Details
Added this code in web:
const getInitialReduxState =
(
callServerEndpoint: CallServerEndpoint,
): (URLInfo => Promise<InitialReduxState>) =>
async urlInfo => {
const response = await callServerEndpoint(
'get_initial_redux_state',
urlInfo,
);
return {
navInfo: response.navInfo,
<... omitted for brewity ...>
keyserverInfo: response.keyserverInfo,
};
};called it and checked if it returned expected fields.
Diff Detail
- Repository
- rCOMM Comm
- Lint
No Lint Coverage - Unit
No Test Coverage
Event Timeline
| keyserver/src/responders/redux-state-responders.js | ||
|---|---|---|
| 93 | Removed: let urlInfo = infoFromURL(decodeURI(req.url));
try {
urlInfo = await validateInput(viewer, urlInfoValidator, urlInfo, true);
} catch (exc) {
// We should still be able to handle older links
if (exc.message !== 'invalid_client_id_prefix') {
throw exc;
}
}because urlInfo is just a normal input now. Handling old urls with old id schema will be handled in the later diffs | |
| 204 | Previously we returned whole userStore with default inconsistencyReports: return {
userInfos: hasNotAcknowledgedPolicies ? {} : userInfos,
inconsistencyReports: [],
}; | |
| 316–319 | Previosuly: return {
keyserverInfos: {
[ashoatKeyserverID]: {
cookie: undefined,
sessionID,
updatesCurrentAsOf,
urlPrefix,
connection: defaultConnectionInfo,
lastCommunicatedPlatformDetails: null,
},
},
};Now we return only non-persisted, non-default field and only for the current keyserver. | |
Looks like a straightforward change
Probably moving policies logic from the responder itself to a higher place where we just avoid returning anything will make this code simpler - but since this will change in the future anyway (ENG-4137) it's okay the way it is
| keyserver/src/responders/redux-state-responders.js | ||
|---|---|---|
| 4–6 | can be merged | |
Probably moving policies logic from the responder itself to a higher place where we just avoid returning anything will make this code simpler - but since this will change in the future anyway (ENG-4137) it's okay the way it is
After we move the user data out of keyserver and into identity/backup restoration, we should be able to handle this endpoint like the rest.