| Crates.io | sigstore-trust-root |
| lib.rs | sigstore-trust-root |
| version | 0.6.0 |
| created_at | 2025-11-27 10:49:01.177669+00 |
| updated_at | 2025-12-17 09:07:56.874469+00 |
| description | Sigstore trusted root management and parsing |
| homepage | |
| repository | https://github.com/wolfv/sigstore-rust |
| max_upload_size | |
| id | 1953511 |
| size | 135,552 |
Sigstore trusted root management and parsing for sigstore-rust.
This crate handles parsing and management of Sigstore trusted root bundles. The trusted root contains all cryptographic trust anchors needed for verification: Fulcio CA certificates, Rekor public keys, CT log keys, and TSA certificates.
trusted_root.json filestuf feature)| Component | Purpose |
|---|---|
| Certificate Authorities | Fulcio CA certificates for signing certificate validation |
| Transparency Logs | Rekor public keys for log entry verification |
| CT Logs | Certificate Transparency log keys for SCT verification |
| Timestamp Authorities | TSA certificates for RFC 3161 timestamp verification |
use sigstore_trust_root::TrustedRoot;
// Use embedded production root
let root = TrustedRoot::production()?;
// Load from file
let root = TrustedRoot::from_file("trusted_root.json")?;
// With TUF feature: fetch securely
#[cfg(feature = "tuf")]
let root = TrustedRoot::from_tuf().await?;
tuf - Enable TUF-based secure fetching of trusted rootsUsed by:
sigstore-verify - Provides trust anchors for verificationsigstore-sign - Provides service endpointsBSD-3-Clause