-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support ambient credential detection #31
Comments
Specifically, for GitHub action, we'll need:
|
See #31. Signed-off-by: William Woodruff <[email protected]>
Jenkins supports OIDC identities including customizable |
Yeah, the configurable issuer is problematic because Fulcio needs to add support for accepting tokens from each unique issuer. This is probably worth raising as an issue on https://github.com/sigstore/fulcio instead! |
Right. To the extent I follow the discussion, this sounds related to sigstore/fulcio#444. Sorry for any noise; I would suggest clarifying mentions of dual-mode systems like GitHub Actions or GitLab that it is the SaaS that is under discussion, whereas self-managed editions cannot be supported in the same way. |
Not a problem at all! This is indeed an important clarification; I'll update the top-level issue body to emphasize that we're aiming to support SaaS instances of these services. Edit: Done. |
Bit of an update here: CircleCI has marked support for customizable |
Popping this off 1.0, since we've completed the core work here and are now waiting on individual OIDC providers to unblock us. |
Just for tracking purposes: looks like Fulcio might be getting BuildKite support in the near future as well: sigstore/fulcio#890 |
Looks like BuildKite support is now merged upstream, so it shouldn't be blocked here. cc @sj26: in terms of obtaining an ambient OIDC credential: should we attempt to spawn |
Oh, this looks great!
The HTTP endpoint is part of a private API for the buildkite-agent. It should remain stable, but I can't guarantee. There are some details negotiated by the agent, and the transport channel may evolve over time. So, at least for the moment, I would advise using the buildkite-agent command. That's our official public API for this stuff. It's a go binary that shouldn't take a significant time to run. |
Makes sense, thanks for the explanation! In that case we'll use the binary 🙂 |
cc @jleightcap or @tetsuo-cpp mind taking a stab at BuildKite support here? It looks like pretty much all we have to do is:
...after we've confirmed that our environment is a BuildKite one (i.e., we should look for ref: https://buildkite.com/docs/pipelines/environment-variables |
Working on this now. |
Looks like GitLab OIDC is on its way too: sigstore/fulcio#983 |
Looks like GitLab now supports a customizable |
CircleCI now supports a customizable |
CircleCI is now unblocked, pending upgrade of |
GitLab is also implemented upstream in |
Cosign supports 'ambient credential detection' for a number of environments where OIDC identities are available by default. We should also similarly support:
See also https://dlorenc.medium.com/a-bit-of-ambiance-comes-to-sigstore-f80d1d6b1c30
This issue is tracking support for SaaS products and not self-hosted instances, e.g. GitLab's hosted product and not their on-premise or self-hosted services. Self-hosted services are out-of-scope, pending further discussion with Fulcio.
The text was updated successfully, but these errors were encountered: