212 lines
7.2 KiB
Rust
212 lines
7.2 KiB
Rust
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
use std::{collections::BTreeMap, sync::Arc, time::Duration};
|
|
|
|
use matrix_sdk_common::{
|
|
api::r0::{
|
|
keys::{
|
|
claim_keys::Response as KeysClaimResponse,
|
|
get_keys::Response as KeysQueryResponse,
|
|
upload_keys::{Request as KeysUploadRequest, Response as KeysUploadResponse},
|
|
upload_signing_keys::Response as SigningKeysUploadResponse,
|
|
CrossSigningKey,
|
|
},
|
|
to_device::{send_event_to_device::Response as ToDeviceResponse, DeviceIdOrAllDevices},
|
|
},
|
|
events::EventType,
|
|
identifiers::{DeviceIdBox, UserId},
|
|
uuid::Uuid,
|
|
};
|
|
|
|
use serde_json::value::RawValue as RawJsonValue;
|
|
|
|
/// Customized version of `ruma_client_api::r0::to_device::send_event_to_device::Request`, using a
|
|
/// UUID for the transaction ID.
|
|
#[derive(Clone, Debug)]
|
|
pub struct ToDeviceRequest {
|
|
/// Type of event being sent to each device.
|
|
pub event_type: EventType,
|
|
|
|
/// A request identifier unique to the access token used to send the request.
|
|
pub txn_id: Uuid,
|
|
|
|
/// A map of users to devices to a content for a message event to be
|
|
/// sent to the user's device. Individual message events can be sent
|
|
/// to devices, but all events must be of the same type.
|
|
/// The content's type for this field will be updated in a future
|
|
/// release, until then you can create a value using
|
|
/// `serde_json::value::to_raw_value`.
|
|
pub messages: BTreeMap<UserId, BTreeMap<DeviceIdOrAllDevices, Box<RawJsonValue>>>,
|
|
}
|
|
|
|
impl ToDeviceRequest {
|
|
/// Gets the transaction ID as a string.
|
|
pub fn txn_id_string(&self) -> String {
|
|
self.txn_id.to_string()
|
|
}
|
|
}
|
|
|
|
/// Request that will publish a cross signing identity.
|
|
///
|
|
/// This uploads the public cross signing key triplet.
|
|
#[derive(Debug, Clone)]
|
|
pub struct UploadSigningKeysRequest {
|
|
/// The user's master key.
|
|
pub master_key: Option<CrossSigningKey>,
|
|
/// The user's self-signing key. Must be signed with the accompanied master, or by the
|
|
/// user's most recently uploaded master key if no master key is included in the request.
|
|
pub self_signing_key: Option<CrossSigningKey>,
|
|
/// The user's user-signing key. Must be signed with the accompanied master, or by the
|
|
/// user's most recently uploaded master key if no master key is included in the request.
|
|
pub user_signing_key: Option<CrossSigningKey>,
|
|
}
|
|
|
|
/// Customized version of `ruma_client_api::r0::keys::get_keys::Request`, without any references.
|
|
#[derive(Clone, Debug)]
|
|
pub struct KeysQueryRequest {
|
|
/// The time (in milliseconds) to wait when downloading keys from remote
|
|
/// servers. 10 seconds is the recommended default.
|
|
pub timeout: Option<Duration>,
|
|
|
|
/// The keys to be downloaded. An empty list indicates all devices for
|
|
/// the corresponding user.
|
|
pub device_keys: BTreeMap<UserId, Vec<DeviceIdBox>>,
|
|
|
|
/// If the client is fetching keys as a result of a device update
|
|
/// received in a sync request, this should be the 'since' token of that
|
|
/// sync request, or any later sync token. This allows the server to
|
|
/// ensure its response contains the keys advertised by the notification
|
|
/// in that sync.
|
|
pub token: Option<String>,
|
|
}
|
|
|
|
impl KeysQueryRequest {
|
|
pub(crate) fn new(device_keys: BTreeMap<UserId, Vec<DeviceIdBox>>) -> Self {
|
|
Self {
|
|
timeout: None,
|
|
device_keys,
|
|
token: None,
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Enum over the different outgoing requests we can have.
|
|
#[derive(Debug)]
|
|
pub enum OutgoingRequests {
|
|
/// The keys upload request, uploading device and one-time keys.
