mirror of
https://github.com/google/nomulus.git
synced 2025-07-20 09:46:03 +02:00
Delete all Braintree code
We never launched this, don't planning on launching it now anyway, and it's rotted over the past two years anyway. ------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=202993577
This commit is contained in:
parent
7023b818b7
commit
32b3563126
67 changed files with 28 additions and 3352 deletions
|
@ -109,7 +109,6 @@ public final class DummyKeyringModule {
|
|||
"not a real login",
|
||||
"not a real password",
|
||||
"not a real login",
|
||||
"not a real credential",
|
||||
"not a real key");
|
||||
"not a real credential");
|
||||
}
|
||||
}
|
||||
|
|
|
@ -38,7 +38,6 @@ public final class InMemoryKeyring implements Keyring {
|
|||
private final String marksdbLordnPassword;
|
||||
private final String marksdbSmdrlLogin;
|
||||
private final String jsonCredential;
|
||||
private final String braintreePrivateKey;
|
||||
|
||||
public InMemoryKeyring(
|
||||
PGPKeyPair rdeStagingKey,
|
||||
|
@ -52,8 +51,7 @@ public final class InMemoryKeyring implements Keyring {
|
|||
String marksdbDnlLogin,
|
||||
String marksdbLordnPassword,
|
||||
String marksdbSmdrlLogin,
|
||||
String jsonCredential,
|
||||
String braintreePrivateKey) {
|
||||
String jsonCredential) {
|
||||
checkArgument(PgpHelper.isSigningKey(rdeSigningKey.getPublicKey()),
|
||||
"RDE signing key must support signing: %s", rdeSigningKey.getKeyID());
|
||||
checkArgument(rdeStagingKey.getPublicKey().isEncryptionKey(),
|
||||
|
@ -76,7 +74,6 @@ public final class InMemoryKeyring implements Keyring {
|
|||
this.marksdbLordnPassword = checkNotNull(marksdbLordnPassword, "marksdbLordnPassword");
|
||||
this.marksdbSmdrlLogin = checkNotNull(marksdbSmdrlLogin, "marksdbSmdrlLogin");
|
||||
this.jsonCredential = checkNotNull(jsonCredential, "jsonCredential");
|
||||
this.braintreePrivateKey = checkNotNull(braintreePrivateKey, "braintreePrivateKey");
|
||||
}
|
||||
|
||||
@Override
|
||||
|
@ -144,11 +141,6 @@ public final class InMemoryKeyring implements Keyring {
|
|||
return jsonCredential;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getBraintreePrivateKey() {
|
||||
return braintreePrivateKey;
|
||||
}
|
||||
|
||||
/** Does nothing. */
|
||||
@Override
|
||||
public void close() {}
|
||||
|
|
|
@ -120,10 +120,4 @@ public final class KeyModule {
|
|||
static String provideJsonCredential(Keyring keyring) {
|
||||
return keyring.getJsonCredential();
|
||||
}
|
||||
|
||||
@Provides
|
||||
@Key("braintreePrivateKey")
|
||||
static String provideBraintreePrivateKey(Keyring keyring) {
|
||||
return keyring.getBraintreePrivateKey();
|
||||
}
|
||||
}
|
||||
|
|
|
@ -149,15 +149,6 @@ public interface Keyring extends AutoCloseable {
|
|||
*/
|
||||
String getJsonCredential();
|
||||
|
||||
/**
|
||||
* Returns Braintree API private key for Registry.
|
||||
*
|
||||
* <p>This is a base32 value copied from the Braintree website.
|
||||
*
|
||||
* @see google.registry.config.RegistryConfig.ConfigModule#provideBraintreePublicKey
|
||||
*/
|
||||
String getBraintreePrivateKey();
|
||||
|
||||
// Don't throw so try-with-resources works better.
|
||||
@Override
|
||||
void close();
|
||||
|
|
|
@ -64,7 +64,6 @@ public class KmsKeyring implements Keyring {
|
|||
}
|
||||
|
||||
enum StringKeyLabel {
|
||||
BRAINTREE_PRIVATE_KEY_STRING,
|
||||
ICANN_REPORTING_PASSWORD_STRING,
|
||||
JSON_CREDENTIAL_STRING,
|
||||
MARKSDB_DNL_LOGIN_STRING,
|
||||
|
@ -150,11 +149,6 @@ public class KmsKeyring implements Keyring {
|
|||
return getString(StringKeyLabel.JSON_CREDENTIAL_STRING);
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getBraintreePrivateKey() {
|
||||
return getString(StringKeyLabel.BRAINTREE_PRIVATE_KEY_STRING);
|
||||
}
|
||||
|
||||
/** No persistent resources are maintained for this Keyring implementation. */
|
||||
@Override
|
||||
public void close() {}
|
||||
|
|
|
@ -24,7 +24,6 @@ import static google.registry.keyring.kms.KmsKeyring.PublicKeyLabel.BRDA_SIGNING
|
|||
import static google.registry.keyring.kms.KmsKeyring.PublicKeyLabel.RDE_RECEIVER_PUBLIC;
|
||||
import static google.registry.keyring.kms.KmsKeyring.PublicKeyLabel.RDE_SIGNING_PUBLIC;
|
||||
import static google.registry.keyring.kms.KmsKeyring.PublicKeyLabel.RDE_STAGING_PUBLIC;
|
||||
import static google.registry.keyring.kms.KmsKeyring.StringKeyLabel.BRAINTREE_PRIVATE_KEY_STRING;
|
||||
import static google.registry.keyring.kms.KmsKeyring.StringKeyLabel.ICANN_REPORTING_PASSWORD_STRING;
|
||||
import static google.registry.keyring.kms.KmsKeyring.StringKeyLabel.JSON_CREDENTIAL_STRING;
|
||||
import static google.registry.keyring.kms.KmsKeyring.StringKeyLabel.MARKSDB_DNL_LOGIN_STRING;
|
||||
|
@ -116,10 +115,6 @@ public final class KmsUpdater {
|
|||
return setString(credential, JSON_CREDENTIAL_STRING);
|
||||
}
|
||||
|
||||
public KmsUpdater setBraintreePrivateKey(String braintreePrivateKey) {
|
||||
return setString(braintreePrivateKey, BRAINTREE_PRIVATE_KEY_STRING);
|
||||
}
|
||||
|
||||
/**
|
||||
* Generates new encryption keys in KMS, encrypts the updated secrets with them, and persists the
|
||||
* encrypted secrets to Datastore.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue