simon,
@simon@simonwillison.net avatar

Glad to see I'm not the only person howling with despair at how difficult it is to build anything that involves OpenID Connect in the comments on this Hacker News thread https://news.ycombinator.com/item?id=38868610

timbray,
@timbray@cosocial.ca avatar

@simon There were two years of my life when I was DevRel in the Google Identity Group and my whole life was explaining OIDC and writing sample apps. The spec has bugs - it allows dumb security holes - but everyone has learned to avoid them. From the coding point of view I found it pretty straightforward and logical. Some library implementations try to hide the underlying message formats and end up making it harder to understand.

simon,
@simon@simonwillison.net avatar

@timbray my problem isn't so much with OIDC as it is with the UI and documentation you have to follow as an engineer to set it up - all I want to do is run a GitHub Action that deploys a website to Google Cloud, but figuring out how to set that up is way, way harder than it should be

simon,
@simon@simonwillison.net avatar
timbray,
@timbray@cosocial.ca avatar

@simon Kind of sad, because the underlying flows and token formats and so on are straightforward and pleasingly free of abstractions. There's an analogy with things like various programming languages providing horrid abstracted/complexified APIs to simple concrete things like HTTP GET/POST.

evan,
@evan@cosocial.ca avatar

@simon The old ways are the best ways

https://www.youtube.com/watch?v=mRXH7hUbqbY

simon,
@simon@simonwillison.net avatar
evan,
@evan@cosocial.ca avatar

@simon an oldie but a goodie. I didn't know you then, but it made my day when you used Wikitravel as the example site.

andypiper,
@andypiper@macaw.social avatar

@simon ... I suppose that's a bullet dodged in my case then, that was on the agenda for Twitter API v2 once upon a time, and I would have strongly disliked having to be the support person... 😬

simon, (edited )
@simon@simonwillison.net avatar

Some day I really do intend to make my way through https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-google-cloud-platform - "Configuring OpenID Connect in Google Cloud Platform" for GitHub Actions - but every time I look at that page my willpower disintegrates within seconds

simon,
@simon@simonwillison.net avatar

... I think I just found the missing information! It turns out the crucial gcloud commands I needed to run were hidden away behind a collapsed details/summary element in a README

Submitted a PR suggesting they make that information more directly visible https://github.com/google-github-actions/auth/pull/377

ajs,

@simon I’ve set OIDC up with AWS and GCP and it’s intimidating at first sight. But also totally worth it when you realise you don’t need to manage and worry about the tokens/secrets any more. The actions just implicitly run as the service account, just as if you’re using workload identity in a VM or CloudRun action or whatever. Totally worth it.

simon,
@simon@simonwillison.net avatar

@ajs I'm sure it's worth it, but I still can't quite force myself to wade through the expected pile of frustration to get from here to there!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • DreamBathrooms
  • mdbf
  • ethstaker
  • magazineikmin
  • cubers
  • rosin
  • thenastyranch
  • Youngstown
  • osvaldo12
  • slotface
  • khanakhh
  • kavyap
  • InstantRegret
  • Durango
  • megavids
  • everett
  • tacticalgear
  • modclub
  • Leos
  • cisconetworking
  • tester
  • ngwrru68w68
  • GTA5RPClips
  • anitta
  • provamag3
  • normalnudes
  • JUstTest
  • lostlight
  • All magazines