-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support SONATYPE_TOKEN
environment variable for token authentication
#464
base: master
Are you sure you want to change the base?
Support SONATYPE_TOKEN
environment variable for token authentication
#464
Conversation
8a943d6
to
47bc250
Compare
Thank you for the PR. However, the user token format xxxx:yyyy is compatible with the legacy scheme if you set SONATYPE_USERNAME = xxxx and SONATYPE_PASSWORD = yyyy. Instead of introducing support for the xxxx:yyyy format, it might be easier to maintain if we simply update the documentation to recommend generating a token. |
Absolutely yes, there's no essential need for any new technical support in I would like a I've been working on name: Release
on:
workflow_dispatch:
jobs:
release:
uses: guardian/gha-scala-library-release-workflow/.github/workflows/reusable-release.yml@main
permissions: { contents: write, pull-requests: write }
secrets:
SONATYPE_PASSWORD: ${{ secrets.AUTOMATED_MAVEN_RELEASE_SONATYPE_PASSWORD }}
PGP_PRIVATE_KEY: ${{ secrets.AUTOMATED_MAVEN_RELEASE_PGP_SECRET }} As this file needs to be duplicated across many repos, I've done the best I can to keep its size small- for instance, only However, now that token authentication is a thing, the username is a revocable random string, and really should be treated as a secret. To avoid the extra line of config - a line that will be repeated a lot of times - I would really like to be able to support a To achieve that, I'm not sure I need support in I could also argue that using |
Thanks for the background and I understand the pain point. Right. It would not be easy to combine multiple credentials in GitHub Actions. |
Sonatype is now requiring token authentication, which I think maybe makes a stronger case for introducing Attempting to release now with a Nexus UI username and password login will get this
|
Token auth is now mandatory: xerial/sbt-sonatype#464 (comment) In January 2024, Sonatype started actively discouraging the legacy username & password method of authentication, recommending token authentication instead: * https://central.sonatype.org/news/20240109_issues_sonatype_org_deprecation/#support-requests * https://central.sonatype.org/publish/generate-token/ In this new scheme, the token is still split into a username/password format, and both are randomised strings, making the username portion a meaningful secret (ie one that can be revoked) and so worthy of being treated as a secret.
Token auth is now mandatory: xerial/sbt-sonatype#464 (comment) In January 2024, Sonatype started actively discouraging the legacy username & password method of authentication, recommending token authentication instead: * https://central.sonatype.org/news/20240109_issues_sonatype_org_deprecation/#support-requests * https://central.sonatype.org/publish/generate-token/ In this new scheme, the token is still split into a username/password format, and both are randomised strings, making the username portion a meaningful secret (ie one that can be revoked) and so worthy of being treated as a secret.
Token auth is now mandatory: xerial/sbt-sonatype#464 (comment) In January 2024, Sonatype started actively discouraging the legacy username & password method of authentication, recommending token authentication instead: * https://central.sonatype.org/news/20240109_issues_sonatype_org_deprecation/#support-requests * https://central.sonatype.org/publish/generate-token/ In this new scheme, the token is still split into a username/password format, and both are randomised strings, making the username portion a meaningful secret (ie one that can be revoked) and so worthy of being treated as a secret.
Token auth is now mandatory: xerial/sbt-sonatype#464 (comment) In January 2024, Sonatype started actively discouraging the legacy username & password method of authentication, recommending token authentication instead: * https://central.sonatype.org/news/20240109_issues_sonatype_org_deprecation/#support-requests * https://central.sonatype.org/publish/generate-token/ In this new scheme, the token is still split into a username/password format, and both are randomised strings, making the username portion a meaningful secret (ie one that can be revoked) and so worthy of being treated as a secret.
As of January 2024, Sonatype is actively discouraging the legacy username & password method of authentication, recommending token authentication instead.
In this new scheme, the token is still split into a username/password format, and both are randomised strings, making the username portion a meaningful secret (ie one that can be revoked).