The blessed :octocat: GitHub Action, for publishing your 📦 distribution files to PyPI: https://github.com/marketplace/actions/pypi-publish
Find a file
Sviatoslav Sydorenko daa899706d
Some checks are pending
🏗️ / smoke-test (push) Waiting to run
🏗️ / build-and-push (push) Blocked by required conditions
📝 Add a GH Sponsors badge
2024-12-10 02:15:24 +01:00
.github 🧪 Add a Maturin-based package to CI 2024-12-06 19:35:46 +01:00
requirements 📦 Only keep lower bounds @ input requirements 2024-12-09 15:07:39 +01:00
.gitignore Initial commit 2019-03-27 19:44:44 +01:00
.pip-tools.toml Add a config file for pip-tools 2024-03-07 23:43:48 +01:00
.pre-commit-config.yaml 🧪 Allow 8 module members @ flake8 rule 2024-12-10 01:36:36 +01:00
.yamllint Inherit yamllint config from the default preset 2022-11-30 10:05:59 +01:00
action.yml Pre-install Python if there's none 2024-11-06 16:20:12 +01:00
attestations.py 💅 Add a return type to die() @ attestations 2024-12-10 01:35:33 +01:00
create-docker-action.py 🧪 Use prefetched action to make trampoline 2024-11-06 15:47:43 +01:00
Dockerfile Add nudge message with magic link to create new Trusted Publisher 2024-09-05 17:25:58 +02:00
LICENSE.md Adjust the license file for licensee to detect it 2019-12-25 16:03:54 +01:00
oidc-exchange.py oidc-exchange: add workflow_ref to debug msg 2024-11-22 12:58:46 -05:00
print-hash.py Remove redundant Path.absolute() call 2024-09-03 16:21:03 +02:00
print-pkg-names.py Add nudge message with magic link to create new Trusted Publisher 2024-09-05 17:25:58 +02:00
README.md 📝 Add a GH Sponsors badge 2024-12-10 02:15:24 +01:00
twine-upload.sh Fix magic link nudge formatting in job summary 2024-09-27 20:47:50 +02:00

SWUbanner

PyPA badge 🧪 GitHub Actions CI/CD workflow tests badge pre-commit.ci status badge GH Sponsors badge

PyPI publish GitHub Action

This action allows you to upload your Python distribution packages in the dist/ directory to PyPI. This text suggests a minimalistic usage overview. For more detailed walkthrough check out the PyPA guide.

If you have any feedback regarding specific action versions, please leave comments in the corresponding per-release announcement discussions.

Tip

A limited number of usage scenarios is supported, including the PyPA guide example. See the non-goals for more detail.

🌇 master branch sunset

The master branch version has been sunset. Please, change the GitHub Action version you use from master to release/v1 or use an exact tag, or opt-in to use a full Git commit SHA and Dependabot.

Usage

Trusted publishing

Note

Trusted publishing cannot be used from within a reusable workflow at this time. It is recommended to instead create a non-reusable workflow that contains a job calling your reusable workflow, and then do the trusted publishing step from a separate job within that non-reusable workflow. Alternatively, you can still use a username/token inside the reusable workflow.

Note

Trusted publishing is sometimes referred to by its underlying technology -- OpenID Connect, or OIDC for short. If you see references to "OIDC publishing" in the context of PyPI, this is what they're referring to.

This example jumps right into the current best practice. If you want to use API tokens directly or a less secure username and password, check out how to specify username and password.

This action supports PyPI's trusted publishing implementation, which allows authentication to PyPI without a manually configured API token or username/password combination. To perform trusted publishing with this action, your project's publisher must already be configured on PyPI.

To enter the trusted publishing flow, configure this action's job with the id-token: write permission and without an explicit username or password:

# .github/workflows/ci-cd.yml
jobs:
  pypi-publish:
    name: Upload release to PyPI
    runs-on: ubuntu-latest
    environment:
      name: pypi
      url: https://pypi.org/p/<your-pypi-project-name>
    permissions:
      id-token: write  # IMPORTANT: this permission is mandatory for trusted publishing
    steps:
    # retrieve your distributions here

    - name: Publish package distributions to PyPI
      uses: pypa/gh-action-pypi-publish@release/v1

Note

Pro tip: instead of using branch pointers, like unstable/v1, pin versions of Actions that you use to tagged versions or sha1 commit identifiers. This will make your workflows more secure and better reproducible, saving you from sudden and unpleasant surprises.

Other indices that support trusted publishing can also be used, like TestPyPI:

- name: Publish package distributions to TestPyPI
  uses: pypa/gh-action-pypi-publish@release/v1
  with:
    repository-url: https://test.pypi.org/legacy/

(don't forget to update the environment name to testpypi or similar!)

Note

Pro tip: only set the id-token: write permission in the job that does publishing, not globally. Also, try to separate building from publishing — this makes sure that any scripts maliciously injected into the build or test environment won't be able to elevate privileges while flying under the radar.

A common use case is to upload packages only on a tagged commit, to do so add a filter to the job:

    if: github.event_name == 'push' && startsWith(github.ref, 'refs/tags')

Generating and uploading attestations

Important

Support for generating and uploading digital attestations is currently experimental and limited only to Trusted Publishing flows using PyPI or TestPyPI. Support for this feature is not yet stable; the settings and behavior described below may change without prior notice.

Note

Generating and uploading digital attestations currently requires authentication with a trusted publisher.

Generating signed digital attestations for all the distribution files and uploading them all together is now on by default for all projects using Trusted Publishing. To disable it, set attestations as follows:

   with:
     attestations: false

The attestation objects are created using Sigstore for each distribution package, signing them with the identity provided by the GitHub's OIDC token associated with the current workflow. This means both the trusted publishing authentication and the attestations are tied to the same identity.

Non-goals

This GitHub Action has nothing to do with building package distributions. Users are responsible for preparing dists for upload by putting them into the dist/ folder prior to running this Action. They are typically expected to do this in a separate GitHub Actions CI/CD job running before the one where they call this action and having restricted privileges.

Important

Since this GitHub Action is docker-based, it can only be used from within GNU/Linux based jobs in GitHub Actions CI/CD workflows. This is by design and is unlikely to change due to a number of considerations we rely on.

This should not stop one from publishing platform-specific distribution packages, though. It is strongly advised to separate jobs for building the OS-specific wheels from the publish job. This allows one to (1) test exactly the same artifacts that are about to be uploaded to PyPI, (2) prevent parallel unsynchronized jobs from publishing only part of the dists asynchronously (in case when part of the jobs fail and others succeed ending up with an incomplete release on PyPI) and (3) make an atomic upload to PyPI (when part of the dists appear on PyPI, installers like pip will use that version for the dependency resolution but this may cause some environments to use sdists while the wheel for their runtime is not yet available).

To implement this sort of orchestration, please use actions/upload-artifact and actions/download-artifact actions for sharing the built dists across stages and jobs. Then, use the needs setting to order the build, test and publish stages.

The expected environment for running pypi-publish is the GitHub-provided Ubuntu VM. We are running a smoke-test against ubuntu-latest in CI but any currently available numbered versions should do. We'll consider them supported for as long as GitHub itself supports them.

Running the action in a job that has a container: set is not supported. It might work for you but you're on your own when it breaks. If you feel the need to use it, it's likely that you're not following the recommendation of invoking the build automation in a separate job, which is considered a security issue (especially, when using Trusted Publishing that may cause privilege escalation and would enable the attackers to impersonate the GitHub-backed identity of the repository through transitive build dependency poisoning). The solution is to have one job (or multiple, in case of projects with C-extensions) for building the distribution packages, followed by another that publishes them.

Self-hosted runners are best effort, provided no other unsupported things influence them. We are unable to test this in CI and they may break. This is often the case when using custom runtimes and not the official GitHub-provided VMs. In general, if you follow the recommendation of building in a separate job, you shouldn't need to run this action within a self-hosted runner — it should be possible to build your dists in a self-hosted runner, save them as a GitHub Actions artifact in that job, and then invoke the publishing job that would run within GitHub-provided runners, downloading the artifact with the dists and publishing them. Such separation is the recommended/supported way of handling this scenario. Our understandng is that Trusted publishing is expected to work on self-hosted runners. It is backed by OIDC. If it doesn't work, you should probably ask GitHub if you missed something. We wouldn't be able to assist here.

Trusted Publishing cannot be tested in CI at the moment, sadly. It is supported and bugs should be reported but it may take time to sort out as it often requires cross-project collaboration to debug (sometimes, problems occur due to changes in PyPI and not in the action).

