#![doc(html_favicon_url = "https://www.ruma.io/favicon.ico")] #![doc(html_logo_url = "https://www.ruma.io/images/logo.png")] //! Types for [Matrix](https://matrix.org/) identifiers for devices, events, keys, rooms, servers, //! users and URIs. #![warn(missing_docs)] // FIXME: Remove once lint doesn't trigger on std::convert::TryFrom in macros.rs anymore #![allow(unused_qualifications)] #![cfg_attr(docsrs, feature(doc_cfg))] // Renamed in `Cargo.toml` so we can have a serde feature. // Rename it back here because `serde1` is ugly. #[cfg(feature = "serde")] extern crate serde1 as serde; #[cfg(feature = "serde")] use std::convert::TryFrom; #[cfg(feature = "serde")] use serde::de::{self, Deserializer, Unexpected}; #[doc(inline)] pub use crate::{ crypto_algorithms::{DeviceKeyAlgorithm, EventEncryptionAlgorithm, SigningKeyAlgorithm}, device_key_id::DeviceKeyId, event_id::EventId, key_id::{DeviceSigningKeyId, KeyId, ServerSigningKeyId, SigningKeyId}, mxc_uri::MxcUri, opaque_ids::{DeviceId, DeviceIdBox, KeyName, KeyNameBox}, room_alias_id::RoomAliasId, room_id::RoomId, room_id_or_room_alias_id::RoomIdOrAliasId, room_version_id::RoomVersionId, server_name::{ServerName, ServerNameBox}, signatures::{DeviceSignatures, EntitySignatures, ServerSignatures, Signatures}, user_id::UserId, }; #[doc(inline)] pub use ruma_identifiers_validation::error::Error; #[macro_use] mod macros; pub mod user_id; mod crypto_algorithms; mod device_key_id; mod event_id; mod key_id; mod mxc_uri; mod opaque_ids; mod room_alias_id; mod room_id; mod room_id_or_room_alias_id; mod room_version_id; mod server_name; mod signatures; /// Check whether a given string is a valid server name according to [the specification][]. /// /// [the specification]: https://matrix.org/docs/spec/appendices#server-name #[deprecated = "Use the [`ServerName`](server_name/struct.ServerName.html) type instead."] pub fn is_valid_server_name(name: &str) -> bool { <&ServerName>::try_from(name).is_ok() } /// Generates a random identifier localpart. #[cfg(feature = "rand")] fn generate_localpart(length: usize) -> Box { use rand::Rng as _; rand::thread_rng() .sample_iter(&rand::distributions::Alphanumeric) .map(char::from) .take(length) .collect::() .into_boxed_str() } /// Deserializes any type of id using the provided TryFrom implementation. /// /// This is a helper function to reduce the boilerplate of the Deserialize implementations. #[cfg(feature = "serde")] fn deserialize_id<'de, D, T>(deserializer: D, expected_str: &str) -> Result where D: Deserializer<'de>, T: for<'a> TryFrom<&'a str>, { ruma_serde::deserialize_cow_str(deserializer).and_then(|v| { T::try_from(&v).map_err(|_| de::Error::invalid_value(Unexpected::Str(&v), &expected_str)) }) } /// Shorthand for `Box::::from`. #[macro_export] macro_rules! device_id { ($s:tt) => { ::std::boxed::Box::<$crate::DeviceId>::from($s) }; } // A plain re-export shows up in rustdoc despite doc(hidden). Use a module instead. // Bug report: https://github.com/rust-lang/rust/issues/83939 #[doc(hidden)] pub mod _macros { pub use ruma_identifiers_macros::*; } /// Compile-time checked `DeviceKeyId` construction. #[macro_export] macro_rules! device_key_id { ($s:literal) => { $crate::_macros::device_key_id!($crate, $s) }; } /// Compile-time checked `EventId` construction. #[macro_export] macro_rules! event_id { ($s:literal) => { $crate::_macros::event_id!($crate, $s) }; } /// Compile-time checked `RoomAliasId` construction. #[macro_export] macro_rules! room_alias_id { ($s:literal) => { $crate::_macros::room_alias_id!($crate, $s) }; } /// Compile-time checked `RoomId` construction. #[macro_export] macro_rules! room_id { ($s:literal) => { $crate::_macros::room_id!($crate, $s) }; } /// Compile-time checked `RoomVersionId` construction. #[macro_export] macro_rules! room_version_id { ($s:literal) => { $crate::_macros::room_version_id!($crate, $s) }; } /// Compile-time checked `ServerSigningKeyId` construction. #[macro_export] #[deprecated = "use server_signing_key_id!()"] macro_rules! server_key_id { ($s:literal) => { $crate::_macros::server_signing_key_id!($crate, $s) }; } /// Compile-time checked `ServerSigningKeyId` construction. #[macro_export] macro_rules! server_signing_key_id { ($s:literal) => { $crate::_macros::server_signing_key_id!($crate, $s) }; } /// Compile-time checked `ServerName` construction. #[macro_export] macro_rules! server_name { ($s:literal) => { $crate::_macros::server_name!($crate, $s) }; } /// Compile-time checked `MxcUri` construction. #[macro_export] macro_rules! mxc_uri { ($s:literal) => { $crate::_macros::mxc_uri!($crate, $s) }; } /// Compile-time checked `UserId` construction. #[macro_export] macro_rules! user_id { ($s:literal) => { $crate::_macros::user_id!($crate, $s) }; }