mirror of
https://github.com/CringeStudios/element-desktop.git
synced 2025-01-18 15:34:59 +01:00
183 lines
7.7 KiB
YAML
183 lines
7.7 KiB
YAML
# This workflow relies on actions/cache to store the hak dependency artifacts as they take a long time to build
|
|
# Due to this extra care must be taken to only ever run all build_* scripts against the same branch to ensure
|
|
# the correct cache scoping, and additional care must be taken to not run untrusted actions on the develop branch.
|
|
|
|
# Windows GHA runner by default uses the pwsh shell which breaks codeSigningCert in the workflow
|
|
defaults:
|
|
run:
|
|
shell: powershell
|
|
on:
|
|
workflow_call:
|
|
secrets:
|
|
ESIGNER_USER_NAME:
|
|
required: false
|
|
ESIGNER_USER_PASSWORD:
|
|
required: false
|
|
ESIGNER_USER_TOTP:
|
|
required: false
|
|
inputs:
|
|
arch:
|
|
type: string
|
|
required: true
|
|
description: "The architecture to build for, one of 'x64' | 'ia32' | 'arm64'"
|
|
version:
|
|
type: string
|
|
required: false
|
|
description: "Version string to override the one in package.json, used for non-release builds"
|
|
sign:
|
|
type: string
|
|
required: false
|
|
description: "Whether to sign & notarise the build, requires 'packages.element.io' environment"
|
|
permissions: {} # No permissions required
|
|
jobs:
|
|
build:
|
|
runs-on: windows-2022
|
|
environment: ${{ inputs.sign && 'packages.element.io' || '' }}
|
|
env:
|
|
SIGNTOOL_PATH: "C:/Program Files (x86)/Windows Kits/10/bin/10.0.22000.0/x86/signtool.exe"
|
|
steps:
|
|
- uses: nbucic/variable-mapper@0673f6891a0619ba7c002ecfed0f9f4f39017b6f
|
|
id: config
|
|
with:
|
|
key: "${{ inputs.arch }}"
|
|
export_to: output
|
|
map: |
|
|
{
|
|
"x64": {
|
|
"target": "x86_64-pc-windows-msvc"
|
|
},
|
|
"arm64": {
|
|
"target": "aarch64-pc-windows-msvc",
|
|
"build-args": "--arm64",
|
|
"arch": "amd64_arm64"
|
|
},
|
|
"ia32": {
|
|
"target": "i686-pc-windows-msvc",
|
|
"build-args": "--ia32",
|
|
"arch": "x86"
|
|
}
|
|
}
|
|
|
|
- uses: actions/checkout@v4
|
|
|
|
- uses: actions/download-artifact@v4
|
|
with:
|
|
name: webapp
|
|
|
|
- name: Cache .hak
|
|
id: cache
|
|
uses: actions/cache@v4
|
|
with:
|
|
key: ${{ runner.os }}-${{ inputs.arch }}-${{ hashFiles('hakHash', 'electronVersion') }}
|
|
path: |
|
|
./.hak
|
|
|
|
- name: Set up build tools
|
|
uses: ilammy/msvc-dev-cmd@0b201ec74fa43914dc39ae48a89fd1d8cb592756 # v1.13.0
|
|
with:
|
|
arch: ${{ steps.config.outputs.arch || inputs.arch }}
|
|
|
|
# ActiveTCL package on choco is from 2015,
|
|
# this one is newer but includes more than we need
|
|
- name: Choco install tclsh
|
|
if: steps.cache.outputs.cache-hit != 'true'
|
|
shell: pwsh
|
|
run: |
|
|
choco install -y magicsplat-tcl-tk --no-progress
|
|
echo "${HOME}/AppData/Local/Apps/Tcl86/bin" | Out-File -FilePath $env:GITHUB_PATH -Encoding utf8 -Append
|
|
|
|
- name: Choco install NetWide Assembler
|
|
if: steps.cache.outputs.cache-hit != 'true'
|
|
shell: pwsh
|
|
run: |
|
|
choco install -y nasm --no-progress
|
|
echo "C:/Program Files/NASM" | Out-File -FilePath $env:GITHUB_PATH -Encoding utf8 -Append
|
|
|
|
- name: Install Rust
|
|
if: steps.cache.outputs.cache-hit != 'true'
|
|
run: |
|
|
rustup toolchain install stable --profile minimal --no-self-update
|
|
rustup default stable
|
|
rustup target add ${{ steps.config.outputs.target }}
|
|
|
|
- uses: actions/setup-node@v4
|
|
with:
|
|
node-version-file: package.json
|
|
cache: "yarn"
|
|
|
|
# Does not need branch matching as only analyses this layer
|
|
- name: Install Deps
|
|
run: "yarn install --frozen-lockfile"
|
|
|
|
- name: Build Natives
|
|
if: steps.cache.outputs.cache-hit != 'true'
|
|
run: |
|
|
refreshenv
|
|
yarn build:native --target ${{ steps.config.outputs.target }}
|
|
|
|
- name: Install and configure eSigner CKA
|
|
if: inputs.sign
|
|
run: |
|
|
Set-StrictMode -Version 'Latest'
|
|
|
|
# Download, extract, and rename
|
|
Invoke-WebRequest -OutFile eSigner_CKA.zip "$env:ESIGNER_URL"
|
|
Expand-Archive -Path eSigner_CKA.zip -DestinationPath .
|
|
Get-ChildItem -Path * -Include "*_build_*.exe" | Rename-Item -NewName eSigner_CKA.exe
|
|
|
|
# Install
|
|
New-Item -ItemType Directory -Force -Path "$env:INSTALL_DIR"
|
|
./eSigner_CKA.exe /CURRENTUSER /VERYSILENT /SUPPRESSMSGBOXES /DIR="${{ env.INSTALL_DIR }}" | Out-Null
|
|
|
|
# Disable logger
|
|
$LogConfig = Get-Content -Path ${{ env.INSTALL_DIR }}/log4net.config
|
|
$LogConfig[0] = '<log4net threshold="OFF">'
|
|
$LogConfig | Set-Content -Path ${{ env.INSTALL_DIR }}/log4net.config
|
|
|
|
# Configure
|
|
${{ env.INSTALL_DIR }}/eSignerCKATool.exe config -mode product -user "${{ secrets.ESIGNER_USER_NAME }}" -pass "${{ secrets.ESIGNER_USER_PASSWORD }}" -totp "${{ secrets.ESIGNER_USER_TOTP }}" -key "${{ env.MASTER_KEY_FILE }}" -r
|
|
${{ env.INSTALL_DIR }}/eSignerCKATool.exe unload
|
|
${{ env.INSTALL_DIR }}/eSignerCKATool.exe load
|
|
|
|
# Find certificate
|
|
$CodeSigningCert = Get-ChildItem Cert:\CurrentUser\My -CodeSigningCert | Select-Object -First 1
|
|
echo Certificate: $CodeSigningCert
|
|
|
|
# Extract thumbprint and subject name
|
|
$Thumbprint = $CodeSigningCert.Thumbprint
|
|
$SubjectName = ($CodeSigningCert.Subject -replace ", ?", "`n" | ConvertFrom-StringData).CN
|
|
|
|
echo "ED_SIGNTOOL_THUMBPRINT=$Thumbprint" >> $env:GITHUB_ENV
|
|
echo "ED_SIGNTOOL_SUBJECT_NAME=$SubjectName" >> $env:GITHUB_ENV
|
|
env:
|
|
ESIGNER_URL: https://github.com/SSLcom/eSignerCKA/releases/download/v1.0.6/SSL.COM-eSigner-CKA_1.0.6.zip
|
|
INSTALL_DIR: C:\Users\runneradmin\eSignerCKA
|
|
MASTER_KEY_FILE: C:\Users\runneradmin\eSignerCKA\master.key
|
|
|
|
- name: "[Nightly] Resolve version"
|
|
if: inputs.version != ''
|
|
shell: bash
|
|
run: |
|
|
echo "ED_NIGHTLY=${{ inputs.version }}" >> $GITHUB_ENV
|
|
|
|
# XXX: For whatever reason if we use `yarn build ...` it freezes, but splitting it into parts it is fine
|
|
- run: yarn run build:ts
|
|
- run: yarn run build:res
|
|
|
|
- name: Build App
|
|
run: |
|
|
yarn electron-builder --publish never -w ${{ steps.config.outputs.build-args }}
|
|
|
|
- name: Check app was signed successfully
|
|
if: inputs.sign != ''
|
|
run: |
|
|
. "$env:SIGNTOOL_PATH" verify /pa (get-item ./dist/squirrel-windows*/*.exe)
|
|
|
|
- name: Upload Artifacts
|
|
uses: actions/upload-artifact@v4
|
|
with:
|
|
name: win-${{ inputs.arch }}
|
|
path: |
|
|
dist
|
|
retention-days: 1
|