Skip to content

Conversation

@haydentherapper
Copy link

This PR adds support for in-memory signing using a Tink keyset. The keyset is encrypted with a key-encryption-key stored in GCP KMS. The key is decrypted on startup and loaded into memory. This uses a utility to unpack the keyset into a crypto.Signer so that it can be used to sign certificates. This also validates that the key is an ECDSA P-256 key as per RFC 6962, since Tink supports many key types.

This PR adds support for in-memory signing using a Tink keyset. The
keyset is encrypted with a key-encryption-key stored in GCP KMS. The key
is decrypted on startup and loaded into memory. This uses a utility to
unpack the keyset into a crypto.Signer so that it can be used to sign
certificates. This also validates that the key is an ECDSA P-256 key as
per RFC 6962, since Tink supports many key types.

Signed-off-by: Hayden <8418760+haydentherapper@users.noreply.github.com>
@haydentherapper haydentherapper requested a review from a team as a code owner September 18, 2025 17:12
@haydentherapper haydentherapper requested review from roger2hk and removed request for a team September 18, 2025 17:12
@haydentherapper
Copy link
Author

Reopening, ref to #282 for the previous discussion.

@phbnf phbnf self-requested a review September 22, 2025 09:48
@phbnf phbnf self-assigned this Sep 22, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants