GitHub allows automated builds using GitHub Actions. A commonly asked question is how to release artifacts (packaged Java jars) built by Maven and Gradle to The Central Repository. The GitHub Actions documentation provides only part of the answer.
So, first, configure your Maven project for staging artifacts to The Central Repository, by reading through Configuring Your Project for Deployment and following those steps. Please make sure that the maven-gpg-plugin is configured to prevent gpg
from using PIN entry programs, as follows:
<configuration>
<gpgArguments>
<arg>--pinentry-mode</arg>
<arg>loopback</arg>
</gpgArguments>
</configuration>
At this point, you should be able to manually stage your artifacts to The Central Repository.
Next, set up a basic GitHub Actions workflow to build your project. Take a look at Publishing Java packages with Maven, and complete all the steps there.
At this point, you will find that you are missing one step - being able to sign your Maven-built jar files within your GitHub Actions workflow. You can follow the steps below to sign artifacts in GitHub actions. The trick involves loading in your private key into GitHub Actions using the gpg command-line commands.
- Export your gpg private key from the system on which you have created it.
- Find your key-id (using
gpg --list-secret-keys --keyid-format=long
) - Export the gpg secret key to an ASCII file using
gpg --export-secret-keys -a <key-id> > secret.txt
- Edit
secret.txt
using a plain text editor, and replace all newlines with a literal "\n" (backslash + n) until everything is on a single line
- Find your key-id (using
- Set up GitHub Actions secrets
- Create a secret called
OSSRH_GPG_SECRET_KEY
using the text from your editedsecret.txt
file (the whole text should be in a single line) as the value - Create a secret called
OSSRH_GPG_SECRET_KEY_PASSWORD
containing the password for your gpg secret key
- Create a secret called
- Create a GitHub Actions step to install the gpg secret key
- Add an action similar to:
- id: install-secret-key name: Install gpg secret key run: | # Install gpg secret key cat <(echo -e "${{ secrets.OSSRH_GPG_SECRET_KEY }}") | gpg --batch --import # Verify gpg secret key gpg --list-secret-keys --keyid-format LONG
- Verify that the secret key is shown in the GitHub Actions logs
- You can remove the output from list secret keys if you are confident that this action will work, but it is better to leave it in there
- Add an action similar to:
- Bring it all together, and create a GitHub Actions step to publish
- Add an action similar to:
- id: publish-to-central name: Publish to Central Repository env: MAVEN_USERNAME: ${{ secrets.OSSRH_USERNAME }} MAVEN_PASSWORD: ${{ secrets.OSSRH_TOKEN }} run: | mvn \ --no-transfer-progress \ --batch-mode \ -Dgpg.passphrase=${{ secrets.OSSRH_GPG_SECRET_KEY_PASSWORD }} \ clean deploy
- After a couple of hours, verify that the artifact got published to The Central Repository
- Add an action similar to:
I'm facing below error:
Failed to execute goal org.sonatype.plugins:nexus-staging-maven-plugin:1.6.7:deploy (injected-nexus-deploy) on project project-parent: Execution injected-nexus-deploy of goal org.sonatype.plugins:nexus-staging-maven-plugin:1.6.7:deploy failed: Server credentials with ID "ossrh-user-in" not found! -> [Help 1]