NuGet / NuGetGallery

NuGet Gallery is a package repository that powers https://www.nuget.org. Use this repo for reporting NuGet.org issues.
https://www.nuget.org/
Apache License 2.0
1.55k stars 641 forks source link

[Feature]: OpenID Connect (OIDC) auth for package management operations (aka Trusted Publishers) #9332

Open joelverhagen opened 1 year ago

joelverhagen commented 1 year ago

Related Problem

Currently, there are only two ways to do package management operations (push new version, unlist, relist) on NuGet.org:

  1. Sign into the website using a web browser and perform the actions manually.
  2. Use an API key to perform some operations.

The first option is fine for interactive, manual flows. The second (API keys) is reasonable for automation but it has some drawbacks:

The Elevator Pitch

I propose that we enable an additional authentication method for NuGet.org protected operations: OpenID Connect bearer token-based authentication.

Currently, some web services allow OpenID Connect federated credentials. For example, you can use a GitHub OIDC token to authenticate as an Azure Active Directory (AAD) app registration: https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc.

We could enable a similar flow on NuGet.org, with a UI like this (specific to GitHub OIDC tokens in this case): image

This would allow you to perform privileged NuGet.org actions in a GitHub Actions workflow without the need for saving an API key as a GitHub Actions secret.

We could start with GitHub OIDC and expand the offering in the future to an arbitrary OIDC provider, configured into your NuGet.org user account.

Additional Context and Details

My understanding is that npm folks are talking about a similar approach.

loic-sharma commented 1 year ago

This would be a huge win! Do you know how the client will acquire the token? Also, how will the client provide the token to the server? It'd be wonderful if the client implementation is package source agnostic so that other server implementations can leverage this too!

joelverhagen commented 1 year ago

Do you know how the client will acquire the token?

Generally speaking, I think this would be environment (agent) specific. GitHub Actions has an SDK that allows you to fetch a token in the context of a GitHub Actions workflow run. I think this would be different on other platforms like Azure DevOps. But I'm not 100% sure yet.

Also, how will the client provide the token to the server?

I am not sure if I want it in the X-NuGet-ApiKey header (and therefore able to be plumbed into existing versions of NuGet client as an API key) or a new configuration value instructing the client to send a Authorization: Bearer ... header. Currently, I am leaning towards X-NuGet-ApiKey since the ship has already sailed on having a customer NuGet auth header so we might as well use it.

It'd be wonderful if the client implementation is package source agnostic so that other server implementations can leverage this too!

Yes, this idea uses the existing protocol or enhances it in a straightforward, package source-agnostic way.

jborean93 commented 1 year ago

Just thought I should share this https://docs.pypi.org/trusted-publishers/creating-a-project-through-oidc/. Python's PyPI has added support for OIDC authentication and has made pushing PyPI packages through GitHub Actions super simple with no token management needed. It would be great if this was also supported by NuGetGallery. I personally like the fact that PyPI uses the workflow name for the claim as I find using a branch/tag/environment not too helpful with my workflow if they don't support pattern matching (Azure does not).