-
Notifications
You must be signed in to change notification settings - Fork 8
Description
Summary
This issue is meant to track the enhancements and fixes being done upstream to support running a fully private Sigstore instance alongside the model validation controller, with compatibility for a custom OIDC client, such as Keycloak.
Goals:
Enable the use of a custom OIDC issuer and client (e.g. Keycloak) with proper audience handling.
Allow the trust configuration to work end-to-end without hardcoding assumptions like sigstore as the audience/client ID.
Ensure the model validation controller can interoperate smoothly with a private Fulcio/Rekor/TSA stack.
Support standard OAuth redirect flows to improve compatibility with modern OIDC providers (Google, Keycloak, etc.).
Dependencies & Related PRs:
- Default audience claim to client ID for more flexible auth
Signing: hardcoded audience value won't allow a custom sigstore clients audience claim sigstore-python#1401
feat:(oidc) derive audience claim from client_id in IdentityToken sigstore-python#1402
ci: ambient credential tests fix sigstore-python#1416 - Client ID support in Model Transparency
Add support for custom client_id and client_secret for OIDC authentication model-transparency#474
feat: add CLI options for client_id and client_secret model-transparency#475 - Add --oauth-force-oob flag to control OOB behavior
--oauth-force-oob should be configurable (currently defaults to manual flow and breaks OAuth with providers like Google) model-transparency#470
feat(oauth): add --oauth_force_oob flag to support manual OAuth flow model-transparency#471 - Update documentation for running with private trust config and OIDC provider
feat: adding trust_config parameter for private sigstore instances model-transparency#460
internal docs - Awaiting upstream merges to solidify before writing a full source of truth for this repo and actual documentation. - Conformance testing to validate support for non-sigstore OIDC clients
Awaiting further PR merges before adding tests to this repo and model transparency - Make it possible to use a private Sigstore instance
Add support for using a private Sigstore stack model-transparency#208
feat: adding trust_config parameter for private sigstore instances model-transparency#460
fix: resolve circular import of models.LogEntry sigstore-python#1458
Circular ImportError: sigstore.models and sigstore._internal.rekor dependency loop sigstore-python#1457 - Add backwards compatibility for P384/SHA256
fix: downgrading autogenerated rekor key to P256 securesign/secure-sign-operator#1144
Align Client Fallback Behavior for Deprecated ECDSA Algorithms in v3 Bundles sigstore-python#1415
feat: adding validation for key detail detection securesign/tough#104 - Investigate TSA validation issue
fix: changing CA common names securesign/secure-sign-operator#1149
Unable to use TSA to verify certificate sigstore-python#1421
This issue will serve as a central tracker for anyone wanting to deploy a self-hosted Sigstore setup without relying on the public infrastructure.