@@ -477,9 +477,7 @@ func (wfe *WebFrontEndImpl) verifyPOST(ctx context.Context, logEvent *requestEve
477477 // Special case: If no registration was found, but regCheck is false, use an
478478 // empty registration and the submitted key. The caller is expected to do some
479479 // validation on the returned key.
480- // TODO(#2600): Remove core.NoSuchRegistrationError check once boulder/errors
481- // code is deployed
482- if _ , ok := err .(core.NoSuchRegistrationError ); (ok || berrors .Is (err , berrors .NotFound )) && ! regCheck {
480+ if berrors .Is (err , berrors .NotFound ) && ! regCheck {
483481 // When looking up keys from the registrations DB, we can be confident they
484482 // are "good". But when we are verifying against any submitted key, we want
485483 // to check its quality before doing the verify.
@@ -493,9 +491,7 @@ func (wfe *WebFrontEndImpl) verifyPOST(ctx context.Context, logEvent *requestEve
493491 // For all other errors, or if regCheck is true, return error immediately.
494492 wfe .stats .Inc ("Errors.UnableToGetRegistrationByKey" , 1 )
495493 logEvent .AddError ("unable to fetch registration by the given JWK: %s" , err )
496- // TODO(#2600): Remove core.NoSuchRegistrationError check once boulder/errors
497- // code is deployed
498- if _ , ok := err .(core.NoSuchRegistrationError ); ok || berrors .Is (err , berrors .NotFound ) {
494+ if berrors .Is (err , berrors .NotFound ) {
499495 return nil , nil , reg , probs .Unauthorized (unknownKey )
500496 }
501497
0 commit comments