|
version, reject.
|
||||||
4. If `content` has no `creator` property, reject.
|
4. If `content` has no `creator` property, reject.
|
||||||
5. Otherwise, allow.
|
5. Otherwise, allow.
|
||||||
2. Reject if event has `auth_events` that:
|
2. Considering the event's `auth_events`:
|
||||||
1. have duplicate entries for a given `type` and `state_key` pair
|
1. If there are duplicate entries for a given `type` and `state_key` pair,
|
||||||
2. have entries whose `type` and `state_key` don't match those
|
reject.
|
||||||
|
2. If there are entries whose `type` and `state_key` don't match those
|
||||||
specified by the [auth events
|
specified by the [auth events
|
||||||
selection](/server-server-api#auth-events-selection)
|
selection](/server-server-api#auth-events-selection)
|
||||||
algorithm described in the server specification.
|
algorithm described in the server specification, reject.
|
||||||
3. If event does not have a `m.room.create` in its `auth_events`,
|
3. If there are entries which were themselves rejected under the [checks
|
||||||
reject.
|
performed on receipt of a
|
||||||
|
PDU](/server-server-api/#checks-performed-on-receipt-of-a-pdu), reject.
|
||||||
|
4. If there is no `m.room.create` event among the entries, reject.
|
||||||
|
3. If the `content` of the `m.room.create` event in the room state has the
|
||||||
|
property `m.federate` set to `false`, and the `sender` domain of the event
|
||||||
|
does not match the `sender` domain of the create event, reject.
|
||||||
4. If type is `m.room.member`:
|
4. If type is `m.room.member`:
|
||||||
1. If there is no `state_key` property, or no `membership` property in
|
1. If there is no `state_key` property, or no `membership` property in
|
||||||
`content`, reject.
|
`content`, reject.
|
||||||
|
|
@ -219,7 +225,7 @@ completeness.
|
||||||
|
|
||||||
### Event format
|
### Event format
|
||||||
|
|
||||||
{{% rver-fragment name="v4-event-format" %}}
|
{{% rver-fragment name="v6-event-format" %}}
|
||||||
|
|
||||||
#### Deprecated event content schemas
|
#### Deprecated event content schemas
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -109,7 +109,7 @@ completeness.
|
||||||
|
|
||||||
### Event format
|
### Event format
|
||||||
|
|
||||||
{{% rver-fragment name="v4-event-format" %}}
|
{{% rver-fragment name="v6-event-format" %}}
|
||||||
|
|
||||||
#### Deprecated event content schemas
|
#### Deprecated event content schemas
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -74,7 +74,7 @@ completeness.
|
||||||
|
|
||||||
### Event format
|
### Event format
|
||||||
|
|
||||||
{{% rver-fragment name="v4-event-format" %}}
|
{{% rver-fragment name="v6-event-format" %}}
|
||||||
|
|
||||||
#### Deprecated event content schemas
|
#### Deprecated event content schemas
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -119,7 +119,8 @@ to send. The process overall is as follows:
|
||||||
server must present a valid certificate for the hostname.
|
server must present a valid certificate for the hostname.
|
||||||
|
|
||||||
3. If the hostname is not an IP literal, a regular HTTPS request is
|
3. If the hostname is not an IP literal, a regular HTTPS request is
|
||||||
made to `https://<hostname>/.well-known/matrix/server`, expecting
|
made to `https://<hostname>/.well-known/matrix/server` (according to
|
||||||
|
[RFC 8615](https://datatracker.ietf.org/doc/html/rfc8615)), expecting
|
||||||
the schema defined later in this section. 30x redirects should be
|
the schema defined later in this section. 30x redirects should be
|
||||||
followed, however redirection loops should be avoided. Responses
|
followed, however redirection loops should be avoided. Responses
|
||||||
(successful or otherwise) to the `/.well-known` endpoint should be
|
(successful or otherwise) to the `/.well-known` endpoint should be
|
||||||
|
|
@ -537,14 +538,14 @@ the following subset of the room state:
|
||||||
- If type is `m.room.member`:
|
- If type is `m.room.member`:
|
||||||
|
|
||||||
- The target's current `m.room.member` event, if any.
|
- The target's current `m.room.member` event, if any.
|
||||||
- If `membership` is `join` or `invite`, the current
|
- If `membership` is `join`, `invite` or `knock`, the current
|
||||||
`m.room.join_rules` event, if any.
|
`m.room.join_rules` event, if any.
|
||||||
- If membership is `invite` and `content` contains a
|
- If membership is `invite` and `content` contains a
|
||||||
`third_party_invite` property, the current
|
`third_party_invite` property, the current
|
||||||
`m.room.third_party_invite` event with `state_key` matching
|
`m.room.third_party_invite` event with `state_key` matching
|
||||||
`content.third_party_invite.signed.token`, if any.
|
`content.third_party_invite.signed.token`, if any.
|
||||||
- If `content.join_authorised_via_users_server` is present,
|
- If `membership` is `join`, `content.join_authorised_via_users_server`
|
||||||
and the [room version supports restricted rooms](/rooms/#feature-matrix),
|
is present, and the [room version supports restricted rooms](/rooms/#feature-matrix),
|
||||||
then the `m.room.member` event with `state_key` matching
|
then the `m.room.member` event with `state_key` matching
|
||||||
`content.join_authorised_via_users_server`.
|
`content.join_authorised_via_users_server`.
|
||||||
|
|
||||||
|
|
@ -970,9 +971,8 @@ the event to other servers in the room.
|
||||||
## Third-party invites
|
## Third-party invites
|
||||||
|
|
||||||
{{% boxes/note %}}
|
{{% boxes/note %}}
|
||||||
More information about third-party invites is available in the
|
More information about third-party invites is available in the Client-Server API
|
||||||
[Client-Server API](/client-server-api) under
|
under the [Third-party invites](/client-server-api/#third-party-invites) module.
|
||||||
the Third-party Invites module.
|
|
||||||
{{% /boxes/note %}}
|
{{% /boxes/note %}}
|
||||||
|
|
||||||
When a user wants to invite another user in a room but doesn't know the
|
When a user wants to invite another user in a room but doesn't know the
|
||||||
|
|
@ -985,38 +985,41 @@ API](/identity-service-api).
|
||||||
|
|
||||||
### Cases where an association exists for a third-party identifier
|
### Cases where an association exists for a third-party identifier
|
||||||
|
|
||||||
If the third-party identifier is already bound to a Matrix ID, a lookup
|
If the third-party identifier is already bound to a Matrix ID, a [lookup
|
||||||
request on the identity server will return it. The invite is then
|
request](/identity-service-api/#post_matrixidentityv2lookup) on the identity
|
||||||
processed by the inviting homeserver as a standard `m.room.member`
|
server will return it. The invite is then processed by the inviting homeserver
|
||||||
invite event. This is the simplest case.
|
as a [standard `m.room.member` invite event](#inviting-to-a-room). This is the
|
||||||
|
simplest case.
|
||||||
|
|
||||||
### Cases where an association doesn't exist for a third-party identifier
|
### Cases where an association doesn't exist for a third-party identifier
|
||||||
|
|
||||||
If the third-party identifier isn't bound to any Matrix ID, the inviting
|
If the third-party identifier isn't bound to any Matrix ID, the inviting
|
||||||
homeserver will request the identity server to store an invite for this
|
homeserver will request the identity server to [store an invite](/identity-service-api/#invitation-storage)
|
||||||
identifier and to deliver it to whoever binds it to its Matrix ID. It
|
for this identifier and to deliver it to whoever binds it to its Matrix ID. It
|
||||||
will also send an `m.room.third_party_invite` event in the room to
|
will also send an [`m.room.third_party_invite`](/client-server-api/#mroomthird_party_invite)
|
||||||
specify a display name, a token and public keys the identity server
|
event in the room to specify a display name, a token and public keys the
|
||||||
provided as a response to the invite storage request.
|
identity server provided as a response to the invite storage request.
|
||||||
|
|
||||||
When a third-party identifier with pending invites gets bound to a
|
When a third-party identifier with pending invites gets bound to a Matrix ID,
|
||||||
Matrix ID, the identity server will send a POST request to the ID's
|
the identity server will send a request to the [`/3pid/onbind`](#put_matrixfederationv13pidonbind)
|
||||||
homeserver as described in the [Invitation
|
endpoint of the the ID's homeserver as described in the [Invitation
|
||||||
Storage](/identity-service-api#invitation-storage)
|
Storage](/identity-service-api#invitation-storage) section of the Identity
|
||||||
section of the Identity Service API.
|
Service API.
|
||||||
|
|
||||||
The following process applies for each invite sent by the identity
|
The following process applies for each invite sent by the identity
|
||||||
server:
|
server:
|
||||||
|
|
||||||
The invited homeserver will create an `m.room.member` invite event
|
The invited homeserver will create an [`m.room.member`](/client-server-api/#mroommember)
|
||||||
containing a special `third_party_invite` section containing the token
|
invite event containing a special `third_party_invite` section containing the
|
||||||
and a signed object, both provided by the identity server.
|
token and a `signed` object, both provided by the identity server.
|
||||||
|
|
||||||
If the invited homeserver is in the room the invite came from, it can
|
If the invited homeserver is in the room the invite came from, it can
|
||||||
auth the event and send it.
|
auth the event and send it.
|
||||||
|
|
||||||
However, if the invited homeserver isn't in the room the invite came
|
However, if the invited homeserver isn't in the room the invite came
|
||||||
from, it will need to request the room's homeserver to auth the event.
|
from, it will need to request the inviting homeserver to auth the event
|
||||||
|
at the [`/exchange_third_party_invite`](#put_matrixfederationv1exchange_third_party_inviteroomid)
|
||||||
|
endpoint.
|
||||||
|
|
||||||
{{% http-api spec="server-server" api="third_party_invite" %}}
|
{{% http-api spec="server-server" api="third_party_invite" %}}
|
||||||
|
|
||||||
|
|
@ -1045,11 +1048,10 @@ user's Matrix ID and the token delivered when the invite was stored,
|
||||||
this verification will prove that the `m.room.member` invite event comes
|
this verification will prove that the `m.room.member` invite event comes
|
||||||
from the user owning the invited third-party identifier.
|
from the user owning the invited third-party identifier.
|
||||||
|
|
||||||
## Public Room Directory
|
## Published Room Directory
|
||||||
|
|
||||||
To complement the [Client-Server
|
To complement the [room directory in the Client-Server API](/client-server-api#published-room-directory),
|
||||||
API](/client-server-api)'s room directory,
|
homeservers need a way to query the published rooms of another server.
|
||||||
homeservers need a way to query the public rooms for another server.
|
|
||||||
This can be done by making a request to the `/publicRooms` endpoint for
|
This can be done by making a request to the `/publicRooms` endpoint for
|
||||||
the server the room directory should be retrieved for.
|
the server the room directory should be retrieved for.
|
||||||
|
|
||||||
|
|
@ -1337,7 +1339,7 @@ calculated as follows.
|
||||||
The *content hash* of an event covers the complete event including the
|
The *content hash* of an event covers the complete event including the
|
||||||
*unredacted* contents. It is calculated as follows.
|
*unredacted* contents. It is calculated as follows.
|
||||||
|
|
||||||
First, any existing `unsigned`, `signature`, and `hashes` members are
|
First, any existing `unsigned`, `signatures`, and `hashes` properties are
|
||||||
removed. The resulting object is then encoded as [Canonical
|
removed. The resulting object is then encoded as [Canonical
|
||||||
JSON](/appendices#canonical-json), and the JSON is hashed using
|
JSON](/appendices#canonical-json), and the JSON is hashed using
|
||||||
SHA-256.
|
SHA-256.
|
||||||
|
|
|
||||||
|
|
@ -19,7 +19,7 @@ properties:
|
||||||
type: string
|
type: string
|
||||||
description: A unique, user-defined ID of the application service which will never change.
|
description: A unique, user-defined ID of the application service which will never change.
|
||||||
url:
|
url:
|
||||||
type: string
|
type: ["null", "string"]
|
||||||
description: The URL for the application service. May include a path after the domain name. Optionally set to null if no traffic is required.
|
description: The URL for the application service. May include a path after the domain name. Optionally set to null if no traffic is required.
|
||||||
as_token:
|
as_token:
|
||||||
type: string
|
type: string
|
||||||
|
|
|
||||||
141
data/api/client-server/account_deactivation.yaml
Normal file
141
data/api/client-server/account_deactivation.yaml
Normal file
|
|
@ -0,0 +1,141 @@
|
||||||
|
# Copyright 2016 OpenMarket Ltd
|
||||||
|
# Copyright 2022 The Matrix.org Foundation C.I.C.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
openapi: 3.1.0
|
||||||
|
info:
|
||||||
|
title: Matrix Client-Server Account Deactivation API
|
||||||
|
version: 1.0.0
|
||||||
|
paths:
|
||||||
|
/account/deactivate:
|
||||||
|
post:
|
||||||
|
summary: Deactivate a user's account.
|
||||||
|
description: |-
|
||||||
|
Deactivate the user's account, removing all ability for the user to
|
||||||
|
login again.
|
||||||
|
|
||||||
|
This API endpoint uses the [User-Interactive Authentication API](/client-server-api/#user-interactive-authentication-api).
|
||||||
|
|
||||||
|
An access token should be submitted to this endpoint if the client has
|
||||||
|
an active session.
|
||||||
|
|
||||||
|
The homeserver may change the flows available depending on whether a
|
||||||
|
valid access token is provided.
|
||||||
|
|
||||||
|
Unlike other endpoints, this endpoint does not take an `id_access_token`
|
||||||
|
parameter because the homeserver is expected to sign the request to the
|
||||||
|
identity server instead.
|
||||||
|
security:
|
||||||
|
- {}
|
||||||
|
- accessTokenQuery: []
|
||||||
|
- accessTokenBearer: []
|
||||||
|
operationId: deactivateAccount
|
||||||
|
requestBody:
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
auth:
|
||||||
|
description: Additional authentication information for the user-interactive
|
||||||
|
authentication API.
|
||||||
|
allOf:
|
||||||
|
- $ref: definitions/auth_data.yaml
|
||||||
|
id_server:
|
||||||
|
type: string
|
||||||
|
description: |-
|
||||||
|
The identity server to unbind all of the user's 3PIDs from.
|
||||||
|
If not provided, the homeserver MUST use the `id_server`
|
||||||
|
that was originally use to bind each identifier. If the
|
||||||
|
homeserver does not know which `id_server` that was,
|
||||||
|
it must return an `id_server_unbind_result` of
|
||||||
|
`no-support`.
|
||||||
|
example: example.org
|
||||||
|
erase:
|
||||||
|
x-addedInMatrixVersion: "1.10"
|
||||||
|
type: boolean
|
||||||
|
description: |-
|
||||||
|
Whether the user would like their content to be erased as
|
||||||
|
much as possible from the server.
|
||||||
|
|
||||||
|
Erasure means that any users (or servers) which join the
|
||||||
|
room after the erasure request are served redacted copies of
|
||||||
|
the events sent by this account. Users which had visibility
|
||||||
|
on those events prior to the erasure are still able to see
|
||||||
|
unredacted copies. No redactions are sent and the erasure
|
||||||
|
request is not shared over federation, so other servers
|
||||||
|
might still serve unredacted copies.
|
||||||
|
|
||||||
|
The server should additionally erase any non-event data
|
||||||
|
associated with the user, such as [account data](/client-server-api/#client-config)
|
||||||
|
and [contact 3PIDs](/client-server-api/#adding-account-administrative-contact-information).
|
||||||
|
|
||||||
|
Defaults to `false` if not present.
|
||||||
|
required: true
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: The account has been deactivated.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
id_server_unbind_result:
|
||||||
|
type: string
|
||||||
|
enum:
|
||||||
|
- success
|
||||||
|
- no-support
|
||||||
|
description: |-
|
||||||
|
An indicator as to whether or not the homeserver was able to unbind
|
||||||
|
the user's 3PIDs from the identity server(s). `success` indicates
|
||||||
|
that all identifiers have been unbound from the identity server while
|
||||||
|
`no-support` indicates that one or more identifiers failed to unbind
|
||||||
|
due to the identity server refusing the request or the homeserver
|
||||||
|
being unable to determine an identity server to unbind from. This
|
||||||
|
must be `success` if the homeserver has no identifiers to unbind
|
||||||
|
for the user.
|
||||||
|
example: success
|
||||||
|
required:
|
||||||
|
- id_server_unbind_result
|
||||||
|
"401":
|
||||||
|
description: The homeserver requires additional authentication information.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/auth_response.yaml
|
||||||
|
"429":
|
||||||
|
description: This request was rate-limited.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/rate_limited.yaml
|
||||||
|
tags:
|
||||||
|
- Account management
|
||||||
|
servers:
|
||||||
|
- url: "{protocol}://{hostname}{basePath}"
|
||||||
|
variables:
|
||||||
|
protocol:
|
||||||
|
enum:
|
||||||
|
- http
|
||||||
|
- https
|
||||||
|
default: https
|
||||||
|
hostname:
|
||||||
|
default: localhost:8008
|
||||||
|
basePath:
|
||||||
|
default: /_matrix/client/v3
|
||||||
|
components:
|
||||||
|
securitySchemes:
|
||||||
|
accessTokenQuery:
|
||||||
|
$ref: definitions/security.yaml#/accessTokenQuery
|
||||||
|
accessTokenBearer:
|
||||||
|
$ref: definitions/security.yaml#/accessTokenBearer
|
||||||
|
|
@ -13,18 +13,21 @@
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
openapi: 3.1.0
|
openapi: 3.1.0
|
||||||
info:
|
info:
|
||||||
title: Matrix Client-Server Application Service Room Directory API
|
title: Matrix Client-Server Application Service Published Room Directory API
|
||||||
version: 1.0.0
|
version: 1.0.0
|
||||||
paths:
|
paths:
|
||||||
"/directory/list/appservice/{networkId}/{roomId}":
|
"/directory/list/appservice/{networkId}/{roomId}":
|
||||||
put:
|
put:
|
||||||
summary: Updates a room's visibility in the application service's room directory.
|
summary: |-
|
||||||
description: |-
|
Updates a room's visibility in the application service's published room
|
||||||
Updates the visibility of a given room on the application service's room
|
|
||||||
directory.
|
directory.
|
||||||
|
description: |-
|
||||||
|
Updates the visibility of a given room in the application service's
|
||||||
|
published room directory.
|
||||||
|
|
||||||
This API is similar to the room directory visibility API used by clients
|
This API is similar to the
|
||||||
to update the homeserver's more general room directory.
|
[visibility API](/client-server-api#put_matrixclientv3directorylistroomroomid)
|
||||||
|
used by clients to update the homeserver's more general published room directory.
|
||||||
|
|
||||||
This API requires the use of an application service access token (`as_token`)
|
This API requires the use of an application service access token (`as_token`)
|
||||||
instead of a typical client's access_token. This API cannot be invoked by
|
instead of a typical client's access_token. This API cannot be invoked by
|
||||||
|
|
|
||||||
|
|
@ -87,12 +87,9 @@ paths:
|
||||||
- public
|
- public
|
||||||
- private
|
- private
|
||||||
description: |-
|
description: |-
|
||||||
A `public` visibility indicates that the room will be shown
|
The room's visibility in the server's
|
||||||
in the published room list. A `private` visibility will hide
|
[published room directory](/client-server-api#published-room-directory).
|
||||||
the room from the published room list. Rooms default to
|
Defaults to `private`.
|
||||||
`private` visibility if this key is not included. NB: This
|
|
||||||
should not be confused with `join_rules` which also uses the
|
|
||||||
word `public`.
|
|
||||||
room_alias_name:
|
room_alias_name:
|
||||||
type: string
|
type: string
|
||||||
description: |-
|
description: |-
|
||||||
|
|
@ -109,15 +106,17 @@ paths:
|
||||||
name:
|
name:
|
||||||
type: string
|
type: string
|
||||||
description: |-
|
description: |-
|
||||||
If this is included, an `m.room.name` event will be sent
|
If this is included, an [`m.room.name`](/client-server-api/#mroomname) event
|
||||||
into the room to indicate the name of the room. See Room
|
will be sent into the room to indicate the name for the room.
|
||||||
Events for more information on `m.room.name`.
|
This overwrites any [`m.room.name`](/client-server-api/#mroomname)
|
||||||
|
event in `initial_state`.
|
||||||
topic:
|
topic:
|
||||||
type: string
|
type: string
|
||||||
description: |-
|
description: |-
|
||||||
If this is included, an `m.room.topic` event will be sent
|
If this is included, an [`m.room.topic`](/client-server-api/#mroomtopic)
|
||||||
into the room to indicate the topic for the room. See Room
|
event with a `text/plain` mimetype will be sent into the room
|
||||||
Events for more information on `m.room.topic`.
|
to indicate the topic for the room. This overwrites any
|
||||||
|
[`m.room.topic`](/client-server-api/#mroomtopic) event in `initial_state`.
|
||||||
invite:
|
invite:
|
||||||
type: array
|
type: array
|
||||||
description: |-
|
description: |-
|
||||||
|
|
@ -131,32 +130,7 @@ paths:
|
||||||
A list of objects representing third-party IDs to invite into
|
A list of objects representing third-party IDs to invite into
|
||||||
the room.
|
the room.
|
||||||
items:
|
items:
|
||||||
type: object
|
$ref: definitions/invite_3pid.yaml
|
||||||
title: Invite3pid
|
|
||||||
properties:
|
|
||||||
id_server:
|
|
||||||
type: string
|
|
||||||
description: The hostname+port of the identity server which should be used for
|
|
||||||
third-party identifier lookups.
|
|
||||||
id_access_token:
|
|
||||||
type: string
|
|
||||||
description: |-
|
|
||||||
An access token previously registered with the identity server. Servers
|
|
||||||
can treat this as optional to distinguish between r0.5-compatible clients
|
|
||||||
and this specification version.
|
|
||||||
medium:
|
|
||||||
type: string
|
|
||||||
description: |-
|
|
||||||
The kind of address being passed in the address field, for example `email`
|
|
||||||
(see [the list of recognised values](/appendices/#3pid-types)).
|
|
||||||
address:
|
|
||||||
type: string
|
|
||||||
description: The invitee's third-party identifier.
|
|
||||||
required:
|
|
||||||
- id_server
|
|
||||||
- id_access_token
|
|
||||||
- medium
|
|
||||||
- address
|
|
||||||
room_version:
|
room_version:
|
||||||
type: string
|
type: string
|
||||||
description: |-
|
description: |-
|
||||||
|
|
|
||||||
45
data/api/client-server/definitions/invite_3pid.yaml
Normal file
45
data/api/client-server/definitions/invite_3pid.yaml
Normal file
|
|
@ -0,0 +1,45 @@
|
||||||
|
# Copyright 2025 The Matrix.org Foundation C.I.C.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
type: object
|
||||||
|
title: Invite3pid
|
||||||
|
properties:
|
||||||
|
id_server:
|
||||||
|
type: string
|
||||||
|
description: The hostname+port of the identity server which should be used for
|
||||||
|
third-party identifier lookups.
|
||||||
|
id_access_token:
|
||||||
|
type: string
|
||||||
|
description: |-
|
||||||
|
An access token previously registered with the identity server. Servers
|
||||||
|
can treat this as optional to distinguish between r0.5-compatible clients
|
||||||
|
and this specification version.
|
||||||
|
medium:
|
||||||
|
type: string
|
||||||
|
description: |-
|
||||||
|
The kind of address being passed in the address field, for example `email`
|
||||||
|
(see [the list of recognised values](/appendices/#3pid-types)).
|
||||||
|
address:
|
||||||
|
type: string
|
||||||
|
description: The invitee's third-party identifier.
|
||||||
|
required:
|
||||||
|
- id_server
|
||||||
|
- id_access_token
|
||||||
|
- medium
|
||||||
|
- address
|
||||||
|
example: {
|
||||||
|
"id_server": "matrix.org",
|
||||||
|
"id_access_token": "abc123_OpaqueString",
|
||||||
|
"medium": "email",
|
||||||
|
"address": "cheeky@monkey.com"
|
||||||
|
}
|
||||||
88
data/api/client-server/definitions/olm_payload.yaml
Normal file
88
data/api/client-server/definitions/olm_payload.yaml
Normal file
|
|
@ -0,0 +1,88 @@
|
||||||
|
# Copyright 2025 The Matrix.org Foundation C.I.C
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
|
||||||
|
type: object
|
||||||
|
title: OlmPayload
|
||||||
|
description: |-
|
||||||
|
The plaintext payload of Olm message events.
|
||||||
|
properties:
|
||||||
|
type:
|
||||||
|
type: string
|
||||||
|
description: The type of the event.
|
||||||
|
content:
|
||||||
|
type: object
|
||||||
|
description: The event content.
|
||||||
|
sender:
|
||||||
|
type: string
|
||||||
|
description: The user ID of the event sender.
|
||||||
|
recipient:
|
||||||
|
type: string
|
||||||
|
description: The user ID of the intended event recipient.
|
||||||
|
recipient_keys:
|
||||||
|
description: The recipient's signing keys of the encrypted event.
|
||||||
|
$ref: "#/components/schemas/SigningKeys"
|
||||||
|
keys:
|
||||||
|
$ref: "#/components/schemas/SigningKeys"
|
||||||
|
description: The sender's signing keys of the encrypted event.
|
||||||
|
sender_device_keys:
|
||||||
|
$ref: device_keys.yaml
|
||||||
|
description: The sender's device keys.
|
||||||
|
x-addedInMatrixVersion: "1.15"
|
||||||
|
required:
|
||||||
|
- type
|
||||||
|
- content
|
||||||
|
- sender
|
||||||
|
- recipient
|
||||||
|
- recipient_keys
|
||||||
|
- keys
|
||||||
|
components:
|
||||||
|
schemas:
|
||||||
|
SigningKeys:
|
||||||
|
type: object
|
||||||
|
title: SigningKeys
|
||||||
|
description: Public keys used for an `m.olm.v1.curve25519-aes-sha2` event.
|
||||||
|
properties:
|
||||||
|
ed25519:
|
||||||
|
type: string
|
||||||
|
description: The Ed25519 public key encoded using unpadded base64.
|
||||||
|
required:
|
||||||
|
- ed25519
|
||||||
|
example: {
|
||||||
|
"type": "<type of the plaintext event>",
|
||||||
|
"content": "<content for the plaintext event>",
|
||||||
|
"sender": "<sender_user_id>",
|
||||||
|
"recipient": "<recipient_user_id>",
|
||||||
|
"recipient_keys": {
|
||||||
|
"ed25519": "<our_ed25519_key>"
|
||||||
|
},
|
||||||
|
"keys": {
|
||||||
|
"ed25519": "<sender_ed25519_key>"
|
||||||
|
},
|
||||||
|
"sender_device_keys": {
|
||||||
|
"algorithms": ["<supported>", "<algorithms>"],
|
||||||
|
"user_id": "<user_id>",
|
||||||
|
"device_id": "<device_id>",
|
||||||
|
"keys": {
|
||||||
|
"ed25519:<device_id>": "<sender_ed25519_key>",
|
||||||
|
"curve25519:<device_id>": "<sender_curve25519_key>"
|
||||||
|
},
|
||||||
|
"signatures": {
|
||||||
|
"<user_id>": {
|
||||||
|
"ed25519:<device_id>": "<device_signature>",
|
||||||
|
"ed25519:<ssk_id>": "<ssk_signature>",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
@ -13,10 +13,12 @@
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
type: object
|
type: object
|
||||||
title: "PublicRoomsChunk"
|
title: "PublishedRoomsChunk"
|
||||||
properties:
|
properties:
|
||||||
canonical_alias:
|
canonical_alias:
|
||||||
type: string
|
type: string
|
||||||
|
format: mx-room-alias
|
||||||
|
pattern: "^#"
|
||||||
description: The canonical alias of the room, if any.
|
description: The canonical alias of the room, if any.
|
||||||
example: "#general:example.org"
|
example: "#general:example.org"
|
||||||
name:
|
name:
|
||||||
|
|
@ -29,11 +31,15 @@ properties:
|
||||||
example: 42
|
example: 42
|
||||||
room_id:
|
room_id:
|
||||||
type: string
|
type: string
|
||||||
|
format: mx-room-id
|
||||||
|
pattern: "^!"
|
||||||
description: The ID of the room.
|
description: The ID of the room.
|
||||||
example: "!abcdefg:example.org"
|
example: "!abcdefg:example.org"
|
||||||
topic:
|
topic:
|
||||||
type: string
|
type: string
|
||||||
description: The topic of the room, if any.
|
description: |-
|
||||||
|
The plain text topic of the room. Omitted if no `text/plain` mimetype
|
||||||
|
exists in [`m.room.topic`](/client-server-api/#mroomtopic).
|
||||||
example: "All things general"
|
example: "All things general"
|
||||||
world_readable:
|
world_readable:
|
||||||
type: boolean
|
type: boolean
|
||||||
|
|
@ -59,7 +65,6 @@ properties:
|
||||||
example: "public"
|
example: "public"
|
||||||
room_type:
|
room_type:
|
||||||
type: string
|
type: string
|
||||||
x-addedInMatrixVersion: "1.4"
|
|
||||||
description: |-
|
description: |-
|
||||||
The `type` of room (from [`m.room.create`](/client-server-api/#mroomcreate)), if any.
|
The `type` of room (from [`m.room.create`](/client-server-api/#mroomcreate)), if any.
|
||||||
required:
|
required:
|
||||||
|
|
|
||||||
|
|
@ -13,28 +13,15 @@
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
type: object
|
type: object
|
||||||
description: A list of the rooms on the server.
|
description: A list of the published rooms on the server.
|
||||||
required: ["chunk"]
|
required: ["chunk"]
|
||||||
properties:
|
properties:
|
||||||
chunk:
|
chunk:
|
||||||
type: array
|
type: array
|
||||||
description: |-
|
description: |-
|
||||||
A paginated chunk of public rooms.
|
A paginated chunk of published rooms.
|
||||||
items:
|
items:
|
||||||
allOf:
|
$ref: "public_rooms_chunk.yaml"
|
||||||
- $ref: "public_rooms_chunk.yaml"
|
|
||||||
- type: object
|
|
||||||
title: PublicRoomsChunk
|
|
||||||
properties:
|
|
||||||
# Override description of join_rule
|
|
||||||
join_rule:
|
|
||||||
type: string
|
|
||||||
description: |-
|
|
||||||
The room's join rule. When not present, the room is assumed to
|
|
||||||
be `public`. Note that rooms with `invite` join rules are not
|
|
||||||
expected here, but rooms with `knock` rules are given their
|
|
||||||
near-public nature.
|
|
||||||
example: "public"
|
|
||||||
next_batch:
|
next_batch:
|
||||||
type: string
|
type: string
|
||||||
description: |-
|
description: |-
|
||||||
|
|
@ -50,7 +37,7 @@ properties:
|
||||||
total_room_count_estimate:
|
total_room_count_estimate:
|
||||||
type: integer
|
type: integer
|
||||||
description: |-
|
description: |-
|
||||||
An estimate on the total number of public rooms, if the
|
An estimate on the total number of published rooms, if the
|
||||||
server has an estimate.
|
server has an estimate.
|
||||||
example: {
|
example: {
|
||||||
"chunk": [
|
"chunk": [
|
||||||
|
|
|
||||||
50
data/api/client-server/definitions/room_summary.yaml
Normal file
50
data/api/client-server/definitions/room_summary.yaml
Normal file
|
|
@ -0,0 +1,50 @@
|
||||||
|
# Copyright 2025 The Matrix.org Foundation C.I.C.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
type: object
|
||||||
|
title: RoomSummary
|
||||||
|
allOf:
|
||||||
|
- $ref: public_rooms_chunk.yaml
|
||||||
|
- type: object
|
||||||
|
properties:
|
||||||
|
room_type:
|
||||||
|
type: string
|
||||||
|
description: The `type` of room (from
|
||||||
|
[`m.room.create`](/client-server-api/#mroomcreate)),
|
||||||
|
if any.
|
||||||
|
allowed_room_ids:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
format: mx-room-id
|
||||||
|
pattern: "^!"
|
||||||
|
description: |-
|
||||||
|
If the room is a [restricted room](/server-server-api/#restricted-rooms), these are the room IDs which
|
||||||
|
are specified by the join rules. Empty or omitted otherwise.
|
||||||
|
encryption:
|
||||||
|
type: string
|
||||||
|
enum:
|
||||||
|
- "m.megolm.v1.aes-sha2"
|
||||||
|
description: |-
|
||||||
|
The encryption algorithm to be used to encrypt messages sent in the
|
||||||
|
room.
|
||||||
|
room_version:
|
||||||
|
description: The version of the room.
|
||||||
|
type: string
|
||||||
|
|
||||||
|
required:
|
||||||
|
- room_id
|
||||||
|
- num_joined_members
|
||||||
|
- world_readable
|
||||||
|
- guest_can_join
|
||||||
|
|
@ -438,22 +438,7 @@ paths:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
type: object
|
$ref: "#/components/schemas/RoomKeysUpdateResponse"
|
||||||
title: RoomKeysUpdateResponse
|
|
||||||
properties:
|
|
||||||
etag:
|
|
||||||
description: |-
|
|
||||||
The new etag value representing stored keys in the backup.
|
|
||||||
See `GET /room_keys/version/{version}` for more details.
|
|
||||||
type: string
|
|
||||||
example: abcdefg
|
|
||||||
count:
|
|
||||||
description: The number of keys stored in the backup
|
|
||||||
type: integer
|
|
||||||
example: 10
|
|
||||||
required:
|
|
||||||
- etag
|
|
||||||
- count
|
|
||||||
"403":
|
"403":
|
||||||
description: |-
|
description: |-
|
||||||
The version specified does not match the current backup version.
|
The version specified does not match the current backup version.
|
||||||
|
|
@ -571,22 +556,7 @@ paths:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
type: object
|
$ref: "#/components/schemas/RoomKeysUpdateResponse"
|
||||||
title: RoomKeysUpdateResponse
|
|
||||||
properties:
|
|
||||||
etag:
|
|
||||||
description: |-
|
|
||||||
The new etag value representing stored keys in the backup.
|
|
||||||
See `GET /room_keys/version/{version}` for more details.
|
|
||||||
type: string
|
|
||||||
example: abcdefg
|
|
||||||
count:
|
|
||||||
description: The number of keys stored in the backup
|
|
||||||
type: integer
|
|
||||||
example: 10
|
|
||||||
required:
|
|
||||||
- etag
|
|
||||||
- count
|
|
||||||
"404":
|
"404":
|
||||||
description: The backup was not found.
|
description: The backup was not found.
|
||||||
content:
|
content:
|
||||||
|
|
@ -644,22 +614,7 @@ paths:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
type: object
|
$ref: "#/components/schemas/RoomKeysUpdateResponse"
|
||||||
title: RoomKeysUpdateResponse
|
|
||||||
properties:
|
|
||||||
etag:
|
|
||||||
description: |-
|
|
||||||
The new etag value representing stored keys in the backup.
|
|
||||||
See `GET /room_keys/version/{version}` for more details.
|
|
||||||
type: string
|
|
||||||
example: abcdefg
|
|
||||||
count:
|
|
||||||
description: The number of keys stored in the backup
|
|
||||||
type: integer
|
|
||||||
example: 10
|
|
||||||
required:
|
|
||||||
- etag
|
|
||||||
- count
|
|
||||||
"403":
|
"403":
|
||||||
description: |-
|
description: |-
|
||||||
The version specified does not match the current backup version.
|
The version specified does not match the current backup version.
|
||||||
|
|
@ -778,22 +733,7 @@ paths:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
type: object
|
$ref: "#/components/schemas/RoomKeysUpdateResponse"
|
||||||
title: RoomKeysUpdateResponse
|
|
||||||
properties:
|
|
||||||
etag:
|
|
||||||
description: |-
|
|
||||||
The new etag value representing stored keys in the backup.
|
|
||||||
See `GET /room_keys/version/{version}` for more details.
|
|
||||||
type: string
|
|
||||||
example: abcdefg
|
|
||||||
count:
|
|
||||||
description: The number of keys stored in the backup
|
|
||||||
type: integer
|
|
||||||
example: 10
|
|
||||||
required:
|
|
||||||
- etag
|
|
||||||
- count
|
|
||||||
"404":
|
"404":
|
||||||
description: The backup was not found.
|
description: The backup was not found.
|
||||||
content:
|
content:
|
||||||
|
|
@ -866,22 +806,7 @@ paths:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
type: object
|
$ref: "#/components/schemas/RoomKeysUpdateResponse"
|
||||||
title: RoomKeysUpdateResponse
|
|
||||||
properties:
|
|
||||||
etag:
|
|
||||||
description: |-
|
|
||||||
The new etag value representing stored keys in the backup.
|
|
||||||
See `GET /room_keys/version/{version}` for more details.
|
|
||||||
type: string
|
|
||||||
example: abcdefg
|
|
||||||
count:
|
|
||||||
description: The number of keys stored in the backup
|
|
||||||
type: integer
|
|
||||||
example: 10
|
|
||||||
required:
|
|
||||||
- etag
|
|
||||||
- count
|
|
||||||
"403":
|
"403":
|
||||||
description: |-
|
description: |-
|
||||||
The version specified does not match the current backup version.
|
The version specified does not match the current backup version.
|
||||||
|
|
@ -1007,22 +932,7 @@ paths:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
type: object
|
$ref: "#/components/schemas/RoomKeysUpdateResponse"
|
||||||
title: RoomKeysUpdateResponse
|
|
||||||
properties:
|
|
||||||
etag:
|
|
||||||
description: |-
|
|
||||||
The new etag value representing stored keys in the backup.
|
|
||||||
See `GET /room_keys/version/{version}` for more details.
|
|
||||||
type: string
|
|
||||||
example: abcdefg
|
|
||||||
count:
|
|
||||||
description: The number of keys stored in the backup
|
|
||||||
type: integer
|
|
||||||
example: 10
|
|
||||||
required:
|
|
||||||
- etag
|
|
||||||
- count
|
|
||||||
"404":
|
"404":
|
||||||
description: The backup was not found.
|
description: The backup was not found.
|
||||||
content:
|
content:
|
||||||
|
|
@ -1056,6 +966,26 @@ servers:
|
||||||
basePath:
|
basePath:
|
||||||
default: /_matrix/client/v3
|
default: /_matrix/client/v3
|
||||||
components:
|
components:
|
||||||
|
schemas:
|
||||||
|
RoomKeysUpdateResponse:
|
||||||
|
type: object
|
||||||
|
title: RoomKeysUpdateResponse
|
||||||
|
properties:
|
||||||
|
etag:
|
||||||
|
description: |-
|
||||||
|
The new etag value representing stored keys in the backup.
|
||||||
|
|
||||||
|
See [`GET /room_keys/version/{version}`](client-server-api/#get_matrixclientv3room_keysversionversion)
|
||||||
|
for more details.
|
||||||
|
type: string
|
||||||
|
example: abcdefg
|
||||||
|
count:
|
||||||
|
description: The number of keys stored in the backup
|
||||||
|
type: integer
|
||||||
|
example: 10
|
||||||
|
required:
|
||||||
|
- etag
|
||||||
|
- count
|
||||||
securitySchemes:
|
securitySchemes:
|
||||||
accessTokenQuery:
|
accessTokenQuery:
|
||||||
$ref: definitions/security.yaml#/accessTokenQuery
|
$ref: definitions/security.yaml#/accessTokenQuery
|
||||||
|
|
|
||||||
|
|
@ -13,14 +13,15 @@
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
openapi: 3.1.0
|
openapi: 3.1.0
|
||||||
info:
|
info:
|
||||||
title: Matrix Client-Server Room Directory API
|
title: Matrix Client-Server Published Room Directory API
|
||||||
version: 1.0.0
|
version: 1.0.0
|
||||||
paths:
|
paths:
|
||||||
"/directory/list/room/{roomId}":
|
"/directory/list/room/{roomId}":
|
||||||
get:
|
get:
|
||||||
summary: Gets the visibility of a room in the directory
|
summary: Gets the visibility of a room in the directory
|
||||||
description: Gets the visibility of a given room on the server's public room
|
description: |-
|
||||||
directory.
|
Gets the visibility of a given room in the server's
|
||||||
|
published room directory.
|
||||||
operationId: getRoomVisibilityOnDirectory
|
operationId: getRoomVisibilityOnDirectory
|
||||||
parameters:
|
parameters:
|
||||||
- in: path
|
- in: path
|
||||||
|
|
@ -32,7 +33,7 @@ paths:
|
||||||
type: string
|
type: string
|
||||||
responses:
|
responses:
|
||||||
"200":
|
"200":
|
||||||
description: The visibility of the room in the directory
|
description: The visibility of the room in the directory.
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
@ -50,7 +51,7 @@ paths:
|
||||||
"visibility": "public"
|
"visibility": "public"
|
||||||
}
|
}
|
||||||
"404":
|
"404":
|
||||||
description: The room is not known to the server
|
description: The room is not known to the server.
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
@ -64,14 +65,13 @@ paths:
|
||||||
tags:
|
tags:
|
||||||
- Room discovery
|
- Room discovery
|
||||||
put:
|
put:
|
||||||
summary: Sets the visibility of a room in the room directory
|
summary: Sets the visibility of a room in the directory
|
||||||
description: |-
|
description: |-
|
||||||
Sets the visibility of a given room in the server's public room
|
Sets the visibility of a given room in the server's published room directory.
|
||||||
directory.
|
|
||||||
|
|
||||||
Servers may choose to implement additional access control checks
|
Servers MAY implement additional access control checks, for instance,
|
||||||
here, for instance that room visibility can only be changed by
|
to ensure that a room's visibility can only be changed by the room creator
|
||||||
the room creator or a server administrator.
|
or a server administrator.
|
||||||
operationId: setRoomVisibilityOnDirectory
|
operationId: setRoomVisibilityOnDirectory
|
||||||
security:
|
security:
|
||||||
- accessTokenQuery: []
|
- accessTokenQuery: []
|
||||||
|
|
@ -97,11 +97,11 @@ paths:
|
||||||
- public
|
- public
|
||||||
description: |-
|
description: |-
|
||||||
The new visibility setting for the room.
|
The new visibility setting for the room.
|
||||||
Defaults to 'public'.
|
Defaults to `public`.
|
||||||
example: {
|
example: {
|
||||||
"visibility": "public"
|
"visibility": "public"
|
||||||
}
|
}
|
||||||
description: The new visibility for the room on the room directory.
|
description: The new visibility for the room in the published room directory.
|
||||||
required: true
|
required: true
|
||||||
responses:
|
responses:
|
||||||
"200":
|
"200":
|
||||||
|
|
@ -114,7 +114,7 @@ paths:
|
||||||
response:
|
response:
|
||||||
value: {}
|
value: {}
|
||||||
"404":
|
"404":
|
||||||
description: The room is not known to the server
|
description: The room is not known to the server.
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
@ -129,9 +129,9 @@ paths:
|
||||||
- Room discovery
|
- Room discovery
|
||||||
/publicRooms:
|
/publicRooms:
|
||||||
get:
|
get:
|
||||||
summary: Lists the public rooms on the server.
|
summary: Lists a server's published room directory
|
||||||
description: |-
|
description: |-
|
||||||
Lists the public rooms on the server.
|
Lists a server's published room directory.
|
||||||
|
|
||||||
This API returns paginated responses. The rooms are ordered by the number
|
This API returns paginated responses. The rooms are ordered by the number
|
||||||
of joined members, with the largest rooms first.
|
of joined members, with the largest rooms first.
|
||||||
|
|
@ -154,13 +154,13 @@ paths:
|
||||||
- in: query
|
- in: query
|
||||||
name: server
|
name: server
|
||||||
description: |-
|
description: |-
|
||||||
The server to fetch the public room lists from. Defaults to the
|
The server to fetch the published room directory from. Defaults
|
||||||
local server. Case sensitive.
|
to the local server. Case sensitive.
|
||||||
schema:
|
schema:
|
||||||
type: string
|
type: string
|
||||||
responses:
|
responses:
|
||||||
"200":
|
"200":
|
||||||
description: A list of the rooms on the server.
|
description: A list of the published rooms on the server.
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
@ -168,9 +168,9 @@ paths:
|
||||||
tags:
|
tags:
|
||||||
- Room discovery
|
- Room discovery
|
||||||
post:
|
post:
|
||||||
summary: Lists the public rooms on the server with optional filter.
|
summary: Lists a server's published room directory with an optional filter
|
||||||
description: |-
|
description: |-
|
||||||
Lists the public rooms on the server, with optional filter.
|
Lists a server's published room directory with an optional filter.
|
||||||
|
|
||||||
This API returns paginated responses. The rooms are ordered by the number
|
This API returns paginated responses. The rooms are ordered by the number
|
||||||
of joined members, with the largest rooms first.
|
of joined members, with the largest rooms first.
|
||||||
|
|
@ -182,8 +182,8 @@ paths:
|
||||||
- in: query
|
- in: query
|
||||||
name: server
|
name: server
|
||||||
description: |-
|
description: |-
|
||||||
The server to fetch the public room lists from. Defaults to the
|
The server to fetch the published room directory from. Defaults
|
||||||
local server. Case sensitive.
|
to the local server. Case sensitive.
|
||||||
schema:
|
schema:
|
||||||
type: string
|
type: string
|
||||||
requestBody:
|
requestBody:
|
||||||
|
|
@ -253,7 +253,7 @@ paths:
|
||||||
required: true
|
required: true
|
||||||
responses:
|
responses:
|
||||||
"200":
|
"200":
|
||||||
description: A list of the rooms on the server.
|
description: A filtered list of the published rooms on the server.
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
|
||||||
|
|
@ -214,7 +214,7 @@ paths:
|
||||||
- public
|
- public
|
||||||
description: |-
|
description: |-
|
||||||
Whether this room is visible to the `/publicRooms` API
|
Whether this room is visible to the `/publicRooms` API
|
||||||
or not."
|
or not.
|
||||||
account_data:
|
account_data:
|
||||||
type: array
|
type: array
|
||||||
description: |-
|
description: |-
|
||||||
|
|
|
||||||
242
data/api/client-server/password_management.yaml
Normal file
242
data/api/client-server/password_management.yaml
Normal file
|
|
@ -0,0 +1,242 @@
|
||||||
|
# Copyright 2016 OpenMarket Ltd
|
||||||
|
# Copyright 2022 The Matrix.org Foundation C.I.C.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
openapi: 3.1.0
|
||||||
|
info:
|
||||||
|
title: Matrix Client-Server Password Management API
|
||||||
|
version: 1.0.0
|
||||||
|
paths:
|
||||||
|
/account/password:
|
||||||
|
post:
|
||||||
|
summary: Changes a user's password.
|
||||||
|
description: |-
|
||||||
|
Changes the password for an account on this homeserver.
|
||||||
|
|
||||||
|
This API endpoint uses the [User-Interactive Authentication API](/client-server-api/#user-interactive-authentication-api) to
|
||||||
|
ensure the user changing the password is actually the owner of the
|
||||||
|
account.
|
||||||
|
|
||||||
|
An access token should be submitted to this endpoint if the client has
|
||||||
|
an active session.
|
||||||
|
|
||||||
|
The homeserver may change the flows available depending on whether a
|
||||||
|
valid access token is provided. The homeserver SHOULD NOT revoke the
|
||||||
|
access token provided in the request. Whether other access tokens for
|
||||||
|
the user are revoked depends on the request parameters.
|
||||||
|
security:
|
||||||
|
- {}
|
||||||
|
- accessTokenQuery: []
|
||||||
|
- accessTokenBearer: []
|
||||||
|
operationId: changePassword
|
||||||
|
requestBody:
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
new_password:
|
||||||
|
type: string
|
||||||
|
description: The new password for the account.
|
||||||
|
example: ihatebananas
|
||||||
|
logout_devices:
|
||||||
|
type: boolean
|
||||||
|
description: |-
|
||||||
|
Whether the user's other access tokens, and their associated devices, should be
|
||||||
|
revoked if the request succeeds. Defaults to true.
|
||||||
|
|
||||||
|
When `false`, the server can still take advantage of the [soft logout method](/client-server-api/#soft-logout)
|
||||||
|
for the user's remaining devices.
|
||||||
|
example: true
|
||||||
|
auth:
|
||||||
|
description: Additional authentication information for the user-interactive
|
||||||
|
authentication API.
|
||||||
|
allOf:
|
||||||
|
- $ref: definitions/auth_data.yaml
|
||||||
|
required:
|
||||||
|
- new_password
|
||||||
|
required: true
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: The password has been changed.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {}
|
||||||
|
"401":
|
||||||
|
description: The homeserver requires additional authentication information.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/auth_response.yaml
|
||||||
|
"429":
|
||||||
|
description: This request was rate-limited.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/rate_limited.yaml
|
||||||
|
tags:
|
||||||
|
- Account management
|
||||||
|
/account/password/email/requestToken:
|
||||||
|
post:
|
||||||
|
summary: Requests a validation token be sent to the given email address for the
|
||||||
|
purpose of resetting a user's password
|
||||||
|
description: |-
|
||||||
|
The homeserver must check that the given email address **is
|
||||||
|
associated** with an account on this homeserver. This API should be
|
||||||
|
used to request validation tokens when authenticating for the
|
||||||
|
`/account/password` endpoint.
|
||||||
|
|
||||||
|
This API's parameters and response are identical to that of the
|
||||||
|
[`/register/email/requestToken`](/client-server-api/#post_matrixclientv3registeremailrequesttoken)
|
||||||
|
endpoint, except that
|
||||||
|
`M_THREEPID_NOT_FOUND` may be returned if no account matching the
|
||||||
|
given email address could be found. The server may instead send an
|
||||||
|
email to the given address prompting the user to create an account.
|
||||||
|
`M_THREEPID_IN_USE` may not be returned.
|
||||||
|
|
||||||
|
The homeserver should validate the email itself, either by sending a
|
||||||
|
validation email itself or by using a service it has control over.
|
||||||
|
operationId: requestTokenToResetPasswordEmail
|
||||||
|
requestBody:
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/request_email_validation.yaml
|
||||||
|
required: true
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: An email was sent to the given address.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/request_token_response.yaml
|
||||||
|
"400":
|
||||||
|
description: |-
|
||||||
|
The referenced third-party identifier is not recognised by the
|
||||||
|
homeserver, or the request was invalid. The error code `M_SERVER_NOT_TRUSTED`
|
||||||
|
can be returned if the server does not trust/support the identity server
|
||||||
|
provided in the request.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/error.yaml
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {
|
||||||
|
"errcode": "M_THREEPID_NOT_FOUND",
|
||||||
|
"error": "Email not found"
|
||||||
|
}
|
||||||
|
"403":
|
||||||
|
description: |-
|
||||||
|
The homeserver does not allow the third-party identifier as a
|
||||||
|
contact option.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/error.yaml
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {
|
||||||
|
"errcode": "M_THREEPID_DENIED",
|
||||||
|
"error": "Third-party identifier is not allowed"
|
||||||
|
}
|
||||||
|
tags:
|
||||||
|
- Account management
|
||||||
|
/account/password/msisdn/requestToken:
|
||||||
|
post:
|
||||||
|
summary: Requests a validation token be sent to the given phone number for the
|
||||||
|
purpose of resetting a user's password.
|
||||||
|
description: |-
|
||||||
|
The homeserver must check that the given phone number **is
|
||||||
|
associated** with an account on this homeserver. This API should be
|
||||||
|
used to request validation tokens when authenticating for the
|
||||||
|
`/account/password` endpoint.
|
||||||
|
|
||||||
|
This API's parameters and response are identical to that of the
|
||||||
|
[`/register/msisdn/requestToken`](/client-server-api/#post_matrixclientv3registermsisdnrequesttoken)
|
||||||
|
endpoint, except that
|
||||||
|
`M_THREEPID_NOT_FOUND` may be returned if no account matching the
|
||||||
|
given phone number could be found. The server may instead send the SMS
|
||||||
|
to the given phone number prompting the user to create an account.
|
||||||
|
`M_THREEPID_IN_USE` may not be returned.
|
||||||
|
|
||||||
|
The homeserver should validate the phone number itself, either by sending a
|
||||||
|
validation message itself or by using a service it has control over.
|
||||||
|
operationId: requestTokenToResetPasswordMSISDN
|
||||||
|
requestBody:
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/request_msisdn_validation.yaml
|
||||||
|
required: true
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: An SMS message was sent to the given phone number.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/request_token_response.yaml
|
||||||
|
"400":
|
||||||
|
description: |-
|
||||||
|
The referenced third-party identifier is not recognised by the
|
||||||
|
homeserver, or the request was invalid. The error code `M_SERVER_NOT_TRUSTED`
|
||||||
|
can be returned if the server does not trust/support the identity server
|
||||||
|
provided in the request.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/error.yaml
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {
|
||||||
|
"errcode": "M_THREEPID_NOT_FOUND",
|
||||||
|
"error": "Phone number not found"
|
||||||
|
}
|
||||||
|
"403":
|
||||||
|
description: |-
|
||||||
|
The homeserver does not allow the third-party identifier as a
|
||||||
|
contact option.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/error.yaml
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {
|
||||||
|
"errcode": "M_THREEPID_DENIED",
|
||||||
|
"error": "Third-party identifier is not allowed"
|
||||||
|
}
|
||||||
|
tags:
|
||||||
|
- Account management
|
||||||
|
servers:
|
||||||
|
- url: "{protocol}://{hostname}{basePath}"
|
||||||
|
variables:
|
||||||
|
protocol:
|
||||||
|
enum:
|
||||||
|
- http
|
||||||
|
- https
|
||||||
|
default: https
|
||||||
|
hostname:
|
||||||
|
default: localhost:8008
|
||||||
|
basePath:
|
||||||
|
default: /_matrix/client/v3
|
||||||
|
components:
|
||||||
|
securitySchemes:
|
||||||
|
accessTokenQuery:
|
||||||
|
$ref: definitions/security.yaml#/accessTokenQuery
|
||||||
|
accessTokenBearer:
|
||||||
|
$ref: definitions/security.yaml#/accessTokenBearer
|
||||||
|
|
@ -373,315 +373,6 @@ paths:
|
||||||
}
|
}
|
||||||
tags:
|
tags:
|
||||||
- Account management
|
- Account management
|
||||||
/account/password:
|
|
||||||
post:
|
|
||||||
summary: Changes a user's password.
|
|
||||||
description: |-
|
|
||||||
Changes the password for an account on this homeserver.
|
|
||||||
|
|
||||||
This API endpoint uses the [User-Interactive Authentication API](/client-server-api/#user-interactive-authentication-api) to
|
|
||||||
ensure the user changing the password is actually the owner of the
|
|
||||||
account.
|
|
||||||
|
|
||||||
An access token should be submitted to this endpoint if the client has
|
|
||||||
an active session.
|
|
||||||
|
|
||||||
The homeserver may change the flows available depending on whether a
|
|
||||||
valid access token is provided. The homeserver SHOULD NOT revoke the
|
|
||||||
access token provided in the request. Whether other access tokens for
|
|
||||||
the user are revoked depends on the request parameters.
|
|
||||||
security:
|
|
||||||
- {}
|
|
||||||
- accessTokenQuery: []
|
|
||||||
- accessTokenBearer: []
|
|
||||||
operationId: changePassword
|
|
||||||
requestBody:
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
new_password:
|
|
||||||
type: string
|
|
||||||
description: The new password for the account.
|
|
||||||
example: ihatebananas
|
|
||||||
logout_devices:
|
|
||||||
type: boolean
|
|
||||||
description: |-
|
|
||||||
Whether the user's other access tokens, and their associated devices, should be
|
|
||||||
revoked if the request succeeds. Defaults to true.
|
|
||||||
|
|
||||||
When `false`, the server can still take advantage of the [soft logout method](/client-server-api/#soft-logout)
|
|
||||||
for the user's remaining devices.
|
|
||||||
example: true
|
|
||||||
auth:
|
|
||||||
description: Additional authentication information for the user-interactive
|
|
||||||
authentication API.
|
|
||||||
allOf:
|
|
||||||
- $ref: definitions/auth_data.yaml
|
|
||||||
required:
|
|
||||||
- new_password
|
|
||||||
required: true
|
|
||||||
responses:
|
|
||||||
"200":
|
|
||||||
description: The password has been changed.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
type: object
|
|
||||||
examples:
|
|
||||||
response:
|
|
||||||
value: {}
|
|
||||||
"401":
|
|
||||||
description: The homeserver requires additional authentication information.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/auth_response.yaml
|
|
||||||
"429":
|
|
||||||
description: This request was rate-limited.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/errors/rate_limited.yaml
|
|
||||||
tags:
|
|
||||||
- Account management
|
|
||||||
/account/password/email/requestToken:
|
|
||||||
post:
|
|
||||||
summary: Requests a validation token be sent to the given email address for the
|
|
||||||
purpose of resetting a user's password
|
|
||||||
description: |-
|
|
||||||
The homeserver must check that the given email address **is
|
|
||||||
associated** with an account on this homeserver. This API should be
|
|
||||||
used to request validation tokens when authenticating for the
|
|
||||||
`/account/password` endpoint.
|
|
||||||
|
|
||||||
This API's parameters and response are identical to that of the
|
|
||||||
[`/register/email/requestToken`](/client-server-api/#post_matrixclientv3registeremailrequesttoken)
|
|
||||||
endpoint, except that
|
|
||||||
`M_THREEPID_NOT_FOUND` may be returned if no account matching the
|
|
||||||
given email address could be found. The server may instead send an
|
|
||||||
email to the given address prompting the user to create an account.
|
|
||||||
`M_THREEPID_IN_USE` may not be returned.
|
|
||||||
|
|
||||||
The homeserver should validate the email itself, either by sending a
|
|
||||||
validation email itself or by using a service it has control over.
|
|
||||||
operationId: requestTokenToResetPasswordEmail
|
|
||||||
requestBody:
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/request_email_validation.yaml
|
|
||||||
required: true
|
|
||||||
responses:
|
|
||||||
"200":
|
|
||||||
description: An email was sent to the given address.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/request_token_response.yaml
|
|
||||||
"400":
|
|
||||||
description: |-
|
|
||||||
The referenced third-party identifier is not recognised by the
|
|
||||||
homeserver, or the request was invalid. The error code `M_SERVER_NOT_TRUSTED`
|
|
||||||
can be returned if the server does not trust/support the identity server
|
|
||||||
provided in the request.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/errors/error.yaml
|
|
||||||
examples:
|
|
||||||
response:
|
|
||||||
value: {
|
|
||||||
"errcode": "M_THREEPID_NOT_FOUND",
|
|
||||||
"error": "Email not found"
|
|
||||||
}
|
|
||||||
"403":
|
|
||||||
description: |-
|
|
||||||
The homeserver does not allow the third-party identifier as a
|
|
||||||
contact option.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/errors/error.yaml
|
|
||||||
examples:
|
|
||||||
response:
|
|
||||||
value: {
|
|
||||||
"errcode": "M_THREEPID_DENIED",
|
|
||||||
"error": "Third-party identifier is not allowed"
|
|
||||||
}
|
|
||||||
tags:
|
|
||||||
- Account management
|
|
||||||
/account/password/msisdn/requestToken:
|
|
||||||
post:
|
|
||||||
summary: Requests a validation token be sent to the given phone number for the
|
|
||||||
purpose of resetting a user's password.
|
|
||||||
description: |-
|
|
||||||
The homeserver must check that the given phone number **is
|
|
||||||
associated** with an account on this homeserver. This API should be
|
|
||||||
used to request validation tokens when authenticating for the
|
|
||||||
`/account/password` endpoint.
|
|
||||||
|
|
||||||
This API's parameters and response are identical to that of the
|
|
||||||
[`/register/msisdn/requestToken`](/client-server-api/#post_matrixclientv3registermsisdnrequesttoken)
|
|
||||||
endpoint, except that
|
|
||||||
`M_THREEPID_NOT_FOUND` may be returned if no account matching the
|
|
||||||
given phone number could be found. The server may instead send the SMS
|
|
||||||
to the given phone number prompting the user to create an account.
|
|
||||||
`M_THREEPID_IN_USE` may not be returned.
|
|
||||||
|
|
||||||
The homeserver should validate the phone number itself, either by sending a
|
|
||||||
validation message itself or by using a service it has control over.
|
|
||||||
operationId: requestTokenToResetPasswordMSISDN
|
|
||||||
requestBody:
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/request_msisdn_validation.yaml
|
|
||||||
required: true
|
|
||||||
responses:
|
|
||||||
"200":
|
|
||||||
description: An SMS message was sent to the given phone number.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/request_token_response.yaml
|
|
||||||
"400":
|
|
||||||
description: |-
|
|
||||||
The referenced third-party identifier is not recognised by the
|
|
||||||
homeserver, or the request was invalid. The error code `M_SERVER_NOT_TRUSTED`
|
|
||||||
can be returned if the server does not trust/support the identity server
|
|
||||||
provided in the request.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/errors/error.yaml
|
|
||||||
examples:
|
|
||||||
response:
|
|
||||||
value: {
|
|
||||||
"errcode": "M_THREEPID_NOT_FOUND",
|
|
||||||
"error": "Phone number not found"
|
|
||||||
}
|
|
||||||
"403":
|
|
||||||
description: |-
|
|
||||||
The homeserver does not allow the third-party identifier as a
|
|
||||||
contact option.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/errors/error.yaml
|
|
||||||
examples:
|
|
||||||
response:
|
|
||||||
value: {
|
|
||||||
"errcode": "M_THREEPID_DENIED",
|
|
||||||
"error": "Third-party identifier is not allowed"
|
|
||||||
}
|
|
||||||
tags:
|
|
||||||
- Account management
|
|
||||||
/account/deactivate:
|
|
||||||
post:
|
|
||||||
summary: Deactivate a user's account.
|
|
||||||
description: |-
|
|
||||||
Deactivate the user's account, removing all ability for the user to
|
|
||||||
login again.
|
|
||||||
|
|
||||||
This API endpoint uses the [User-Interactive Authentication API](/client-server-api/#user-interactive-authentication-api).
|
|
||||||
|
|
||||||
An access token should be submitted to this endpoint if the client has
|
|
||||||
an active session.
|
|
||||||
|
|
||||||
The homeserver may change the flows available depending on whether a
|
|
||||||
valid access token is provided.
|
|
||||||
|
|
||||||
Unlike other endpoints, this endpoint does not take an `id_access_token`
|
|
||||||
parameter because the homeserver is expected to sign the request to the
|
|
||||||
identity server instead.
|
|
||||||
security:
|
|
||||||
- {}
|
|
||||||
- accessTokenQuery: []
|
|
||||||
- accessTokenBearer: []
|
|
||||||
operationId: deactivateAccount
|
|
||||||
requestBody:
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
auth:
|
|
||||||
description: Additional authentication information for the user-interactive
|
|
||||||
authentication API.
|
|
||||||
allOf:
|
|
||||||
- $ref: definitions/auth_data.yaml
|
|
||||||
id_server:
|
|
||||||
type: string
|
|
||||||
description: |-
|
|
||||||
The identity server to unbind all of the user's 3PIDs from.
|
|
||||||
If not provided, the homeserver MUST use the `id_server`
|
|
||||||
that was originally use to bind each identifier. If the
|
|
||||||
homeserver does not know which `id_server` that was,
|
|
||||||
it must return an `id_server_unbind_result` of
|
|
||||||
`no-support`.
|
|
||||||
example: example.org
|
|
||||||
erase:
|
|
||||||
x-addedInMatrixVersion: "1.10"
|
|
||||||
type: boolean
|
|
||||||
description: |-
|
|
||||||
Whether the user would like their content to be erased as
|
|
||||||
much as possible from the server.
|
|
||||||
|
|
||||||
Erasure means that any users (or servers) which join the
|
|
||||||
room after the erasure request are served redacted copies of
|
|
||||||
the events sent by this account. Users which had visibility
|
|
||||||
on those events prior to the erasure are still able to see
|
|
||||||
unredacted copies. No redactions are sent and the erasure
|
|
||||||
request is not shared over federation, so other servers
|
|
||||||
might still serve unredacted copies.
|
|
||||||
|
|
||||||
The server should additionally erase any non-event data
|
|
||||||
associated with the user, such as [account data](/client-server-api/#client-config)
|
|
||||||
and [contact 3PIDs](/client-server-api/#adding-account-administrative-contact-information).
|
|
||||||
|
|
||||||
Defaults to `false` if not present.
|
|
||||||
required: true
|
|
||||||
responses:
|
|
||||||
"200":
|
|
||||||
description: The account has been deactivated.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
id_server_unbind_result:
|
|
||||||
type: string
|
|
||||||
enum:
|
|
||||||
- success
|
|
||||||
- no-support
|
|
||||||
description: |-
|
|
||||||
An indicator as to whether or not the homeserver was able to unbind
|
|
||||||
the user's 3PIDs from the identity server(s). `success` indicates
|
|
||||||
that all identifiers have been unbound from the identity server while
|
|
||||||
`no-support` indicates that one or more identifiers failed to unbind
|
|
||||||
due to the identity server refusing the request or the homeserver
|
|
||||||
being unable to determine an identity server to unbind from. This
|
|
||||||
must be `success` if the homeserver has no identifiers to unbind
|
|
||||||
for the user.
|
|
||||||
example: success
|
|
||||||
required:
|
|
||||||
- id_server_unbind_result
|
|
||||||
"401":
|
|
||||||
description: The homeserver requires additional authentication information.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/auth_response.yaml
|
|
||||||
"429":
|
|
||||||
description: This request was rate-limited.
|
|
||||||
content:
|
|
||||||
application/json:
|
|
||||||
schema:
|
|
||||||
$ref: definitions/errors/rate_limited.yaml
|
|
||||||
tags:
|
|
||||||
- Account management
|
|
||||||
/register/available:
|
/register/available:
|
||||||
get:
|
get:
|
||||||
summary: Checks to see if a username is available on the server.
|
summary: Checks to see if a username is available on the server.
|
||||||
|
|
|
||||||
|
|
@ -45,7 +45,9 @@ paths:
|
||||||
properties:
|
properties:
|
||||||
reason:
|
reason:
|
||||||
type: string
|
type: string
|
||||||
description: The reason the room is being reported.
|
description: The reason the room is being reported. May be blank.
|
||||||
|
required:
|
||||||
|
- reason
|
||||||
required: true
|
required: true
|
||||||
security:
|
security:
|
||||||
- accessTokenQuery: []
|
- accessTokenQuery: []
|
||||||
|
|
@ -89,11 +91,10 @@ paths:
|
||||||
the appropriate people. The caller must be joined to the room to report
|
the appropriate people. The caller must be joined to the room to report
|
||||||
it.
|
it.
|
||||||
|
|
||||||
It might be possible for clients to deduce whether an event exists by
|
Furthermore, it might be possible for clients to deduce whether a reported
|
||||||
timing the response, as only a report for an event that does exist
|
event exists by timing the response. This is because only a report for an
|
||||||
will require the homeserver to check whether a user is joined to
|
existing event will require the homeserver to do further processing. To
|
||||||
the room. To combat this, homeserver implementations should add
|
combat this, homeservers MAY add a random delay when generating a response.
|
||||||
a random delay when generating a response.
|
|
||||||
operationId: reportEvent
|
operationId: reportEvent
|
||||||
parameters:
|
parameters:
|
||||||
- in: path
|
- in: path
|
||||||
|
|
@ -164,6 +165,88 @@ paths:
|
||||||
}
|
}
|
||||||
tags:
|
tags:
|
||||||
- Reporting content
|
- Reporting content
|
||||||
|
"/users/{userId}/report":
|
||||||
|
post:
|
||||||
|
x-addedInMatrixVersion: "1.14"
|
||||||
|
summary: Report a user as inappropriate.
|
||||||
|
description: |-
|
||||||
|
Reports a user as inappropriate to the server, which may then notify
|
||||||
|
the appropriate people. How such information is delivered is left up to
|
||||||
|
implementations. The caller is not required to be joined to any rooms
|
||||||
|
that the reported user is joined to.
|
||||||
|
|
||||||
|
Clients may wish to [ignore](#ignoring-users) users after reporting them.
|
||||||
|
|
||||||
|
Clients could infer whether a reported user exists based on the 404 response.
|
||||||
|
Homeservers that wish to conceal this information MAY return 200 responses
|
||||||
|
regardless of the existence of the reported user.
|
||||||
|
|
||||||
|
Furthermore, it might be possible for clients to deduce whether a reported
|
||||||
|
user exists by timing the response. This is because only a report for an
|
||||||
|
existing user will require the homeserver to do further processing. To
|
||||||
|
combat this, homeservers MAY add a random delay when generating a response.
|
||||||
|
operationId: reportUser
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: userId
|
||||||
|
description: The user being reported.
|
||||||
|
required: true
|
||||||
|
example: "@someguy:example.com"
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
|
format: mx-user-id
|
||||||
|
pattern: "^@"
|
||||||
|
requestBody:
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
example: {
|
||||||
|
"reason": "this makes me sad"
|
||||||
|
}
|
||||||
|
properties:
|
||||||
|
reason:
|
||||||
|
type: string
|
||||||
|
description: The reason the room is being reported. May be blank.
|
||||||
|
required:
|
||||||
|
- reason
|
||||||
|
required: true
|
||||||
|
security:
|
||||||
|
- accessTokenQuery: []
|
||||||
|
- accessTokenBearer: []
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: |
|
||||||
|
The user has been reported successfully or the server chose
|
||||||
|
to not disclose whether the users exists.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {}
|
||||||
|
"404":
|
||||||
|
description: |-
|
||||||
|
The user was not found on the homeserver.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/error.yaml
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {
|
||||||
|
"errcode": "M_NOT_FOUND",
|
||||||
|
"error": "The user was not found."
|
||||||
|
}
|
||||||
|
"429":
|
||||||
|
description: This request was rate-limited.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/rate_limited.yaml
|
||||||
|
tags:
|
||||||
|
- Reporting content
|
||||||
servers:
|
servers:
|
||||||
- url: "{protocol}://{hostname}{basePath}"
|
- url: "{protocol}://{hostname}{basePath}"
|
||||||
variables:
|
variables:
|
||||||
|
|
|
||||||
|
|
@ -96,7 +96,7 @@ paths:
|
||||||
- public
|
- public
|
||||||
description: |-
|
description: |-
|
||||||
Whether this room is visible to the `/publicRooms` API
|
Whether this room is visible to the `/publicRooms` API
|
||||||
or not."
|
or not.
|
||||||
account_data:
|
account_data:
|
||||||
type: array
|
type: array
|
||||||
description: The private data that this user has attached to this room.
|
description: The private data that this user has attached to this room.
|
||||||
|
|
|
||||||
143
data/api/client-server/room_summary.yaml
Normal file
143
data/api/client-server/room_summary.yaml
Normal file
|
|
@ -0,0 +1,143 @@
|
||||||
|
# Copyright 2025 The Matrix.org Foundation C.I.C.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
openapi: 3.1.0
|
||||||
|
info:
|
||||||
|
title: Matrix Client-Server Room Summary API
|
||||||
|
version: 1.0.0
|
||||||
|
paths:
|
||||||
|
"/room_summary/{roomIdOrAlias}":
|
||||||
|
get:
|
||||||
|
x-addedInMatrixVersion: "1.15"
|
||||||
|
summary: Retrieves a summary for a room.
|
||||||
|
description: |-
|
||||||
|
Retrieves a summary for a room.
|
||||||
|
|
||||||
|
Clients should note that requests for rooms where the user's membership
|
||||||
|
is `invite` or `knock` might yield outdated, partial or even no data
|
||||||
|
since the server may not have access to the current state of the room.
|
||||||
|
|
||||||
|
Servers MAY allow unauthenticated access to this API if at least one of
|
||||||
|
the following conditions holds true:
|
||||||
|
|
||||||
|
- The room has a [join rule](#mroomjoin_rules) of `public`, `knock` or
|
||||||
|
`knock_restricted`.
|
||||||
|
- The room has a `world_readable` [history visibility](#room-history-visibility).
|
||||||
|
|
||||||
|
Servers should consider rate limiting requests that require a federation
|
||||||
|
request more heavily if the client is unauthenticated.
|
||||||
|
operationId: getRoomSummary
|
||||||
|
security:
|
||||||
|
- signedRequest: []
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: roomIdOrAlias
|
||||||
|
description: The room identifier or alias to summarise.
|
||||||
|
required: true
|
||||||
|
example: "#monkeys:matrix.org"
|
||||||
|
schema:
|
||||||
|
oneOf:
|
||||||
|
- type: string
|
||||||
|
format: mx-room-id
|
||||||
|
pattern: "^!"
|
||||||
|
- type: string
|
||||||
|
format: mx-room-alias
|
||||||
|
pattern: "^#"
|
||||||
|
- in: query
|
||||||
|
name: via
|
||||||
|
description: |-
|
||||||
|
The servers to attempt to request the summary from when
|
||||||
|
the local server cannot generate it (for instance, because
|
||||||
|
it has no local user in the room).
|
||||||
|
example:
|
||||||
|
- matrix.org
|
||||||
|
- elsewhere.ca
|
||||||
|
schema:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
format: mx-server-name
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: A summary of the room.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
description: A summary of the room.
|
||||||
|
allOf:
|
||||||
|
- $ref: ../client-server/definitions/room_summary.yaml
|
||||||
|
- type: object
|
||||||
|
properties:
|
||||||
|
membership:
|
||||||
|
description: |-
|
||||||
|
The membership state of the user if the user is joined to the room. Absent
|
||||||
|
if the API was called unauthenticated.
|
||||||
|
enum:
|
||||||
|
- invite
|
||||||
|
- join
|
||||||
|
- knock
|
||||||
|
- leave
|
||||||
|
- ban
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- guest_can_join
|
||||||
|
- num_joined_members
|
||||||
|
- room_id
|
||||||
|
- world_readable
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {
|
||||||
|
room_id: "!ol19s:bleecker.street",
|
||||||
|
avatar_url: "mxc://bleecker.street/CHEDDARandBRIE",
|
||||||
|
guest_can_join: false,
|
||||||
|
name: "CHEESE",
|
||||||
|
num_joined_members: 37,
|
||||||
|
topic: "Tasty tasty cheese",
|
||||||
|
world_readable: true,
|
||||||
|
join_rule: "public",
|
||||||
|
room_type: "m.space",
|
||||||
|
membership: "invite",
|
||||||
|
encryption: "m.megolm.v1.aes-sha2",
|
||||||
|
room_version: "9001",
|
||||||
|
}
|
||||||
|
"404":
|
||||||
|
description: |-
|
||||||
|
The room could not be found.
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: ../client-server/definitions/errors/error.yaml
|
||||||
|
examples:
|
||||||
|
response:
|
||||||
|
value: {
|
||||||
|
"errcode": "M_NOT_FOUND",
|
||||||
|
"error": "Room not found."
|
||||||
|
}
|
||||||
|
servers:
|
||||||
|
- url: "{protocol}://{hostname}{basePath}"
|
||||||
|
variables:
|
||||||
|
protocol:
|
||||||
|
enum:
|
||||||
|
- http
|
||||||
|
- https
|
||||||
|
default: https
|
||||||
|
hostname:
|
||||||
|
default: localhost:8008
|
||||||
|
basePath:
|
||||||
|
default: /_matrix/client/v1
|
||||||
|
components:
|
||||||
|
securitySchemes:
|
||||||
|
accessTokenQuery:
|
||||||
|
$ref: definitions/security.yaml#/accessTokenQuery
|
||||||
|
accessTokenBearer:
|
||||||
|
$ref: definitions/security.yaml#/accessTokenBearer
|
||||||
|
|
@ -88,18 +88,24 @@ paths:
|
||||||
properties:
|
properties:
|
||||||
rooms:
|
rooms:
|
||||||
type: array
|
type: array
|
||||||
description: The rooms for the current page, with the current filters.
|
description: |-
|
||||||
|
The rooms for the current page, with the current filters.
|
||||||
|
|
||||||
|
The server should return any rooms where at least one of the following conditions is true:
|
||||||
|
|
||||||
|
* The requesting user is currently a member (their [room membership](#room-membership) is `join`).
|
||||||
|
* The requesting user already has permission to join, i.e. one of the following:
|
||||||
|
* The user's room membership is `invite`.
|
||||||
|
* The room's [join rules](#mroomjoin_rules) are set to `public`.
|
||||||
|
* The room's join rules are set to [`restricted`](#restricted-rooms), provided the user meets one of the specified conditions.
|
||||||
|
* The room is "knockable" (the room's join rules are set to `knock`, or `knock_restricted`, in a room version that supports those settings).
|
||||||
|
* The room's [`m.room.history_visibility`](#room-history-visibility) is set to `world_readable`.
|
||||||
items:
|
items:
|
||||||
allOf:
|
allOf:
|
||||||
- $ref: definitions/public_rooms_chunk.yaml
|
- $ref: definitions/room_summary.yaml
|
||||||
- type: object
|
- type: object
|
||||||
title: SpaceHierarchyRoomsChunk
|
title: SpaceHierarchyRoomsChunk
|
||||||
properties:
|
properties:
|
||||||
room_type:
|
|
||||||
type: string
|
|
||||||
description: The `type` of room (from
|
|
||||||
[`m.room.create`](/client-server-api/#mroomcreate)),
|
|
||||||
if any.
|
|
||||||
children_state:
|
children_state:
|
||||||
type: array
|
type: array
|
||||||
description: |-
|
description: |-
|
||||||
|
|
@ -119,6 +125,14 @@ paths:
|
||||||
description: The `origin_server_ts` for the event.
|
description: The `origin_server_ts` for the event.
|
||||||
required:
|
required:
|
||||||
- origin_server_ts
|
- origin_server_ts
|
||||||
|
room_type:
|
||||||
|
x-addedInMatrixVersion: "1.4" # Extends room_summary.yaml
|
||||||
|
allowed_room_ids:
|
||||||
|
x-addedInMatrixVersion: "1.15" # Extends room_summary.yaml
|
||||||
|
encryption:
|
||||||
|
x-addedInMatrixVersion: "1.15" # Extends room_summary.yaml
|
||||||
|
room_version:
|
||||||
|
x-addedInMatrixVersion: "1.15" # Extends room_summary.yaml
|
||||||
required:
|
required:
|
||||||
- children_state
|
- children_state
|
||||||
next_batch:
|
next_batch:
|
||||||
|
|
|
||||||
|
|
@ -22,9 +22,12 @@ paths:
|
||||||
description: |-
|
description: |-
|
||||||
Gets server admin contact and support page of the domain.
|
Gets server admin contact and support page of the domain.
|
||||||
|
|
||||||
Like the [well-known discovery URI](/client-server-api/#well-known-uri),
|
{{% boxes/note %}}
|
||||||
this should be accessed with the hostname of the homeserver by making a
|
Like the [well-known discovery URI](/client-server-api/#well-known-uris),
|
||||||
|
this endpoint should be accessed with the hostname of the homeserver's
|
||||||
|
[server name](/appendices/#server-name) by making a
|
||||||
GET request to `https://hostname/.well-known/matrix/support`.
|
GET request to `https://hostname/.well-known/matrix/support`.
|
||||||
|
{{% /boxes/note %}}
|
||||||
|
|
||||||
Note that this endpoint is not necessarily handled by the homeserver.
|
Note that this endpoint is not necessarily handled by the homeserver.
|
||||||
It may be served by another webserver, used for discovering support
|
It may be served by another webserver, used for discovering support
|
||||||
|
|
|
||||||
|
|
@ -441,17 +441,57 @@ paths:
|
||||||
"state": {
|
"state": {
|
||||||
"events": [
|
"events": [
|
||||||
{
|
{
|
||||||
"$ref": "../../event-schemas/examples/m.room.member.yaml"
|
"content": {
|
||||||
|
"avatar_url": "mxc://example.org/SFHyPlCeYUSFFxlgbQYZmoEoe",
|
||||||
|
"displayname": "Example user",
|
||||||
|
"membership": "join"
|
||||||
|
},
|
||||||
|
"event_id": "$143273976499sgjks:example.org",
|
||||||
|
"origin_server_ts": 1432735824653,
|
||||||
|
"sender": "@example:example.org",
|
||||||
|
"state_key": "@example:example.org",
|
||||||
|
"type": "m.room.member",
|
||||||
|
"unsigned": {
|
||||||
|
"age": 45603,
|
||||||
|
"membership": "join"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"timeline": {
|
"timeline": {
|
||||||
"events": [
|
"events": [
|
||||||
{
|
{
|
||||||
"$ref": "../../event-schemas/examples/m.room.member.yaml"
|
"content": {
|
||||||
|
"avatar_url": "mxc://example.org/SEsfnsuifSDFSSEF",
|
||||||
|
"displayname": "Alice Margatroid",
|
||||||
|
"membership": "join",
|
||||||
|
"reason": "Looking for support"
|
||||||
|
},
|
||||||
|
"event_id": "$143273582443PhrSn:example.org",
|
||||||
|
"origin_server_ts": 1432735824653,
|
||||||
|
"sender": "@alice:example.org",
|
||||||
|
"state_key": "@alice:example.org",
|
||||||
|
"type": "m.room.member",
|
||||||
|
"unsigned": {
|
||||||
|
"age": 1234,
|
||||||
|
"membership": "join"
|
||||||
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"$ref": "../../event-schemas/examples/m.room.message$m.text.yaml"
|
"content": {
|
||||||
|
"body": "This is an example text message",
|
||||||
|
"format": "org.matrix.custom.html",
|
||||||
|
"formatted_body": "<b>This is an example text message</b>",
|
||||||
|
"msgtype": "m.text"
|
||||||
|
},
|
||||||
|
"event_id": "$143273582443PhrSn:example.org",
|
||||||
|
"origin_server_ts": 1432735824653,
|
||||||
|
"sender": "@example:example.org",
|
||||||
|
"type": "m.room.message",
|
||||||
|
"unsigned": {
|
||||||
|
"age": 1234,
|
||||||
|
"membership": "join"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"limited": true,
|
"limited": true,
|
||||||
|
|
|
||||||
|
|
@ -57,9 +57,6 @@ paths:
|
||||||
- A signature of the token, signed with the identity server's private key
|
- A signature of the token, signed with the identity server's private key
|
||||||
|
|
||||||
- The matrix user ID who invited them to the room
|
- The matrix user ID who invited them to the room
|
||||||
|
|
||||||
If a token is requested from the identity server, the homeserver will
|
|
||||||
append a `m.room.third_party_invite` event to the room.
|
|
||||||
operationId: inviteBy3PID
|
operationId: inviteBy3PID
|
||||||
security:
|
security:
|
||||||
- accessTokenQuery: []
|
- accessTokenQuery: []
|
||||||
|
|
@ -72,41 +69,13 @@ paths:
|
||||||
example: "!d41d8cd:matrix.org"
|
example: "!d41d8cd:matrix.org"
|
||||||
schema:
|
schema:
|
||||||
type: string
|
type: string
|
||||||
|
format: mx-room-id
|
||||||
|
pattern: "^!"
|
||||||
requestBody:
|
requestBody:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
type: object
|
$ref: definitions/invite_3pid.yaml
|
||||||
example: {
|
|
||||||
"id_server": "matrix.org",
|
|
||||||
"id_access_token": "abc123_OpaqueString",
|
|
||||||
"medium": "email",
|
|
||||||
"address": "cheeky@monkey.com"
|
|
||||||
}
|
|
||||||
properties:
|
|
||||||
id_server:
|
|
||||||
type: string
|
|
||||||
description: The hostname+port of the identity server which should be used for
|
|
||||||
third-party identifier lookups.
|
|
||||||
id_access_token:
|
|
||||||
type: string
|
|
||||||
description: |-
|
|
||||||
An access token previously registered with the identity server. Servers
|
|
||||||
can treat this as optional to distinguish between r0.5-compatible clients
|
|
||||||
and this specification version.
|
|
||||||
medium:
|
|
||||||
type: string
|
|
||||||
description: |-
|
|
||||||
The kind of address being passed in the address field, for example
|
|
||||||
`email` (see [the list of recognised values](/appendices/#3pid-types)).
|
|
||||||
address:
|
|
||||||
type: string
|
|
||||||
description: The invitee's third-party identifier.
|
|
||||||
required:
|
|
||||||
- id_server
|
|
||||||
- id_access_token
|
|
||||||
- medium
|
|
||||||
- address
|
|
||||||
required: true
|
required: true
|
||||||
responses:
|
responses:
|
||||||
"200":
|
"200":
|
||||||
|
|
@ -120,7 +89,9 @@ paths:
|
||||||
value: {}
|
value: {}
|
||||||
"403":
|
"403":
|
||||||
description: |-
|
description: |-
|
||||||
You do not have permission to invite the user to the room. A meaningful `errcode` and description error text will be returned. Example reasons for rejections are:
|
You do not have permission to invite the user to the room. A
|
||||||
|
meaningful `errcode` and description error text will be returned.
|
||||||
|
Example reasons for rejections are:
|
||||||
|
|
||||||
- The invitee has been banned from the room.
|
- The invitee has been banned from the room.
|
||||||
- The invitee is already a member of the room.
|
- The invitee is already a member of the room.
|
||||||
|
|
|
||||||
|
|
@ -20,10 +20,17 @@ paths:
|
||||||
post:
|
post:
|
||||||
summary: Searches the user directory.
|
summary: Searches the user directory.
|
||||||
description: |-
|
description: |-
|
||||||
Performs a search for users. The homeserver may
|
Performs a search for users. The homeserver may determine which
|
||||||
determine which subset of users are searched, however the homeserver
|
subset of users are searched. However, the homeserver MUST at a
|
||||||
MUST at a minimum consider the users the requesting user shares a
|
minimum consider users who are visible to the requester based
|
||||||
room with and those who reside in public rooms (known to the homeserver).
|
on their membership in rooms known to the homeserver. This means:
|
||||||
|
|
||||||
|
- users that share a room with the requesting user
|
||||||
|
- users who are joined to rooms known to the homeserver that have a
|
||||||
|
`public` [join rule](#mroomjoin_rules)
|
||||||
|
- users who are joined to rooms known to the homeserver that have a
|
||||||
|
`world_readable` [history visibility](#room-history-visibility)
|
||||||
|
|
||||||
The search MUST consider local users to the homeserver, and SHOULD
|
The search MUST consider local users to the homeserver, and SHOULD
|
||||||
query remote users as part of the search.
|
query remote users as part of the search.
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -26,6 +26,12 @@ paths:
|
||||||
suitably namespaced for each application and reduces the risk of
|
suitably namespaced for each application and reduces the risk of
|
||||||
clashes.
|
clashes.
|
||||||
|
|
||||||
|
{{% boxes/note %}}
|
||||||
|
This endpoint should be accessed with the hostname of the homeserver's
|
||||||
|
[server name](/appendices/#server-name) by making a
|
||||||
|
GET request to `https://hostname/.well-known/matrix/client`.
|
||||||
|
{{% /boxes/note %}}
|
||||||
|
|
||||||
Note that this endpoint is not necessarily handled by the homeserver,
|
Note that this endpoint is not necessarily handled by the homeserver,
|
||||||
but by another webserver, to be used for discovering the homeserver URL.
|
but by another webserver, to be used for discovering the homeserver URL.
|
||||||
operationId: getWellknown
|
operationId: getWellknown
|
||||||
|
|
|
||||||
|
|
@ -43,7 +43,8 @@ paths:
|
||||||
properties:
|
properties:
|
||||||
public_key:
|
public_key:
|
||||||
type: string
|
type: string
|
||||||
description: Unpadded Base64 encoded public key.
|
description: |-
|
||||||
|
[Unpadded Base64](/appendices/#unpadded-base64)-encoded public key.
|
||||||
required:
|
required:
|
||||||
- public_key
|
- public_key
|
||||||
examples:
|
examples:
|
||||||
|
|
@ -74,7 +75,8 @@ paths:
|
||||||
- in: query
|
- in: query
|
||||||
name: public_key
|
name: public_key
|
||||||
required: true
|
required: true
|
||||||
description: The unpadded base64-encoded public key to check.
|
description: |-
|
||||||
|
The [unpadded Base64](/appendices/#unpadded-base64)-encoded public key to check.
|
||||||
example: VXuGitF39UH5iRfvbIknlvlAVKgD1BsLDMvBf0pmp7c
|
example: VXuGitF39UH5iRfvbIknlvlAVKgD1BsLDMvBf0pmp7c
|
||||||
schema:
|
schema:
|
||||||
type: string
|
type: string
|
||||||
|
|
@ -105,7 +107,14 @@ paths:
|
||||||
- in: query
|
- in: query
|
||||||
name: public_key
|
name: public_key
|
||||||
required: true
|
required: true
|
||||||
description: The unpadded base64-encoded public key to check.
|
description: |-
|
||||||
|
The [unpadded Base64](/appendices/#unpadded-base64)-encoded public
|
||||||
|
key to check.
|
||||||
|
|
||||||
|
This MUST be the exact same encoded string returned in the response
|
||||||
|
of the [`/store-invite`](/identity-service-api/#post_matrixidentityv2store-invite)
|
||||||
|
endpoint, or found in the corresponding [`m.room.third_party_invite`](/client-server-api/#mroomthird_party_invite)
|
||||||
|
event, so it may use the standard or URL-safe alphabets.
|
||||||
example: VXuGitF39UH5iRfvbIknlvlAVKgD1BsLDMvBf0pmp7c
|
example: VXuGitF39UH5iRfvbIknlvlAVKgD1BsLDMvBf0pmp7c
|
||||||
schema:
|
schema:
|
||||||
type: string
|
type: string
|
||||||
|
|
|
||||||
|
|
@ -42,7 +42,7 @@ paths:
|
||||||
(if present) from the request here.
|
(if present) from the request here.
|
||||||
|
|
||||||
Also, the generated ephemeral public key will be listed as valid on
|
Also, the generated ephemeral public key will be listed as valid on
|
||||||
requests to `/_matrix/identity/v2/pubkey/ephemeral/isvalid`.
|
requests to [`/_matrix/identity/v2/pubkey/ephemeral/isvalid`](/identity-service-api/#get_matrixidentityv2pubkeyephemeralisvalid).
|
||||||
|
|
||||||
Currently, invites may only be issued for 3pids of the `email` medium.
|
Currently, invites may only be issued for 3pids of the `email` medium.
|
||||||
|
|
||||||
|
|
@ -70,10 +70,14 @@ paths:
|
||||||
room_id:
|
room_id:
|
||||||
type: string
|
type: string
|
||||||
description: The Matrix room ID to which the user is invited
|
description: The Matrix room ID to which the user is invited
|
||||||
|
format: mx-room-id
|
||||||
|
pattern: "^!"
|
||||||
example: "!something:example.org"
|
example: "!something:example.org"
|
||||||
sender:
|
sender:
|
||||||
type: string
|
type: string
|
||||||
description: The Matrix user ID of the inviting user
|
description: The Matrix user ID of the inviting user
|
||||||
|
format: mx-user-id
|
||||||
|
pattern: "^@"
|
||||||
example: "@bob:example.com"
|
example: "@bob:example.com"
|
||||||
room_alias:
|
room_alias:
|
||||||
type: string
|
type: string
|
||||||
|
|
@ -81,12 +85,16 @@ paths:
|
||||||
The Matrix room alias for the room to which the user is
|
The Matrix room alias for the room to which the user is
|
||||||
invited. This should be retrieved from the `m.room.canonical_alias`
|
invited. This should be retrieved from the `m.room.canonical_alias`
|
||||||
state event.
|
state event.
|
||||||
|
format: mx-room-alias
|
||||||
|
pattern: "^#"
|
||||||
example: "#somewhere:example.org"
|
example: "#somewhere:example.org"
|
||||||
room_avatar_url:
|
room_avatar_url:
|
||||||
type: string
|
type: string
|
||||||
description: |-
|
description: |-
|
||||||
The Content URI for the room to which the user is invited. This should
|
The Content URI for the room to which the user is invited. This should
|
||||||
be retrieved from the `m.room.avatar` state event.
|
be retrieved from the `m.room.avatar` state event.
|
||||||
|
format: mx-mxc-uri
|
||||||
|
pattern: "^mxc:\\/\\/"
|
||||||
example: mxc://example.org/s0meM3dia
|
example: mxc://example.org/s0meM3dia
|
||||||
room_join_rules:
|
room_join_rules:
|
||||||
type: string
|
type: string
|
||||||
|
|
@ -108,6 +116,8 @@ paths:
|
||||||
type: string
|
type: string
|
||||||
description: The Content URI for the avatar of the user ID initiating the
|
description: The Content URI for the avatar of the user ID initiating the
|
||||||
invite.
|
invite.
|
||||||
|
format: mx-mxc-uri
|
||||||
|
pattern: "^mxc:\\/\\/"
|
||||||
example: mxc://example.org/an0th3rM3dia
|
example: mxc://example.org/an0th3rM3dia
|
||||||
room_type:
|
room_type:
|
||||||
type: string
|
type: string
|
||||||
|
|
@ -146,7 +156,7 @@ paths:
|
||||||
public_key:
|
public_key:
|
||||||
type: string
|
type: string
|
||||||
description: |
|
description: |
|
||||||
The public key, encoded using [unpadded Base64](/appendices/#unpadded-base64).
|
The public key, encoded using standard or URL-safe [unpadded Base64](/appendices/#unpadded-base64).
|
||||||
key_validity_url:
|
key_validity_url:
|
||||||
type: string
|
type: string
|
||||||
description: |
|
description: |
|
||||||
|
|
|
||||||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue