forked from hass-agent/HASS.Agent
-
Notifications
You must be signed in to change notification settings - Fork 0
226 lines (196 loc) · 9.02 KB
/
build.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
# This workflow will build, test, sign and package a WPF or Windows Forms desktop application
# built on .NET Core.
# To learn how to migrate your existing application to .NET Core,
# refer to https://docs.microsoft.com/en-us/dotnet/desktop-wpf/migration/convert-project-from-net-framework
#
# To configure this workflow:
#
# 1. Configure environment variables
# GitHub sets default environment variables for every workflow run.
# Replace the variables relative to your project in the "env" section below.
#
# 2. Signing
# Generate a signing certificate in the Windows Application
# Packaging Project or add an existing signing certificate to the project.
# Next, use PowerShell to encode the .pfx file using Base64 encoding
# by running the following Powershell script to generate the output string:
#
# $pfx_cert = Get-Content '.\SigningCertificate.pfx' -Encoding Byte
# [System.Convert]::ToBase64String($pfx_cert) | Out-File 'SigningCertificate_Encoded.txt'
#
# Open the output file, SigningCertificate_Encoded.txt, and copy the
# string inside. Then, add the string to the repo as a GitHub secret
# and name it "Base64_Encoded_Pfx."
# For more information on how to configure your signing certificate for
# this workflow, refer to https://github.com/microsoft/github-actions-for-desktop-apps#signing
#
# Finally, add the signing certificate password to the repo as a secret and name it "Pfx_Key".
# See "Build the Windows Application Packaging project" below to see how the secret is used.
#
# For more information on GitHub Actions, refer to https://github.com/features/actions
# For a complete CI/CD sample to get started with GitHub Action workflows for Desktop Applications,
# refer to https://github.com/microsoft/github-actions-for-desktop-apps
name: Create Release Draft
on:
workflow_dispatch:
inputs:
sourcebranch:
description: 'Source branch'
required: true
default: 'main'
releasetitle:
description: 'Release name'
required: true
releasetag:
description: "Release tag"
required: true
prerelease:
description: 'Is this a pre-release?'
required: true
default: 'true'
#push:
# branches: [ "main" ]
# tags:
# - '*'
#pull_request:
# branches: [ "main" ]
jobs:
build:
environment: ReleaseBuildEnv
strategy:
matrix:
#configuration: [Debug, Release]
configuration: [Release]
runs-on: windows-latest # For a list of available runner types, refer to
# https://help.github.com/en/actions/reference/workflow-syntax-for-github-actions#jobsjob_idruns-on
env:
Solution_Name: src/HASS.Agent.sln # Replace with your solution name, i.e. MyWpfApp.sln.
#Test_Project_Path: your-test-project-path # Replace with the path to your test project, i.e. MyWpfApp.Tests\MyWpfApp.Tests.csproj.
#Wap_Project_Directory: your-wap-project-directory-name # Replace with the Wap project directory relative to the solution, i.e. MyWpfApp.Package.
#Wap_Project_Path: your-wap-project-path # Replace with the path to your Wap project, i.e. MyWpf.App.Package\MyWpfApp.Package.wapproj.
steps:
- name: Checkout
uses: actions/checkout@v4
with:
ref: ${{ github.event.inputs.sourcebranch }}
# Install the .NET Core workload
- name: Install .NET Core
uses: actions/setup-dotnet@v3
with:
dotnet-version: 6.0.x
# Add MSBuild to the PATH: https://github.com/microsoft/setup-msbuild
#- name: Setup MSBuild.exe
# uses: microsoft/[email protected]
# Execute all unit tests in the solution
#- name: Execute unit tests
# run: dotnet test
# Restore the application to populate the obj folder with RuntimeIdentifiers
#- name: Restore the Nuget Packages
# run: |
# nuget restore src/HASS.Agent.sln
# msbuild src/HASS.Agent.sln #/t:Restore /p:Configuration=$env:Configuration
#env:
# Configuration: ${{ matrix.configuration }}
- name: Restore / Install dependencies
run: |
dotnet restore "src\\HASS.Agent\\HASS.Agent\\HASS.Agent.csproj"
dotnet restore "src\\HASS.Agent\\HASS.Agent.Satellite.Service\\HASS.Agent.Satellite.Service.csproj"
- name: Build & Publish HASS.Agent
working-directory: "D:\\a\\HASS.Agent\\HASS.Agent\\src\\HASS.Agent\\HASS.Agent"
run: "dotnet publish -c Release -f net6.0-windows10.0.19041.0 -o bin\\Publish-x64\\Release\\ --no-self-contained -r win-x64 -p:Platform=x64"
- name: Build & Publish HASS.Agent.Satellite.Service
working-directory: "D:\\a\\HASS.Agent\\HASS.Agent\\src\\HASS.Agent\\HASS.Agent.Satellite.Service"
run: "dotnet publish -c Release -f net6.0-windows10.0.19041.0 -o bin\\Publish-x64\\Release\\ --no-self-contained -r win-x64 -p:Platform=x64"
- name: Compile InnoSetup Installer - Satellite Service
working-directory: "D:\\a\\HASS.Agent\\HASS.Agent\\src\\HASS.Agent.Installer"
run: |
& "${Env:ProgramFiles(x86)}\\Inno Setup 6\\iscc.exe" InstallerScript-Service.iss
- name: Compile InnoSetup Installer - Client
working-directory: "D:\\a\\HASS.Agent\\HASS.Agent\\src\\HASS.Agent.Installer"
run: |
& "${Env:ProgramFiles(x86)}\\Inno Setup 6\\iscc.exe" InstallerScript.iss
- name: Decode the pfx
working-directory: "D:\\a\\HASS.Agent\\HASS.Agent\\src\\HASS.Agent.Installer"
run: |
$pfxBytes = [System.Convert]::FromBase64String("${{ secrets.BASE64_ENCODED_PFX }}")
$certificatePath = [IO.Path]::GetFullPath(".\\HASS.Agent.Installer.pfx")
[IO.File]::WriteAllBytes($certificatePath, $pfxBytes)
- name: Sign the installer
working-directory: "D:\\a\\HASS.Agent\\HASS.Agent\\src\\HASS.Agent.Installer"
run: |
$certificatePassword = ConvertTo-SecureString "${{ secrets.BASE64_ENCODED_PFX_PASSWORD }}" -AsPlainText -Force
$certificate = Get-PfxCertificate -FilePath ".\\HASS.Agent.Installer.pfx" -Password $certificatePassword
Set-AuthenticodeSignature -FilePath ".\\bin\\HASS.Agent.Installer.exe" -Certificate $certificate -HashAlgorithm SHA256 -TimestampServer http://timestamp.digicert.com
- name: Remove the pfx
working-directory: "D:\\a\\HASS.Agent\\HASS.Agent\\src\\HASS.Agent.Installer"
run: Remove-Item -path ".\\HASS.Agent.Installer.pfx"
#Upload project artifacts: https://github.com/marketplace/actions/upload-a-build-artifact
- name: Upload build artifacts (HASS Agent)
uses: actions/upload-artifact@v3
with:
name: HASS.Agent
path: "src\\HASS.Agent\\HASS.Agent\\bin\\Publish-x64\\Release"
- name: Upload build artifacts (HASS Agent Satellite Service)
uses: actions/upload-artifact@v3
with:
name: HASS.Agent.Satellite.Service
path: "src\\HASS.Agent\\HASS.Agent.Satellite.Service\\bin\\Publish-x64\\Release"
- name: Upload build artifacts (HASS Agent Installer)
uses: actions/upload-artifact@v3
with:
name: HASS.Agent.Installer
path: "src\\HASS.Agent.Installer\\bin\\HASS.Agent.Installer.exe"
#- name: Debugging artifact paths
# run: |
# Set-Location src\HASS.Agent
# Get-Childitem
#draft a release, https://github.com/actions/create-release
publish:
runs-on: ubuntu-latest
needs: [build]
permissions:
contents: write
steps:
- name: Create directories for Build Artifacts to download
run: |
mkdir HASS.Agent
mkdir HASS.Agent.Satellite.Service
mkdir HASS.Agent.Installer
ls -la
- name: Download Build Artifacts (HASS Agent)
uses: actions/[email protected]
with:
name: HASS.Agent
path: HASS.Agent
- name: Download Build Artifacts (HASS Agent Satellite Service)
uses: actions/[email protected]
with:
name: HASS.Agent.Satellite.Service
path: HASS.Agent.Satellite.Service
- name: Download Build Artifacts (HASS Agent Installer)
uses: actions/[email protected]
with:
name: HASS.Agent.Installer
path: HASS.Agent.Installer
- name: Compress HASS Agent directories for manual install
run: |
cd HASS.Agent
ls -la
zip -r HASS.Agent.zip ./
cd ../
cd HASS.Agent.Satellite.Service
ls -la
zip -r HASS.Agent.Satellite.Service.zip ./
- name: Create Draft Release and Upload Build Artifacts
uses: ncipollo/[email protected]
with:
name: ${{ github.event.inputs.releasetitle }}
draft: true
prerelease: ${{ github.event.inputs.prerelease }}
tag: ${{ github.event.inputs.releasetag }}
artifacts:
HASS.Agent/HASS.Agent.zip,HASS.Agent.Satellite.Service/HASS.Agent.Satellite.Service.zip,HASS.Agent.Installer/HASS.Agent.Installer.exe