-
Notifications
You must be signed in to change notification settings - Fork 139
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding Gitpod IDp #1177
base: main
Are you sure you want to change the base?
Adding Gitpod IDp #1177
Conversation
You’ll need to sign the DCO in your commit and also add the federation file, which just requires a contact. |
to answer @haydentherapper question in the original thread, I'll attempt to highlight the gitpod IDP based on the criteria outlined in #397
|
Can do. Where can I find the federation file? I'll pass it along to them. |
https://github.com/sigstore/fulcio/tree/main/federation thanks for the responses, I’ll follow up with any questions shortly |
1aed891
to
988c35f
Compare
@loujaybee are you able to provide a contact email for gitpod support? |
@ChevronTango Can you also update https://github.com/sigstore/fulcio/blob/main/config/fulcio-config.yaml? Would you be able to test this out too? Run Edit https://github.com/sigstore/fulcio/blob/main/examples/request-certificate/main.go (sorry for the list of steps, this is probably simplest):
Run |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #1177 +/- ##
==========================================
- Coverage 57.93% 56.02% -1.91%
==========================================
Files 50 50
Lines 3119 2904 -215
==========================================
- Hits 1807 1627 -180
+ Misses 1154 1133 -21
+ Partials 158 144 -14 ☔ View full report in Codecov by Sentry. |
You'll need to alphabetize the configuration |
Will |
Thanks @ChevronTango! Since you have been using Gitpod, could you also test that this works using #1177 (comment)? |
Hi Hayden. Just ran the tests and it looks like Gitpod have a couple more things they need to do on their side. I suggest we hold fire for now and I'll post back here once I have a successful test. |
SG, thanks! |
whilst waiting on Gitpod to action things on their side, I did have a question about the script you meantioned in #1177 (comment) When I ran it after following your instructions, I got:
with the following from the docker stack:
just wanted to clarify if there was any settings in docker or go that were missing that would resolve this. Thankfully these don't look like errors relating to the JWT auth, but it would still be nice for your script to pass cleanly. |
docker-compose should spin up the transparency log too. There should be some error message from Trillian about why the certificate couldnt be entered in the log. Otherwise, you can run the |
Nothing from Trillian. Nothing is logged after the initial startup. the only logs are the ones I posted:
|
Could be that the log failed to start up, sometimes it’s a little finicky. The easiest solution is with go run if docker compose isn’t working. |
Moving to draft while there are ongoing conversations |
Gitpod have updated their docs now that they are providing tokens of the correct format: https://www.gitpod.io/docs/configure/workspaces/oidc Not every token that you can create for Gitpod will be valid from the looks of it:
I'll update the code I submitted in sigstore/cosign#2998 originally to include logic to make sure only valid tokens are submitted automatically. |
Signed-off-by: Edward Brough <[email protected]>
Signed-off-by: Edward Brough <[email protected]>
Signed-off-by: Edward Brough <[email protected]>
Signed-off-by: Edward Brough <[email protected]>
460bd98
to
b295a67
Compare
@ChevronTango sorry I just realized this was updated to just add an email provider, missed that update! Is this something you'd still like to see supported? If so, just need to update the PR to add it to the new config file, or I can do it. |
Closes #1176
Summary
This MR adds Gitpod as a trusted identity provider using the email type to SaaS Fulcio. Gitpod is an remote IDE service aimed at providing workspace IDEs to users with all of the dependencies installed in seconds. Gitpod have been looking at Fulcio and gitsign as a means to achieve GPG signing for all commits made by users within a gitpod workspace. Adding Gitpod to SaaS Fulcio would allow them to pass through JWT tokens that identify a user, and get back a certificate automatically, without the user needing to do any additional authorisation.
Release Note
Documentation