forked from sigstore/fulcio
-
Notifications
You must be signed in to change notification settings - Fork 0
/
fulcio.proto
240 lines (218 loc) · 8.24 KB
/
fulcio.proto
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
//
// Copyright 2022 The Sigstore Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
syntax = "proto3";
package dev.sigstore.fulcio.v2;
import "google/api/annotations.proto";
import "google/api/field_behavior.proto";
import "protoc-gen-openapiv2/options/annotations.proto";
option go_package = "github.com/sigstore/fulcio/pkg/generated/protobuf";
option java_package = "dev.sigstore.fulcio.v2";
option java_multiple_files = true;
option java_outer_classname = "FulcioProto";
option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = {
info: {
title: "Fulcio";
version: "2.0.0";
contact: {
name: "sigstore Fulcio project";
url: "https://github.com/sigstore/fulcio";
email: "sigstore-dev@googlegroups.com";
};
license: {
name: "Apache License 2.0";
url: "https://github.com/sigstore/fulcio/blob/main/LICENSE";
};
};
host: "fulcio.sigstore.dev";
external_docs: {
url: "https://github.com/sigstore/fulcio";
description: "More about Fulcio";
};
schemes: HTTP;
consumes: "application/json";
produces: "application/json";
};
// For Fulcio developers: All features should be designed with HTTP support in
// mind, since some clients may access this API over HTTP rather than gRPC.
//
// If there's a feature that you think would negatively impact the HTTP API,
// open an issue to discuss.
service CA {
/**
* Returns an X.509 certificate created by the Fulcio certificate authority for the given request parameters
*/
rpc CreateSigningCertificate (CreateSigningCertificateRequest) returns (SigningCertificate){
option (google.api.http) = {
post: "/api/v2/signingCert"
body: "*"
};
}
/**
* Returns the bundle of certificates that can be used to validate code signing certificates issued by this Fulcio instance
*/
rpc GetTrustBundle (GetTrustBundleRequest) returns (TrustBundle){
option (google.api.http) = {
get: "/api/v2/trustBundle"
};
}
/**
* Returns the configuration of supported OIDC issuers, including the required challenge for each issuer.
*/
rpc GetConfiguration (GetConfigurationRequest) returns (Configuration) {
option (google.api.http) = {
get: "/api/v2/configuration"
};
}
}
message CreateSigningCertificateRequest {
/*
* Identity information about who possesses the private / public key pair presented
*/
Credentials credentials = 1 [(google.api.field_behavior) = REQUIRED];
oneof key {
/*
* The public key to be stored in the requested certificate along with a signed
* challenge as proof of possession of the private key.
*/
PublicKeyRequest public_key_request = 2 [(google.api.field_behavior) = REQUIRED];
/*
* PKCS#10 PEM-encoded certificate signing request
*
* Contains the public key to be stored in the requested certificate. All other CSR fields
* are ignored. Since the CSR is self-signed, it also acts as a proof of possession of
* the private key.
*
* In particular, the CSR's subject name is not verified, or tested for
* compatibility with its specified X.509 name type (e.g. email address).
*/
bytes certificate_signing_request = 3 [(google.api.field_behavior) = REQUIRED];
}
}
message Credentials {
oneof credentials {
/*
* The OIDC token that identifies the caller
*/
string oidc_identity_token = 1;
}
}
message PublicKeyRequest {
/*
* The public key to be stored in the requested certificate
*/
PublicKey public_key = 1 [(google.api.field_behavior) = REQUIRED];
/*
* Proof that the client possesses the private key; must be verifiable by provided public key
*
* This is a currently a signature over the `sub` claim from the OIDC identity token
*/
bytes proof_of_possession = 2 [(google.api.field_behavior) = REQUIRED];
}
message PublicKey {
/*
* The cryptographic algorithm to use with the key material
*/
PublicKeyAlgorithm algorithm = 1;
/*
* PKIX, ASN.1 DER or PEM-encoded public key. PEM is typically
* of type PUBLIC KEY.
*/
string content = 2 [(google.api.field_behavior) = REQUIRED];
}
message SigningCertificate {
oneof certificate {
SigningCertificateDetachedSCT signed_certificate_detached_sct = 1;
SigningCertificateEmbeddedSCT signed_certificate_embedded_sct = 2;
}
}
// (-- api-linter: core::0142::time-field-type=disabled
// aip.dev/not-precedent: SCT is defined in RFC6962 and we keep the name consistent for easier understanding. --)
message SigningCertificateDetachedSCT {
/*
* The certificate chain serialized with the leaf certificate first, followed
* by all intermediate certificates (if present), finishing with the root certificate.
*
* All values are PEM-encoded certificates.
*/
CertificateChain chain = 1;
/*
* The Signed Certificate Timestamp (SCT) is a promise for including the certificate in
* a certificate transparency log. It can be "stapled" to verify the inclusion of
* a certificate in the log in an offline fashion.
*
* The SCT format is an AddChainResponse struct, defined in
* https://github.com/google/certificate-transparency-go
*/
bytes signed_certificate_timestamp = 2;
}
message SigningCertificateEmbeddedSCT {
/*
* The certificate chain serialized with the leaf certificate first, followed
* by all intermediate certificates (if present), finishing with the root certificate.
*
* All values are PEM-encoded certificates.
*
* The leaf certificate contains an embedded Signed Certificate Timestamp (SCT) to
* verify inclusion of the certificate in a log. The SCT format is a SignedCertificateTimestampList,
* as defined in https://datatracker.ietf.org/doc/html/rfc6962#section-3.3
*/
CertificateChain chain = 1;
}
// This is created for forward compatibility in case we want to add fields to the TrustBundle service in the future
message GetTrustBundleRequest {
}
message TrustBundle {
/*
* The set of PEM-encoded certificate chains for this Fulcio instance; each chain will start with any
* intermediate certificates (if present), finishing with the root certificate.
*/
repeated CertificateChain chains = 1;
}
message CertificateChain {
/*
* The PEM-encoded certificate chain, ordered from leaf to intermediate to root as applicable.
*/
repeated string certificates = 1;
}
enum PublicKeyAlgorithm {
PUBLIC_KEY_ALGORITHM_UNSPECIFIED = 0;
RSA_PSS = 1;
ECDSA = 2;
ED25519 = 3;
}
// This is created for forward compatibility in case we want to add fields in the future.
message GetConfigurationRequest {
}
// The configuration for the Fulcio instance.
message Configuration {
// The OIDC issuers supported by this Fulcio instance.
repeated OIDCIssuer issuers = 1;
}
// Metadata about an OIDC issuer.
message OIDCIssuer {
oneof issuer {
// The URL of the OIDC issuer.
string issuer_url = 1;
// The URL of wildcard OIDC issuer, e.g. "https://oidc.eks.*.amazonaws.com/id/*".
// When comparing the issuer, the wildcards will be replaced by "[-_a-zA-Z0-9]+".
string wildcard_issuer_url = 2;
}
// The expected audience of the OIDC token for the issuer.
string audience = 3;
// The OIDC claim that must be signed for a proof of possession challenge.
string challenge_claim = 4;
// The expected SPIFFE trust domain. Only present when the OIDC issuer issues tokens for SPIFFE identities.
string spiffe_trust_domain = 5;
}