type |
---|
module |
This module adds support for sending human-readable messages to a room. It also adds support for associating human-readable information with the room itself such as a room name and topic.
{{% event event="m.room.message" %}}
{{% event event="m.room.message.feedback" %}}
Usage of this event is discouraged for several reasons:
- The number of feedback events will grow very quickly with the number of users in the room. This event provides no way to "batch" feedback, unlike the receipts module.
- Pairing feedback to messages gets complicated when paginating as feedback arrives before the message it is acknowledging.
- There are no guarantees that the client has seen the event ID being acknowledged.
{{% event event="m.room.name" %}}
{{% event event="m.room.topic" %}}
{{% event event="m.room.avatar" %}}
{{% event event="m.room.pinned_events" %}}
Each m.room.message MUST have a msgtype
key which identifies the
type of message being sent. Each type has their own required and
optional keys, as outlined below. If a client cannot display the given
msgtype
then it SHOULD display the fallback plain text body
key
instead.
Some message types support HTML in the event content that clients should
prefer to display if available. Currently m.text
, m.emote
, and
m.notice
support an additional format
parameter of
org.matrix.custom.html
. When this field is present, a formatted_body
with the HTML must be provided. The plain text version of the HTML
should be provided in the body
.
Clients should limit the HTML they render to avoid Cross-Site Scripting,
HTML injection, and similar attacks. The strongly suggested set of HTML
tags to permit, denying the use and rendering of anything else, is:
font
, del
, h1
, h2
, h3
, h4
, h5
, h6
, blockquote
, p
,
a
, ul
, ol
, sup
, sub
, li
, b
, i
, u
, strong
, em
,
strike
, code
, hr
, br
, div
, table
, thead
, tbody
, tr
,
th
, td
, caption
, pre
, span
, img
, details
, summary
.
Not all attributes on those tags should be permitted as they may be
avenues for other disruption attempts, such as adding onclick
handlers
or excessively large text. Clients should only permit the attributes
listed for the tags below. Where data-mx-bg-color
and data-mx-color
are listed, clients should translate the value (a 6-character hex color
code) to the appropriate CSS/attributes for the tag.
font
data-mx-bg-color
, data-mx-color
, color
span
data-mx-bg-color
, data-mx-color
, data-mx-spoiler
(see
spoiler messages)
a
name
, target
, href
(provided the value is not relative and has a
scheme matching one of: https
, http
, ftp
, mailto
, magnet
)
img
width
, height
, alt
, title
, src
(provided it is a Matrix
Content (MXC) URI)
ol
start
code
class
(only classes which start with language-
for syntax
highlighting)
Additionally, web clients should ensure that all a
tags get a
rel="noopener"
to prevent the target page from referencing the
client's tab/window.
Tags must not be nested more than 100 levels deep. Clients should only support the subset of tags they can render, falling back to other representations of the tags where possible. For example, a client may not be able to render tables correctly and instead could fall back to rendering tab-delimited text.
In addition to not rendering unsafe HTML, clients should not emit unsafe HTML in events. Likewise, clients should not generate HTML that is not needed, such as extra paragraph tags surrounding text due to Rich Text Editors. HTML included in events should otherwise be valid, such as having appropriate closing tags, appropriate attributes (considering the custom ones defined in this specification), and generally valid structure.
A special tag, mx-reply
, may appear on rich replies (described below)
and should be allowed if, and only if, the tag appears as the very first
tag in the formatted_body
. The tag cannot be nested and cannot be
located after another tag in the tree. Because the tag contains HTML, an
mx-reply
is expected to have a partner closing tag and should be
treated similar to a div
. Clients that support rich replies will end
up stripping the tag and its contents and therefore may wish to exclude
the tag entirely.
{{% boxes/note %}} A future iteration of the specification will support more powerful and extensible message formatting options, such as the proposal MSC1767. {{% /boxes/note %}}
{{% msgtypes %}}
Clients SHOULD verify the structure of incoming events to ensure that
the expected keys exist and that they are of the right type. Clients can
discard malformed events or display a placeholder message to the user.
Redacted m.room.message
events MUST be removed from the client. This
can either be replaced with placeholder text (e.g. "[REDACTED]") or
the redacted message can be removed entirely from the messages view.
Events which have attachments (e.g. m.image
, m.file
) SHOULD be
uploaded using the content repository module
where available. The resulting mxc://
URI can then be used in the url
key.
Clients MAY include a client generated thumbnail image for an attachment
under a info.thumbnail_url
key. The thumbnail SHOULD also be a
mxc://
URI. Clients displaying events with attachments can either use
the client generated thumbnail or ask its homeserver to generate a
thumbnail from the original attachment using the content repository
module.
In the event of send failure, clients SHOULD retry requests using an exponential-backoff algorithm for a certain amount of time T. It is recommended that T is no longer than 5 minutes. After this time, the client should stop retrying and mark the message as "unsent". Users should be able to manually resend unsent messages.
Users may type several messages at once and send them all in quick succession. Clients SHOULD preserve the order in which they were sent by the user. This means that clients should wait for the response to the previous request before sending the next request. This can lead to head-of-line blocking. In order to reduce the impact of head-of-line blocking, clients should use a queue per room rather than a global queue, as ordering is only relevant within a single room rather than between rooms.
Messages SHOULD appear immediately in the message view when a user presses the "send" button. This should occur even if the message is still sending. This is referred to as "local echo". Clients SHOULD implement "local echo" of messages. Clients MAY display messages in a different format to indicate that the server has not processed the message. This format should be removed when the server responds.
Clients need to be able to match the message they are sending with the
same message which they receive from the event stream. The echo of the
same message from the event stream is referred to as "remote echo". Both
echoes need to be identified as the same message in order to prevent
duplicate messages being displayed. Ideally this pairing would occur
transparently to the user: the UI would not flicker as it transitions
from local to remote. Flickering can be reduced through clients making
use of the transaction ID they used to send a particular event. The
transaction ID used will be included in the event's unsigned
data as
transaction_id
when it arrives through the event stream.
Clients unable to make use of the transaction ID are likely to experience flickering when the remote echo arrives on the event stream before the request to send the message completes. In that case the event arrives before the client has obtained an event ID, making it impossible to identify it as a remote echo. This results in the client displaying the message twice for some time (depending on the server responsiveness) before the original request to send the message completes. Once it completes, the client can take remedial actions to remove the duplicate event by looking for duplicate event IDs.
Clients may wish to show the human-readable display name of a room member as part of a membership list, or when they send a message. However, different members may have conflicting display names. Display names MUST be disambiguated before showing them to the user, in order to prevent spoofing of other users.
To ensure this is done consistently across clients, clients SHOULD use the following algorithm to calculate a disambiguated display name for a given user:
- Inspect the
m.room.member
state event for the relevant user id. - If the
m.room.member
state event has nodisplayname
field, or if that field has anull
value, use the raw user id as the display name. Otherwise: - If the
m.room.member
event has adisplayname
which is unique among members of the room withmembership: join
ormembership: invite
, use the givendisplayname
as the user-visible display name. Otherwise: - The
m.room.member
event has a non-uniquedisplayname
. This should be disambiguated using the user id, for example "display name (@id:homeserver.org)".
Developers should take note of the following when implementing the above algorithm:
- The user-visible display name of one member can be affected by
changes in the state of another member. For example, if
@user1:matrix.org
is present in a room, withdisplayname: Alice
, then when@user2:example.com
joins the room, also withdisplayname: Alice
, both users must be given disambiguated display names. Similarly, when one of the users then changes their display name, there is no longer a clash, and both users can be given their chosen display name. Clients should be alert to this possibility and ensure that all affected users are correctly renamed. - The display name of a room may also be affected by changes in the membership list. This is due to the room name sometimes being based on user display names (see Calculating the display name for a room).
- If the entire membership list is searched for clashing display
names, this leads to an O(N^2) implementation for building the list
of room members. This will be very inefficient for rooms with large
numbers of members. It is recommended that client implementations
maintain a hash table mapping from
displayname
to a list of room members using that name. Such a table can then be used for efficient calculation of whether disambiguation is needed.
Clients may wish to show the display name and avatar URL of the room
member who sent a message. This can be achieved by inspecting the
m.room.member
state event for that user ID (see Calculating the
display name for a user).
When a user paginates the message history, clients may wish to show the
historical display name and avatar URL for a room member. This is
possible because older m.room.member
events are returned when
paginating. This can be implemented efficiently by keeping two sets of
room state: old and current. As new events arrive and/or the user
paginates back in time, these two sets of state diverge from each other.
New events update the current state and paginated events update the old
state. When paginated events are processed sequentially, the old state
represents the state of the room at the time the event was sent. This
can then be used to set the historical display name and avatar URL.
Clients may wish to show a human-readable name for a room. There are a number of possibilities for choosing a useful name. To ensure that rooms are named consistently across clients, clients SHOULD use the following algorithm to choose a name:
- If the room has an m.room.name state event with a non-empty
name
field, use the name given by that field. - If the room has an m.room.canonical_alias state event with a
valid
alias
field, use the alias given by that field as the name. Note that clients should avoid usingalt_aliases
when calculating the room name. - If none of the above conditions are met, a name should be composed
based on the members of the room. Clients should consider
m.room.member events for users other than the logged-in user, as
defined below.
- If the number of
m.heroes
for the room are greater or equal tom.joined_member_count + m.invited_member_count - 1
, then use the membership events for the heroes to calculate display names for the users (disambiguating them if required) and concatenating them. For example, the client may choose to show "Alice, Bob, and Charlie (@charlie:example.org)" as the room name. The client may optionally limit the number of users it uses to generate a room name. - If there are fewer heroes than
m.joined_member_count + m.invited_member_count - 1
, andm.joined_member_count + m.invited_member_count
is greater than 1, the client should use the heroes to calculate display names for the users (disambiguating them if required) and concatenating them alongside a count of the remaining users. For example, "Alice, Bob, and 1234 others". - If
m.joined_member_count + m.invited_member_count
is less than or equal to 1 (indicating the member is alone), the client should use the rules above to indicate that the room was empty. For example, "Empty Room (was Alice)", "Empty Room (was Alice and 1234 others)", or "Empty Room" if there are no heroes.
- If the number of
Clients SHOULD internationalise the room name to the user's language
when using the m.heroes
to calculate the name. Clients SHOULD use
minimum 5 heroes to calculate room names where possible, but may use
more or less to fit better with their user experience.
In some cases, events may wish to reference other events. This could be to form a thread of messages for the user to follow along with, or to provide more context as to what a particular event is describing. Currently, the only kind of relation defined is a "rich reply" where a user may reference another message to create a thread-like conversation.
Relationships are defined under an m.relates_to
key in the event's
content
. If the event is of the type m.room.encrypted
, the
m.relates_to
key MUST NOT be covered by the encryption and instead be
put alongside the encryption information held in the content
.
A rich reply is formed through use of an m.relates_to
relation for
m.in_reply_to
where a single key, event_id
, is used to reference the
event being replied to. The referenced event ID SHOULD belong to the
same room where the reply is being sent. Clients should be cautious of
the event ID belonging to another room, or being invalid entirely. Rich
replies can only be constructed in the form of m.room.message
events
with a msgtype
of m.text
or m.notice
. Due to the fallback
requirements, rich replies cannot be constructed for types of m.emote
,
m.file
, etc. Rich replies may reference any other m.room.message
event, however. Rich replies may reference another event which also has
a rich reply, infinitely.
An m.in_reply_to
relationship looks like the following:
{
...
"type": "m.room.message",
"content": {
"msgtype": "m.text",
"body": "<body including fallback>",
"format": "org.matrix.custom.html",
"formatted_body": "<HTML including fallback>",
"m.relates_to": {
"m.in_reply_to": {
"event_id": "$another:event.com"
}
}
}
}
Some clients may not have support for rich replies and therefore need a fallback to use instead. Clients that do not support rich replies should render the event as if rich replies were not special.
Clients that do support rich replies MUST provide the fallback format on
replies, and MUST strip the fallback before rendering the reply. Rich
replies MUST have a format
of org.matrix.custom.html
and therefore a
formatted_body
alongside the body
and appropriate msgtype
. The
specific fallback text is different for each msgtype
, however the
general format for the body
is:
> <@alice:example.org> This is the original body
This is where the reply goes
The formatted_body
should use the following template:
<mx-reply>
<blockquote>
<a href="https://matrix.to/#/!somewhere:example.org/$event:example.org">In reply to</a>
<a href="https://matrix.to/#/@alice:example.org">@alice:example.org</a>
<br />
<!-- This is where the related event's HTML would be. -->
</blockquote>
</mx-reply>
This is where the reply goes.
If the related event does not have a formatted_body
, the event's
body
should be considered after encoding any HTML special characters.
Note that the href
in both of the anchors use a matrix.to
URI.
Clients which support rich replies MUST strip the fallback from the
event before rendering the event. This is because the text provided in
the fallback cannot be trusted to be an accurate representation of the
event. After removing the fallback, clients are recommended to represent
the event referenced by m.in_reply_to
similar to the fallback's
representation, although clients do have creative freedom for their user
interface. Clients should prefer the formatted_body
over the body
,
just like with other m.room.message
events.
To strip the fallback on the body
, the client should iterate over each
line of the string, removing any lines that start with the fallback
prefix ("> ", including the space, without quotes) and stopping when
a line is encountered without the prefix. This prefix is known as the
"fallback prefix sequence".
To strip the fallback on the formatted_body
, the client should remove
the entirety of the mx-reply
tag.
Using the prefix sequence, the first line of the related event's body
should be prefixed with the user's ID, followed by each line being
prefixed with the fallback prefix sequence. For example:
> <@alice:example.org> This is the first line
> This is the second line
This is the reply
The formatted_body
uses the template defined earlier in this section.
Similar to the fallback for m.text
, each line gets prefixed with the
fallback prefix sequence. However an asterisk should be inserted before
the user's ID, like so:
> * <@alice:example.org> feels like today is going to be a great day
This is the reply
The formatted_body
has a subtle difference for the template where the
asterisk is also inserted ahead of the user's ID:
<mx-reply>
<blockquote>
<a href="https://matrix.to/#/!somewhere:example.org/$event:example.org">In reply to</a>
* <a href="https://matrix.to/#/@alice:example.org">@alice:example.org</a>
<br />
<!-- This is where the related event's HTML would be. -->
</blockquote>
</mx-reply>
This is where the reply goes.
The related event's body
would be a file name, which may not be very
descriptive. The related event should additionally not have a format
or formatted_body
in the content
- if the event does have a format
and/or formatted_body
, those fields should be ignored. Because the
filename alone may not be descriptive, the related event's body
should
be considered to be "sent a file."
such that the output looks similar
to the following:
> <@alice:example.org> sent a file.
This is the reply
<mx-reply>
<blockquote>
<a href="https://matrix.to/#/!somewhere:example.org/$event:example.org">In reply to</a>
<a href="https://matrix.to/#/@alice:example.org">@alice:example.org</a>
<br />
sent a file.
</blockquote>
</mx-reply>
This is where the reply goes.
For m.image
, the text should be "sent an image."
. For m.video
, the
text should be "sent a video."
. For m.audio
, the text should be
"sent an audio file"
.
{{% added-in v="1.1" %}}
Parts of a message can be hidden visually from the user through use of spoilers. This does not affect the server's representation of the event content - it is simply a visual cue to the user that the message may reveal important information about something, spoiling any relevant surprise.
To send spoilers clients MUST use the formatted_body
and therefore the
org.matrix.custom.html
format, described above. This makes spoilers valid on
any msgtype
which can support this format appropriately.
Spoilers themselves are contained with span
tags, with the reason (optionally)
being in the data-mx-spoiler
attribute. Spoilers without a reason must at least
specify the attribute, though the value may be empty/undefined.
An example of a spoiler is:
{
"msgtype": "m.text",
"format": "org.matrix.custom.html",
"body": "Alice [Spoiler](mxc://example.org/abc123) in the movie.",
"formatted_body": "Alice <span data-mx-spoiler>lived happily ever after</span> in the movie."
}
If a reason were to be supplied, it would look like:
{
"msgtype": "m.text",
"format": "org.matrix.custom.html",
"body": "Alice [Spoiler for health of Alice](mxc://example.org/abc123) in the movie.",
"formatted_body": "Alice <span data-mx-spoiler='health of alice'>lived happily ever after</span> in the movie."
}
When sending a spoiler, clients SHOULD provide the plain text fallback in the body
as shown above (including the reason). The fallback SHOULD omit the spoiler text verbatim
since body
might show up in text-only clients or in notifications. To prevent spoilers
showing up in such situations, clients are strongly encouraged to first upload the plaintext
to the media repository then reference the MXC URI in a markdown-style link, as shown above.
Clients SHOULD render spoilers differently with some sort of disclosure. For example, the client could blur the actual text and ask the user to click on it for it to be revealed.
Homeservers SHOULD reject m.room.message
events which don't have a
msgtype
key, or which don't have a textual body
key, with an HTTP
status code of 400.
Messages sent using this module are not encrypted, although end to end encryption is in development (see E2E module).
Clients should sanitise all displayed keys for unsafe HTML to prevent Cross-Site Scripting (XSS) attacks. This includes room names and topics.