config: Add IBM OIDC provider#1892
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #1892 +/- ##
==========================================
- Coverage 57.93% 49.03% -8.90%
==========================================
Files 50 70 +20
Lines 3119 5204 +2085
==========================================
+ Hits 1807 2552 +745
- Misses 1154 2417 +1263
- Partials 158 235 +77 ☔ View full report in Codecov by Sentry. |
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
e27d566 to
b260846
Compare
|
Thanks for merging. Is this going to become available via --staging? And when would it become usable? |
|
It's now out in staging. Please verify and we'll push it through to prod! |
|
It worked with our JWT: |
|
@stefanberger how did you obtain the JWT? I tried to at least start the OIDC flow with |
We have our own tool to get the JWT from our server. One use case is interactive signing. Another one would be automated signing with client_secret. |
Is there a reason you aren't using cosign or one of our other language SDKs? |
No, there was no particular reason. It required enablement of PKCE and other changes. I am currently trying to figure out how to deal with an error related to the redirect_url |
|
@bobcallaway: @vivshankar and I have been discussing the redirect_url |
@bobcallaway, actually, there is a reason. Support for the IBM identity server is currently in staging. With |
|
the staging instance also requires you to add |
|
Now I am at the same point as with the IBM oidc issuer in this case: |
Summary
This PR adds IBM's OIDC provider to the list of providers.
Closes: #1891