@@ -68,12 +68,12 @@ const DATABASE_NAME: &str = "matrix-sdk-state.sqlite3";
68
68
69
69
/// Identifier of the latest database version.
70
70
///
71
- /// This is used to figure whether the sqlite database requires a migration.
71
+ /// This is used to figure whether the SQLite database requires a migration.
72
72
/// Every new SQL migration should imply a bump of this number, and changes in
73
- /// the [`SqliteStateStore::run_migrations`] function..
73
+ /// the [`SqliteStateStore::run_migrations`] function.
74
74
const DATABASE_VERSION : u8 = 12 ;
75
75
76
- /// A sqlite based cryptostore .
76
+ /// An SQLite- based state store .
77
77
#[ derive( Clone ) ]
78
78
pub struct SqliteStateStore {
79
79
store_cipher : Option < Arc < StoreCipher > > ,
@@ -88,7 +88,7 @@ impl fmt::Debug for SqliteStateStore {
88
88
}
89
89
90
90
impl SqliteStateStore {
91
- /// Open the sqlite -based state store at the given path using the given
91
+ /// Open the SQLite -based state store at the given path using the given
92
92
/// passphrase to encrypt private data.
93
93
pub async fn open (
94
94
path : impl AsRef < Path > ,
@@ -97,7 +97,7 @@ impl SqliteStateStore {
97
97
Self :: open_with_config ( SqliteStoreConfig :: new ( path) . passphrase ( passphrase) ) . await
98
98
}
99
99
100
- /// Open the sqlite -based state store with the config open config.
100
+ /// Open the SQLite -based state store with the config open config.
101
101
pub async fn open_with_config ( config : SqliteStoreConfig ) -> Result < Self , OpenStoreError > {
102
102
let SqliteStoreConfig { path, passphrase, pool_config, runtime_config } = config;
103
103
@@ -114,7 +114,7 @@ impl SqliteStateStore {
114
114
Ok ( this)
115
115
}
116
116
117
- /// Create a sqlite -based state store using the given sqlite database pool.
117
+ /// Create an SQLite -based state store using the given SQLite database pool.
118
118
/// The given passphrase will be used to encrypt private data.
119
119
async fn open_with_pool (
120
120
pool : SqlitePool ,
@@ -2200,9 +2200,9 @@ mod encrypted_tests {
2200
2200
let cache_size =
2201
2201
conn. query_row ( "PRAGMA cache_size" , ( ) , |row| row. get :: < _ , i32 > ( 0 ) ) . await . unwrap ( ) ;
2202
2202
2203
- // The value passed to `SqliteStoreConfig` is in bytes. Check it is converted
2204
- // to kibibytes. Also, it must be a negative value because it _is_ the size in
2205
- // kibibytes, not in page size.
2203
+ // The value passed to `SqliteStoreConfig` is in bytes. Check it is
2204
+ // converted to kibibytes. Also, it must be a negative value because it
2205
+ // _is_ the size in kibibytes, not in page size.
2206
2206
assert_eq ! ( cache_size, -( 1500 / 1024 ) ) ;
2207
2207
}
2208
2208
@@ -2219,8 +2219,8 @@ mod encrypted_tests {
2219
2219
. await
2220
2220
. unwrap ( ) ;
2221
2221
2222
- // The value passed to `SqliteStoreConfig` is in bytes. It stays in bytes in
2223
- // SQLite.
2222
+ // The value passed to `SqliteStoreConfig` is in bytes. It stays in
2223
+ // bytes in SQLite.
2224
2224
assert_eq ! ( journal_size_limit, 1500 ) ;
2225
2225
}
2226
2226
0 commit comments