62
62
63
63
- name : Change dev tools to host arch (linux and macos)
64
64
run : |
65
- if [[ "${{inputs .os}}" == linux* && "${{inputs .platform}}" == "aarch64" && "$(uname -m)" != "aarch64" ]]; then
65
+ if [[ "${{matrix .os}}" == linux* && "${{matrix .platform}}" == "aarch64" && "$(uname -m)" != "aarch64" ]]; then
66
66
export CC=aarch64-linux-gnu-gcc
67
67
export CXX=aarch64-linux-gnu-g++
68
68
fi
84
84
-DSLANG_GENERATORS_PATH=build-platform-generators/bin \
85
85
-DSLANG_ENABLE_EXAMPLES=OFF \
86
86
-DSLANG_EMBED_STDLIB=ON \
87
- -DSLANG_SLANG_LLVM_FLAVOR=$(
88
- [[ "${{matrix.build-slang-llvm}}" = "true" ]] && echo "USE_SYSTEM_LLVM" || echo "DISABLE")
87
+ " -DSLANG_SLANG_LLVM_FLAVOR=$(
88
+ [[ "${{matrix.build-slang-llvm}}" = "true" ]] && echo "USE_SYSTEM_LLVM" || echo "DISABLE")"
89
89
90
90
cmake --build --preset "${{matrix.config}}"
91
91
@@ -110,18 +110,18 @@ jobs:
110
110
KEYCHAIN_PATH=$RUNNER_TEMP/app-signing.keychain-db
111
111
112
112
# import certificate and provisioning profile from secrets
113
- echo -n "$BUILD_CERTIFICATE_BASE64" | base64 --decode --output $CERTIFICATE_PATH
113
+ echo -n "$BUILD_CERTIFICATE_BASE64" | base64 --decode --output " $CERTIFICATE_PATH"
114
114
115
115
# create temporary keychain
116
- security create-keychain -p "$KEYCHAIN_PASSWORD" $KEYCHAIN_PATH
117
- security set-keychain-settings -lut 21600 $KEYCHAIN_PATH
118
- security unlock-keychain -p "$KEYCHAIN_PASSWORD" $KEYCHAIN_PATH
116
+ security create-keychain -p "$KEYCHAIN_PASSWORD" " $KEYCHAIN_PATH"
117
+ security set-keychain-settings -lut 21600 " $KEYCHAIN_PATH"
118
+ security unlock-keychain -p "$KEYCHAIN_PASSWORD" " $KEYCHAIN_PATH"
119
119
120
120
# import certificate to keychain
121
- security import $CERTIFICATE_PATH -P "$P12_PASSWORD" -A -t cert -f pkcs12 -k $KEYCHAIN_PATH
122
- security list-keychain -d user -s $KEYCHAIN_PATH
121
+ security import " $CERTIFICATE_PATH" -P "$P12_PASSWORD" -A -t cert -f pkcs12 -k " $KEYCHAIN_PATH"
122
+ security list-keychain -d user -s " $KEYCHAIN_PATH"
123
123
124
- security set-key-partition-list -S apple-tool:,apple:,codesign: -s -k ${KEYCHAIN_PASSWORD} $KEYCHAIN_PATH
124
+ security set-key-partition-list -S apple-tool:,apple:,codesign: -s -k " ${KEYCHAIN_PASSWORD}" " $KEYCHAIN_PATH"
125
125
126
126
binaries=(
127
127
"${lib_dir}/libslang.dylib"
@@ -134,14 +134,14 @@ jobs:
134
134
)
135
135
for b in "${binaries[@]}"; do
136
136
if [[ -f "$b" ]]; then
137
- /usr/bin/codesign --force --options runtime -s ${IDENTITY_ID} "$b" -v
137
+ /usr/bin/codesign --force --options runtime -s " ${IDENTITY_ID}" "$b" -v
138
138
7z a "slang-macos-dist.zip" "$b"
139
139
fi
140
140
done
141
141
142
142
timeout 1000 gon ./extras/macos-notarize.json
143
143
cp slang-macos-dist.zip "slang-macos-dist-${{matrix.platform}}.zip"
144
- echo "SLANG_NOTARIZED_DIST=slang-macos-dist-${{matrix.platform}}.zip" >> $GITHUB_OUTPUT
144
+ echo "SLANG_NOTARIZED_DIST=slang-macos-dist-${{matrix.platform}}.zip" >> " $GITHUB_OUTPUT"
145
145
146
146
- name : Package Slang
147
147
id : package
@@ -152,16 +152,16 @@ jobs:
152
152
triggering_ref=${{ github.ref_name }}
153
153
base=slang-${triggering_ref#v}-${{matrix.os}}-${{matrix.platform}}
154
154
mv "$(pwd)/build/dist-${config}/slang.zip" "${base}.zip"
155
- echo "SLANG_BINARY_ARCHIVE_ZIP=${base}.zip" >> $GITHUB_OUTPUT
155
+ echo "SLANG_BINARY_ARCHIVE_ZIP=${base}.zip" >> " $GITHUB_OUTPUT"
156
156
mv "$(pwd)/build/dist-${config}/slang.tar.gz" "${base}.tar.gz"
157
- echo "SLANG_BINARY_ARCHIVE_TAR=${base}.tar.gz" >> $GITHUB_OUTPUT
157
+ echo "SLANG_BINARY_ARCHIVE_TAR=${base}.tar.gz" >> " $GITHUB_OUTPUT"
158
158
159
159
- name : File check
160
160
run : |
161
- find "build/dist-$config" ! -iname '*.md' ! -iname '*.h' -type f | xargs file
161
+ find "build/dist-$config" -print0 ! -iname '*.md' ! -iname '*.h' -type f | xargs -0 file
162
162
if [ "${{matrix.os}}" = "macos" ]; then
163
- find "build/dist-$config" ! -iname '*.md' ! -iname '*.h' -type f |
164
- xargs codesign --verify --verbose=2 ||
163
+ find "build/dist-$config" -print0 ! -iname '*.md' ! -iname '*.h' -type f |
164
+ xargs -0 codesign --verify --verbose=2 ||
165
165
echo "code signing failed"
166
166
fi
167
167
0 commit comments