2014-08-28 04:35:15 -06:00
|
|
|
Matrix Specification
|
|
|
|
====================
|
|
|
|
|
|
|
|
TODO(Introduction) : Matthew
|
|
|
|
- Similar to intro paragraph from README.
|
|
|
|
- Explaining the overall mission, what this spec describes...
|
|
|
|
- "What is Matrix?"
|
2014-08-28 10:40:04 -06:00
|
|
|
- Draw parallels with email?
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
Architecture
|
|
|
|
============
|
2014-08-29 04:41:48 -06:00
|
|
|
|
|
|
|
Clients transmit data to other clients through home servers (HSes). Clients do not communicate with each
|
|
|
|
other directly.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
::
|
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
How data flows between clients
|
|
|
|
==============================
|
|
|
|
|
|
|
|
{ Matrix client A } { Matrix client B }
|
2014-08-28 04:35:15 -06:00
|
|
|
^ | ^ |
|
|
|
|
| events | | events |
|
|
|
|
| V | V
|
|
|
|
+------------------+ +------------------+
|
|
|
|
| |---------( HTTP )---------->| |
|
|
|
|
| Home Server | | Home Server |
|
|
|
|
| |<--------( HTTP )-----------| |
|
2014-08-28 10:40:04 -06:00
|
|
|
+------------------+ Federation +------------------+
|
|
|
|
|
2014-08-29 04:41:48 -06:00
|
|
|
A "Client" is an end-user, typically a human using a web application or mobile app. Clients use the
|
|
|
|
"Client-to-Server" (C-S) API to communicate with their home server. A single Client is usually
|
|
|
|
responsible for a single user account. A user account is represented by their "User ID". This ID is
|
|
|
|
namespaced to the home server which allocated the account and looks like::
|
|
|
|
|
|
|
|
@localpart:domain
|
|
|
|
|
2014-08-29 10:45:01 -06:00
|
|
|
The ``localpart`` of a user ID may be a user name, or an opaque ID identifying this user. They are
|
|
|
|
case-insensitive.
|
2014-08-29 04:41:48 -06:00
|
|
|
|
|
|
|
A "Home Server" is a server which provides C-S APIs and has the ability to federate with other HSes.
|
|
|
|
It is typically responsible for multiple clients. "Federation" is the term used to describe the
|
|
|
|
sharing of data between two or more home servers.
|
|
|
|
|
|
|
|
Data in Matrix is encapsulated in an "Event". An event is an action within the system. Typically each
|
|
|
|
action (e.g. sending a message) correlates with exactly one event. Each event has a ``type`` which is
|
|
|
|
used to differentiate different kinds of data. ``type`` values SHOULD be namespaced according to standard
|
|
|
|
Java package naming conventions, e.g. ``com.example.myapp.event``. Events are usually sent in the context
|
|
|
|
of a "Room".
|
2014-08-28 10:40:04 -06:00
|
|
|
|
|
|
|
Room structure
|
|
|
|
--------------
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-29 04:41:48 -06:00
|
|
|
A room is a conceptual place where users can send and receive events. Rooms
|
|
|
|
can be created, joined and left. Events are sent to a room, and all
|
|
|
|
participants in that room will receive the event. Rooms are uniquely
|
|
|
|
identified via a "Room ID", which look like::
|
2014-08-28 10:40:04 -06:00
|
|
|
|
2014-08-29 04:41:48 -06:00
|
|
|
!opaque_id:domain
|
2014-08-29 03:30:14 -06:00
|
|
|
|
2014-08-29 04:41:48 -06:00
|
|
|
There is exactly one room ID for each room. Whilst the room ID does contain a
|
|
|
|
domain, it is simply for namespacing room IDs. The room does NOT reside on the
|
2014-08-29 10:45:01 -06:00
|
|
|
domain specified. Room IDs are not meant to be human readable. They ARE
|
|
|
|
case-sensitive.
|
2014-08-29 03:30:14 -06:00
|
|
|
|
2014-08-29 04:41:48 -06:00
|
|
|
The following diagram shows an ``m.room.message`` event being sent in the room
|
|
|
|
``!qporfwt:matrix.org``::
|
2014-08-28 10:40:04 -06:00
|
|
|
|
|
|
|
{ @alice:matrix.org } { @bob:domain.com }
|
|
|
|
| ^
|
|
|
|
| |
|
|
|
|
Room ID: !qporfwt:matrix.org Room ID: !qporfwt:matrix.org
|
|
|
|
Event type: m.room.message Event type: m.room.message
|
|
|
|
Content: { JSON object } Content: { JSON object }
|
|
|
|
| |
|
|
|
|
V |
|
2014-08-29 03:30:14 -06:00
|
|
|
+------------------+ +------------------+
|
|
|
|
| Home Server | | Home Server |
|
|
|
|
| matrix.org |<-------Federation------->| domain.com |
|
|
|
|
+------------------+ +------------------+
|
|
|
|
| ................................. |
|
2014-08-29 04:41:48 -06:00
|
|
|
|______| Partially Shared State |_______|
|
|
|
|
| Room ID: !qporfwt:matrix.org |
|
2014-08-29 03:30:14 -06:00
|
|
|
| Servers: matrix.org, domain.com |
|
|
|
|
| Members: |
|
|
|
|
| - @alice:matrix.org |
|
|
|
|
| - @bob:domain.com |
|
|
|
|
|.................................|
|
|
|
|
|
2014-08-29 04:41:48 -06:00
|
|
|
Federation maintains shared state between multiple home servers, such that when an event is
|
|
|
|
sent to a room, the home server knows where to forward the event on to, and how to process
|
|
|
|
the event. Home servers do not need to have completely shared state in order to participate
|
|
|
|
in a room. State is scoped to a single room, and federation ensures that all home servers
|
|
|
|
have the information they need, even if that means the home server has to request more
|
|
|
|
information from another home server before processing the event.
|
|
|
|
|
|
|
|
Room Aliases
|
|
|
|
------------
|
|
|
|
|
|
|
|
Each room can also have multiple "Room Aliases", which looks like::
|
|
|
|
|
|
|
|
#room_alias:domain
|
|
|
|
|
|
|
|
A room alias "points" to a room ID. The room ID the alias is pointing to can be obtained
|
|
|
|
by visiting the domain specified. Room aliases are designed to be human readable strings
|
2014-08-29 10:45:01 -06:00
|
|
|
which can be used to publicise rooms. They are case-insensitive. Note that the mapping
|
|
|
|
from a room alias to a room ID is not fixed, and may change over time to point to a
|
|
|
|
different room ID. For this reason, Clients SHOULD resolve the room alias to a room ID
|
|
|
|
once and then use that ID on subsequent requests.
|
2014-08-29 04:41:48 -06:00
|
|
|
|
|
|
|
::
|
|
|
|
|
|
|
|
GET
|
|
|
|
#matrix:domain.com !aaabaa:matrix.org
|
|
|
|
| ^
|
|
|
|
| |
|
|
|
|
_______V____________________|____
|
|
|
|
| domain.com |
|
|
|
|
| Mappings: |
|
|
|
|
| #matrix >> !aaabaa:matrix.org |
|
|
|
|
| #golf >> !wfeiofh:sport.com |
|
|
|
|
| #bike >> !4rguxf:matrix.org |
|
|
|
|
|________________________________|
|
2014-08-28 10:40:04 -06:00
|
|
|
|
|
|
|
|
|
|
|
Identity
|
|
|
|
--------
|
|
|
|
- Identity in relation to 3PIDs. Discovery of users based on 3PIDs.
|
|
|
|
- Identity servers; trusted clique of servers which replicate content.
|
|
|
|
- They govern the mapping of 3PIDs to user IDs and the creation of said mappings.
|
|
|
|
- Not strictly required in order to communicate.
|
|
|
|
|
|
|
|
|
|
|
|
API Standards
|
|
|
|
-------------
|
2014-08-29 06:50:25 -06:00
|
|
|
All communication in Matrix is performed over HTTP[S] using a Content-Type of ``application/json``.
|
|
|
|
Any errors which occur on the Matrix API level MUST return a "standard error response". This is a
|
|
|
|
JSON object which looks like::
|
|
|
|
|
|
|
|
{
|
|
|
|
"errcode": "<error code>",
|
|
|
|
"error": "<error message>"
|
|
|
|
}
|
|
|
|
|
|
|
|
The ``error`` string will be a human-readable error message, usually a sentence
|
|
|
|
explaining what went wrong. The ``errcode`` string will be a unique string which can be
|
|
|
|
used to handle an error message e.g. ``M_FORBIDDEN``. These error codes should have their
|
|
|
|
namespace first in ALL CAPS, followed by a single _. For example, if there was a custom
|
|
|
|
namespace ``com.mydomain.here``, and a ``FORBIDDEN`` code, the error code should look
|
|
|
|
like ``COM.MYDOMAIN.HERE_FORBIDDEN``. There may be additional keys depending on
|
|
|
|
the error, but the keys ``error`` and ``errcode`` MUST always be present.
|
|
|
|
|
|
|
|
Some standard error codes are below:
|
|
|
|
|
|
|
|
:``M_FORBIDDEN``:
|
|
|
|
Forbidden access, e.g. joining a room without permission, failed login.
|
|
|
|
|
|
|
|
:``M_UNKNOWN_TOKEN``:
|
|
|
|
The access token specified was not recognised.
|
|
|
|
|
|
|
|
:``M_BAD_JSON``:
|
|
|
|
Request contained valid JSON, but it was malformed in some way, e.g. missing
|
|
|
|
required keys, invalid values for keys.
|
|
|
|
|
|
|
|
:``M_NOT_JSON``:
|
|
|
|
Request did not contain valid JSON.
|
|
|
|
|
|
|
|
:``M_NOT_FOUND``:
|
|
|
|
No resource was found for this request.
|
|
|
|
|
2014-09-01 07:44:18 -06:00
|
|
|
:``M_LIMIT_EXCEEDED``:
|
|
|
|
Too many requests have been sent in a short period of time. Wait a while then
|
|
|
|
try again.
|
|
|
|
|
2014-08-29 06:50:25 -06:00
|
|
|
Some requests have unique error codes:
|
|
|
|
|
|
|
|
:``M_USER_IN_USE``:
|
|
|
|
Encountered when trying to register a user ID which has been taken.
|
|
|
|
|
|
|
|
:``M_ROOM_IN_USE``:
|
|
|
|
Encountered when trying to create a room which has been taken.
|
|
|
|
|
|
|
|
:``M_BAD_PAGINATION``:
|
|
|
|
Encountered when specifying bad pagination query parameters.
|
|
|
|
|
|
|
|
:``M_LOGIN_EMAIL_URL_NOT_YET``:
|
|
|
|
Encountered when polling for an email link which has not been clicked yet.
|
|
|
|
|
|
|
|
The C-S API typically uses ``HTTP POST`` to submit requests. This means these requests
|
|
|
|
are not idempotent. The C-S API also allows ``HTTP PUT`` to make requests idempotent.
|
|
|
|
In order to use a ``PUT``, paths should be suffixed with ``/{txnId}``. ``{txnId}`` is a
|
|
|
|
client-generated transaction ID which identifies the request. Crucially, it **only**
|
|
|
|
serves to identify new requests from retransmits. After the request has finished, the
|
|
|
|
``{txnId}`` value should be changed (how is not specified, it could be a monotonically
|
|
|
|
increasing integer, etc). It is preferable to use ``HTTP PUT`` to make sure requests to
|
|
|
|
send messages do not get sent more than once should clients need to retransmit requests.
|
|
|
|
|
|
|
|
Valid requests look like::
|
|
|
|
|
|
|
|
POST /some/path/here
|
|
|
|
{
|
|
|
|
"key": "This is a post."
|
|
|
|
}
|
|
|
|
|
|
|
|
PUT /some/path/here/11
|
|
|
|
{
|
|
|
|
"key": "This is a put with a txnId of 11."
|
|
|
|
}
|
|
|
|
|
|
|
|
In contrast, these are invalid requests::
|
|
|
|
|
|
|
|
POST /some/path/here/11
|
|
|
|
{
|
|
|
|
"key": "This is a post, but it has a txnId."
|
|
|
|
}
|
|
|
|
|
|
|
|
PUT /some/path/here
|
|
|
|
{
|
|
|
|
"key": "This is a put but it is missing a txnId."
|
|
|
|
}
|
2014-08-28 10:40:04 -06:00
|
|
|
|
2014-08-29 10:45:01 -06:00
|
|
|
|
|
|
|
|
|
|
|
- TODO: All strings everywhere are UTF-8
|
|
|
|
|
|
|
|
|
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
Receiving live updates on a client
|
|
|
|
----------------------------------
|
2014-08-29 09:50:26 -06:00
|
|
|
Clients can receive new events by long-polling the home server. This will hold open the
|
|
|
|
HTTP connection for a short period of time waiting for new events, returning early if an
|
|
|
|
event occurs. This is called the "Event Stream". All events which the client is authorised
|
|
|
|
to view will appear in the event stream. When the stream is closed, an ``end`` token is
|
|
|
|
returned. This token can be used in the next request to continue where the client left off.
|
2014-08-28 10:40:04 -06:00
|
|
|
|
2014-08-29 09:50:26 -06:00
|
|
|
When the client first logs in, they will need to initially synchronise with their home
|
|
|
|
server. This is achieved via the ``/initialSync`` API. This API also returns an ``end``
|
|
|
|
token which can be used with the event stream.
|
2014-08-28 10:40:04 -06:00
|
|
|
|
|
|
|
Rooms
|
|
|
|
=====
|
2014-08-29 09:50:26 -06:00
|
|
|
|
|
|
|
Creation
|
|
|
|
--------
|
|
|
|
To create a room, a client has to use the ``/createRoom`` API. There are various options
|
|
|
|
which can be set when creating a room:
|
|
|
|
|
|
|
|
``visibility``
|
|
|
|
Type:
|
|
|
|
String
|
|
|
|
Optional:
|
|
|
|
Yes
|
|
|
|
Value:
|
|
|
|
Either ``public`` or ``private``.
|
|
|
|
Description:
|
|
|
|
A ``public`` visibility indicates that the room will be shown in the public room list. A
|
|
|
|
``private`` visibility will hide the room from the public room list. Rooms default to
|
|
|
|
``public`` visibility if this key is not included.
|
|
|
|
|
|
|
|
``room_alias_name``
|
|
|
|
Type:
|
|
|
|
String
|
|
|
|
Optional:
|
|
|
|
Yes
|
|
|
|
Value:
|
|
|
|
The room alias localpart.
|
|
|
|
Description:
|
|
|
|
If this is included, a room alias will be created and mapped to the newly created room.
|
|
|
|
The alias will belong on the same home server which created the room, e.g.
|
|
|
|
``!qadnasoi:domain.com >>> #room_alias_name:domain.com``
|
|
|
|
|
|
|
|
Example::
|
|
|
|
|
|
|
|
{
|
|
|
|
"visibility": "public",
|
|
|
|
"room_alias_name": "the pub"
|
|
|
|
}
|
|
|
|
|
|
|
|
- TODO: This creates a room creation event which serves as the root of the PDU graph for this room.
|
2014-09-01 07:44:18 -06:00
|
|
|
- TODO: Keys for speccing a room name / room topic / invite these users?
|
2014-08-29 09:50:26 -06:00
|
|
|
|
|
|
|
Modifying aliases
|
|
|
|
-----------------
|
2014-08-28 10:40:04 -06:00
|
|
|
- Adding / removing aliases.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-29 09:50:26 -06:00
|
|
|
Permissions
|
|
|
|
-----------
|
|
|
|
- TODO : Room permissions / config / power levels. What they are. How do they work. Examples.
|
|
|
|
|
2014-09-01 03:38:39 -06:00
|
|
|
Joining rooms
|
|
|
|
-------------
|
2014-09-01 07:44:18 -06:00
|
|
|
- TODO: What does the home server have to do to join a user to a room?
|
|
|
|
|
|
|
|
Users need to join a room in order to send and receive events in that room. A user can join a
|
|
|
|
room by making a request to ``/join/<room alias or id>`` with::
|
|
|
|
|
|
|
|
{}
|
|
|
|
|
|
|
|
Alternatively, a user can make a request to ``/rooms/<room id>/join`` with the same request content.
|
|
|
|
This is only provided for symmetry with the other membership APIs: ``/rooms/<room id>/invite`` and
|
|
|
|
``/rooms/<room id>/leave``. If a room alias was specified, it will be automatically resolved to
|
|
|
|
a room ID, which will then be joined. The room ID that was joined will be returned in response::
|
|
|
|
|
|
|
|
{
|
|
|
|
"room_id": "!roomid:domain"
|
|
|
|
}
|
|
|
|
|
|
|
|
The membership state for the joining user can also be modified directly to be ``join``
|
|
|
|
by sending the following request to
|
|
|
|
``/rooms/<room id>/state/m.room.member/<url encoded user id>``::
|
|
|
|
|
|
|
|
{
|
|
|
|
"membership": "join"
|
|
|
|
}
|
|
|
|
|
|
|
|
See the "Room events" section for more information on ``m.room.member``.
|
|
|
|
|
|
|
|
After the user has joined a room, they will receive subsequent events in that room. This room
|
|
|
|
will now appear as an entry in the ``/initialSync`` API.
|
2014-09-01 03:38:39 -06:00
|
|
|
|
2014-09-01 07:44:18 -06:00
|
|
|
Some rooms enforce that a user is *invited* to a room before they can join that room. Other
|
|
|
|
rooms will allow anyone to join the room even if they have not received an invite.
|
2014-09-01 03:38:39 -06:00
|
|
|
|
2014-08-29 09:50:26 -06:00
|
|
|
Inviting users
|
|
|
|
--------------
|
2014-09-01 03:38:39 -06:00
|
|
|
- Can invite users to a room if the room config key TODO is set to TODO. Must have required power level.
|
|
|
|
- Outline invite join dance. What is it? Why is it required? How does it work?
|
|
|
|
- What does the home server have to do?
|
|
|
|
|
|
|
|
The purpose of inviting users to a room is to notify them that the room exists
|
|
|
|
so they can choose to become a member of that room. Some rooms require that all
|
|
|
|
users who join a room are previously invited to it (an "invite-only" room).
|
|
|
|
Whether a given room is an "invite-only" room is determined by the room config
|
|
|
|
key ``TODO``. It can have one of the following values:
|
|
|
|
|
|
|
|
- TODO Room config invite only value explanation
|
|
|
|
- TODO Room config free-to-join value explanation
|
|
|
|
|
|
|
|
Only users who have a membership state of ``join`` in a room can invite new
|
|
|
|
users to said room. The person being invited must not be in the ``join`` state
|
|
|
|
in the room. The fully-qualified user ID must be specified when inviting a user,
|
|
|
|
as the user may reside on a different home server. To invite a user, send the
|
|
|
|
following request to ``/rooms/<room id>/invite``, which will manage the
|
|
|
|
entire invitation process::
|
2014-08-29 09:50:26 -06:00
|
|
|
|
2014-09-01 03:38:39 -06:00
|
|
|
{
|
|
|
|
"user_id": "<user id to invite>"
|
|
|
|
}
|
|
|
|
|
|
|
|
Alternatively, the membership state for this user in this room can be modified
|
|
|
|
directly by sending the following request to
|
|
|
|
``/rooms/<room id>/state/m.room.member/<url encoded user id>``::
|
|
|
|
|
|
|
|
{
|
|
|
|
"membership": "invite"
|
|
|
|
}
|
|
|
|
|
|
|
|
See the "Room events" section for more information on ``m.room.member``.
|
|
|
|
|
|
|
|
- TODO: In what circumstances will this NOT be equivalent to ``/invite``?
|
2014-08-29 09:50:26 -06:00
|
|
|
|
|
|
|
Leaving rooms
|
|
|
|
-------------
|
2014-09-01 07:44:18 -06:00
|
|
|
A user can leave a room to stop receiving events for that room. A user must have
|
|
|
|
joined the room before they are eligible to leave the room. If the room is an
|
|
|
|
"invite-only" room, they will need to be re-invited before they can re-join the room.
|
|
|
|
To leave a room, a request should be made to ``/rooms/<room id>/leave`` with::
|
|
|
|
|
|
|
|
{}
|
|
|
|
|
|
|
|
Alternatively, the membership state for this user in this room can be modified
|
|
|
|
directly by sending the following request to
|
|
|
|
``/rooms/<room id>/state/m.room.member/<url encoded user id>``::
|
|
|
|
|
|
|
|
{
|
|
|
|
"membership": "leave"
|
|
|
|
}
|
|
|
|
|
|
|
|
See the "Room events" section for more information on ``m.room.member``.
|
|
|
|
|
|
|
|
Once a user has left a room, that room will no longer appear on the ``/initialSync``
|
|
|
|
API. Be aware that leaving a room is not equivalent to have never been
|
|
|
|
in that room. A user who has previously left a room still maintains some residual state in
|
|
|
|
that room. Their membership state will be marked as ``leave``. This contrasts with
|
|
|
|
a user who has *never been invited or joined to that room* who will not have any
|
|
|
|
membership state for that room.
|
|
|
|
|
|
|
|
If all members in a room leave, that room becomes eligible for deletion.
|
|
|
|
- TODO: Grace period before deletion?
|
|
|
|
- TODO: Under what conditions should a room NOT be purged?
|
2014-08-29 09:50:26 -06:00
|
|
|
|
2014-09-01 03:38:39 -06:00
|
|
|
Events in a room
|
|
|
|
----------------
|
2014-09-01 08:58:12 -06:00
|
|
|
Room events can be split into two categories:
|
|
|
|
|
|
|
|
:State Events:
|
|
|
|
These are events which replace events that came before it, depending on a set of unique keys.
|
|
|
|
These keys are the event ``type`` and a ``state_key``. Events with the same set of keys will
|
|
|
|
be overwritten. Typically, state events are used to store state, hence their name.
|
|
|
|
|
|
|
|
:Non-state events:
|
|
|
|
These are events which cannot be overwritten after sending. The list of events continues
|
|
|
|
to grow as more events are sent. As this list grows, it becomes necessary to
|
|
|
|
provide a mechanism for navigating this list. Pagination APIs are used to view the list
|
|
|
|
of historical non-state events. Typically, non-state events are used to send messages.
