Updates DeviceId to be Box<DeviceId>

master
Devin R 2020-07-18 08:51:19 -04:00
parent 71f2a042c2
commit 807435c043
10 changed files with 85 additions and 77 deletions

View File

@ -472,7 +472,7 @@ impl Client {
login_info: login::LoginInfo::Password { login_info: login::LoginInfo::Password {
password: password.into(), password: password.into(),
}, },
device_id: device_id.map(|d| d.into()), device_id: device_id.map(|d| d.into().into_boxed_str()),
initial_device_display_name: initial_device_display_name.map(|d| d.into()), initial_device_display_name: initial_device_display_name.map(|d| d.into()),
}; };
@ -1407,7 +1407,7 @@ impl Client {
#[instrument] #[instrument]
async fn claim_one_time_keys( async fn claim_one_time_keys(
&self, &self,
one_time_keys: BTreeMap<UserId, BTreeMap<DeviceId, KeyAlgorithm>>, one_time_keys: BTreeMap<UserId, BTreeMap<Box<DeviceId>, KeyAlgorithm>>,
) -> Result<claim_keys::Response> { ) -> Result<claim_keys::Response> {
let request = claim_keys::Request { let request = claim_keys::Request {
timeout: None, timeout: None,
@ -1511,7 +1511,7 @@ impl Client {
users_for_query users_for_query
); );
let mut device_keys: BTreeMap<UserId, Vec<DeviceId>> = BTreeMap::new(); let mut device_keys: BTreeMap<UserId, Vec<Box<DeviceId>>> = BTreeMap::new();
for user in users_for_query.drain() { for user in users_for_query.drain() {
device_keys.insert(user, Vec::new()); device_keys.insert(user, Vec::new());

View File

@ -275,7 +275,7 @@ impl Into<get_message_events::Request> for MessagesRequestBuilder {
pub struct RegistrationBuilder { pub struct RegistrationBuilder {
password: Option<String>, password: Option<String>,
username: Option<String>, username: Option<String>,
device_id: Option<DeviceId>, device_id: Option<Box<DeviceId>>,
initial_device_display_name: Option<String>, initial_device_display_name: Option<String>,
auth: Option<AuthData>, auth: Option<AuthData>,
kind: Option<RegistrationKind>, kind: Option<RegistrationKind>,
@ -309,7 +309,7 @@ impl RegistrationBuilder {
/// ///
/// If this does not correspond to a known client device, a new device will be created. /// If this does not correspond to a known client device, a new device will be created.
/// The server will auto-generate a device_id if this is not specified. /// The server will auto-generate a device_id if this is not specified.
pub fn device_id<S: Into<String>>(&mut self, device_id: S) -> &mut Self { pub fn device_id<S: Into<Box<str>>>(&mut self, device_id: S) -> &mut Self {
self.device_id = Some(device_id.into()); self.device_id = Some(device_id.into());
self self
} }

View File

@ -17,7 +17,7 @@ js_int = "0.1.8"
[dependencies.ruma] [dependencies.ruma]
git = "https://github.com/ruma/ruma" git = "https://github.com/ruma/ruma"
features = ["client-api"] features = ["client-api"]
rev = "848b225" rev = "848b22568106d05c5444f3fe46070d5aa16e422b"
[target.'cfg(not(target_arch = "wasm32"))'.dependencies] [target.'cfg(not(target_arch = "wasm32"))'.dependencies]
uuid = { version = "0.8.1", features = ["v4"] } uuid = { version = "0.8.1", features = ["v4"] }

View File

@ -33,7 +33,7 @@ use crate::verify_json;
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
pub struct Device { pub struct Device {
user_id: Arc<UserId>, user_id: Arc<UserId>,
device_id: Arc<DeviceId>, device_id: Arc<Box<DeviceId>>,
algorithms: Arc<Vec<Algorithm>>, algorithms: Arc<Vec<Algorithm>>,
keys: Arc<BTreeMap<AlgorithmAndDeviceId, String>>, keys: Arc<BTreeMap<AlgorithmAndDeviceId, String>>,
display_name: Arc<Option<String>>, display_name: Arc<Option<String>>,
@ -70,7 +70,7 @@ impl Device {
/// Create a new Device. /// Create a new Device.
pub fn new( pub fn new(
user_id: UserId, user_id: UserId,
device_id: DeviceId, device_id: Box<DeviceId>,
display_name: Option<String>, display_name: Option<String>,
trust_state: TrustState, trust_state: TrustState,
algorithms: Vec<Algorithm>, algorithms: Vec<Algorithm>,
@ -104,8 +104,10 @@ impl Device {
/// Get the key of the given key algorithm belonging to this device. /// Get the key of the given key algorithm belonging to this device.
pub fn get_key(&self, algorithm: KeyAlgorithm) -> Option<&String> { pub fn get_key(&self, algorithm: KeyAlgorithm) -> Option<&String> {
self.keys self.keys.get(&AlgorithmAndDeviceId(
.get(&AlgorithmAndDeviceId(algorithm, self.device_id.to_string())) algorithm,
self.device_id.as_ref().clone(),
))
} }
/// Get a map containing all the device keys. /// Get a map containing all the device keys.
@ -180,7 +182,7 @@ impl From<&OlmMachine> for Device {
fn from(machine: &OlmMachine) -> Self { fn from(machine: &OlmMachine) -> Self {
Device { Device {
user_id: Arc::new(machine.user_id().clone()), user_id: Arc::new(machine.user_id().clone()),
device_id: Arc::new(machine.device_id().clone()), device_id: Arc::new(machine.device_id().into()),
algorithms: Arc::new(vec![ algorithms: Arc::new(vec![
Algorithm::MegolmV1AesSha2, Algorithm::MegolmV1AesSha2,
Algorithm::OlmV1Curve25519AesSha2, Algorithm::OlmV1Curve25519AesSha2,
@ -193,7 +195,7 @@ impl From<&OlmMachine> for Device {
( (
AlgorithmAndDeviceId( AlgorithmAndDeviceId(
KeyAlgorithm::try_from(key.as_ref()).unwrap(), KeyAlgorithm::try_from(key.as_ref()).unwrap(),
machine.device_id().clone(), machine.device_id().into(),
), ),
value.to_owned(), value.to_owned(),
) )

View File

@ -128,21 +128,21 @@ pub(crate) enum SessionCreationError {
"Failed to create a new Olm session for {0} {1}, the requested \ "Failed to create a new Olm session for {0} {1}, the requested \
one-time key isn't a signed curve key" one-time key isn't a signed curve key"
)] )]
OneTimeKeyNotSigned(UserId, DeviceId), OneTimeKeyNotSigned(UserId, Box<DeviceId>),
#[error( #[error(
"Tried to create a new Olm session for {0} {1}, but the signed \ "Tried to create a new Olm session for {0} {1}, but the signed \
one-time key is missing" one-time key is missing"
)] )]
OneTimeKeyMissing(UserId, DeviceId), OneTimeKeyMissing(UserId, Box<DeviceId>),
#[error("Failed to verify the one-time key signatures for {0} {1}: {2:?}")] #[error("Failed to verify the one-time key signatures for {0} {1}: {2:?}")]
InvalidSignature(UserId, DeviceId, SignatureError), InvalidSignature(UserId, Box<DeviceId>, SignatureError),
#[error( #[error(
"Tried to create an Olm session for {0} {1}, but the device is missing \ "Tried to create an Olm session for {0} {1}, but the device is missing \
a curve25519 key" a curve25519 key"
)] )]
DeviceMissingCurveKey(UserId, DeviceId), DeviceMissingCurveKey(UserId, Box<DeviceId>),
#[error("Error creating new Olm session for {0} {1}: {2:?}")] #[error("Error creating new Olm session for {0} {1}: {2:?}")]
OlmError(UserId, DeviceId, OlmSessionError), OlmError(UserId, Box<DeviceId>, OlmSessionError),
} }
impl From<CjsonError> for SignatureError { impl From<CjsonError> for SignatureError {

View File

@ -82,7 +82,7 @@ pub(crate) fn verify_json(
json_object.insert("unsigned".to_string(), u); json_object.insert("unsigned".to_string(), u);
} }
let key_id = AlgorithmAndDeviceId(KeyAlgorithm::Ed25519, key_id.to_string()); let key_id = AlgorithmAndDeviceId(KeyAlgorithm::Ed25519, key_id.into());
let signatures = signatures.ok_or(SignatureError::NoSignatureFound)?; let signatures = signatures.ok_or(SignatureError::NoSignatureFound)?;
let signature_object = signatures let signature_object = signatures

View File

@ -64,7 +64,7 @@ pub struct OlmMachine {
/// The unique user id that owns this account. /// The unique user id that owns this account.
user_id: UserId, user_id: UserId,
/// The unique device id of the device that holds this account. /// The unique device id of the device that holds this account.
device_id: DeviceId, device_id: Box<DeviceId>,
/// Our underlying Olm Account holding our identity keys. /// Our underlying Olm Account holding our identity keys.
account: Account, account: Account,
/// Store for the encryption keys. /// Store for the encryption keys.
@ -102,7 +102,7 @@ impl OlmMachine {
pub fn new(user_id: &UserId, device_id: &DeviceId) -> Self { pub fn new(user_id: &UserId, device_id: &DeviceId) -> Self {
OlmMachine { OlmMachine {
user_id: user_id.clone(), user_id: user_id.clone(),
device_id: device_id.to_owned(), device_id: device_id.into(),
account: Account::new(user_id, &device_id), account: Account::new(user_id, &device_id),
store: Box::new(MemoryStore::new()), store: Box::new(MemoryStore::new()),
outbound_group_sessions: HashMap::new(), outbound_group_sessions: HashMap::new(),
@ -128,7 +128,7 @@ impl OlmMachine {
/// the encryption keys. /// the encryption keys.
pub async fn new_with_store( pub async fn new_with_store(
user_id: UserId, user_id: UserId,
device_id: String, device_id: Box<DeviceId>,
mut store: Box<dyn CryptoStore>, mut store: Box<dyn CryptoStore>,
) -> StoreResult<Self> { ) -> StoreResult<Self> {
let account = match store.load_account().await? { let account = match store.load_account().await? {
@ -171,7 +171,7 @@ impl OlmMachine {
let store = let store =
SqliteStore::open_with_passphrase(&user_id, device_id, path, passphrase).await?; SqliteStore::open_with_passphrase(&user_id, device_id, path, passphrase).await?;
OlmMachine::new_with_store(user_id.to_owned(), device_id.to_owned(), Box::new(store)).await OlmMachine::new_with_store(user_id.to_owned(), device_id.into(), Box::new(store)).await
} }
/// The unique user id that owns this identity. /// The unique user id that owns this identity.
@ -255,7 +255,7 @@ impl OlmMachine {
pub async fn get_missing_sessions( pub async fn get_missing_sessions(
&mut self, &mut self,
users: impl Iterator<Item = &UserId>, users: impl Iterator<Item = &UserId>,
) -> OlmResult<BTreeMap<UserId, BTreeMap<DeviceId, KeyAlgorithm>>> { ) -> OlmResult<BTreeMap<UserId, BTreeMap<Box<DeviceId>, KeyAlgorithm>>> {
let mut missing = BTreeMap::new(); let mut missing = BTreeMap::new();
for user_id in users { for user_id in users {
@ -282,10 +282,8 @@ impl OlmMachine {
} }
let user_map = missing.get_mut(user_id).unwrap(); let user_map = missing.get_mut(user_id).unwrap();
let _ = user_map.insert( let _ =
device.device_id().to_owned(), user_map.insert(device.device_id().into(), KeyAlgorithm::SignedCurve25519);
KeyAlgorithm::SignedCurve25519,
);
} }
} }
} }
@ -356,7 +354,7 @@ impl OlmMachine {
async fn handle_devices_from_key_query( async fn handle_devices_from_key_query(
&mut self, &mut self,
device_keys_map: &BTreeMap<UserId, BTreeMap<DeviceId, DeviceKeys>>, device_keys_map: &BTreeMap<UserId, BTreeMap<Box<DeviceId>, DeviceKeys>>,
) -> StoreResult<Vec<Device>> { ) -> StoreResult<Vec<Device>> {
let mut changed_devices = Vec::new(); let mut changed_devices = Vec::new();
@ -406,7 +404,8 @@ impl OlmMachine {
changed_devices.push(device); changed_devices.push(device);
} }
let current_devices: HashSet<&DeviceId> = device_map.keys().collect(); let current_devices: HashSet<&DeviceId> =
device_map.keys().map(|id| id.as_ref()).collect();
let stored_devices = self.store.get_user_devices(&user_id).await.unwrap(); let stored_devices = self.store.get_user_devices(&user_id).await.unwrap();
let stored_devices_set: HashSet<&DeviceId> = stored_devices.keys().collect(); let stored_devices_set: HashSet<&DeviceId> = stored_devices.keys().collect();
@ -843,10 +842,7 @@ impl OlmMachine {
let message_type: usize = ciphertext.0.into(); let message_type: usize = ciphertext.0.into();
let ciphertext = CiphertextInfo { let ciphertext = CiphertextInfo::new(ciphertext.1, (message_type as u32).into());
body: ciphertext.1,
message_type: (message_type as u32).into(),
};
let mut content = BTreeMap::new(); let mut content = BTreeMap::new();
@ -855,10 +851,7 @@ impl OlmMachine {
self.store.save_sessions(&[session]).await?; self.store.save_sessions(&[session]).await?;
Ok(EncryptedEventContent::OlmV1Curve25519AesSha2( Ok(EncryptedEventContent::OlmV1Curve25519AesSha2(
OlmV1Curve25519AesSha2Content { OlmV1Curve25519AesSha2Content::new(content, identity_keys.curve25519().to_owned()),
sender_key: identity_keys.curve25519().to_owned(),
ciphertext: content,
},
)) ))
} }
@ -989,7 +982,7 @@ impl OlmMachine {
.await?; .await?;
user_messages.insert( user_messages.insert(
DeviceIdOrAllDevices::DeviceId(device.device_id().clone()), DeviceIdOrAllDevices::DeviceId(device.device_id().into()),
serde_json::value::to_raw_value(&encrypted_content)?, serde_json::value::to_raw_value(&encrypted_content)?,
); );
} }
@ -1254,8 +1247,8 @@ mod test {
UserId::try_from("@alice:example.org").unwrap() UserId::try_from("@alice:example.org").unwrap()
} }
fn alice_device_id() -> DeviceId { fn alice_device_id() -> Box<DeviceId> {
"JLAFKJWSCS".to_string() "JLAFKJWSCS".into()
} }
fn user_id() -> UserId { fn user_id() -> UserId {

View File

@ -129,13 +129,13 @@ impl GroupSessionStore {
/// In-memory store holding the devices of users. /// In-memory store holding the devices of users.
#[derive(Clone, Debug, Default)] #[derive(Clone, Debug, Default)]
pub struct DeviceStore { pub struct DeviceStore {
entries: Arc<DashMap<UserId, DashMap<String, Device>>>, entries: Arc<DashMap<UserId, DashMap<Box<DeviceId>, Device>>>,
} }
/// A read only view over all devices belonging to a user. /// A read only view over all devices belonging to a user.
#[derive(Debug)] #[derive(Debug)]
pub struct UserDevices { pub struct UserDevices {
entries: ReadOnlyView<DeviceId, Device>, entries: ReadOnlyView<Box<DeviceId>, Device>,
} }
impl UserDevices { impl UserDevices {
@ -146,7 +146,7 @@ impl UserDevices {
/// Iterator over all the device ids of the user devices. /// Iterator over all the device ids of the user devices.
pub fn keys(&self) -> impl Iterator<Item = &DeviceId> { pub fn keys(&self) -> impl Iterator<Item = &DeviceId> {
self.entries.keys() self.entries.keys().map(|id| id.as_ref())
} }
/// Iterator over all the devices of the user devices. /// Iterator over all the devices of the user devices.
@ -175,7 +175,9 @@ impl DeviceStore {
let device_map = self.entries.get_mut(&user_id).unwrap(); let device_map = self.entries.get_mut(&user_id).unwrap();
device_map device_map
.insert(device.device_id().to_owned(), device) // TODO this is ok if this is for sure a valid device_id otherwise
// Box::<DeviceId>::try_from(&str) is the validated version
.insert(device.device_id().into(), device)
.is_none() .is_none()
} }
@ -202,7 +204,12 @@ impl DeviceStore {
self.entries.insert(user_id.clone(), DashMap::new()); self.entries.insert(user_id.clone(), DashMap::new());
} }
UserDevices { UserDevices {
entries: self.entries.get(user_id).unwrap().clone().into_read_only(), entries: self
.entries
.get(user_id)
.map(|d| d.clone()) // TODO I'm sure this is not ok but I'm not sure what to do??
.unwrap()
.into_read_only(),
} }
} }
} }

View File

@ -40,7 +40,6 @@ pub use olm_rs::{
utility::OlmUtility, utility::OlmUtility,
}; };
use matrix_sdk_common::identifiers::{DeviceId, RoomId, UserId};
use matrix_sdk_common::{ use matrix_sdk_common::{
api::r0::keys::{AlgorithmAndDeviceId, DeviceKeys, KeyAlgorithm, OneTimeKey, SignedKey}, api::r0::keys::{AlgorithmAndDeviceId, DeviceKeys, KeyAlgorithm, OneTimeKey, SignedKey},
events::{ events::{
@ -48,8 +47,9 @@ use matrix_sdk_common::{
encrypted::{EncryptedEventContent, MegolmV1AesSha2Content}, encrypted::{EncryptedEventContent, MegolmV1AesSha2Content},
message::MessageEventContent, message::MessageEventContent,
}, },
Algorithm, AnyRoomEventStub, EventJson, EventType, MessageEventStub, Algorithm, AnySyncRoomEvent, EventJson, EventType, SyncMessageEvent,
}, },
identifiers::{DeviceId, RoomId, UserId},
}; };
/// Account holding identity keys for which sessions can be created. /// Account holding identity keys for which sessions can be created.
@ -59,7 +59,7 @@ use matrix_sdk_common::{
#[derive(Clone)] #[derive(Clone)]
pub struct Account { pub struct Account {
user_id: Arc<UserId>, user_id: Arc<UserId>,
device_id: Arc<DeviceId>, device_id: Arc<Box<DeviceId>>,
inner: Arc<Mutex<OlmAccount>>, inner: Arc<Mutex<OlmAccount>>,
identity_keys: Arc<IdentityKeys>, identity_keys: Arc<IdentityKeys>,
shared: Arc<AtomicBool>, shared: Arc<AtomicBool>,
@ -94,7 +94,7 @@ impl Account {
Account { Account {
user_id: Arc::new(user_id.to_owned()), user_id: Arc::new(user_id.to_owned()),
device_id: Arc::new(device_id.to_owned()), device_id: Arc::new(device_id.into()),
inner: Arc::new(Mutex::new(account)), inner: Arc::new(Mutex::new(account)),
identity_keys: Arc::new(identity_keys), identity_keys: Arc::new(identity_keys),
shared: Arc::new(AtomicBool::new(false)), shared: Arc::new(AtomicBool::new(false)),
@ -267,7 +267,7 @@ impl Account {
Ok(Account { Ok(Account {
user_id: Arc::new(user_id.to_owned()), user_id: Arc::new(user_id.to_owned()),
device_id: Arc::new(device_id.to_owned()), device_id: Arc::new(device_id.into()),
inner: Arc::new(Mutex::new(account)), inner: Arc::new(Mutex::new(account)),
identity_keys: Arc::new(identity_keys), identity_keys: Arc::new(identity_keys),
shared: Arc::new(AtomicBool::from(shared)), shared: Arc::new(AtomicBool::from(shared)),
@ -371,7 +371,7 @@ impl Account {
}; };
one_time_key_map.insert( one_time_key_map.insert(
AlgorithmAndDeviceId(KeyAlgorithm::SignedCurve25519, key_id.to_owned()), AlgorithmAndDeviceId(KeyAlgorithm::SignedCurve25519, key_id.as_str().into()),
OneTimeKey::SignedKey(signed_key), OneTimeKey::SignedKey(signed_key),
); );
} }
@ -431,7 +431,7 @@ impl Account {
let one_time_key = key_map.values().next().ok_or_else(|| { let one_time_key = key_map.values().next().ok_or_else(|| {
SessionCreationError::OneTimeKeyMissing( SessionCreationError::OneTimeKeyMissing(
device.user_id().to_owned(), device.user_id().to_owned(),
device.device_id().to_owned(), device.device_id().into(),
) )
})?; })?;
@ -440,7 +440,7 @@ impl Account {
OneTimeKey::Key(_) => { OneTimeKey::Key(_) => {
return Err(SessionCreationError::OneTimeKeyNotSigned( return Err(SessionCreationError::OneTimeKeyNotSigned(
device.user_id().to_owned(), device.user_id().to_owned(),
device.device_id().to_owned(), device.device_id().into(),
)); ));
} }
}; };
@ -448,7 +448,7 @@ impl Account {
device.verify_one_time_key(&one_time_key).map_err(|e| { device.verify_one_time_key(&one_time_key).map_err(|e| {
SessionCreationError::InvalidSignature( SessionCreationError::InvalidSignature(
device.user_id().to_owned(), device.user_id().to_owned(),
device.device_id().to_owned(), device.device_id().into(),
e, e,
) )
})?; })?;
@ -456,7 +456,7 @@ impl Account {
let curve_key = device.get_key(KeyAlgorithm::Curve25519).ok_or_else(|| { let curve_key = device.get_key(KeyAlgorithm::Curve25519).ok_or_else(|| {
SessionCreationError::DeviceMissingCurveKey( SessionCreationError::DeviceMissingCurveKey(
device.user_id().to_owned(), device.user_id().to_owned(),
device.device_id().to_owned(), device.device_id().into(),
) )
})?; })?;
@ -465,7 +465,7 @@ impl Account {
.map_err(|e| { .map_err(|e| {
SessionCreationError::OlmError( SessionCreationError::OlmError(
device.user_id().to_owned(), device.user_id().to_owned(),
device.device_id().to_owned(), device.device_id().into(),
e, e,
) )
}) })
@ -821,8 +821,8 @@ impl InboundGroupSession {
/// * `event` - The event that should be decrypted. /// * `event` - The event that should be decrypted.
pub async fn decrypt( pub async fn decrypt(
&self, &self,
event: &MessageEventStub<EncryptedEventContent>, event: &SyncMessageEvent<EncryptedEventContent>,
) -> MegolmResult<(EventJson<AnyRoomEventStub>, u32)> { ) -> MegolmResult<(EventJson<AnySyncRoomEvent>, u32)> {
let content = match &event.content { let content = match &event.content {
EncryptedEventContent::MegolmV1AesSha2(c) => c, EncryptedEventContent::MegolmV1AesSha2(c) => c,
_ => return Err(EventError::UnsupportedAlgorithm.into()), _ => return Err(EventError::UnsupportedAlgorithm.into()),
@ -853,7 +853,7 @@ impl InboundGroupSession {
); );
Ok(( Ok((
serde_json::from_value::<EventJson<AnyRoomEventStub>>(decrypted_value)?, serde_json::from_value::<EventJson<AnySyncRoomEvent>>(decrypted_value)?,
message_index, message_index,
)) ))
} }
@ -882,7 +882,7 @@ impl PartialEq for InboundGroupSession {
#[derive(Clone)] #[derive(Clone)]
pub struct OutboundGroupSession { pub struct OutboundGroupSession {
inner: Arc<Mutex<OlmOutboundGroupSession>>, inner: Arc<Mutex<OlmOutboundGroupSession>>,
device_id: Arc<DeviceId>, device_id: Arc<Box<DeviceId>>,
account_identity_keys: Arc<IdentityKeys>, account_identity_keys: Arc<IdentityKeys>,
session_id: Arc<String>, session_id: Arc<String>,
room_id: Arc<RoomId>, room_id: Arc<RoomId>,
@ -904,7 +904,11 @@ impl OutboundGroupSession {
/// session. /// session.
/// ///
/// * `room_id` - The id of the room that the session is used in. /// * `room_id` - The id of the room that the session is used in.
fn new(device_id: Arc<DeviceId>, identity_keys: Arc<IdentityKeys>, room_id: &RoomId) -> Self { fn new(
device_id: Arc<Box<DeviceId>>,
identity_keys: Arc<IdentityKeys>,
room_id: &RoomId,
) -> Self {
let session = OlmOutboundGroupSession::new(); let session = OlmOutboundGroupSession::new();
let session_id = session.session_id(); let session_id = session.session_id();
@ -966,12 +970,14 @@ impl OutboundGroupSession {
let ciphertext = self.encrypt_helper(plaintext).await; let ciphertext = self.encrypt_helper(plaintext).await;
EncryptedEventContent::MegolmV1AesSha2(MegolmV1AesSha2Content { EncryptedEventContent::MegolmV1AesSha2(MegolmV1AesSha2Content::new(
ciphertext, matrix_sdk_common::events::room::encrypted::MegolmV1AesSha2ContentInit {
sender_key: self.account_identity_keys.curve25519().to_owned(), ciphertext,
session_id: self.session_id().to_owned(), sender_key: self.account_identity_keys.curve25519().to_owned(),
device_id: (&*self.device_id).to_owned(), session_id: self.session_id().to_owned(),
}) device_id: (&*self.device_id).to_owned(),
},
))
} }
/// Check if the session has expired and if it should be rotated. /// Check if the session has expired and if it should be rotated.
@ -1044,16 +1050,16 @@ pub(crate) mod test {
UserId::try_from("@alice:example.org").unwrap() UserId::try_from("@alice:example.org").unwrap()
} }
fn alice_device_id() -> DeviceId { fn alice_device_id() -> Box<DeviceId> {
"ALICEDEVICE".to_string() "ALICEDEVICE".into()
} }
fn bob_id() -> UserId { fn bob_id() -> UserId {
UserId::try_from("@bob:example.org").unwrap() UserId::try_from("@bob:example.org").unwrap()
} }
fn bob_device_id() -> DeviceId { fn bob_device_id() -> Box<DeviceId> {
"BOBDEVICE".to_string() "BOBDEVICE".into()
} }
pub(crate) async fn get_account_and_session() -> (Account, Session) { pub(crate) async fn get_account_and_session() -> (Account, Session) {