|
|
KeysUpload(KeysUploadRequest),
|
|
/// The keys query request, fetching the device and cross singing keys of
|
|
/// other users.
|
|
KeysQuery(KeysQueryRequest),
|
|
/// The to-device requests, this request is used for a couple of different
|
|
/// things, the main use is key requests/forwards and interactive device
|
|
/// verification.
|
|
ToDeviceRequest(ToDeviceRequest),
|
|
}
|
|
|
|
#[cfg(test)]
|
|
impl OutgoingRequests {
|
|
pub fn to_device(&self) -> Option<&ToDeviceRequest> {
|
|
match self {
|
|
OutgoingRequests::ToDeviceRequest(r) => Some(r),
|
|
_ => None,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl From<KeysQueryRequest> for OutgoingRequests {
|
|
fn from(request: KeysQueryRequest) -> Self {
|
|
OutgoingRequests::KeysQuery(request)
|
|
}
|
|
}
|
|
|
|
impl From<KeysUploadRequest> for OutgoingRequests {
|
|
fn from(request: KeysUploadRequest) -> Self {
|
|
OutgoingRequests::KeysUpload(request)
|
|
}
|
|
}
|
|
|
|
impl From<ToDeviceRequest> for OutgoingRequests {
|
|
fn from(request: ToDeviceRequest) -> Self {
|
|
OutgoingRequests::ToDeviceRequest(request)
|
|
}
|
|
}
|
|
|
|
/// Enum over all the incoming responses we need to receive.
|
|
#[derive(Debug)]
|
|
pub enum IncomingResponse<'a> {
|
|
/// The keys upload response, notifying us about the amount of uploaded
|
|
/// one-time keys.
|
|
KeysUpload(&'a KeysUploadResponse),
|
|
/// The keys query response, giving us the device and cross singing keys of
|
|
/// other users.
|
|
KeysQuery(&'a KeysQueryResponse),
|
|
/// The to-device response, an empty response.
|
|
ToDevice(&'a ToDeviceResponse),
|
|
/// The key claiming requests, giving us new one-time keys of other users so
|
|
/// new Olm sessions can be created.
|
|
KeysClaim(&'a KeysClaimResponse),
|
|
/// The cross signing keys upload response, marking our private cross
|
|
/// signing identity as shared.
|
|
SigningKeysUpload(&'a SigningKeysUploadResponse),
|
|
}
|
|
|
|
impl<'a> From<&'a KeysUploadResponse> for IncomingResponse<'a> {
|
|
fn from(response: &'a KeysUploadResponse) -> Self {
|
|
IncomingResponse::KeysUpload(response)
|
|
}
|
|
}
|
|
|
|
impl<'a> From<&'a KeysQueryResponse> for IncomingResponse<'a> {
|
|
fn from(response: &'a KeysQueryResponse) -> Self {
|
|
IncomingResponse::KeysQuery(response)
|
|
}
|
|
}
|
|
|
|
impl<'a> From<&'a ToDeviceResponse> for IncomingResponse<'a> {
|
|
fn from(response: &'a ToDeviceResponse) -> Self {
|
|
IncomingResponse::ToDevice(response)
|
|
}
|
|
}
|
|
|
|
impl<'a> From<&'a KeysClaimResponse> for IncomingResponse<'a> {
|
|
fn from(response: &'a KeysClaimResponse) -> Self {
|
|
IncomingResponse::KeysClaim(response)
|
|
}
|
|
}
|
|
|
|
/// Outgoing request type, holds the unique ID of the request and the actual
|
|
/// request.
|
|
#[derive(Debug, Clone)]
|
|
pub struct OutgoingRequest {
|
|
/// The unique id of a request, needs to be passed when receiving a
|
|
/// response.
|
|
pub(crate) request_id: Uuid,
|
|
/// The underlying outgoing request.
|
|
pub(crate) request: Arc<OutgoingRequests>,
|
|
}
|
|
|
|
impl OutgoingRequest {
|
|
/// Get the unique id of this request.
|
|
pub fn request_id(&self) -> &Uuid {
|
|
&self.request_id
|
|
}
|
|
|
|
/// Get the underlying outgoing request.
|
|
pub fn request(&self) -> &OutgoingRequests {
|
|
&self.request
|
|
}
|
|
}
|