Enable auth against GitHub in a more secure way via Yuvi's github-app-user-auth project
consideRatio opened this issue · 4 comments
UPDATE: Done
The application is now installed and verified to function!
Instructions on how to use it
- Install the GitHub application into specific github repos you wish to be able to push to.
Note that if this github application has already been installed for a repo by another person with access to the repo, then you wouldn't need to do it. - Use
github-app-auth-user
in a terminal to acquire credentials
Note that both your GitHub user needs permissions on the repo, and the github application needs to be "installed" on a repo, for you to modify its content. - Done - you can now do
git push
!
Original issue
The task of this issue as suggested by @fperez is to setup and trial @yuvipanda's new project to enable auth against GitHub in a way that doesn't risk leaking sensitive credentials to GitHub.
Initial thoughts
- Nice! This is extra relevant for example when JupyterLab
--collaborative
is enabling additional access to servers etc. - I wonder if we can ensure that credentials are inaccessible/revoked as soon as our jupyter server pod is stopped as well, or a similar enhancement could be relevant.
Related
I believe that the behavior is already as you suggest - the credentials are revoked once the server is stopped.
I'm using it in my stat159 hub and so far very happy, though I've only done some early testing. But it looks like an excellent solution!
yeah, credentials are stored in /tmp/
, so when the user container goes away so does the authentication :)
Nice @yuvipanda, what you described it was supposed to do - it seems to do really well - nice!!! 🎉 ❤️
@fperez it can now be used, I updated this issue's top comment with instructions!
Awesome, thx so much!