Jonas Platte
c8dd5c42e9
docs(sdk): Add more doc links to as_ruma_api_error methods
2022-11-03 18:05:04 +01:00
Jonas Platte
128c74ace5
refactor(sdk): Use server-supplied retry time when when available
2022-11-03 18:05:04 +01:00
Jonas Platte
85ea9554e5
feat(sdk): Add {RumaApiError,HttpError,Error}::as_client_api_error
2022-11-03 18:05:04 +01:00
Ivan Enderlin
5b25b8967c
feat(crypto-js): Encode the WASM as base64 for portability
...
feat(crypto-js): Encode the WASM as base64 for portability
2022-11-03 16:44:16 +01:00
Damir Jelić
3b755fc15e
chore(crypto): Fix some spelling
...
Co-authored-by: Jonas Platte <jplatte@matrix.org >
2022-11-03 16:18:15 +01:00
Damir Jelić
da61005ee4
chore(crypto): Improve the logs for the SAS state transitions
2022-11-03 16:18:15 +01:00
Damir Jelić
7a263433c7
refactor!(crypto): Add a new SAS state that waits for a key to be sent
...
This patch adds a couple more states to the SAS verification state
machine. Namely we add the following states:
* KeySent
* KeysExchanged
This prevents users from confirming that the short auth string matches
before they have sent out a m.key.verification.key event, which is
necessary for the other side to present the short auth string.
The KeysExchanged state functionally replaces the KeyReceived state.
Meaning that the short auth string can only presented once we
transitioned into the KeysExchanged state.
We can transition into the KeysExchanged state from the KeyReceived
state or from the KeySent state, depending on if we first receive a
m.key.verification.key event or if we first send out our own
m.key.verification.key event.
This means that, if the transition into the KeysExchanged state happens
through the KeySent state, users won't be able to tell if the transition
happened. In other words, listening to `m.key.verification` events
doesn't work anymore, users will need to use the new `Sas::changes()`
API to listen to a stream of state changes.
2022-11-03 16:18:15 +01:00
Ivan Enderlin
ee27c19bf7
chore: Removing trailing spaces.
2022-11-03 15:57:20 +01:00
Ivan Enderlin
6d21df6d29
!debug off
2022-11-03 15:37:54 +01:00
Ivan Enderlin
e989bc2377
fix(crypto-js): scan_qr_code takes a reference to QrCodeScan.
2022-11-03 15:37:21 +01:00
Jonas Platte
28b44a7f03
refactor!: Rename restore_login to restore_session
2022-11-03 15:34:31 +01:00
Ivan Enderlin
265ac1f97b
chore(crypto-js): Configure a profiling profile for wasm-pack.
2022-11-03 14:59:22 +01:00
Ivan Enderlin
d044565caa
test(crypto-js): Keep qr.toBytes() local, to avoid weird GC collection.
2022-11-03 14:57:07 +01:00
Ivan Enderlin
aa7d225867
feat(crypto-js): Qr.to_bytes returns a Uint8ClampedArray.
2022-11-03 13:58:17 +01:00
Stefan Ceriu
af2de2d8ef
chore(ffi): Reduce the log level for some not so useful logs
2022-11-03 13:26:32 +01:00
Jonas Platte
a28a664302
refactor(bindings)!: Replace RestoreToken string with Session dictionary
2022-11-03 12:58:34 +01:00
Jonas Platte
c1423e9326
refactor(bindings)!: Remove is_guest
...
It's not used by anything and should be re-introduced in the main Rust
first if it's needed.
2022-11-03 12:58:34 +01:00
Jonas Platte
8bfc186595
feat(bindings): Add TimelineItemContent::as_unable_to_decrypt
2022-11-03 12:03:33 +01:00
Jonas Platte
0cf5356f15
feat(sdk): Add UnableToDecrypt as a variant of TimelineItemContent
2022-11-03 12:03:33 +01:00
Jonas Platte
c03940e6d5
chore(sdk): Reword log messages
2022-11-03 12:03:33 +01:00
Jonas Platte
f93170323b
refactor(sdk): Remove unnecessary pub(crate)
2022-11-03 12:03:33 +01:00
Ivan Enderlin
a3cdd31713
fix(crypto-nodejs): Pass secrets to the release workflow
...
fix(crypto-nodejs): Pass secrets to the release workflow
2022-11-03 11:58:59 +01:00
Ivan Enderlin
fb89de8267
fix(crypto-nodejs): Pass secrets to the release workflow.
...
See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idsecrets .
2022-11-03 11:30:10 +01:00
Ivan Enderlin
223e65fc26
!debug
2022-11-03 11:08:52 +01:00
Jonas Platte
b5b2eafbec
refactor(base): Remove unused Error variants
2022-11-03 10:52:11 +01:00
Jonas Platte
27b0ea1aa0
refactor(crypto): Move EncryptionNotEnabled out of MegolmError
...
… into matrix_sdk_base::Error because it is never constructed in the
matrix_sdk_crypto crate that defines MegolmError.
2022-11-03 10:52:11 +01:00
Jonas Platte
4c4b1f3abc
refactor(bindings): Use uniffi proc-macros more in sdk-ffi
2022-11-03 09:48:41 +01:00
Jonas Platte
99e621a82b
chore: Upgrade UniFFI
2022-11-03 09:48:41 +01:00
Richard van der Hoff
898265b257
Clean up build script
2022-11-02 17:22:00 +00:00
Richard van der Hoff
9d400a7494
fix JS syntax
2022-11-02 17:13:58 +00:00
Ivan Enderlin
a4ca6dbf38
!debug
2022-11-02 17:25:13 +01:00
Ivan Enderlin
b23d30c951
fix(indexeddb): Fix wasm_bindgen::JsValue::(from|to)_serde warnings
...
fix(indexeddb): Fix `wasm_bindgen::JsValue::(from|to)_serde` warnings
2022-11-02 16:58:09 +01:00
Ivan Enderlin
bb96ab89f8
fix(crypto-js): Make build.sh cross-platform-ish.
2022-11-02 16:57:26 +01:00
Ivan Enderlin
4cd8a8400f
chore: Reorder dep names.
2022-11-02 16:38:01 +01:00
Ivan Enderlin
28d4a69552
!fixup
2022-11-02 16:32:20 +01:00
Jonas Platte
a6ca114bac
chore: Upgrade UniFFI
2022-11-02 16:21:16 +01:00
Ivan Enderlin
6497d6d676
feat(crypto-js): Make scripts/build.sh compatible with macOS.
...
This patch also improves the “phrasing”, simplifies the code a little bit etc.
Small stuff.
2022-11-02 16:19:17 +01:00
Ivan Enderlin
da93cf7dc4
fix(indexeddb): Fix wasm_bindgen::JsValue::(from|to)_serde warnings.
...
`wasm_bindgen::JsValue::(from|to)_serde` now emit warnings because of a
circular dependency. To solve this problem, this patch now uses `gloo-utils`,
see https://rustwasm.github.io/wasm-bindgen/reference/arbitrary-data-with-serde.html#an-alternative-approach---using-json .
Ideally, we would like to use `serde_wasm_bindgen` but the behaviour isn't
the same. `gloo-utils` serializes and deserialized through JSON, whilst
`serde_wasm_bindgen` manipulates the `JsValue` directly which can be better or
worst dependending of the case. This patch conserves the JSON approach as it
was the previous and tested one.
2022-11-02 08:59:37 +01:00
Ivan Enderlin
2b4f4b17c3
chore: Update wasm-bindgen's ecosystem to latest versions.
2022-11-02 08:59:21 +01:00
Richard van der Hoff
0f104c7433
Fix unbase64 loading
2022-11-01 13:47:44 +00:00
Jonas Platte
726e4b9aa0
fix(appservice): Fix nesting of AppServiceRouter in axum::Router
2022-11-01 11:37:16 +01:00
Jonas Platte
f227f583e0
chore: Upgrade ruma-client-api
2022-11-01 11:34:05 +01:00
Jonas Platte
36444cd3a0
chore: Clean up TOML formatting
2022-11-01 11:34:05 +01:00
Jonas Platte
9c489b398d
chore: Upgrade clap dependency of xtask
2022-11-01 11:34:05 +01:00
Richard van der Hoff
ce03f016b9
Copy unbase64.js into the right place
2022-11-01 10:19:13 +00:00
Richard van der Hoff
4557494da6
Optimise unbase64
...
Use a lookup table instead of a function with if statements
2022-11-01 10:18:44 +00:00
Richard van der Hoff
093856671a
Encode the WASM as base64
...
Some nasty hackery to get around the nastiness of the JS ecosystem
2022-10-31 22:39:44 +00:00
Ivan Enderlin
471ac07c88
fix(crypto-nodejs): Set KeepAlive to false since Node.js v19
...
Disable keepAlive in download-lib.js, allowing node bindings to work on Node.JS 19
2022-10-31 14:35:57 +01:00
Will Hunt
f4f3ca4b25
A newline
2022-10-31 13:18:16 +00:00
Will Hunt
c009f54ba9
Tidy
2022-10-31 13:17:48 +00:00