1use std::collections::BTreeMap;
4
5use js_int::UInt;
6use ruma_common::{
7 encryption::{CrossSigningKey, DeviceKeys},
8 presence::PresenceState,
9 serde::{from_raw_json_value, Raw},
10 to_device::DeviceIdOrAllDevices,
11 OwnedDeviceId, OwnedEventId, OwnedRoomId, OwnedTransactionId, OwnedUserId,
12};
13use ruma_events::{receipt::Receipt, AnyToDeviceEventContent, ToDeviceEventType};
14use serde::{de, Deserialize, Serialize};
15use serde_json::{value::RawValue as RawJsonValue, Value as JsonValue};
16
17#[derive(Clone, Debug, Serialize)]
19#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
20#[serde(tag = "edu_type", content = "content")]
21pub enum Edu {
22 #[serde(rename = "m.presence")]
24 Presence(PresenceContent),
25
26 #[serde(rename = "m.receipt")]
28 Receipt(ReceiptContent),
29
30 #[serde(rename = "m.typing")]
32 Typing(TypingContent),
33
34 #[serde(rename = "m.device_list_update")]
38 DeviceListUpdate(DeviceListUpdateContent),
39
40 #[serde(rename = "m.direct_to_device")]
44 DirectToDevice(DirectDeviceContent),
45
46 #[serde(rename = "m.signing_key_update")]
49 SigningKeyUpdate(SigningKeyUpdateContent),
50
51 #[doc(hidden)]
52 _Custom(JsonValue),
53}
54
55#[derive(Debug, Deserialize)]
56struct EduDeHelper {
57 edu_type: String,
59 content: Box<RawJsonValue>,
60}
61
62impl<'de> Deserialize<'de> for Edu {
63 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
64 where
65 D: de::Deserializer<'de>,
66 {
67 let json = Box::<RawJsonValue>::deserialize(deserializer)?;
68 let EduDeHelper { edu_type, content } = from_raw_json_value(&json)?;
69
70 Ok(match edu_type.as_ref() {
71 "m.presence" => Self::Presence(from_raw_json_value(&content)?),
72 "m.receipt" => Self::Receipt(from_raw_json_value(&content)?),
73 "m.typing" => Self::Typing(from_raw_json_value(&content)?),
74 "m.device_list_update" => Self::DeviceListUpdate(from_raw_json_value(&content)?),
75 "m.direct_to_device" => Self::DirectToDevice(from_raw_json_value(&content)?),
76 "m.signing_key_update" => Self::SigningKeyUpdate(from_raw_json_value(&content)?),
77 _ => Self::_Custom(from_raw_json_value(&content)?),
78 })
79 }
80}
81
82#[derive(Clone, Debug, Deserialize, Serialize)]
84#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
85pub struct PresenceContent {
86 pub push: Vec<PresenceUpdate>,
88}
89
90impl PresenceContent {
91 pub fn new(push: Vec<PresenceUpdate>) -> Self {
93 Self { push }
94 }
95}
96
97#[derive(Clone, Debug, Deserialize, Serialize)]
99#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
100pub struct PresenceUpdate {
101 pub user_id: OwnedUserId,
103
104 pub presence: PresenceState,
106
107 #[serde(skip_serializing_if = "Option::is_none")]
109 pub status_msg: Option<String>,
110
111 pub last_active_ago: UInt,
113
114 #[serde(default)]
118 pub currently_active: bool,
119}
120
121impl PresenceUpdate {
122 pub fn new(user_id: OwnedUserId, presence: PresenceState, last_activity: UInt) -> Self {
124 Self {
125 user_id,
126 presence,
127 last_active_ago: last_activity,
128 status_msg: None,
129 currently_active: false,
130 }
131 }
132}
133
134#[derive(Clone, Debug, Deserialize, Serialize)]
136#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
137pub struct ReceiptContent {
