Skip to content

use 32bit eid pkcs

use 32bit eid pkcs #2

Workflow file for this run

name: Package
on:
push:
tags:
- "v[0-9]+.[0-9]+.[0-9]+"
jobs:
windows-32bit:
environment: packaging
runs-on: windows-latest
steps:
- uses: actions/checkout@v4
- uses: actions/download-artifact@v4
with:
merge-multiple: true
path: target
- name: Update version in pom if tag pushed
if: startsWith(github.ref, 'refs/tags/')
run: ./mvnw versions:set -DnewVersion=$(git describe --tags --abbrev=0 | sed -r 's/^v//g')
shell: bash
- name: Set up JDK 32-bit
uses: actions/setup-java@v3
with:
java-version: "21.0.8+12"
distribution: "liberica"
java-package: "jdk+fx"
architecture: "x86"
- name: Cache local Maven repository and JDK cache (32-bit)
uses: actions/cache@v3
with:
path: |
~/.m2/repository
target/jdkCache
key: windows-32bit-maven-${{ hashFiles('**/pom.xml') }}
restore-keys: |
windows-32bit-maven-
- name: Package with Maven (32-bit)
run: ./mvnw -B -C -V package
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Sign on Azure (32-bit)
shell: bash
run: |
dotnet tool install --global AzureSignTool
AzureSignTool sign --description "Autogram 32-bit" -kvu "${{ secrets.AZURE_KEY_VAULT_URI }}" -kvi "${{ secrets.AZURE_CLIENT_ID }}" -kvt "${{ secrets.AZURE_TENANT_ID }}" -kvs "${{ secrets.AZURE_CLIENT_SECRET }}" -kvc ${{ secrets.AZURE_CERT_NAME }} -tr http://timestamp.digicert.com -v target/*.msi
- name: Rename artifacts to indicate 32-bit
shell: bash
run: |
for file in target/*.exe; do
if [[ -f "$file" ]]; then
mv "$file" "${file%.exe}-32bit.exe"
fi
done
for file in target/*.msi; do
if [[ -f "$file" ]]; then
mv "$file" "${file%.msi}-32bit.msi"
fi
done
- name: Create release if tag pushed
uses: softprops/action-gh-release@de2c0eb89ae2a093876385947365aca7b0e5f844
if: startsWith(github.ref, 'refs/tags/')
with:
draft: true
prerelease: true
files: |
target/*-32bit.exe
target/*-32bit.msi
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}