Runtime token flow — release.yml
Rotation runbook — 5 steps, ~5 minutes
-
Generate new key.
Open the App settings. Scroll to Private keys → Generate a private key. New
.pemdownloads.open https://github.com/settings/apps/orchestkit-release-bot -
Update the 1Password backup.
Item UUID is stable:
ickhsiw7etwfuym4i4poldeyxiin theHQ-Devvault. Replace the file attachment with the new.pem.op item edit ickhsiw7etwfuym4i4poldeyxi --vault HQ-Dev -
Push new key to GitHub Actions secret.
Adjust the
.pemfilename in the command below. The file is read from stdin so its contents never appear in shell history or tool output.gh secret set RELEASE_BOT_PRIVATE_KEY --repo yonatangross/orchestkit < ~/Downloads/orchestkit-release-bot.*.private-key.pem -
Revoke the old key.
Back on the App settings page → Private keys section → delete the old fingerprint. Do this AFTER step 3, so a rollback is possible if the new key fails to mint.
open https://github.com/settings/apps/orchestkit-release-bot -
Delete the local
.pem.Key is now in two protected stores (GitHub secret + 1Password). A disk copy is a leak vector.
rm ~/Downloads/orchestkit-release-bot.*.private-key.pem