Secure, private Cargo registry hosting for Rust teams
Cloudsmith gives your Rust teams a fully managed, private Cargo registry with enterprise-grade security, global distribution, and the policy controls to govern exactly what crates reach your builds.
One registry. Every format your teams need. Cloudsmith centralises Cargo crates alongside every other artifact your software depends on.
- Use Cargo + 30 other software package formats
- Store compiled Rust binaries and raw assets alongside your crates
- Centralize dependency management across Rust, containers, and more in one platform
How we support Cargo
cargo publish and cargo install commands. Cloudsmith is fully compatible with both sparse and Git-based registry protocols, including the high-performance sparse registry introduced in Cargo 1.68.Why teams choose Cloudsmith for Cargo
Signs you're ready to switch to Cloudsmith for Cargo
Get started with Cargo on Cloudsmith
Frequently asked questions
Yes. Cloudsmith supports both the sparse registry protocol (recommended for Cargo 1.68 and above) and the older Git-based index protocol. The sparse protocol significantly reduces bandwidth usage and speeds up dependency resolution compared to cloning a full Git index.
Cloudsmith supports entitlement token authentication and HTTP basic authentication for Cargo. You configure credentials in your .cargo/config.toml file. For CI/CD pipelines, OIDC-based authentication is available so you can avoid storing long-lived secrets.
Yes. Cloudsmith performs vulnerability scanning on Rust crates, checking against known CVE databases. You can configure policies to automatically quarantine or block crates that exceed a defined severity threshold before they reach any developer or CI build.
Yes. Cloudsmith's policy engine lets you define governance rules for your Cargo repositories. You can block specific crate versions, require metadata fields to be present, or quarantine packages that do not meet your criteria - all before any team member installs them.
Yes. You can configure Cloudsmith to proxy and cache crates from crates.io, giving your teams faster access to public crates while applying your own security and governance policies to everything that flows through. This also reduces your exposure to upstream outages.
Self-hosted registries require you to manage the Git index, storage backends, authentication, and ongoing patching. Cloudsmith is fully managed - you configure an endpoint and start pushing crates. There is no infrastructure to maintain and no scaling decisions to make.
Yes. Cloudsmith repositories support 30+ formats. You can store Cargo crates alongside Docker images, raw binaries, and packages from other language ecosystems in a single platform, giving your team one place to manage the entire software supply chain.
Cloudsmith delivers artifacts from 600+ edge PoPs worldwide. When a developer or CI runner pulls a crate, the request is served from the nearest available edge node. No additional configuration is required to get low-latency downloads across distributed teams.
Yes. Every upload and download is captured in Cloudsmith's client and audit logs. You can see exactly which crate versions were pulled, by which users or CI tokens, and when. Logs can be exported to third-party observability tools for further analysis.
You can push existing .crate files to Cloudsmith using the Cloudsmith CLI or via the native cargo publish command pointed at your Cloudsmith registry. Setup instructions with pre-configured snippets for your organisation and repository are available directly in the Cloudsmith UI.