Delete secrets flag
This commit is contained in:
parent
95e7044e0a
commit
592759a9b6
@ -35,7 +35,6 @@ export default class Services {
|
|||||||
private currentBlockHeight: number = -1;
|
private currentBlockHeight: number = -1;
|
||||||
private relayReadyResolver: (() => void) | null = null;
|
private relayReadyResolver: (() => void) | null = null;
|
||||||
private relayReadyPromise: Promise<void> | null = null;
|
private relayReadyPromise: Promise<void> | null = null;
|
||||||
private secretsAreCompromised: boolean = false;
|
|
||||||
private pendingKeyRequests: Map<string, (key: string) => void> = new Map();
|
private pendingKeyRequests: Map<string, (key: string) => void> = new Map();
|
||||||
// Private constructor to prevent direct instantiation from outside
|
// Private constructor to prevent direct instantiation from outside
|
||||||
private constructor() {}
|
private constructor() {}
|
||||||
@ -408,12 +407,6 @@ export default class Services {
|
|||||||
const sp_addresses = member.sp_addresses;
|
const sp_addresses = member.sp_addresses;
|
||||||
if (!sp_addresses || sp_addresses.length === 0) continue;
|
if (!sp_addresses || sp_addresses.length === 0) continue;
|
||||||
|
|
||||||
if (this.secretsAreCompromised) {
|
|
||||||
console.warn(`[findUnconnectedAddresses] 🚩 Flag 'secretsAreCompromised' détecté. Forçage de la reconnexion pour ${address}.`);
|
|
||||||
unconnected.add(address);
|
|
||||||
continue; // Important: passe au membre suivant
|
|
||||||
}
|
|
||||||
|
|
||||||
for (const address of sp_addresses) {
|
for (const address of sp_addresses) {
|
||||||
if (address === myAddress) continue; // On s'ignore soi-même
|
if (address === myAddress) continue; // On s'ignore soi-même
|
||||||
|
|
||||||
@ -423,10 +416,6 @@ export default class Services {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (this.secretsAreCompromised && unconnected.size > 0) {
|
|
||||||
console.log("[findUnconnectedAddresses] 🚩 Drapeau 'secretsAreCompromised' réinitialisé car une reconnexion va être tentée.");
|
|
||||||
this.secretsAreCompromised = false;
|
|
||||||
}
|
|
||||||
return unconnected;
|
return unconnected;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -901,20 +890,8 @@ export default class Services {
|
|||||||
console.debug('[Services:parseCipher] ✅ Message déchiffré, traitement...');
|
console.debug('[Services:parseCipher] ✅ Message déchiffré, traitement...');
|
||||||
await this.handleApiReturn(apiReturn);
|
await this.handleApiReturn(apiReturn);
|
||||||
|
|
||||||
// Si le déchiffrement réussit, c'est que nos secrets sont bons.
|
|
||||||
// On réinitialise le drapeau (au cas où il était levé).
|
|
||||||
if (this.secretsAreCompromised) {
|
|
||||||
console.log("[Services:parseCipher] ✅ Le déchiffrement a réussi. Réinitialisation du drapeau 'secretsAreCompromised'.");
|
|
||||||
this.secretsAreCompromised = false;
|
|
||||||
}
|
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
console.error(`[Services:parseCipher] 💥 Échec critique du déchiffrement: ${e}`);
|
console.error(`[Services:parseCipher] 💥 Échec critique du déchiffrement: ${e}`);
|
||||||
console.warn(`[Services:parseCipher] Contrainte d'anonymat: L'expéditeur est inconnu.`);
|
|
||||||
|
|
||||||
// On ne supprime rien. On lève juste un drapeau pour
|
|
||||||
// forcer 'ensureConnections' à se méfier de la BDD.
|
|
||||||
console.warn(`[Services:parseCipher] 🚩 ACTION: Levée du drapeau 'secretsAreCompromised'.`);
|
|
||||||
this.secretsAreCompromised = true;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2520,3 +2497,4 @@ export default class Services {
|
|||||||
return await this.updateProcess(process, {}, publicData, null);
|
return await this.updateProcess(process, {}, publicData, null);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user