cb16c478e7
- As part of the PKI rotation project we need to hook into some of the functions that were factored out for managed keys in regards to key handling within the CA bundles. - Refactor the codebase so that we only extract managed key stuff from oss/ent and not additional business logic.
31 lines
952 B
Go
31 lines
952 B
Go
//go:build !enterprise
|
|
|
|
package pki
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"io"
|
|
|
|
"github.com/hashicorp/vault/sdk/helper/certutil"
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
)
|
|
|
|
var errEntOnly = errors.New("managed keys are supported within enterprise edition only")
|
|
|
|
func generateManagedKeyCABundle(_ context.Context, _ *backend, _ *inputBundle, _ *certutil.CreationBundle, _ io.Reader) (*certutil.ParsedCertBundle, error) {
|
|
return nil, errEntOnly
|
|
}
|
|
|
|
func generateManagedKeyCSRBundle(_ context.Context, _ *backend, _ *inputBundle, _ *certutil.CreationBundle, _ bool, _ io.Reader) (*certutil.ParsedCSRBundle, error) {
|
|
return nil, errEntOnly
|
|
}
|
|
|
|
func parseManagedKeyCABundle(_ context.Context, _ *backend, _ *logical.Request, _ *certutil.CertBundle) (*certutil.ParsedCertBundle, error) {
|
|
return nil, errEntOnly
|
|
}
|
|
|
|
func withManagedPKIKey(_ context.Context, _ *backend, _ managedKeyId, _ string, _ logical.ManagedSigningKeyConsumer) error {
|
|
return errEntOnly
|
|
}
|