You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# if no apikey is set, use use the id-token to get a jwt token for the deploy CLI
if [ -z"$APIKEY" ];then
if [ -z"$ACTIONS_ID_TOKEN_REQUEST_TOKEN" ] || [ -z"$ACTIONS_ID_TOKEN_REQUEST_URL" ];then
echo"Missing id-token permissions. This must be set either globally in the workflow, or for the specific job performing the deploy."
echo"For more info see https://doc.nais.io/build/how-to/build-and-deploy and/or https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs"
These JWTs acquired from GitHub have an expiry of 10 minutes. The expiry cannot be configured, as far as I can tell.
The token expiry takes precedence over the deployclient wait timeout which also defaults to 10 minutes, resulting in confusing error messages for end-users.
actions/deploy@v2 added support for using GitHub OIDC tokens to authenticate GitHub workflows for deployment:
deploy/actions/deploy/entrypoint.sh
Lines 44 to 57 in b89805c
These JWTs acquired from GitHub have an expiry of 10 minutes. The expiry cannot be configured, as far as I can tell.
The token expiry takes precedence over the deployclient wait timeout which also defaults to 10 minutes, resulting in confusing error messages for end-users.
Ideally, we should continue fetching new OIDC tokens for as long as the configured deployment timeout is still valid:
https://docs.github.com/en/actions/security-for-github-actions/security-hardening-your-deployments/about-security-hardening-with-openid-connect#updating-your-actions-for-oidc
This assumes that
ACTIONS_ID_TOKEN_REQUEST_TOKEN
is valid for the entirety of the duration of the action or workflow.The text was updated successfully, but these errors were encountered: