Merge pull request #7623 from vector-im/dependabot/gradle/io.gitlab.arturbosch.detekt-1.22.0

Bump io.gitlab.arturbosch.detekt from 1.21.0 to 1.22.0
This commit is contained in:
Florian Renaud 2022-11-24 13:38:37 +01:00 committed by GitHub
commit ae996ae197
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
6 changed files with 42 additions and 53 deletions

View File

@ -43,7 +43,7 @@ plugins {
// ktlint Plugin
id "org.jlleitschuh.gradle.ktlint" version "11.0.0"
// Detekt
id "io.gitlab.arturbosch.detekt" version "1.21.0"
id "io.gitlab.arturbosch.detekt" version "1.22.0"
// Ksp
id "com.google.devtools.ksp" version "1.7.21-1.0.8"

View File

@ -83,9 +83,7 @@ internal class CrossSigningOlm @Inject constructor(
val signaturesMadeByMyKey = signatures[myUserID] // Signatures made by me
?.get("ed25519:$pubKey")
if (signaturesMadeByMyKey.isNullOrBlank()) {
throw IllegalArgumentException("Not signed with my key $type")
}
require(signaturesMadeByMyKey.orEmpty().isNotBlank()) { "Not signed with my key $type" }
// Check that Alice USK signature of Bob MSK is valid
olmUtility.verifyEd25519Signature(signaturesMadeByMyKey, pubKey, JsonCanonicalizer.getCanonicalJson(Map::class.java, signable))

View File

@ -47,9 +47,8 @@ internal class DefaultEncryptEventTask @Inject constructor(
// don't want to wait for any query
// if (!params.crypto.isRoomEncrypted(params.roomId)) return params.event
val localEvent = params.event
if (localEvent.eventId == null || localEvent.type == null) {
throw IllegalArgumentException()
}
require(localEvent.eventId != null)
require(localEvent.type != null)
localEchoRepository.updateSendState(localEvent.eventId, localEvent.roomId, SendState.ENCRYPTING)

View File

@ -1140,7 +1140,7 @@ internal class DefaultVerificationService @Inject constructor(
override fun beginKeyVerification(method: VerificationMethod, otherUserId: String, otherDeviceId: String, transactionId: String?): String? {
val txID = transactionId?.takeIf { it.isNotEmpty() } ?: createUniqueIDForTransaction(otherUserId, otherDeviceId)
// should check if already one (and cancel it)
if (method == VerificationMethod.SAS) {
require(method == VerificationMethod.SAS) { "Unknown verification method" }
val tx = DefaultOutgoingSASDefaultVerificationTransaction(
setDeviceVerificationAction,
userId,
@ -1159,9 +1159,6 @@ internal class DefaultVerificationService @Inject constructor(
tx.start()
return txID
} else {
throw IllegalArgumentException("Unknown verification method")
}
}
override fun requestKeyVerificationInDMs(
@ -1343,7 +1340,7 @@ internal class DefaultVerificationService @Inject constructor(
otherUserId: String,
otherDeviceId: String
): String {
if (method == VerificationMethod.SAS) {
require(method == VerificationMethod.SAS) { "Unknown verification method" }
val tx = DefaultOutgoingSASDefaultVerificationTransaction(
setDeviceVerificationAction,
userId,
@ -1362,9 +1359,6 @@ internal class DefaultVerificationService @Inject constructor(
tx.start()
return transactionId
} else {
throw IllegalArgumentException("Unknown verification method")
}
}
override fun readyPendingVerificationInDMs(

View File

@ -55,7 +55,7 @@ complexity:
active: false
LongParameterList:
active: false
ComplexMethod:
CyclomaticComplexMethod:
active: false
NestedBlockDepth:
active: false

View File

@ -37,9 +37,7 @@ class VectorViewModelFactory @Inject constructor(
}
}
}
if (creator == null) {
throw IllegalArgumentException("Unknown model class: $modelClass")
}
require(creator != null) { "Unknown model class: $modelClass" }
try {
@Suppress("UNCHECKED_CAST")
return creator.get() as T