Skip to content

Commit

Permalink
gen, protos: document chain membership policy (#77)
Browse files Browse the repository at this point in the history
* gen, protos: document chain membership policy

Signed-off-by: William Woodruff <[email protected]>

* gen, protos: apply suggestions

Signed-off-by: William Woodruff <[email protected]>

---------

Signed-off-by: William Woodruff <[email protected]>
  • Loading branch information
woodruffw authored Apr 24, 2023
1 parent 8a3e694 commit 852ac8d
Show file tree
Hide file tree
Showing 4 changed files with 55 additions and 12 deletions.
18 changes: 15 additions & 3 deletions gen/pb-go/common/v1/sigstore_common.pb.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

18 changes: 15 additions & 3 deletions gen/pb-typescript/src/__generated__/sigstore_common.ts

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

18 changes: 15 additions & 3 deletions protos/sigstore_common.proto
Original file line number Diff line number Diff line change
Expand Up @@ -169,9 +169,21 @@ message SubjectAlternativeName {
message X509CertificateChain {
// The chain of certificates, with indices 0 to n.
// The first certificate in the array must be the leaf
// certificate used for signing. Any intermediate certificates
// must be stored as offset 1 to n-1, and the root certificate at
// position n.
// certificate used for signing.
//
// Signers MUST NOT include their root CA certificates in their embedded
// certificate chains, and SHOULD NOT include intermediate CA
// certificates that appear in independent roots of trust.
//
// Verifiers MUST validate the chain carefully to ensure that it chains
// up to a root CA certificate that they trust, regardless of whether
// the chain includes additional intermediate/root CA certificates.
// Verifiers MAY enforce additional constraints, such as requiring that
// all intermediate CA certificates appear in an independent root of
// trust.
//
// Verifiers SHOULD handle old or non-complying bundles that have
// additional intermediate/root CA certificates.
repeated X509Certificate certificates = 1;
}

Expand Down

0 comments on commit 852ac8d

Please sign in to comment.