Replies: 1 comment 5 replies
-
@zetaab I'm a PM at Codecov 👋 Thanks for raising this and opening up PRs for the the codecov action and codecov api as well. As @thomasrockhu-codecov noted in your PR, a vast majority of our customers aren't using the OIDC. Having said that, I'd like to use discussion as way to gather more feedback on this, so I'm converting this into a discussion. I'll keep an eye on this here on out, and if we decide to move forward, I'll respond back here. |
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
What product do you want to improve?
uploader and codecov-api
Is your feature request related to a problem? Please describe.
no
Describe the solution you'd like
Currently minimal github action pipeline is following:
However, the I would like to propose removal of tokens in GHA pipelines. That can be achieved by using Github (or github enterprise) OIDC authentications (https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect).
After uploader and codecov-api supports Github oidc the new way of doing should be:
No more hassle with the hardcoded tokens and copy pasting them!
Basically, you can get the id token in github actions https://github.com/elisa-actions/healthcheck-event/blob/main/src/main.ts#L57 and that can be used for authenticating. Of course then codecov-api needs logic to verify the github id token correctly.
Beta Was this translation helpful? Give feedback.
All reactions