Updating documentation
This commit is contained in:
parent
6911de3e7a
commit
3eb49ad7b6
|
@ -1309,11 +1309,6 @@ paths:
|
||||||
Clients may retry the PUT in the event of an HTTP/5xx response (except HTTP/508) from the server, but must
|
Clients may retry the PUT in the event of an HTTP/5xx response (except HTTP/508) from the server, but must
|
||||||
implement an exponential back-off system and limit the total number of retries.
|
implement an exponential back-off system and limit the total number of retries.
|
||||||
operationId: requestPushChallenge
|
operationId: requestPushChallenge
|
||||||
requestBody:
|
|
||||||
content:
|
|
||||||
'*/*':
|
|
||||||
schema:
|
|
||||||
$ref: '#/components/schemas/PushChallengeConfig'
|
|
||||||
responses:
|
responses:
|
||||||
"200":
|
"200":
|
||||||
description: |
|
description: |
|
||||||
|
@ -1516,6 +1511,47 @@ paths:
|
||||||
description: default response
|
description: default response
|
||||||
content:
|
content:
|
||||||
'*/*': {}
|
'*/*': {}
|
||||||
|
/v2/keys/check:
|
||||||
|
post:
|
||||||
|
tags:
|
||||||
|
- Keys
|
||||||
|
summary: Check keys
|
||||||
|
description: |
|
||||||
|
Checks that client and server have consistent views of repeated-use keys. For a given identity type, clients
|
||||||
|
submit a digest of their repeated-use key material. The digest is calculated as:
|
||||||
|
|
||||||
|
SHA256(identityKeyBytes || signedEcPreKeyId || signedEcPreKeyIdBytes || lastResortKeyId || lastResortKeyBytes)
|
||||||
|
|
||||||
|
…where the elements of the hash are:
|
||||||
|
|
||||||
|
- identityKeyBytes: the serialized form of the client's public identity key as produced by libsignal (i.e. one
|
||||||
|
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
||||||
|
- signedEcPreKeyId: an 8-byte, big-endian representation of the ID of the client's signed EC pre-key
|
||||||
|
- signedEcPreKeyBytes: the serialized form of the client's signed EC pre-key as produced by libsignal (i.e. one
|
||||||
|
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
||||||
|
- lastResortKeyId: an 8-byte, big-endian representation of the ID of the client's last-resort Kyber key
|
||||||
|
- lastResortKeyBytes: the serialized form of the client's last-resort Kyber key as produced by libsignal (i.e. one
|
||||||
|
version byte followed by 1568 bytes of key material for a total of 1569 bytes)
|
||||||
|
operationId: checkKeys
|
||||||
|
parameters:
|
||||||
|
- name: User-Agent
|
||||||
|
in: header
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: Indicates that client and server have consistent views of repeated-use
|
||||||
|
keys
|
||||||
|
"401":
|
||||||
|
description: Account authentication check failed
|
||||||
|
"409":
|
||||||
|
description: |2
|
||||||
|
Indicates that client and server have inconsistent views of repeated-use keys or one or more repeated-use keys could
|
||||||
|
not be found
|
||||||
|
"422":
|
||||||
|
description: Invalid request format
|
||||||
|
security:
|
||||||
|
- authenticatedAccount: []
|
||||||
/v2/keys/{identifier}/{device_id}:
|
/v2/keys/{identifier}/{device_id}:
|
||||||
get:
|
get:
|
||||||
tags:
|
tags:
|
||||||
|
@ -1618,7 +1654,7 @@ paths:
|
||||||
- Keys
|
- Keys
|
||||||
summary: Upload new prekeys
|
summary: Upload new prekeys
|
||||||
description: Upload new pre-keys for this device.
|
description: Upload new pre-keys for this device.
|
||||||
operationId: setKeys_1
|
operationId: setKeys
|
||||||
parameters:
|
parameters:
|
||||||
- name: identity
|
- name: identity
|
||||||
in: query
|
in: query
|
||||||
|
@ -1648,47 +1684,6 @@ paths:
|
||||||
description: Invalid request format.
|
description: Invalid request format.
|
||||||
security:
|
security:
|
||||||
- authenticatedAccount: []
|
- authenticatedAccount: []
|
||||||
/v2/keys/check:
|
|
||||||
post:
|
|
||||||
tags:
|
|
||||||
- Keys
|
|
||||||
summary: Check keys
|
|
||||||
description: |
|
|
||||||
Checks that client and server have consistent views of repeated-use keys. For a given identity type, clients
|
|
||||||
submit a digest of their repeated-use key material. The digest is calculated as:
|
|
||||||
|
|
||||||
SHA256(identityKeyBytes || signedEcPreKeyId || signedEcPreKeyIdBytes || lastResortKeyId || lastResortKeyBytes)
|
|
||||||
|
|
||||||
…where the elements of the hash are:
|
|
||||||
|
|
||||||
- identityKeyBytes: the serialized form of the client's public identity key as produced by libsignal (i.e. one
|
|
||||||
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
|
||||||
- signedEcPreKeyId: an 8-byte, big-endian representation of the ID of the client's signed EC pre-key
|
|
||||||
- signedEcPreKeyBytes: the serialized form of the client's signed EC pre-key as produced by libsignal (i.e. one
|
|
||||||
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
|
||||||
- lastResortKeyId: an 8-byte, big-endian representation of the ID of the client's last-resort Kyber key
|
|
||||||
- lastResortKeyBytes: the serialized form of the client's last-resort Kyber key as produced by libsignal (i.e. one
|
|
||||||
version byte followed by 1568 bytes of key material for a total of 1569 bytes)
|
|
||||||
operationId: setKeys
|
|
||||||
parameters:
|
|
||||||
- name: User-Agent
|
|
||||||
in: header
|
|
||||||
schema:
|
|
||||||
type: string
|
|
||||||
responses:
|
|
||||||
"200":
|
|
||||||
description: Indicates that client and server have consistent views of repeated-use
|
|
||||||
keys
|
|
||||||
"401":
|
|
||||||
description: Account authentication check failed
|
|
||||||
"409":
|
|
||||||
description: |2
|
|
||||||
Indicates that client and server have inconsistent views of repeated-use keys or one or more repeated-use keys could
|
|
||||||
not be found
|
|
||||||
"422":
|
|
||||||
description: Invalid request format
|
|
||||||
security:
|
|
||||||
- authenticatedAccount: []
|
|
||||||
/v2/keys/signed:
|
/v2/keys/signed:
|
||||||
put:
|
put:
|
||||||
tags:
|
tags:
|
||||||
|
@ -2919,6 +2914,8 @@ components:
|
||||||
description: A handle that can be included in username links to retrieve
|
description: A handle that can be included in username links to retrieve
|
||||||
the stored encrypted username
|
the stored encrypted username
|
||||||
ConfirmUsernameHashRequest:
|
ConfirmUsernameHashRequest:
|
||||||
|
required:
|
||||||
|
- zkProof
|
||||||
type: object
|
type: object
|
||||||
properties:
|
properties:
|
||||||
usernameHash:
|
usernameHash:
|
||||||
|
@ -3820,14 +3817,6 @@ components:
|
||||||
type: string
|
type: string
|
||||||
discriminator:
|
discriminator:
|
||||||
propertyName: type
|
propertyName: type
|
||||||
ScoreThreshold:
|
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
scoreThreshold:
|
|
||||||
type: number
|
|
||||||
format: float
|
|
||||||
PushChallengeConfig:
|
|
||||||
type: object
|
|
||||||
VerificationCode:
|
VerificationCode:
|
||||||
type: object
|
type: object
|
||||||
properties:
|
properties:
|
||||||
|
@ -3958,6 +3947,54 @@ components:
|
||||||
type: object
|
type: object
|
||||||
client:
|
client:
|
||||||
$ref: '#/components/schemas/WebSocketClient'
|
$ref: '#/components/schemas/WebSocketClient'
|
||||||
|
CheckKeysRequest:
|
||||||
|
required:
|
||||||
|
- digest
|
||||||
|
- identityType
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
identityType:
|
||||||
|
type: string
|
||||||
|
description: |
|
||||||
|
The identity type for which to check for a shared view of repeated-use keys
|
||||||
|
enum:
|
||||||
|
- ACI
|
||||||
|
- PNI
|
||||||
|
digest:
|
||||||
|
type: array
|
||||||
|
description: |
|
||||||
|
A 32-byte digest of the client's repeated-use keys for the given identity type. The digest is calculated as:
|
||||||
|
|
||||||
|
SHA256(identityKeyBytes || signedEcPreKeyId || signedEcPreKeyIdBytes || lastResortKeyId || lastResortKeyBytes)
|
||||||
|
|
||||||
|
…where the elements of the hash are:
|
||||||
|
|
||||||
|
- identityKeyBytes: the serialized form of the client's public identity key as produced by libsignal (i.e. one
|
||||||
|
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
||||||
|
- signedEcPreKeyId: an 8-byte, big-endian representation of the ID of the client's signed EC pre-key
|
||||||
|
- signedEcPreKeyBytes: the serialized form of the client's signed EC pre-key as produced by libsignal (i.e. one
|
||||||
|
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
||||||
|
- lastResortKeyId: an 8-byte, big-endian representation of the ID of the client's last-resort Kyber key
|
||||||
|
- lastResortKeyBytes: the serialized form of the client's last-resort Kyber key as produced by libsignal (i.e.
|
||||||
|
one version byte followed by 1568 bytes of key material for a total of 1569 bytes)
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
description: |
|
||||||
|
A 32-byte digest of the client's repeated-use keys for the given identity type. The digest is calculated as:
|
||||||
|
|
||||||
|
SHA256(identityKeyBytes || signedEcPreKeyId || signedEcPreKeyIdBytes || lastResortKeyId || lastResortKeyBytes)
|
||||||
|
|
||||||
|
…where the elements of the hash are:
|
||||||
|
|
||||||
|
- identityKeyBytes: the serialized form of the client's public identity key as produced by libsignal (i.e. one
|
||||||
|
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
||||||
|
- signedEcPreKeyId: an 8-byte, big-endian representation of the ID of the client's signed EC pre-key
|
||||||
|
- signedEcPreKeyBytes: the serialized form of the client's signed EC pre-key as produced by libsignal (i.e. one
|
||||||
|
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
||||||
|
- lastResortKeyId: an 8-byte, big-endian representation of the ID of the client's last-resort Kyber key
|
||||||
|
- lastResortKeyBytes: the serialized form of the client's last-resort Kyber key as produced by libsignal (i.e.
|
||||||
|
one version byte followed by 1568 bytes of key material for a total of 1569 bytes)
|
||||||
|
format: byte
|
||||||
ECPreKey:
|
ECPreKey:
|
||||||
type: object
|
type: object
|
||||||
properties:
|
properties:
|
||||||
|
@ -4011,54 +4048,6 @@ components:
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
format: byte
|
format: byte
|
||||||
CheckKeysRequest:
|
|
||||||
required:
|
|
||||||
- digest
|
|
||||||
- identityType
|
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
identityType:
|
|
||||||
type: string
|
|
||||||
description: |
|
|
||||||
The identity type for which to check for a shared view of repeated-use keys
|
|
||||||
enum:
|
|
||||||
- ACI
|
|
||||||
- PNI
|
|
||||||
digest:
|
|
||||||
type: array
|
|
||||||
description: |
|
|
||||||
A 32-byte digest of the client's repeated-use keys for the given identity type. The digest is calculated as:
|
|
||||||
|
|
||||||
SHA256(identityKeyBytes || signedEcPreKeyId || signedEcPreKeyIdBytes || lastResortKeyId || lastResortKeyBytes)
|
|
||||||
|
|
||||||
…where the elements of the hash are:
|
|
||||||
|
|
||||||
- identityKeyBytes: the serialized form of the client's public identity key as produced by libsignal (i.e. one
|
|
||||||
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
|
||||||
- signedEcPreKeyId: an 8-byte, big-endian representation of the ID of the client's signed EC pre-key
|
|
||||||
- signedEcPreKeyBytes: the serialized form of the client's signed EC pre-key as produced by libsignal (i.e. one
|
|
||||||
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
|
||||||
- lastResortKeyId: an 8-byte, big-endian representation of the ID of the client's last-resort Kyber key
|
|
||||||
- lastResortKeyBytes: the serialized form of the client's last-resort Kyber key as produced by libsignal (i.e.
|
|
||||||
one version byte followed by 1568 bytes of key material for a total of 1569 bytes)
|
|
||||||
items:
|
|
||||||
type: string
|
|
||||||
description: |
|
|
||||||
A 32-byte digest of the client's repeated-use keys for the given identity type. The digest is calculated as:
|
|
||||||
|
|
||||||
SHA256(identityKeyBytes || signedEcPreKeyId || signedEcPreKeyIdBytes || lastResortKeyId || lastResortKeyBytes)
|
|
||||||
|
|
||||||
…where the elements of the hash are:
|
|
||||||
|
|
||||||
- identityKeyBytes: the serialized form of the client's public identity key as produced by libsignal (i.e. one
|
|
||||||
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
|
||||||
- signedEcPreKeyId: an 8-byte, big-endian representation of the ID of the client's signed EC pre-key
|
|
||||||
- signedEcPreKeyBytes: the serialized form of the client's signed EC pre-key as produced by libsignal (i.e. one
|
|
||||||
version byte followed by 32 bytes of key material for a total of 33 bytes)
|
|
||||||
- lastResortKeyId: an 8-byte, big-endian representation of the ID of the client's last-resort Kyber key
|
|
||||||
- lastResortKeyBytes: the serialized form of the client's last-resort Kyber key as produced by libsignal (i.e.
|
|
||||||
one version byte followed by 1568 bytes of key material for a total of 1569 bytes)
|
|
||||||
format: byte
|
|
||||||
SetKeysRequest:
|
SetKeysRequest:
|
||||||
type: object
|
type: object
|
||||||
properties:
|
properties:
|
||||||
|
@ -4258,6 +4247,8 @@ components:
|
||||||
type: boolean
|
type: boolean
|
||||||
pnp:
|
pnp:
|
||||||
type: boolean
|
type: boolean
|
||||||
|
giftBadges:
|
||||||
|
type: boolean
|
||||||
VersionedProfileResponse:
|
VersionedProfileResponse:
|
||||||
type: object
|
type: object
|
||||||
properties:
|
properties:
|
||||||
|
@ -4801,13 +4792,6 @@ components:
|
||||||
- voice
|
- voice
|
||||||
client:
|
client:
|
||||||
type: string
|
type: string
|
||||||
SenderOverride:
|
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
smsSenderOverride:
|
|
||||||
type: string
|
|
||||||
voiceSenderOverride:
|
|
||||||
type: string
|
|
||||||
SubmitVerificationCodeRequest:
|
SubmitVerificationCodeRequest:
|
||||||
required:
|
required:
|
||||||
- code
|
- code
|
||||||
|
|
Loading…
Reference in New Issue