1
0
mirror of https://github.com/bitwarden/desktop.git synced 2024-11-24 11:55:50 +01:00

Install and use latest AST (this will probably break when it is updated because Google won't tell me how to make a clean build of a .NET project)

This commit is contained in:
Joseph Flinn 2020-12-31 22:09:00 +00:00
parent b6d706a62b
commit 711cea8c4b
2 changed files with 13 additions and 4 deletions

View File

@ -17,10 +17,18 @@ steps:
versionSpec: '10.x' versionSpec: '10.x'
displayName: 'Install Node.js' displayName: 'Install Node.js'
#- script: |
# set DOTNET_SKIP_FIRST_TIME_EXPERIENCE=true
# dotnet tool install --global AzureSignTool --version 2.0.17
# displayName: 'install AzureSignTool'
- script: | - script: |
set DOTNET_SKIP_FIRST_TIME_EXPERIENCE=true git clone https://github.com/vcsjones/AzureSignTool.git
dotnet tool install --global AzureSignTool --version 2.0.17 cd AzureSignTool
displayName: 'install AzureSignTool' dotnet --version
dotnet pack --output ./nupkg
dotnet tool install --global --ignore-failed-sources --add-source ./nupkg --version 0.0.0-gce87e84a58 azuresigntool
displayName: 'Install AST'
- task: PowerShell@2 - task: PowerShell@2
inputs: inputs:
@ -50,6 +58,7 @@ steps:
CSC_KEY_PASSWORD: $(ebSigningCertKey) CSC_KEY_PASSWORD: $(ebSigningCertKey)
SIGNING_VAULT_URL: $(SigningVaultURL) SIGNING_VAULT_URL: $(SigningVaultURL)
SIGNING_CLIENT_ID: $(SigningClientId) SIGNING_CLIENT_ID: $(SigningClientId)
SIGNING_TENTANT_ID: $(SigningTenantId)
SIGNING_CLIENT_SECRET: $(SigningClientSecret) SIGNING_CLIENT_SECRET: $(SigningClientSecret)
SIGNING_CERT_NAME: $(SigningCertName) SIGNING_CERT_NAME: $(SigningCertName)
SECRET_TEST: $(secretTest) SECRET_TEST: $(secretTest)

View File

@ -3,7 +3,7 @@ exports.default = async function(configuration) {
console.log(`env test - secret test ${process.env.SECRET_TEST}`) console.log(`env test - secret test ${process.env.SECRET_TEST}`)
require("child_process").execSync( require("child_process").execSync(
`azuresigntool sign -kvu ${process.env.SIGNING_VAULT_URL} -kvi ${process.env.SIGNING_CLIENT_ID} -kvs ${process.env.SIGNING_CLIENT_SECRET} -kvc ${process.env.SIGNING_CERT_NAME} -fd ${configuration.hash} -du ${configuration.site} -tr http://timestamp.digicert.com ${configuration.path}`, `azuresigntool sign -kvu ${process.env.SIGNING_VAULT_URL} -kvi ${process.env.SIGNING_CLIENT_ID} -kvt ${process.env.SIGNING_TENANT_ID} -kvs ${process.env.SIGNING_CLIENT_SECRET} -kvc ${process.env.SIGNING_CERT_NAME} -fd ${configuration.hash} -du ${configuration.site} -tr http://timestamp.digicert.com ${configuration.path}`,
{ {
stdio: "inherit" stdio: "inherit"
} }