Architecture
Verification pipeline (v0.1)
Verification is implemented as an ordered pipeline with typed failures at each step:
+----------------+
| Bundle JSON |
+--------+-------+
|
v
+-------------+-------------+
| 1. Parse bundle (proto) |
+-------------+-------------+
|
v
+-------------+-------------+
| 2. Trusted root (TUF) |
+-------------+-------------+
|
v
+-------------+-------------+
| 3. Fulcio chain build |
+-------------+-------------+
|
v
+-------------+-------------+
| 4. Identity policy |
+-------------+-------------+
|
v
+-------------+-------------+
| 5. Validity window |
| (Rekor time / RFC3161)|
+-------------+-------------+
|
v
+-------------+-------------+
| 6. Rekor inclusion proof|
| + checkpoint / SET |
+-------------+-------------+
|
v
+-------------+-------------+
| 7. (implicit in 6) |
+-------------+-------------+
|
v
+-------------+-------------+
| 8. Artifact signature |
+-------------+-------------+
|
v
+--------+---------+
| VerificationResult |
+--------------------+
Steps map to exceptions rooted at SigstoreException (for example TrustedRootException, InclusionProofException).
Managed cryptography
Enterprise .NET deployments often disallow native/P-Invoke cryptographic libraries. This project uses System.Security.Cryptography for ECDSA and RSA, and BouncyCastle.Cryptography (pure managed .NET) for Ed25519 signature verification. No native or P/Invoke crypto dependencies are used.
TUF trust bootstrap
The Public Good Instance trusted root is obtained from tuf-repo-cdn.sigstore.dev using a minimal TUF workflow:
- Bootstrap from a pinned versioned
*.root.json(updated as the upstream repository rotates roots). - Verify
timestamp.json,*.snapshot.json, and*.targets.jsonsignatures using keys from the trusted root metadata. - Download
trusted_root.jsonfrom thetargets/path referenced by the SHA-256 name intargets.json.
Conformance runner
Sigstore.Conformance is packaged as a .NET global tool (PackAsTool) with command name sigstore-dotnet. It wires CLI flags to Verifier and is the binary exercised by sigstore/sigstore-conformance.
Deferred (v0.4+)
- KMS integrations and key management.
- OCI image verification helpers.
- Benchmarks and extended test vectors.
- Conformance signing — wire
sign-bundleinto the conformance runner.