Skip to content

Commit

Permalink
Use Cake.DotNetTool.Module
Browse files Browse the repository at this point in the history
  • Loading branch information
punker76 committed May 6, 2019
1 parent b743aef commit 6ec4699
Show file tree
Hide file tree
Showing 3 changed files with 36 additions and 28 deletions.
12 changes: 0 additions & 12 deletions .config/dotnet-tools.json

This file was deleted.

1 change: 1 addition & 0 deletions appveyor.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,7 @@ pull_requests:
do_not_increment_build_number: false

build_script:
- ps: .\build.ps1 --bootstrap
- ps: .\build.ps1 -target appveyor

artifacts:
Expand Down
51 changes: 35 additions & 16 deletions build.cake
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,9 @@
// TOOLS / ADDINS
///////////////////////////////////////////////////////////////////////////////

#module nuget:?package=Cake.DotNetTool.Module

#tool "dotnet:?package=NuGetKeyVaultSignTool&version=1.2.18"
#tool GitVersion.CommandLine
#tool gitreleasemanager
#tool xunit.runner.console
Expand Down Expand Up @@ -162,7 +165,6 @@ Task("Pack")
});

Task("Sign")
.WithCriteria(() => AppVeyor.IsRunningOnAppVeyor)
.ContinueOnError()
.Does(() =>
{
Expand All @@ -171,12 +173,29 @@ Task("Sign")
return;
}

StartProcess("dotnet", new ProcessSettings {
Arguments = new ProcessArgumentBuilder()
.Append("tool")
.Append("restore")
}
);
var vurl = EnvironmentVariable("azure-key-vault-url");
if(string.IsNullOrWhiteSpace(vurl)) {
Error("Could not resolve signing url.");
return;
}

var vcid = EnvironmentVariable("azure-key-vault-client-id");
if(string.IsNullOrWhiteSpace(vcid)) {
Error("Could not resolve signing client id.");
return;
}

var vcs = EnvironmentVariable("azure-key-vault-client-secret");
if(string.IsNullOrWhiteSpace(vcs)) {
Error("Could not resolve signing client secret.");
return;
}

var vc = EnvironmentVariable("azure-key-vault-certificate");
if(string.IsNullOrWhiteSpace(vc)) {
Error("Could not resolve signing certificate.");
return;
}

var files = GetFiles(publishDir + "/*.nupkg");
foreach(var file in files)
Expand All @@ -186,18 +205,18 @@ Task("Sign")
RedirectStandardError = true,
Arguments = new ProcessArgumentBuilder()
.Append("sign")
.Append(file.ToString())
.Append(MakeAbsolute(file).FullPath)
.Append("--force")
.Append("--file-digest sha256")
.Append("--timestamp-rfc3161 http://timestamp.digicert.com")
.Append("--timestamp-digest sha256")
.Append("--azure-key-vault-url").Append(EnvironmentVariable("azure-key-vault-url"))
.Append("--azure-key-vault-client-id").Append(EnvironmentVariable("azure-key-vault-client-id"))
.Append("--azure-key-vault-client-secret").Append(EnvironmentVariable("azure-key-vault-client-secret"))
.Append("--azure-key-vault-certificate").Append(EnvironmentVariable("azure-key-vault-certificate"))
.AppendSwitchQuoted("--file-digest", "sha256")
.AppendSwitchQuoted("--timestamp-rfc3161", "http://timestamp.digicert.com")
.AppendSwitchQuoted("--timestamp-digest", "sha256")
.AppendSwitchQuoted("--azure-key-vault-url", vurl)
.AppendSwitchQuotedSecret("--azure-key-vault-client-id", vcid)
.AppendSwitchQuotedSecret("--azure-key-vault-client-secret", vcs)
.AppendSwitchQuotedSecret("--azure-key-vault-certificate", vc)
};

using(var process = StartAndReturnProcess("NuGetKeyVaultSignTool", processSettings))
using(var process = StartAndReturnProcess("tools/NuGetKeyVaultSignTool", processSettings))
{
process.WaitForExit();

Expand Down

0 comments on commit 6ec4699

Please sign in to comment.