114 lines
3.4 KiB
YAML
114 lines
3.4 KiB
YAML
parameters:
|
|
parentJobs: []
|
|
|
|
jobs:
|
|
- job: WinPackageSigningJob
|
|
displayName: Windows Package signing and upload
|
|
dependsOn:
|
|
${{ parameters.parentJobs }}
|
|
condition: succeeded()
|
|
pool:
|
|
name: Package ES CodeHub Lab E
|
|
variables:
|
|
BuildConfiguration: release
|
|
BuildPlatform: any cpu
|
|
|
|
steps:
|
|
|
|
- template: shouldSign.yml
|
|
- template: SetVersionVariables.yml
|
|
parameters:
|
|
ReleaseTagVar: $(ReleaseTagVar)
|
|
|
|
- task: DownloadBuildArtifacts@0
|
|
displayName: 'Download artifacts'
|
|
inputs:
|
|
buildType: current
|
|
downloadType: single
|
|
artifactName: signed
|
|
downloadPath: '$(System.ArtifactsDirectory)'
|
|
|
|
- powershell: |
|
|
dir "$(System.ArtifactsDirectory)\*" -Recurse
|
|
displayName: 'Capture Downloaded Artifacts'
|
|
# Diagnostics is not critical it passes every time it runs
|
|
continueOnError: true
|
|
|
|
- powershell: |
|
|
$authenticodefiles = @(
|
|
"$(System.ArtifactsDirectory)\signed\PowerShell-$(Version)-win-x64.msi"
|
|
"$(System.ArtifactsDirectory)\signed\PowerShell-$(Version)-win-x86.msi"
|
|
"$(System.ArtifactsDirectory)\signed\PowerShell-$(Version)-win-x64.msix"
|
|
"$(System.ArtifactsDirectory)\signed\PowerShell-$(Version)-win-arm32.msix"
|
|
"$(System.ArtifactsDirectory)\signed\PowerShell-$(Version)-win-arm64.msix"
|
|
)
|
|
tools/releaseBuild/generatePackgeSigning.ps1 -AuthenticodeFiles $authenticodeFiles -path "$(System.ArtifactsDirectory)\package.xml"
|
|
displayName: 'Generate Package Signing Xml'
|
|
|
|
- powershell: |
|
|
Get-Content "$(System.ArtifactsDirectory)\package.xml"
|
|
displayName: 'Capture signing xml'
|
|
|
|
- task: PkgESCodeSign@10
|
|
displayName: 'CodeSign $(System.ArtifactsDirectory)\package.xml'
|
|
env:
|
|
SYSTEM_ACCESSTOKEN: $(System.AccessToken)
|
|
inputs:
|
|
signConfigXml: '$(System.ArtifactsDirectory)\package.xml'
|
|
outPathRoot: '$(Build.StagingDirectory)\signedPackages'
|
|
binVersion: $(SigingVersion)
|
|
binVersionOverride: $(SigningVersionOverride)
|
|
condition: and(succeeded(), eq(variables['SHOULD_SIGN'], 'true'))
|
|
|
|
- powershell: |
|
|
new-item -itemtype Directory -path '$(Build.StagingDirectory)\signedPackages'
|
|
Get-ChildItem "$(System.ArtifactsDirectory)\signed\PowerShell-$(Version)-win-*.msi*" | copy-item -Destination '$(Build.StagingDirectory)\signedPackages'
|
|
displayName: 'Fake Signing'
|
|
condition: and(succeeded(), ne(variables['SHOULD_SIGN'], 'true'))
|
|
|
|
- template: upload.yml
|
|
parameters:
|
|
architecture: x86
|
|
version: $(version)
|
|
msix: no
|
|
|
|
- template: upload.yml
|
|
parameters:
|
|
architecture: x64
|
|
version: $(version)
|
|
|
|
- template: upload.yml
|
|
parameters:
|
|
architecture: arm32
|
|
version: $(version)
|
|
msi: no
|
|
|
|
- template: upload.yml
|
|
parameters:
|
|
architecture: arm64
|
|
version: $(version)
|
|
msi: no
|
|
|
|
- template: upload.yml
|
|
parameters:
|
|
architecture: fxdependent
|
|
version: $(version)
|
|
msi: no
|
|
msix: no
|
|
|
|
- template: upload.yml
|
|
parameters:
|
|
architecture: fxdependentWinDesktop
|
|
version: $(version)
|
|
msi: no
|
|
msix: no
|
|
|
|
- task: securedevelopmentteam.vss-secure-development-tools.build-task-antimalware.AntiMalware@3
|
|
displayName: 'Run Defender Scan'
|
|
|
|
- task: ms.vss-governance-buildtask.governance-build-task-component-detection.ComponentGovernanceComponentDetection@0
|
|
displayName: 'Component Detection'
|
|
inputs:
|
|
sourceScanPath: '$(Build.SourcesDirectory)'
|
|
snapshotForceEnabled: true
|