-
Notifications
You must be signed in to change notification settings - Fork 754
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove legacy manually verify specific other device #8458
Remove legacy manually verify specific other device #8458
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks.
@@ -69,7 +68,7 @@ class DeviceListBottomSheetViewModel @AssistedInject constructor( | |||
val session = EntryPoints.get(viewModelContext.app(), SingletonEntryPoint::class.java).activeSessionHolder().getActiveSession() | |||
return DeviceListViewState( | |||
userId = userId, | |||
allowDeviceAction = args.allowDeviceAction, | |||
myUserId = session.myUserId, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not a blocker, but maybe also remove DeviceListBottomSheet.Args::allowDeviceAction
@@ -22,6 +22,8 @@ import org.matrix.android.sdk.api.session.crypto.model.RoomEncryptionTrustLevel | |||
// TODO Replace usage by the use case GetEncryptionTrustLevelForDeviceUseCase | |||
object TrustUtils { | |||
|
|||
// XXX why is this using the RoomEncryptionTrustLevel? | |||
// should be using a new DeviceTrustShield enum |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Related to the TODO just above?
65d6296
to
bb59a75
Compare
Kudos, SonarCloud Quality Gate passed! |
Type of change
Content
In the member profile it was possible to manually verify a specific device of a given user. This is will perform a verification to mark this device as locally verified, but local verificaiton is not considered anymore in UI, so the device will not pass to a green shield after that (it's passing to a shield with a question mark now (?), this should be changed as part of another PR).
Devices of other users are the responsability of other users, on your side you should verify the user and let him verifiy its devices.
The UI to perform this action is removed by this PR.
If you want to verify your own device you should go to settings.
Motivation and context
Screenshots / GIFs
Tests
Tested devices
Checklist