mirror of
https://github.com/matrix-org/matrix-spec
synced 2026-05-01 06:34:09 +02:00
Compare commits
7 commits
fc74e9695d
...
cffd4a7ab0
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
cffd4a7ab0 | ||
|
|
a6da9443da | ||
|
|
cbff6790c3 | ||
|
|
8b7187927d | ||
|
|
2fca4789ca | ||
|
|
3ff21c357d | ||
|
|
d6716305b1 |
1
changelogs/appendices/newsfragments/2307.clarification
Normal file
1
changelogs/appendices/newsfragments/2307.clarification
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add identifier pronunciation guidelines. Contributed by @HarHarLinks.
|
||||||
1
changelogs/client_server/newsfragments/2301.feature
Normal file
1
changelogs/client_server/newsfragments/2301.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add recommendation about excluding non-cross-signed devices from encrypted conversations, as per [MSC4153](https://github.com/matrix-org/matrix-spec-proposals/pull/4153).
|
||||||
1
changelogs/client_server/newsfragments/2305.feature
Normal file
1
changelogs/client_server/newsfragments/2305.feature
Normal file
|
|
@ -0,0 +1 @@
|
||||||
|
Add invite blocking, as per [MSC4380](https://github.com/matrix-org/matrix-spec-proposals/pull/4380).
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
Clarify what the `minimum_valid_until_ts` field means when it is set in key queries.
|
||||||
|
|
@ -533,6 +533,11 @@ where `domain` is the [server name](#server-name) of the homeserver
|
||||||
which allocated the identifier, and `localpart` is an identifier
|
which allocated the identifier, and `localpart` is an identifier
|
||||||
allocated by that homeserver.
|
allocated by that homeserver.
|
||||||
|
|
||||||
|
Because the domain part identifies the server on which the ID resolves,
|
||||||
|
the canonical pronunciation of the separating `:` is "on".
|
||||||
|
For example, `@user:matrix.org` would be pronounced as "at user on matrix dot
|
||||||
|
org".
|
||||||
|
|
||||||
The precise grammar defining the allowable format of an identifier
|
The precise grammar defining the allowable format of an identifier
|
||||||
depends on the type of identifier. For example, event IDs can sometimes
|
depends on the type of identifier. For example, event IDs can sometimes
|
||||||
be represented with a `domain` component under some conditions - see the
|
be represented with a `domain` component under some conditions - see the
|
||||||
|
|
|
||||||
|
|
@ -4071,6 +4071,7 @@ that profile.
|
||||||
| [Sticker Messages](#sticker-messages) | Optional | Optional | Optional | Optional | Optional |
|
| [Sticker Messages](#sticker-messages) | Optional | Optional | Optional | Optional | Optional |
|
||||||
| [Third-party Networks](#third-party-networks) | Optional | Optional | Optional | Optional | Optional |
|
| [Third-party Networks](#third-party-networks) | Optional | Optional | Optional | Optional | Optional |
|
||||||
| [Threading](#threading) | Optional | Optional | Optional | Optional | Optional |
|
| [Threading](#threading) | Optional | Optional | Optional | Optional | Optional |
|
||||||
|
| [Invite permission](#invite-permission) | Optional | Optional | Optional | Optional | Optional |
|
||||||
|
|
||||||
*Please see each module for more details on what clients need to
|
*Please see each module for more details on what clients need to
|
||||||
implement.*
|
implement.*
|
||||||
|
|
@ -4144,6 +4145,7 @@ systems.
|
||||||
{{% cs-module name="SSO client login/authentication" filename="sso_login" %}}
|
{{% cs-module name="SSO client login/authentication" filename="sso_login" %}}
|
||||||
{{% cs-module name="Direct Messaging" filename="dm" %}}
|
{{% cs-module name="Direct Messaging" filename="dm" %}}
|
||||||
{{% cs-module name="Ignoring Users" filename="ignore_users" %}}
|
{{% cs-module name="Ignoring Users" filename="ignore_users" %}}
|
||||||
|
{{% cs-module name="Invite permission" filename="invite_permission" %}}
|
||||||
{{% cs-module name="Sticker Messages" filename="stickers" %}}
|
{{% cs-module name="Sticker Messages" filename="stickers" %}}
|
||||||
{{% cs-module name="Reporting Content" filename="report_content" %}}
|
{{% cs-module name="Reporting Content" filename="report_content" %}}
|
||||||
{{% cs-module name="Third-party Networks" filename="third_party_networks" %}}
|
{{% cs-module name="Third-party Networks" filename="third_party_networks" %}}
|
||||||
|
|
|
||||||
|
|
@ -5,6 +5,91 @@ Matrix optionally supports end-to-end encryption, allowing rooms to be
|
||||||
created whose conversation contents are not decryptable or interceptable
|
created whose conversation contents are not decryptable or interceptable
|
||||||
on any of the participating homeservers.
|
on any of the participating homeservers.
|
||||||
|
|
||||||
|
#### Recommended client behaviour
|
||||||
|
|
||||||
|
{{% added-in v="1.18" %}}
|
||||||
|
|
||||||
|
While clients are able to choose what encryption features they implement based
|
||||||
|
on their threat model, this section recommends behaviours that will improve the
|
||||||
|
overall user experience and security of encrypted conversations.
|
||||||
|
|
||||||
|
While a user may be unable to [verify](#device-verification) every other user
|
||||||
|
that they communicate with, or may be unaware of the need to verify other users,
|
||||||
|
[cross-signing](#cross-signing) gives some measure of protection and so SHOULD
|
||||||
|
be used where possible. In particular, clients SHOULD implement the following
|
||||||
|
recommendations.
|
||||||
|
|
||||||
|
* Clients SHOULD create new [cross-signing keys](#cross-signing) for users who
|
||||||
|
do not yet have cross-signing keys.
|
||||||
|
* Clients SHOULD encourage users to set up their [Secret Storage](#storage) to
|
||||||
|
avoid needing to reset their cryptographic identity in case the user does not
|
||||||
|
have an existing device that can [share the secrets](#sharing) with the new
|
||||||
|
device. The user's Secret Storage SHOULD contain the user's cross-signing
|
||||||
|
private keys and the [key backup](#server-side-key-backups) decryption key
|
||||||
|
(if the user is using key backup). The user's Secret Storage SHOULD have a
|
||||||
|
[default key](#key-storage) (a key referred to by
|
||||||
|
`m.secret_storage.default_key`) that encrypts the private cross-signing keys
|
||||||
|
and key backup decryption key (if available).
|
||||||
|
* Clients SHOULD encourage users to [cross-sign](#cross-signing) their devices.
|
||||||
|
This includes both when logging in a new device, and for existing devices.
|
||||||
|
Clients MAY even go so far as to require cross-signing of devices by
|
||||||
|
preventing the user from using the client until the device is cross-signed.
|
||||||
|
If the user cannot cross-sign their device (for example, if they have
|
||||||
|
forgotten their Secret Storage key), the client can allow users to reset their
|
||||||
|
[Secret Storage](#storage), cross-signing keys, and [key backup](#server-side-key-backups).
|
||||||
|
* When Alice [verifies](#device-verification) Bob, the verification SHOULD
|
||||||
|
verify their [cross-signing keys](#cross-signing). Any flow between different
|
||||||
|
users that does not verify the users' cross-signing keys (it verifies only the
|
||||||
|
device keys) is deprecated.
|
||||||
|
* Clients SHOULD flag when [cross-signing keys](#cross-signing) change. If
|
||||||
|
Alice's cross-signing keys change, Alice's own devices MUST alert her to this
|
||||||
|
fact, and prompt her to re-cross-sign those devices. If Bob is in an
|
||||||
|
encrypted room with Alice, Bob's devices SHOULD inform him of Alice's key
|
||||||
|
change and SHOULD prevent him from sending an encrypted message to Alice
|
||||||
|
without acknowledging the change. Bob's clients may behave differently
|
||||||
|
depending on whether Bob had previously [verified](#device-verification)
|
||||||
|
Alice or not. For example, if Bob had previously verified Alice, and Alice's
|
||||||
|
keys change, Bob's client may require Bob to re-verify, or may display a more
|
||||||
|
aggressive warning.
|
||||||
|
* Clients SHOULD NOT send encrypted [to-device](#send-to-device-messaging)
|
||||||
|
messages, such as [room keys](#sharing-keys-between-devices) or [secrets](#secrets)
|
||||||
|
(via [Secret Sharing](#sharing)), to [non-cross-signed](#cross-signing)
|
||||||
|
devices by default. Non-cross-signed devices don't provide any assurance that
|
||||||
|
the device belongs to the user, and server admins can trivially create new
|
||||||
|
devices for users. When sending room keys, clients can use a
|
||||||
|
[`m.room_key.withheld`](#mroom_keywithheld) message with a code of
|
||||||
|
`m.unverified` to indicate to the non-cross-signed device why it is not
|
||||||
|
receiving the room key.
|
||||||
|
|
||||||
|
Note that clients cannot selectively send room events only to cross-signed
|
||||||
|
devices. The only way to exclude non-cross-signed devices from encrypted
|
||||||
|
conversations is to not send the room keys so those devices won't be able to
|
||||||
|
decrypt the messages.
|
||||||
|
* Similarly, messages sent from [non-cross-signed](#cross-signing) devices
|
||||||
|
cannot be trusted and SHOULD NOT be displayed to the user. Clients have no
|
||||||
|
assurance that encrypted messages sent from non-cross-signed devices were sent
|
||||||
|
by the user, rather than an impersonator.
|
||||||
|
* Matrix clients MUST NOT consider non-cryptographic devices (devices which do
|
||||||
|
not have [device identity keys](#device-keys) uploaded to the homeserver) to
|
||||||
|
be equivalent to [non-cross-signed](#cross-signing) cryptographic devices for
|
||||||
|
purposes of enforcing E2EE policy. For example, clients SHOULD NOT warn nor
|
||||||
|
refuse to send messages due to the presence of non-cryptographic devices. For
|
||||||
|
all intents and purposes, non-cryptographic devices are a completely separate
|
||||||
|
concept and do not exist from the perspective of the cryptography layer since
|
||||||
|
they do not have identity keys, so it is impossible to send them decryption
|
||||||
|
keys.
|
||||||
|
* Clients MAY make provisions for encrypted bridges. Some bridges are structured
|
||||||
|
in a way such that only one user controlled by the bridge (often called the
|
||||||
|
bridge bot) participates in encryption, and encrypted messages from other
|
||||||
|
bridge users are encrypted by the bridge bot. Thus encrypted messages sent by
|
||||||
|
one user could be encrypted by a [Megolm](#mmegolmv1aes-sha2) session sent by
|
||||||
|
a different user. Clients MAY accept such messages, provided the session
|
||||||
|
creator's device is [cross-signed](#cross-signing). However, the client MUST
|
||||||
|
annotate the message with a warning, unless the client has a way to check that
|
||||||
|
the bridge bot is permitted to encrypt messages on behalf of the user. Future
|
||||||
|
MSCs such as [MSC4350](https://github.com/matrix-org/matrix-spec-proposals/pull/4350)
|
||||||
|
may provide a secure way to allow such impersonation.
|
||||||
|
|
||||||
#### Key Distribution
|
#### Key Distribution
|
||||||
|
|
||||||
Encryption and Authentication in Matrix is based around public-key
|
Encryption and Authentication in Matrix is based around public-key
|
||||||
|
|
@ -674,8 +759,11 @@ The process between Alice and Bob verifying each other would be:
|
||||||
their devices if they match or not.
|
their devices if they match or not.
|
||||||
15. Assuming they match, Alice and Bob's devices each calculate Message
|
15. Assuming they match, Alice and Bob's devices each calculate Message
|
||||||
Authentication Codes (MACs) for:
|
Authentication Codes (MACs) for:
|
||||||
* Each of the keys that they wish the other user to verify (usually their
|
* {{% changed-in v="1.18" %}} Each of the keys that they wish the other user
|
||||||
device ed25519 key and their master cross-signing key).
|
to verify (usually their device ed25519 key and their master cross-signing
|
||||||
|
key). The master cross-signing key SHOULD be included when two different
|
||||||
|
users are verifying each other. Verifying individual devices of other
|
||||||
|
users is deprecated.
|
||||||
* The complete list of key IDs that they wish the other user to verify.
|
* The complete list of key IDs that they wish the other user to verify.
|
||||||
|
|
||||||
The MAC calculation is defined [below](#mac-calculation).
|
The MAC calculation is defined [below](#mac-calculation).
|
||||||
|
|
|
||||||
51
content/client-server-api/modules/invite_permission.md
Normal file
51
content/client-server-api/modules/invite_permission.md
Normal file
|
|
@ -0,0 +1,51 @@
|
||||||
|
|
||||||
|
### Invite permission
|
||||||
|
|
||||||
|
{{% added-in v="1.18" %}}
|
||||||
|
|
||||||
|
Users may want to control who is allowed to invite them to new rooms. This module defines how
|
||||||
|
clients and servers can implement invite permission.
