async_client: Add a method to upload encryption keys.
This commit is contained in:
parent
e7d6a5a834
commit
bc4416e7cd
3 changed files with 70 additions and 22 deletions
|
@ -17,7 +17,7 @@ encryption = ["olm-rs", "serde/derive", "serde_json", "cjson"]
|
|||
[dependencies]
|
||||
js_int = "0.1.2"
|
||||
futures = "0.3.4"
|
||||
reqwest = "0.10.2"
|
||||
reqwest = "0.10.4"
|
||||
http = "0.2.0"
|
||||
async-std = "1.5.0"
|
||||
ruma-api = "0.13.0"
|
||||
|
@ -32,9 +32,10 @@ olm-rs = { git = "https://gitlab.gnome.org/jhaye/olm-rs/", optional = true, feat
|
|||
serde = { version = "1.0.104", optional = true, features = ["derive"] }
|
||||
serde_json = { version = "1.0.48", optional = true }
|
||||
cjson = { version = "0.1.0", optional = true }
|
||||
tokio = { version = "0.2.13", default-features = false, features = ["sync"] }
|
||||
|
||||
[dev-dependencies]
|
||||
tokio = { version = "0.2.11", features = ["full"] }
|
||||
tokio = { version = "0.2.13", features = ["full"] }
|
||||
async-std = { version = "1.5.0", features = ["unstable", "attributes"] }
|
||||
url = "2.1.1"
|
||||
mockito = "0.23.3"
|
||||
|
|
|
@ -16,8 +16,9 @@
|
|||
use futures::future::{BoxFuture, Future, FutureExt};
|
||||
use std::convert::{TryFrom, TryInto};
|
||||
use std::sync::atomic::{AtomicU64, Ordering};
|
||||
use std::sync::{Arc, Mutex, RwLock};
|
||||
use std::sync::{Arc, Mutex, RwLock as SyncLock};
|
||||
use std::time::{Duration, Instant};
|
||||
use tokio::sync::RwLock;
|
||||
|
||||
use async_std::task::sleep;
|
||||
|
||||
|
@ -41,8 +42,9 @@ use crate::error::{Error, InnerError};
|
|||
use crate::session::Session;
|
||||
use crate::VERSION;
|
||||
|
||||
type RoomEventCallback =
|
||||
Box<dyn FnMut(Arc<RwLock<Room>>, Arc<EventResult<RoomEvent>>) -> BoxFuture<'static, ()> + Send>;
|
||||
type RoomEventCallback = Box<
|
||||
dyn FnMut(Arc<SyncLock<Room>>, Arc<EventResult<RoomEvent>>) -> BoxFuture<'static, ()> + Send,
|
||||
>;
|
||||
|
||||
const DEFAULT_SYNC_TIMEOUT: u64 = 30000;
|
||||
|
||||
|
@ -174,6 +176,8 @@ impl SyncSettings {
|
|||
}
|
||||
}
|
||||
|
||||
#[cfg(feature = "encryption")]
|
||||
use api::r0::keys::upload_keys;
|
||||
use api::r0::message::create_message_event;
|
||||
use api::r0::session::login;
|
||||
use api::r0::sync::sync_events;
|
||||
|
@ -246,8 +250,10 @@ impl AsyncClient {
|
|||
}
|
||||
|
||||
/// Is the client logged in.
|
||||
pub fn logged_in(&self) -> bool {
|
||||
self.base_client.read().unwrap().logged_in()
|
||||
pub async fn logged_in(&self) -> bool {
|
||||
// TODO turn this into a atomic bool so this method doesn't need to be
|
||||
// async.
|
||||
self.base_client.read().await.logged_in()
|
||||
}
|
||||
|
||||
/// The Homeserver of the client.
|
||||
|
@ -307,7 +313,7 @@ impl AsyncClient {
|
|||
/// ```
|
||||
pub fn add_event_callback<C: 'static>(
|
||||
&mut self,
|
||||
mut callback: impl FnMut(Arc<RwLock<Room>>, Arc<EventResult<RoomEvent>>) -> C + 'static + Send,
|
||||
mut callback: impl FnMut(Arc<SyncLock<Room>>, Arc<EventResult<RoomEvent>>) -> C + 'static + Send,
|
||||
) where
|
||||
C: Future<Output = ()> + Send,
|
||||
{
|
||||
|
@ -346,8 +352,8 @@ impl AsyncClient {
|
|||
};
|
||||
|
||||
let response = self.send(request).await?;
|
||||
let mut client = self.base_client.write().unwrap();
|
||||
client.receive_login_response(&response);
|
||||
let mut client = self.base_client.write().await;
|
||||
client.receive_login_response(&response).await;
|
||||
|
||||
Ok(response)
|
||||
}
|
||||
|
@ -375,7 +381,7 @@ impl AsyncClient {
|
|||
let room_id = room_id.to_string();
|
||||
|
||||
let matrix_room = {
|
||||
let mut client = self.base_client.write().unwrap();
|
||||
let mut client = self.base_client.write().await;
|
||||
|
||||
for event in &room.state.events {
|
||||
if let EventResult::Ok(e) = event {
|
||||
|
@ -388,7 +394,7 @@ impl AsyncClient {
|
|||
|
||||
for event in &room.timeline.events {
|
||||
{
|
||||
let mut client = self.base_client.write().unwrap();
|
||||
let mut client = self.base_client.write().await;
|
||||
client.receive_joined_timeline_event(&room_id, &event);
|
||||
}
|
||||
|
||||
|
@ -409,11 +415,11 @@ impl AsyncClient {
|
|||
cb.await;
|
||||
}
|
||||
}
|
||||
|
||||
let mut client = self.base_client.write().unwrap();
|
||||
client.receive_sync_response(&response);
|
||||
}
|
||||
|
||||
let mut client = self.base_client.write().await;
|
||||
client.receive_sync_response(&response);
|
||||
|
||||
Ok(response)
|
||||
}
|
||||
|
||||
|
@ -513,8 +519,12 @@ impl AsyncClient {
|
|||
|
||||
sync_settings = SyncSettings::new()
|
||||
.timeout(DEFAULT_SYNC_TIMEOUT)
|
||||
.unwrap()
|
||||
.token(self.sync_token().unwrap());
|
||||
.expect("Default sync timeout doesn't contain a valid value")
|
||||
.token(
|
||||
self.sync_token()
|
||||
.await
|
||||
.expect("No sync token found after initial sync"),
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -550,7 +560,7 @@ impl AsyncClient {
|
|||
};
|
||||
|
||||
let request_builder = if Request::METADATA.requires_authentication {
|
||||
let client = self.base_client.read().unwrap();
|
||||
let client = self.base_client.read().await;
|
||||
|
||||
if let Some(ref session) = client.session {
|
||||
request_builder.bearer_auth(&session.access_token)
|
||||
|
@ -601,9 +611,41 @@ impl AsyncClient {
|
|||
Ok(response)
|
||||
}
|
||||
|
||||
/// Upload the E2E encryption keys.
|
||||
///
|
||||
/// This uploads the long lived device keys as well as the required amount
|
||||
/// of one-time keys.
|
||||
///
|
||||
/// # Panics
|
||||
///
|
||||
/// Panics if the client isn't logged in, or if no encryption keys need to
|
||||
/// be uploaded.
|
||||
#[cfg(feature = "encryption")]
|
||||
async fn keys_upload(&self) -> Result<upload_keys::Response, Error> {
|
||||
let (device_keys, one_time_keys) = self
|
||||
.base_client
|
||||
.read()
|
||||
.await
|
||||
.keys_for_upload()
|
||||
.await
|
||||
.expect("Keys don't need to be uploaded");
|
||||
let request = upload_keys::Request {
|
||||
device_keys,
|
||||
one_time_keys,
|
||||
};
|
||||
|
||||
let response = self.send(request).await?;
|
||||
self.base_client
|
||||
.write()
|
||||
.await
|
||||
.receive_keys_upload_response(&response)
|
||||
.await;
|
||||
Ok(response)
|
||||
}
|
||||
|
||||
/// Get the current, if any, sync token of the client.
|
||||
/// This will be None if the client didn't sync at least once.
|
||||
pub fn sync_token(&self) -> Option<String> {
|
||||
self.base_client.read().unwrap().sync_token.clone()
|
||||
pub async fn sync_token(&self) -> Option<String> {
|
||||
self.base_client.read().await.sync_token.clone()
|
||||
}
|
||||
}
|
||||
|
|
|
@ -24,7 +24,8 @@ fn login() {
|
|||
rt.block_on(client.login("example", "wordpass", None))
|
||||
.unwrap();
|
||||
|
||||
assert!(client.logged_in(), "Clint should be logged in");
|
||||
let logged_in = rt.block_on(client.logged_in());
|
||||
assert!(logged_in, "Clint should be logged in");
|
||||
}
|
||||
|
||||
#[test]
|
||||
|
@ -51,5 +52,9 @@ fn sync() {
|
|||
|
||||
let sync_settings = SyncSettings::new().timeout(3000).unwrap();
|
||||
|
||||
rt.block_on(client.sync(sync_settings)).unwrap();
|
||||
let response = rt.block_on(client.sync(sync_settings)).unwrap();
|
||||
|
||||
assert_ne!(response.next_batch, "");
|
||||
|
||||
assert!(rt.block_on(client.sync_token()).is_some());
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue