sigstore-trust-root

Crates.iosigstore-trust-root
lib.rssigstore-trust-root
version0.6.0
created_at2025-11-27 10:49:01.177669+00
updated_at2025-12-17 09:07:56.874469+00
descriptionSigstore trusted root management and parsing
homepage
repositoryhttps://github.com/wolfv/sigstore-rust
max_upload_size
id1953511
size135,552
Wolf Vollprecht (wolfv)

documentation

README

sigstore-trust-root

Sigstore trusted root management and parsing for sigstore-rust.

Overview

This crate handles parsing and management of Sigstore trusted root bundles. The trusted root contains all cryptographic trust anchors needed for verification: Fulcio CA certificates, Rekor public keys, CT log keys, and TSA certificates.

Features

  • Trusted root parsing: Load and parse trusted_root.json files
  • Embedded roots: Built-in production and staging trust anchors
  • TUF support: Optional secure fetching via The Update Framework (requires tuf feature)
  • Key extraction: Extract public keys and certificates for verification
  • Validity periods: Time-based key and certificate validity checking

Trust Anchors

Component Purpose
Certificate Authorities Fulcio CA certificates for signing certificate validation
Transparency Logs Rekor public keys for log entry verification
CT Logs Certificate Transparency log keys for SCT verification
Timestamp Authorities TSA certificates for RFC 3161 timestamp verification

Usage

use sigstore_trust_root::TrustedRoot;

// Use embedded production root
let root = TrustedRoot::production()?;

// Load from file
let root = TrustedRoot::from_file("trusted_root.json")?;

// With TUF feature: fetch securely
#[cfg(feature = "tuf")]
let root = TrustedRoot::from_tuf().await?;

Cargo Features

  • tuf - Enable TUF-based secure fetching of trusted roots

Related Crates

Used by:

License

BSD-3-Clause

Commit count: 0

cargo fmt