Release Announcement v0.3.0 (August 31 2023)

Good question and thank you for highlighting! First things first - if you are at all concerned that your flox CLI token may have been compromised, please navigate to your flox CLI OAuth App page and select the Revoke access button.

Secondly, we completely agree - by way of background, we encountered a collision between the tokens being stored in the keychain for the gh app, employed a workaround as a temporary measure and neglected to return back to it. It was my mistake and it should only take a few hours to reinstate use of the keychain - I’ll get on that now and let you know when there’s a new version to test available in the flox/prerelease environment.

If it helps to allay your concerns, I also wanted to give some background to the flox-gh app. As I’m sure you’ve already realized flox-gh is a build of GitHub’s gh modified to authenticate against GitHub OAuth using a flox OAuth app ID which generates a separate token for the express purposes of authenticating with our flox cloud services. Notably, the token for this app has no scope privileges as you can confirm by way of the flox auth status command:

flox [flox/prerelease default] [brantley@clubsoda:~/src/flox]$ flox auth status
github.com
  ✓ Logged in to github.com as limeytexan (/home/brantley/.config/flox/gh/hosts.yml)
  ✓ Token: gho_************************************
  ✓ Token scopes: none

This is much different from the “gist, read:org, repo, workflow” scopes of tokens required by the gh app. For what it’s worth I am equally paranoid about the storage of those GitHub tokens!

Again, many thanks for highlighting this issue - I will get back to you with an update ASAP. :+1: