Thank you for the clarification! As someone that had been confused about the 
intent and ended up relying on GOA in my third party app, it’s nice to see the 
intention spelled out so clearly.

I just wanted to mention an interesting challenge in having open source apps 
handle this themselves. Let’s take Google as an example. According to their 
developer terms of service [1]:

“Developer credentials (such as passwords, keys, and client IDs) are intended 
to be used by you and identify your API Client. You will keep your credentials 
confidential and make reasonable efforts to prevent and discourage other API 
Clients from using your credentials. Developer credentials may not be embedded 
in open source projects.”

So in order for an open source project to access Google APIs, it would want 
build secrets. An interesting argument for flatpaks and snaps, where you could 
have those (as long as you don’t use a public builder).



Unfortunately, distros do not typically support build secrets. I’m not sure 
what to do in those cases. (And if a distro did support them, would they use 
their own API keys or act as a trusted handler for maintainers’ keys?)

GOA currently just embeds the API secret anyway, presumably because the 
realistic alternative is just not supporting Google. For my part, I’m not sure 
what to do. Short term, I’ll probably just keep coasting on GOA’s loose 
approach.

[1] https://developers.google.com/terms/
_______________________________________________
desktop-devel-list mailing list
desktop-devel-list@gnome.org
https://mail.gnome.org/mailman/listinfo/desktop-devel-list

Reply via email to