Description
The Sigstore bundle specification (v0.3+) currently requires verification material to contain a single X.509 certificate rather than a certificate chain. However, this creates limitations for use cases where the signing certificate is not directly issued by a Trusted Root and requires Intermediate Certificate Authorities to build a complete chain of trust [example].
Changes Made
In sigstore-go, we've added an AllowCertificateChain() option that permits v0.3+ bundles to contain X.509 certificate chains in their verification material sigstore/sigstore-go#581. This allows clients to:
- Create v0.3 bundles with certificate chains (instead of downgrading to v0.2).
- Verify v0.3 bundles containing certificate chains when the AllowCertificateChain option is enabled.
Request
Other Sigstore client implementations (Python, Rust, Ruby, etc.) should consider adding similar support for certificate chain verification in v0.3+ bundles to maintain cross-client compatibility.
Related PRs
Description
The Sigstore bundle specification (v0.3+) currently requires verification material to contain a single X.509 certificate rather than a certificate chain. However, this creates limitations for use cases where the signing certificate is not directly issued by a Trusted Root and requires Intermediate Certificate Authorities to build a complete chain of trust [example].
Changes Made
In sigstore-go, we've added an AllowCertificateChain() option that permits v0.3+ bundles to contain X.509 certificate chains in their verification material sigstore/sigstore-go#581. This allows clients to:
Request
Other Sigstore client implementations (Python, Rust, Ruby, etc.) should consider adding similar support for certificate chain verification in v0.3+ bundles to maintain cross-client compatibility.
Related PRs