-
-
Notifications
You must be signed in to change notification settings - Fork 101
Issues: matrix-org/matrix-spec
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Secret storage section needs cleanup
clarification
An area where the expected behaviour is understood, but the spec could do with being more explicit
#2040
opened Dec 19, 2024 by
richvdh
Upgrade CI actions
meta
Something that is not a spec change/request and is not related to the build tools
#2039
opened Dec 19, 2024 by
turt2live
v11 auth rules 2.2 is unclear in combination with auth event selection algo
clarification
An area where the expected behaviour is understood, but the spec could do with being more explicit
#2035
opened Dec 17, 2024 by
dkasak
What is the point of An area where the expected behaviour is understood, but the spec could do with being more explicit
/keys/changes
?
clarification
#2034
opened Dec 16, 2024 by
richvdh
How about a message type which will never trigger notifications?
improvement
An idea/future MSC for the spec
#2031
opened Dec 14, 2024 by
rowskilled14
Account data section needs cleanup
clarification
An area where the expected behaviour is understood, but the spec could do with being more explicit
good first issue
This is a fix that might be an easy place for someone to start for their first contribution
help wanted
Interested in contributing to the spec? These would be great additions!
#2030
opened Dec 13, 2024 by
richvdh
Should v3+ room version events containing an An area where the expected behaviour is understood, but the spec could do with being more explicit
event_id
field be rejected?
clarification
#2027
opened Dec 9, 2024 by
anoadragon453
State events from blocked users should not be shown to clients
improvement
An idea/future MSC for the spec
#2025
opened Dec 5, 2024 by
everypizza1
ETag support for /_matrix/client/v3/rooms/{roomId}/state
improvement
An idea/future MSC for the spec
#2020
opened Nov 29, 2024 by
Half-Shot
Ability to specify a filter for /_matrix/client/v3/rooms/{roomId}/state
improvement
An idea/future MSC for the spec
#2019
opened Nov 29, 2024 by
Half-Shot
[Brainstorming] More granular access controls/power levels
improvement
An idea/future MSC for the spec
#2012
opened Nov 25, 2024 by
TheArcaneBrony
Clarify when An area where the expected behaviour is understood, but the spec could do with being more explicit
state_key
needs to be ""
in authorization rules
clarification
#1998
opened Nov 15, 2024 by
CobaltCause
Spec text incorrectly renders query parameters of type An area where the expected behaviour is understood, but the spec could do with being more explicit
object
clarification
#1993
opened Nov 12, 2024 by
richvdh
MXC sanitising spec is unclear/impossible to apply
clarification
An area where the expected behaviour is understood, but the spec could do with being more explicit
#1992
opened Nov 11, 2024 by
richvdh
C-S API MXC Security Consideration pretty much all MXCs are invalid
spec-bug
Something which is in the spec, but is wrong
#1990
opened Nov 7, 2024 by
t3chguy
Example test cases for common edge cases in state resolution
clarification
An area where the expected behaviour is understood, but the spec could do with being more explicit
#1989
opened Nov 6, 2024 by
CobaltCause
How does signature verification work in pre-v6 rooms
clarification
An area where the expected behaviour is understood, but the spec could do with being more explicit
#1988
opened Nov 5, 2024 by
olivia-fl
Should we do away with 4S secret storage in favour of deriving everything deterministically from the recovery key?
improvement
An idea/future MSC for the spec
#1987
opened Nov 1, 2024 by
dkasak
Lazy load text has inconsistent url parameter notation
spec-bug
Something which is in the spec, but is wrong
#1982
opened Oct 17, 2024 by
MTRNord
Ability to ignore individual messages.
improvement
An idea/future MSC for the spec
#1981
opened Oct 15, 2024 by
ara4n
A Channel Feature Similar to Telegram Channels
improvement
An idea/future MSC for the spec
#1965
opened Oct 9, 2024 by
0x002500
Historical spec artifacts starting with v1.11 have broken CSS
aesthetic
A suggestion or issue relating to the representation of the spec
release-blocker
Blocks the next release from happening
#1964
opened Oct 7, 2024 by
turt2live
Add some sort of approval step before a new user can send images
improvement
An idea/future MSC for the spec
#1963
opened Oct 6, 2024 by
ell1e
Reuse Invite3pid object across spec
aesthetic
A suggestion or issue relating to the representation of the spec
#1955
opened Sep 30, 2024 by
td-famedly
Divide thread and messages permissions
improvement
An idea/future MSC for the spec
#1953
opened Sep 28, 2024 by
Jlucu4ka228
Previous Next
ProTip!
Mix and match filters to narrow down what you’re looking for.