-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Approval for installing Octo STS in Sigstore GitHub organization #51
Comments
cc @jku who had looked into PATs vs apps for tuf-on-ci |
when we install the App we can select only the repos we want for now +1 to have this! :D |
+1 |
I think the idea is far better than other options so far: +1. I can't confidently say I understand the policy side fully. Is the trust policy file documented somewhere? I have trouble finding anything other than the short README. |
I was wondering about this too as I wrote this policy. I didn't find any more docs but I located the source code that compiles and checks the policy here. |
i will add some examples, thanks for the feedback |
During the TSC call on this, some concerns were raised about giving octo-sts too many permissions, and I have since begun using Dependabot grouped updates which resolve the original issue well enough, so this is no longer needed. |
Question
I am seeking permission to install the Octo STS GitHub App in the Sigstore GitHub organization, to enable the following workflows:
This app can be used to replace PATs used within the Sigstore organization, simplifying maintenance burden and improving security.
The alternative to this is to use PATs for the above workflows.
I have already updated the first (sigstore-go) workflow to use octo-sts, and I have successfully demonstrated this working on a private organization.
The text was updated successfully, but these errors were encountered: