ruma_client_api/session/
get_login_types.rs

1//! `GET /_matrix/client/*/login`
2//!
3//! Gets the homeserver's supported login types to authenticate users. Clients should pick one of
4//! these and supply it as the type when logging in.
5
6pub mod v3 {
7    //! `/v3/` ([spec])
8    //!
9    //! [spec]: https://spec.matrix.org/latest/client-server-api/#get_matrixclientv3login
10
11    use std::borrow::Cow;
12
13    use ruma_common::{
14        api::{request, response, Metadata},
15        metadata,
16        serde::{JsonObject, StringEnum},
17        OwnedMxcUri,
18    };
19    use serde::{de::DeserializeOwned, Deserialize, Serialize};
20    use serde_json::Value as JsonValue;
21
22    use crate::PrivOwnedStr;
23
24    const METADATA: Metadata = metadata! {
25        method: GET,
26        rate_limited: true,
27        authentication: None,
28        history: {
29            1.0 => "/_matrix/client/r0/login",
30            1.1 => "/_matrix/client/v3/login",
31        }
32    };
33
34    /// Request type for the `get_login_types` endpoint.
35    #[request(error = crate::Error)]
36    #[derive(Default)]
37    pub struct Request {}
38
39    /// Response type for the `get_login_types` endpoint.
40    #[response(error = crate::Error)]
41    pub struct Response {
42        /// The homeserver's supported login types.
43        pub flows: Vec<LoginType>,
44    }
45
46    impl Request {
47        /// Creates an empty `Request`.
48        pub fn new() -> Self {
49            Self {}
50        }
51    }
52
53    impl Response {
54        /// Creates a new `Response` with the given login types.
55        pub fn new(flows: Vec<LoginType>) -> Self {
56            Self { flows }
57        }
58    }
59
60    /// An authentication mechanism.
61    #[derive(Clone, Debug, Serialize)]
62    #[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
63    #[serde(untagged)]
64    pub enum LoginType {
65        /// A password is supplied to authenticate.
66        Password(PasswordLoginType),
67
68        /// Token-based login.
69        Token(TokenLoginType),
70
71        /// SSO-based login.
72        Sso(SsoLoginType),
73
74        /// Application Service login.
75        ApplicationService(ApplicationServiceLoginType),
76
77        /// Custom login type.
78        #[doc(hidden)]
79        _Custom(Box<CustomLoginType>),
80    }
81
82    impl LoginType {
83        /// Creates a new `LoginType` with the given `login_type` string and data.
84        ///
85        /// Prefer to use the public variants of `LoginType` where possible; this constructor is
86        /// meant be used for unsupported login types only and does not allow setting
87        /// arbitrary data for supported ones.
88        pub fn new(login_type: &str, data: JsonObject) -> serde_json::Result<Self> {
89            fn from_json_object<T: DeserializeOwned>(obj: JsonObject) -> serde_json::Result<T> {
90                serde_json::from_value(JsonValue::Object(obj))
91            }
92
93            Ok(match login_type {
94                "m.login.password" => Self::Password(from_json_object(data)?),
95                "m.login.token" => Self::Token(from_json_object(data)?),
96                "m.login.sso" => Self::Sso(from_json_object(data)?),
97                "m.login.application_service" => Self::ApplicationService(from_json_object(data)?),
98                _ => {
99                    Self::_Custom(Box::new(CustomLoginType { type_: login_type.to_owned(), data }))
100                }
101            })
102        }
103
104        /// Returns a reference to the `login_type` string.
105        pub fn login_type(&self) -> &str {
106            match self {
107                Self::Password(_) => "m.login.password",
108                Self::Token(_) => "m.login.token",
109                Self::Sso(_) => "m.login.sso",
110                Self::ApplicationService(_) => "m.login.application_service",
111                Self::_Custom(c) => &c.type_,
112            }
113        }
114
115        /// Returns the associated data.
116        ///
117        /// Prefer to use the public variants of `LoginType` where possible; this method is meant to
118        /// be used for unsupported login types only.
119        pub fn data(&self) -> Cow<'_, JsonObject> {
120            fn serialize<T: Serialize>(obj: &T) -> JsonObject {
121                match serde_json::to_value(obj).expect("login type serialization to succeed") {
122                    JsonValue::Object(obj) => obj,
123                    _ => panic!("all login types must serialize to objects"),
124                }
125            }
126
127            match self {
128                Self::Password(d) => Cow::Owned(serialize(d)),
129                Self::Token(d) => Cow::Owned(serialize(d)),
130                Self::Sso(d) => Cow::Owned(serialize(d)),
131                Self::ApplicationService(d) => Cow::Owned(serialize(d)),
132                Self::_Custom(c) => Cow::Borrowed(&c.data),
133            }
134        }
135    }
136
137    /// The payload for password login.
138    #[derive(Clone, Debug, Default, Deserialize, Serialize)]
139    #[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
140    #[serde(tag = "type", rename = "m.login.password")]
141    pub struct PasswordLoginType {}
142
143    impl PasswordLoginType {
144        /// Creates a new `PasswordLoginType`.
145        pub fn new() -> Self {
146            Self {}
147        }
148    }
149
150    /// The payload for token-based login.
151    #[derive(Clone, Debug, Default, Deserialize, Serialize)]
152    #[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
153    #[serde(tag = "type", rename = "m.login.token")]
154    pub struct TokenLoginType {
155        /// Whether the homeserver supports the `POST /login/get_token` endpoint.
156        #[serde(default, skip_serializing_if = "ruma_common::serde::is_default")]
157        pub get_login_token: bool,
158    }
159
160    impl TokenLoginType {
161        /// Creates a new `TokenLoginType`.
162        pub fn new() -> Self {
163            Self { get_login_token: false }
164        }
165    }
166
167    /// The payload for SSO login.
168    #[derive(Clone, Debug, Default, Deserialize, Serialize)]
169    #[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
170    #[serde(tag = "type", rename = "m.login.sso")]
171    pub struct SsoLoginType {
172        /// The identity provider choices.
173        #[serde(default, skip_serializing_if = "Vec::is_empty")]
174        pub identity_providers: Vec<IdentityProvider>,
175
176        /// Whether this SSO login is for OIDC-aware compatibility.
177        ///
178        /// This field uses the unstable prefix defined in [MSC3824].
179        ///
180        /// [MSC3824]: https://github.com/matrix-org/matrix-spec-proposals/pull/3824
181        #[cfg(feature = "unstable-msc3824")]
182        #[serde(
183            default,
184            skip_serializing_if = "ruma_common::serde::is_default",
185            rename = "org.matrix.msc3824.delegated_oidc_compatibility"
186        )]
187        pub delegated_oidc_compatibility: bool,
188    }
189
190    impl SsoLoginType {
191        /// Creates a new `SsoLoginType`.
192        pub fn new() -> Self {
193            Self::default()
194        }
195    }
196
197    /// An SSO login identity provider.
198    #[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
199    #[derive(Clone, Debug, Deserialize, Serialize)]
200    pub struct IdentityProvider {
201        /// The ID of the provider.
202        pub id: String,
203
204        /// The display name of the provider.
205        pub name: String,
206
207        /// The icon for the provider.
208        pub icon: Option<OwnedMxcUri>,
209
210        /// The brand identifier for the provider.
211        pub brand: Option<IdentityProviderBrand>,
212    }
213
214    impl IdentityProvider {
215        /// Creates an `IdentityProvider` with the given `id` and `name`.
216        pub fn new(id: String, name: String) -> Self {
217            Self { id, name, icon: None, brand: None }
218        }
219    }
220
221    /// An SSO login identity provider brand identifier.
222    ///
223    /// The predefined ones can be found in the matrix-spec-proposals repo in a [separate
224    /// document][matrix-spec-proposals].
225    ///
226    /// [matrix-spec-proposals]: https://github.com/matrix-org/matrix-spec-proposals/blob/v1.1/informal/idp-brands.md
227    #[doc = include_str!(concat!(env!("CARGO_MANIFEST_DIR"), "/src/doc/string_enum.md"))]
228    #[derive(Clone, PartialEq, Eq, StringEnum)]
229    #[ruma_enum(rename_all = "lowercase")]
230    #[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
231    pub enum IdentityProviderBrand {
232        /// The [Apple] brand.
233        ///
234        /// [Apple]: https://developer.apple.com/design/human-interface-guidelines/sign-in-with-apple/overview/buttons/
235        Apple,
236
237        /// The [Facebook](https://developers.facebook.com/docs/facebook-login/web/login-button/) brand.
238        Facebook,
239
240        /// The [GitHub](https://github.com/logos) brand.
241        GitHub,
242
243        /// The [GitLab](https://about.gitlab.com/press/press-kit/) brand.
244        GitLab,
245
246        /// The [Google](https://developers.google.com/identity/branding-guidelines) brand.
247        Google,
248
249        /// The [Twitter] brand.
250        ///
251        /// [Twitter]: https://developer.twitter.com/en/docs/authentication/guides/log-in-with-twitter#tab1
252        Twitter,
253
254        /// A custom brand.
255        #[doc(hidden)]
256        _Custom(PrivOwnedStr),
257    }
258
259    /// The payload for Application Service login.
260    #[derive(Clone, Debug, Default, Deserialize, Serialize)]
261    #[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
262    #[serde(tag = "type", rename = "m.login.application_service")]
263    pub struct ApplicationServiceLoginType {}
264
265    impl ApplicationServiceLoginType {
266        /// Creates a new `ApplicationServiceLoginType`.
267        pub fn new() -> Self {
268            Self::default()
269        }
270    }
271
272    /// A custom login payload.
273    #[doc(hidden)]
274    #[derive(Clone, Debug, Deserialize, Serialize)]
275    #[allow(clippy::exhaustive_structs)]
276    pub struct CustomLoginType {
277        /// A custom type
278        ///
279        /// This field is named `type_` instead of `type` because the latter is a reserved
280        /// keyword in Rust.
281        #[serde(rename = "type")]
282        pub type_: String,
283
284        /// Remaining type content
285        #[serde(flatten)]
286        pub data: JsonObject,
287    }
288
289    mod login_type_serde {
290        use ruma_common::serde::from_raw_json_value;
291        use serde::{de, Deserialize};
292        use serde_json::value::RawValue as RawJsonValue;
293
294        use super::LoginType;
295
296        /// Helper struct to determine the type from a `serde_json::value::RawValue`
297        #[derive(Debug, Deserialize)]
298        struct LoginTypeDeHelper {
299            /// The login type field
300            #[serde(rename = "type")]
301            type_: String,
302        }
303
304        impl<'de> Deserialize<'de> for LoginType {
305            fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
306            where
307                D: de::Deserializer<'de>,
308            {
309                let json = Box::<RawJsonValue>::deserialize(deserializer)?;
310                let LoginTypeDeHelper { type_ } = from_raw_json_value(&json)?;
311
312                Ok(match type_.as_ref() {
313                    "m.login.password" => Self::Password(from_raw_json_value(&json)?),
314                    "m.login.token" => Self::Token(from_raw_json_value(&json)?),
315                    "m.login.sso" => Self::Sso(from_raw_json_value(&json)?),
316                    "m.login.application_service" => {
317                        Self::ApplicationService(from_raw_json_value(&json)?)
318                    }
319                    _ => Self::_Custom(from_raw_json_value(&json)?),
320                })
321            }
322        }
323    }
324
325    #[cfg(test)]
326    mod tests {
327        use assert_matches2::assert_matches;
328        use ruma_common::mxc_uri;
329        use serde::{Deserialize, Serialize};
330        use serde_json::{
331            from_value as from_json_value, json, to_value as to_json_value, Value as JsonValue,
332        };
333
334        use super::{
335            IdentityProvider, IdentityProviderBrand, LoginType, SsoLoginType, TokenLoginType,
336        };
337
338        #[derive(Debug, Deserialize, Serialize)]
339        struct Wrapper {
340            flows: Vec<LoginType>,
341        }
342
343        #[test]
344        fn deserialize_password_login_type() {
345            let wrapper = from_json_value::<Wrapper>(json!({
346                "flows": [
347                    { "type": "m.login.password" }
348                ],
349            }))
350            .unwrap();
351            assert_eq!(wrapper.flows.len(), 1);
352            assert_matches!(&wrapper.flows[0], LoginType::Password(_));
353        }
354
355        #[test]
356        fn deserialize_custom_login_type() {
357            let wrapper = from_json_value::<Wrapper>(json!({
358                "flows": [
359                    {
360                        "type": "io.ruma.custom",
361                        "color": "green",
362                    }
363                ],
364            }))
365            .unwrap();
366            assert_eq!(wrapper.flows.len(), 1);
367            assert_matches!(&wrapper.flows[0], LoginType::_Custom(custom));
368            assert_eq!(custom.type_, "io.ruma.custom");
369            assert_eq!(custom.data.len(), 1);
370            assert_eq!(custom.data.get("color"), Some(&JsonValue::from("green")));
371        }
372
373        #[test]
374        fn deserialize_sso_login_type() {
375            let wrapper = from_json_value::<Wrapper>(json!({
376                "flows": [
377                    {
378                        "type": "m.login.sso",
379                        "identity_providers": [
380                            {
381                                "id": "oidc-gitlab",
382                                "name": "GitLab",
383                                "icon": "mxc://localhost/gitlab-icon",
384                                "brand": "gitlab"
385                            },
386                            {
387                                "id": "custom",
388                                "name": "Custom",
389                            }
390                        ]
391                    }
392                ],
393            }))
394            .unwrap();
395            assert_eq!(wrapper.flows.len(), 1);
396            let flow = &wrapper.flows[0];
397
398            assert_matches!(
399                flow,
400                LoginType::Sso(SsoLoginType {
401                    identity_providers,
402                    #[cfg(feature = "unstable-msc3824")]
403                    delegated_oidc_compatibility: false
404                })
405            );
406            assert_eq!(identity_providers.len(), 2);
407
408            let provider = &identity_providers[0];
409            assert_eq!(provider.id, "oidc-gitlab");
410            assert_eq!(provider.name, "GitLab");
411            assert_eq!(provider.icon.as_deref(), Some(mxc_uri!("mxc://localhost/gitlab-icon")));
412            assert_eq!(provider.brand, Some(IdentityProviderBrand::GitLab));
413
414            let provider = &identity_providers[1];
415            assert_eq!(provider.id, "custom");
416            assert_eq!(provider.name, "Custom");
417            assert_eq!(provider.icon, None);
418            assert_eq!(provider.brand, None);
419        }
420
421        #[test]
422        fn serialize_sso_login_type() {
423            let wrapper = to_json_value(Wrapper {
424                flows: vec![
425                    LoginType::Token(TokenLoginType::new()),
426                    LoginType::Sso(SsoLoginType {
427                        identity_providers: vec![IdentityProvider {
428                            id: "oidc-github".into(),
429                            name: "GitHub".into(),
430                            icon: Some("mxc://localhost/github-icon".into()),
431                            brand: Some(IdentityProviderBrand::GitHub),
432                        }],
433                        #[cfg(feature = "unstable-msc3824")]
434                        delegated_oidc_compatibility: false,
435                    }),
436                ],
437            })
438            .unwrap();
439
440            assert_eq!(
441                wrapper,
442                json!({
443                    "flows": [
444                        {
445                            "type": "m.login.token"
446                        },
447                        {
448                            "type": "m.login.sso",
449                            "identity_providers": [
450                                {
451                                    "id": "oidc-github",
452                                    "name": "GitHub",
453                                    "icon": "mxc://localhost/github-icon",
454                                    "brand": "github"
455                                },
456                            ]
457                        }
458                    ],
459                })
460            );
461        }
462    }
463}