Modules§
- cert_
pinning - Certificate pinning for Sigstore endpoints (Issue #12)
- cert_
verifier - Certificate chain verification for Fulcio certificates
- fulcio
- merkle
- RFC 6962 Merkle Tree Inclusion Proof Verification
- oidc
- rate_
limit - Rate limiting for Sigstore API endpoints (Issue #6)
- rekor
- rekor_
verifier - Rekor Transparency Log Verification
- signer
- Keyless signing orchestration
- transport
- Custom TLS transport with certificate pinning (Issue #12) Note: Only available on native targets (not wasm32). Custom TLS transport with certificate pinning support
Structs§
- Certificate
Pool - A pool of trusted root and intermediate certificates for verification
- Fulcio
Certificate - Fulcio certificate response
- Fulcio
Client - Fulcio client for obtaining short-lived certificates
- GitHub
Oidc Provider - GitHub Actions OIDC provider
- GitLab
Oidc Provider - GitLab CI OIDC provider
- Google
Oidc Provider - Google Cloud OIDC provider
- Keyless
Config - Configuration for keyless signing
- Keyless
Signature - Keyless signature custom section format
- Keyless
Signer - Main keyless signing interface
- Keyless
Verification Result - Result of keyless signature verification
- Keyless
Verifier - Keyless signature verification
- Oidc
Token - OIDC token for identity verification
- Pinned
Cert Verifier - Custom certificate verifier that implements pinning
- Pinning
Config - Certificate pinning configuration
- Rekor
Client - Rekor client for transparency log operations
- Rekor
Entry - Rekor log entry returned from the transparency log
- Rekor
Keyring - Pool of Rekor public keys for verification
Enums§
- Cert
Verification Error - Errors that can occur during certificate verification
Constants§
- KEYLESS_
SIG_ TYPE - Signature type identifier for keyless signatures
- KEYLESS_
VERSION - Binary format version for keyless signatures
- STANDARD_
SIG_ TYPE - Standard signature type identifier
Traits§
- Oidc
Provider - OIDC provider trait for obtaining identity tokens
Functions§
- check_
pinning_ requirement - Check if strict certificate pinning is required via environment variable.
- create_
pinned_ rustls_ config - Create a rustls ClientConfig with certificate pinning enabled.
- detect_
oidc_ provider - Auto-detect OIDC provider from environment variables