2.8 KiB
2.8 KiB
[unreleased]
Breaking changes:
Algorithmis replaced bySigningKeyAlgorithmfromruma-common.Signature::new()returns anIdParseError.Error::UnsupportedAlgorithmis removed since it is now unused.
- The
compat-signature-idcargo feature was removed. No validation is done on the key name of a key ID, to stop assuming that this crate is only used to check server signatures.
Bug fixes:
- Do not check the signature of the server of the sender of
m.room.memberinvite events with athird_party_invitefield.
0.17.0
Improvements:
- The
unstable-exhaustive-typescargo feature was replaced by theruma_unstable_exhaustive_typescompile-timecfgsetting. Like allcfgsettings, it can be enabled at compile-time with theRUSTFLAGSenvironment variable, or inside.cargo/config.toml. It can also be enabled by setting theRUMA_UNSTABLE_EXHAUSTIVE_TYPESenvironment variable.
0.16.0
Upgrade ruma-common to 0.14.0.
0.15.0
No changes for this version
0.14.0
Breaking changes:
- Update
ed25519-dalekcrateEd25519KeyPair::generate()returns aZeroizing<Vec<u8>>on successEd25519KeyPair::public_key()returns an array instead of a slice
Bug fixes:
- Ignore keys with unknown algorithms in
verify_events
Improvements:
- Remove
age_tsfromREFERENCE_HASH_FIELDS_TO_REMOVEaccording to a spec clarification
0.13.1
No changes for this version
0.13.0
No changes for this version
0.12.0
Breaking changes:
- Remove pointless
PartialEqimplementation forEd25519Verifier
0.11.0
Breaking changes:
- Upgrade dependencies
0.10.0
Breaking changes:
- Merge
SplitErrorintoError - Update some function signatures to use the new
Base64type
Improvements:
- Move Room Version 9 keys out of
unstable-pre-specinallowed_content_keys_for
0.9.0
Breaking changes:
- Change a few functions to return
Results- See each function's documentation for how it can fail
Bug fixes:
- Don't check stringified JSON size <= 65535 bytes for verify_json and sign_json since these functions may be used for things other than PDUs
0.8.0
Breaking changes:
- Replace
ringdependency withed25519-dalekandpkcs8 canonical_jsonandcontent_hashnow returnErrorwhen JSON is not canonical
0.7.2
Improvements:
-
Add a
compatfeatureWhen enabled, ruma-signatures will accept slightly malformed base64 input.
0.7.1
Improvements:
- Fix verify_json signature check algorithm
- Bump dependency versions
0.7.0
Breaking changes:
- Upgrade ruma-identifiers dependency to 0.19.0
0.6.0
Breaking changes:
- Remove
Copyimplementation forAlgorithm - Remove
CopyandCloneimplementations forEd25519Verifier - Upgrade ruma-identifiers
Bug fixes:
- Verify only the required signatures on
verify_event - Fix redactions for aliases events