You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: release.md
+12-17
Original file line number
Diff line number
Diff line change
@@ -2,21 +2,17 @@
2
2
3
3
Here we describe all the ceremonial stuff necessary to publish a Java library to Maven Central.
4
4
5
-
6
5
## Credentials
7
6
8
-
Publishing to Maven Central requires authentication in the form of a username-password or an User Token (as username and password).
9
-
We use User Tokens [2] for authentication, which are stored in our password manager.
7
+
Publishing to Maven Central requires authentication in the form of username and password or user token (as username and password). We use [user tokens][user-token] for authentication, which are stored in our password manager.
10
8
11
9
### Local (on device)
12
10
13
11
The `MAVEN_USERNAME` and `MAVEN_PASSWORD` environment variable needs to be set on the device.
14
12
15
13
### GitHub Actions
16
14
17
-
In the GitHub Secrets [1], we need to add two secrets called `MAVEN_USERNAME` and `MAVEN_PASSWORD` (Github enforces a leading `SECRET_TOKEN`).
18
-
They can be accessed in a yaml file with `${{ secrets.MAVEN_USERNAME }}` and `${{ secrets.MAVEN_PASSWORD }}`.
19
-
We pass both these secrets in the `env` block.
15
+
In the [GitHub Secrets][gh-secrets], we need to add two secrets called `MAVEN_USERNAME` and `MAVEN_PASSWORD`. They can be accessed in a yaml file with `${{ secrets.MAVEN_USERNAME }}` and `${{ secrets.MAVEN_PASSWORD }}`. We pass both these secrets in the `env` block.
20
16
21
17
For example:
22
18
@@ -30,7 +26,7 @@ For example:
30
26
31
27
## GPG Guide for Maven Signing
32
28
33
-
This guide is based on [Working with PGP Signatures](https://central.sonatype.org/publish/requirements/gpg/) and [OpenPGP Best Practices](https://riseup.net/ru/security/message-security/openpgp/gpg-best-practices).
29
+
This guide is based on [Working with PGP Signatures][pgp-signatures] and [OpenPGP Best Practices][pgp-best-practices].
34
30
35
31
### About our key
36
32
@@ -50,7 +46,7 @@ gpg --full-generate-key
50
46
51
47
### Import the private key
52
48
53
-
Download private key from password manager and import it locally
49
+
Download private key from password manager and import it locally:
54
50
55
51
```shell
56
52
gpg --import private.key
@@ -64,10 +60,8 @@ gpg --import private.key
64
60
gpg --armor --export-secret-keys $KEYID
65
61
```
66
62
67
-
In the GitHub Secrets [1], add the output of this command to the `SIGNING_KEY` secret.
68
-
Additionally, you must add the corresponding password in as `SIGNING_PASSWORD`.
69
-
Both can be accessed in a yaml file with `${{ secrets.SIGNING_KEY }}` and `${{ secrets.SIGNING_PASSWORD }}`.
70
-
We pass both these secrets in the `env` block-
63
+
In the [GitHub Secrets][gh-secrets], add the output of this command to the `SIGNING_KEY` secret.
64
+
Additionally, you must add the corresponding password as `SIGNING_PASSWORD`. Both can be accessed in a YAML file with `${{ secrets.SIGNING_KEY }}` and `${{ secrets.SIGNING_PASSWORD }}`. We pass both these secrets in the `env` block.
It is recommended to use an expiration date less than two years. We use an interval of **two years**. This means that we need to extend the expiration date every two years! We use an appointment of the secureCodeBox team calendar which to remind us.
84
+
It is recommended to use an expiration date less than two years. We use an interval of **two years**. This means that we need to extend the expiration date every two years! We use an appointment of the secureCodeBox team calendar to remind us.
92
85
93
86
#### How to extend the expiration date?
94
87
95
88
1. Download the private key file `private.key` from password manager
96
89
2. Import it locally: `gpg --import private.key`
97
90
3. Select the key : `gpg --edit-key $KEYID`
98
-
4. Now select the subkey and set the expire date (use `2y` for two years):
91
+
4. Now select the subkey and set the expiry date (use `2y` for two years):
99
92
```shell
100
93
gpg> key 1
101
94
gpg> expire
@@ -106,5 +99,7 @@ gpg> save
106
99
```
107
100
6. Update the private key in out password manager and GitHub Secrets
0 commit comments