mirror of
https://github.com/cadmium-im/cadmium-docs-legacy.git
synced 2024-11-08 11:41:03 +00:00
Fix some lexical mistakes
This commit is contained in:
parent
3774aecf80
commit
43c47f6a2b
@ -32,11 +32,11 @@ BaseMessage is a basic message model, basis of the whole protocol. It is used fo
|
|||||||
|
|
||||||
BaseMessage scheme:
|
BaseMessage scheme:
|
||||||
```
|
```
|
||||||
id (string) - identifier of message (used to track the request-response chain)
|
id (string) - message identifier (used to track the request-response chain)
|
||||||
type (string) - type of message (used to determine which extension this message belongs to)
|
type (string) - type of message (used to determine which extension this message belongs to)
|
||||||
from (EntityID) - from which entity this message is send
|
from (EntityID) - from which entity this message is send
|
||||||
to (EntityID) - message recipient
|
to (EntityID) - message recipient
|
||||||
ok (boolean) - operation success indicator (used to determine if errors was happened when processing request)
|
ok (boolean) - operation success indicator (used to determine if the error happened while processing request)
|
||||||
payload (Map<K,V>) - message payload (used to store extra information in message, list of permissible fields in the payload are depends on "type" field)
|
payload (Map<K,V>) - message payload (used to store extra information in message, list of permissible fields in the payload are depends on "type" field)
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -7,8 +7,8 @@
|
|||||||
3. Validation of the sender using cryptographic signatures and keys
|
3. Validation of the sender using cryptographic signatures and keys
|
||||||
- I suggest doing this optionally, as many users simply don’t need it *(ChronosX88)*
|
- I suggest doing this optionally, as many users simply don’t need it *(ChronosX88)*
|
||||||
- I completely agree, and the first implementation should be done without all this. And this item is more suitable for item 4 of this list, it seems *(pztrn)*
|
- I completely agree, and the first implementation should be done without all this. And this item is more suitable for item 4 of this list, it seems *(pztrn)*
|
||||||
4. E2EE
|
4. E2EE (E2E Encryption)
|
||||||
- e2ee needs to be done "on plugins", especially if we will make gates to other networks. For the matrix has OLM, the XMPP has OTR/OMEMO, and so on. A transparent work with all this things should be done for the user. (pztrn)
|
- e2ee needs to be done "on plugins", especially if we will make gates to other networks. Matrix has OLM, the XMPP has OTR/OMEMO, and so on. A transparent work with all this things should be done for the user. (pztrn)
|
||||||
- However, it is necessary to choose some standard cryptographic protocol for specs. *(ChronosX88)*
|
- However, it is necessary to choose some standard cryptographic protocol for specs. *(ChronosX88)*
|
||||||
- This will not work due to the presence of a diverse cryptographic shit zoo. Therefore, you will have to saw it "on plugins", since for the user it should be as transparent as possible. *(pztrn)*
|
- This will not work due to the presence of a diverse cryptographic shit zoo. Therefore, you will have to saw it "on plugins", since for the user it should be as transparent as possible. *(pztrn)*
|
||||||
- e2ee needs to be made as customizable as possible so that it is possible to force/not force e2ee, as well as enable e2ee for individual rooms/chats. *(pztrn)*
|
- e2ee needs to be made as customizable as possible so that it is possible to force/not force e2ee, as well as enable e2ee for individual rooms/chats. *(pztrn)*
|
||||||
@ -20,8 +20,8 @@
|
|||||||
- Here it would be cool to try to push XMPP as the first gate and try to reuse transports from there. *(pztrn)*
|
- Here it would be cool to try to push XMPP as the first gate and try to reuse transports from there. *(pztrn)*
|
||||||
- In this case, we need to make the AppService API, as in the Matrix. *(ChronosX88)*
|
- In this case, we need to make the AppService API, as in the Matrix. *(ChronosX88)*
|
||||||
- Perhaps only with emphasis on our new protocol. And, again, it seems to me that for transports (or AppService) the use of the HTTP REST API is stupidly redundant, and here you can well use Websockets so as not to make your connection handlers (everything is ready and there), but to reuse the same gorilla (Golang library) and JSON-RPC on top. *(pztrn)*
|
- Perhaps only with emphasis on our new protocol. And, again, it seems to me that for transports (or AppService) the use of the HTTP REST API is stupidly redundant, and here you can well use Websockets so as not to make your connection handlers (everything is ready and there), but to reuse the same gorilla (Golang library) and JSON-RPC on top. *(pztrn)*
|
||||||
9. Native clients under all OS. You can use Go + Qt5, since we are making all free & open source.
|
9. Native clients under all major OS. We can use Go + Qt5, since we are making all free & open source.
|
||||||
- The question remains with the client for iOS, but if we make a suitable protocol that will work and will allow us to map the Telegram in the form of transport, I have a person who will make the client for iOS :) In principle, given the having of a macOS, I can try to do it myself but "somehow later", because my target OS is Windows/Linux/macOS/Android *(pztrn)*
|
- The question remains with the client for iOS, but if we make a suitable protocol that will work and will allow us to map the Telegram in the form of transport, I have a person who will make the client for iOS :) In general, given the having of a macOS, I can try to do it myself but "somehow later", because my target OS is Windows/Linux/macOS/Android *(pztrn)*
|
||||||
|
|
||||||
## Чаты
|
## Чаты
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user