OIDC / “trusted publishing” support for wrangler deploys (no long‑lived API tokens) #11434
Juice10
started this conversation in
Feature Requests
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi folks 👋
First off, thanks for all the work on
wranglerand the broaderworkers-sdk, it's really a pleasure to develop on top of!As far as I can tell, the current recommended way to deploy from GitHub Actions is:
CLOUDFLARE_API_TOKEN).wrangler/wrangler-actionin CI.That works, but it means each repo (or CI environment) ends up holding a powerful, persistent credential.
Across the ecosystem there’s a strong shift toward “trusted publishing” based on OpenID Connect (OIDC) instead of long‑lived static tokens. For example, npm is moving to OIDC‑based trusted publishing from CI providers (GitHub Actions, GitLab, etc.), so you don’t need to mint or store npm tokens in repo secrets anymore.
There’s a good write‑up of that model here (which also links to the npm docs):
https://www.mbgsec.com/archive/2025-09-23-trusted-publishing-for-npm-packages-npm-docs/
For Cloudflare Workers, it would be amazing to have a similar flow for deployments from GitHub Actions:
A workflow job has
id-token: writeand requests an OIDC ID token from GitHub.Either:
wrangleritself, orexchanges that OIDC token for a short‑lived, scoped credential that is valid only for that job/run and has just enough privilege to deploy a specific Worker / project.
No long‑lived Cloudflare API token needs to live in GitHub repo/org secrets.
Benefits
Questions
Having first‑class OIDC support for
wranglerdeploys would be a big win for anyone trying to keep CI credentials minimal, short‑lived, and auditable. Thanks for considering it!Beta Was this translation helpful? Give feedback.
All reactions