mirror of
https://github.com/google/nomulus.git
synced 2025-05-13 07:57:13 +02:00
Add the ability to get_keyring_secret the public key from key pairs
------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=162399452
This commit is contained in:
parent
f771b32ece
commit
8ff1102223
3 changed files with 21 additions and 0 deletions
|
@ -66,6 +66,9 @@ final class GetKeyringSecretCommand implements RemoteApiCommand {
|
||||||
case BRDA_SIGNING_KEY_PAIR:
|
case BRDA_SIGNING_KEY_PAIR:
|
||||||
out.write(KeySerializer.serializeKeyPair(keyring.getBrdaSigningKey()));
|
out.write(KeySerializer.serializeKeyPair(keyring.getBrdaSigningKey()));
|
||||||
break;
|
break;
|
||||||
|
case BRDA_SIGNING_PUBLIC_KEY:
|
||||||
|
out.write(KeySerializer.serializePublicKey(keyring.getBrdaSigningKey().getPublicKey()));
|
||||||
|
break;
|
||||||
case ICANN_REPORTING_PASSWORD:
|
case ICANN_REPORTING_PASSWORD:
|
||||||
out.write(KeySerializer.serializeString(keyring.getIcannReportingPassword()));
|
out.write(KeySerializer.serializeString(keyring.getIcannReportingPassword()));
|
||||||
break;
|
break;
|
||||||
|
@ -87,6 +90,9 @@ final class GetKeyringSecretCommand implements RemoteApiCommand {
|
||||||
case RDE_SIGNING_KEY_PAIR:
|
case RDE_SIGNING_KEY_PAIR:
|
||||||
out.write(KeySerializer.serializeKeyPair(keyring.getRdeSigningKey()));
|
out.write(KeySerializer.serializeKeyPair(keyring.getRdeSigningKey()));
|
||||||
break;
|
break;
|
||||||
|
case RDE_SIGNING_PUBLIC_KEY:
|
||||||
|
out.write(KeySerializer.serializePublicKey(keyring.getRdeSigningKey().getPublicKey()));
|
||||||
|
break;
|
||||||
case RDE_SSH_CLIENT_PRIVATE_KEY:
|
case RDE_SSH_CLIENT_PRIVATE_KEY:
|
||||||
out.write(KeySerializer.serializeString(keyring.getRdeSshClientPrivateKey()));
|
out.write(KeySerializer.serializeString(keyring.getRdeSshClientPrivateKey()));
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -65,6 +65,10 @@ final class UpdateKmsKeyringCommand implements RemoteApiCommand {
|
||||||
case BRDA_SIGNING_KEY_PAIR:
|
case BRDA_SIGNING_KEY_PAIR:
|
||||||
kmsUpdater.setBrdaSigningKey(deserializeKeyPair(input));
|
kmsUpdater.setBrdaSigningKey(deserializeKeyPair(input));
|
||||||
break;
|
break;
|
||||||
|
case BRDA_SIGNING_PUBLIC_KEY:
|
||||||
|
throw new IllegalArgumentException(
|
||||||
|
"Can't update BRDA_SIGNING_PUBLIC_KEY directly."
|
||||||
|
+ " Must update public and private keys together using BRDA_SIGNING_KEY_PAIR.");
|
||||||
case ICANN_REPORTING_PASSWORD:
|
case ICANN_REPORTING_PASSWORD:
|
||||||
kmsUpdater.setIcannReportingPassword(deserializeString(input));
|
kmsUpdater.setIcannReportingPassword(deserializeString(input));
|
||||||
break;
|
break;
|
||||||
|
@ -86,6 +90,15 @@ final class UpdateKmsKeyringCommand implements RemoteApiCommand {
|
||||||
case RDE_SIGNING_KEY_PAIR:
|
case RDE_SIGNING_KEY_PAIR:
|
||||||
kmsUpdater.setRdeSigningKey(deserializeKeyPair(input));
|
kmsUpdater.setRdeSigningKey(deserializeKeyPair(input));
|
||||||
break;
|
break;
|
||||||
|
case RDE_SIGNING_PUBLIC_KEY:
|
||||||
|
throw new IllegalArgumentException(
|
||||||
|
"Can't update RDE_SIGNING_PUBLIC_KEY directly."
|
||||||
|
+ " Must update public and private keys together using RDE_SIGNING_KEY_PAIR.");
|
||||||
|
// Note that RDE_SSH_CLIENT public / private keys are slightly different than other key pairs,
|
||||||
|
// since they are just regular strings rather than {@link PGPKeyPair}s (because OpenSSH
|
||||||
|
// doesn't use PGP-style keys)
|
||||||
|
//
|
||||||
|
// Hence we can and need to update the private and public keys individually.
|
||||||
case RDE_SSH_CLIENT_PRIVATE_KEY:
|
case RDE_SSH_CLIENT_PRIVATE_KEY:
|
||||||
kmsUpdater.setRdeSshClientPrivateKey(deserializeString(input));
|
kmsUpdater.setRdeSshClientPrivateKey(deserializeString(input));
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -24,6 +24,7 @@ public enum KeyringKeyName {
|
||||||
BRAINTREE_PRIVATE_KEY,
|
BRAINTREE_PRIVATE_KEY,
|
||||||
BRDA_RECEIVER_PUBLIC_KEY,
|
BRDA_RECEIVER_PUBLIC_KEY,
|
||||||
BRDA_SIGNING_KEY_PAIR,
|
BRDA_SIGNING_KEY_PAIR,
|
||||||
|
BRDA_SIGNING_PUBLIC_KEY,
|
||||||
ICANN_REPORTING_PASSWORD,
|
ICANN_REPORTING_PASSWORD,
|
||||||
JSON_CREDENTIAL,
|
JSON_CREDENTIAL,
|
||||||
MARKSDB_DNL_LOGIN,
|
MARKSDB_DNL_LOGIN,
|
||||||
|
@ -31,6 +32,7 @@ public enum KeyringKeyName {
|
||||||
MARKSDB_SMDRL_LOGIN,
|
MARKSDB_SMDRL_LOGIN,
|
||||||
RDE_RECEIVER_PUBLIC_KEY,
|
RDE_RECEIVER_PUBLIC_KEY,
|
||||||
RDE_SIGNING_KEY_PAIR,
|
RDE_SIGNING_KEY_PAIR,
|
||||||
|
RDE_SIGNING_PUBLIC_KEY,
|
||||||
RDE_SSH_CLIENT_PRIVATE_KEY,
|
RDE_SSH_CLIENT_PRIVATE_KEY,
|
||||||
RDE_SSH_CLIENT_PUBLIC_KEY,
|
RDE_SSH_CLIENT_PUBLIC_KEY,
|
||||||
RDE_STAGING_KEY_PAIR,
|
RDE_STAGING_KEY_PAIR,
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue