Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Asymmetric Tokens from credential processes #11520

Closed
Tracked by #10519
Eh2406 opened this issue Dec 29, 2022 · 4 comments
Closed
Tracked by #10519

Asymmetric Tokens from credential processes #11520

Eh2406 opened this issue Dec 29, 2022 · 4 comments
Labels
A-credential-provider Area: credential provider for storing and retreiving credentials A-registry-authentication Area: registry authentication and authorization (authn authz) Z-asymmetric-token Nightly: asymmetric-token authentication

Comments

@Eh2406
Copy link
Contributor

Eh2406 commented Dec 29, 2022

The RFC describes how credential processes can generate Asymmetric Tokens, however that was not implemented in #10771 . We should implement this before stabilization.

cc #10519

@Eh2406 Eh2406 added A-credential-provider Area: credential provider for storing and retreiving credentials A-registry-authentication Area: registry authentication and authorization (authn authz) labels Dec 29, 2022
@ehuss ehuss added the Z-asymmetric-token Nightly: asymmetric-token authentication label Jan 3, 2023
@linyihai
Copy link
Contributor

Hello, what is the status of this issue? I am looking for a good-first-issue, can i make a try ...

@weihanglo
Copy link
Member

IIRC, it has just been integrated into the recently stabilized credential provider, under the credential provider alias cargo:paseto. See doc for more.

If you are willing to help stabilize asymmetric token feature, there are some unresolved issue listed in #10519 looking for helps. Yet there is no clear mentorship of them at this moment, and it might require extra efforts to figure out the plan and design.

If you are looking for issues open for contribution in general, issues with S-accepted Status: Issue or feature is accepted, and has a team member available to help mentor or review and E-easy Experience: Easy are good starts. Please read the doc on issue label system for more.

Thank you.

@weihanglo
Copy link
Member

@arlosi, I am going to close this as resolved since you've checked the box in #10519. Feel free to reopen if there are more needing to be addressed.

@linyihai
Copy link
Contributor

IIRC, it has just been integrated into the recently stabilized credential provider, under the credential provider alias cargo:paseto. See doc for more.

If you are willing to help stabilize asymmetric token feature, there are some unresolved issue listed in #10519 looking for helps. Yet there is no clear mentorship of them at this moment, and it might require extra efforts to figure out the plan and design.

If you are looking for issues open for contribution in general, issues with S-accepted Status: Issue or feature is accepted, and has a team member available to help mentor or review and E-easy Experience: Easy are good starts. Please read the doc on issue label system for more.

Thank you.

OK, thank you for you suggestions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-credential-provider Area: credential provider for storing and retreiving credentials A-registry-authentication Area: registry authentication and authorization (authn authz) Z-asymmetric-token Nightly: asymmetric-token authentication
Projects
None yet
Development

No branches or pull requests

4 participants