138 #[serde(flatten)]
140 pub receipts: BTreeMap<OwnedRoomId, ReceiptMap>,
141}
142
143impl ReceiptContent {
144 pub fn new(receipts: BTreeMap<OwnedRoomId, ReceiptMap>) -> Self {
146 Self { receipts }
147 }
148}
149
150#[derive(Clone, Debug, Deserialize, Serialize)]
152#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
153pub struct ReceiptMap {
154 #[serde(rename = "m.read")]
156 pub read: BTreeMap<OwnedUserId, ReceiptData>,
157}
158
159impl ReceiptMap {
160 pub fn new(read: BTreeMap<OwnedUserId, ReceiptData>) -> Self {
162 Self { read }
163 }
164}
165
166#[derive(Clone, Debug, Deserialize, Serialize)]
168#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
169pub struct ReceiptData {
170 pub data: Receipt,
172
173 pub event_ids: Vec<OwnedEventId>,
175}
176
177impl ReceiptData {
178 pub fn new(data: Receipt, event_ids: Vec<OwnedEventId>) -> Self {
180 Self { data, event_ids }
181 }
182}
183
184#[derive(Clone, Debug, Deserialize, Serialize)]
186#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
187pub struct TypingContent {
188 pub room_id: OwnedRoomId,
190
191 pub user_id: OwnedUserId,
193
194 pub typing: bool,
196}
197
198impl TypingContent {
199 pub fn new(room_id: OwnedRoomId, user_id: OwnedUserId, typing: bool) -> Self {
201 Self { room_id, user_id, typing }
202 }
203}
204
205#[derive(Clone, Debug, Deserialize, Serialize)]
207#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
208pub struct DeviceListUpdateContent {
209 pub user_id: OwnedUserId,
211
212 pub device_id: OwnedDeviceId,
214
215 #[serde(skip_serializing_if = "Option::is_none")]
219 pub device_display_name: Option<String>,
220
221 pub stream_id: UInt,
223
224 #[serde(default, skip_serializing_if = "Vec::is_empty")]
227 pub prev_id: Vec<UInt>,
228
229 #[serde(skip_serializing_if = "Option::is_none")]
231 pub deleted: Option<bool>,
232
233 #[serde(skip_serializing_if = "Option::is_none")]
235 pub keys: Option<Raw<DeviceKeys>>,
236}
237
238impl DeviceListUpdateContent {
239 pub fn new(user_id: OwnedUserId, device_id: OwnedDeviceId, stream_id: UInt) -> Self {
242 Self {
243 user_id,
244 device_id,
245 device_display_name: None,
246 stream_id,
247 prev_id: vec![],
248 deleted: None,
249 keys: None,
250 }
251 }
252}
253
254#[derive(Clone, Debug, Deserialize, Serialize)]
256#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
257pub struct DirectDeviceContent {
258 pub sender: OwnedUserId,
260
261 #[serde(rename = "type")]
263 pub ev_type: ToDeviceEventType,
264
265 pub message_id: OwnedTransactionId,
267
268 pub messages: DirectDeviceMessages,
273}
274
275impl DirectDeviceContent {
276 pub fn new(
278 sender: OwnedUserId,
279 ev_type: ToDeviceEventType,
280 message_id: OwnedTransactionId,
281 ) -> Self {
282 Self { sender, ev_type, message_id, messages: DirectDeviceMessages::new() }
283 }
284}
285
286pub type DirectDeviceMessages =
290 BTreeMap<OwnedUserId, BTreeMap<DeviceIdOrAllDevices, Raw<AnyToDeviceEventContent>>>;
291
292#[derive(Clone, Debug, Deserialize, Serialize)]
294#[cfg_attr(not(ruma_unstable_exhaustive_types), non_exhaustive)]
295pub struct SigningKeyUpdateContent {
296 pub user_id: OwnedUserId,
298
299 #[serde(skip_serializing_if = "Option::is_none")]
301 pub master_key: Option<Raw<CrossSigningKey>>,
302
303 #[serde(skip_serializing_if = "Option::is_none")]
305 pub self_signing_key: Option<Raw<CrossSigningKey>>,
306}
307
308impl SigningKeyUpdateContent {
309 pub fn new(user_id: OwnedUserId) -> Self {
311 Self { user_id, master_key: None, self_signing_key: None }
312 }
313}
314
315#[cfg(test)]
316mod tests {
317 use assert_matches2::assert_matches;
318 use js_int::uint;
319 use ruma_common::{room_id, user_id};
320 use ruma_events::ToDeviceEventType;
321 use serde_json::json;
322
323 use super::{DeviceListUpdateContent, Edu, ReceiptContent};
324
325 #[test]
326 fn device_list_update_edu() {
327 let json = json!({
328 "content": {
329 "deleted": false,
330 "device_display_name": "Mobile",
331 "device_id": "QBUAZIFURK",
332 "keys": {
333 "algorithms": [
334 "m.olm.v1.curve25519-aes-sha2",
335 "m.megolm.v1.aes-sha2"
336 ],
337 "device_id": "JLAFKJWSCS",
338 "keys": {
339 "curve25519:JLAFKJWSCS": "3C5BFWi2Y8MaVvjM8M22DBmh24PmgR0nPvJOIArzgyI",
340 "ed25519:JLAFKJWSCS": "lEuiRJBit0IG6nUf5pUzWTUEsRVVe/HJkoKuEww9ULI"
341 },
342 "signatures": {
343 "@alice:example.com": {
344 "ed25519:JLAFKJWSCS": "dSO80A01XiigH3uBiDVx/EjzaoycHcjq9lfQX0uWsqxl2giMIiSPR8a4d291W1ihKJL/a+myXS367WT6NAIcBA"
345 }
346 },
347 "user_id": "@alice:example.com"
348 },
349 "stream_id": 6,
350 "user_id": "@john:example.com"
351 },
352 "edu_type": "m.device_list_update"
353 });
354
355 let edu = serde_json::from_value::<Edu>(json.clone()).unwrap();
356 assert_matches!(
357 &edu,
358 Edu::DeviceListUpdate(DeviceListUpdateContent {
359 user_id,
360 device_id,
361 device_display_name,
362 stream_id,
363 prev_id,
364 deleted,
365 keys,
366 })
367 );
368
369 assert_eq!(user_id, "@john:example.com");
370 assert_eq!(device_id, "QBUAZIFURK");
371 assert_eq!(device_display_name.as_deref(), Some("Mobile"));
372 assert_eq!(*stream_id, uint!(6));
373 assert_eq!(*prev_id, vec![]);
374 assert_eq!(*deleted, Some(false));
375 assert_matches!(keys, Some(_));
376
377 assert_eq!(serde_json::to_value(&edu).unwrap(), json);
378 }
379
380 #[test]
381 fn minimal_device_list_update_edu() {
382 let json = json!({
383 "content": {
384 "device_id": "QBUAZIFURK",
385 "stream_id": 6,
386 "user_id": "@john:example.com"
387 },
388 "edu_type": "m.device_list_update"
389 });
390
391 let edu = serde_json::from_value::<Edu>(json.clone()).unwrap();
392 assert_matches!(
393 &edu,
394 Edu::DeviceListUpdate(DeviceListUpdateContent {
395 user_id,
396 device_id,
397 device_display_name,
398 stream_id,
399 prev_id,
400 deleted,
401 keys,
402 })
403 );
404
405 assert_eq!(user_id, "@john:example.com");
406 assert_eq!(device_id, "QBUAZIFURK");
407 assert_eq!(*device_display_name, None);
408 assert_eq!(*stream_id, uint!(6));
409 assert_eq!(*prev_id, vec![]);
410 assert_eq!(*deleted, None);
411 assert_matches!(keys, None);
412
413 assert_eq!(serde_json::to_value(&edu).unwrap(), json);
414 }
415
416 #[test]
417 fn receipt_edu() {
418 let json = json!({
419 "content": {
420 "!some_room:example.org": {
421 "m.read": {
422 "@john:matrix.org": {
423 "data": {
424 "ts": 1_533_358
425 },
426 "event_ids": [
427 "$read_this_event:matrix.org"
428 ]
429 }
430 }
431 }
432 },
433 "edu_type": "m.receipt"
434 });
