update deps; experiment: log security
This commit is contained in:
56
vendor/maunium.net/go/mautrix/requests.go
generated
vendored
56
vendor/maunium.net/go/mautrix/requests.go
generated
vendored
@@ -2,6 +2,7 @@ package mautrix
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"strconv"
|
||||
|
||||
"maunium.net/go/mautrix/event"
|
||||
"maunium.net/go/mautrix/id"
|
||||
@@ -172,10 +173,15 @@ type ReqAliasCreate struct {
|
||||
}
|
||||
|
||||
type OneTimeKey struct {
|
||||
Key id.Curve25519 `json:"key"`
|
||||
IsSigned bool `json:"-"`
|
||||
Signatures Signatures `json:"signatures,omitempty"`
|
||||
Unsigned map[string]interface{} `json:"unsigned,omitempty"`
|
||||
Key id.Curve25519 `json:"key"`
|
||||
Fallback bool `json:"fallback,omitempty"`
|
||||
Signatures Signatures `json:"signatures,omitempty"`
|
||||
Unsigned map[string]any `json:"unsigned,omitempty"`
|
||||
IsSigned bool `json:"-"`
|
||||
|
||||
// Raw data in the one-time key. This must be used for signature verification to ensure unrecognized fields
|
||||
// aren't thrown away (because that would invalidate the signature).
|
||||
RawData json.RawMessage `json:"-"`
|
||||
}
|
||||
|
||||
type serializableOTK OneTimeKey
|
||||
@@ -188,6 +194,7 @@ func (otk *OneTimeKey) UnmarshalJSON(data []byte) (err error) {
|
||||
otk.IsSigned = false
|
||||
} else {
|
||||
err = json.Unmarshal(data, (*serializableOTK)(otk))
|
||||
otk.RawData = data
|
||||
otk.IsSigned = true
|
||||
}
|
||||
return err
|
||||
@@ -319,7 +326,8 @@ type ReqBatchSend struct {
|
||||
PrevEventID id.EventID `json:"-"`
|
||||
BatchID id.BatchID `json:"-"`
|
||||
|
||||
BeeperNewMessages bool `json:"-"`
|
||||
BeeperNewMessages bool `json:"-"`
|
||||
BeeperMarkReadBy id.UserID `json:"-"`
|
||||
|
||||
StateEventsAtStart []*event.Event `json:"state_events_at_start"`
|
||||
Events []*event.Event `json:"events"`
|
||||
@@ -334,3 +342,41 @@ type ReqSetReadMarkers struct {
|
||||
BeeperReadPrivateExtra interface{} `json:"com.beeper.read.private.extra"`
|
||||
BeeperFullyReadExtra interface{} `json:"com.beeper.fully_read.extra"`
|
||||
}
|
||||
|
||||
// ReqHierarchy contains the parameters for https://spec.matrix.org/v1.4/client-server-api/#get_matrixclientv1roomsroomidhierarchy
|
||||
//
|
||||
// As it's a GET method, there is no JSON body, so this is only query parameters.
|
||||
type ReqHierarchy struct {
|
||||
// A pagination token from a previous Hierarchy call.
|
||||
// If specified, max_depth and suggested_only cannot be changed from the first request.
|
||||
From string
|
||||
// Limit for the maximum number of rooms to include per response.
|
||||
// The server will apply a default value if a limit isn't provided.
|
||||
Limit int
|
||||
// Limit for how far to go into the space. When reached, no further child rooms will be returned.
|
||||
// The server will apply a default value if a max depth isn't provided.
|
||||
MaxDepth *int
|
||||
// Flag to indicate whether the server should only consider suggested rooms.
|
||||
// Suggested rooms are annotated in their m.space.child event contents.
|
||||
SuggestedOnly bool
|
||||
}
|
||||
|
||||
func (req *ReqHierarchy) Query() map[string]string {
|
||||
query := map[string]string{}
|
||||
if req == nil {
|
||||
return query
|
||||
}
|
||||
if req.From != "" {
|
||||
query["from"] = req.From
|
||||
}
|
||||
if req.Limit > 0 {
|
||||
query["limit"] = strconv.Itoa(req.Limit)
|
||||
}
|
||||
if req.MaxDepth != nil {
|
||||
query["max_depth"] = strconv.Itoa(*req.MaxDepth)
|
||||
}
|
||||
if req.SuggestedOnly {
|
||||
query["suggested_only"] = "true"
|
||||
}
|
||||
return query
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user