Closed Racer159 closed 3 months ago
Clone of https://github.com/defenseunicorns/uds-core/issues/509 to implement on this side.
Needs:
https://sso.###ZARF_VAR_DOMAIN###/realms/uds:
IssuerURL: https://sso.###ZARF_VAR_DOMAIN###/realms/uds
ClientID: sigstore
Type: email
Under OIDCIssuers in fulcio and an sso section in the fulcio UDS package YAML:
sso:
- name: Sigstore Login
clientId: sigstore
redirectUris:
# - "http://localhost:*" # TODO: (@WSTARR) <- manually update the client redirect and origin urls to this
- "http://pepr.cannot.do.localhost.uds.dev/auth"
secret: "sigstore"
serviceAccountsEnabled: true
[!NOTE] Depending on the outcome of defenseunicorns/uds-core#509 the sso portion may need to be edited to support different settings.
Is your feature request related to a problem? Please describe.
As Kay I want to have Sigstore integrated with Keycloak so that I can sign images, git commits and more without needing to manage keys
Describe the solution you'd like
cosign sign
with the fulcio, rekor, and oidc-issuer urlsDescribe alternatives you've considered
We could not integrate with Keycloak directly and instead use something like Dex to issue the id tokens: https://dexidp.io/
Additional context
Currently the uds-core operator does not allow the creation of clients without a client secret.