Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature request: Use github repository deployment keys to authenticate #60

Open
kopptr opened this issue Oct 18, 2017 · 3 comments
Open

Comments

@kopptr
Copy link

kopptr commented Oct 18, 2017

Github provides Oauth2 access tokens on a per-user basis to authenticate against their API, which you use.

If I understand correctly, the token scope granularity is only on a public / private repo basis, not on a per-repo basis. That is to say, a token with the repo scope will give the token permissions on all of the private repositories a user can access, and the public_repo scope does the same for all public repos the user can access.

If a team wants to use this feature, then an individual team member's credentials must be used in the concourse pipeline with this resource. This means that 1) other team members may have access to repos they should not and 2) when that team member rolls off, the credential must be changed.

Github also provides access on a per-repository basis with deployment SSH keys. It would be nice if github-release-resource could use these keys to authenticate, so that teams with multiple members do not need to put an individual team member's credentials in their concourse pipeline.

@xoebus
Copy link
Contributor

xoebus commented Mar 16, 2018

Is it possible to authenticate with the API using SSH keys? This would be cool but I don't see anything in their documentation mentioning this.

@ghost
Copy link

ghost commented Mar 19, 2018

@xoebus I don't think that's possible. Access tokens and ssh keys have different permissions anyway.

@ghost
Copy link

ghost commented Mar 19, 2018

@kopptr I suggest using a "service account" in this case. A single user that's not associated with a human. Credentials to log in as that user and change permissions should be restricted to existing github admins.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants