[main] Allow CF Authentication based on Tokens - user and client tokens#3397
Merged
a-b merged 1 commit intocloudfoundry:mainfrom Mar 14, 2025
strehle:enhancement/3368
Merged
[main] Allow CF Authentication based on Tokens - user and client tokens#3397a-b merged 1 commit intocloudfoundry:mainfrom strehle:enhancement/3368
a-b merged 1 commit intocloudfoundry:mainfrom
strehle:enhancement/3368
Conversation
10 tasks
strehle
added a commit
to strehle/cmdline-openid-client
that referenced
this pull request
Feb 28, 2025
Used for testing UAA changes with token exchanges, e.g. cloudfoundry/cli#3397
strehle
added a commit
to strehle/cmdline-openid-client
that referenced
this pull request
Feb 28, 2025
Used for testing UAA changes with token exchanges, e.g. cloudfoundry/cli#3397
strehle
added a commit
to strehle/cmdline-openid-client
that referenced
this pull request
Mar 7, 2025
Used for testing UAA changes with token exchanges, e.g. cloudfoundry/cli#3397
Member
Author
|
@a-b Can you give me a timeline about when somebody checks the PR ? There is one failing test but I dont see a relation to my changes. The extension is for https://github.com/cloudfoundry/community/blob/main/toc/rfc/rfc-0037-deprecate-passwords.md#cf-cli I will provide PRs for the other repos and also for cf login after that but first I would like to know if you accept this enhancments Thanks in advance |
Member
|
Hi. I'll look into this shortly. |
a-b
approved these changes
Mar 14, 2025
Member
|
We are currently only releasing from the v8 branch. @strehle, are you planning to create a PR for v8? |
Member
Author
Member
|
Yes v7 is out of support. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Note: Please create separate PR for every branch (main, v8 and v7) as needed.
Description of the Change
Enhance the cf auth command with a parameter --assertion. The content of this token should be either a user token in order to perform a jwt-bearer or a client token in order to perform a client_credentials grant with federated trust.
UAA supports JWT bearer since UAA 4.5.0 , see https://docs.cloudfoundry.org/api/uaa/version/77.25.0/index.html#jwt-bearer-token-grant
UAA support the federated client credential flow since 77.25.0
Why Is This PR Valuable?
CF can be integrated into Github Action without any extra secret setup in Github Repo.
Customer can then decide about using external tokens like github action token for user and/or client authentication.
In a PR you retrieve a id_token from gh action, this can be passed with cf auth --assertion so that you are authentication in or to do a cf push ...
Applicable Issues
How Urgent Is The Change?
Other Relevant Parties
Only CF landscapes with a configured trust to external OIDC parties