This action is today obsolete and is no longer maintained. We recommend using PyPI's native trusted publishing directly with GitHub Actions instead. See the PyPI documentation for more information.
The Python ecosystem has historically been fragmented when it comes to packaging and publishing. With the rise of tools like Hatch, pyproject.toml standardization and secure integrations like PyPI's Trusted Publisher (OIDC), we can now build and release Python packages more securely, reproducibly and with less manual work.
We share the process we follow. We split tagging, building, publication to PyPI into distinct jobs within the same workflow:
# Manual Release Workflow for Python Package using Hatch and
# Trusted Publisher (OIDC)
#
# This workflow implements a secure, maintainable release pipeline
# by separating concerns:
# - 🔖 Tagging the release (Git tag)
# - 🏗️ Building the package with Hatch
# - 🚀 Publishing to PyPI using OIDC (no passwords or secrets)
#
# 🔐 Security:
# - No PyPI credentials are stored; relies on Trusted Publishing via GitHub OIDC.
#
# 📄 Requirements:
# - `pyproject.toml` with a top-level `version = "..."`
# - Package is registered on PyPI as a Trusted Publisher with this repository
#
# ✅ To trigger:
# - Go to the "Actions" tab
# - Run this workflow manually with a tag input like `v1.2.3`
name: Release Workflow
on:
workflow_dispatch:
inputs:
tag:
description: 'Release tag (e.g. v1.2.3)'
required: true
type: string
jobs:
tag:
name: Create Git Tag
runs-on: ubuntu-latest
steps:
- name: Checkout Code
uses: actions/checkout@v4
- name: Create Git Tag
run: |
git config user.name "${{ github.actor }}"
git config user.email "${{ github.actor }}@users.noreply.github.com"
git tag ${{ github.event.inputs.tag }}
git push origin ${{ github.event.inputs.tag }}
build:
name: Build with Hatch
runs-on: ubuntu-latest
needs: tag
steps:
- name: Checkout Code
uses: actions/checkout@v4
with:
fetch-depth: 0 # Ensure full history and tags available
- name: Set up Python
uses: actions/setup-python@v5
with:
python-version: '3.12'
- name: Install Hatch
run: |
pip install --upgrade pip
pip install hatch
- name: Set version from tag in pyproject.toml
run: |
version=${{ github.event.inputs.tag }}
version=${version#v}
echo "Setting version to $version"
sed -i.bak "s/^version = .*/version = \"$version\"/" pyproject.toml
rm pyproject.toml.bak
- name: Build Package
run: hatch build
- name: Upload dist/
uses: actions/upload-artifact@v4
with:
name: dist
path: dist/
publish:
name: Publish to PyPI via OIDC
runs-on: ubuntu-latest
needs: build
permissions:
id-token: write # Required for OIDC Trusted Publisher authentication
steps:
- name: Download dist/
uses: actions/download-artifact@v4
with:
name: dist
path: dist/
- name: Publish to PyPI using Trusted Publisher (OIDC)
uses: pypa/gh-action-pypi-publish@release/v1
Note that the code fragment above does not contain automated updates of a changelog file nor a GitHub release of the package.
Creates an api token for trusted publishing in pypi.
"Trusted publishing" is a term for using the OpenID Connect (OIDC) standard to exchange short-lived identity tokens between a trusted third-party service and PyPI. This method can be used in automated environments and eliminates the need to use username/password combinations or manually generated API tokens to authenticate with PyPI when publishing.
For a quickstart, see:
- Adding a trusted publisher to an existing PyPI project
- Creating a PyPI project with a trusted publisher
OpenID Connect (OIDC) publishing is a mechanism for uploading packages to PyPI, complementing existing methods (username/password combinations, API tokens).
Certain CI services (like GitHub Actions) are OIDC identity providers, meaning that they can issue short-lived credentials ("OIDC tokens") that a third party can strongly verify came from the CI service (as well as which user, repository, etc. actually executed); Projects on PyPI can be configured to trust a particular configuration on a particular CI service, making that configuration an OIDC publisher for that project; Release automation (like GitHub Actions) can submit an OIDC token to PyPI. The token will be matched against configurations trusted by different projects; if any projects trust the token's configuration, then PyPI will mint a short-lived API token for those projects and return it; The short-lived API token behaves exactly like a normal project-scoped API token, except that it's only valid for 15 minutes from time of creation (enough time for the CI to use it to upload packages). This confers significant usability and security advantages when compared to PyPI's traditional authentication methods:
- Usability: With trusted publishing, users no longer need to manually create API tokens on PyPI and copy-paste them into their CI provider. The only manual step is configuring the publisher on PyPI.
- Security: PyPI's normal API tokens are long-lived, meaning that an attacker who compromises a package's release can use it until its legitimate user notices and manually revokes it. Similarly, uploading with a password means that an attacker can upload to any project associated with the account. Trusted publishing avoids both of these problems: the tokens minted expire automatically, and are scoped down to only the packages that they're authorized to upload to.
The idea of this action is to provide a mint hiding the OIDC key exchange from the user. The user has to configure PyPI to trust the aforementioned configuration but otherwise gets an API token which can be used to publish on PyPI (e.g. via poetry).
The action assumes that it's being run in a GitHub Actions workflow runner with the following permissions:
permissions:
id-token: write
contents: read
Those permissions are critical; without it, GitHub Actions will refuse to give you an OIDC token.
Input | Required | Default | Description |
---|---|---|---|
audience |
false |
pypi |
Audience |
Output | Description |
---|---|
api-token |
API token |
All our experiments have been performed with the pyhrp package relying on poetry.
Using the new action the release.yml file is:
name: Upload Python Package
on:
push:
tags:
- '[0-9]+.[0-9]+.[0-9]'
jobs:
deploy:
runs-on: ubuntu-latest
permissions:
# This permission is required for trusted publishing.
id-token: write
contents: read
steps:
- uses: actions/checkout@v4
- name: Set up Python 3.10
uses: actions/setup-python@v5
with:
python-version: '3.10'
- name: Install Poetry
uses: snok/install-poetry@v1
with:
virtualenvs-create: false
- name: Update version (kept at 0.0.0) in pyproject.toml and build
run: |
poetry version ${{ github.ref_name }}
poetry build
- name: Mint token
id: mint
uses: tschm/[email protected]
- name: Publish the package with poetry
run: |
poetry publish -u __token__ -p '${{ steps.mint.outputs.api-token }}'
The creation of an API token rarely fails for two reasons:
- There is a mismatch between the name of the *.yml file and the trusted publisher configured on PyPI.
- The permissions are not set.
Contributions are always welcome; submit a PR!
The PyPI token mint action is licensed under an Apache license. See the LICENSE file for details.
PyPI Token Mint is not certified by GitHub. It is provided by a third-party and is governed by separate terms of service, privacy policy, and support documentation.