|
||||||
|
|
||||||
|
#### Account data
|
||||||
|
|
||||||
|
{{% event event="m.invite_permission_config" %}}
|
||||||
|
|
||||||
|
#### Client behaviour
|
||||||
|
|
||||||
|
To reject invites from all users automatically, clients MAY add an [`m.invite_permission_config`](#minvite_permission_config)
|
||||||
|
event in the user's [account data](#client-config) with the `default_action` property set to
|
||||||
|
`block`. To stop rejecting all invites, the same event without the `default_action` property MUST be
|
||||||
|
added to the account data.
|
||||||
|
|
||||||
|
When the `default_action` field is unset, other parts of the specification might still have effects
|
||||||
|
on invites seen by clients, like [ignoring users](#ignoring-users).
|
||||||
|
|
||||||
|
Attempting to send an invite to a user that blocks invites will result in an error response with the
|
||||||
|
`M_INVITE_BLOCKED` error code.
|
||||||
|
|
||||||
|
#### Server behaviour
|
||||||
|
|
||||||
|
When invites to a given user are blocked, the user's homeserver MUST respond to the following
|
||||||
|
endpoints with an HTTP 403 status code, with the Matrix error code `M_INVITE_BLOCKED`, if the user
|
||||||
|
is invited:
|
||||||
|
|
||||||
|
* [`PUT /_matrix/federation/v1/invite/{roomId}/{eventId}`](/server-server-api/#put_matrixfederationv1inviteroomideventid)
|
||||||
|
* [`PUT /_matrix/federation/v2/invite/{roomId}/{eventId}`](/server-server-api/#put_matrixfederationv2inviteroomideventid)
|
||||||
|
* [`POST /_matrix/client/v3/rooms/{roomId}/invite`](#post_matrixclientv3roomsroomidinvite)
|
||||||
|
* [`POST /_matrix/client/v3/createRoom`](#post_matrixclientv3createroom), due to a user in the
|
||||||
|
`invite` list. It is possible for one of the invited users to be rejected whilst the room creation
|
||||||
|
as a whole succeeds.
|
||||||
|
* [`PUT /_matrix/client/v3/rooms/{roomId}/state/m.room.member/{stateKey}`](#put_matrixclientv3roomsroomidstateeventtypestatekey),
|
||||||
|
when the `membership` is set to `invite`.
|
||||||
|
|
||||||
|
In addition, invite events for this user already in the database, or received over federation, MUST
|
||||||
|
NOT be served over client synchronisation endpoints such as [`GET /sync`](#get_matrixclientv3sync).
|
||||||
|
|
||||||
|
Servers MAY return any suppressed invite events over `GET /sync` if invite blocking is later
|
||||||
|
disabled.
|
||||||
|
|
||||||
|
Other endpoints, such as [`GET /rooms/{roomId}/state`](#get_matrixclientv3roomsroomidstate), are not
|
||||||
|
affected by invite blocking: invite events are returned as normal.
|
||||||
|
|
||||||
|
The Application Services API is also unaffected by invite blocking: invite events are sent over
|
||||||
|
[`PUT /_matrix/app/v1/transactions/{txnId}`](/application-service-api/#put_matrixappv1transactionstxnid).
|
||||||
|
|
@ -250,7 +250,6 @@ paths:
|
||||||
}
|
}
|
||||||
"400":
|
"400":
|
||||||
description: |-
|
description: |-
|
||||||
|
|
||||||
The request is invalid. A meaningful `errcode` and description
|
The request is invalid. A meaningful `errcode` and description
|
||||||
error text will be returned. Example reasons for rejection include:
|
error text will be returned. Example reasons for rejection include:
|
||||||
|
|
||||||
|
|
@ -274,6 +273,17 @@ paths:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
$ref: definitions/errors/error.yaml
|
$ref: definitions/errors/error.yaml
|
||||||
|
"403":
|
||||||
|
description: |-
|
||||||
|
Creating the room is not allowed.
|
||||||
|
|
||||||
|
{{% added-in v="1.18"%}} The `M_INVITE_BLOCKED` error code is used to
|
||||||
|
indicate that one of the homeservers of the invited users rejected
|
||||||
|
the invite due to [invite blocking](/client-server-api/#invite-permission).
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: definitions/errors/error.yaml
|
||||||
tags:
|
tags:
|
||||||
- Room creation
|
- Room creation
|
||||||
servers:
|
servers:
|
||||||
|
|
|
||||||
|
|
@ -83,7 +83,7 @@ paths:
|
||||||
value: {}
|
value: {}
|
||||||
"400":
|
"400":
|
||||||
description: |-
|
description: |-
|
||||||
|
|
||||||
The request is invalid. A meaningful `errcode` and description
|
The request is invalid. A meaningful `errcode` and description
|
||||||
error text will be returned. Example reasons for rejection include:
|
error text will be returned. Example reasons for rejection include:
|
||||||
|
|
||||||
|
|
@ -99,12 +99,18 @@ paths:
|
||||||
$ref: definitions/errors/error.yaml
|
$ref: definitions/errors/error.yaml
|
||||||
"403":
|
"403":
|
||||||
description: |-
|
description: |-
|
||||||
You do not have permission to invite the user to the room. A meaningful `errcode` and description error text will be returned. Example reasons for rejections are:
|
You do not have permission to invite the user to the room. A
|
||||||
|
meaningful `errcode` and description error text will be returned.
|
||||||
|
Example reasons for rejections are:
|
||||||
|
|
||||||
- The invitee has been banned from the room.
|
- The invitee has been banned from the room.
|
||||||
- The invitee is already a member of the room.
|
- The invitee is already a member of the room.
|
||||||
- The inviter is not currently in the room.
|
- The inviter is not currently in the room.
|
||||||
- The inviter's power level is insufficient to invite users to the room.
|
- The inviter's power level is insufficient to invite users to the room.
|
||||||
|
|
||||||
|
{{% added-in v="1.18"%}} The `M_INVITE_BLOCKED` error code is used to
|
||||||
|
indicate that the homeserver rejected the invite due to
|
||||||
|
[invite blocking](/client-server-api/#invite-permission).
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
|
||||||
|
|
@ -116,7 +116,13 @@ paths:
|
||||||
"error": "The alias '#hello:example.org' does not point to this room."
|
"error": "The alias '#hello:example.org' does not point to this room."
|
||||||
}
|
}
|
||||||
"403":
|
"403":
|
||||||
description: The sender doesn't have permission to send the event into the room.
|
description: |-
|
||||||
|
The sender doesn't have permission to send the event into the room.
|
||||||
|
|
||||||
|
{{% added-in v="1.18"%}} If the `eventType` is `m.room.member` and
|
||||||
|
the `membership` is `invite`, the `M_INVITE_BLOCKED` error code is
|
||||||
|
used to indicate that the homeserver rejected the invite due to
|
||||||
|
[invite blocking](/client-server-api/#invite-permission).
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
|
||||||
|
|
@ -97,6 +97,10 @@ paths:
|
||||||
- The invitee is already a member of the room.
|
- The invitee is already a member of the room.
|
||||||
- The inviter is not currently in the room.
|
- The inviter is not currently in the room.
|
||||||
- The inviter's power level is insufficient to invite users to the room.
|
- The inviter's power level is insufficient to invite users to the room.
|
||||||
|
|
||||||
|
{{% added-in v="1.18"%}} The `M_INVITE_BLOCKED` error code is used to
|
||||||
|
indicate that the homeserver rejected the invite due to
|
||||||
|
[invite blocking](/client-server-api/#invite-permission).
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
|
||||||
|
|
@ -155,11 +155,17 @@ paths:
|
||||||
]
|
]
|
||||||
"403":
|
"403":
|
||||||
description: |-
|
description: |-
|
||||||
The invite is not allowed. This could be for a number of reasons, including:
|
The invite is not allowed.
|
||||||
|
|
||||||
|
The `M_FORBIDDEN` error code is used to indicate one of the following:
|
||||||
|
|
||||||
* The sender is not allowed to send invites to the target user/homeserver.
|
* The sender is not allowed to send invites to the target user/homeserver.
|
||||||
* The homeserver does not permit anyone to invite its users.
|
* The homeserver does not permit anyone to invite its users.
|
||||||
* The homeserver refuses to participate in the room.
|
* The homeserver refuses to participate in the room.
|
||||||
|
|
||||||
|
{{% added-in v="1.18"%}} The `M_INVITE_BLOCKED` error code is used to
|
||||||
|
indicate that the homeserver rejected the invite due to
|
||||||
|
[invite blocking](/client-server-api/#invite-permission).
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
|
||||||
|
|
@ -192,11 +192,17 @@ paths:
|
||||||
}
|
}
|
||||||
"403":
|
"403":
|
||||||
description: |-
|
description: |-
|
||||||
The invite is not allowed. This could be for a number of reasons, including:
|
The invite is not allowed.
|
||||||
|
|
||||||
|
The `M_FORBIDDEN` error code is used to indicate one of the following:
|
||||||
|
|
||||||
* The sender is not allowed to send invites to the target user/homeserver.
|
* The sender is not allowed to send invites to the target user/homeserver.
|
||||||
* The homeserver does not permit anyone to invite its users.
|
* The homeserver does not permit anyone to invite its users.
|
||||||
* The homeserver refuses to participate in the room.
|
* The homeserver refuses to participate in the room.
|
||||||
|
|
||||||
|
{{% added-in v="1.18"%}} The `M_INVITE_BLOCKED` error code is used to
|
||||||
|
indicate that the homeserver rejected the invite due to
|
||||||
|
[invite blocking](/client-server-api/#invite-permission).
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
|
|
|
||||||
|
|
@ -34,10 +34,10 @@ paths:
|
||||||
- in: query
|
- in: query
|
||||||
name: minimum_valid_until_ts
|
name: minimum_valid_until_ts
|
||||||
description: |-
|
description: |-
|
||||||
A millisecond POSIX timestamp in milliseconds indicating when the returned
|
A millisecond POSIX timestamp. The returned keys SHOULD be valid
|
||||||
certificates will need to be valid until to be useful to the requesting server.
|
until at least this timestamp.
|
||||||
|
|
||||||
If not supplied, the current time as determined by the notary server is used.
|
If not supplied, the notary server MUST use the current time.
|
||||||
required: false
|
required: false
|
||||||
example: 1234567890
|
example: 1234567890
|
||||||
schema:
|
schema:
|
||||||
|
|
@ -98,12 +98,11 @@ paths:
|
||||||
type: integer
|
type: integer
|
||||||
format: int64
|
format: int64
|
||||||
description: |-
|
description: |-
|
||||||
A millisecond POSIX timestamp in milliseconds indicating when
|
A millisecond POSIX timestamp. The returned keys
|
||||||
the returned certificates will need to be valid until to be
|
SHOULD be valid until at least this timestamp.
|
||||||
useful to the requesting server.
|
|
||||||
|
|
||||||
If not supplied, the current time as determined by the notary
|
If not supplied, the notary server MUST use the
|
||||||
server is used.
|
current time.
|
||||||
example: 1234567890
|
example: 1234567890
|
||||||
required:
|
required:
|
||||||
- server_keys
|
- server_keys
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,7 @@
|
||||||
|
{
|
||||||
|
"$ref": "core/event.json",
|
||||||
|
"type": "m.invite_permission_config",
|
||||||
|
"content": {
|
||||||
|
"default_action": "block"
|
||||||
|
}
|
||||||
|
}
|
||||||
21
data/event-schemas/schema/m.invite_permission_config.yaml
Normal file
21
data/event-schemas/schema/m.invite_permission_config.yaml
Normal file
|
|
@ -0,0 +1,21 @@
|
||||||
|
---
|
||||||
|
$schema: https://json-schema.org/draft/2020-12/schema
|
||||||
|
allOf:
|
||||||
|
- $ref: core-event-schema/event.yaml
|
||||||
|
- title: Invite Permission
|
||||||
|
type: object
|
||||||
|
description: |-
|
||||||
|
The permission configuration for receiving invites for the current account.
|
||||||
|
properties:
|
||||||
|
content:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
default_action:
|
||||||
|
type: string
|
||||||
|
description: |-
|
||||||
|
When set to `block`, the user does not wish to receive *any* room invites, and they
|
||||||
|
should be rejected automatically by the homeserver.
|
||||||
|
|
||||||
|
A missing, invalid or unsupported value means that the user wants to receive invites
|
||||||
|
as normal. Other parts of the specification might still have effects on invites, like
|
||||||
|
[ignoring users](/client-server-api/#ignoring-users).
|
||||||
Loading…
Reference in a new issue