#![doc = include_str!("../README.md")]
#![cfg_attr(docsrs, feature(doc_auto_cfg))]
#![warn(missing_docs, missing_debug_implementations)]
#![cfg_attr(target_arch = "wasm32", allow(clippy::arc_with_non_send_sync))]
pub mod backups;
mod ciphers;
pub mod dehydrated_devices;
mod error;
mod file_encryption;
mod gossiping;
mod identities;
mod machine;
pub mod olm;
pub mod requests;
pub mod secret_storage;
mod session_manager;
pub mod store;
pub mod types;
mod utilities;
mod verification;
#[cfg(any(test, feature = "testing"))]
pub mod testing {
pub use crate::identities::{
device::testing::get_device,
user::testing::{
get_other_identity, get_own_identity, simulate_key_query_response_for_verification,
},
};
}
use std::collections::{BTreeMap, BTreeSet};
pub use identities::room_identity_state::{
IdentityState, IdentityStatusChange, RoomIdentityChange, RoomIdentityProvider,
RoomIdentityState,
};
use ruma::OwnedRoomId;
#[derive(Debug, Clone, PartialEq, Eq)]
pub struct RoomKeyImportResult {
pub imported_count: usize,
pub total_count: usize,
pub keys: BTreeMap<OwnedRoomId, BTreeMap<String, BTreeSet<String>>>,
}
impl RoomKeyImportResult {
pub(crate) fn new(
imported_count: usize,
total_count: usize,
keys: BTreeMap<OwnedRoomId, BTreeMap<String, BTreeSet<String>>>,
) -> Self {
Self { imported_count, total_count, keys }
}
}
pub use error::{
EventError, MegolmError, OlmError, SessionCreationError, SessionRecipientCollectionError,
SetRoomSettingsError, SignatureError,
};
pub use file_encryption::{
decrypt_room_key_export, encrypt_room_key_export, AttachmentDecryptor, AttachmentEncryptor,
DecryptorError, KeyExportError, MediaEncryptionInfo,
};
pub use gossiping::{GossipRequest, GossippedSecret};
pub use identities::{
Device, DeviceData, LocalTrust, OtherUserIdentity, OtherUserIdentityData, OwnUserIdentity,
OwnUserIdentityData, UserDevices, UserIdentity, UserIdentityData,
};
pub use machine::{CrossSigningBootstrapRequests, EncryptionSyncChanges, OlmMachine};
use matrix_sdk_common::deserialized_responses::{DecryptedRoomEvent, UnableToDecryptInfo};
#[cfg(feature = "qrcode")]
pub use matrix_sdk_qrcode;
pub use olm::{Account, CrossSigningStatus, EncryptionSettings, Session};
pub use requests::{
IncomingResponse, KeysBackupRequest, KeysQueryRequest, OutgoingRequest, OutgoingRequests,
OutgoingVerificationRequest, RoomMessageRequest, ToDeviceRequest, UploadSigningKeysRequest,
};
use serde::{Deserialize, Serialize};
pub use session_manager::CollectStrategy;
pub use store::{
CrossSigningKeyExport, CryptoStoreError, SecretImportError, SecretInfo, TrackedUser,
};
pub use verification::{
format_emojis, AcceptSettings, AcceptedProtocols, CancelInfo, Emoji, EmojiShortAuthString, Sas,
SasState, Verification, VerificationRequest, VerificationRequestState,
};
#[cfg(feature = "qrcode")]
pub use verification::{QrVerification, QrVerificationState, ScanError};
#[doc(no_inline)]
pub use vodozemac;
pub static VERSION: &str = env!("CARGO_PKG_VERSION");
#[cfg(test)]
matrix_sdk_test::init_tracing_for_tests!();
#[cfg(feature = "uniffi")]
uniffi::setup_scaffolding!();
#[derive(Clone, Copy, Debug, Deserialize, Serialize)]
#[cfg_attr(feature = "uniffi", derive(uniffi::Enum))]
pub enum TrustRequirement {
Untrusted,
CrossSignedOrLegacy,
CrossSigned,
}
#[derive(Clone, Debug, Deserialize, Serialize)]
#[cfg_attr(feature = "uniffi", derive(uniffi::Record))]
pub struct DecryptionSettings {
pub sender_device_trust_requirement: TrustRequirement,
}
#[derive(Clone, Debug, Serialize, Deserialize)]
pub enum RoomEventDecryptionResult {
Decrypted(DecryptedRoomEvent),
UnableToDecrypt(UnableToDecryptInfo),
}