@@ -21,7 +21,6 @@ import { CryptoStore, MigrationState, SecretStorePrivateKeys } from "../crypto/s
21
21
import { IndexedDBCryptoStore } from "../crypto/store/indexeddb-crypto-store.ts" ;
22
22
import { IHttpOpts , MatrixHttpApi } from "../http-api/index.ts" ;
23
23
import { requestKeyBackupVersion } from "./backup.ts" ;
24
- import { IRoomEncryption } from "../crypto/RoomList.ts" ;
25
24
import { CrossSigningKeyInfo , Curve25519AuthData } from "../crypto-api/index.ts" ;
26
25
import { RustCrypto } from "./rust-crypto.ts" ;
27
26
import { KeyBackupInfo } from "../crypto-api/keybackup.ts" ;
@@ -30,6 +29,12 @@ import { encodeBase64 } from "../base64.ts";
30
29
import decryptAESSecretStorageItem from "../utils/decryptAESSecretStorageItem.ts" ;
31
30
import { AESEncryptedSecretStoragePayload } from "../@types/AESEncryptedSecretStoragePayload.ts" ;
32
31
32
+ export interface LegacyRoomEncryption {
33
+ algorithm : string ;
34
+ rotation_period_ms ?: number ;
35
+ rotation_period_msgs ?: number ;
36
+ }
37
+
33
38
/**
34
39
* Determine if any data needs migrating from the legacy store, and do so.
35
40
*
@@ -375,7 +380,7 @@ export async function migrateRoomSettingsFromLegacyCrypto({
375
380
return ;
376
381
}
377
382
378
- let rooms : Record < string , IRoomEncryption > = { } ;
383
+ let rooms : Record < string , LegacyRoomEncryption > = { } ;
379
384
380
385
await legacyStore . doTxn ( "readwrite" , [ IndexedDBCryptoStore . STORE_ROOMS ] , ( txn ) => {
381
386
legacyStore . getEndToEndRooms ( txn , ( result ) => {
0 commit comments