-
Notifications
You must be signed in to change notification settings - Fork 4
Try out trusted publishing for crates.io #69
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
thanks for testing! let me know if you have any feedback 😉 |
Oh sure! Is here a good place to drop some minor thoughts or is there a better location? |
sure, yeah :) |
Ok happy to! Overall a really nice feature, I look forward to using in larger repos. Thank you (and others!) for working on it! Two very minor things I noticed which aren't blockers in any way:
And one slightly larger ask: For larger repositories (e.g. Wasmtime's workspace) one thing we'll want to do is update our script to ensure that all crates in the workspace have a trusted publishing workflow registered. That'll require us to slightly change our development practices where if a new crate is added we won't be able to merge the PR until someone publishes a dummy version of the crate and registers the trusted publishing workflow, but all that seems fine to me. Question for you though, is there a way to discover through the crate.io API whether there's a trusted publishing workflow registered for a crate? That would be something our script would curl and check to use to prevent merging PRs that add new crates which don't have the trusted publishing workflow set. |
I'll need to do some research, but I think that should be possible to some degree.
I thought I had included that, but apparently it got lost somehow. I'll add it back 👍
generally yes, but since we're still testing and haven't committed to the API design yet the APIs are currently limited to cookie-only authentication so that our frontend is the only API user allowed. once we're feeling confident about the design we will likely open the API up to API token auth too. |
Nice, and sounds great! This is all nice enough I might say we should add in the auto-verification in the future and just go ahead and rely on this in the meantime... Regardless thanks so much again for the work here! |
|
Unfortunately we only get the "run ID" but not the "job ID" from GitHub (see https://docs.github.com/en/actions/concepts/security/about-security-hardening-with-openid-connect), but that still seems reasonably useful :) |
No description provided.