mirror of
https://github.com/google/nomulus.git
synced 2025-05-14 16:37:13 +02:00
Rename "clientIdentifier" to "clientId" almost everywhere
It's best to be consistent and use the same thing everywhere. "clientId" was already used in more places and is shorter and no more ambiguous, so it's the logical one to win out. Note that this CL is almost solely a big Eclipse-assisted refactoring. There are two places that I did not change clientIdentifier -- the actual entity field on Registrar (though I did change all getters and setters), and the name of a column on the exported registrar spreadsheet. Both would require data migrations. Also fixes a few minor nits discovered in touched files, including an incorrect test in OfyFilterTest.java and some superfluous uses of String.format() when calling checkArgument(). ------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=133956465
This commit is contained in:
parent
0564bcdbc9
commit
4813ed392b
62 changed files with 208 additions and 200 deletions
|
@ -103,7 +103,7 @@ public class TlsCredentials implements TransportCredentials {
|
|||
ImmutableList<CidrAddressBlock> ipWhitelist = registrar.getIpAddressWhitelist();
|
||||
if (ipWhitelist.isEmpty()) {
|
||||
logger.infofmt("Skipping IP whitelist check because %s doesn't have an IP whitelist",
|
||||
registrar.getClientIdentifier());
|
||||
registrar.getClientId());
|
||||
return;
|
||||
}
|
||||
for (CidrAddressBlock cidrAddressBlock : ipWhitelist) {
|
||||
|
@ -113,7 +113,7 @@ public class TlsCredentials implements TransportCredentials {
|
|||
}
|
||||
}
|
||||
logger.infofmt("%s not in %s's CIDR whitelist: %s",
|
||||
clientInetAddr, registrar.getClientIdentifier(), ipWhitelist);
|
||||
clientInetAddr, registrar.getClientId(), ipWhitelist);
|
||||
throw new BadRegistrarIpAddressException();
|
||||
}
|
||||
|
||||
|
@ -129,7 +129,7 @@ public class TlsCredentials implements TransportCredentials {
|
|||
&& isNullOrEmpty(registrar.getFailoverClientCertificateHash())) {
|
||||
logger.infofmt(
|
||||
"Skipping SSL certificate check because %s doesn't have any certificate hashes on file",
|
||||
registrar.getClientIdentifier());
|
||||
registrar.getClientId());
|
||||
return;
|
||||
}
|
||||
if (isNullOrEmpty(clientCertificateHash)) {
|
||||
|
@ -145,7 +145,7 @@ public class TlsCredentials implements TransportCredentials {
|
|||
&& !clientCertificateHash.equals(registrar.getFailoverClientCertificateHash())) {
|
||||
logger.warningfmt("bad certificate hash (%s) for %s, wanted either %s or %s",
|
||||
clientCertificateHash,
|
||||
registrar.getClientIdentifier(),
|
||||
registrar.getClientId(),
|
||||
registrar.getClientCertificateHash(),
|
||||
registrar.getFailoverClientCertificateHash());
|
||||
throw new BadRegistrarCertificateException();
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue