The smokesignal.events web application

refactor: removing unused code

Signed-off-by: Nick Gerakines <nick.gerakines@gmail.com>

+2 -17
-1
BUILD.md
··· 99 99 100 100 - `SIGNING_KEYS`: The path to the `keys.json` file 101 101 - `OAUTH_ACTIVE_KEYS`: A comma seperated list of JWK IDs used to actively sign OAuth sessions 102 - - `DESTINATION_KEY`: A JWK ID used to sign destination (used in redirects) values 103 102 - `HTTP_COOKIE_KEY`: A key used to encrypt HTTP sessions 104 103 105 104 You can add these to your .env file or set them directly in your environment.
-1
CLAUDE.md
··· 110 110 - `EXTERNAL_BASE` - Public base URL (e.g., https://smokesignal.events) 111 111 - `PLC_HOSTNAME` - AT Protocol PLC server hostname 112 112 - `ADMIN_DIDS` - Comma-separated admin user DIDs 113 - - `DESTINATION_KEY` - Private key for signing authentication redirect tokens 114 113 115 114 ### OAuth Backend Configuration 116 115 - `OAUTH_BACKEND` - OAuth backend to use: "atprotocol" (default) or "aip"
+2 -8
src/config.rs
··· 1 - use anyhow::{Context, Result}; 2 - use atproto_identity::key::{KeyData, KeyType, identify_key, to_public}; 1 + use anyhow::Result; 2 + use atproto_identity::key::{KeyType, identify_key, to_public}; 3 3 use axum_extra::extract::cookie::Key; 4 4 use base64::{Engine as _, engine::general_purpose}; 5 5 use ordermap::OrderMap; ··· 51 51 pub admin_dids: AdminDIDs, 52 52 pub dns_nameservers: DnsNameservers, 53 53 pub oauth_backend: OAuthBackendConfig, 54 - pub destination_key_data: KeyData, 55 54 pub enable_task_oauth_requests_cleanup: bool, 56 55 pub enable_task_identity_refresh: bool, 57 56 } ··· 107 106 _ => return Err(ConfigError::InvalidOAuthBackend(oauth_backend_type).into()), 108 107 }; 109 108 110 - // Parse destination key for authentication redirects 111 - let destination_key_data = identify_key(&require_env("DESTINATION_KEY")?) 112 - .context("failed to parse DESTINATION_KEY")?; 113 - 114 109 // Parse optional task enablement flags 115 110 let enable_task_oauth_requests_cleanup = 116 111 default_env("ENABLE_TASK_OAUTH_REQUESTS_CLEANUP", "true") ··· 134 129 admin_dids, 135 130 dns_nameservers, 136 131 oauth_backend, 137 - destination_key_data, 138 132 enable_task_oauth_requests_cleanup, 139 133 enable_task_identity_refresh, 140 134 })
-7
src/config_errors.rs
··· 35 35 #[error("error-config-4 Signing keys must contain at least one valid key")] 36 36 EmptySigningKeys, 37 37 38 - /// Error when the destination key is invalid. 39 - /// 40 - /// This error occurs when the DESTINATION_KEY environment variable 41 - /// does not reference a valid key in the SIGNING_KEYS file. 42 - #[error("error-config-5 DESTINATION_KEY must be a valid key in the SIGNING_KEYS file")] 43 - InvalidDestinationKey, 44 - 45 38 /// Error when no valid OAuth active keys are found. 46 39 /// 47 40 /// This error occurs when the configuration does not include any