mirror of
https://github.com/matrix-org/matrix-spec
synced 2026-05-01 22:54:10 +02:00
Compare commits
14 commits
9a8b6be393
...
356c33f370
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
356c33f370 | ||
|
|
c1894e09f0 | ||
|
|
67743d5715 | ||
|
|
338047ec7b | ||
|
|
0439707624 | ||
|
|
f4e6e6dea9 | ||
|
|
73fcf366a0 | ||
|
|
0a1efd8c9c | ||
|
|
2c6ddafb43 | ||
|
|
fc81171081 | ||
|
|
c74befd111 | ||
|
|
6656f00bee | ||
|
|
00fdf603a9 | ||
|
|
6b7268ab47 |
5
.github/workflows/main.yml
vendored
5
.github/workflows/main.yml
vendored
|
|
@ -284,10 +284,11 @@ jobs:
|
||||||
npm i
|
npm i
|
||||||
npm run get-proposals
|
npm run get-proposals
|
||||||
- name: "⚙️ hugo"
|
- name: "⚙️ hugo"
|
||||||
|
env:
|
||||||
|
HUGO_PARAMS_VERSION_STATUS: "historical"
|
||||||
# Create a baseURL like `/v1.2` out of the `v1.2` tag
|
# Create a baseURL like `/v1.2` out of the `v1.2` tag
|
||||||
run: |
|
run: |
|
||||||
echo -e '[params.version]\nstatus="historical"' > historical.toml
|
hugo --baseURL "/${GITHUB_REF/refs\/tags\//}" -d "spec"
|
||||||
hugo --config config.toml,historical.toml --baseURL "/${GITHUB_REF/refs\/tags\//}" -d "spec"
|
|
||||||
|
|
||||||
- name: "📥 Spec definition download"
|
- name: "📥 Spec definition download"
|
||||||
uses: actions/download-artifact@v4
|
uses: actions/download-artifact@v4
|
||||||
|
|
|
||||||
1
changelogs/client_server/newsfragments/2095.feature
Normal file
1
changelogs/client_server/newsfragments/2095.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add `m.topic` content block to enable rich text in `m.room.topic` events as per [MSC3765](https://github.com/matrix-org/matrix-spec-proposals/pull/3765).
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms in profile look-ups are defined through their join rule and history visibility.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms in user directory queries are defined through their join rule and history visibility.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms with respect to call invites are defined through their join rule.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms have no specific meaning with respect to moderation policy lists.
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
"Public" rooms with respect to presence are defined through their join rule.
|
||||||
1
changelogs/client_server/newsfragments/2122.feature
Normal file
1
changelogs/client_server/newsfragments/2122.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Include device keys with Olm-encrypted events as per [MSC4147](https://github.com/matrix-org/matrix-spec-proposals/pull/4147).
|
||||||
1
changelogs/internal/newsfragments/2123.clarification
Normal file
1
changelogs/internal/newsfragments/2123.clarification
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Fix the historical info box when generating the historical spec in CI.
|
||||||
1
changelogs/server_server/newsfragments/2095.feature
Normal file
1
changelogs/server_server/newsfragments/2095.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add `m.topic` content block to enable rich text in `m.room.topic` events as per [MSC3765](https://github.com/matrix-org/matrix-spec-proposals/pull/3765).
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Clarify that auth event of `content.join_authorised_via_users_server` is only necessary for `m.room.member` with a `membership` of `join`.
|
||||||
|
|
@ -2862,10 +2862,15 @@ re-invited.
|
||||||
|
|
||||||
#### Server behaviour
|
#### Server behaviour
|
||||||
|
|
||||||
Homeservers MUST at a minimum allow profile look-up for:
|
Homeservers MUST at a minimum allow profile look-up for users who are
|
||||||
|
visible to the requester based on their membership in rooms known to the
|
||||||
|
homeserver. This means:
|
||||||
|
|
||||||
- users that share a room with the requesting user
|
- users that share a room with the requesting user
|
||||||
- users that reside in public rooms known to the homeserver
|
- users who are joined to rooms known to the homeserver that have a
|
||||||
|
`public` [join rule](#mroomjoin_rules)
|
||||||
|
- users who are joined to rooms known to the homeserver that have a
|
||||||
|
`world_readable` [history visibility](#room-history-visibility)
|
||||||
|
|
||||||
In all other cases, homeservers MAY deny profile look-up by responding with
|
In all other cases, homeservers MAY deny profile look-up by responding with
|
||||||
403 and an error code of `M_FORBIDDEN`.
|
403 and an error code of `M_FORBIDDEN`.
|
||||||
|
|
|
||||||
|
|
@ -1512,20 +1512,7 @@ message.
|
||||||
|
|
||||||
The plaintext payload is of the form:
|
The plaintext payload is of the form:
|
||||||
|
|
||||||
```json
|
{{% definition path="api/client-server/definitions/olm_payload" %}}
|
||||||
{
|
|
||||||
"type": "<type of the plaintext event>",
|
|
||||||
"content": "<content for the plaintext event>",
|
|
||||||
"sender": "<sender_user_id>",
|
|
||||||
"recipient": "<recipient_user_id>",
|
|
||||||
"recipient_keys": {
|
|
||||||
"ed25519": "<our_ed25519_key>"
|
|
||||||
},
|
|
||||||
"keys": {
|
|
||||||
"ed25519": "<sender_ed25519_key>"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
The type and content of the plaintext message event are given in the
|
The type and content of the plaintext message event are given in the
|
||||||
payload.
|
payload.
|
||||||
|
|
@ -1536,15 +1523,19 @@ claiming to have sent messages which they didn't. `sender` must
|
||||||
correspond to the user who sent the event, `recipient` to the local
|
correspond to the user who sent the event, `recipient` to the local
|
||||||
user, and `recipient_keys` to the local ed25519 key.
|
user, and `recipient_keys` to the local ed25519 key.
|
||||||
|
|
||||||
Clients must confirm that the `sender_key` property in the cleartext
|
Clients must ensure that the sending device owns the private part of
|
||||||
`m.room.encrypted` event body, and the `keys.ed25519` property in the
|
the ed25519 key it claims to have in the Olm payload. This is crucial
|
||||||
decrypted plaintext, match the keys returned by
|
when the ed25519 key corresponds to a verified device. To perform
|
||||||
[`/keys/query`](#post_matrixclientv3keysquery) for
|
this check, clients MUST confirm that the `sender_key` property in the
|
||||||
the given user. Clients must also verify the signature of the keys from the
|
cleartext `m.room.encrypted` event body, and the `keys.ed25519` property
|
||||||
`/keys/query` response. Without this check, a client cannot be sure that
|
in the decrypted plaintext, match the keys under the `sender_device_keys`
|
||||||
the sender device owns the private part of the ed25519 key it claims to
|
property. Additionally, clients MUST also verify the signature of the keys.
|
||||||
have in the Olm payload. This is crucial when the ed25519 key corresponds
|
If `sender_device_keys` is absent, clients MUST retrieve the sender's
|
||||||
to a verified device.
|
keys from [`/keys/query`](#post_matrixclientv3keysquery) instead. This
|
||||||
|
will not allow them to verify key ownership if the sending device was
|
||||||
|
logged out or had its keys reset since sending the event. Therefore,
|
||||||
|
clients MUST populate the `sender_device_keys` property when sending
|
||||||
|
events themselves.
|
||||||
|
|
||||||
If a client has multiple sessions established with another device, it
|
If a client has multiple sessions established with another device, it
|
||||||
should use the session from which it last received and successfully
|
should use the session from which it last received and successfully
|
||||||
|
|
|
||||||
|
|
@ -18,8 +18,9 @@ the entity making the decisions on filtering is best positioned to
|
||||||
interpret the rules how it sees fit.
|
interpret the rules how it sees fit.
|
||||||
|
|
||||||
Moderation policy lists are stored as room state events. There are no
|
Moderation policy lists are stored as room state events. There are no
|
||||||
restrictions on how the rooms can be configured (they could be public,
|
restrictions on how the rooms can be configured in terms of
|
||||||
private, encrypted, etc).
|
[join rules](#mroomjoin_rules), [history visibility](#room-history-visibility),
|
||||||
|
encryption, etc.
|
||||||
|
|
||||||
There are currently 3 kinds of entities which can be affected by rules:
|
There are currently 3 kinds of entities which can be affected by rules:
|
||||||
`user`, `server`, and `room`. All 3 are described with
|
`user`, `server`, and `room`. All 3 are described with
|
||||||
|
|
|
||||||
|
|
@ -68,5 +68,7 @@ will cause the server to automatically set their presence to `online`.
|
||||||
|
|
||||||
#### Security considerations
|
#### Security considerations
|
||||||
|
|
||||||
Presence information is shared with all users who share a room with the
|
Presence information is published to all users who share a room with the
|
||||||
target user. In large public rooms this could be undesirable.
|
target user. If the target user is a member of a room with a `public`
|
||||||
|
[join rule](#mroomjoin_rules), any other user in the federation is
|
||||||
|
able to gain access to the target user's presence. This could be undesirable.
|
||||||
|
|
|
||||||
|
|
@ -26,9 +26,10 @@ on certain keys of certain event types.
|
||||||
|
|
||||||
The supported keys to search over are:
|
The supported keys to search over are:
|
||||||
|
|
||||||
- `content.body` in `m.room.message`
|
- `content.body` in [`m.room.message`](/client-server-api/#mroommessage)
|
||||||
- `content.name` in `m.room.name`
|
- `content.name` in [`m.room.name`](/client-server-api/#mroomname)
|
||||||
- `content.topic` in `m.room.topic`
|
- In [`m.room.topic`](/client-server-api/#mroomtopic), `content.topic`
|
||||||
|
as well as the `body` of the `text/plain` representation in `content['m.topic']`.
|
||||||
|
|
||||||
The search will *not* include rooms that are end to end encrypted.
|
The search will *not* include rooms that are end to end encrypted.
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -202,11 +202,13 @@ specific user, and should be set to the Matrix user ID of that user. Invites
|
||||||
without an `invitee` field are defined to be intended for any member of the
|
without an `invitee` field are defined to be intended for any member of the
|
||||||
room other than the sender of the event.
|
room other than the sender of the event.
|
||||||
|
|
||||||
Clients should consider an incoming call if they see a non-expired invite event where the `invitee` field is either
|
Clients should consider an incoming call if they see a non-expired invite event
|
||||||
absent or equal to their user's Matrix ID, however they should evaluate whether or not to ring based on their
|
where the `invitee` field is either absent or equal to their user's Matrix ID.
|
||||||
user's trust relationship with the callers and/or where the call was placed. As a starting point, it is
|
They should, however, evaluate whether or not to ring based on their user's trust
|
||||||
suggested that clients ignore call invites from users in public rooms. It is strongly recommended that
|
relationship with the callers and/or where the call was placed. As a starting
|
||||||
when clients do not ring for an incoming call invite, they still display the call invite in the room and
|
point, it is RECOMMENDED that clients ignore call invites in rooms with a
|
||||||
|
[join rule](#mroomjoin_rules) of `public`. When clients suppress ringing for an
|
||||||
|
incoming call invite, they SHOULD still display the call invite in the room and
|
||||||
annotate that it was ignored.
|
annotate that it was ignored.
|
||||||
|
|
||||||
##### Glare
|
##### Glare
|
||||||
|
|
|
||||||
|
|
@ -544,8 +544,8 @@ the following subset of the room state:
|
||||||
`third_party_invite` property, the current
|
`third_party_invite` property, the current
|
||||||
`m.room.third_party_invite` event with `state_key` matching
|
`m.room.third_party_invite` event with `state_key` matching
|
||||||
`content.third_party_invite.signed.token`, if any.
|
`content.third_party_invite.signed.token`, if any.
|
||||||
- If `content.join_authorised_via_users_server` is present,
|
- If `membership` is `join`, `content.join_authorised_via_users_server`
|
||||||
and the [room version supports restricted rooms](/rooms/#feature-matrix),
|
is present, and the [room version supports restricted rooms](/rooms/#feature-matrix),
|
||||||
then the `m.room.member` event with `state_key` matching
|
then the `m.room.member` event with `state_key` matching
|
||||||
`content.join_authorised_via_users_server`.
|
`content.join_authorised_via_users_server`.
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -109,15 +109,17 @@ paths:
|
||||||
name:
|
name:
|
||||||
type: string
|
type: string
|
||||||
description: |-
|
description: |-
|
||||||
If this is included, an `m.room.name` event will be sent
|
If this is included, an [`m.room.name`](/client-server-api/#mroomname) event
|
||||||
into the room to indicate the name of the room. See Room
|
will be sent into the room to indicate the name for the room.
|
||||||
Events for more information on `m.room.name`.
|
This overwrites any [`m.room.name`](/client-server-api/#mroomname)
|
||||||
|
event in `initial_state`.
|
||||||
topic:
|
topic:
|
||||||
type: string
|
type: string
|
||||||
description: |-
|
description: |-
|
||||||
If this is included, an `m.room.topic` event will be sent
|
If this is included, an [`m.room.topic`](/client-server-api/#mroomtopic)
|
||||||
into the room to indicate the topic for the room. See Room
|
event with a `text/plain` mimetype will be sent into the room
|
||||||
Events for more information on `m.room.topic`.
|
to indicate the topic for the room. This overwrites any
|
||||||
|
[`m.room.topic`](/client-server-api/#mroomtopic) event in `initial_state`.
|
||||||
invite:
|
invite:
|
||||||
type: array
|
type: array
|
||||||
description: |-
|
description: |-
|
||||||
|
|
|
||||||
88
data/api/client-server/definitions/olm_payload.yaml
Normal file
88
data/api/client-server/definitions/olm_payload.yaml
Normal file
|
|
@ -0,0 +1,88 @@
|
||||||
|
# Copyright 2025 The Matrix.org Foundation C.I.C
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
|
||||||
|
type: object
|
||||||
|
title: OlmPayload
|
||||||
|
description: |-
|
||||||
|
The plaintext payload of Olm message events.
|
||||||
|
properties:
|
||||||
|
type:
|
||||||
|
type: string
|
||||||
|
description: The type of the event.
|
||||||
|
content:
|
||||||
|
type: object
|
||||||
|
description: The event content.
|
||||||
|
sender:
|
||||||
|
type: string
|
||||||
|
description: The user ID of the event sender.
|
||||||
|
recipient:
|
||||||
|
type: string
|
||||||
|
description: The user ID of the intended event recipient.
|
||||||
|
recipient_keys:
|
||||||
|
description: The recipient's signing keys of the encrypted event.
|
||||||
|
$ref: "#/components/schemas/SigningKeys"
|
||||||
|
keys:
|
||||||
|
$ref: "#/components/schemas/SigningKeys"
|
||||||
|
description: The sender's signing keys of the encrypted event.
|
||||||
|
sender_device_keys:
|
||||||
|
$ref: device_keys.yaml
|
||||||
|
description: The sender's device keys.
|
||||||
|
x-addedInMatrixVersion: "1.15"
|
||||||
|
required:
|
||||||
|
- type
|
||||||
|
- content
|
||||||
|
- sender
|
||||||
|
- recipient
|
||||||
|
- recipient_keys
|
||||||
|
- keys
|
||||||
|
components:
|
||||||
|
schemas:
|
||||||
|
SigningKeys:
|
||||||
|
type: object
|
||||||
|
title: SigningKeys
|
||||||
|
description: Public keys used for an `m.olm.v1.curve25519-aes-sha2` event.
|
||||||
|
properties:
|
||||||
|
ed25519:
|
||||||
|
type: string
|
||||||
|
description: The Ed25519 public key encoded using unpadded base64.
|
||||||
|
required:
|
||||||
|
- ed25519
|
||||||
|
example: {
|
||||||
|
"type": "<type of the plaintext event>",
|
||||||
|
"content": "<content for the plaintext event>",
|
||||||
|
"sender": "<sender_user_id>",
|
||||||
|
"recipient": "<recipient_user_id>",
|
||||||
|
"recipient_keys": {
|
||||||
|
"ed25519": "<our_ed25519_key>"
|
||||||
|
},
|
||||||
|
"keys": {
|
||||||
|
"ed25519": "<sender_ed25519_key>"
|
||||||
|
},
|
||||||
|
"sender_device_keys": {
|
||||||
|
"algorithms": ["<supported>", "<algorithms>"],
|
||||||
|
"user_id": "<user_id>",
|
||||||
|
"device_id": "<device_id>",
|
||||||
|
"keys": {
|
||||||
|
"ed25519:<device_id>": "<sender_ed25519_key>",
|
||||||
|
"curve25519:<device_id>": "<sender_curve25519_key>"
|
||||||
|
},
|
||||||
|
"signatures": {
|
||||||
|
"<user_id>": {
|
||||||
|
"ed25519:<device_id>": "<device_signature>",
|
||||||
|
"ed25519:<ssk_id>": "<ssk_signature>",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
@ -33,7 +33,9 @@ properties:
|
||||||
example: "!abcdefg:example.org"
|
example: "!abcdefg:example.org"
|
||||||
topic:
|
topic:
|
||||||
type: string
|
type: string
|
||||||
description: The topic of the room, if any.
|
description: |-
|
||||||
|
The plain text topic of the room. Omitted if no `text/plain` mimetype
|
||||||
|
exists in [`m.room.topic`](/client-server-api/#mroomtopic).
|
||||||
example: "All things general"
|
example: "All things general"
|
||||||
world_readable:
|
world_readable:
|
||||||
type: boolean
|
type: boolean
|
||||||
|
|
|
||||||
|
|
@ -20,10 +20,17 @@ paths:
|
||||||
post:
|
post:
|
||||||
summary: Searches the user directory.
|
summary: Searches the user directory.
|
||||||
description: |-
|
description: |-
|
||||||
Performs a search for users. The homeserver may
|
Performs a search for users. The homeserver may determine which
|
||||||
determine which subset of users are searched, however the homeserver
|
subset of users are searched. However, the homeserver MUST at a
|
||||||
MUST at a minimum consider the users the requesting user shares a
|
minimum consider users who are visible to the requester based
|
||||||
room with and those who reside in public rooms (known to the homeserver).
|
on their membership in rooms known to the homeserver. This means:
|
||||||
|
|
||||||
|
- users that share a room with the requesting user
|
||||||
|
- users who are joined to rooms known to the homeserver that have a
|
||||||
|
`public` [join rule](#mroomjoin_rules)
|
||||||
|
- users who are joined to rooms known to the homeserver that have a
|
||||||
|
`world_readable` [history visibility](#room-history-visibility)
|
||||||
|
|
||||||
The search MUST consider local users to the homeserver, and SHOULD
|
The search MUST consider local users to the homeserver, and SHOULD
|
||||||
query remote users as part of the search.
|
query remote users as part of the search.
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -3,6 +3,14 @@
|
||||||
"type": "m.room.topic",
|
"type": "m.room.topic",
|
||||||
"state_key": "",
|
"state_key": "",
|
||||||
"content": {
|
"content": {
|
||||||
"topic": "A room topic"
|
"m.topic": {
|
||||||
|
"m.text": [ {
|
||||||
|
"mimetype": "text/html",
|
||||||
|
"body": "An <em>interesting</em> room topic"
|
||||||
|
}, {
|
||||||
|
"body": "An interesting room topic"
|
||||||
|
}]
|
||||||
|
},
|
||||||
|
"topic": "An interesting room topic"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,28 @@
|
||||||
|
type: array
|
||||||
|
description: |-
|
||||||
|
An ordered array of textual representations in different mimetypes.
|
||||||
|
|
||||||
|
Senders SHOULD specify at least one representation and SHOULD always
|
||||||
|
include a plaintext representation.
|
||||||
|
|
||||||
|
Receivers SHOULD use the first representation in the array that
|
||||||
|
they understand.
|
||||||
|
title: TextContentBlock
|
||||||
|
items:
|
||||||
|
type: object
|
||||||
|
title: TextualRepresentation
|
||||||
|
properties:
|
||||||
|
mimetype:
|
||||||
|
type: string
|
||||||
|
description: The mimetype. Defaults to `text/plain` if omitted.
|
||||||
|
example: "text/html"
|
||||||
|
body:
|
||||||
|
type: string
|
||||||
|
description: |-
|
||||||
|
The string content.
|
||||||
|
|
||||||
|
Clients SHOULD validate and sanitize the content as they do
|
||||||
|
for rich content associated with [`msgtype`](/client-server-api/#mroommessage-msgtypes)
|
||||||
|
of [`m.room.message`](/client-server-api/#mroommessage).
|
||||||
|
required:
|
||||||
|
- body
|
||||||
|
|
@ -2,19 +2,40 @@
|
||||||
allOf:
|
allOf:
|
||||||
- $ref: core-event-schema/state_event.yaml
|
- $ref: core-event-schema/state_event.yaml
|
||||||
description: |-
|
description: |-
|
||||||
A topic is a short message detailing what is currently being discussed in the room.
|
A topic is a short message detailing what is currently being discussed
|
||||||
It can also be used as a way to display extra information about the room, which may not
|
in the room. It can also be used as a way to display extra information
|
||||||
be suitable for the room name.
|
about the room, which may not be suitable for the room name. The room
|
||||||
The room topic can also be set when creating a room using `/createRoom` with the `topic` key.'
|
topic can also be set when creating a room using
|
||||||
|
[`/createRoom`](client-server-api/#post_matrixclientv3createroom), either
|
||||||
|
with the `topic` key or by specifying a full event in `initial_state`.
|
||||||
|
|
||||||
If the `topic` property is absent, null, or empty then the topic is unset. In other words,
|
If the `topic` property is absent, null, or empty then the topic is unset. In other words,
|
||||||
an empty `topic` property effectively resets the room to having no topic.
|
an empty `topic` property effectively resets the room to having no topic.
|
||||||
|
|
||||||
|
In order to prevent formatting abuse in room topics, clients SHOULD
|
||||||
|
limit the length of topics during both entry and display, for instance,
|
||||||
|
by capping the number of displayed lines. Additionally, clients SHOULD
|
||||||
|
ignore things like headings and enumerations (or format them as regular
|
||||||
|
text).
|
||||||
properties:
|
properties:
|
||||||
content:
|
content:
|
||||||
properties:
|
properties:
|
||||||
topic:
|
topic:
|
||||||
description: The topic text.
|
description: |-
|
||||||
|
The topic in plain text.
|
||||||
|
|
||||||
|
This SHOULD duplicate the content of the `text/plain`
|
||||||
|
representation in `m.topic` if any exists.
|
||||||
type: string
|
type: string
|
||||||
|
m.topic:
|
||||||
|
type: object
|
||||||
|
title: TopicContentBlock
|
||||||
|
x-addedInMatrixVersion: "1.15"
|
||||||
|
description: |-
|
||||||
|
Textual representation of the room topic in different mimetypes.
|
||||||
|
properties:
|
||||||
|
m.text:
|
||||||
|
$ref: components/m_text_content_block.yaml
|
||||||
required:
|
required:
|
||||||
- topic
|
- topic
|
||||||
type: object
|
type: object
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue