Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add issuer information to code signing certificates #204

Merged
merged 3 commits into from
Oct 26, 2021

Conversation

bobcallaway
Copy link
Member

This extracts a claim from the OIDC token (defaults to iss) and inserts it into the final code signing certificate issued by Fulcio in an X509 extension.

This provides an explicit link between the identity (i.e. the email or the URI that is the subject of the certificate) to the identity provider who is vouching for an entity holding valid credentials for said identity.

The value is stored in an X509 extension with OID:
1.3.6.1.4.1.57264.1.1

WIP due to dexidp/dex#2289

Signed-off-by: Bob Callaway [email protected]

@dlorenc
Copy link
Member

dlorenc commented Oct 15, 2021

This is great work!

Copy link
Member

@lukehinds lukehinds left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just needs a rebase, but good for me.

Copy link
Member

@mattmoor mattmoor left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

whoops didn't hit send

pkg/ca/fulcioca/fulcioca.go Outdated Show resolved Hide resolved
pkg/ca/googleca/googleca.go Outdated Show resolved Hide resolved
Type: IssuerTypeEmail,
IssuerURL: "https://oauth2.sigstore.dev/auth",
ClientID: "sigstore",
IssuerClaim: "$.federated_claims.connector_id",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm wondering whether it makes sense to have the hard-coded DefaultConfig assume DEX?

This extracts a claim from the OIDC token (defaults to `iss`) and
inserts it into the final code signing certificate issued by Fulcio.

This provides an explicit link between the identity (i.e. the email or
the URI that is the subject of the certificate) to the identity
provider who is vouching for an entity holding valid credentials for
said identity.

The value is stored in an X509 extension with OID:
1.3.6.1.4.1.57264.1.1

Signed-off-by: Bob Callaway <[email protected]>
Signed-off-by: Bob Callaway <[email protected]>
Signed-off-by: Bob Callaway <[email protected]>
mattmoor added a commit to mattmoor/fulcio that referenced this pull request Oct 25, 2021
This switches from using URIs to using the extensions that Bob is using in sigstore#204

Signed-off-by: Matt Moore <[email protected]>
@mattmoor mattmoor mentioned this pull request Oct 25, 2021
@bobcallaway bobcallaway changed the title [WIP] Add issuer information to code signing certificates Add issuer information to code signing certificates Oct 26, 2021
@bobcallaway bobcallaway merged commit 9179910 into sigstore:main Oct 26, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants