-
Notifications
You must be signed in to change notification settings - Fork 547
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Fulcio intermediate CA certificate to intermediate pool #1774
Conversation
Would like to get this in before a 1.8 cut. |
This certificate will be necessary for chain building from a leaf certificate to a root once a new version of Fulcio is rolled out. For OCI, the chain is stored in an annotation. This intermediate is currently only needed for verify-blob when looking up the certificate from Rekor. For the V3 TUF Root, the intermediate will be bundled, so that it is easily discoverable and revokable. For now, we'll simply bundle it with Cosign. Note that intermediates are considered untrusted, so it's fine if the intermediate is not in TUF currently, as the root that issued the intermediate certificate is in TUF. Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
ba2fea1
to
bf0738f
Compare
Codecov Report
@@ Coverage Diff @@
## main #1774 +/- ##
==========================================
- Coverage 31.47% 31.47% -0.01%
==========================================
Files 144 144
Lines 8889 8890 +1
==========================================
Hits 2798 2798
- Misses 5755 5756 +1
Partials 336 336
Continue to review full report at Codecov.
|
This will eventually make it into the on disk bundle to avoid needing to fetch from rekor right? |
The comment I made about Rekor was from how verify-blob supports looking up certificates in Rekor, instead of passing them in (not ideal behavior imo, it puts additional trust in Rekor). If there's work going on to create on disk bundles for blobs, then yes, this would need to be included in the bundle. |
Cool, ref #1743 |
…#1774) This certificate will be necessary for chain building from a leaf certificate to a root once a new version of Fulcio is rolled out. For OCI, the chain is stored in an annotation. This intermediate is currently only needed for verify-blob when looking up the certificate from Rekor. For the V3 TUF Root, the intermediate will be bundled, so that it is easily discoverable and revokable. For now, we'll simply bundle it with Cosign. Note that intermediates are considered untrusted, so it's fine if the intermediate is not in TUF currently, as the root that issued the intermediate certificate is in TUF. Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
This certificate will be necessary for chain building from a leaf
certificate to a root once a new version of Fulcio is rolled out. For
OCI, the chain is stored in an annotation. This intermediate is
currently only needed for verify-blob when looking up the certificate
from Rekor.
For the V3 TUF Root, the intermediate will be bundled, so that it is
easily discoverable and revokable. For now, we'll simply bundle it with
Cosign. Note that intermediates are considered untrusted, so it's fine
if the intermediate is not in TUF currently, as the root that issued the
intermediate certificate is in TUF.
Signed-off-by: Hayden Blauzvern hblauzvern@google.com
Summary
Ticket Link
Fixes
Release Note