GitHub allows automated builds using GitHub Actions. A commonly asked question is how to release artifacts (packaged Java jars) built by Maven and Gradle to The Central Repository. The GitHub Actions documentation provides only part of the answer.
So, first, configure your Maven project for staging artifacts to The Central Repository, by reading through Configuring Your Project for Deployment and following those steps. Please make sure that the maven-gpg-plugin is configured to prevent gpg
from using PIN entry programs, as follows:
<configuration>
<gpgArguments>
<arg>--pinentry-mode</arg>
<arg>loopback</arg>
</gpgArguments>
</configuration>
At this point, you should be able to manually stage your artifacts to The Central Repository.
Next, set up a basic GitHub Actions workflow to build your project. Take a look at Publishing Java packages with Maven, and complete all the steps there.
At this point, you will find that you are missing one step - being able to sign your Maven-built jar files within your GitHub Actions workflow. You can follow the steps below to sign artifacts in GitHub actions. The trick involves loading in your private key into GitHub Actions using the gpg command-line commands.
- Export your gpg private key from the system that you have created it.
- Find your key-id
- Export the gpg secret key to an ASCII file using
gpg --export-secret-keys -a <key-id> > secret.txt
- Edit
secret.txt
using a plain text editor, and replace all newlines with a literal "\n"
- Set up GitHub Actions secrets
- Create a secret called
OSSRH_GPG_SECRET_KEY
using the text from your editedsecret.txt
file (the whole text should be in a single line) - Create a secret called
OSSRH_GPG_SECRET_KEY_PASSWORD
containing the password for your gpg secret key
- Create a secret called
-
Create a GitHub Actions step to install the gpg secret key
-
Add an action similar to:
- id: install-secret-key name: Install gpg secret key run: | cat <(echo -e "${{ secrets.OSSRH_GPG_SECRET_KEY }}") | gpg --batch --import gpg --list-secret-keys --keyid-format LONG
Verify that the secret key is shown in the GitHub Actions logs
You can remove the output from list secret keys if you are confident that this action will work, but it is better to leave it in there
-
-
Bring it all together, and create a GitHub Actions step to publish
-
Set your Maven
settings.xml
file like this:
- id: setup-jdk name: Setup JDK uses: actions/setup-java@v1 with: java-version: 8 server-id: sonatype-nexus server-username: MAVEN_USERNAME server-password: MAVEN_PASSWORD
-
Add an action similar to:
- id: publish-to-central name: Publish to Central Repository env: MAVEN_USERNAME: ${{ secrets.OSSRH_USERNAME }} MAVEN_PASSWORD: ${{ secrets.OSSRH_TOKEN }} run: | mvn \ --no-transfer-progress \ --batch-mode \ -Dgpg.passphrase=${{ secrets.OSSRH_GPG_SECRET_KEY_PASSWORD }} \ clean deploy
After a couple of hours, verify that the artifact got published to The Central Repository
-
Top comments (1)
We'll use your tutorial with @mbarre