semantic-release-plus
master
master
  • Introduction
  • Usage
    • Getting started
    • Installation
    • CI Configuration
    • Configuration
    • Plugins
    • Workflow configuration
    • Shareable configurations
  • Extending
    • Plugins
    • Shareable configuration
  • Recipes
    • CI configurations
      • CircleCI 2.0
      • Travis CI
      • GitLab CI
      • GitHub Actions
      • Jenkins CI
    • Git hosted services
      • Git authentication with SSH keys
    • Release Workflow
      • Publishing on distribution channels
      • Publishing maintenance releases
      • Publishing pre-releases
    • Monorepos
      • nx monorepo
    • Utility
      • Get expected next version
  • Developer guide
    • JavaScript API
    • Plugin development
    • Shareable configuration development
  • Support
    • Resources
    • Frequently Asked Questions
    • Troubleshooting
    • Node version requirement
    • Node Support Policy
    • Git version requirement
Powered by GitBook
On this page
  • Environment variables
  • Node project configuration
  • .github/workflows/release.yml configuration for Node projects
  • Pushing package.json changes to a master branch
  • Trigger semantic-release on demand
  • Using GUI:
  • Using HTTP:
  • Using 3rd party apps:

Was this helpful?

  1. Recipes
  2. CI configurations

GitHub Actions

PreviousGitLab CINextJenkins CI

Last updated 3 years ago

Was this helpful?

Environment variables

The environment variables can be configured with .

In this example a publish type is required to publish a package to the npm registry. GitHub Actions a environment variable which can be used in Workflows.

Node project configuration

support , allowing to run tests on multiple Node versions and publish a release only when all test pass.

Note: The publish pipeline must run on a .

.github/workflows/release.yml configuration for Node projects

The following is a minimal configuration for with a build running on the latest LTS version of Node when a new commit is pushed to a master branch. See for additional configuration options.

name: Release
on:
  push:
    branches:
      - master
jobs:
  release:
    name: Release
    runs-on: ubuntu-latest
    steps:
      - name: Checkout
        uses: actions/checkout@v2
        with:
          fetch-depth: 0
      - name: Setup Node.js
        uses: actions/setup-node@v2
        with:
          node-version: 'lts/*'
      - name: Install dependencies
        run: npm ci
      - name: Release
        env:
          GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
          NPM_TOKEN: ${{ secrets.NPM_TOKEN }}
        run: npx semantic-release

Pushing package.json changes to a master branch

- name: Checkout
    uses: actions/checkout@v2
    with:
      fetch-depth: 0
      persist-credentials: false # <--- this

Trigger semantic-release on demand

Using GUI:

Using HTTP:

name: Release
on:
  repository_dispatch:
    types: [semantic-release]
jobs:
# ...
$ curl -v -H "Accept: application/vnd.github.everest-preview+json" -H "Authorization: token ${GITHUB_TOKEN}" https://api.github.com/repos/[org-name-or-username]/[repository]/dispatches -d '{ "event_type": "semantic-release" }'

Using 3rd party apps:

If you'd like to use a GitHub app to manage this instead of creating a personal access token, you could consider using a project like:

To keep package.json updated in the master branch, plugin can be used.

Note: Automatically populated GITHUB_TOKEN cannot be used if branch protection is enabled for the target branch. It is not advised to mitigate this limitation by overriding an automatically populated GITHUB_TOKEN variable with a , as it poses a security risk. Since Secret Variables are available for Workflows triggered by any branch, it becomes a potential vector of attack, where a Workflow triggered from a non-protected branch can expose and use a token with elevated permissions, yielding branch protection insignificant. One can use Personal Access Tokens in trusted environments, where all developers should have the ability to perform administrative actions in the given repository and branch protection is enabled solely for convenience purposes, to remind about required reviews or CI checks.

If the risk is acceptable, some extra configuration is needed. The option needs to be false, otherwise the generated GITHUB_TOKEN will interfere with the custom one. Example:

You can use for GitHub Actions.

Use event to have control on when to generate a release by making an HTTP request, e.g.:

To trigger a release, call (with a stored in GITHUB_TOKEN environment variable):

- A declaratively configured way for triggering GitHub Actions

- A simple badge based mechanism for triggering GitHub Actions

Authentication
Secret Variables
NPM_TOKEN
automatically populate
GITHUB_TOKEN
GitHub Actions
Workflows
Node version that meets our version requirement
semantic-release
Configuring a Workflow
@semantic-release/git
Personal Access Tokens
actions/checkout persist-credentials
Manual Triggers
repository_dispatch
Personal Access Tokens
Actions Panel
Action Button