-
Notifications
You must be signed in to change notification settings - Fork 141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keyless Sign OIDC Providers #1816
Comments
I see that AWS EKS is part of the list of supported OIDC providers: https://github.com/sigstore/fulcio/blob/main/config/identity/config.yaml#L108-L110, so this addresses one of my questions. Based on the doc: https://github.com/sigstore/fulcio/blob/main/docs/new-idp-requirements.md, perhaps Hashicorp Vault can be added as an additional Idp, or is that not a feature that is possible? If so that would be very good for us. |
I think you're hitting two issues.
The other issue is that Vaults are self-hosted and I thought typically not publicly exposed, though I'm not very familiar with the product. This would mean that Fulcio cannot verify the token provided for a self-hosted vault without the identity provider being public as well. If so, you could host your own instance of Fulcio within your network, configured to support your vault (adding something like this but with your vault values). |
Hi @haydentherapper, Thanks for the response! Regarding the two issues you pointed out:
With that, was is there any possibility of adding Vault in the future? |
Actually I think this is straightforward to add assuming the URIs are standard. We can add Vault instances as "meta issuers", meaning we just use |
@haydentherapper, yes that looks to be Vaults standard URI. Under the hood, what exactly is happening? From my understanding, is it:
I ask because I think in Vault there are two OIDC setups, a multi-tenancy setup and a global setup. This means the
But I guess the regex |
As I mentioned over Slack, I haven't been able to find documentation that that regex is standard for a Vault deployment - if you have any references, that would be helpful. |
Cross posting my cosign GitHub Issue here just in case its a Fulcio related-issue.
I have been looking into using keyless signing again. My problem is that I want to be able to use keyless signing completely from the command-line / terminal (without the need to login through a UI). So far, the cosign docs haven't shown how to do this with OIDC providers other than GCP... The example in the documentation is:
cosign sign --identity-token=$(gcloud auth print-identity-token --audiences=sigstore) gcr.io/user-vmtest2/demo
We do not use GCP so unfortunately this is not an option for us. Alternatively, I did try using my Amazon EKS Cluster as the OIDC provider (following this guide), and the Identity Token I received from that turned out to work with cosign just fine. The ID token from EKS took this form:
I wanted to try and see if we can use Hashicorp Vault as an OIDC provider. Our Vault ID token takes the form:
The public keys can be reached at
https://stg.vault.COMPANY.com/v1/VAULT_NAMESPACE/identity/oidc/.well-known/keys
. However, using this token unfortunately leads to the error:Is there anything wrong with the Vault token claims? Is the Vault token not an option we can use? Are there any other options we can use for our use-case?
The text was updated successfully, but these errors were encountered: