Page MenuHomePhabricator

[lib][keyserver] Delete MORE_ONE_TIME_KEYS mechanism
ClosedPublic

Authored by tomek on Feb 26 2024, 8:20 AM.
Tags
None
Referenced Files
F3369377: D11177.diff
Mon, Nov 25, 10:31 PM
F3365896: D11177.diff
Mon, Nov 25, 8:18 AM
Unknown Object (File)
Sun, Nov 24, 9:52 AM
Unknown Object (File)
Wed, Nov 13, 12:51 PM
Unknown Object (File)
Wed, Nov 13, 12:51 PM
Unknown Object (File)
Wed, Nov 13, 12:49 PM
Unknown Object (File)
Wed, Nov 13, 12:40 PM
Unknown Object (File)
Wed, Nov 13, 9:40 AM
Subscribers

Details

Summary

We no longer rely on keyserver to keep the keys - this is a responsibility of Identity service.

https://linear.app/comm/issue/ENG-6521/check-serverrequesttypesmore-one-time-keys

Depends on D11176

Test Plan

Check if keyserver DB migration deletes the table.
Check if it is possible to run web and native client.
Run an older native client and check if it works with new keyserver.

Diff Detail

Repository
rCOMM Comm
Branch
sockets
Lint
No Lint Coverage
Unit
No Test Coverage

Event Timeline

Harbormaster returned this revision to the author for changes because remote builds failed.Feb 26 2024, 8:27 AM
Harbormaster failed remote builds in B27181: Diff 37613!
tomek requested review of this revision.Feb 26 2024, 8:58 AM

Looks good, just want to make sure that this won't break any older clients? I see the following in Test Plan:

Run an older native client and check if it works with new keyserver.

so I'm assuming this table and functionality was never used?

This revision is now accepted and ready to land.Feb 26 2024, 2:21 PM
In D11177#323033, @atul wrote:

Looks good, just want to make sure that this won't break any older clients? I see the following in Test Plan:

Run an older native client and check if it works with new keyserver.

so I'm assuming this table and functionality was never used?

MORE_ONE_TIME_KEYS request is sent by the server - so if a new version of the server is deployed, clients will no longer need to support responding to it. But the table was used in a way - the server was writing to it, but noone asked for the keys.

getSessionPublicKeys endpoint was never used - verified that by searching git git log -S getSessionPublicKeys --source --all - it was modified in a couple of diffs where the validators were introduced. It appeared for the first time in https://phab.comm.dev/D2933, where it was renamed, but there were no usages at that point.