Skip to content

Commit 34f006c

Browse files
clokeprichvdh
authored andcommitted
Strip whitespace.
1 parent c2a3b5d commit 34f006c

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

proposals/3173-expose-stripped-state-events.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ for knocking users:
4343
It is also provides an extended rationale of why this is useful:
4444

4545
> These stripped state events contain information about the room, most notably the
46-
> room's name and avatar. A client will need this information to show a nice
46+
> room's name and avatar. A client will need this information to show a nice
4747
> representation of pending knocked rooms. The recommended events to include are the
4848
> join rules, canonical alias, avatar, name and encryption state of the room, rather
4949
> than all room state. This behaviour matches the information sent to remote
@@ -52,9 +52,9 @@ It is also provides an extended rationale of why this is useful:
5252
[MSC1772: Spaces](https://github.com/matrix-org/matrix-doc/pull/1772) additionally
5353
recommends including the `m.room.create` event as one of the stripped state events:
5454

55-
> Join rules, invites and 3PID invites work as for a normal room, with the exception
55+
> Join rules, invites and 3PID invites work as for a normal room, with the exception
5656
> that `invite_state` sent along with invites should be amended to include the
57-
> `m.room.create` event, to allow clients to discern whether an invite is to a
57+
> `m.room.create` event, to allow clients to discern whether an invite is to a
5858
> space-room or not.
5959
6060
## Proposal
@@ -67,7 +67,7 @@ the following mechanisms:
6767
* A room that has `join_rules` set to `public` or `knock`.<sup id="a1">[1](#f1)</sup>
6868
* A room that the user is in possession of an invite to (regardless of the `join_rules`).
6969

70-
Future MSCs might include additional mechanism for a user to join a room and
70+
Future MSCs might include additional mechanism for a user to join a room and
7171
should consider this MSC, for example:
7272

7373
* [MSC3083: Restricting room membership based on space membership](https://github.com/matrix-org/matrix-doc/pull/3083) proposes allowing users to join a room based on their membership in a space (as defined in [MSC1772](https://github.com/matrix-org/matrix-doc/pull/1772)).
@@ -82,8 +82,8 @@ include the following as stripped state events:
8282
* Room name (`m.room.name`)
8383
* Encrypted status (`m.room.encryption`)<sup id="a3">[3](#f3)</sup>
8484

85-
This also implies that the above information is available to any potential joiner
86-
in the API proposed in [MSC2946: Spaces summary](https://github.com/matrix-org/matrix-doc/pull/2946).
85+
This also implies that the above information is available to any potential joiner
86+
in the API proposed in [MSC2946: Spaces summary](https://github.com/matrix-org/matrix-doc/pull/2946).
8787
I.e. rooms which could be joined due to [MSC3083](https://github.com/matrix-org/matrix-doc/pull/3083)
8888
can expose the information available in stripped state events.
8989

@@ -106,20 +106,20 @@ calling server to properly filter this information.
106106

107107
Consider that Alice and Bob share a server; Alice is a member of a space, but Bob
108108
is not. The remote server will not know whether the request is on behalf of Alice
109-
or Bob (and hence whether it should share details of private rooms within that
109+
or Bob (and hence whether it should share details of private rooms within that
110110
space).
111111

112112
Trust is placed in the calling server: if there are any users on the calling
113113
server in the correct space, that calling server has a right to know about the
114-
rooms in that space and should return the relevant summaries, along with enough
114+
rooms in that space and should return the relevant summaries, along with enough
115115
information that the calling server can then do some filtering.
116116

117-
(The alternative, where the calling server sends the requesting `user_id`, and
117+
(The alternative, where the calling server sends the requesting `user_id`, and
118118
the target server does the filtering, is unattractive because it rules out a
119119
future world where the calling server can cache the result.)
120120

121-
This does not decrease security since a server could lie and make a request on
122-
behalf of a user in the proper space to see the given information. I.e. the
121+
This does not decrease security since a server could lie and make a request on
122+
behalf of a user in the proper space to see the given information. I.e. the
123123
calling server must be trusted anyway.
124124

125125
## Future extensions

0 commit comments

Comments
 (0)