File: disable-hcvault.patch

package info (click to toggle)
golang-github-sigstore-timestamp-authority 2.0.3-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 916 kB
  • sloc: makefile: 94; javascript: 63; sh: 47
file content (31 lines) | stat: -rw-r--r-- 1,197 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
From: Simon Josefsson <simon@josefsson.org>
Date: Thu, 11 Dec 2025 11:13:02 +0100
Subject: [PATCH] Disable hcVault
Forwarded: not-needed

diff --git a/pkg/signer/tink.go b/pkg/signer/tink.go
index a8f65fc..9dcc0f8 100644
--- a/pkg/signer/tink.go
+++ b/pkg/signer/tink.go
@@ -25,7 +25,6 @@ import (
 	tinkUtils "github.com/sigstore/sigstore/pkg/signature/tink"
 	"github.com/tink-crypto/tink-go-awskms/v2/integration/awskms"
 	"github.com/tink-crypto/tink-go-gcpkms/v2/integration/gcpkms"
-	"github.com/tink-crypto/tink-go-hcvault/v2/integration/hcvault"
 	"github.com/tink-crypto/tink-go/v2/core/registry"
 	"github.com/tink-crypto/tink-go/v2/keyset"
 	"github.com/tink-crypto/tink-go/v2/tink"
@@ -68,13 +67,6 @@ func GetPrimaryKey(ctx context.Context, kmsKey, hcVaultToken string) (tink.AEAD,
 		}
 		registry.RegisterKMSClient(awsClient)
 		return awsClient.GetAEAD(kmsKey)
-	case strings.HasPrefix(kmsKey, "hcvault://"):
-		hcVaultClient, err := hcvault.NewClient(kmsKey, nil, hcVaultToken)
-		if err != nil {
-			return nil, err
-		}
-		registry.RegisterKMSClient(hcVaultClient)
-		return hcVaultClient.GetAEAD(kmsKey)
 	default:
 		return nil, errors.New("unsupported Tink KMS key type")
 	}