GitHub Actions
Environment variables
The Authentication environment variables can be configured with Secret Variables.
In this example a publish type NPM_TOKEN
is required to publish a package to the npm registry. GitHub Actions automatically populate a GITHUB_TOKEN
environment variable which can be used in Workflows.
npm provenance
Since GitHub Actions is a supported provider for npm provenance, it is recommended to enable this to increase supply-chain security for your npm packages. Find more detail about configuring npm to publish with provenance through semantic-release in the documentation for our npm plugin.
Node project configuration
GitHub Actions support Workflows, allowing to run tests on multiple Node versions and publish a release only when all test pass.
Note: The publish pipeline must run on a Node version that meets our version requirement.
.github/workflows/release.yml
configuration for Node projects
.github/workflows/release.yml
configuration for Node projectsThe following is a minimal configuration for semantic-release
with a build running on the latest LTS version of Node when a new commit is pushed to a master/main
branch. See Configuring a Workflow for additional configuration options.
Pushing package.json
changes to your repository
package.json
changes to your repositoryIf you choose to commit changes to your package.json
against our recommendation, the @semantic-release/git
plugin can be used.
Note: Automatically populated GITHUB_TOKEN
cannot be used if branch protection is enabled for the target branch. It is not advised to mitigate this limitation by overriding an automatically populated GITHUB_TOKEN
variable with a Personal Access Tokens, as it poses a security risk. Since Secret Variables are available for Workflows triggered by any branch, it becomes a potential vector of attack, where a Workflow triggered from a non-protected branch can expose and use a token with elevated permissions, yielding branch protection insignificant. One can use Personal Access Tokens in trusted environments, where all developers should have the ability to perform administrative actions in the given repository and branch protection is enabled solely for convenience purposes, to remind about required reviews or CI checks.
If the risk is acceptable, some extra configuration is needed. The actions/checkout persist-credentials
option needs to be false
, otherwise the generated GITHUB_TOKEN
will interfere with the custom one. Example:
Trigger semantic-release on demand
Using GUI:
You can use Manual Triggers for GitHub Actions.
Using HTTP:
Use repository_dispatch
event to have control on when to generate a release by making an HTTP request, e.g.:
To trigger a release, call (with a Personal Access Tokens stored in GITHUB_TOKEN
environment variable):
Using 3rd party apps:
If you'd like to use a GitHub app to manage this instead of creating a personal access token, you could consider using a project like:
Actions Panel - A declaratively configured way for triggering GitHub Actions
Action Button - A simple badge based mechanism for triggering GitHub Actions
Last updated