-
Notifications
You must be signed in to change notification settings - Fork 401
MSC4203: Sending to-device events to appservices #4203
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
tulir
wants to merge
1
commit into
main
Choose a base branch
from
tulir/appservice-to-device
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Implementation requirements:
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It looks like both of these exist now 🙂 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,107 @@ | ||
# MSC4203: Sending to-device events to appservices | ||
This MSC is a part of adding end-to-end encryption support to application services. | ||
It was split off from [MSC2409]. The parent MSC for encrypted appservices is [MSC3202]. | ||
|
||
[MSC2409]: https://github.com/matrix-org/matrix-spec-proposals/pull/2409 | ||
[MSC3202]: https://github.com/matrix-org/matrix-spec-proposals/pull/3202 | ||
|
||
## Proposal | ||
A new key, `to_device`, is added to the request body of the appservice API | ||
`/transactions` endpoint. The key contains a list of all to-device events | ||
sent to users who are covered by the namespaces of the appservice. If there are | ||
no new to-device events, the key can be omitted. | ||
|
||
In addition to the usual keys that are included in to-device events in the | ||
client-server `/sync` API, appservice to-device events include `to_user_id` and | ||
`to_device_id` fields to specify which user and device the event was sent to. | ||
|
||
```jsonc | ||
{ | ||
"to_device": [ | ||
{ | ||
"to_user_id": "@appservice_12345:example.com", | ||
"to_device_id": "VPLQFIDCIT", | ||
"type": "m.room.encrypted", | ||
"sender": "@user:example.com", | ||
"content": { | ||
"algorithm": "m.olm.v1.curve25519-aes-sha2", | ||
"sender_key": "...", | ||
"ciphertext": { | ||
"...": {} | ||
} | ||
} | ||
} | ||
], | ||
"events": [ | ||
// ... | ||
], | ||
"ephemeral": [ | ||
// MSC2409... | ||
] | ||
} | ||
``` | ||
|
||
Like [MSC3202], this MSC does not have an opt-in/out flag, as there usually | ||
aren't any devices or to-device traffic if the appservice doesn't support | ||
encryption. | ||
|
||
### Implementation detail: when to delete a to-device message | ||
|
||
Not defined by this MSC is an explicit algorithm for when to delete a to-device message (mark | ||
it as sent). This is left as an implementation detail, though a suggested approach is as | ||
follows: | ||
|
||
* If the message is sent to a user under an appservice's *exclusive* namespace mark it as sent | ||
and delete it. Note that retried transactions will still need to include the message. | ||
* If the message is sent to a user under an appservice's *inclusive* namespace, mark it as sent | ||
to the appservice but do not delete it until a `/sync` request is completed which includes the | ||
message. Note that retried transactions will still need to include the message. | ||
|
||
This approach is largely to align with how namespaces are used by appservices in practice, but | ||
is not applicable to all scenarios (and thus is an implementation detail). The majority of known | ||
appservices use exclusive namespaces, which typically also means that those users will not be | ||
calling `/sync`. Because of this, the server may never get another opportunity to delete the | ||
messages until it has confirmed that the appservice received the transaction successfully. Inclusive | ||
namespaces are typically used when the appservice wants to impact a subset of users, but without | ||
controlling those users explicitly. Typically, inclusive users are also calling `/sync` and so | ||
the appservice should be CC'd on the to-device messages that would normally go down `/sync`. | ||
|
||
For inclusive namespaces, servers may also track who created a device, and not wait for `/sync` | ||
if the device was created using [appservice login] or equivalent future methods like [MSC4190]. | ||
|
||
[appservice login]: https://spec.matrix.org/v1.11/application-service-api/#server-admin-style-permissions | ||
[MSC4190]: https://github.com/matrix-org/matrix-spec-proposals/pull/4190 | ||
|
||
## Potential issues | ||
If servers forget to delete to-device events, they may accumulate in the | ||
database and fill up the disk. | ||
|
||
## Alternatives | ||
Appservices can use `/sync` (as they already do), but it's rather clunky to | ||
need a different way to receive to-device events than normal events. | ||
|
||
Appservices can also be unencrypted, which mostly removes the need for | ||
to-device events. | ||
|
||
### Nested event data | ||
Instead of mixing `to_user_id` and `to_device_id` in with the existing fields, | ||
the existing fields could be nested inside another object. However, unlike room | ||
events, custom fields are not allowed in the top level of to-device events. The | ||
federation format is already quite different than the client-server format: | ||
<https://spec.matrix.org/unstable/server-server-api/#definition-mdirect_to_device>. | ||
Existing server implementations ignore custom top-level fields over federation | ||
when converting to the client format. | ||
|
||
## Security considerations | ||
Receiving to-device events does not have any inherent security implications. | ||
Appservices are already able to log in as users in their namespace and use | ||
`/sync` to receive to-device events, which means no additional privileges are | ||
granted. As always, care should be taken when specifying appservice namespaces. | ||
|
||
## Unstable prefix | ||
Until this MSC is accepted, `de.sorunome.msc2409.to_device` should be used as | ||
the key in transactions requests instead of `to_device`. The key is different | ||
than the MSC number to preserve compatibility with the older version which was | ||
a part of [MSC2409]. | ||
|
||
[MSC2409]: https://github.com/matrix-org/matrix-spec-proposals/pull/2409 |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.