From 89e96ab9d540284bfe602eab873b5cb7600c2c55 Mon Sep 17 00:00:00 2001 From: Kevin Moore Date: Fri, 29 Nov 2024 21:08:29 -0500 Subject: [PATCH] Seriously considering farming --- ...lease.yaml => build-sign-and-release.yaml} | 30 +++++++++---------- 1 file changed, 15 insertions(+), 15 deletions(-) rename .github/workflows/{build-and-release.yaml => build-sign-and-release.yaml} (78%) diff --git a/.github/workflows/build-and-release.yaml b/.github/workflows/build-sign-and-release.yaml similarity index 78% rename from .github/workflows/build-and-release.yaml rename to .github/workflows/build-sign-and-release.yaml index 69d2e9d..5c80452 100644 --- a/.github/workflows/build-and-release.yaml +++ b/.github/workflows/build-sign-and-release.yaml @@ -46,7 +46,7 @@ jobs: name: ForceBindIPGUI path: dist/windows/ForceBindIP-GUI.exe - release: + sign-and-release: runs-on: [ubuntu-latest] needs: build permissions: @@ -66,20 +66,20 @@ jobs: id: get_short_sha run: echo "short_sha=$(echo ${{ github.sha }} | cut -c1-10)" >> $GITHUB_ENV - # https://melatonin.dev/blog/code-signing-on-windows-with-azure-trusted-signing/#step-9-trusted-signing-in-ci-github - - name: Azure Trusted Signing - uses: azure/trusted-signing-action@v0.3.16 - with: - azure-tenant-id: ${{ secrets.AZURE_TENANT_ID }} - azure-client-id: ${{ secrets.AZURE_CLIENT_ID }} - azure-client-secret: ${{ secrets.AZURE_CLIENT_SECRET }} - endpoint: ${{ secrets.AZURE_ENDPOINT }} - trusted-signing-account-name: ${{ secrets.AZURE_CODE_SIGNING_NAME }} - certificate-profile-name: ${{ secrets.AZURE_CERT_PROFILE_NAME }} - - # Sign all exes inside the folder - files-folder: ./dist - files-folder-filter: exe + # https://melatonin.dev/blog/code-signing-on-windows-with-azure-trusted-signing/#step-9-trusted-signing-in-ci-github + - name: Azure Trusted Signing + uses: azure/trusted-signing-action@v0.3.16 + with: + azure-tenant-id: ${{ secrets.AZURE_TENANT_ID }} + azure-client-id: ${{ secrets.AZURE_CLIENT_ID }} + azure-client-secret: ${{ secrets.AZURE_CLIENT_SECRET }} + endpoint: ${{ secrets.AZURE_ENDPOINT }} + trusted-signing-account-name: ${{ secrets.AZURE_CODE_SIGNING_NAME }} + certificate-profile-name: ${{ secrets.AZURE_CERT_PROFILE_NAME }} + + # Sign all exes inside the folder + files-folder: ./dist + files-folder-filter: exe - name: Create Release id: create_release