ruma_common/identifiers/
key_id.rs

1use std::{
2    cmp::Ordering,
3    hash::{Hash, Hasher},
4    marker::PhantomData,
5};
6
7use ruma_macros::IdZst;
8
9use super::{
10    crypto_algorithms::SigningKeyAlgorithm, Base64PublicKey, Base64PublicKeyOrDeviceId, DeviceId,
11    DeviceKeyAlgorithm, KeyName, OneTimeKeyAlgorithm, OneTimeKeyName, ServerSigningKeyVersion,
12};
13
14/// A key algorithm and key name delimited by a colon.
15///
16/// Examples of the use of this struct are [`DeviceKeyId`], which identifies a Ed25519 or Curve25519
17/// [device key](https://spec.matrix.org/latest/client-server-api/#device-keys), and
18/// [`CrossSigningKeyId`], which identifies a user's
19/// [cross signing key](https://spec.matrix.org/latest/client-server-api/#cross-signing).
20///
21/// This format of identifier is often used in the `signatures` field of
22/// [signed JSON](https://spec.matrix.org/latest/appendices/#signing-details)
23/// where it is referred to as a "signing key identifier".
24///
25/// This struct is rarely used directly - instead you should expect to use one of the type aliases
26/// that rely on it like [`CrossSigningKeyId`] or [`DeviceSigningKeyId`].
27///
28/// # Examples
29///
30/// To parse a colon-separated identifier:
31///
32/// ```
33/// use ruma_common::DeviceKeyId;
34///
35/// let k = DeviceKeyId::parse("ed25519:1").unwrap();
36/// assert_eq!(k.algorithm().as_str(), "ed25519");
37/// assert_eq!(k.key_name(), "1");
38/// ```
39///
40/// To construct a colon-separated identifier from its parts:
41///
42/// ```
43/// use ruma_common::{DeviceKeyAlgorithm, DeviceKeyId};
44///
45/// let k = DeviceKeyId::from_parts(DeviceKeyAlgorithm::Curve25519, "MYDEVICE".into());
46/// assert_eq!(k.as_str(), "curve25519:MYDEVICE");
47/// ```
48#[repr(transparent)]
49#[derive(IdZst)]
50#[ruma_id(
51    validate = ruma_identifiers_validation::key_id::validate::<K>,
52)]
53pub struct KeyId<A: KeyAlgorithm, K: KeyName + ?Sized>(PhantomData<(A, K)>, str);
54
55impl<A: KeyAlgorithm, K: KeyName + ?Sized> KeyId<A, K> {
56    /// Creates a new `KeyId` from an algorithm and key name.
57    pub fn from_parts(algorithm: A, key_name: &K) -> OwnedKeyId<A, K> {
58        let algorithm = algorithm.as_ref();
59        let key_name = key_name.as_ref();
60
61        let mut res = String::with_capacity(algorithm.len() + 1 + key_name.len());
62        res.push_str(algorithm);
63        res.push(':');
64        res.push_str(key_name);
65
66        Self::from_borrowed(&res).to_owned()
67    }
68
69    /// Returns key algorithm of the key ID - the part that comes before the colon.
70    ///
71    /// # Example
72    ///
73    /// ```
74    /// use ruma_common::{DeviceKeyAlgorithm, DeviceKeyId};
75    ///
76    /// let k = DeviceKeyId::parse("ed25519:1").unwrap();
77    /// assert_eq!(k.algorithm(), DeviceKeyAlgorithm::Ed25519);
78    /// ```
79    pub fn algorithm(&self) -> A {
80        A::from(&self.as_str()[..self.colon_idx()])
81    }
82
83    /// Returns the key name of the key ID - the part that comes after the colon.
84    ///
85    /// # Example
86    ///
87    /// ```
88    /// use ruma_common::{device_id, DeviceKeyId};
89    ///
90    /// let k = DeviceKeyId::parse("ed25519:DEV1").unwrap();
91    /// assert_eq!(k.key_name(), device_id!("DEV1"));
92    /// ```
93    pub fn key_name<'a>(&'a self) -> &'a K
94    where
95        &'a K: TryFrom<&'a str>,
96    {
97        <&'a K>::try_from(&self.as_str()[(self.colon_idx() + 1)..])
98            .unwrap_or_else(|_| unreachable!())
99    }
100
101    fn colon_idx(&self) -> usize {
102        self.as_str().find(':').unwrap()
103    }
104}
105
106/// Algorithm + key name for signing keys.
107pub type SigningKeyId<K> = KeyId<SigningKeyAlgorithm, K>;
108
109/// Algorithm + key name for signing keys.
110pub type OwnedSigningKeyId<K> = OwnedKeyId<SigningKeyAlgorithm, K>;
111
112/// Algorithm + key name for homeserver signing keys.
113pub type ServerSigningKeyId = SigningKeyId<ServerSigningKeyVersion>;
114
115/// Algorithm + key name for homeserver signing keys.
116pub type OwnedServerSigningKeyId = OwnedSigningKeyId<ServerSigningKeyVersion>;
117
118/// Algorithm + key name for [device signing keys].
119///
120/// [device signing keys]: https://spec.matrix.org/latest/client-server-api/#device-keys
121pub type DeviceSigningKeyId = SigningKeyId<DeviceId>;
122
123/// Algorithm + key name for [device signing] keys.
124///
125/// [device signing keys]: https://spec.matrix.org/latest/client-server-api/#device-keys
126pub type OwnedDeviceSigningKeyId = OwnedSigningKeyId<DeviceId>;
127
128/// Algorithm + key name for [cross-signing] keys.
129///
130/// [cross-signing]: https://spec.matrix.org/latest/client-server-api/#cross-signing
131pub type CrossSigningKeyId = SigningKeyId<Base64PublicKey>;
132
133/// Algorithm + key name for [cross-signing] keys.
134///
135/// [cross-signing]: https://spec.matrix.org/latest/client-server-api/#cross-signing
136pub type OwnedCrossSigningKeyId = OwnedSigningKeyId<Base64PublicKey>;
137
138/// Algorithm + key name for [cross-signing] or [device signing] keys.
139///
140/// [cross-signing]: https://spec.matrix.org/latest/client-server-api/#cross-signing
141/// [device signing]: https://spec.matrix.org/latest/client-server-api/#device-keys
142pub type CrossSigningOrDeviceSigningKeyId = SigningKeyId<Base64PublicKeyOrDeviceId>;
143
144/// Algorithm + key name for [cross-signing] or [device signing] keys.
145///
146/// [cross-signing]: https://spec.matrix.org/latest/client-server-api/#cross-signing
147/// [device signing]: https://spec.matrix.org/latest/client-server-api/#device-keys
148pub type OwnedCrossSigningOrDeviceSigningKeyId = OwnedSigningKeyId<Base64PublicKeyOrDeviceId>;
149
150/// Algorithm + key name for [device keys].
151///
152/// [device keys]: https://spec.matrix.org/latest/client-server-api/#device-keys
153pub type DeviceKeyId = KeyId<DeviceKeyAlgorithm, DeviceId>;
154
155/// Algorithm + key name for [device keys].
156///
157/// [device keys]: https://spec.matrix.org/latest/client-server-api/#device-keys
158pub type OwnedDeviceKeyId = OwnedKeyId<DeviceKeyAlgorithm, DeviceId>;
159
160/// Algorithm + key name for [one-time and fallback keys].
161///
162/// [one-time and fallback keys]: https://spec.matrix.org/latest/client-server-api/#one-time-and-fallback-keys
163pub type OneTimeKeyId = KeyId<OneTimeKeyAlgorithm, OneTimeKeyName>;
164
165/// Algorithm + key name for [one-time and fallback keys].
166///
167/// [one-time and fallback keys]: https://spec.matrix.org/latest/client-server-api/#one-time-and-fallback-keys
168pub type OwnedOneTimeKeyId = OwnedKeyId<OneTimeKeyAlgorithm, OneTimeKeyName>;
169
170// The following impls are usually derived using the std macros.
171// They are implemented manually here to avoid unnecessary bounds.
172impl<A: KeyAlgorithm, K: KeyName + ?Sized> PartialEq for KeyId<A, K> {
173    fn eq(&self, other: &Self) -> bool {
174        self.as_str() == other.as_str()
175    }
176}
177
178impl<A: KeyAlgorithm, K: KeyName + ?Sized> Eq for KeyId<A, K> {}
179
180impl<A: KeyAlgorithm, K: KeyName + ?Sized> PartialOrd for KeyId<A, K> {
181    fn partial_cmp(&self, other: &Self) -> Option<Ordering> {
182        Some(self.cmp(other))
183    }
184}
185
186impl<A: KeyAlgorithm, K: KeyName + ?Sized> Ord for KeyId<A, K> {
187    fn cmp(&self, other: &Self) -> Ordering {
188        Ord::cmp(self.as_str(), other.as_str())
189    }
190}
191
192impl<A: KeyAlgorithm, K: KeyName + ?Sized> Hash for KeyId<A, K> {
193    fn hash<H: Hasher>(&self, state: &mut H) {
194        self.as_str().hash(state);
195    }
196}
197
198/// The algorithm of a key.
199pub trait KeyAlgorithm: for<'a> From<&'a str> + AsRef<str> {}
200
201impl KeyAlgorithm for SigningKeyAlgorithm {}
202
203impl KeyAlgorithm for DeviceKeyAlgorithm {}
204
205impl KeyAlgorithm for OneTimeKeyAlgorithm {}
206
207/// An opaque identifier type to use with [`KeyId`].
208///
209/// This type has no semantic value and no validation is done. It is meant to be able to use the
210/// [`KeyId`] API without validating the key name.
211#[derive(PartialEq, Eq, PartialOrd, Ord, Hash, IdZst)]
212pub struct AnyKeyName(str);
213
214impl KeyName for AnyKeyName {
215    fn validate(_s: &str) -> Result<(), ruma_common::IdParseError> {
216        Ok(())
217    }
218}
219
220#[cfg(test)]
221mod tests {
222    use assert_matches2::assert_matches;
223    use ruma_identifiers_validation::Error;
224
225    use super::DeviceKeyId;
226
227    #[test]
228    fn algorithm_and_key_name_are_correctly_extracted() {
229        let key_id = DeviceKeyId::parse("ed25519:MYDEVICE").expect("Should parse correctly");
230        assert_eq!(key_id.algorithm().as_str(), "ed25519");
231        assert_eq!(key_id.key_name(), "MYDEVICE");
232    }
233
234    #[test]
235    fn empty_key_name_is_correctly_extracted() {
236        let key_id = DeviceKeyId::parse("ed25519:").expect("Should parse correctly");
237        assert_eq!(key_id.algorithm().as_str(), "ed25519");
238        assert_eq!(key_id.key_name(), "");
239    }
240
241    #[test]
242    fn missing_colon_fails_to_parse() {
243        let error = DeviceKeyId::parse("ed25519_MYDEVICE").expect_err("Should fail to parse");
244        assert_matches!(error, Error::MissingColon);
245    }
246
247    #[test]
248    fn empty_algorithm_fails_to_parse() {
249        let error = DeviceKeyId::parse(":MYDEVICE").expect_err("Should fail to parse");
250        // Weirdly, this also reports MissingColon
251        assert_matches!(error, Error::MissingColon);
252    }
253}