In the next diff, I'll need to access the cookieHash inside updateCookie to check if it's a bcrypt or sha256 hash.
Details
Details
- Reviewers
atul tomek inka - Commits
- rCOMMf8605b01bd87: [keyserver] Add cookieHash to Viewer object
Was tested in combination with next diff:
- Log out on the web app
- Check out a version of master with 397b4542fa7b38d8468038d74f3de84969f9dc36 and 12d02949bb4bb44a129163def1a7a056a7791b74 reverted
- Log back in on the web app
- Confirm that I have a bcrypt hash by running SELECT * FROM cookies ORDER BY last_used DESC LIMIT 1 in MariaDB console
- Close web app tab, kill keyserver, and check out master + this diff + next diff
- Open web app tab again
- Confirm that I have a sha256 hash by rerunning query from step 4
- Confirm that the cookie ID is the same between steps 4 and 7
Diff Detail
Diff Detail
- Repository
- rCOMM Comm
- Lint
Lint Not Applicable - Unit
Tests Not Applicable
Event Timeline
keyserver/src/session/viewer.js | ||
---|---|---|
216–219 ↗ | (On Diff #32303) | This invariant may seem scary, but our usage in cookieHash in the next diff is addressed in that diff' description:
We have an equivalent invariants for cookiePassword already that will trigger in this scenario anyways, so I don't think this should be problematic. |