Skip to content

Tracking support for full private Sigstore setup with model validation controller and custom OIDC provider #34

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
3 of 8 tasks
SequeI opened this issue May 22, 2025 · 0 comments
Assignees
Labels
enhancement New feature or request

Comments

@SequeI
Copy link

SequeI commented May 22, 2025

Summary

This issue is meant to track the enhancements and fixes being done upstream to support running a fully private Sigstore instance alongside the model validation controller, with compatibility for a custom OIDC client, such as Keycloak.

Goals:
Enable the use of a custom OIDC issuer and client (e.g. Keycloak) with proper audience handling.

Allow the trust configuration to work end-to-end without hardcoding assumptions like sigstore as the audience/client ID.

Ensure the model validation controller can interoperate smoothly with a private Fulcio/Rekor/TSA stack.

Support standard OAuth redirect flows to improve compatibility with modern OIDC providers (Google, Keycloak, etc.).

Dependencies & Related PRs:

This issue will serve as a central tracker for anyone wanting to deploy a self-hosted Sigstore setup without relying on the public infrastructure.

@SequeI SequeI added the enhancement New feature or request label May 22, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant