@@ -68,12 +68,12 @@ const DATABASE_NAME: &str = "matrix-sdk-state.sqlite3";
6868
6969/// Identifier of the latest database version.
7070///
71- /// This is used to figure whether the sqlite database requires a migration.
71+ /// This is used to figure whether the SQLite database requires a migration.
7272/// Every new SQL migration should imply a bump of this number, and changes in
73- /// the [`SqliteStateStore::run_migrations`] function..
73+ /// the [`SqliteStateStore::run_migrations`] function.
7474const DATABASE_VERSION : u8 = 12 ;
7575
76- /// A sqlite based cryptostore .
76+ /// An SQLite- based state store .
7777#[ derive( Clone ) ]
7878pub struct SqliteStateStore {
7979 store_cipher : Option < Arc < StoreCipher > > ,
@@ -88,7 +88,7 @@ impl fmt::Debug for SqliteStateStore {
8888}
8989
9090impl SqliteStateStore {
91- /// Open the sqlite -based state store at the given path using the given
91+ /// Open the SQLite -based state store at the given path using the given
9292 /// passphrase to encrypt private data.
9393 pub async fn open (
9494 path : impl AsRef < Path > ,
@@ -97,7 +97,7 @@ impl SqliteStateStore {
9797 Self :: open_with_config ( SqliteStoreConfig :: new ( path) . passphrase ( passphrase) ) . await
9898 }
9999
100- /// Open the sqlite -based state store with the config open config.
100+ /// Open the SQLite -based state store with the config open config.
101101 pub async fn open_with_config ( config : SqliteStoreConfig ) -> Result < Self , OpenStoreError > {
102102 let SqliteStoreConfig { path, passphrase, pool_config, runtime_config } = config;
103103
@@ -114,7 +114,7 @@ impl SqliteStateStore {
114114 Ok ( this)
115115 }
116116
117- /// Create a sqlite -based state store using the given sqlite database pool.
117+ /// Create an SQLite -based state store using the given SQLite database pool.
118118 /// The given passphrase will be used to encrypt private data.
119119 async fn open_with_pool (
120120 pool : SqlitePool ,
@@ -2200,9 +2200,9 @@ mod encrypted_tests {
22002200 let cache_size =
22012201 conn. query_row ( "PRAGMA cache_size" , ( ) , |row| row. get :: < _ , i32 > ( 0 ) ) . await . unwrap ( ) ;
22022202
2203- // The value passed to `SqliteStoreConfig` is in bytes. Check it is converted
2204- // to kibibytes. Also, it must be a negative value because it _is_ the size in
2205- // kibibytes, not in page size.
2203+ // The value passed to `SqliteStoreConfig` is in bytes. Check it is
2204+ // converted to kibibytes. Also, it must be a negative value because it
2205+ // _is_ the size in kibibytes, not in page size.
22062206 assert_eq ! ( cache_size, -( 1500 / 1024 ) ) ;
22072207 }
22082208
@@ -2219,8 +2219,8 @@ mod encrypted_tests {
22192219 . await
22202220 . unwrap ( ) ;
22212221
2222- // The value passed to `SqliteStoreConfig` is in bytes. It stays in bytes in
2223- // SQLite.
2222+ // The value passed to `SqliteStoreConfig` is in bytes. It stays in
2223+ // bytes in SQLite.
22242224 assert_eq ! ( journal_size_limit, 1500 ) ;
22252225 }
22262226
0 commit comments