build(deps): bump zizmorcore/zizmor-action in the actions group (#58)
Bumps the actions group with 1 update: zizmorcore/zizmor-action.
Updates
zizmorcore/zizmor-actionfrom 0.5.0 to 0.5.2
updated-dependencies:
- dependency-name: zizmorcore/zizmor-action dependency-version: 0.5.2 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: actions …
Signed-off-by: dependabot[bot] support@github.com Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
版权所有:中国计算机学会技术支持:开源发展技术委员会
京ICP备13000930号-9
京公网安备 11010802032778号
extremely-dangerous-public-oidc-beacon
This repository publishes an OIDC identity token for testing purposes. This OIDC token should not be trusted, but it can be useful for testing Sigstore keyless signing and verification, see e.g. conformance testing.
Usage
The repository includes an action that will download the current token into working directory (
./oidc-token.txt):Details
The workflow
trigger-extremely-dangerous-oidc-beacon.ymldispatchesextremely-dangerous-oidc-beacon.ymlon a schedule. The latter intentionally leaks an OIDC identity token corresponding to its workflow identity. The token is made available in the workflow artifacts and also in an ephemeral (force-pushed) git branch current-token.The workflows are intentionally isolated in their own repository, within an otherwise unused GitHub organization, to minimize the possibility that users will incorrectly trust these identity tokens. The workflow names also include
extremely-dangerousto emphasize that identity tokens originating from them must not be trusted for anything except testing purposes.Because GitHub workflow scheduling is best-effort, the published token may sometimes be expired for a while. Users may want to retry a little later in these cases like the provided GitHub Action does.