-
Notifications
You must be signed in to change notification settings - Fork 55
Wrong identity provider #970
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Could you share the API calls you made? If you used Edit: to be more precise: if you want to use the Google OIDC IdP directly, I believe you'll need to construct |
Gotcha. The main problem is that the CLI / API (for model signing) is generic and I don't know ahead of time which IdP users will be using. I think what I'm after is some UX improvement. Thinking more about that, I should be able to extract the IdP from the cert after signing occurred. That would resolve the problem. Feel free to close this issue and I'll fix it in our codebase. Thanks |
Ah yeah, I think a variant of this has cropped up before (#567?) -- if you need to stop the user from signing using an OIDC issuer other than the one you expect but you can't stop them from performing the OIDC flow itself, you should be able to introspect on (cc @jku since he also hit this, IIRC) |
I ran into the same issue. Is there something that contains the real issuer? (i.e. Google) I'm using the |
It's mentioned directly above: For example: >>> from sigstore import oidc
>>> issuer = oidc.Issuer.production()
>>> token = issuer.identity_token()
Waiting for browser interaction...
>>> token
<sigstore.oidc.IdentityToken object at 0x102673230>
>>> token.expected_certificate_subject
'https://accounts.google.com'
>>> token.issuer
'https://oauth2.sigstore.dev/auth' |
(I don't remember why it's called the "expected certificate subject" rather than "federated issuer" or similar. It might make sense to rename it.) |
I believe this is fully addressed by pre-existing APIs on |
I've opened #1016 to rename this API. That change will be included in the 3.x series. |
Description
I signed (using the API) with a Google account, and the OIDC token issuer shows
https://oauth2.sigstore.dev/auth
. I expected the value to behttps://accounts.google.com
.Verification works when passing my email as identity and
https://accounts.google.com
as the identity provider.Version
At main
The text was updated successfully, but these errors were encountered: