1//! Server discovery endpoints.
23use std::collections::BTreeMap;
45use ruma_common::{
6 serde::Base64, MilliSecondsSinceUnixEpoch, OwnedServerName, OwnedServerSigningKeyId,
7 ServerSignatures,
8};
9use serde::{Deserialize, Serialize};
1011pub mod discover_homeserver;
12pub mod get_remote_server_keys;
13pub mod get_remote_server_keys_batch;
14pub mod get_server_keys;
15pub mod get_server_version;
16#[cfg(feature = "unstable-msc3723")]
17pub mod get_server_versions;
1819/// Public key of the homeserver for verifying digital signatures.
20#[derive(Clone, Debug, Deserialize, Serialize)]
21#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
22pub struct VerifyKey {
23/// The unpadded base64-encoded key.
24pub key: Base64,
25}
2627impl VerifyKey {
28/// Creates a new `VerifyKey` from the given key.
29pub fn new(key: Base64) -> Self {
30Self { key }
31 }
32}
3334/// A key the server used to use, but stopped using.
35#[derive(Clone, Debug, Deserialize, Serialize)]
36#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
37pub struct OldVerifyKey {
38/// Timestamp when this key expired.
39pub expired_ts: MilliSecondsSinceUnixEpoch,
4041/// The unpadded base64-encoded key.
42pub key: Base64,
43}
4445impl OldVerifyKey {
46/// Creates a new `OldVerifyKey` with the given expiry time and key.
47pub fn new(expired_ts: MilliSecondsSinceUnixEpoch, key: Base64) -> Self {
48Self { expired_ts, key }
49 }
50}
5152/// Queried server key, signed by the notary server.
53#[derive(Clone, Debug, Deserialize, Serialize)]
54#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
55pub struct ServerSigningKeys {
56/// DNS name of the homeserver.
57pub server_name: OwnedServerName,
5859/// Public keys of the homeserver for verifying digital signatures.
60pub verify_keys: BTreeMap<OwnedServerSigningKeyId, VerifyKey>,
6162/// Public keys that the homeserver used to use and when it stopped using them.
63// This field is optional, but all fields were assumed to be required before clarification
64 // in https://github.com/matrix-org/matrix-spec/pull/1930, so we still send it.
65#[serde(default)]
66pub old_verify_keys: BTreeMap<OwnedServerSigningKeyId, OldVerifyKey>,
6768/// Digital signatures of this object signed using the verify_keys.
69 ///
70 /// Map of server name to keys by key ID.
71pub signatures: ServerSignatures,
7273/// Timestamp when the keys should be refreshed.
74 ///
75 /// This field MUST be ignored in room versions 1, 2, 3, and 4.
76pub valid_until_ts: MilliSecondsSinceUnixEpoch,
77}
7879impl ServerSigningKeys {
80/// Creates a new `ServerSigningKeys` with the given server name and validity timestamp.
81 ///
82 /// All other fields will be empty.
83pub fn new(server_name: OwnedServerName, valid_until_ts: MilliSecondsSinceUnixEpoch) -> Self {
84Self {
85 server_name,
86 verify_keys: BTreeMap::new(),
87 old_verify_keys: BTreeMap::new(),
88 signatures: ServerSignatures::default(),
89 valid_until_ts,
90 }
91 }
92}