Configuring authenticated repositories

To use authentication you need to include a user name in the repository URL. You can set the repository URL in the repos option with [base::options()] as usual, or you can use [repo_add()].

# turn off bioc repos, for simplicity
library(pak)
options(pkg.use_bioconductor = FALSE)
options(width = 100)
options(pkg.show_progress = FALSE)

For testing purposes pak includes a web app that creates an authenticated proxy to CRAN. This is how to run the proxy in a subprocess:

repo <- webfakes::new_app_process(pak:::auth_proxy_app())
repo$url()

(This needs the webfakes and callr packages.)

Next, we configure the proxy as the main CRAN repository. The default username of the proxy is "username" and the default password is "token". We want to replace the default CRAN repository with the proxy, so we name it CRAN:

repo_add(CRAN = repo$url(), username = "username")
repo_get()

Note that the output includes a username and a has_password column. These are only present if at least one configured repository needs authentication. has_password is FALSE here, because pak did not find the credentials for this repository.

repo_get() also displays a message if it cannot find the credentials for an authenticated repository.

Next we are going to store the credentials in a place where pak can find them.

Credential lookup

pak can look up credentials from two sources: 1. The current user's netrc file. 2. The system credential store via the keyring package. pak comes with its own copy of the keyring package, you don't need to install it separately.

netrc files

If the NETRC environment variable is set, pak uses its value to determine the location of the netrc file.

Otherwise pak looks for the netrc file in current user's home directory, at ~/.netrc. On Windows it also looks for ~/_netrc if the file starting with a dot does not exist.

If you create a netrc file, make sure that is only readable by you. E.g. on Unix run

chmod 600 ~/.netrc

netrc files are simple text files that can store passwords for multiple hosts. They may contain three types of tokens:

machine <hostname>

A host name, without the protocol. Subsequent login and password tokens belong to this host, until another machine token is found, or the end of file.

login <username>

User name. It must be preceded by a machine token.

password <password>

Password. It must be preceded by a machine and a login token.

Whitespace is ignored in netrc files. You may include multiple tokens on the same line, or have one token per line. Here is an example:

machine myhost.mydomain.com login myuser password secret
machine myhost2.mydomain.com
login myuser
password secret
login anotheruser
password stillsecret

If you need to include whitespace in a password, put the password in double quotes.

The credential store

pak uses the keyring package to query the system credential store (or an alternative keyring credential store) to find credentials for authenticated repositories. pak comes with a copy of the keyring package, so you don't need to install it separately.

To store a repository password in the system credential store use the repo_auth_key_set() function. If you want to use a non-default keyring backend, set the keyring_backend option. In this manual we will use the backend that stores secrets in environment variables. This is an ephemeral store that is destroyed when the R process terminates.

To continue our example from above:

options(keyring_backend = "env")
repo_auth_key_set(repo$url(), username = "username", password = "token")

Use repo_auth_key_get() to check that the key is properly set:

repo_auth_key_get(repo$url(), username = "username")

repo_get() now does not show a warning message, and also sets the has_password column to TRUE, because pak could find the credentials for our CRAN proxy:

repo_get()

Repo vs. host credentials

pak handles credentials for repositories and hosts. A repository credential's key is a URL with a non-empty path:

https://repo.host.com/repos/repo1

A host credential's is an URL with an empty path:

https://repo.host.com

pak always looks for repository credentials first. If it does not find any credentials for a repository then it drops the path and looks for host credentials.

Because netrc files only store domain names and not URLs, they can only contain host credentials.

Testing

To test that authentication works, use the repo_status() function:

repo_status()

The output of repo_status() has extra columns, compared to repo_get(), and it also has a separate row for each platform. If everything works, then the has_password column is TRUE for authenticated repositories, and the ok column is TRUE if repo_status() was able to perform an (authenticated) HTTP HEAD request to the metadata file of a platform in a repository.

If you need even more information about repo authentication, e.g. because repo_status() shows some failures, then use the repo_auth() function:

repo_auth()

The output of repo_auth() has the following extra columns:

Usage

Once you set up your authenticated repositories, and stored the required passwords in the system credential store, you can use them like any other repository. Operations that need authentication will always include reassuring messages for successful authentications, and warning messages for failed ones. Function calls that do not perform any HTTP requests, e.g. because they list cached data, do not display such messages.

meta_update()
meta_list()

E.g. here meta_update() outputs an authentication message, but meta_list() does not.



r-lib/pak documentation built on April 13, 2025, 7:38 a.m.