mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-22 15:11:07 +02:00
* Add method storageContext.Logger(). * Add method storageContext.System(). * Add method storageContext.CrlBuilder(). * Add method storageContext.GetUnifiedTransferStatus(). * Add method storageContext.GetPkiManagedView(). * Add method storageContext.GetCertificateCounter(). * Add method storageContext.UseLegacyBundleCaStorage(). * Add method storageContext.GetRevokeStorageLock(). * Add acmeState to acmeContext. Make acmeState accessible from acmeContext, so that storageContext doesn't have to be used for this purpose. * Decouple getAndValidateAcmeRole() from storageContext.Backend. * Don't access Backend.ciepsState through storageContext. * Add method storageContext.GetRole(). * Change signature of getCiepsAcmeSettings for CE compatibility.
26 lines
915 B
Go
26 lines
915 B
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
//go:build !enterprise
|
|
|
|
package pki
|
|
|
|
import (
|
|
"crypto/x509"
|
|
"fmt"
|
|
|
|
"github.com/hashicorp/vault/builtin/logical/pki/issuing"
|
|
"github.com/hashicorp/vault/sdk/framework"
|
|
"github.com/hashicorp/vault/sdk/helper/certutil"
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
)
|
|
|
|
// issueAcmeCertUsingCieps based on the passed in ACME information, perform a CIEPS request/response
|
|
func issueAcmeCertUsingCieps(_ *backend, _ *acmeContext, _ *logical.Request, _ *framework.FieldData, _ *jwsCtx, _ *acmeAccount, _ *acmeOrder, _ *x509.CertificateRequest) (*certutil.ParsedCertBundle, issuing.IssuerID, error) {
|
|
return nil, "", fmt.Errorf("cieps is an enterprise only feature")
|
|
}
|
|
|
|
func getCiepsAcmeSettings(b *backend, sc *storageContext, opts acmeWrapperOpts, config *acmeConfigEntry, data *framework.FieldData) (bool, string, error) {
|
|
return false, "", nil
|
|
}
|