Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | |
michael@0 | 5 | package org.mozilla.gecko.sync.delegates; |
michael@0 | 6 | |
michael@0 | 7 | public interface KeyUploadDelegate { |
michael@0 | 8 | /** |
michael@0 | 9 | * Called when keys have been successfully uploaded to the server. |
michael@0 | 10 | * <p> |
michael@0 | 11 | * The uploaded keys are intentionally not exposed. It is possible for two |
michael@0 | 12 | * clients to simultaneously upload keys and for each client to conclude that |
michael@0 | 13 | * its keys are current (since the server returned 200 on upload). To shorten |
michael@0 | 14 | * the window wherein two such clients can race, all clients should upload and |
michael@0 | 15 | * then immediately re-download the fetched keys. |
michael@0 | 16 | * <p> |
michael@0 | 17 | * See Bug 692700, Bug 693893. |
michael@0 | 18 | */ |
michael@0 | 19 | void onKeysUploaded(); |
michael@0 | 20 | void onKeyUploadFailed(Exception e); |
michael@0 | 21 | } |