Fix more typos/spelling errors
This commit is contained in:
parent
3f9d183c2a
commit
8e7b33ac99
2 changed files with 23 additions and 22 deletions
|
@ -91,7 +91,7 @@ The functionality that Matrix provides includes:
|
|||
The end goal of Matrix is to be a ubiquitous messaging layer for synchronising
|
||||
arbitrary data between sets of people, devices and services - be that for
|
||||
instant messages, VoIP call setups, or any other objects that need to be
|
||||
reliably and persistently pushed from A to B in an interoperable and federated
|
||||
reliably and persistently pushed from A to B in an inter-operable and federated
|
||||
manner.
|
||||
|
||||
Overview
|
||||
|
@ -185,7 +185,7 @@ Event Graphs
|
|||
Events exchanged in the context of a room are stored in a directed acyclic graph
|
||||
(DAG) called an ``event graph``. The partial ordering of this graph gives the
|
||||
chronological ordering of events within the room. Each event in the graph has a
|
||||
list of zero or more ``parent`` events, which refer to any preceeding events
|
||||
list of zero or more ``parent`` events, which refer to any preceding events
|
||||
which have no chronological successor from the perspective of the homeserver
|
||||
which created the event.
|
||||
|
||||
|
@ -368,7 +368,8 @@ room). An example of a non-proactive client activity would be a client setting
|
|||
key called ``last_active_ago``, which gives the relative number of milliseconds
|
||||
since the message is generated/emitted that the user was last seen active.
|
||||
|
||||
N.B. in v1 API, status/online/idle state are muxed into a single 'presence' field on the m.presence event.
|
||||
N.B. in v1 API, status/online/idle state are muxed into a single 'presence'
|
||||
field on the ``m.presence`` event.
|
||||
|
||||
Presence Lists
|
||||
~~~~~~~~~~~~~~
|
||||
|
@ -386,7 +387,7 @@ Profiles
|
|||
|
||||
Users may publish arbitrary key/value data associated with their account - such
|
||||
as a human readable ``display name``, a profile photo URL, contact information
|
||||
(email address, phone nubers, website URLs etc).
|
||||
(email address, phone numbers, website URLs etc).
|
||||
|
||||
In Client-Server API v2, profile data is typed using namespaced keys for
|
||||
interoperability, much like events - e.g. ``m.profile.display_name``.
|
||||
|
@ -443,7 +444,7 @@ The ``error`` string will be a human-readable error message, usually a sentence
|
|||
explaining what went wrong. The ``errcode`` string will be a unique string
|
||||
which can be used to handle an error message e.g. ``M_FORBIDDEN``. These error
|
||||
codes should have their namespace first in ALL CAPS, followed by a single _ to
|
||||
ease seperating the namespace from the error code.. For example, if there was a
|
||||
ease separating the namespace from the error code.. For example, if there was a
|
||||
custom namespace ``com.mydomain.here``, and a
|
||||
``FORBIDDEN`` code, the error code should look like
|
||||
``COM.MYDOMAIN.HERE_FORBIDDEN``. There may be additional keys depending on the
|
||||
|
|
|
@ -8,11 +8,11 @@ The client-server API provides a simple lightweight API to let clients send
|
|||
messages, control rooms and synchronise conversation history. It is designed to
|
||||
support both lightweight clients which store no state and lazy-load data from
|
||||
the server as required - as well as heavyweight clients which maintain a full
|
||||
local peristent copy of server state.
|
||||
local persistent copy of server state.
|
||||
|
||||
This mostly describes v1 of the Client-Server API as featured in the original September
|
||||
2014 launch of Matrix, apart from user-interactive authentication where it is
|
||||
encouraged to move to V2, therefore this is the version documented here.
|
||||
encouraged to move to v2, therefore this is the version documented here.
|
||||
Version 2 is currently in development (as of Jan-March 2015) as an incremental
|
||||
but backwards-incompatible refinement of Version 1 and will be released
|
||||
shortly.
|
||||
|
@ -154,7 +154,7 @@ Matrix client, for example, an email confirmation may be completed when the user
|
|||
clicks on the link in the email. In this case, the client retries the request
|
||||
with an auth dict containing only the session key. The response to this will be
|
||||
the same as if the client were attempting to complete an auth state normally,
|
||||
ie. the request will either complete or request auth, with the presence or
|
||||
i.e. the request will either complete or request auth, with the presence or
|
||||
absence of that login stage type in the 'completed' array indicating whether
|
||||
that stage is complete.
|
||||
|
||||
|
@ -204,7 +204,7 @@ Password-based
|
|||
:Type:
|
||||
``m.login.password``
|
||||
:Description:
|
||||
The client submits a username and secret password, both sent in plaintext.
|
||||
The client submits a username and secret password, both sent in plain-text.
|
||||
|
||||
To respond to this type, reply with an auth dict as follows::
|
||||
|
||||
|
@ -247,10 +247,10 @@ service which the home server accepts when logging in, this indirection can be
|
|||
skipped and the "uri" key can be the ``Authorization Request URI``.
|
||||
|
||||
The client then visits the ``Authorization Request URI``, which then shows the
|
||||
OAuth2 Allow/Deny prompt. Hitting 'Allow' returns the [XXX: redirects to the?]``redirect URI`` with the
|
||||
auth code. Home servers can choose any path for the ``redirect URI``. Once the
|
||||
OAuth flow has completed, the client retries the request with the session only,
|
||||
as above.
|
||||
OAuth2 Allow/Deny prompt. Hitting 'Allow' redirects to the ``redirect URI`` with
|
||||
the auth code. Home servers can choose any path for the ``redirect URI``. Once
|
||||
the OAuth flow has completed, the client retries the request with the session
|
||||
only, as above.
|
||||
|
||||
Email-based (identity server)
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
@ -308,7 +308,7 @@ Where ``stage type`` is the type name of the stage it is attempting and
|
|||
``session id`` is the ID of the session given by the home server.
|
||||
|
||||
This MUST return an HTML page which can perform this authentication stage. This
|
||||
page must attempt to call the Javascript function ``window.onAuthDone`` when
|
||||
page must attempt to call the JavaScript function ``window.onAuthDone`` when
|
||||
the authentication has been completed.
|
||||
|
||||
Pagination
|
||||
|
@ -373,7 +373,7 @@ now show page 3 (rooms R11 -> 15)::
|
|||
Returns: R11,R12,R13,R14,R15
|
||||
|
||||
Note that tokens are treated in an *exclusive*, not inclusive, manner. The end
|
||||
token from the intial request was '9' which corresponded to R10. When the 2nd
|
||||
token from the initial request was '9' which corresponded to R10. When the 2nd
|
||||
request was made, R10 did not appear again, even though from=9 was specified. If
|
||||
you know the token, you already have the data.
|
||||
|
||||
|
@ -425,7 +425,7 @@ You can visualise the range of events being returned as::
|
|||
| |
|
||||
start: '1-2-3' end: 'a-b-c'
|
||||
|
||||
Now, to receive future events in realtime on the eventstream, you simply GET
|
||||
Now, to receive future events in real-time on the eventstream, you simply GET
|
||||
$PREFIX/events with a ``from`` parameter of 'a-b-c': in other words passing in the
|
||||
``end`` token returned by initial sync. The request blocks until new events are
|
||||
available or until your specified timeout elapses, and then returns a
|
||||
|
@ -467,7 +467,7 @@ event stream. When the request returns, an ``end`` token is included in the
|
|||
response. This token can be used in the next request to continue where the
|
||||
last request left off.
|
||||
|
||||
All events must be deduplicated based on their event ID.
|
||||
All events must be de-duplicated based on their event ID.
|
||||
|
||||
.. TODO
|
||||
is deduplication actually a hard requirement in CS v2?
|
||||
|
@ -493,7 +493,7 @@ Room events are split into two categories:
|
|||
|
||||
:Message events:
|
||||
These are events which describe transient "once-off" activity in a room:
|
||||
typically communication such as sending an instant messaage or setting up a
|
||||
typically communication such as sending an instant message or setting up a
|
||||
VoIP call. These used to be called 'non-state' events.
|
||||
|
||||
This specification outlines several events, all with the event type prefix
|
||||
|
@ -971,7 +971,7 @@ Registering for a user account is done using the request::
|
|||
POST $V2PREFIX/register
|
||||
|
||||
This API endpoint uses the User-Interactive Authentication API.
|
||||
This API endoint does not require an access token.
|
||||
This API endpoint does not require an access token.
|
||||
|
||||
The body of the POST request is a JSON object containing:
|
||||
|
||||
|
@ -1059,7 +1059,7 @@ The third party identifier credentials object comprises:
|
|||
|
||||
id_server
|
||||
The colon-separated hostname and port of the Identity Server used to
|
||||
authenticate the third party identifer. If the port is the default, it and the
|
||||
authenticate the third party identifier. If the port is the default, it and the
|
||||
colon should be omitted.
|
||||
sid
|
||||
The session ID given by the Identity Server
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue