matrix_sdk_crypto_ffi/
error.rs1#![allow(missing_docs)]
2
3use matrix_sdk_crypto::{
4 store::{CryptoStoreError as InnerStoreError, DehydrationError as InnerDehydrationError},
5 KeyExportError, MegolmError, OlmError, SecretImportError as RustSecretImportError,
6 SignatureError as InnerSignatureError,
7};
8use matrix_sdk_sqlite::OpenStoreError;
9use ruma::{IdParseError, OwnedUserId};
10
11#[derive(Debug, thiserror::Error, uniffi::Error)]
12#[uniffi(flat_error)]
13pub enum KeyImportError {
14 #[error(transparent)]
15 Export(#[from] KeyExportError),
16 #[error(transparent)]
17 CryptoStore(#[from] InnerStoreError),
18 #[error(transparent)]
19 Json(#[from] serde_json::Error),
20}
21
22#[derive(Debug, thiserror::Error, uniffi::Error)]
23#[uniffi(flat_error)]
24pub enum SecretImportError {
25 #[error(transparent)]
26 CryptoStore(#[from] InnerStoreError),
27 #[error(transparent)]
28 Import(#[from] RustSecretImportError),
29}
30
31#[derive(Debug, thiserror::Error, uniffi::Error)]
32#[uniffi(flat_error)]
33pub enum SignatureError {
34 #[error(transparent)]
35 Signature(#[from] InnerSignatureError),
36 #[error(transparent)]
37 Identifier(#[from] IdParseError),
38 #[error(transparent)]
39 CryptoStore(#[from] InnerStoreError),
40 #[error("Unknown device {0} {1}")]
41 UnknownDevice(OwnedUserId, String),
42 #[error("Unknown user identity {0}")]
43 UnknownUserIdentity(String),
44}
45
46#[derive(Debug, thiserror::Error, uniffi::Error)]
47#[uniffi(flat_error)]
48pub enum CryptoStoreError {
49 #[error("Failed to open the store")]
50 OpenStore(#[from] OpenStoreError),
51 #[error(transparent)]
52 CryptoStore(#[from] InnerStoreError),
53 #[error(transparent)]
54 OlmError(#[from] OlmError),
55 #[error(transparent)]
56 Serialization(#[from] serde_json::Error),
57 #[error("The given string is not a valid user ID: source {0}, error {1}")]
58 InvalidUserId(String, IdParseError),
59 #[error(transparent)]
60 Identifier(#[from] IdParseError),
61 #[error(transparent)]
62 DehydrationError(#[from] InnerDehydrationError),
63}
64
65#[derive(Debug, thiserror::Error, uniffi::Error)]
66pub enum DecryptionError {
67 #[error("serialization error: {error}")]
68 Serialization { error: String },
69 #[error("identifier parsing error: {error}")]
70 Identifier { error: String },
71 #[error("megolm error: {error}")]
72 Megolm { error: String },
73 #[error("missing room key: {error}")]
74 MissingRoomKey { error: String, withheld_code: Option<String> },
75 #[error("store error: {error}")]
76 Store { error: String },
77}
78
79impl From<MegolmError> for DecryptionError {
80 fn from(value: MegolmError) -> Self {
81 match value {
82 MegolmError::MissingRoomKey(withheld_code) => Self::MissingRoomKey {
83 error: "Withheld Inbound group session".to_owned(),
84 withheld_code: withheld_code.map(|w| w.as_str().to_owned()),
85 },
86 _ => Self::Megolm { error: value.to_string() },
87 }
88 }
89}
90
91impl From<serde_json::Error> for DecryptionError {
92 fn from(err: serde_json::Error) -> Self {
93 Self::Serialization { error: err.to_string() }
94 }
95}
96
97impl From<IdParseError> for DecryptionError {
98 fn from(err: IdParseError) -> Self {
99 Self::Identifier { error: err.to_string() }
100 }
101}
102
103impl From<InnerStoreError> for DecryptionError {
104 fn from(err: InnerStoreError) -> Self {
105 Self::Store { error: err.to_string() }
106 }
107}
108
109#[cfg(test)]
110mod tests {
111 use assert_matches2::assert_let;
112 use matrix_sdk_crypto::MegolmError;
113
114 use super::DecryptionError;
115
116 #[test]
117 fn test_withheld_error_mapping() {
118 use matrix_sdk_common::deserialized_responses::WithheldCode;
119
120 let inner_error = MegolmError::MissingRoomKey(Some(WithheldCode::Unverified));
121
122 let binding_error: DecryptionError = inner_error.into();
123
124 assert_let!(
125 DecryptionError::MissingRoomKey { error: _, withheld_code: Some(code) } = binding_error
126 );
127 assert_eq!("m.unverified", code)
128 }
129}