//! Types for extensible file message events ([MSC3551]). //! //! [MSC3551]: https://github.com/matrix-org/matrix-spec-proposals/pull/3551 use std::collections::BTreeMap; use js_int::UInt; use ruma_macros::EventContent; use serde::{Deserialize, Serialize}; use super::{ message::MessageContent, room::{message::Relation, EncryptedFile, JsonWebKey}, }; use crate::{serde::Base64, OwnedMxcUri}; /// The payload for an extensible file message. /// /// This is the new primary type introduced in [MSC3551] and should not be sent before the end of /// the transition period. See the documentation of the [`message`] module for more information. /// /// [MSC3551]: https://github.com/matrix-org/matrix-spec-proposals/pull/3551 /// [`message`]: super::message #[derive(Clone, Debug, Serialize, Deserialize, EventContent)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] #[ruma_event(type = "m.file", kind = MessageLike, without_relation)] pub struct FileEventContent { /// The text representation of the message. #[serde(flatten)] pub message: MessageContent, /// The file content of the message. #[serde(rename = "m.file")] pub file: FileContent, /// Information about related messages. #[serde(flatten, skip_serializing_if = "Option::is_none")] pub relates_to: Option>, } impl FileEventContent { /// Creates a new non-encrypted `FileEventContent` with the given plain text message, url and /// file info. pub fn plain( message: impl Into, url: OwnedMxcUri, info: Option>, ) -> Self { Self { message: MessageContent::plain(message), file: FileContent::plain(url, info), relates_to: None, } } /// Creates a new non-encrypted `FileEventContent` with the given message, url and /// file info. pub fn plain_message( message: MessageContent, url: OwnedMxcUri, info: Option>, ) -> Self { Self { message, file: FileContent::plain(url, info), relates_to: None } } /// Creates a new encrypted `FileEventContent` with the given plain text message, url, /// encryption info and file info. pub fn encrypted( message: impl Into, url: OwnedMxcUri, encryption_info: EncryptedContent, info: Option>, ) -> Self { Self { message: MessageContent::plain(message), file: FileContent::encrypted(url, encryption_info, info), relates_to: None, } } /// Creates a new encrypted `FileEventContent` with the given message, url, /// encryption info and file info. pub fn encrypted_message( message: MessageContent, url: OwnedMxcUri, encryption_info: EncryptedContent, info: Option>, ) -> Self { Self { message, file: FileContent::encrypted(url, encryption_info, info), relates_to: None } } } /// File content. #[derive(Clone, Debug, Serialize, Deserialize)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] pub struct FileContent { /// The URL to the file. pub url: OwnedMxcUri, /// Information about the uploaded file. #[serde(flatten, skip_serializing_if = "Option::is_none")] pub info: Option>, /// Information on the encrypted file. /// /// Required if the file is encrypted. #[serde(flatten, skip_serializing_if = "Option::is_none")] pub encryption_info: Option>, } impl FileContent { /// Creates a new non-encrypted `FileContent` with the given url and file info. pub fn plain(url: OwnedMxcUri, info: Option>) -> Self { Self { url, info, encryption_info: None } } /// Creates a new encrypted `FileContent` with the given url, encryption info and file info. pub fn encrypted( url: OwnedMxcUri, encryption_info: EncryptedContent, info: Option>, ) -> Self { Self { url, info, encryption_info: Some(Box::new(encryption_info)) } } /// Whether the file is encrypted. pub fn is_encrypted(&self) -> bool { self.encryption_info.is_some() } } /// Information about a file content. #[derive(Clone, Debug, Default, Serialize, Deserialize)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] pub struct FileContentInfo { /// The original filename of the uploaded file. #[serde(skip_serializing_if = "Option::is_none")] pub name: Option, /// The mimetype of the file, e.g. "application/msword". #[serde(skip_serializing_if = "Option::is_none")] pub mimetype: Option, /// The size of the file in bytes. #[serde(skip_serializing_if = "Option::is_none")] pub size: Option, } impl FileContentInfo { /// Creates an empty `FileContentInfo`. pub fn new() -> Self { Self::default() } /// Create a new `FileContentInfo` with the given filename, mimetype and size. /// /// Returns `None` if the `FileContentInfo` would be empty. pub(crate) fn from_room_message_content( filename: Option, mimetype: Option, size: Option, ) -> Option { if filename.is_none() && mimetype.is_none() && size.is_none() { None } else { Some(Self { name: filename, mimetype, size }) } } } /// The encryption info of a file sent to a room with end-to-end encryption enabled. /// /// To create an instance of this type, first create a `EncryptedContentInit` and convert it via /// `EncryptedContent::from` / `.into()`. #[derive(Clone, Debug, Deserialize, Serialize)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] pub struct EncryptedContent { /// A [JSON Web Key](https://tools.ietf.org/html/rfc7517#appendix-A.3) object. pub key: JsonWebKey, /// The 128-bit unique counter block used by AES-CTR, encoded as unpadded base64. pub iv: Base64, /// A map from an algorithm name to a hash of the ciphertext, encoded as unpadded base64. /// /// Clients should support the SHA-256 hash, which uses the key sha256. pub hashes: BTreeMap, /// Version of the encrypted attachments protocol. /// /// Must be `v2`. pub v: String, } /// Initial set of fields of `EncryptedContent`. /// /// This struct will not be updated even if additional fields are added to `EncryptedContent` in a /// new (non-breaking) release of the Matrix specification. #[derive(Debug)] #[allow(clippy::exhaustive_structs)] pub struct EncryptedContentInit { /// A [JSON Web Key](https://tools.ietf.org/html/rfc7517#appendix-A.3) object. pub key: JsonWebKey, /// The 128-bit unique counter block used by AES-CTR, encoded as unpadded base64. pub iv: Base64, /// A map from an algorithm name to a hash of the ciphertext, encoded as unpadded base64. /// /// Clients should support the SHA-256 hash, which uses the key sha256. pub hashes: BTreeMap, /// Version of the encrypted attachments protocol. /// /// Must be `v2`. pub v: String, } impl From for EncryptedContent { fn from(init: EncryptedContentInit) -> Self { let EncryptedContentInit { key, iv, hashes, v } = init; Self { key, iv, hashes, v } } } impl From<&EncryptedFile> for EncryptedContent { fn from(encrypted: &EncryptedFile) -> Self { let EncryptedFile { key, iv, hashes, v, .. } = encrypted; Self { key: key.to_owned(), iv: iv.to_owned(), hashes: hashes.to_owned(), v: v.to_owned() } } }