A Rust implementation of Sigstore for signing and verifying software artifacts.
This workspace provides a modular Rust implementation of the Sigstore ecosystem, enabling keyless code signing and verification. Sigstore eliminates the need for long-lived signing keys by binding signatures to OpenID Connect identities and recording them in an immutable transparency log.
| Crate | Description |
|---|---|
sigstore-sign |
High-level signing API |
sigstore-verify |
High-level verification API |
sigstore-bundle |
Sigstore bundle format handling |
sigstore-types |
Core types and data structures |
sigstore-crypto |
Cryptographic primitives |
sigstore-merkle |
RFC 6962 Merkle tree verification |
sigstore-rekor |
Rekor transparency log client |
sigstore-fulcio |
Fulcio certificate authority client |
sigstore-oidc |
OpenID Connect authentication |
sigstore-tsa |
RFC 3161 timestamp authority client |
sigstore-trust-root |
Trusted root management |
Add the crates you need to your Cargo.toml:
[dependencies]
# For verification only
sigstore-verify = "0.1"
sigstore-trust-root = "0.1"
# For signing
sigstore-sign = "0.1"use sigstore_verify::{Verifier, VerificationPolicy};
use sigstore_trust_root::TrustedRoot;
// Load the trusted root (contains Fulcio CA, Rekor keys, etc.)
let root = TrustedRoot::production()?;
let verifier = Verifier::new(&root);
// Parse the bundle (contains signature, certificate, transparency log entry)
let bundle: sigstore_types::Bundle = serde_json::from_str(&bundle_json)?;
// Verify the signature
verifier.verify(&bundle, artifact_bytes)?;
// Or verify with identity policy
let policy = VerificationPolicy::new()
.issuer("https://token.actions.githubusercontent.com")
.subject_regex(r"^https://github\.com/myorg/.*$")?;
verifier.verify_with_policy(&bundle, artifact_bytes, &policy)?;use sigstore_sign::{Signer, SigningConfig};
// Create a signer (will authenticate via OIDC)
let config = SigningConfig::production();
let signer = Signer::new(config).await?;
// Sign the artifact - returns a Sigstore bundle
let bundle = signer.sign(artifact_bytes).await?;
// Save the bundle
let bundle_json = serde_json::to_string_pretty(&bundle)?;You can verify Sigstore bundles from GitHub releases:
# 1. Download a release artifact and its Sigstore bundle
curl -LO https://github.com/sigstore/cosign/releases/download/v3.0.2/cosign_checksums.txt
curl -LO https://github.com/sigstore/cosign/releases/download/v3.0.2/cosign_checksums.txt.sigstore.json
# 2. Verify the bundle (cryptographic verification without identity policy)
cargo run -p sigstore-verify --example verify_bundle -- \
cosign_checksums.txt cosign_checksums.txt.sigstore.json
# 3. Or verify with identity policy (this release was signed with Google's keyless signer)
cargo run -p sigstore-verify --example verify_bundle -- \
--identity "keyless@projectsigstore.iam.gserviceaccount.com" \
--issuer "https://accounts.google.com" \
cosign_checksums.txt cosign_checksums.txt.sigstore.json# Sign the README.md file
cargo run -p sigstore-sign --example sign_blob -- README.md -o README.md.sigstore.json
# Verify with our tool
cargo run -p sigstore-verify --example verify_bundle -- README.md README.md.sigstore.json
# You can also verify with cosign
cosign verify-blob --bundle README.md.sigstore.json \
--certificate-identity w.vollprecht@gmail.com \
--certificate-oidc-issuer https://github.com/login/oauth \
README.md┌─────────────────────────────────────────────────────────────────┐
│ Application Layer │
├────────────────────────┬────────────────────────────────────────┤
│ sigstore-sign │ sigstore-verify │
├────────────────────────┴────────────────────────────────────────┤
│ sigstore-bundle │
├─────────────┬─────────────┬─────────────┬───────────────────────┤
│sigstore-oidc│sigstore- │sigstore- │ sigstore-trust-root │
│ │fulcio │rekor │ │
├─────────────┴──┬──────────┴────────┬────┴───────────────────────┤
│ sigstore-tsa │ sigstore-merkle │ sigstore-crypto │
├────────────────┴─────────────────-─┴────────────────────────────┤
│ sigstore-types │
└─────────────────────────────────────────────────────────────────┘
- Keyless Signing: Instead of managing long-lived keys, signers authenticate with an OIDC provider (GitHub, Google, etc.)
- Short-lived Certificates: Fulcio issues a certificate valid for ~10 minutes, binding the OIDC identity to an ephemeral key
- Transparency Log: The signature is recorded in Rekor, providing a tamper-evident audit trail
- Verification: Verifiers check the certificate chain, signature, and transparency log entry against the trusted root
- Full Sigstore bundle support (v0.1, v0.2, v0.3 formats)
- Keyless signing with OIDC authentication
- Certificate chain validation against Fulcio CA
- Transparency log verification (checkpoints, inclusion proofs, SETs)
- RFC 3161 timestamp support
- Identity-based verification policies
- Ambient credential detection for CI/CD environments
This library uses aws-lc-rs as its cryptographic backend. AWS-LC is a general-purpose cryptographic library maintained by AWS, based on code from BoringSSL. It provides:
- ECDSA (P-256, P-384) signature verification and signing
- Ed25519 signature support
- SHA-256/SHA-384/SHA-512 hashing
- X.509 certificate parsing and validation
AWS-LC is FIPS 140-3 validated, making this library suitable for environments with compliance requirements.
Rust 1.70 or later.
BSD-3-Clause