435
436 let edu = serde_json::from_value::<Edu>(json.clone()).unwrap();
437 assert_matches!(&edu, Edu::Receipt(ReceiptContent { receipts }));
438 assert!(receipts.get(room_id!("!some_room:example.org")).is_some());
439
440 assert_eq!(serde_json::to_value(&edu).unwrap(), json);
441 }
442
443 #[test]
444 fn typing_edu() {
445 let json = json!({
446 "content": {
447 "room_id": "!somewhere:matrix.org",
448 "typing": true,
449 "user_id": "@john:matrix.org"
450 },
451 "edu_type": "m.typing"
452 });
453
454 let edu = serde_json::from_value::<Edu>(json.clone()).unwrap();
455 assert_matches!(&edu, Edu::Typing(content));
456 assert_eq!(content.room_id, "!somewhere:matrix.org");
457 assert_eq!(content.user_id, "@john:matrix.org");
458 assert!(content.typing);
459
460 assert_eq!(serde_json::to_value(&edu).unwrap(), json);
461 }
462
463 #[test]
464 fn direct_to_device_edu() {
465 let json = json!({
466 "content": {
467 "message_id": "hiezohf6Hoo7kaev",
468 "messages": {
469 "@alice:example.org": {
470 "IWHQUZUIAH": {
471 "algorithm": "m.megolm.v1.aes-sha2",
472 "room_id": "!Cuyf34gef24t:localhost",
473 "session_id": "X3lUlvLELLYxeTx4yOVu6UDpasGEVO0Jbu+QFnm0cKQ",
474 "session_key": "AgAAAADxKHa9uFxcXzwYoNueL5Xqi69IkD4sni8LlfJL7qNBEY..."
475 }
476 }
477 },
478 "sender": "@john:example.com",
479 "type": "m.room_key_request"
480 },
481 "edu_type": "m.direct_to_device"
482 });
483
484 let edu = serde_json::from_value::<Edu>(json.clone()).unwrap();
485 assert_matches!(&edu, Edu::DirectToDevice(content));
486 assert_eq!(content.sender, "@john:example.com");
487 assert_eq!(content.ev_type, ToDeviceEventType::RoomKeyRequest);
488 assert_eq!(content.message_id, "hiezohf6Hoo7kaev");
489 assert!(content.messages.get(user_id!("@alice:example.org")).is_some());
490
491 assert_eq!(serde_json::to_value(&edu).unwrap(), json);
492 }
493
494 #[test]
495 fn signing_key_update_edu() {
496 let json = json!({
497 "content": {
498 "master_key": {
499 "keys": {
500 "ed25519:alice+base64+public+key": "alice+base64+public+key",
501 "ed25519:base64+master+public+key": "base64+master+public+key"
502 },
503 "signatures": {
504 "@alice:example.com": {
505 "ed25519:alice+base64+master+key": "signature+of+key"
506 }
507 },
508 "usage": [
509 "master"
510 ],
511 "user_id": "@alice:example.com"
512 },
513 "self_signing_key": {
514 "keys": {
515 "ed25519:alice+base64+public+key": "alice+base64+public+key",
516 "ed25519:base64+self+signing+public+key": "base64+self+signing+master+public+key"
517 },
518 "signatures": {
519 "@alice:example.com": {
520 "ed25519:alice+base64+master+key": "signature+of+key",
521 "ed25519:base64+master+public+key": "signature+of+self+signing+key"
522 }
523 },
524 "usage": [
525 "self_signing"
526 ],
527 "user_id": "@alice:example.com"
528 },
529 "user_id": "@alice:example.com"
530 },
531 "edu_type": "m.signing_key_update"
532 });
533
534 let edu = serde_json::from_value::<Edu>(json.clone()).unwrap();
535 assert_matches!(&edu, Edu::SigningKeyUpdate(content));
536 assert_eq!(content.user_id, "@alice:example.com");
537 assert!(content.master_key.is_some());
538 assert!(content.self_signing_key.is_some());
539
540 assert_eq!(serde_json::to_value(&edu).unwrap(), json);
541 }
542}