ruma_events/room/
third_party_invite.rs

1//! Types for the [`m.room.third_party_invite`] event.
2//!
3//! [`m.room.third_party_invite`]: https://spec.matrix.org/latest/client-server-api/#mroomthird_party_invite
4
5use ruma_common::third_party_invite::IdentityServerBase64PublicKey;
6use ruma_macros::EventContent;
7use serde::{Deserialize, Serialize};
8
9/// The content of an `m.room.third_party_invite` event.
10///
11/// An invitation to a room issued to a third party identifier, rather than a matrix user ID.
12///
13/// Acts as an `m.room.member` invite event, where there isn't a target user_id to invite. This
14/// event contains a token and a public key whose private key must be used to sign the token.
15/// Any user who can present that signature may use this invitation to join the target room.
16#[derive(Clone, Debug, Deserialize, Serialize, EventContent)]
17#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
18#[ruma_event(type = "m.room.third_party_invite", kind = State, state_key_type = String)]
19pub struct RoomThirdPartyInviteEventContent {
20    /// A user-readable string which represents the user who has been invited.
21    ///
22    /// If the `compat-optional` feature is enabled, this field being absent in JSON will result
23    /// in an empty string instead of an error when deserializing.
24    #[cfg_attr(feature = "compat-optional", serde(default))]
25    pub display_name: String,
26
27    /// A URL which can be fetched to validate whether the key has been revoked.
28    ///
29    /// If the `compat-optional` feature is enabled, this field being absent in JSON will result
30    /// in an empty string instead of an error when deserializing.
31    #[cfg_attr(feature = "compat-optional", serde(default))]
32    pub key_validity_url: String,
33
34    /// A base64-encoded Ed25519 key with which the token must be signed.
35    ///
36    /// If the `compat-optional` feature is enabled, this field being absent in JSON will result
37    /// in an empty string instead of an error when deserializing.
38    #[cfg_attr(
39        feature = "compat-optional",
40        serde(default = "empty_identity_server_base64_public_key")
41    )]
42    pub public_key: IdentityServerBase64PublicKey,
43
44    /// Keys with which the token may be signed.
45    #[serde(skip_serializing_if = "Option::is_none")]
46    pub public_keys: Option<Vec<PublicKey>>,
47}
48
49impl RoomThirdPartyInviteEventContent {
50    /// Creates a new `RoomThirdPartyInviteEventContent` with the given display name, key validity
51    /// url and public key.
52    pub fn new(
53        display_name: String,
54        key_validity_url: String,
55        public_key: IdentityServerBase64PublicKey,
56    ) -> Self {
57        Self { display_name, key_validity_url, public_key, public_keys: None }
58    }
59}
60
61/// A public key for signing a third party invite token.
62#[derive(Clone, Debug, Deserialize, Serialize)]
63#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
64pub struct PublicKey {
65    /// An optional URL which can be fetched to validate whether the key has been revoked.
66    ///
67    /// The URL must return a JSON object containing a boolean property named 'valid'.
68    /// If this URL is absent, the key must be considered valid indefinitely.
69    #[serde(skip_serializing_if = "Option::is_none")]
70    pub key_validity_url: Option<String>,
71
72    /// A base64-encoded Ed25519 key with which the token must be signed.
73    pub public_key: IdentityServerBase64PublicKey,
74}
75
76impl PublicKey {
77    /// Creates a new `PublicKey` with the given base64-encoded ed25519 key.
78    pub fn new(public_key: IdentityServerBase64PublicKey) -> Self {
79        Self { key_validity_url: None, public_key }
80    }
81}
82
83/// Generate an empty [`IdentityServerBase64PublicKey`].
84#[cfg(feature = "compat-optional")]
85fn empty_identity_server_base64_public_key() -> IdentityServerBase64PublicKey {
86    IdentityServerBase64PublicKey(String::new())
87}