Skip to content

Commit

Permalink
bump to 0.0.7
Browse files Browse the repository at this point in the history
  • Loading branch information
zippy committed Nov 1, 2023
1 parent 0198b44 commit f6816ed
Show file tree
Hide file tree
Showing 5 changed files with 14 additions and 14 deletions.
20 changes: 10 additions & 10 deletions .github/workflows/release-codesigned.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -84,31 +84,31 @@ jobs:
# replace-me -- HELP
# 1. replace all occurrences of kando with the name you gave your package in srct-tauri/Cargo.toml
# 2. replace all occurrences of kando with the productName field in tauri.conf.json
# 3. replace all occurrences of 0.0.6 with the version field in tauri.conf.json
# 3. replace all occurrences of 0.0.7 with the version field in tauri.conf.json
# !! NOTE: The version field needs to be updated manually here with each new version of your app, otherwise the Windows build will fail.
# sign the .msi file
AzureSignTool sign -kvu "${{ secrets.AZURE_KEY_VAULT_URI }}" -kvi "${{ secrets.AZURE_CLIENT_ID }}" -kvt "${{ secrets.AZURE_TENANT_ID }}" -kvs "${{ secrets.AZURE_CLIENT_SECRET }}" -kvc ${{ secrets.AZURE_CERT_NAME }} -tr http://timestamp.digicert.com -v "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.6_x64_en-US.msi"
AzureSignTool sign -kvu "${{ secrets.AZURE_KEY_VAULT_URI }}" -kvi "${{ secrets.AZURE_CLIENT_ID }}" -kvt "${{ secrets.AZURE_TENANT_ID }}" -kvs "${{ secrets.AZURE_CLIENT_SECRET }}" -kvc ${{ secrets.AZURE_CERT_NAME }} -tr http://timestamp.digicert.com -v "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.7_x64_en-US.msi"
# sign the .exe file
AzureSignTool sign -kvu "${{ secrets.AZURE_KEY_VAULT_URI }}" -kvi "${{ secrets.AZURE_CLIENT_ID }}" -kvt "${{ secrets.AZURE_TENANT_ID }}" -kvs "${{ secrets.AZURE_CLIENT_SECRET }}" -kvc ${{ secrets.AZURE_CERT_NAME }} -tr http://timestamp.digicert.com -v "D:\a\kando\kando\src-tauri\target\release\bundle\nsis\kando_0.0.6_x64-setup.exe"
AzureSignTool sign -kvu "${{ secrets.AZURE_KEY_VAULT_URI }}" -kvi "${{ secrets.AZURE_CLIENT_ID }}" -kvt "${{ secrets.AZURE_TENANT_ID }}" -kvs "${{ secrets.AZURE_CLIENT_SECRET }}" -kvc ${{ secrets.AZURE_CERT_NAME }} -tr http://timestamp.digicert.com -v "D:\a\kando\kando\src-tauri\target\release\bundle\nsis\kando_0.0.7_x64-setup.exe"
# # Uncomment the lines below if you have the updater enabled
# # =========================================================
# # remove the .msi.zip and .msi.zip.sig files generated by tauri's build command as they are not code signed
# rm "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.6_x64_en-US.msi.zip"
# rm "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.6_x64_en-US.msi.zip.sig"
# rm "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.7_x64_en-US.msi.zip"
# rm "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.7_x64_en-US.msi.zip.sig"
#
# # zip and sign the code signed .msi
# 7z a -mx=0 "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.6_x64_en-US.msi.zip" "D:\a\kando\kando\target\release\bundle\msi\kando_0.0.6_x64_en-US.msi"
# npm run tauri signer sign "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.6_x64_en-US.msi.zip" -- -k ${{ secrets.TAURI_PRIVATE_KEY }} -p "${{ secrets.TAURI_KEY_PASSWORD }}"
# 7z a -mx=0 "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.7_x64_en-US.msi.zip" "D:\a\kando\kando\target\release\bundle\msi\kando_0.0.7_x64_en-US.msi"
# npm run tauri signer sign "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.7_x64_en-US.msi.zip" -- -k ${{ secrets.TAURI_PRIVATE_KEY }} -p "${{ secrets.TAURI_KEY_PASSWORD }}"
# # =========================================================
# log hashes before and after code signing to verify that the uploaded assets are the right ones
CertUtil -hashfile "D:\a\kando\kando\src-tauri\target\release\bundle\nsis\kando_0.0.6_x64-setup.exe" SHA256
CertUtil -hashfile "D:\a\kando\kando\src-tauri\target\release\bundle\nsis\kando_0.0.7_x64-setup.exe" SHA256
# # Uncomment the lines below if you have the updater enabled
# CertUtil -hashfile "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.6_x64_en-US.msi.zip" SHA256
# CertUtil -hashfile "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.6_x64_en-US.msi.zip.sig" SHA256
# CertUtil -hashfile "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.7_x64_en-US.msi.zip" SHA256
# CertUtil -hashfile "D:\a\kando\kando\src-tauri\target\release\bundle\msi\kando_0.0.7_x64_en-US.msi.zip.sig" SHA256
env:
TAURI_PRIVATE_KEY: ${{ secrets.TAURI_PRIVATE_KEY }}
Expand Down
2 changes: 1 addition & 1 deletion package.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"name": "kando",
"private": true,
"version": "0.0.6",
"version": "0.0.7",
"type": "module",
"scripts": {
"kangaroo": "npm run dist && npm run tauri build",
Expand Down
2 changes: 1 addition & 1 deletion src-tauri/Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion src-tauri/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[package]
name = "kando" # replace-me
version = "0.0.6" # replace-me -- Choose wisely, see "Note on Versioning" in README
version = "0.0.7" # replace-me -- Choose wisely, see "Note on Versioning" in README
description = "Kanban for Holochain"
authors = ["[email protected]"]
license = ""
Expand Down
2 changes: 1 addition & 1 deletion src-tauri/tauri.conf.json
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"package": {
"productName": "kando",
"version": "0.0.6"
"version": "0.0.7"
},
"tauri": {
"allowlist": {
Expand Down

0 comments on commit f6816ed

Please sign in to comment.