Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove legacy manually verify specific other device #8458

Merged
merged 3 commits into from
May 23, 2023

Conversation

BillCarsonFr
Copy link
Member

@BillCarsonFr BillCarsonFr commented May 22, 2023

Type of change

  • Feature
  • Bugfix
  • Technical
  • Other :

Content

In the member profile it was possible to manually verify a specific device of a given user. This is will perform a verification to mark this device as locally verified, but local verificaiton is not considered anymore in UI, so the device will not pass to a green shield after that (it's passing to a shield with a question mark now (?), this should be changed as part of another PR).
Devices of other users are the responsability of other users, on your side you should verify the user and let him verifiy its devices.

The UI to perform this action is removed by this PR.
If you want to verify your own device you should go to settings.

Motivation and context

Screenshots / GIFs

Before After

Tests

  • Step 1
  • Step 2
  • Step ...

Tested devices

  • Physical
  • Emulator
  • OS version(s):

Checklist

@BillCarsonFr BillCarsonFr requested a review from bmarty May 22, 2023 20:36
Copy link
Member

@bmarty bmarty left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks.

@@ -69,7 +68,7 @@ class DeviceListBottomSheetViewModel @AssistedInject constructor(
val session = EntryPoints.get(viewModelContext.app(), SingletonEntryPoint::class.java).activeSessionHolder().getActiveSession()
return DeviceListViewState(
userId = userId,
allowDeviceAction = args.allowDeviceAction,
myUserId = session.myUserId,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not a blocker, but maybe also remove DeviceListBottomSheet.Args::allowDeviceAction

@@ -22,6 +22,8 @@ import org.matrix.android.sdk.api.session.crypto.model.RoomEncryptionTrustLevel
// TODO Replace usage by the use case GetEncryptionTrustLevelForDeviceUseCase
object TrustUtils {

// XXX why is this using the RoomEncryptionTrustLevel?
// should be using a new DeviceTrustShield enum
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Related to the TODO just above?

@BillCarsonFr BillCarsonFr force-pushed the feature/bca/remove_legacy_per_device_verif branch from 65d6296 to bb59a75 Compare May 23, 2023 22:07
@sonarqubecloud
Copy link

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 1 Code Smell

0.0% 0.0% Coverage
0.0% 0.0% Duplication

@BillCarsonFr BillCarsonFr merged commit 9f3255d into develop May 23, 2023
@BillCarsonFr BillCarsonFr deleted the feature/bca/remove_legacy_per_device_verif branch May 23, 2023 23:09
@BillCarsonFr BillCarsonFr self-assigned this May 24, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants