Skip to content

Conversation

@crisap94
Copy link
Member

@crisap94 crisap94 commented Jan 7, 2026

Summary

Final OIDC attempt: Remove registry-url from setup-node to prevent automatic NODE_AUTH_TOKEN creation.

If this fails, we'll switch to traditional npm token authentication.

Root Cause Found

Looking at the previous deployment logs, even though we removed the explicit env block, setup-node with registry-url parameter automatically creates NODE_AUTH_TOKEN:

env:
  NODE_AUTH_TOKEN: XXXXX-XXXXX-XXXXX-XXXXX  # ← Auto-created by setup-node

This blocks OIDC authentication.

Changes

  • ✅ Remove registry-url: 'https://registry.npmjs.org' from setup-node
  • ✅ Bump version to 0.2.11

Why This Should Work

  1. No NODE_AUTH_TOKEN at all - setup-node won't create it without registry-url
  2. npm defaults to registry.npmjs.org - should work without explicit registry
  3. All other OIDC config is correct - verified in previous attempts

Fallback Plan

If this deployment fails, we'll immediately switch to Option B: traditional npm token authentication with these steps:

  1. Create npm automation token
  2. Add as GitHub secret NPM_TOKEN
  3. Update workflow to use NODE_AUTH_TOKEN: ${{ secrets.NPM_TOKEN }}
  4. Keep --provenance flag for supply chain security

Testing

Merge → automatic deployment → monitor logs closely


Previous attempts: #20, #21, #22 all failed due to NODE_AUTH_TOKEN interfering with OIDC

- Remove registry-url from setup-node to prevent automatic NODE_AUTH_TOKEN creation
- Bump version to 0.2.11 for deployment test

Root cause: setup-node with registry-url automatically creates NODE_AUTH_TOKEN
environment variable, which blocks OIDC authentication even when not explicitly set.

This is our final OIDC attempt. If this fails, we'll use traditional npm token.
@github-actions
Copy link

github-actions bot commented Jan 7, 2026

🔍 PR Quality Check Summary

Check Status
Code Quality & Tests ✅ success
Security Audit ✅ success

📋 Checks Performed:

  • ✅ TypeScript compilation
  • ✅ ESLint code quality
  • ✅ Prettier code formatting
  • ✅ Unit tests with coverage (80%+ required)
  • ✅ Build verification
  • ✅ Security audit

🎉 All checks passed! This PR is ready for review.

@coderabbitai
Copy link

coderabbitai bot commented Jan 7, 2026

Warning

Rate limit exceeded

@crisap94 has exceeded the limit for the number of commits that can be reviewed per hour. Please wait 1 minutes and 15 seconds before requesting another review.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

📥 Commits

Reviewing files that changed from the base of the PR and between 4025f5e and a22e569.

📒 Files selected for processing (2)
  • .github/workflows/deploy.yml
  • package.json

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@crisap94 crisap94 merged commit 017bf84 into main Jan 7, 2026
4 checks passed
crisap94 added a commit that referenced this pull request Jan 7, 2026
After 4 failed attempts with OIDC trusted publishing (#20, #21, #22, #23),
we're switching to the more reliable traditional npm token authentication.

Changes:
- Add registry-url back to setup-node
- Add NODE_AUTH_TOKEN env using NPM_TOKEN secret
- Bump version to 0.2.12
- Keep --provenance flag for supply chain security

Required setup:
1. Create npm automation token at https://www.npmjs.com/settings/[username]/tokens/create
2. Add as GitHub secret: NPM_TOKEN

Benefits:
✅ Battle-tested and reliable
✅ Still supports provenance attestation
✅ No OIDC configuration issues

Trade-offs:
⚠️ Requires manual token management
⚠️ Token needs rotation
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants