-
Notifications
You must be signed in to change notification settings - Fork 963
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Routes and endpoints for JWT consumption #10970
Comments
Needs #10792. |
As a reminder to myself: all of the routing/endpoint here should have accompanying metrics, per @ewdurbin's feedback: #10753 (review) |
Needs #11218. |
Is there a ticket or roadmap somewhere that explains this OIDC federation feature? |
The project board is here: https://github.com/pypi/warehouse/projects/4 Some initial design and threat model is in these issues: #10644 and #10619 |
I’ve seen the board, but am more looking for a non-technical document that explains the big goal here. |
The 'big goal' is to add support for https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect |
Oh I see automatic tokens from github actions to pypi upload? |
Yep! The idea is that you'll be able to trust specific GitHub Actions to authenticate on your behalf, which in turn will remove the need to manually provision separate API tokens. Those trusted GitHub Actions will use GitHub's OIDC provider, which produces ephemeral JWTs that are bound to the current workflow. Those are then exchanged for ephemeral API tokens, which are scoped down to the project(s) that trust that workflow. |
Once we allow projects to configure OIDC providers (termed "publishers" in user-facing views), we need to allow OIDC-minted JWTs to be exchanged for API tokens.
As discussed with @di, we should ensure that these can be configured to run on a separate subdomain during deployment, to simplify caching logic.
The text was updated successfully, but these errors were encountered: