-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Conversation
…ing to invited servers
by putting this in unsigned does it make it vulnerable to spoofing and phishing? |
|
@ara4n: Nope. The event is sent directly to the server, and so is protected bySSL and requestsigning
Yes. In particular: "In v1 C-S API this is copied to a top level key of
No. |
Less important, but we should certainly be adding tests whenever we add an API. Please can this PR get finished, given it's been hanging around for over two weeks, so that client developers can get on and implement the functionality clientside? The point of these serverside quick fixes is to unblock clientside features; not to cut corners. Please correct me if I'm reading this wrong. |
So do you want me to spec this before landing the PR? |
I suggest waiting until the spec patch has landed to merge this PR in case spec review shows up anything, although it doesn't matter that much either way. My point was more that we shouldn't consider the job complete until it's specced. Also, having spec to refer to might help review of this PR.
|
Spec has landed, any objections to me landing this? |
lgtm |
LGTM. |
Bundle in some room state in invites.
Changes:
unsigned.invite_room_state
. In v1 C-S API this is copied to a top level key ofinvite_room_state
.initialSync
.The state events that are included are:
The fields of the events that are included:
type
state_key
content
This is not a particularly nice way of getting this done, but to do it any nicer would probably involve changing the federation API in a non backwards compatible way.