1
1
parameters :
2
2
buildName : ' '
3
+ uploadDisplayName : ' Upload'
3
4
4
5
jobs :
5
6
- job : build_${{ parameters.buildName }}
42
43
condition: and(succeeded(), ne(variables['SkipBuild'], 'true'))
43
44
44
45
- job : upload_${{ parameters.buildName }}
45
- displayName : Upload ${{ parameters.buildName }}
46
+ displayName : ${{ parameters.uploadDisplayName }} ${{ parameters.buildName }}
46
47
dependsOn : build_${{ parameters.buildName }}
47
48
condition : succeeded()
48
49
pool : Package ES CodeHub Lab E
80
81
- task : securedevelopmentteam.vss-secure-development-tools.build-task-antimalware.AntiMalware@3
81
82
displayName : ' Run Defender Scan'
82
83
84
+ - powershell : |
85
+ $authenticodefiles = @()
86
+ Get-ChildItem -Path '$(System.ArtifactsDirectory)\rpm\*.rpm' -recurse | ForEach-Object { $authenticodefiles += $_.FullName}
87
+ tools/releaseBuild/generatePackgeSigning.ps1 -LinuxFiles $authenticodeFiles -path "$(System.ArtifactsDirectory)\package.xml"
88
+ displayName: 'Generate RPM Signing Xml'
89
+ condition: and(and(succeeded(), eq(variables['Build.Reason'], 'Manual')),eq(variables['buildName'], 'RPM'))
90
+
91
+ - powershell : |
92
+ Get-Content "$(System.ArtifactsDirectory)\package.xml"
93
+ displayName: 'Capture RPM signing xml'
94
+ condition: and(and(succeeded(), eq(variables['Build.Reason'], 'Manual')),eq(variables['buildName'], 'RPM'))
95
+
96
+ - task : PkgESCodeSign@10
97
+ displayName : ' CodeSign RPM $(System.ArtifactsDirectory)\package.xml'
98
+ env :
99
+ SYSTEM_ACCESSTOKEN : $(System.AccessToken)
100
+ inputs :
101
+ signConfigXml : ' $(System.ArtifactsDirectory)\package.xml'
102
+ outPathRoot : ' $(Build.StagingDirectory)\signedPackages'
103
+ binVersion : $(SigingVersion)
104
+ binVersionOverride : $(SigningVersionOverride)
105
+ condition : and(and(succeeded(), eq(variables['Build.Reason'], 'Manual')),eq(variables['buildName'], 'RPM'))
106
+
83
107
- task : AzureFileCopy@1
84
108
displayName : ' Upload to Azure - DEB and tar.gz'
85
109
inputs :
@@ -94,18 +118,34 @@ jobs:
94
118
artifactPath : $(System.ArtifactsDirectory)\finished\release
95
119
96
120
- task : AzureFileCopy@1
97
- displayName : ' Upload to Azure - RPM'
121
+ displayName : ' Upload to Azure - RPM - Unsigned '
98
122
inputs :
99
123
SourcePath : ' $(System.ArtifactsDirectory)\rpm\release'
100
124
azureSubscription : ' $(AzureFileCopySubscription)'
101
125
Destination : AzureBlob
102
126
storage : ' $(StorageAccount)'
103
- ContainerName : ' $(AzureVersion)-unsigned'
104
- condition : and(eq(variables['buildName'], 'RPM'),succeeded())
127
+ ContainerName : ' $(AzureVersion)'
128
+ condition : and(and(succeeded(), ne(variables['Build.Reason'], 'Manual')),eq(variables['buildName'], 'RPM'))
129
+
130
+ - task : AzureFileCopy@1
131
+ displayName : ' Upload to Azure - RPM - Signed'
132
+ inputs :
133
+ SourcePath : ' $(Build.StagingDirectory)\signedPackages'
134
+ azureSubscription : ' $(AzureFileCopySubscription)'
135
+ Destination : AzureBlob
136
+ storage : ' $(StorageAccount)'
137
+ ContainerName : ' $(AzureVersion)'
138
+ condition : and(and(succeeded(), eq(variables['Build.Reason'], 'Manual')),eq(variables['buildName'], 'RPM'))
105
139
106
140
- template : upload-final-results.yml
107
141
parameters :
108
142
artifactPath : $(System.ArtifactsDirectory)\rpm\release
143
+ condition : and(and(succeeded(), ne(variables['Build.Reason'], 'Manual')),eq(variables['buildName'], 'RPM'))
144
+
145
+ - template : upload-final-results.yml
146
+ parameters :
147
+ artifactPath : ' $(Build.StagingDirectory)\signedPackages'
148
+ condition : and(and(succeeded(), eq(variables['Build.Reason'], 'Manual')),eq(variables['buildName'], 'RPM'))
109
149
110
150
- task : ms.vss-governance-buildtask.governance-build-task-component-detection.ComponentGovernanceComponentDetection@0
111
151
displayName : ' Component Detection'
0 commit comments