You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, the public key is posted to the E2E server side app and stored there for the user before the Android app tries to store the associated keys locally. If this fails, the user is prompted to create a new key the next time they try to go through the encryption process. This will then always fail because the server will return a 409 error as a public key already exists. I think the correct behavior would be to send a DELETE request to the E2E API to remove the uploaded public key.
Furthermore, the private key needs to be removed as well.
The text was updated successfully, but these errors were encountered:
I gave it some thought during the night and how about we store the keys locally first before pushing them to the server. If the server returns 200 OK then all is good, if not then we can simply delete the keys locally instead of sending another request to the server.
The private key is stored after the public key.
If the private key fails, we delete public key.
If the private key storage suceeds, we store both locally.
Why (and where) would you try to delete the private key?
Currently, the public key is posted to the E2E server side app and stored there for the user before the Android app tries to store the associated keys locally. If this fails, the user is prompted to create a new key the next time they try to go through the encryption process. This will then always fail because the server will return a 409 error as a public key already exists. I think the correct behavior would be to send a DELETE request to the E2E API to remove the uploaded public key.
Furthermore, the private key needs to be removed as well.
The text was updated successfully, but these errors were encountered: