You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+51-28Lines changed: 51 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,36 +6,43 @@
6
6
7
7
# Fulcio
8
8
9
-
_A New Kind of Root CA For Code Signing_
9
+
_A Free-to-Use CA For Code Signing_
10
10
11
-
fulcio is a free Root-CA for code signing certs - issuing certificates based on an OIDC email address.
11
+
Fulcio is a free-to-use certificate authority for issuing code signing certificates
12
+
for an OpenID Connect (OIDC) identity, such as email address.
12
13
13
-
fulcio only signs short-lived certificates that are valid for under 20 minutes.
14
+
Fulcio only issues short-lived certificates that are valid for 10 minutes.
14
15
15
-
## Status
16
+
## Public Instance
16
17
17
-
Fulcio is a *work in progress*!
18
+
Fulcio is in General Availability, offering a 99.5 Availability SLO,
19
+
and follows [semver rules](https://semver.org/) for API stability.
18
20
19
-
We're currently working hard on cutting a 1.0 release and productionizing the public instance.
20
-
We don't have a date yet, but follow along on the [GitHub project](https://github.com/orgs/sigstore/projects/5).
21
+
For uptime data on the Fulcio public instance, see [https://status.sigstore.dev](https://status.sigstore.dev).
21
22
22
-
The fulcio root certificate running on our public instance (https://fulcio.sigstore.dev) can be obtained and verified against Sigstore's root (at the [sigstore/root-signing](https://github.com/sigstore/root-signing) repository). To do this, install and use [go-tuf](https://github.com/theupdateframework/go-tuf)'s CLI tools:
23
+
Fulcio's certificate chain can be obtained from the `TrustBundle` API, for example for the public instance
24
+
([https://fulcio.sigstore.dev](https://fulcio.sigstore.dev/api/v2/trustBundle)). To verify the public instance,
25
+
you must verify the chain using Sigstore's [TUF](https://theupdateframework.io/) root from the
To do this, install and use [go-tuf](https://github.com/theupdateframework/go-tuf)'s CLI tools:
23
29
```
24
-
$ go get github.com/theupdateframework/go-tuf/cmd/tuf
25
-
$ go get github.com/theupdateframework/go-tuf/cmd/tuf-client
30
+
$ go install github.com/theupdateframework/go-tuf/cmd/tuf-client@06ed59941769f55b7d54158a0be85a16a7475fa7
26
31
```
27
32
28
-
Then, obtain trusted root keys for Sigstore. This can be done from a checkout of the Sigstore's root signing repository at a trusted commit (e.g. after the livestreamed root signing ceremony).
33
+
Then, obtain trusted root keys for Sigstore. This can be done from a trusted commit in Sigstore's root signing repository
34
+
(e.g. after the [livestreamed root signing ceremony](https://github.com/sigstore/root-signing#initial-root-signing-ceremony)).
0 commit comments