The SPIFFE Runtime Environment
Go to file
kfox1111 9fddca5c1a
Deprecate retry_bootstrap (#6050)
* Deprecate retry_bootstrap

Signed-off-by: Kevin Fox <Kevin.Fox@pnnl.gov>
2025-07-10 10:06:38 -03:00
.data
.github Use sha of branch of caching executables (#6133) 2025-06-15 09:31:17 -03:00
cmd Deprecate retry_bootstrap (#6050) 2025-07-10 10:06:38 -03:00
conf Add `k8s_configmap` BundlePublisher plugin (#6105) 2025-06-12 06:57:58 -03:00
doc Fix markdown link syntax nits (#6169) 2025-07-07 20:21:53 +01:00
examples Add markdown lint (#3494) 2022-11-22 12:39:30 -07:00
pkg golangci-lint: upgrade to v2 & fix flakey test (#6064) 2025-07-04 16:14:29 -03:00
proto Bump protobuf compiler to v29.4 (#5972) 2025-03-26 10:31:03 -07:00
release Remove some k8s-workload-registrar vestiges (#4466) 2023-09-01 12:16:23 -06:00
script Source binaries for linux artifacts from docker images (#4491) 2023-09-13 16:35:29 -07:00
support/oidc-discovery-provider fix: subject_types_supported cannot be an empty list (#6126) 2025-06-13 11:59:07 +01:00
test Wait for server to come up before using it (#6174) 2025-07-09 07:19:04 +01:00
.dockerignore
.envrc.example
.gitattributes
.gitignore
.go-version Update to Go 1.24.4 (#6119) 2025-06-10 09:35:39 -03:00
.golangci.yml golangci-lint: upgrade to v2 & fix flakey test (#6064) 2025-07-04 16:14:29 -03:00
.markdownlint.yaml
.spire-tool-versions golangci-lint: upgrade to v2 & fix flakey test (#6064) 2025-07-04 16:14:29 -03:00
ADOPTERS.md
CHANGELOG.md Prepare main branch for upcoming 1.13.0 release (#6163) 2025-07-01 22:48:49 -07:00
CODE-OF-CONDUCT.md
CODEOWNERS Introduce Sorin Dumitru as a CODEOWNER (#5827) 2025-01-30 18:36:31 -03:00
CONTRIBUTING.md Update `telemetry.md` reference (#5650) 2024-11-26 19:00:49 -03:00
Dockerfile Update to Go 1.24.4 (#6119) 2025-06-10 09:35:39 -03:00
Dockerfile.dev Update to Ubuntu 24.04 base dev image image. (#5936) 2025-03-10 20:29:31 +00:00
Dockerfile.windows
LICENSE
MAINTAINERS.md Spelling and grammar fixes (#5571) 2024-11-04 16:18:44 -07:00
Makefile golangci-lint: upgrade to v2 & fix flakey test (#6064) 2025-07-04 16:14:29 -03:00
README.md update urls to security assessments (#6012) 2025-04-20 06:15:24 +01:00
RELEASING.md Spelling and grammar fixes (#5571) 2024-11-04 16:18:44 -07:00
ROADMAP.md
SECURITY.md
go.mod golangci-lint: upgrade to v2 & fix flakey test (#6064) 2025-07-04 16:14:29 -03:00
go.sum golangci-lint: upgrade to v2 & fix flakey test (#6064) 2025-07-04 16:14:29 -03:00

README.md

SPIRE Logo

CII Best Practices Build Status Go Report Card Production Phase

SPIRE (the SPIFFE Runtime Environment) is a toolchain of APIs for establishing trust between software systems across a wide variety of hosting platforms. SPIRE exposes the SPIFFE Workload API, which can attest running software systems and issue SPIFFE IDs and SVIDs to them. This in turn allows two workloads to establish trust between each other, for example by establishing an mTLS connection or by signing and verifying a JWT token. SPIRE can also enable workloads to securely authenticate to a secret store, a database, or a cloud provider service.

SPIRE is a graduated project of the Cloud Native Computing Foundation (CNCF). If you are an organization that wants to help shape the evolution of technologies that are container-packaged, dynamically-scheduled and microservices-oriented, consider joining the CNCF.

Get SPIRE

Learn about SPIRE

  • Before trying SPIRE, it's a good idea to learn about its architecture and design goals.
  • Once ready to get started, see the Quickstart Guides for Kubernetes, Linux, and MacOS.
  • There are several examples demonstrating SPIRE usage in the spire-examples and spire-tutorials repositories.
  • Check ADOPTERS.md for a list of production SPIRE adopters, a view of the ecosystem, and use cases.
  • See the SPIRE Roadmap for a list of planned features and enhancements.
  • Join the SPIFFE community on Slack. If you have any questions about how SPIRE works, or how to get it up and running, the best places to ask questions are the SPIFFE Slack channels.
  • Download the free book about SPIFFE and SPIRE, "Solving the Bottom Turtle."

Integrate with SPIRE

For supported integration versions, see Supported Integrations.

Contribute to SPIRE

The SPIFFE community maintains the SPIRE project. Information on the various SIGs and relevant standards can be found in https://github.com/spiffe/spiffe.

Further Reading

  • The Scaling SPIRE guide covers design guidelines, recommendations, and deployment models.
  • For an explanation of how SPIRE compares to related systems such as secret stores, identity providers, authorization policy engines and service meshes see comparisons.

Security

Security Assessments

A third party security firm (Cure53) completed a security audit of SPIFFE and SPIRE in February of 2021. Additionally, the CNCF Technical Advisory Group for Security conducted two assessments on SPIFFE and SPIRE in 2018 and 2020. Please find the reports and supporting material, including the threat model exercise results, below.

Reporting Security Vulnerabilities

If you've found a vulnerability or a potential vulnerability in SPIRE please let us know at security@spiffe.io. We'll send a confirmation email to acknowledge your report, and we'll send an additional email when we've identified the issue positively or negatively.