|
|
|
|
|
|
|
|
This specification outlines several events, all with the event type prefix ``m.``. However,
|
|
|
|
applications may wish to add their own type of event, and this can be achieved using the
|
|
|
|
REST API detailed in the following sections. If new events are added, the event ``type``
|
|
|
|
key SHOULD follow the Java package naming convention, e.g. ``com.example.myapp.event``.
|
|
|
|
This ensures event types are suitably namespaced for each application and reduces the
|
|
|
|
risk of clashes.
|
|
|
|
|
|
|
|
State events
|
|
|
|
------------
|
|
|
|
State events can be sent by ``PUT`` ing to ``/rooms/<room id>/state/<event type>/<state key>``.
|
|
|
|
These events will be overwritten if ``<room id>``, ``<event type>`` and ``<state key>`` all match.
|
|
|
|
If the state event has no ``state_key``, it can be omitted from the path. These requests
|
|
|
|
**cannot use transaction IDs** like other ``PUT`` paths because they cannot be differentiated
|
|
|
|
from the ``state key``. Furthermore, ``POST`` is unsupported on state paths. Valid requests
|
|
|
|
look like::
|
|
|
|
|
|
|
|
PUT /rooms/!roomid:domain/state/m.example.event
|
|
|
|
{ "key" : "without a state key" }
|
|
|
|
|
|
|
|
PUT /rooms/!roomid:domain/state/m.another.example.event/foo
|
|
|
|
{ "key" : "with 'foo' as the state key" }
|
|
|
|
|
|
|
|
In contrast, these requests are invalid::
|
|
|
|
|
|
|
|
POST /rooms/!roomid:domain/state/m.example.event/
|
|
|
|
{ "key" : "cannot use POST here" }
|
|
|
|
|
|
|
|
PUT /rooms/!roomid:domain/state/m.another.example.event/foo/11
|
|
|
|
{ "key" : "txnIds are not supported" }
|
|
|
|
|
|
|
|
Care should be taken to avoid setting the wrong ``state key``::
|
|
|
|
|
|
|
|
PUT /rooms/!roomid:domain/state/m.another.example.event/11
|
|
|
|
{ "key" : "with '11' as the state key, but was probably intended to be a txnId" }
|
|
|
|
|
|
|
|
The ``state_key`` is often used to store state about individual users, by using the user ID as the
|
|
|
|
value. For example::
|
|
|
|
|
|
|
|
PUT /rooms/!roomid:domain/state/m.favorite.animal.event/%40my_user%3Adomain.com
|
|
|
|
{ "animal" : "cat", "reason": "fluffy" }
|
|
|
|
|
|
|
|
In some cases, there may be no need for a ``state_key``, so it can be omitted::
|
|
|
|
|
|
|
|
PUT /rooms/!roomid:domain/state/m.room.bgd.color
|
|
|
|
{ "color": "red", "hex": "#ff0000" }
|
|
|
|
|
|
|
|
See "Room Events" for the ``m.`` event specification.
|
|
|
|
|
|
|
|
Non-state events
|
|
|
|
----------------
|
|
|
|
Non-state events can be sent by sending a request to ``/rooms/<room id>/send/<event type>``.
|
|
|
|
These requests *can* use transaction IDs and ``PUT``/``POST`` methods. Non-state events
|
|
|
|
allow access to historical events and pagination, making it best suited for sending messages.
|
|
|
|
For example::
|
|
|
|
|
|
|
|
POST /rooms/!roomid:domain/send/m.custom.example.message
|
|
|
|
{ "text": "Hello world!" }
|
|
|
|
|
|
|
|
PUT /rooms/!roomid:domain/send/m.custom.example.message/11
|
|
|
|
{ "text": "Goodbye world!" }
|
|
|
|
|
|
|
|
See "Room Events" for the ``m.`` event specification.
|
|
|
|
|
|
|
|
Syncing rooms
|
|
|
|
-------------
|
|
|
|
When a client logs in, they may have a list of rooms which they have already joined. These rooms
|
|
|
|
may also have a list of events associated with them. The purpose of 'syncing' is to present the
|
|
|
|
current room and event information in a convenient, compact manner. There are two APIs provided:
|
|
|
|
|
|
|
|
- ``/initialSync`` : A global sync which will present room and event information for all rooms
|
|
|
|
the user has joined.
|
|
|
|
|
|
|
|
- ``/rooms/<room id>/initialSync`` : A sync scoped to a single room. Presents room and event
|
|
|
|
information for this room only.
|
|
|
|
|
|
|
|
- TODO: JSON response format for both types
|
|
|
|
- TODO: when would you use global? when would you use scoped?
|
2014-08-29 09:50:26 -06:00
|
|
|
|
2014-09-01 08:58:12 -06:00
|
|
|
Getting grouped state events for a room
|
|
|
|
---------------------------------------
|
|
|
|
- ``/members`` and ``/messages`` and the event types they return. Spec JSON response format.
|
|
|
|
- ``/state`` and it returns ALL THE THINGS.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-29 09:50:26 -06:00
|
|
|
Room Events
|
|
|
|
===========
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
This specification outlines several standard event types, all of which are
|
|
|
|
prefixed with ``m.``
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
State messages
|
|
|
|
--------------
|
|
|
|
- m.room.name
|
|
|
|
- m.room.topic
|
|
|
|
- m.room.member
|
|
|
|
- m.room.config
|
|
|
|
- m.room.invite_join
|
|
|
|
|
2014-09-01 03:38:39 -06:00
|
|
|
What are they, when are they used, what do they contain, how should they be used.
|
|
|
|
Link back to explanatory sections (e.g. invite/join/leave sections for m.room.member)
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
Non-state messages
|
|
|
|
------------------
|
|
|
|
- m.room.message
|
|
|
|
- m.room.message.feedback (and compressed format)
|
2014-09-01 07:44:18 -06:00
|
|
|
- voip?
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
What are they, when are they used, what do they contain, how should they be used
|
|
|
|
|
2014-08-28 08:35:20 -06:00
|
|
|
m.room.message msgtypes
|
|
|
|
-----------------------
|
|
|
|
Each ``m.room.message`` MUST have a ``msgtype`` key which identifies the type of
|
|
|
|
message being sent. Each type has their own required and optional keys, as outlined
|
|
|
|
below:
|
|
|
|
|
|
|
|
``m.text``
|
|
|
|
Required keys:
|
|
|
|
- ``body`` : "string" - The body of the message.
|
|
|
|
Optional keys:
|
|
|
|
None.
|
|
|
|
Example:
|
|
|
|
``{ "msgtype": "m.text", "body": "I am a fish" }``
|
|
|
|
|
|
|
|
``m.emote``
|
|
|
|
Required keys:
|
|
|
|
- ``body`` : "string" - The emote action to perform.
|
|
|
|
Optional keys:
|
|
|
|
None.
|
|
|
|
Example:
|
|
|
|
``{ "msgtype": "m.emote", "body": "tries to come up with a witty explanation" }``
|
|
|
|
|
|
|
|
``m.image``
|
|
|
|
Required keys:
|
|
|
|
- ``url`` : "string" - The URL to the image.
|
|
|
|
Optional keys:
|
|
|
|
- ``info`` : "string" - info : JSON object (ImageInfo) - The image info for image
|
|
|
|
referred to in ``url``.
|
|
|
|
- ``thumbnail_url`` : "string" - The URL to the thumbnail.
|
|
|
|
- ``thumbnail_info`` : JSON object (ImageInfo) - The image info for the image
|
|
|
|
referred to in ``thumbnail_url``.
|
|
|
|
- ``body`` : "string" - The alt text of the image, or some kind of content
|
|
|
|
description for accessibility e.g. "image attachment".
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
ImageInfo:
|
|
|
|
Information about an image::
|
2014-08-28 08:35:20 -06:00
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
{
|
|
|
|
"size" : integer (size of image in bytes),
|
|
|
|
"w" : integer (width of image in pixels),
|
|
|
|
"h" : integer (height of image in pixels),
|
|
|
|
"mimetype" : "string (e.g. image/jpeg)",
|
|
|
|
}
|
2014-08-28 08:35:20 -06:00
|
|
|
|
|
|
|
``m.audio``
|
|
|
|
Required keys:
|
|
|
|
- ``url`` : "string" - The URL to the audio.
|
|
|
|
Optional keys:
|
|
|
|
- ``info`` : JSON object (AudioInfo) - The audio info for the audio referred to in
|
|
|
|
``url``.
|
|
|
|
- ``body`` : "string" - A description of the audio e.g. "Bee Gees -
|
|
|
|
Stayin' Alive", or some kind of content description for accessibility e.g.
|
|
|
|
"audio attachment".
|
2014-08-29 03:30:14 -06:00
|
|
|
AudioInfo:
|
|
|
|
Information about a piece of audio::
|
2014-08-28 08:35:20 -06:00
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
{
|
|
|
|
"mimetype" : "string (e.g. audio/aac)",
|
|
|
|
"size" : integer (size of audio in bytes),
|
|
|
|
"duration" : integer (duration of audio in milliseconds),
|
|
|
|
}
|
2014-08-28 08:35:20 -06:00
|
|
|
|
|
|
|
``m.video``
|
|
|
|
Required keys:
|
|
|
|
- ``url`` : "string" - The URL to the video.
|
|
|
|
Optional keys:
|
|
|
|
- ``info`` : JSON object (VideoInfo) - The video info for the video referred to in
|
|
|
|
``url``.
|
|
|
|
- ``body`` : "string" - A description of the video e.g. "Gangnam style",
|
|
|
|
or some kind of content description for accessibility e.g. "video attachment".
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
VideoInfo:
|
|
|
|
Information about a video::
|
2014-08-28 08:35:20 -06:00
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
{
|
|
|
|
"mimetype" : "string (e.g. video/mp4)",
|
|
|
|
"size" : integer (size of video in bytes),
|
|
|
|
"duration" : integer (duration of video in milliseconds),
|
|
|
|
"w" : integer (width of video in pixels),
|
|
|
|
"h" : integer (height of video in pixels),
|
|
|
|
"thumbnail_url" : "string (URL to image)",
|
|
|
|
"thumbanil_info" : JSON object (ImageInfo)
|
|
|
|
}
|
2014-08-28 08:35:20 -06:00
|
|
|
|
|
|
|
``m.location``
|
|
|
|
Required keys:
|
|
|
|
- ``geo_uri`` : "string" - The geo URI representing the location.
|
|
|
|
Optional keys:
|
|
|
|
- ``thumbnail_url`` : "string" - The URL to a thumnail of the location being
|
|
|
|
represented.
|
|
|
|
- ``thumbnail_info`` : JSON object (ImageInfo) - The image info for the image
|
|
|
|
referred to in ``thumbnail_url``.
|
|
|
|
- ``body`` : "string" - A description of the location e.g. "Big Ben,
|
|
|
|
London, UK", or some kind of content description for accessibility e.g.
|
|
|
|
"location attachment".
|
|
|
|
|
|
|
|
The following keys can be attached to any ``m.room.message``:
|
|
|
|
|
|
|
|
Optional keys:
|
|
|
|
- ``sender_ts`` : integer - A timestamp (ms resolution) representing the
|
|
|
|
wall-clock time when the message was sent from the client.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
Presence
|
|
|
|
========
|
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
Each user has the concept of presence information. This encodes the
|
|
|
|
"availability" of that user, suitable for display on other user's clients. This
|
|
|
|
is transmitted as an ``m.presence`` event and is one of the few events which
|
|
|
|
are sent *outside the context of a room*. The basic piece of presence information
|
2014-09-01 07:45:35 -06:00
|
|
|
is represented by the ``presence`` key, which is an enum of one of the following:
|
2014-08-28 10:40:04 -06:00
|
|
|
|
|
|
|
- ``online`` : The default state when the user is connected to an event stream.
|
|
|
|
- ``unavailable`` : The user is not reachable at this time.
|
|
|
|
- ``offline`` : The user is not connected to an event stream.
|
|
|
|
- ``free_for_chat`` : The user is generally willing to receive messages
|
|
|
|
moreso than default.
|
|
|
|
- ``hidden`` : TODO. Behaves as offline, but allows the user to see the client
|
|
|
|
state anyway and generally interact with client features.
|
|
|
|
|
2014-09-01 07:45:35 -06:00
|
|
|
This basic ``presence`` field applies to the user as a whole, regardless of how many
|
2014-08-28 04:35:15 -06:00
|
|
|
client devices they have connected. The home server should synchronise this
|
|
|
|
status choice among multiple devices to ensure the user gets a consistent
|
|
|
|
experience.
|
|
|
|
|
|
|
|
Idle Time
|
|
|
|
---------
|
2014-09-01 07:45:35 -06:00
|
|
|
As well as the basic ``presence`` field, the presence information can also show
|
|
|
|
a sense of an "idle timer". This should be maintained individually by the
|
|
|
|
user's clients, and the home server can take the highest reported time as that
|
|
|
|
to report. When a user is offline, the home server can still report when the
|
|
|
|
user was last seen online.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
Transmission
|
|
|
|
------------
|
|
|
|
- Transmitted as an EDU.
|
|
|
|
- Presence lists determine who to send to.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
Presence List
|
|
|
|
-------------
|
|
|
|
Each user's home server stores a "presence list" for that user. This stores a
|
2014-08-28 10:40:04 -06:00
|
|
|
list of other user IDs the user has chosen to add to it. To be added to this
|
|
|
|
list, the user being added must receive permission from the list owner. Once
|
|
|
|
granted, both user's HS(es) store this information. Since such subscriptions
|
2014-08-28 04:35:15 -06:00
|
|
|
are likely to be bidirectional, HSes may wish to automatically accept requests
|
|
|
|
when a reverse subscription already exists.
|
|
|
|
|
|
|
|
Presence and Permissions
|
|
|
|
------------------------
|
|
|
|
For a viewing user to be allowed to see the presence information of a target
|
2014-08-28 10:40:04 -06:00
|
|
|
user, either:
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
- The target user has allowed the viewing user to add them to their presence
|
2014-08-28 04:35:15 -06:00
|
|
|
list, or
|
2014-08-28 10:40:04 -06:00
|
|
|
- The two users share at least one room in common
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
In the latter case, this allows for clients to display some minimal sense of
|
|
|
|
presence information in a user list for a room.
|
|
|
|
|
|
|
|
Typing notifications
|
|
|
|
====================
|
|
|
|
|
|
|
|
TODO : Leo
|
|
|
|
|
|
|
|
Voice over IP
|
|
|
|
=============
|
|
|
|
|
|
|
|
TODO : Dave
|
|
|
|
|
|
|
|
Profiles
|
|
|
|
========
|
|
|
|
|
|
|
|
Internally within Matrix users are referred to by their user ID, which is not a
|
|
|
|
human-friendly string. Profiles grant users the ability to see human-readable
|
|
|
|
names for other users that are in some way meaningful to them. Additionally,
|
|
|
|
profiles can publish additional information, such as the user's age or location.
|
|
|
|
|
|
|
|
A Profile consists of a display name, an avatar picture, and a set of other
|
|
|
|
metadata fields that the user may wish to publish (email address, phone
|
|
|
|
numbers, website URLs, etc...). This specification puts no requirements on the
|
2014-08-28 10:40:04 -06:00
|
|
|
display name other than it being a valid unicode string.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
- Metadata extensibility
|
|
|
|
- Bundled with which events? e.g. m.room.member
|
2014-08-28 10:40:04 -06:00
|
|
|
- Generate own events? What type?
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
Registration and login
|
|
|
|
======================
|
|
|
|
|
|
|
|
Clients must register with a home server in order to use Matrix. After
|
|
|
|
registering, the client will be given an access token which must be used in ALL
|
|
|
|
requests to that home server as a query parameter 'access_token'.
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
- TODO Kegan : Make registration like login (just omit the "user" key on the
|
|
|
|
initial request?)
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
If the client has already registered, they need to be able to login to their
|
|
|
|
account. The home server may provide many different ways of logging in, such
|
2014-08-28 07:49:15 -06:00
|
|
|
as user/password auth, login via a social network (OAuth2), login by confirming
|
2014-08-28 04:35:15 -06:00
|
|
|
a token sent to their email address, etc. This specification does not define how
|
|
|
|
home servers should authorise their users who want to login to their existing
|
|
|
|
accounts, but instead defines the standard interface which implementations
|
|
|
|
should follow so that ANY client can login to ANY home server.
|
|
|
|
|
|
|
|
The login process breaks down into the following:
|
2014-08-28 07:49:15 -06:00
|
|
|
1. Determine the requirements for logging in.
|
2014-08-28 04:35:15 -06:00
|
|
|
2. Submit the login stage credentials.
|
2014-08-28 07:49:15 -06:00
|
|
|
3. Get credentials or be told the next stage in the login process and repeat
|
2014-08-28 04:35:15 -06:00
|
|
|
step 2.
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
As each home server may have different ways of logging in, the client needs to know how
|
2014-08-28 10:40:04 -06:00
|
|
|
they should login. All distinct login stages MUST have a corresponding ``type``.
|
|
|
|
A ``type`` is a namespaced string which details the mechanism for logging in.
|
2014-08-28 07:49:15 -06:00
|
|
|
|
|
|
|
A client may be able to login via multiple valid login flows, and should choose a single
|
|
|
|
flow when logging in. A flow is a series of login stages. The home server MUST respond
|
|
|
|
with all the valid login flows when requested::
|
|
|
|
|
|
|
|
The client can login via 3 paths: 1a and 1b, 2a and 2b, or 3. The client should
|
|
|
|
select one of these paths.
|
|
|
|
|
2014-08-28 07:56:55 -06:00
|
|
|
{
|
|
|
|
"flows": [
|
|
|
|
{
|
|
|
|
"type": "<login type1a>",
|
|
|
|
"stages": [ "<login type 1a>", "<login type 1b>" ]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "<login type2a>",
|
|
|
|
"stages": [ "<login type 2a>", "<login type 2b>" ]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "<login type3>"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
2014-08-28 07:49:15 -06:00
|
|
|
|
|
|
|
After the login is completed, the client's fully-qualified user ID and a new access
|
|
|
|
token MUST be returned::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"user_id": "@user:matrix.org",
|
|
|
|
"access_token": "abcdef0123456789"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
The ``user_id`` key is particularly useful if the home server wishes to support
|
|
|
|
localpart entry of usernames (e.g. "user" rather than "@user:matrix.org"), as the
|
|
|
|
client may not be able to determine its ``user_id`` in this case.
|
|
|
|
|
|
|
|
If a login has multiple requests, the home server may wish to create a session. If
|
|
|
|
a home server responds with a 'session' key to a request, clients MUST submit it in
|
|
|
|
subsequent requests until the login is completed::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"session": "<session id>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
This specification defines the following login types:
|
2014-08-28 10:40:04 -06:00
|
|
|
- ``m.login.password``
|
|
|
|
- ``m.login.oauth2``
|
|
|
|
- ``m.login.email.code``
|
|
|
|
- ``m.login.email.url``
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
Password-based
|
|
|
|
--------------
|
2014-08-28 10:40:04 -06:00
|
|
|
:Type:
|
|
|
|
m.login.password
|
|
|
|
:Description:
|
2014-08-28 07:49:15 -06:00
|
|
|
Login is supported via a username and password.
|
|
|
|
|
|
|
|
To respond to this type, reply with::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"type": "m.login.password",
|
|
|
|
"user": "<user_id or user localpart>",
|
|
|
|
"password": "<password>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
The home server MUST respond with either new credentials, the next stage of the login
|
|
|
|
process, or a standard error response.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
OAuth2-based
|
|
|
|
------------
|
2014-08-28 10:40:04 -06:00
|
|
|
:Type:
|
|
|
|
m.login.oauth2
|
|
|
|
:Description:
|
2014-08-28 07:49:15 -06:00
|
|
|
Login is supported via OAuth2 URLs. This login consists of multiple requests.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
To respond to this type, reply with::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
"type": "m.login.oauth2",
|
2014-08-28 07:49:15 -06:00
|
|
|
"user": "<user_id or user localpart>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
The server MUST respond with::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"uri": <Authorization Request URI OR service selection URI>
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
The home server acts as a 'confidential' client for the purposes of OAuth2.
|
|
|
|
If the uri is a ``sevice selection URI``, it MUST point to a webpage which prompts the
|
|
|
|
user to choose which service to authorize with. On selection of a service, this
|
|
|
|
MUST link through to an ``Authorization Request URI``. If there is only 1 service which the
|
2014-08-28 04:35:15 -06:00
|
|
|
home server accepts when logging in, this indirection can be skipped and the
|
2014-08-28 07:49:15 -06:00
|
|
|
"uri" key can be the ``Authorization Request URI``.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
The client then visits the ``Authorization Request URI``, which then shows the OAuth2
|
|
|
|
Allow/Deny prompt. Hitting 'Allow' returns the ``redirect URI`` with the auth code.
|
|
|
|
Home servers can choose any path for the ``redirect URI``. The client should visit
|
|
|
|
the ``redirect URI``, which will then finish the OAuth2 login process, granting the
|
2014-08-28 04:35:15 -06:00
|
|
|
home server an access token for the chosen service. When the home server gets
|
2014-08-28 07:49:15 -06:00
|
|
|
this access token, it verifies that the cilent has authorised with the 3rd party, and
|
|
|
|
can now complete the login. The OAuth2 ``redirect URI`` (with auth code) MUST respond
|
|
|
|
with either new credentials, the next stage of the login process, or a standard error
|
|
|
|
response.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
For example, if a home server accepts OAuth2 from Google, it would return the
|
|
|
|
Authorization Request URI for Google::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
"uri": "https://accounts.google.com/o/oauth2/auth?response_type=code&
|
|
|
|
client_id=CLIENT_ID&redirect_uri=REDIRECT_URI&scope=photos"
|
|
|
|
}
|
|
|
|
|
|
|
|
The client then visits this URI and authorizes the home server. The client then
|
|
|
|
visits the REDIRECT_URI with the auth code= query parameter which returns::
|
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"user_id": "@user:matrix.org",
|
2014-08-28 04:35:15 -06:00
|
|
|
"access_token": "0123456789abcdef"
|
|
|
|
}
|
|
|
|
|
|
|
|
Email-based (code)
|
|
|
|
------------------
|
2014-08-28 10:40:04 -06:00
|
|
|
:Type:
|
|
|
|
m.login.email.code
|
|
|
|
:Description:
|
2014-08-28 07:49:15 -06:00
|
|
|
Login is supported by typing in a code which is sent in an email. This login
|
|
|
|
consists of multiple requests.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
To respond to this type, reply with::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
"type": "m.login.email.code",
|
2014-08-28 07:49:15 -06:00
|
|
|
"user": "<user_id or user localpart>",
|
|
|
|
"email": "<email address>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
After validating the email address, the home server MUST send an email containing
|
|
|
|
an authentication code and return::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"type": "m.login.email.code",
|
|
|
|
"session": "<session id>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
The second request in this login stage involves sending this authentication code::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
"type": "m.login.email.code",
|
2014-08-28 07:49:15 -06:00
|
|
|
"session": "<session id>",
|
|
|
|
"code": "<code in email sent>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
The home server MUST respond to this with either new credentials, the next stage of
|
|
|
|
the login process, or a standard error response.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
Email-based (url)
|
|
|
|
-----------------
|
2014-08-28 10:40:04 -06:00
|
|
|
:Type:
|
|
|
|
m.login.email.url
|
|
|
|
:Description:
|
2014-08-28 07:49:15 -06:00
|
|
|
Login is supported by clicking on a URL in an email. This login consists of
|
|
|
|
multiple requests.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
To respond to this type, reply with::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
"type": "m.login.email.url",
|
2014-08-28 07:49:15 -06:00
|
|
|
"user": "<user_id or user localpart>",
|
|
|
|
"email": "<email address>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
After validating the email address, the home server MUST send an email containing
|
|
|
|
an authentication URL and return::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"type": "m.login.email.url",
|
|
|
|
"session": "<session id>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
The email contains a URL which must be clicked. After it has been clicked, the
|
2014-08-28 07:49:15 -06:00
|
|
|
client should perform another request::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
"type": "m.login.email.url",
|
2014-08-28 07:49:15 -06:00
|
|
|
"session": "<session id>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
The home server MUST respond to this with either new credentials, the next stage of
|
|
|
|
the login process, or a standard error response.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
A common client implementation will be to periodically poll until the link is clicked.
|
|
|
|
If the link has not been visited yet, a standard error response with an errcode of
|
|
|
|
``M_LOGIN_EMAIL_URL_NOT_YET`` should be returned.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
N-Factor Authentication
|
|
|
|
-----------------------
|
|
|
|
Multiple login stages can be combined to create N-factor authentication during login.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
This can be achieved by responding with the ``next`` login type on completion of a
|
2014-08-28 07:49:15 -06:00
|
|
|
previous login stage::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"next": "<next login type>"
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
If a home server implements N-factor authentication, it MUST respond with all
|
2014-08-28 10:40:04 -06:00
|
|
|
``stages`` when initially queried for their login requirements::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
{
|
2014-08-28 07:49:15 -06:00
|
|
|
"type": "<1st login type>",
|
|
|
|
"stages": [ <1st login type>, <2nd login type>, ... , <Nth login type> ]
|
2014-08-28 04:35:15 -06:00
|
|
|
}
|
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
This can be represented conceptually as::
|
|
|
|
|
|
|
|
_______________________
|
|
|
|
| Login Stage 1 |
|
|
|
|
| type: "<login type1>" |
|
|
|
|
| ___________________ |
|
|
|
|
| |_Request_1_________| | <-- Returns "session" key which is used throughout.
|
|
|
|
| ___________________ |
|
|
|
|
| |_Request_2_________| | <-- Returns a "next" value of "login type2"
|
|
|
|
|_______________________|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_________V_____________
|
|
|
|
| Login Stage 2 |
|
|
|
|
| type: "<login type2>" |
|
|
|
|
| ___________________ |
|
|
|
|
| |_Request_1_________| |
|
|
|
|
| ___________________ |
|
|
|
|
| |_Request_2_________| |
|
|
|
|
| ___________________ |
|
|
|
|
| |_Request_3_________| | <-- Returns a "next" value of "login type3"
|
|
|
|
|_______________________|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_________V_____________
|
|
|
|
| Login Stage 3 |
|
|
|
|
| type: "<login type3>" |
|
|
|
|
| ___________________ |
|
|
|
|
| |_Request_1_________| | <-- Returns user credentials
|
|
|
|
|_______________________|
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
Fallback
|
|
|
|
--------
|
2014-08-28 07:49:15 -06:00
|
|
|
Clients cannot be expected to be able to know how to process every single
|
|
|
|
login type. If a client determines it does not know how to handle a given
|
|
|
|
login type, it should request a login fallback page::
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 07:49:15 -06:00
|
|
|
GET matrix/client/api/v1/login/fallback
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
This MUST return an HTML page which can perform the entire login process.
|
|
|
|
|
|
|
|
Identity
|
|
|
|
========
|
|
|
|
|
|
|
|
TODO : Dave
|
|
|
|
- 3PIDs and identity server, functions
|
|
|
|
|
|
|
|
Federation
|
|
|
|
==========
|
|
|
|
|
|
|
|
Federation is the term used to describe how to communicate between Matrix home
|
|
|
|
servers. Federation is a mechanism by which two home servers can exchange
|
|
|
|
Matrix event messages, both as a real-time push of current events, and as a
|
|
|
|
historic fetching mechanism to synchronise past history for clients to view. It
|
|
|
|
uses HTTP connections between each pair of servers involved as the underlying
|
|
|
|
transport. Messages are exchanged between servers in real-time by active pushing
|
|
|
|
from each server's HTTP client into the server of the other. Queries to fetch
|
|
|
|
historic data for the purpose of back-filling scrollback buffers and the like
|
|
|
|
can also be performed.
|
|
|
|
|
|
|
|
There are three main kinds of communication that occur between home servers:
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
:Queries:
|
2014-08-28 04:35:15 -06:00
|
|
|
These are single request/response interactions between a given pair of
|
2014-08-29 03:30:14 -06:00
|
|
|
servers, initiated by one side sending an HTTP GET request to obtain some
|
2014-08-28 04:35:15 -06:00
|
|
|
information, and responded by the other. They are not persisted and contain
|
|
|
|
no long-term significant history. They simply request a snapshot state at the
|
|
|
|
instant the query is made.
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
:Ephemeral Data Units (EDUs):
|
2014-08-28 04:35:15 -06:00
|
|
|
These are notifications of events that are pushed from one home server to
|
|
|
|
another. They are not persisted and contain no long-term significant history,
|
|
|
|
nor does the receiving home server have to reply to them.
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
:Persisted Data Units (PDUs):
|
2014-08-28 04:35:15 -06:00
|
|
|
These are notifications of events that are broadcast from one home server to
|
|
|
|
any others that are interested in the same "context" (namely, a Room ID).
|
|
|
|
They are persisted to long-term storage and form the record of history for
|
|
|
|
that context.
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
EDUs and PDUs are further wrapped in an envelope called a Transaction, which is
|
|
|
|
transferred from the origin to the destination home server using an HTTP PUT request.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
Transactions
|
|
|
|
------------
|
2014-08-28 04:35:15 -06:00
|
|
|
The transfer of EDUs and PDUs between home servers is performed by an exchange
|
2014-08-29 03:30:14 -06:00
|
|
|
of Transaction messages, which are encoded as JSON objects, passed over an
|
|
|
|
HTTP PUT request. A Transaction is meaningful only to the pair of home servers that
|
|
|
|
exchanged it; they are not globally-meaningful.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
Each transaction has:
|
|
|
|
- An opaque transaction ID.
|
|
|
|
- A timestamp (UNIX epoch time in milliseconds) generated by its origin server.
|
|
|
|
- An origin and destination server name.
|
|
|
|
- A list of "previous IDs".
|
|
|
|
- A list of PDUs and EDUs - the actual message payload that the Transaction carries.
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
::
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
{
|
|
|
|
"transaction_id":"916d630ea616342b42e98a3be0b74113",
|
2014-08-28 04:35:15 -06:00
|
|
|
"ts":1404835423000,
|
|
|
|
"origin":"red",
|
|
|
|
"destination":"blue",
|
|
|
|
"prev_ids":["e1da392e61898be4d2009b9fecce5325"],
|
|
|
|
"pdus":[...],
|
2014-08-29 03:30:14 -06:00
|
|
|
"edus":[...]
|
|
|
|
}
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
The ``prev_ids`` field contains a list of previous transaction IDs that
|
|
|
|
the ``origin`` server has sent to this ``destination``. Its purpose is to act as a
|
2014-08-28 04:35:15 -06:00
|
|
|
sequence checking mechanism - the destination server can check whether it has
|
|
|
|
successfully received that Transaction, or ask for a retransmission if not.
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
The ``pdus`` field of a transaction is a list, containing zero or more PDUs.[*]
|
|
|
|
Each PDU is itself a JSON object containing a number of keys, the exact details of
|
|
|
|
which will vary depending on the type of PDU. Similarly, the ``edus`` field is
|
2014-08-28 04:35:15 -06:00
|
|
|
another list containing the EDUs. This key may be entirely absent if there are
|
|
|
|
no EDUs to transfer.
|
|
|
|
|
|
|
|
(* Normally the PDU list will be non-empty, but the server should cope with
|
|
|
|
receiving an "empty" transaction, as this is useful for informing peers of other
|
|
|
|
transaction IDs they should be aware of. This effectively acts as a push
|
|
|
|
mechanism to encourage peers to continue to replicate content.)
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
PDUs and EDUs
|
|
|
|
-------------
|
|
|
|
|
|
|
|
All PDUs have:
|
|
|
|
- An ID
|
|
|
|
- A context
|
|
|
|
- A declaration of their type
|
|
|
|
- A list of other PDU IDs that have been seen recently on that context (regardless of which origin
|
|
|
|
sent them)
|
2014-08-28 04:35:15 -06:00
|
|
|
|
|
|
|
[[TODO(paul): Update this structure so that 'pdu_id' is a two-element
|
|
|
|
[origin,ref] pair like the prev_pdus are]]
|
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
::
|
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
{
|
|
|
|
"pdu_id":"a4ecee13e2accdadf56c1025af232176",
|
2014-08-28 04:35:15 -06:00
|
|
|
"context":"#example.green",
|
|
|
|
"origin":"green",
|
|
|
|
"ts":1404838188000,
|
|
|
|
"pdu_type":"m.text",
|
|
|
|
"prev_pdus":[["blue","99d16afbc857975916f1d73e49e52b65"]],
|
|
|
|
"content":...
|
2014-08-29 03:30:14 -06:00
|
|
|
"is_state":false
|
|
|
|
}
|
2014-08-28 04:35:15 -06:00
|
|
|
|
2014-08-29 03:30:14 -06:00
|
|
|
In contrast to Transactions, it is important to note that the ``prev_pdus``
|
2014-08-28 04:35:15 -06:00
|
|
|
field of a PDU refers to PDUs that any origin server has sent, rather than
|
2014-08-29 03:30:14 -06:00
|
|
|
previous IDs that this ``origin`` has sent. This list may refer to other PDUs sent
|
2014-08-28 04:35:15 -06:00
|
|
|
by the same origin as the current one, or other origins.
|
|
|
|
|
|
|
|
Because of the distributed nature of participants in a Matrix conversation, it
|
|
|
|
is impossible to establish a globally-consistent total ordering on the events.
|
|
|
|
However, by annotating each outbound PDU at its origin with IDs of other PDUs it
|
|
|
|
has received, a partial ordering can be constructed allowing causallity
|
|
|
|
relationships to be preserved. A client can then display these messages to the
|
|
|
|
end-user in some order consistent with their content and ensure that no message
|
|
|
|
that is semantically in reply of an earlier one is ever displayed before it.
|
|
|
|
|
|
|
|
PDUs fall into two main categories: those that deliver Events, and those that
|
|
|
|
synchronise State. For PDUs that relate to State synchronisation, additional
|
|
|
|
keys exist to support this:
|
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
::
|
|
|
|
|
2014-08-28 04:35:15 -06:00
|
|
|
{...,
|
|
|
|
"is_state":true,
|
|
|
|
"state_key":TODO
|
|
|
|
"power_level":TODO
|
|
|
|
"prev_state_id":TODO
|
|
|
|
"prev_state_origin":TODO}
|
|
|
|
|
|
|
|
[[TODO(paul): At this point we should probably have a long description of how
|
|
|
|
State management works, with descriptions of clobbering rules, power levels, etc
|
|
|
|
etc... But some of that detail is rather up-in-the-air, on the whiteboard, and
|
|
|
|
so on. This part needs refining. And writing in its own document as the details
|
|
|
|
relate to the server/system as a whole, not specifically to server-server
|
|
|
|
federation.]]
|
|
|
|
|
|
|
|
EDUs, by comparison to PDUs, do not have an ID, a context, or a list of
|
|
|
|
"previous" IDs. The only mandatory fields for these are the type, origin and
|
|
|
|
destination home server names, and the actual nested content.
|
|
|
|
|
2014-08-28 10:40:04 -06:00
|
|
|
::
|
|
|
|
|
2014-08-28 04:35:15 -06:00
|
|
|
{"edu_type":"m.presence",
|
|
|
|
"origin":"blue",
|
|
|
|
"destination":"orange",
|
|
|
|
"content":...}
|
|
|
|
|
|
|
|
Backfilling
|
|
|
|
-----------
|
|
|
|
- What it is, when is it used, how is it done
|
|
|
|
|
|
|
|
SRV Records
|
|
|
|
-----------
|
|
|
|
- Why it is needed
|
|
|
|
|
|
|
|
Security
|
|
|
|
========
|
|
|
|
- rate limiting
|
|
|
|
- crypto (s-s auth)
|
|
|
|
- E2E
|
|
|
|
- Lawful intercept + Key Escrow
|
|
|
|
|
|
|
|
TODO Mark
|
|
|
|
|
|
|
|
Policy Servers
|
|
|
|
==============
|
|
|
|
TODO
|
|
|
|
|
|
|
|
Content repository
|
|
|
|
==================
|
|
|
|
- thumbnail paths
|
|
|
|
|
|
|
|
Address book repository
|
|
|
|
=======================
|
|
|
|
- format
|
|
|
|
|
|
|
|
|
|
|
|
Glossary
|
|
|
|
========
|
|
|
|
- domain specific words/acronyms with definitions
|
|
|
|
|
|
|
|
User ID:
|
|
|
|
An opaque ID which identifies an end-user, which consists of some opaque
|
|
|
|
localpart combined with the domain name of their home server.
|