-
Notifications
You must be signed in to change notification settings - Fork 63
Support configurable OIDC issuers #62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: Alex Cameron <[email protected]>
This works fine for the default issuer. I'm still looking for another issuer that I can use to test this without making some kind of billing account. |
Signed-off-by: Alex Cameron <[email protected]>
Signed-off-by: William Woodruff <[email protected]>
N.B.: I think if iss not in OIDC_ISSUERS:
raise IdentityError(f"Not a valid OIDC issuer: {iss!r}") But perhaps that's intended behavior? |
Signed-off-by: Alex Cameron <[email protected]>
Hmm, good point. I'll have a look and see how |
As far as I can tell |
Do you mean that it should just assume that the challenge is the |
Signed-off-by: William Woodruff <[email protected]>
Signed-off-by: William Woodruff <[email protected]>
2ab684f
to
365a948
Compare
Signed-off-by: William Woodruff <[email protected]>
Use the `sub` claim for the proof of possession if we don't recognize the issuer's URL. Signed-off-by: William Woodruff <[email protected]>
Based on my reading of https://github.com/sigstore/fulcio/blob/f6016fda1ec6f1bd550699c7b8f53c2057ada174/pkg/challenges/challenges.go#L437-L478, I think we should default to That's what I've done in e812ec3. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice. This is looking good.
I can't approve this since I opened this PR. If one of you could approve, I think this is good to go.
Signed-off-by: William Woodruff <[email protected]> Signed-off-by: William Woodruff <[email protected]>
This reverts commit 372530b.
Signed-off-by: Alex Cameron [email protected]
Summary
This PR adds support for configurable OIDC issuers. An
oidc-issuer
flag has been added for this purpose.sigstore
will query the issuer's.well-known/openid-configuration
to find its endpoints and then use them to retrieve an OIDC token. The following flags have also been exposed since they need to be customised on a per issuer basis:oidc-client-id
oidc-client-secret