Skip to content

Commit 3ccd2e9

Browse files
committed
crypto: Remove the KeysBackup variant of the OutgoingRequest enum
Backing up room keys isn't part of the outgoing requests processing loop, instead the user is supposed to have a separate loop calling `BackupMachine::backup()`.
1 parent 1e35188 commit 3ccd2e9

File tree

5 files changed

+1
-35
lines changed

5 files changed

+1
-35
lines changed

bindings/matrix-sdk-crypto-ffi/src/responses.rs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,6 @@ impl From<OutgoingRequest> for Request {
164164
},
165165
RoomMessage(r) => Request::from(r),
166166
KeysClaim(c) => (r.request_id().to_owned(), c.clone()).into(),
167-
KeysBackup(b) => (r.request_id().to_owned(), b.clone()).into(),
168167
}
169168
}
170169
}

crates/matrix-sdk-crypto/src/backups/mod.rs

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,7 @@ use crate::{
3939
olm::{BackedUpRoomKey, ExportedRoomKey, InboundGroupSession, SignedJsonObject},
4040
store::{BackupDecryptionKey, BackupKeys, Changes, RoomKeyCounts, Store},
4141
types::{MegolmV1AuthData, RoomKeyBackupInfo, Signatures},
42-
CryptoStoreError, Device, KeysBackupRequest, OutgoingRequest, RoomKeyImportResult,
43-
SignatureError,
42+
CryptoStoreError, Device, KeysBackupRequest, RoomKeyImportResult, SignatureError,
4443
};
4544

4645
mod keys;
@@ -70,12 +69,6 @@ struct PendingBackup {
7069
sessions: BTreeMap<OwnedRoomId, BTreeMap<SenderKey, BTreeSet<SessionId>>>,
7170
}
7271

73-
impl From<PendingBackup> for OutgoingRequest {
74-
fn from(b: PendingBackup) -> Self {
75-
OutgoingRequest { request_id: b.request_id, request: Arc::new(b.request.into()) }
76-
}
77-
}
78-
7972
/// The result of a signature verification of a signed JSON object.
8073
#[derive(Clone, Debug, Default, PartialEq, Eq)]
8174
pub struct SignatureVerification {

crates/matrix-sdk-crypto/src/requests.rs

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -218,8 +218,6 @@ pub enum OutgoingRequests {
218218
/// A room message request, usually for sending in-room interactive
219219
/// verification events.
220220
RoomMessage(RoomMessageRequest),
221-
/// A request that will back up a batch of room keys to the server.
222-
KeysBackup(KeysBackupRequest),
223221
}
224222

225223
#[cfg(test)]
@@ -235,12 +233,6 @@ impl From<KeysQueryRequest> for OutgoingRequests {
235233
}
236234
}
237235

238-
impl From<KeysBackupRequest> for OutgoingRequests {
239-
fn from(r: KeysBackupRequest) -> Self {
240-
Self::KeysBackup(r)
241-
}
242-
}
243-
244236
impl From<KeysClaimRequest> for OutgoingRequests {
245237
fn from(r: KeysClaimRequest) -> Self {
246238
Self::KeysClaim(r)

crates/matrix-sdk-crypto/src/verification/event_enums.rs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -771,7 +771,6 @@ impl TryFrom<OutgoingRequest> for OutgoingContent {
771771
match value.request() {
772772
crate::OutgoingRequests::KeysUpload(_)
773773
| crate::OutgoingRequests::KeysQuery(_)
774-
| crate::OutgoingRequests::KeysBackup(_)
775774
| crate::OutgoingRequests::SignatureUpload(_)
776775
| crate::OutgoingRequests::KeysClaim(_) => Err("Invalid request type".to_owned()),
777776
crate::OutgoingRequests::ToDeviceRequest(r) => Self::try_from(r.clone()),

crates/matrix-sdk/src/encryption/mod.rs

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,6 @@ use matrix_sdk_base::crypto::{
3636
use matrix_sdk_common::executor::spawn;
3737
use ruma::{
3838
api::client::{
39-
backup::add_backup_keys::v3::Response as KeysBackupResponse,
4039
keys::{
4140
get_keys, upload_keys, upload_signing_keys::v3::Request as UploadSigningKeysRequest,
4241
},
@@ -541,27 +540,11 @@ impl Client {
541540
let response = self.send(request.clone(), None).await?;
542541
self.mark_request_as_sent(r.request_id(), &response).await?;
543542
}
544-
OutgoingRequests::KeysBackup(request) => {
545-
let response = self.send_backup_request(request).await?;
546-
self.mark_request_as_sent(r.request_id(), &response).await?;
547-
}
548543
}
549544

550545
Ok(())
551546
}
552547

553-
async fn send_backup_request(
554-
&self,
555-
request: &matrix_sdk_base::crypto::KeysBackupRequest,
556-
) -> Result<KeysBackupResponse> {
557-
let request = ruma::api::client::backup::add_backup_keys::v3::Request::new(
558-
request.version.clone(),
559-
request.rooms.clone(),
560-
);
561-
562-
Ok(self.send(request, None).await?)
563-
}
564-
565548
pub(crate) async fn send_outgoing_requests(&self) -> Result<()> {
566549
const MAX_CONCURRENT_REQUESTS: usize = 20;
567550

0 commit comments

Comments
 (0)