View File

@ -469,14 +469,14 @@ impl SqliteStore {
let key = &row.1; let key = &row.1;
keys.insert( keys.insert(
AlgorithmAndDeviceId(algorithm, device_id.clone()), AlgorithmAndDeviceId(algorithm, device_id.as_str().into()),
key.to_owned(), key.to_owned(),
); );
} }
let device = Device::new( let device = Device::new(
user_id, user_id,
device_id.to_owned(), device_id.as_str().into(),
display_name.clone(), display_name.clone(),
trust_state, trust_state,
algorithms, algorithms,
@ -840,16 +840,16 @@ mod test {
UserId::try_from("@alice:example.org").unwrap() UserId::try_from("@alice:example.org").unwrap()
} }
fn alice_device_id() -> DeviceId { fn alice_device_id() -> Box<DeviceId> {
"ALICEDEVICE".to_string() "ALICEDEVICE".into()
} }
fn bob_id() -> UserId { fn bob_id() -> UserId {
UserId::try_from("@bob:example.org").unwrap() UserId::try_from("@bob:example.org").unwrap()
} }
fn bob_device_id() -> DeviceId { fn bob_device_id() -> Box<DeviceId> {
"BOBDEVICE".to_string() "BOBDEVICE".into()
} }
fn get_account() -> Account { fn get_account() -> Account {