Merge pull request #909 from mountaindude/master #114
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: insiders-build | |
on: | |
workflow_dispatch: | |
push: | |
branches: | |
- master | |
jobs: | |
insiders-build: | |
strategy: | |
matrix: | |
os: [win-code-sign, mac-build1, ubuntu-latest] | |
include: | |
- os: win-code-sign | |
build: | | |
./node_modules/.bin/esbuild src/bundle.js --bundle --external:axios --external:xdg-open --external:enigma.js --outfile=build.cjs --format=cjs --platform=node --target=node18 --minify --inject:./src/lib/import-meta-url.js --define:import.meta.url=import_meta_url | |
pkg --output "./${env:DIST_FILE_NAME}.exe" -t node18-win-x64 ./build.cjs --config package.json --options no-deprecation --compress GZip | |
dir | |
# # Extract signing certificate to files on disk | |
# New-Item -ItemType directory -Path certificate | |
# Set-Content -Path certificate\certificate.txt -Value $env:CODESIGN_BASE64 | |
# certutil -decode certificate\certificate.txt certificate\certificate.pfx | |
# Set-Content -Path certificate\intermediate.txt -Value $env:CODESIGN_INTERMEDIATE_BASE64 | |
# certutil -decode certificate\intermediate.txt certificate\intermediate.crt | |
# $processOptions = @{ | |
# FilePath = "C:\Program Files (x86)/Windows Kits/10/bin/10.0.22621.0/x64/signtool.exe" | |
# Wait = $true | |
# ArgumentList = "sign", "/fd", "SHA256", "/p", "$env:CODESIGN_PWD", "/ac", "certificate\intermediate.crt", "/f", "certificate\certificate.pfx", "/tr", "http://timestamp.sectigo.com/rfc3161", "/td", "sha256", "./${env:DIST_FILE_NAME}.exe" | |
# WorkingDirectory = "." | |
# NoNewWindow = $true | |
# } | |
# Start-Process @processOptions | |
# Sign the executable | |
# 1st signing | |
$processOptions1 = @{ | |
FilePath = "C:\Program Files (x86)/Windows Kits/10/bin/10.0.22621.0/x64/signtool.exe" | |
Wait = $true | |
ArgumentList = "sign", "/sha1", "$env:CODESIGN_WIN_THUMBPRINT", "/tr", "http://time.certum.pl", "/td", "sha256", "/fd", "sha1", "/v", "./${env:DIST_FILE_NAME}.exe" | |
WorkingDirectory = "." | |
NoNewWindow = $true | |
} | |
Start-Process @processOptions1 | |
# 2nd signing | |
$processOptions2 = @{ | |
FilePath = "C:\Program Files (x86)/Windows Kits/10/bin/10.0.22621.0/x64/signtool.exe" | |
Wait = $true | |
ArgumentList = "sign", "/sha1", "$env:CODESIGN_WIN_THUMBPRINT", "/tr", "http://time.certum.pl", "/td", "sha256", "/fd", "sha256", "/v", "./${env:DIST_FILE_NAME}.exe" | |
WorkingDirectory = "." | |
NoNewWindow = $true | |
} | |
Start-Process @processOptions2 | |
# Remove-Item -Recurse -Force certificate | |
# # Create release binary | |
# mkdir release-binaries-win | |
# Copy-Item -Path ".\${env:DIST_FILE_NAME}.exe" -Destination "release-binaries-win\" | |
# dir | |
# dir release-binaries-win | |
# Create insider's build zip | |
$compress = @{ | |
Path = "./${env:DIST_FILE_NAME}.exe" | |
CompressionLevel = "Fastest" | |
DestinationPath = "${env:DIST_FILE_NAME}--win-x64--${{ github.sha }}.zip" | |
} | |
Compress-Archive @compress | |
# Add following directories & files to the created zip file, in the ./config directory. | |
# - ./src/config/production_template.yaml | |
# - ./src/config/log_appender_xml | |
mkdir config | |
Copy-Item -Path ./src/config/log_appender_xml -Destination ./config/ -Recurse | |
Copy-Item -Path ./src/config/production_template.yaml -Destination ./config/ | |
Compress-Archive -Path "./config" -Update -DestinationPath "./${env:DIST_FILE_NAME}--win-x64--${{ github.sha }}.zip" | |
# artifact_release_name: release-binaries-win | |
# artifact_release_path: release-binaries-win/* | |
artifact_insider: butler-sos--win-x64--${{ github.sha }}.zip | |
- os: mac-build1 | |
build: | | |
./node_modules/.bin/esbuild src/bundle.js --bundle --external:axios --external:xdg-open --external:enigma.js --outfile=build.cjs --format=cjs --platform=node --target=node18 --minify --inject:./src/lib/import-meta-url.js --define:import.meta.url=import_meta_url | |
pkg --output "./${DIST_FILE_NAME}" -t node18-macos-x64 ./build.cjs --config package.json --options no-deprecation --compress GZip | |
chmod +x "${DIST_FILE_NAME}" | |
security delete-keychain build.keychain || true | |
pwd | |
ls -la | |
# Turn our base64-encoded certificate back to a regular .p12 file | |
echo $MACOS_CERTIFICATE | base64 --decode > certificate.p12 | |
# We need to create a new keychain, otherwise using the certificate will prompt | |
# with a UI dialog asking for the certificate password, which we can't | |
# use in a headless CI environment | |
security create-keychain -p "$MACOS_CI_KEYCHAIN_PWD" build.keychain | |
security list-keychains -d user -s build.keychain | |
security default-keychain -d user -s build.keychain | |
security unlock-keychain -p "$MACOS_CI_KEYCHAIN_PWD" build.keychain | |
security import certificate.p12 -k build.keychain -P "$MACOS_CERTIFICATE_PWD" -T /usr/bin/codesign | |
security set-key-partition-list -S apple-tool:,apple:,codesign: -s -k "$MACOS_CI_KEYCHAIN_PWD" build.keychain | |
codesign --force -s "$MACOS_CERTIFICATE_NAME" -v "./${DIST_FILE_NAME}" --deep --strict --options=runtime --timestamp --entitlements ./release-config/${DIST_FILE_NAME}.entitlements | |
# Notarize | |
# Store the notarization credentials so that we can prevent a UI password dialog from blocking the CI | |
echo "Create keychain profile" | |
xcrun notarytool store-credentials "notarytool-profile" --apple-id "$PROD_MACOS_NOTARIZATION_APPLE_ID" --team-id "$PROD_MACOS_NOTARIZATION_TEAM_ID" --password "$PROD_MACOS_NOTARIZATION_PWD" | |
# We can't notarize an app bundle directly, but we need to compress it as an archive. | |
# Therefore, we create a zip file containing our app bundle, so that we can send it to the | |
# notarization service | |
# Notarize insider binary | |
echo "Creating temp notarization archive for insider build" | |
# ditto -c -k --keepParent "./${DIST_FILE_NAME}" "./${DIST_FILE_NAME}--macos-x64--${{ github.sha }}.zip" | |
zip -r "./${DIST_FILE_NAME}--macos-x64--${{ github.sha }}.zip" "./${DIST_FILE_NAME}" -x "*.DS_Store" | |
# Add additional files to the zip file | |
cd src | |
zip -u -r "../${DIST_FILE_NAME}--macos-x64--${{ github.sha }}.zip" "./config/production_template.yaml" "./config/log_appender_xml" -x "*.DS_Store" | |
cd .. | |
# Here we send the notarization request to the Apple's Notarization service, waiting for the result. | |
# This typically takes a few seconds inside a CI environment, but it might take more depending on the App | |
# characteristics. Visit the Notarization docs for more information and strategies on how to optimize it if | |
# you're curious | |
echo "Notarize insider app" | |
xcrun notarytool submit "./${DIST_FILE_NAME}--macos-x64--${{ github.sha }}.zip" --keychain-profile "notarytool-profile" --wait | |
# Delete build keychain | |
security delete-keychain build.keychain | |
# artifact_release_name: release-binaries-macos | |
# artifact_release_path: release-binaries-macos/* | |
artifact_insider: butler-sos--macos-x64--${{ github.sha }}.zip | |
- os: ubuntu-latest | |
build: | | |
./node_modules/.bin/esbuild src/bundle.js --bundle --external:axios --external:xdg-open --external:enigma.js --outfile=build.cjs --format=cjs --platform=node --target=node18 --minify --inject:./src/lib/import-meta-url.js --define:import.meta.url=import_meta_url | |
pkg --output "./${DIST_FILE_NAME}" -t node18-linux-x64 ./build.cjs --config package.json --options no-deprecation --compress GZip | |
chmod +x ${DIST_FILE_NAME} | |
# Compress insider's build | |
# Include following directories & files in the created archive file. | |
# - ./src/config/log_appender_xml | |
# - ./src/config⁄production_template.yaml | |
ls -la | |
zip -9 -r ./${DIST_FILE_NAME}--linux-x64--${{ github.sha }}.zip ${DIST_FILE_NAME} | |
cd src | |
zip -9 -u -r "../${DIST_FILE_NAME}--linux-x64--${{ github.sha }}.zip" "./config/production_template.yaml" "./config/log_appender_xml" | |
ls -la | |
# artifact_release_name: release-binaries-linux | |
# artifact_release_path: release-binaries-linux/* | |
artifact_insider: butler-sos--linux-x64--${{ github.sha }}.zip | |
runs-on: ${{ matrix.os }} | |
steps: | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
- name: Setup Node.js | |
uses: actions/setup-node@v4 | |
with: | |
node-version: lts/* | |
- name: Install tool for creating stand-alone executables | |
run: | | |
npm install pkg --location=global | |
npm install --save-exact esbuild | |
- name: Install dependencies | |
run: | | |
pwd | |
npm ci --include=prod | |
- name: Run Snyk to check for vulnerabilities | |
if: | | |
github.repository_owner == 'ptarmiganlabs' && | |
matrix.os == 'ubuntu-latest' | |
continue-on-error: true | |
uses: snyk/actions/node@master | |
env: | |
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} | |
with: | |
args: --file=./package.json --sarif-file-output=snyk.sarif | |
# command: test | |
- name: Upload Snyk result to GitHub Code Scanning | |
if: | | |
github.repository_owner == 'ptarmiganlabs' && | |
matrix.os == 'ubuntu-latest' | |
continue-on-error: true | |
uses: github/codeql-action/upload-sarif@v3 | |
with: | |
sarif_file: snyk.sarif | |
- name: Create binaries | |
env: | |
DIST_FILE_NAME: butler-sos | |
GITHUB_TOKEN: ${{ secrets.PAT }} | |
MACOS_CERTIFICATE: ${{ secrets.PROD_MACOS_CERTIFICATE_BASE64_CODESIGN }} | |
MACOS_CERTIFICATE_PWD: ${{ secrets.PROD_MACOS_CERTIFICATE_CODESIGN_PWD }} | |
MACOS_CERTIFICATE_NAME: ${{ secrets.PROD_MACOS_CERTIFICATE_CODESIGN_NAME }} | |
MACOS_CI_KEYCHAIN_PWD: ${{ secrets.PROD_MACOS_CI_KEYCHAIN_PWD }} | |
PROD_MACOS_NOTARIZATION_APPLE_ID: ${{ secrets.PROD_MACOS_NOTARIZATION_APPLE_ID }} | |
PROD_MACOS_NOTARIZATION_TEAM_ID: ${{ secrets.PROD_MACOS_NOTARIZATION_TEAM_ID }} | |
PROD_MACOS_NOTARIZATION_PWD: ${{ secrets.PROD_MACOS_NOTARIZATION_PWD }} | |
# CODESIGN_PWD: ${{ secrets.WIN_CODESIGN_PWD}} | |
# CODESIGN_INTERMEDIATE_BASE64: ${{ secrets.WIN_CODESIGN_INTERMEDIATE_BASE64 }} | |
# CODESIGN_BASE64: ${{ secrets.WIN_CODESIGN_BASE64}} | |
CODESIGN_WIN_THUMBPRINT: ${{ secrets.WIN_CODESIGN_THUMBPRINT}} | |
run: | | |
pwd | |
${{ matrix.build }} | |
- name: Upload insider build artifacts to GitHub | |
uses: actions/upload-artifact@v4 | |
with: | |
name: ${{ matrix.artifact_insider }} | |
path: ${{ matrix.artifact_insider }} | |