The only case that is explicitly unsupported at the moment is Trusted Publishing in reusable workflows. This requires support on the PyPI side and is being worked on. Please, do not report bugs related to this case. The current recommendation is to put everything else you want into a reusable workflow but keep the job calling pypi-publish in a top-level one.

Invoking pypi-publish from composite actions is unsupported. It is not tested. GitHub Runners have limitations and bugs in this case. But more importantly, this is usually an indication of using it insecurely. When using Trusted Publishing, it is imperative to keep build machinery invocation in a separate job with restrictive privileges as Trusted Publishing itself requires elevated permissions to make use of OIDC. Our observation is that the users sometimes create in-project composite actions that invoke building and publishing in the same job. As such, we don't seek to support such a dangerous configuration in the first place. The solution is pretty much the same as with the previous problem — use a separate job with dedicated and scoped privileges just for publishing; and invoke that in-project composite action from a different job.

And finally, invoking pypi-publish more than once in the same job is not considered supported. It may work in a limited number of scenarios but please, don't do this. If you want to publish to several indexes, build the dists in one job and add several publishing jobs, one per upload.

Advanced release management

For best results, figure out what kind of workflow fits your project's specific needs.

For example, you could implement a parallel job that pushes every commit to TestPyPI or your own index server, like devpi. For this, you'd need to (1) specify a custom repository-url value and (2) generate a unique version number for each upload so that they'd not create a conflict. The latter is possible if you use setuptools_scm package but you could also invent your own solution based on the distance to the latest tagged commit.

You'll need to create another token for a separate host and then save it as a GitHub repo secret under an environment used in your job. Though, passing a password would disable the secretless trusted publishing so it's better to configure it instead, when publishing to TestPyPI and not something custom.

The action invocation in this case would look like:

- name: Publish package to TestPyPI
  uses: pypa/gh-action-pypi-publish@release/v1
  with:
    password: ${{ secrets.TEST_PYPI_API_TOKEN }}
    repository-url: https://test.pypi.org/legacy/

Customizing target package dists directory

You can change the default target directory of dist/ to any directory of your liking. The action invocation would now look like:

- name: Publish package to PyPI
  uses: pypa/gh-action-pypi-publish@release/v1
  with:
    packages-dir: custom-dir/

Disabling metadata verification

It is recommended that you run twine check just after producing your files, but this also runs twine check before upload. You can also disable the twine check with:

   with:
     verify-metadata: false

Tolerating release package file duplicates

Sometimes, when you publish releases from multiple places, your workflow may hit race conditions. For example, when publishing from multiple CIs or even having workflows with the same steps triggered within GitHub Actions CI/CD for different events concerning the same high-level act.

To facilitate this use-case, you may use skip-existing (disabled by default) setting as follows:

   with:
     skip-existing: true

Note

Pro tip: try to avoid enabling this setting where possible. If you have steps for publishing to both PyPI and TestPyPI, consider only using it for the latter, having the former fail loudly on duplicates.

For Debugging

Sometimes, twine upload can fail and to debug use the verbose setting as follows:

   with:
     verbose: true

Showing hash values of files to be uploaded

You may want to verify whether the files on PyPI were automatically uploaded by CI script. It will show SHA256, MD5, BLAKE2-256 values of files to be uploaded.

  with:
    print-hash: true

Specifying a different username

The default username value is __token__. If you publish to a custom registry that does not provide API tokens, like devpi, you may need to specify a custom username and password pair. This is how it's done.

  with:
    user: guido
    password: ${{ secrets.DEVPI_PASSWORD }}

The secret used in ${{ secrets.DEVPI_PASSWORD }} needs to be created on the environment page under the settings of your project on GitHub. See Creating & using secrets.

In the past, when publishing to PyPI, the most secure way of the access scoping for automatic publishing was to use the API tokens feature of PyPI. One would make it project-scoped and save as an environment-bound secret in their GitHub repository settings, naming it ${{ secrets.PYPI_API_TOKEN }}, for example. See Creating & using secrets. While still secure, trusted publishing is now encouraged over API tokens as a best practice on supported platforms (like GitHub).

License

The Dockerfile and associated scripts and documentation in this project are released under the BSD 3-clause license.