Skip to content

Commit d399653

Browse files
clokepanoadragon453
authored andcommitted
Fix typos.
Co-authored-by: Andrew Morgan <[email protected]>
1 parent 72961e6 commit d399653

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

proposals/3083-restricted-rooms.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Any entries in the list which do not match the expected format are ignored. Thus
5757
if all entries are invalid, the list behaves as if empty and all users without
5858
an invite are rejected.
5959

60-
When an homeserver receives a `/join` request from a client or a `/make_join` /
60+
When a homeserver receives a `/join` request from a client or a `/make_join` /
6161
`/send_join` request from another homeserver, the request should only be permitted
6262
if the user is invited to this room, or is joined to one of the listed rooms. If
6363
the user is not a member of at least one of the rooms, the homeserver should return
@@ -102,7 +102,7 @@ caveat that servers must ensure that:
102102
* The auth chain of the join event needs to include events which prove
103103
the homeserver can be issuing the join. This can be done by including:
104104

105-
* The `m.room.power_levels` event
105+
* The `m.room.power_levels` event.
106106
* The join event of the user specified in `join_authorised_via_users_server`.
107107

108108
It should be confirmed that the authorising user is in the room. (This
@@ -182,7 +182,7 @@ generating a join event. Peeking over federation, as described in
182182
could be used to establish if the user is in any of the proper rooms.
183183

184184
This would then delegate power out to a (potentially) untrusted server, giving that
185-
the peek server significant power. For example, a poorly chosen peek
185+
peek server significant power. For example, a poorly chosen peek
186186
server could lie about the room membership and add an `@evil_user:example.org`
187187
to an allowed room to gain membership to a room.
188188

@@ -193,7 +193,7 @@ the requesting homeserver to retry via another homeserver.
193193

194194
In the above example, suppose `@bob:server.example` leaves `!users:example.org`:
195195
should they be removed from the room? Likely not, by analogy with what happens
196-
when you switch the join rules from public to invite. Join rules currently govern
196+
when you switch the join rules from `public` to `invite`. Join rules currently govern
197197
joins, not existing room membership.
198198

199199
It is left to a future MSC to consider this, but some potential thoughts are
@@ -209,7 +209,7 @@ Another consideration is that users may have joined via a direct invite, not via
209209
access through a room.
210210

211211
Fixing this is thorny. Some sort of annotation on the membership events might
212-
help. but it's unclear what the desired semantics are:
212+
help, but it's unclear what the desired semantics are:
213213

214214
* Assuming that users in an allowed room are *not* kicked when that room is
215215
removed from `allow`, are those users then given a pass to remain
@@ -236,7 +236,7 @@ restricting access via:
236236
* MXIDs or servers.
237237
* A shared secret (room password).
238238

239-
These are just examples are not fully thought through for this MSC, but it should
239+
These are just examples and are not fully thought through for this MSC, but it should
240240
be possible to add these behaviors in the future.
241241

242242
### Client considerations

0 commit comments

Comments
 (0)