Releases: testifysec/act
Releases Β· testifysec/act
v0.2.82-oidc - OIDC ID Token Support
OIDC ID Token Support for Act
This release adds GitHub Actions OIDC ID token support to enable keyless authentication for supply chain security tools like SIGSTORE and Witness.
What's New
OIDC Token Generation
- In-Process OIDC Server: Integrated OIDC endpoints into artifacts server
- 31 GitHub-Compliant Claims: Tokens match GitHub's official OIDC schema exactly
- RS256 Signing: Industry-standard RSA signatures with JWKS endpoint
- Custom Audiences: Support for sigstore, vault, AWS, and other OIDC consumers
Features
- β
POST
/token- Issue OIDC ID tokens - β
GET
/.well-known/jwks- Serve public keys for token verification - β
Environment variables:
ACTIONS_ID_TOKEN_REQUEST_URL,ACTIONS_ID_TOKEN_REQUEST_TOKEN - β Automatic token generation with GitHub context
- β 100% backward compatible - no breaking changes
Use Cases
- SIGSTORE: Keyless code signing and verification
- Witness: In-toto attestation framework
- HashiCorp Vault: Secret management
- AWS: Federated authentication
Testing
All tests passing:
- 8 unit tests for OIDC token generation
- 6 integration tests for HTTP endpoints
- End-to-end workflow validation
Example Usage
```yaml
name: Sign with SIGSTORE
on: push
jobs:
sign:
permissions:
id-token: write
steps:
- name: Sign artifact
run: |
cosign sign-blob artifact.txt
--oidc-issuer=https://token.actions.githubusercontent.com
--oidc-client-id=sigstore
```
Changes
See PR #1 for full implementation details.
π€ Generated with Claude Code