Skip to content

Commit 27f7c34

Browse files
committed
Some more refactoring of the code signing workflow
1 parent 6ec4554 commit 27f7c34

File tree

1 file changed

+8
-11
lines changed

1 file changed

+8
-11
lines changed

azure-pipelines.yml

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,11 @@ steps:
1919
inputs:
2020
APIKey: '$(SM_API_KEY)'
2121
- task: PowerShell@2
22-
displayName: 'Prepare Code Signing'
22+
displayName: 'Prepare DigiCert Code Signing'
2323
inputs:
2424
targetType: 'inline'
2525
script: |
26-
$env:PATH += ';C:\Program Files (x86)\Windows Kits\10\bin\10.0.22621.0\x64;C:\Program Files\DigiCert\DigiCert Keylocker Tools'
27-
$env:SM_LOG_OUTPUT = 'console'
26+
$env:PATH += ';C:\Program Files\DigiCert\DigiCert Keylocker Tools'
2827
smctl credentials save $(SM_API_KEY) $(SM_CLIENT_CERT_PASSWORD)
2928
smksp_cert_sync.exe
3029
failOnStderr: true
@@ -84,13 +83,12 @@ steps:
8483
modifyOutputPath: false
8584
- task: PowerShell@2
8685
displayName: 'Sign EXE files'
86+
env:
87+
SM_CLIENT_CERT_FILE : $(SM_CLIENT_CERT_FILE.secureFilePath)
8788
inputs:
8889
targetType: 'inline'
8990
script: |
90-
$env:PATH += ';C:\Program Files (x86)\Windows Kits\10\bin\10.0.22621.0\x64;C:\Program Files\DigiCert\DigiCert Keylocker Tools'
91-
$env:SM_HOST = '$(SM_HOST)'
92-
$env:SM_CLIENT_CERT_FILE = '$(SM_CLIENT_CERT_FILE.secureFilePath)'
93-
$env:SM_LOG_OUTPUT = 'console'
91+
$env:PATH += ';C:\Program Files (x86)\Windows Kits\10\bin\10.0.22621.0\x64'
9492
signtool.exe sign /tr http://timestamp.digicert.com /td SHA256 /fd SHA256 /sha1 $(SM_CERT_FINGERPRINT) $(Build.SourcesDirectory)/src/bin/Publish/win-x64/SqlDocs.exe
9593
signtool.exe sign /tr http://timestamp.digicert.com /td SHA256 /fd SHA256 /sha1 $(SM_CERT_FINGERPRINT) $(Build.SourcesDirectory)/src/bin/Publish/win-x86/SqlDocs.exe
9694
signtool.exe sign /tr http://timestamp.digicert.com /td SHA256 /fd SHA256 /sha1 $(SM_CERT_FINGERPRINT) $(Build.SourcesDirectory)/src/bin/Publish/portable/SqlDocs.exe
@@ -118,13 +116,12 @@ steps:
118116
replaceExistingArchive: true
119117
- task: PowerShell@2
120118
displayName: 'Sign MSI files'
119+
env:
120+
SM_CLIENT_CERT_FILE : $(SM_CLIENT_CERT_FILE.secureFilePath)
121121
inputs:
122122
targetType: 'inline'
123123
script: |
124-
$env:PATH += ';C:\Program Files (x86)\Windows Kits\10\bin\10.0.22621.0\x64;C:\Program Files\DigiCert\DigiCert Keylocker Tools'
125-
$env:SM_HOST = '$(SM_HOST)'
126-
$env:SM_CLIENT_CERT_FILE = '$(SM_CLIENT_CERT_FILE.secureFilePath)'
127-
$env:SM_LOG_OUTPUT = 'console'
124+
$env:PATH += ';C:\Program Files (x86)\Windows Kits\10\bin\10.0.22621.0\x64'
128125
signtool.exe sign /tr http://timestamp.digicert.com /td SHA256 /fd SHA256 /sha1 $(SM_CERT_FINGERPRINT) /d "SQLDocs" $(Build.ArtifactStagingDirectory)/sqldocs-x64.msi
129126
signtool.exe sign /tr http://timestamp.digicert.com /td SHA256 /fd SHA256 /sha1 $(SM_CERT_FINGERPRINT) /d "SQLDocs" $(Build.ArtifactStagingDirectory)/sqldocs-x86.msi
130127
failOnStderr: true

0 commit comments

Comments
 (0)