Skip to content

sigstore/architecture-docs

 
 

Repository files navigation

Sigstore Architecture Documentation

The purpose of this repository is to store a community-edited, formal description of the architecture of Sigstore.

  • Sigstore Client Spec - This document specifies an architecture for using an automated certificate authority specifically, timestamping service, and transparency service for signing digital payloads.
  • Fulcio, A Certificate Authority for Code Signing - This document describes Fulcio, a certificate authority for issuing short-lived code signing certificates for an OpenID Connect (OIDC) identity, such as an email address.
  • Rekor, A Transparency Service - This document describes Rekor, a signature tranparency service that securely records and makes verifiable the metadata of signed software artifacts, ensuring trust and integrity in the software supply chain.
  • Sigstore Public Deployment - This document describes the technical and policy decisions for the public deployment of Sigstore, specifically focusing on the Fulcio and Rekor deployment for the public good instance. This document details the specific implementation choices made for Sigstore's public deployment that go beyond the requirements in the specification. Additionally, this document details the use of TUF for distributing roots of trust, and includes links to deployment respositories and resources.

Goals

The goals of these architecture documents are:

  1. Enable Interoperability Across Sigstore Client Implementations The client specification aims to make it easy to develop Sigstore clients that are compatible across various languagues (e.g. Go, Python, Rust, Ruby, Java) and at different stages of maturity. With the provided specification document, developers can implement a client, knowing it will interoperate with other clients and Sigstore implementations. Additionally, the specifications will clarify which features are mandatory for compliance and which are optional enhancements. This clarity supports consistent conformance testing and auditing for various implementations.
  2. Ensure Stability for Sigstore’s Public Deployment A well-defined specification assures users and developers that Sigstore is reliable and stable. To support this, the specifications will:
    • Define requirements for stability and backward compatibility.
    • Enable controlled updates through versioning guarantees and a structured change-management process.
    • Establish clear expectations around system reliability and support
  3. Describe the Current State of Sigstore These documents aim to describe in detail the architecture of the Sigstore building blocks, as well as description of how they fit together to enable its use case and encourage broader adoption. While improvements to Sigstore are on the horizon, these specifications will focus on current functionality. They are, however, living documents and will be updated as Sigstore evolves. Imminent changes may be noted, while speculative changes will generally be omitted.
  4. Work Toward Formalizing the Specification This repository serves as a collaborative, community-driven description of Sigstore's architecture, with an emphasis on deriving specification from working code. The ultimate goal is provide robust, comprehensive, standardized architecture documents suitable for submission to a standards body, such as the IETF, in the future. By grounding the specifications in practical implementations, this approach ensures real-world applicability and supports broader adoption and alignment across the community and industry. This repository was forked from https://github.com/martinthomson/i-d-template/, which provides many features to help in publishing.

Development

Feedback and improvements are welcome. To participate, simply open an issue or suggest edits to the docs through a pull request. Before making big changes, it's probably prudent to check in on the #architecture-docs channel in the sigstore slack (invitation link here).

The original architecture documents (now archived) from which these specs are derived can be accessed here: Landing page for details (you must be a member of the sigstore-dev@ Google group to access).

License

Please note that since sigstore is an OpenSSF affiliated project, all specifications are published under the Community Specification model and license from the Joint Development Foundation.

All relevant terms can be found in the governance subdirectory of this repository.

About

Specification of sigstore's architecture in an IETF internet-draft format

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published