events: Replace most Box<Id>s with new owned ID types

This commit is contained in:
Jonas Platte 2022-04-08 10:51:02 +02:00 committed by Jonas Platte
parent 026ccd7e5b
commit 489f51e231
24 changed files with 95 additions and 96 deletions

View File

@ -5,7 +5,7 @@
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::{EventEncryptionAlgorithm, RoomId}; use crate::{EventEncryptionAlgorithm, OwnedRoomId};
/// The content of an `m.forwarded_room_key` event. /// The content of an `m.forwarded_room_key` event.
/// ///
@ -19,7 +19,7 @@ pub struct ToDeviceForwardedRoomKeyEventContent {
pub algorithm: EventEncryptionAlgorithm, pub algorithm: EventEncryptionAlgorithm,
/// The room where the key is used. /// The room where the key is used.
pub room_id: Box<RoomId>, pub room_id: OwnedRoomId,
/// The Curve25519 key of the device which initiated the session originally. /// The Curve25519 key of the device which initiated the session originally.
pub sender_key: String, pub sender_key: String,
@ -57,7 +57,7 @@ pub struct ToDeviceForwardedRoomKeyEventContentInit {
pub algorithm: EventEncryptionAlgorithm, pub algorithm: EventEncryptionAlgorithm,
/// The room where the key is used. /// The room where the key is used.
pub room_id: Box<RoomId>, pub room_id: OwnedRoomId,
/// The Curve25519 key of the device which initiated the session originally. /// The Curve25519 key of the device which initiated the session originally.
pub sender_key: String, pub sender_key: String,

View File

@ -5,7 +5,7 @@
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::EventId; use crate::OwnedEventId;
/// The content of an `m.fully_read` event. /// The content of an `m.fully_read` event.
/// ///
@ -17,12 +17,12 @@ use crate::EventId;
#[ruma_event(type = "m.fully_read", kind = RoomAccountData)] #[ruma_event(type = "m.fully_read", kind = RoomAccountData)]
pub struct FullyReadEventContent { pub struct FullyReadEventContent {
/// The event the user's read marker is located at in the room. /// The event the user's read marker is located at in the room.
pub event_id: Box<EventId>, pub event_id: OwnedEventId,
} }
impl FullyReadEventContent { impl FullyReadEventContent {
/// Creates a new `FullyReadEventContent` with the given event ID. /// Creates a new `FullyReadEventContent` with the given event ID.
pub fn new(event_id: Box<EventId>) -> Self { pub fn new(event_id: OwnedEventId) -> Self {
Self { event_id } Self { event_id }
} }
} }

View File

@ -12,7 +12,7 @@ use super::{
HashAlgorithm, KeyAgreementProtocol, MessageAuthenticationCode, Relation, HashAlgorithm, KeyAgreementProtocol, MessageAuthenticationCode, Relation,
ShortAuthenticationString, ShortAuthenticationString,
}; };
use crate::{serde::Base64, TransactionId}; use crate::{serde::Base64, OwnedTransactionId};
/// The content of a to-device `m.key.verification.accept` event. /// The content of a to-device `m.key.verification.accept` event.
/// ///
@ -24,7 +24,7 @@ pub struct ToDeviceKeyVerificationAcceptEventContent {
/// An opaque identifier for the verification process. /// An opaque identifier for the verification process.
/// ///
/// Must be the same as the one used for the `m.key.verification.start` message. /// Must be the same as the one used for the `m.key.verification.start` message.
pub transaction_id: Box<TransactionId>, pub transaction_id: OwnedTransactionId,
/// The method specific content. /// The method specific content.
#[serde(flatten)] #[serde(flatten)]
@ -34,7 +34,7 @@ pub struct ToDeviceKeyVerificationAcceptEventContent {
impl ToDeviceKeyVerificationAcceptEventContent { impl ToDeviceKeyVerificationAcceptEventContent {
/// Creates a new `ToDeviceKeyVerificationAcceptEventContent` with the given transaction ID and /// Creates a new `ToDeviceKeyVerificationAcceptEventContent` with the given transaction ID and
/// method-specific content. /// method-specific content.
pub fn new(transaction_id: Box<TransactionId>, method: AcceptMethod) -> Self { pub fn new(transaction_id: OwnedTransactionId, method: AcceptMethod) -> Self {
Self { transaction_id, method } Self { transaction_id, method }
} }
} }

View File

@ -6,7 +6,7 @@ use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use super::Relation; use super::Relation;
use crate::{serde::StringEnum, PrivOwnedStr, TransactionId}; use crate::{serde::StringEnum, OwnedTransactionId, PrivOwnedStr};
/// The content of a to-device `m.key.verification.cancel` event. /// The content of a to-device `m.key.verification.cancel` event.
/// ///
@ -16,7 +16,7 @@ use crate::{serde::StringEnum, PrivOwnedStr, TransactionId};
#[ruma_event(type = "m.key.verification.cancel", kind = ToDevice)] #[ruma_event(type = "m.key.verification.cancel", kind = ToDevice)]
pub struct ToDeviceKeyVerificationCancelEventContent { pub struct ToDeviceKeyVerificationCancelEventContent {
/// The opaque identifier for the verification process/request. /// The opaque identifier for the verification process/request.
pub transaction_id: Box<TransactionId>, pub transaction_id: OwnedTransactionId,
/// A human readable description of the `code`. /// A human readable description of the `code`.
/// ///
@ -30,7 +30,7 @@ pub struct ToDeviceKeyVerificationCancelEventContent {
impl ToDeviceKeyVerificationCancelEventContent { impl ToDeviceKeyVerificationCancelEventContent {
/// Creates a new `ToDeviceKeyVerificationCancelEventContent` with the given transaction ID, /// Creates a new `ToDeviceKeyVerificationCancelEventContent` with the given transaction ID,
/// reason and code. /// reason and code.
pub fn new(transaction_id: Box<TransactionId>, reason: String, code: CancelCode) -> Self { pub fn new(transaction_id: OwnedTransactionId, reason: String, code: CancelCode) -> Self {
Self { transaction_id, reason, code } Self { transaction_id, reason, code }
} }
} }

View File

@ -6,7 +6,7 @@ use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use super::Relation; use super::Relation;
use crate::TransactionId; use crate::OwnedTransactionId;
/// The content of a to-device `m.m.key.verification.done` event. /// The content of a to-device `m.m.key.verification.done` event.
/// ///
@ -18,12 +18,12 @@ pub struct ToDeviceKeyVerificationDoneEventContent {
/// An opaque identifier for the verification process. /// An opaque identifier for the verification process.
/// ///
/// Must be the same as the one used for the `m.key.verification.start` message. /// Must be the same as the one used for the `m.key.verification.start` message.
pub transaction_id: Box<TransactionId>, pub transaction_id: OwnedTransactionId,
} }
impl ToDeviceKeyVerificationDoneEventContent { impl ToDeviceKeyVerificationDoneEventContent {
/// Creates a new `ToDeviceKeyVerificationDoneEventContent` with the given transaction ID. /// Creates a new `ToDeviceKeyVerificationDoneEventContent` with the given transaction ID.
pub fn new(transaction_id: Box<TransactionId>) -> Self { pub fn new(transaction_id: OwnedTransactionId) -> Self {
Self { transaction_id } Self { transaction_id }
} }
} }

View File

@ -6,7 +6,7 @@ use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use super::Relation; use super::Relation;
use crate::{serde::Base64, TransactionId}; use crate::{serde::Base64, OwnedTransactionId};
/// The content of a to-device `m.key.verification.key` event. /// The content of a to-device `m.key.verification.key` event.
/// ///
@ -18,7 +18,7 @@ pub struct ToDeviceKeyVerificationKeyEventContent {
/// An opaque identifier for the verification process. /// An opaque identifier for the verification process.
/// ///
/// Must be the same as the one used for the `m.key.verification.start` message. /// Must be the same as the one used for the `m.key.verification.start` message.
pub transaction_id: Box<TransactionId>, pub transaction_id: OwnedTransactionId,
/// The device's ephemeral public key, encoded as unpadded base64. /// The device's ephemeral public key, encoded as unpadded base64.
pub key: Base64, pub key: Base64,
@ -27,7 +27,7 @@ pub struct ToDeviceKeyVerificationKeyEventContent {
impl ToDeviceKeyVerificationKeyEventContent { impl ToDeviceKeyVerificationKeyEventContent {
/// Creates a new `ToDeviceKeyVerificationKeyEventContent` with the given transaction ID and /// Creates a new `ToDeviceKeyVerificationKeyEventContent` with the given transaction ID and
/// key. /// key.
pub fn new(transaction_id: Box<TransactionId>, key: Base64) -> Self { pub fn new(transaction_id: OwnedTransactionId, key: Base64) -> Self {
Self { transaction_id, key } Self { transaction_id, key }
} }
} }

View File

@ -8,7 +8,7 @@ use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use super::Relation; use super::Relation;
use crate::{serde::Base64, TransactionId}; use crate::{serde::Base64, OwnedTransactionId};
/// The content of a to-device `m.key.verification.` event. /// The content of a to-device `m.key.verification.` event.
/// ///
@ -20,7 +20,7 @@ pub struct ToDeviceKeyVerificationMacEventContent {
/// An opaque identifier for the verification process. /// An opaque identifier for the verification process.
/// ///
/// Must be the same as the one used for the `m.key.verification.start` message. /// Must be the same as the one used for the `m.key.verification.start` message.
pub transaction_id: Box<TransactionId>, pub transaction_id: OwnedTransactionId,
/// A map of the key ID to the MAC of the key, using the algorithm in the verification process. /// A map of the key ID to the MAC of the key, using the algorithm in the verification process.
/// ///
@ -36,7 +36,7 @@ impl ToDeviceKeyVerificationMacEventContent {
/// Creates a new `ToDeviceKeyVerificationMacEventContent` with the given transaction ID, key ID /// Creates a new `ToDeviceKeyVerificationMacEventContent` with the given transaction ID, key ID
/// to MAC map and key MAC. /// to MAC map and key MAC.
pub fn new( pub fn new(
transaction_id: Box<TransactionId>, transaction_id: OwnedTransactionId,
mac: BTreeMap<String, Base64>, mac: BTreeMap<String, Base64>,
keys: Base64, keys: Base64,
) -> Self { ) -> Self {

View File

@ -6,7 +6,7 @@ use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use super::{Relation, VerificationMethod}; use super::{Relation, VerificationMethod};
use crate::{DeviceId, TransactionId}; use crate::{OwnedDeviceId, OwnedTransactionId};
/// The content of a to-device `m.m.key.verification.ready` event. /// The content of a to-device `m.m.key.verification.ready` event.
/// ///
@ -16,7 +16,7 @@ use crate::{DeviceId, TransactionId};
#[ruma_event(type = "m.key.verification.ready", kind = ToDevice)] #[ruma_event(type = "m.key.verification.ready", kind = ToDevice)]
pub struct ToDeviceKeyVerificationReadyEventContent { pub struct ToDeviceKeyVerificationReadyEventContent {
/// The device ID which is initiating the request. /// The device ID which is initiating the request.
pub from_device: Box<DeviceId>, pub from_device: OwnedDeviceId,
/// The verification methods supported by the sender. /// The verification methods supported by the sender.
pub methods: Vec<VerificationMethod>, pub methods: Vec<VerificationMethod>,
@ -26,16 +26,16 @@ pub struct ToDeviceKeyVerificationReadyEventContent {
/// Must be unique with respect to the devices involved. Must be the same as the /// Must be unique with respect to the devices involved. Must be the same as the
/// `transaction_id` given in the `m.key.verification.request` from a /// `transaction_id` given in the `m.key.verification.request` from a
/// request. /// request.
pub transaction_id: Box<TransactionId>, pub transaction_id: OwnedTransactionId,
} }
impl ToDeviceKeyVerificationReadyEventContent { impl ToDeviceKeyVerificationReadyEventContent {
/// Creates a new `ToDeviceKeyVerificationReadyEventContent` with the given device ID, /// Creates a new `ToDeviceKeyVerificationReadyEventContent` with the given device ID,
/// verification methods and transaction ID. /// verification methods and transaction ID.
pub fn new( pub fn new(
from_device: Box<DeviceId>, from_device: OwnedDeviceId,
methods: Vec<VerificationMethod>, methods: Vec<VerificationMethod>,
transaction_id: Box<TransactionId>, transaction_id: OwnedTransactionId,
) -> Self { ) -> Self {
Self { from_device, methods, transaction_id } Self { from_device, methods, transaction_id }
} }
@ -49,7 +49,7 @@ impl ToDeviceKeyVerificationReadyEventContent {
#[ruma_event(type = "m.key.verification.ready", kind = MessageLike)] #[ruma_event(type = "m.key.verification.ready", kind = MessageLike)]
pub struct KeyVerificationReadyEventContent { pub struct KeyVerificationReadyEventContent {
/// The device ID which is initiating the request. /// The device ID which is initiating the request.
pub from_device: Box<DeviceId>, pub from_device: OwnedDeviceId,
/// The verification methods supported by the sender. /// The verification methods supported by the sender.
pub methods: Vec<VerificationMethod>, pub methods: Vec<VerificationMethod>,
@ -64,7 +64,7 @@ impl KeyVerificationReadyEventContent {
/// Creates a new `KeyVerificationReadyEventContent` with the given device ID, methods and /// Creates a new `KeyVerificationReadyEventContent` with the given device ID, methods and
/// relation. /// relation.
pub fn new( pub fn new(
from_device: Box<DeviceId>, from_device: OwnedDeviceId,
methods: Vec<VerificationMethod>, methods: Vec<VerificationMethod>,
relates_to: Relation, relates_to: Relation,
) -> Self { ) -> Self {
@ -74,7 +74,7 @@ impl KeyVerificationReadyEventContent {
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use crate::{event_id, DeviceId}; use crate::{event_id, OwnedDeviceId};
use matches::assert_matches; use matches::assert_matches;
use serde_json::{from_value as from_json_value, json, to_value as to_json_value}; use serde_json::{from_value as from_json_value, json, to_value as to_json_value};
@ -84,7 +84,7 @@ mod tests {
#[test] #[test]
fn serialization() { fn serialization() {
let event_id = event_id!("$1598361704261elfgc:localhost").to_owned(); let event_id = event_id!("$1598361704261elfgc:localhost").to_owned();
let device: Box<DeviceId> = "123".into(); let device: OwnedDeviceId = "123".into();
let json_data = json!({ let json_data = json!({
"from_device": device, "from_device": device,
@ -121,7 +121,7 @@ mod tests {
#[test] #[test]
fn deserialization() { fn deserialization() {
let id = event_id!("$1598361704261elfgc:localhost"); let id = event_id!("$1598361704261elfgc:localhost");
let device: Box<DeviceId> = "123".into(); let device: OwnedDeviceId = "123".into();
let json_data = json!({ let json_data = json!({
"from_device": device, "from_device": device,

View File

@ -6,7 +6,7 @@ use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use super::VerificationMethod; use super::VerificationMethod;
use crate::{DeviceId, MilliSecondsSinceUnixEpoch, TransactionId}; use crate::{MilliSecondsSinceUnixEpoch, OwnedDeviceId, OwnedTransactionId};
/// The content of an `m.key.verification.request` event. /// The content of an `m.key.verification.request` event.
#[derive(Clone, Debug, Deserialize, Serialize, EventContent)] #[derive(Clone, Debug, Deserialize, Serialize, EventContent)]
@ -14,12 +14,12 @@ use crate::{DeviceId, MilliSecondsSinceUnixEpoch, TransactionId};
#[ruma_event(type = "m.key.verification.request", kind = ToDevice)] #[ruma_event(type = "m.key.verification.request", kind = ToDevice)]
pub struct ToDeviceKeyVerificationRequestEventContent { pub struct ToDeviceKeyVerificationRequestEventContent {
/// The device ID which is initiating the request. /// The device ID which is initiating the request.
pub from_device: Box<DeviceId>, pub from_device: OwnedDeviceId,
/// An opaque identifier for the verification request. /// An opaque identifier for the verification request.
/// ///
/// Must be unique with respect to the devices involved. /// Must be unique with respect to the devices involved.
pub transaction_id: Box<TransactionId>, pub transaction_id: OwnedTransactionId,
/// The verification methods supported by the sender. /// The verification methods supported by the sender.
pub methods: Vec<VerificationMethod>, pub methods: Vec<VerificationMethod>,
@ -35,8 +35,8 @@ impl ToDeviceKeyVerificationRequestEventContent {
/// Creates a new `ToDeviceKeyVerificationRequestEventContent` with the given device ID, /// Creates a new `ToDeviceKeyVerificationRequestEventContent` with the given device ID,
/// transaction ID, methods and timestamp. /// transaction ID, methods and timestamp.
pub fn new( pub fn new(
from_device: Box<DeviceId>, from_device: OwnedDeviceId,
transaction_id: Box<TransactionId>, transaction_id: OwnedTransactionId,
methods: Vec<VerificationMethod>, methods: Vec<VerificationMethod>,
timestamp: MilliSecondsSinceUnixEpoch, timestamp: MilliSecondsSinceUnixEpoch,
) -> Self { ) -> Self {

View File

@ -12,7 +12,7 @@ use super::{
HashAlgorithm, KeyAgreementProtocol, MessageAuthenticationCode, Relation, HashAlgorithm, KeyAgreementProtocol, MessageAuthenticationCode, Relation,
ShortAuthenticationString, ShortAuthenticationString,
}; };
use crate::{serde::Base64, DeviceId, TransactionId}; use crate::{serde::Base64, OwnedDeviceId, OwnedTransactionId};
/// The content of a to-device `m.key.verification.start` event. /// The content of a to-device `m.key.verification.start` event.
/// ///
@ -22,14 +22,14 @@ use crate::{serde::Base64, DeviceId, TransactionId};
#[ruma_event(type = "m.key.verification.start", kind = ToDevice)] #[ruma_event(type = "m.key.verification.start", kind = ToDevice)]
pub struct ToDeviceKeyVerificationStartEventContent { pub struct ToDeviceKeyVerificationStartEventContent {
/// The device ID which is initiating the process. /// The device ID which is initiating the process.
pub from_device: Box<DeviceId>, pub from_device: OwnedDeviceId,
/// An opaque identifier for the verification process. /// An opaque identifier for the verification process.
/// ///
/// Must be unique with respect to the devices involved. Must be the same as the /// Must be unique with respect to the devices involved. Must be the same as the
/// `transaction_id` given in the `m.key.verification.request` if this process is originating /// `transaction_id` given in the `m.key.verification.request` if this process is originating
/// from a request. /// from a request.
pub transaction_id: Box<TransactionId>, pub transaction_id: OwnedTransactionId,
/// Method specific content. /// Method specific content.
#[serde(flatten)] #[serde(flatten)]
@ -40,8 +40,8 @@ impl ToDeviceKeyVerificationStartEventContent {
/// Creates a new `ToDeviceKeyVerificationStartEventContent` with the given device ID, /// Creates a new `ToDeviceKeyVerificationStartEventContent` with the given device ID,
/// transaction ID and method specific content. /// transaction ID and method specific content.
pub fn new( pub fn new(
from_device: Box<DeviceId>, from_device: OwnedDeviceId,
transaction_id: Box<TransactionId>, transaction_id: OwnedTransactionId,
method: StartMethod, method: StartMethod,
) -> Self { ) -> Self {
Self { from_device, transaction_id, method } Self { from_device, transaction_id, method }
@ -56,7 +56,7 @@ impl ToDeviceKeyVerificationStartEventContent {
#[ruma_event(type = "m.key.verification.start", kind = MessageLike)] #[ruma_event(type = "m.key.verification.start", kind = MessageLike)]
pub struct KeyVerificationStartEventContent { pub struct KeyVerificationStartEventContent {
/// The device ID which is initiating the process. /// The device ID which is initiating the process.
pub from_device: Box<DeviceId>, pub from_device: OwnedDeviceId,
/// Method specific content. /// Method specific content.
#[serde(flatten)] #[serde(flatten)]
@ -70,7 +70,7 @@ pub struct KeyVerificationStartEventContent {
impl KeyVerificationStartEventContent { impl KeyVerificationStartEventContent {
/// Creates a new `KeyVerificationStartEventContent` with the given device ID, method and /// Creates a new `KeyVerificationStartEventContent` with the given device ID, method and
/// relation. /// relation.
pub fn new(from_device: Box<DeviceId>, method: StartMethod, relates_to: Relation) -> Self { pub fn new(from_device: OwnedDeviceId, method: StartMethod, relates_to: Relation) -> Self {
Self { from_device, method, relates_to } Self { from_device, method, relates_to }
} }
} }

View File

@ -3,7 +3,7 @@
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::EventId; use crate::OwnedEventId;
/// The payload for a `m.reaction` event. /// The payload for a `m.reaction` event.
/// ///
@ -38,7 +38,7 @@ impl From<Relation> for ReactionEventContent {
#[serde(tag = "rel_type", rename = "m.annotation")] #[serde(tag = "rel_type", rename = "m.annotation")]
pub struct Relation { pub struct Relation {
/// The event that is being annotated. /// The event that is being annotated.
pub event_id: Box<EventId>, pub event_id: OwnedEventId,
/// A string that indicates the annotation being applied. /// A string that indicates the annotation being applied.
/// ///
@ -51,7 +51,7 @@ pub struct Relation {
impl Relation { impl Relation {
/// Creates a new `Relation` with the given event ID and key. /// Creates a new `Relation` with the given event ID and key.
pub fn new(event_id: Box<EventId>, key: String) -> Self { pub fn new(event_id: OwnedEventId, key: String) -> Self {
Self { event_id, key } Self { event_id, key }
} }
} }

View File

@ -6,7 +6,7 @@ use js_int::UInt;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use super::AnySyncMessageLikeEvent; use super::AnySyncMessageLikeEvent;
use crate::{serde::Raw, EventId, MilliSecondsSinceUnixEpoch, UserId}; use crate::{serde::Raw, MilliSecondsSinceUnixEpoch, OwnedEventId, OwnedUserId};
/// Summary of all reactions with the given key to an event. /// Summary of all reactions with the given key to an event.
#[derive(Clone, Debug, Default, Deserialize, PartialEq, Eq, Serialize)] #[derive(Clone, Debug, Default, Deserialize, PartialEq, Eq, Serialize)]
@ -74,10 +74,10 @@ impl AnnotationChunk {
#[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)]
pub struct BundledReplacement { pub struct BundledReplacement {
/// The ID of the replacing event. /// The ID of the replacing event.
pub event_id: Box<EventId>, pub event_id: OwnedEventId,
/// The user ID of the sender of the latest replacement. /// The user ID of the sender of the latest replacement.
pub sender: Box<UserId>, pub sender: OwnedUserId,
/// Timestamp in milliseconds on originating homeserver when the latest replacement was sent. /// Timestamp in milliseconds on originating homeserver when the latest replacement was sent.
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
@ -87,7 +87,7 @@ pub struct BundledReplacement {
#[cfg(feature = "unstable-msc2676")] #[cfg(feature = "unstable-msc2676")]
impl BundledReplacement { impl BundledReplacement {
/// Creates a new `BundledReplacement` with the given event ID and sender. /// Creates a new `BundledReplacement` with the given event ID and sender.
pub fn new(event_id: Box<EventId>, sender: Box<UserId>) -> Self { pub fn new(event_id: OwnedEventId, sender: OwnedUserId) -> Self {
Self { event_id, sender, origin_server_ts: None } Self { event_id, sender, origin_server_ts: None }
} }
} }

View File

@ -5,7 +5,7 @@
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::{OwnedRoomAliasId, RoomAliasId}; use crate::OwnedRoomAliasId;
/// The content of an `m.room.canonical_alias` event. /// The content of an `m.room.canonical_alias` event.
/// ///
@ -27,7 +27,7 @@ pub struct RoomCanonicalAliasEventContent {
/// List of alternative aliases to the room. /// List of alternative aliases to the room.
#[serde(default, skip_serializing_if = "Vec::is_empty")] #[serde(default, skip_serializing_if = "Vec::is_empty")]
pub alt_aliases: Vec<Box<RoomAliasId>>, pub alt_aliases: Vec<OwnedRoomAliasId>,
} }
impl RoomCanonicalAliasEventContent { impl RoomCanonicalAliasEventContent {

View File

@ -5,7 +5,7 @@
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::{room::RoomType, EventId, OwnedUserId, RoomId, RoomVersionId}; use crate::{room::RoomType, OwnedEventId, OwnedRoomId, OwnedUserId, RoomVersionId};
/// The content of an `m.room.create` event. /// The content of an `m.room.create` event.
/// ///
@ -65,15 +65,15 @@ impl RoomCreateEventContent {
#[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)]
pub struct PreviousRoom { pub struct PreviousRoom {
/// The ID of the old room. /// The ID of the old room.
pub room_id: Box<RoomId>, pub room_id: OwnedRoomId,
/// The event ID of the last known event in the old room. /// The event ID of the last known event in the old room.
pub event_id: Box<EventId>, pub event_id: OwnedEventId,
} }
impl PreviousRoom { impl PreviousRoom {
/// Creates a new `PreviousRoom` from the given room and event IDs. /// Creates a new `PreviousRoom` from the given room and event IDs.
pub fn new(room_id: Box<RoomId>, event_id: Box<EventId>) -> Self { pub fn new(room_id: OwnedRoomId, event_id: OwnedEventId) -> Self {
Self { room_id, event_id } Self { room_id, event_id }
} }
} }

View File

@ -9,9 +9,7 @@ use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use super::message::{self, InReplyTo}; use super::message::{self, InReplyTo};
#[cfg(feature = "unstable-msc2677")] use crate::{OwnedDeviceId, OwnedEventId};
use crate::EventId;
use crate::{DeviceId, OwnedEventId};
mod relation_serde; mod relation_serde;
@ -164,7 +162,7 @@ impl Reference {
#[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)]
pub struct Annotation { pub struct Annotation {
/// The event that is being annotated. /// The event that is being annotated.
pub event_id: Box<EventId>, pub event_id: OwnedEventId,
/// The annotation. /// The annotation.
pub key: String, pub key: String,
@ -173,7 +171,7 @@ pub struct Annotation {
#[cfg(feature = "unstable-msc2677")] #[cfg(feature = "unstable-msc2677")]
impl Annotation { impl Annotation {
/// Creates a new `Annotation` with the given event ID and key. /// Creates a new `Annotation` with the given event ID and key.
pub fn new(event_id: Box<EventId>, key: String) -> Self { pub fn new(event_id: OwnedEventId, key: String) -> Self {
Self { event_id, key } Self { event_id, key }
} }
} }
@ -269,7 +267,7 @@ pub struct MegolmV1AesSha2Content {
pub sender_key: String, pub sender_key: String,
/// The ID of the sending device. /// The ID of the sending device.
pub device_id: Box<DeviceId>, pub device_id: OwnedDeviceId,
/// The ID of the session used to encrypt the message. /// The ID of the session used to encrypt the message.
pub session_id: String, pub session_id: String,
@ -289,7 +287,7 @@ pub struct MegolmV1AesSha2ContentInit {
pub sender_key: String, pub sender_key: String,
/// The ID of the sending device. /// The ID of the sending device.
pub device_id: Box<DeviceId>, pub device_id: OwnedDeviceId,
/// The ID of the session used to encrypt the message. /// The ID of the session used to encrypt the message.
pub session_id: String, pub session_id: String,

View File

@ -248,7 +248,7 @@ pub struct SignedContent {
/// The invited Matrix user ID. /// The invited Matrix user ID.
/// ///
/// Must be equal to the user_id property of the event. /// Must be equal to the user_id property of the event.
pub mxid: Box<UserId>, pub mxid: OwnedUserId,
/// A single signature from the verifying server, in the format specified by the Signing Events /// A single signature from the verifying server, in the format specified by the Signing Events
/// section of the server-server API. /// section of the server-server API.
@ -261,8 +261,8 @@ pub struct SignedContent {
impl SignedContent { impl SignedContent {
/// Creates a new `SignedContent` with the given mxid, signature and token. /// Creates a new `SignedContent` with the given mxid, signature and token.
pub fn new( pub fn new(
mxid: Box<UserId>,
signatures: BTreeMap<OwnedServerName, BTreeMap<OwnedServerSigningKeyId, String>>, signatures: BTreeMap<OwnedServerName, BTreeMap<OwnedServerSigningKeyId, String>>,
mxid: OwnedUserId,
token: String, token: String,
) -> Self { ) -> Self {
Self { mxid, signatures, token } Self { mxid, signatures, token }

View File

@ -29,7 +29,7 @@ use crate::events::{
use crate::{ use crate::{
events::key::verification::VerificationMethod, events::key::verification::VerificationMethod,
serde::{JsonObject, StringEnum}, serde::{JsonObject, StringEnum},
DeviceId, OwnedEventId, OwnedMxcUri, OwnedUserId, PrivOwnedStr, OwnedDeviceId, OwnedEventId, OwnedMxcUri, OwnedUserId, PrivOwnedStr,
}; };
#[cfg(feature = "unstable-msc3488")] #[cfg(feature = "unstable-msc3488")]
use crate::{ use crate::{
@ -1906,7 +1906,7 @@ pub struct KeyVerificationRequestEventContent {
pub methods: Vec<VerificationMethod>, pub methods: Vec<VerificationMethod>,
/// The device ID which is initiating the request. /// The device ID which is initiating the request.
pub from_device: Box<DeviceId>, pub from_device: OwnedDeviceId,
/// The user ID which should receive the request. /// The user ID which should receive the request.
/// ///
@ -1922,7 +1922,7 @@ impl KeyVerificationRequestEventContent {
pub fn new( pub fn new(
body: String, body: String,
methods: Vec<VerificationMethod>, methods: Vec<VerificationMethod>,
from_device: Box<DeviceId>, from_device: OwnedDeviceId,
to: OwnedUserId, to: OwnedUserId,
) -> Self { ) -> Self {
Self { body, methods, from_device, to } Self { body, methods, from_device, to }

View File

@ -5,7 +5,7 @@
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::{serde::StringEnum, EventId, PrivOwnedStr}; use crate::{serde::StringEnum, OwnedEventId, PrivOwnedStr};
/// The content of an `m.room.message.feedback` event. /// The content of an `m.room.message.feedback` event.
/// ///
@ -18,7 +18,7 @@ use crate::{serde::StringEnum, EventId, PrivOwnedStr};
#[ruma_event(type = "m.room.message.feedback", kind = MessageLike)] #[ruma_event(type = "m.room.message.feedback", kind = MessageLike)]
pub struct RoomMessageFeedbackEventContent { pub struct RoomMessageFeedbackEventContent {
/// The event that this feedback is related to. /// The event that this feedback is related to.
pub target_event_id: Box<EventId>, pub target_event_id: OwnedEventId,
/// The type of feedback. /// The type of feedback.
#[serde(rename = "type")] #[serde(rename = "type")]
@ -27,7 +27,7 @@ pub struct RoomMessageFeedbackEventContent {
impl RoomMessageFeedbackEventContent { impl RoomMessageFeedbackEventContent {
/// Create a `RoomMessageFeedbackEventContent` from the given target event id and feedback type. /// Create a `RoomMessageFeedbackEventContent` from the given target event id and feedback type.
pub fn new(target_event_id: Box<EventId>, feedback_type: FeedbackType) -> Self { pub fn new(target_event_id: OwnedEventId, feedback_type: FeedbackType) -> Self {
Self { target_event_id, feedback_type } Self { target_event_id, feedback_type }
} }
} }

View File

@ -5,7 +5,7 @@
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::RoomId; use crate::OwnedRoomId;
/// The content of an `m.room.tombstone` event. /// The content of an `m.room.tombstone` event.
/// ///
@ -23,12 +23,12 @@ pub struct RoomTombstoneEventContent {
pub body: String, pub body: String,
/// The new room the client should be visiting. /// The new room the client should be visiting.
pub replacement_room: Box<RoomId>, pub replacement_room: OwnedRoomId,
} }
impl RoomTombstoneEventContent { impl RoomTombstoneEventContent {
/// Creates a new `RoomTombstoneEventContent` with the given body and replacement room ID. /// Creates a new `RoomTombstoneEventContent` with the given body and replacement room ID.
pub fn new(body: String, replacement_room: Box<RoomId>) -> Self { pub fn new(body: String, replacement_room: OwnedRoomId) -> Self {
Self { body, replacement_room } Self { body, replacement_room }
} }
} }

View File

@ -6,7 +6,8 @@ use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::{ use crate::{
serde::StringEnum, DeviceId, EventEncryptionAlgorithm, PrivOwnedStr, RoomId, TransactionId, serde::StringEnum, EventEncryptionAlgorithm, OwnedDeviceId, OwnedRoomId, OwnedTransactionId,
PrivOwnedStr,
}; };
/// The content of an `m.room_key_request` event. /// The content of an `m.room_key_request` event.
@ -23,13 +24,13 @@ pub struct ToDeviceRoomKeyRequestEventContent {
pub body: Option<RequestedKeyInfo>, pub body: Option<RequestedKeyInfo>,
/// ID of the device requesting the key. /// ID of the device requesting the key.
pub requesting_device_id: Box<DeviceId>, pub requesting_device_id: OwnedDeviceId,
/// A random string uniquely identifying the request for a key. /// A random string uniquely identifying the request for a key.
/// ///
/// If the key is requested multiple times, it should be reused. It should also reused /// If the key is requested multiple times, it should be reused. It should also reused
/// in order to cancel a request. /// in order to cancel a request.
pub request_id: Box<TransactionId>, pub request_id: OwnedTransactionId,
} }
impl ToDeviceRoomKeyRequestEventContent { impl ToDeviceRoomKeyRequestEventContent {
@ -38,8 +39,8 @@ impl ToDeviceRoomKeyRequestEventContent {
pub fn new( pub fn new(
action: Action, action: Action,
body: Option<RequestedKeyInfo>, body: Option<RequestedKeyInfo>,
requesting_device_id: Box<DeviceId>, requesting_device_id: OwnedDeviceId,
request_id: Box<TransactionId>, request_id: OwnedTransactionId,
) -> Self { ) -> Self {
Self { action, body, requesting_device_id, request_id } Self { action, body, requesting_device_id, request_id }
} }
@ -77,7 +78,7 @@ pub struct RequestedKeyInfo {
pub algorithm: EventEncryptionAlgorithm, pub algorithm: EventEncryptionAlgorithm,
/// The room where the key is used. /// The room where the key is used.
pub room_id: Box<RoomId>, pub room_id: OwnedRoomId,
/// The Curve25519 key of the device which initiated the session originally. /// The Curve25519 key of the device which initiated the session originally.
pub sender_key: String, pub sender_key: String,
@ -91,7 +92,7 @@ impl RequestedKeyInfo {
/// ID. /// ID.
pub fn new( pub fn new(
algorithm: EventEncryptionAlgorithm, algorithm: EventEncryptionAlgorithm,
room_id: Box<RoomId>, room_id: OwnedRoomId,
sender_key: String, sender_key: String,
session_id: String, session_id: String,
) -> Self { ) -> Self {

View File

@ -7,7 +7,7 @@ use std::convert::TryFrom;
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{ser::SerializeStruct, Deserialize, Serialize}; use serde::{ser::SerializeStruct, Deserialize, Serialize};
use crate::{serde::StringEnum, DeviceId, PrivOwnedStr, TransactionId}; use crate::{serde::StringEnum, OwnedDeviceId, OwnedTransactionId, PrivOwnedStr};
/// The content of an `m.secret.request` event. /// The content of an `m.secret.request` event.
/// ///
@ -23,14 +23,14 @@ pub struct ToDeviceSecretRequestEventContent {
pub action: RequestAction, pub action: RequestAction,
/// The ID of the device requesting the event. /// The ID of the device requesting the event.
pub requesting_device_id: Box<DeviceId>, pub requesting_device_id: OwnedDeviceId,
/// A random string uniquely identifying (with respect to the requester and the target) the /// A random string uniquely identifying (with respect to the requester and the target) the
/// target for a secret. /// target for a secret.
/// ///
/// If the secret is requested from multiple devices at the same time, the same ID may be used /// If the secret is requested from multiple devices at the same time, the same ID may be used
/// for every target. The same ID is also used in order to cancel a previous request. /// for every target. The same ID is also used in order to cancel a previous request.
pub request_id: Box<TransactionId>, pub request_id: OwnedTransactionId,
} }
impl ToDeviceSecretRequestEventContent { impl ToDeviceSecretRequestEventContent {
@ -38,8 +38,8 @@ impl ToDeviceSecretRequestEventContent {
/// request ID. /// request ID.
pub fn new( pub fn new(
action: RequestAction, action: RequestAction,
requesting_device_id: Box<DeviceId>, requesting_device_id: OwnedDeviceId,
request_id: Box<TransactionId>, request_id: OwnedTransactionId,
) -> Self { ) -> Self {
Self { action, requesting_device_id, request_id } Self { action, requesting_device_id, request_id }
} }

View File

@ -5,7 +5,7 @@
use ruma_macros::EventContent; use ruma_macros::EventContent;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::TransactionId; use crate::OwnedTransactionId;
/// The content of an `m.secret.send` event. /// The content of an `m.secret.send` event.
/// ///
@ -18,7 +18,7 @@ use crate::TransactionId;
#[ruma_event(type = "m.secret.send", kind = ToDevice)] #[ruma_event(type = "m.secret.send", kind = ToDevice)]
pub struct ToDeviceSecretSendEventContent { pub struct ToDeviceSecretSendEventContent {
/// The ID of the request that this is a response to. /// The ID of the request that this is a response to.
pub request_id: Box<TransactionId>, pub request_id: OwnedTransactionId,
/// The contents of the secret. /// The contents of the secret.
pub secret: String, pub secret: String,
@ -26,7 +26,7 @@ pub struct ToDeviceSecretSendEventContent {
impl ToDeviceSecretSendEventContent { impl ToDeviceSecretSendEventContent {
/// Creates a new `SecretSendEventContent` with the given request ID and secret. /// Creates a new `SecretSendEventContent` with the given request ID and secret.
pub fn new(request_id: Box<TransactionId>, secret: String) -> Self { pub fn new(request_id: OwnedTransactionId, secret: String) -> Self {
Self { request_id, secret } Self { request_id, secret }
} }
} }

View File

@ -5,7 +5,7 @@ use serde_json::{from_str as from_json_str, value::RawValue as RawJsonValue};
#[cfg(feature = "unstable-msc2675")] #[cfg(feature = "unstable-msc2675")]
use super::relation::Relations; use super::relation::Relations;
use super::{room::redaction::SyncRoomRedactionEvent, StateEventContent}; use super::{room::redaction::SyncRoomRedactionEvent, StateEventContent};
use crate::{serde::Raw, TransactionId}; use crate::{serde::Raw, OwnedTransactionId};
/// Extra information about a message event that is not incorporated into the event's hash. /// Extra information about a message event that is not incorporated into the event's hash.
#[derive(Clone, Debug, Default, Deserialize, Serialize)] #[derive(Clone, Debug, Default, Deserialize, Serialize)]
@ -22,7 +22,7 @@ pub struct MessageLikeUnsigned {
/// The client-supplied transaction ID, if the client being given the event is the same one /// The client-supplied transaction ID, if the client being given the event is the same one
/// which sent it. /// which sent it.
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
pub transaction_id: Option<Box<TransactionId>>, pub transaction_id: Option<OwnedTransactionId>,
/// Server-compiled information from other events relating to this event. /// Server-compiled information from other events relating to this event.
#[cfg(feature = "unstable-msc2675")] #[cfg(feature = "unstable-msc2675")]
@ -69,7 +69,7 @@ pub struct StateUnsigned<C: StateEventContent> {
/// The client-supplied transaction ID, if the client being given the event is the same one /// The client-supplied transaction ID, if the client being given the event is the same one
/// which sent it. /// which sent it.
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
pub transaction_id: Option<Box<TransactionId>>, pub transaction_id: Option<OwnedTransactionId>,
/// Optional previous content of the event. /// Optional previous content of the event.
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
@ -126,7 +126,7 @@ impl<C: StateEventContent> StateUnsigned<C> {
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
age: Option<Int>, age: Option<Int>,
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
transaction_id: Option<Box<TransactionId>>, transaction_id: Option<OwnedTransactionId>,
prev_content: Option<Raw<C>>, prev_content: Option<Raw<C>>,
#[cfg(feature = "unstable-msc2675")] #[cfg(feature = "unstable-msc2675")]
#[serde(rename = "m.relations", skip_serializing_if = "Option::is_none")] #[serde(rename = "m.relations", skip_serializing_if = "Option::is_none")]

View File

@ -21,7 +21,7 @@ use ruma_common::{
}, },
MessageLikeUnsigned, MessageLikeUnsigned,
}, },
mxc_uri, room_id, user_id, DeviceId, MilliSecondsSinceUnixEpoch, mxc_uri, room_id, user_id, MilliSecondsSinceUnixEpoch, OwnedDeviceId,
}; };
use serde_json::{from_value as from_json_value, json, to_value as to_json_value}; use serde_json::{from_value as from_json_value, json, to_value as to_json_value};
@ -414,7 +414,7 @@ fn edit_deserialization_future() {
#[test] #[test]
fn verification_request_deserialization() { fn verification_request_deserialization() {
let user_id = user_id!("@example2:localhost"); let user_id = user_id!("@example2:localhost");
let device_id: Box<DeviceId> = "XOWLHHFSWM".into(); let device_id: OwnedDeviceId = "XOWLHHFSWM".into();
let json_data = json!({ let json_data = json!({
"body": "@example:localhost is requesting to verify your key, ...", "body": "@example:localhost is requesting to verify your key, ...",
@ -449,7 +449,7 @@ fn verification_request_deserialization() {
#[test] #[test]
fn verification_request_serialization() { fn verification_request_serialization() {
let user_id = user_id!("@example2:localhost").to_owned(); let user_id = user_id!("@example2:localhost").to_owned();
let device_id: Box<DeviceId> = "XOWLHHFSWM".into(); let device_id: OwnedDeviceId = "XOWLHHFSWM".into();
let body = "@example:localhost is requesting to verify your key, ...".to_owned(); let body = "@example:localhost is requesting to verify your key, ...".to_owned();
let methods = let methods =