|
| 1 | +name: Windows signing streamlining |
| 2 | + |
| 3 | +on: |
| 4 | + push: |
| 5 | + branches: cor_1627_streamline_windows_signing_process |
| 6 | + |
| 7 | +env: |
| 8 | + UBUNTU_VERSION: '22.04' |
| 9 | + STATIC_LIBRARIES_IMAGE_TAG: 'rust-1.82_ghc-9.10.2' |
| 10 | + RUST_VERSION: '1.82' |
| 11 | + STACK_VERSION: '3.7.1' |
| 12 | + FLATBUFFERS_VERSION: '23.5.26' |
| 13 | + GHC_VERSION: '9.10.2' |
| 14 | + PROTOC_VERSION: '28.3' |
| 15 | + STATIC_NODE_BINARY_IMAGE_NAME: 'static-node-binaries' |
| 16 | + DOCKER_ARTIFACT_NAME: 'image' |
| 17 | + AWS_ROLE_TO_ASSUME: 'arn:aws:iam::192549843005:role/github_concordium-node' |
| 18 | + S3_ARN_TEMPLATES: '{ |
| 19 | + \"database-exporter\": {\"bucket\": \"distribution.concordium.software\", \"dir\": \"tools/linux\", \"name\": \"database-exporter_${VERSION}.deb\"}, |
| 20 | + \"p2p-bootstrapper\": {\"bucket\": \"distribution.concordium.software\", \"dir\": \"tools/linux\", \"name\": \"p2p-bootstrapper_${VERSION}.deb\"}, |
| 21 | + \"node-stagenet-linux\": {\"bucket\": \"distribution.stagenet.concordium.com\", \"dir\": \"deb\", \"name\": \"concordium-stagenet-node_${VERSION}_amd64.deb\"}, |
| 22 | + \"node-flynet-linux\": {\"bucket\": \"distribution.flynet.concordium.com\", \"dir\": \"deb\", \"name\": \"concordium-flynet-node_${VERSION}_amd64.deb\"}, |
| 23 | + \"node-testnet-linux\": {\"bucket\": \"distribution.testnet.concordium.com\", \"dir\": \"deb\", \"name\": \"concordium-testnet-node_${VERSION}_amd64.deb\"}, |
| 24 | + \"node-mainnet-linux\": {\"bucket\": \"distribution.mainnet.concordium.software\", \"dir\": \"deb\", \"name\": \"concordium-mainnet-node_${VERSION}_amd64.deb\"}, |
| 25 | + \"node-macos\": {\"bucket\": \"distribution.concordium.software\", \"dir\": \"macos\", \"name\": \"concordium-node-${VERSION}.pkg\"}, |
| 26 | + \"node-windows\": {\"bucket\": \"distribution.concordium.software\", \"dir\": \"windows\", \"name\": \"Node-${VERSION}.msi\"} |
| 27 | + }' |
| 28 | + DOCKER_TAGS_TEMPLATES: '{ |
| 29 | + \"docker-stagenet\": \"concordium/stagenet-node:${VERSION}\", |
| 30 | + \"docker-testnet\": \"concordium/testnet-node:${VERSION}\", |
| 31 | + \"docker-mainnet\": \"concordium/mainnet-node:${VERSION}\", |
| 32 | + \"docker-bootstrapper\": \"concordium/bootstrapper:${VERSION}\" |
| 33 | + }' |
| 34 | + REGISTRY: docker.io |
| 35 | + SERVICE: "node-windows" |
| 36 | + |
| 37 | +permissions: |
| 38 | + id-token: write |
| 39 | + contents: read |
| 40 | + |
| 41 | +jobs: |
| 42 | + |
| 43 | + validate-preconditions: |
| 44 | + runs-on: ubuntu-latest |
| 45 | + outputs: |
| 46 | + s3_arns: ${{ steps.render.outputs.s3_arns }} |
| 47 | + docker_tags: ${{ steps.render.outputs.docker_tags }} |
| 48 | + release_type: ${{ steps.versions_derivation.outputs.release_type }} |
| 49 | + base_version: ${{ steps.versions_derivation.outputs.base_version }} |
| 50 | + version: ${{ steps.versions_derivation.outputs.version }} |
| 51 | + steps: |
| 52 | + - name: Checkout Repository |
| 53 | + uses: actions/checkout@v4 |
| 54 | + |
| 55 | + - name: Validate version |
| 56 | + id: versions_derivation |
| 57 | + run: | |
| 58 | + CARGO_VERSION=$(yq .package.version concordium-node/Cargo.toml) |
| 59 | + if [ -z "${{ env.SERVICE }}" ]; then |
| 60 | + IFS='-' read -r VERSION BUILD RELEASE_TYPE <<< "${{ github.ref_name }}" |
| 61 | + # if [ ! "$VERSION" = "$CARGO_VERSION" ]; then |
| 62 | + # echo "::error::${CARGO_VERSION} does not match ${VERSION}." |
| 63 | + # exit 1 |
| 64 | + # fi |
| 65 | + else |
| 66 | + RELEASE_TYPE="${{ env.SERVICE }}" |
| 67 | + BUILD=$(git rev-parse --short HEAD) |
| 68 | + fi |
| 69 | + echo "::notice::RELEASE_TYPE=${RELEASE_TYPE}" |
| 70 | + echo "release_type=${RELEASE_TYPE}" >> "$GITHUB_OUTPUT" |
| 71 | + echo "version=${CARGO_VERSION}-${BUILD}" >> "$GITHUB_OUTPUT" |
| 72 | + echo "base_version=${CARGO_VERSION}" >> "$GITHUB_OUTPUT" |
| 73 | + - name: Templates rendering |
| 74 | + id: render |
| 75 | + run: | |
| 76 | + export VERSION="${{ steps.versions_derivation.outputs.version }}" |
| 77 | + echo "s3_arns=${{ env.S3_ARN_TEMPLATES }}" >> $GITHUB_OUTPUT |
| 78 | + echo "docker_tags=${{ env.DOCKER_TAGS_TEMPLATES }}" >> $GITHUB_OUTPUT |
| 79 | +
|
| 80 | + node-windows: |
| 81 | + runs-on: windows-latest |
| 82 | + # TODO (drsk) the next line needs to be in again after testing !!! |
| 83 | + # environment: release # This step needs to use the release context to access credentials for code signing. |
| 84 | + needs: [validate-preconditions] |
| 85 | + if: contains(fromJSON('["rc", "alpha", "node-windows"]'), needs.validate-preconditions.outputs.release_type) |
| 86 | + defaults: |
| 87 | + run: |
| 88 | + shell: pwsh |
| 89 | + steps: |
| 90 | + - name: Checkout Repository |
| 91 | + uses: actions/checkout@v4 |
| 92 | + with: |
| 93 | + submodules: recursive |
| 94 | + |
| 95 | + - name: Install dependencies |
| 96 | + run: | |
| 97 | + choco install yq jq -y |
| 98 | + shell: bash |
| 99 | + |
| 100 | + - name: Extrapolate artifact name |
| 101 | + run: | |
| 102 | + ARTIFACT_NAME=$(echo '${{ needs.validate-preconditions.outputs.s3_arns }}' | jq -r '.["${{ github.job }}"].name') |
| 103 | + echo "ARTIFACT_NAME=${ARTIFACT_NAME}" >> $GITHUB_ENV |
| 104 | + shell: bash |
| 105 | + |
| 106 | + - name: Install DigiCert Client tools (Windows only) |
| 107 | + id: digicert_client |
| 108 | + |
| 109 | + |
| 110 | + - name: Import Windows certificate (Windows only) |
| 111 | + id: windows_certificate |
| 112 | + env: |
| 113 | + # Base64 encoding of the pfx/p12 certificate for Windows code signing. |
| 114 | + SM_CLIENT_CERT_FILE_B64: ${{ secrets.WINDOWS_SM_CLIENT_CERT_FILE_B64 }} |
| 115 | + run: | |
| 116 | + $CERTIFICATE_PATH_BASE64="$env:RUNNER_TEMP\cert-b64.txt" |
| 117 | + $CERTIFICATE_PATH="$env:RUNNER_TEMP\cert.pfx" |
| 118 | +
|
| 119 | + Set-Content -Path $CERTIFICATE_PATH_BASE64 -Value $env:SM_CLIENT_CERT_FILE_B64 |
| 120 | + certutil -decode $CERTIFICATE_PATH_BASE64 $CERTIFICATE_PATH |
| 121 | + echo "CERTIFICATE_PATH=$CERTIFICATE_PATH" >> $env:GITHUB_OUTPUT |
| 122 | +
|
| 123 | + - name: Run smctl healthcheck to confirm if the tool is configured properly. |
| 124 | + working-directory: ${{steps.build.outputs.bin_dir}} |
| 125 | + env: |
| 126 | + WINDOWS_PKCS11_CONFIG: ${{ steps.digicert_client.outputs.PKCS11_CONFIG }} |
| 127 | + WINDOWS_SM_KEYPAIR_ALIAS: ${{ secrets.WINDOWS_SM_KEYPAIR_ALIAS }} |
| 128 | + SM_HOST: ${{ vars.WINDOWS_SM_HOST }} |
| 129 | + SM_API_KEY: ${{ secrets.WINDOWS_SM_API_KEY }} |
| 130 | + SM_CLIENT_CERT_FILE: ${{ steps.windows_certificate.outputs.CERTIFICATE_PATH }} |
| 131 | + SM_CLIENT_CERT_PASSWORD: ${{ secrets.WINDOWS_SM_CLIENT_CERT_PASSWORD }} |
| 132 | + run: | |
| 133 | + smctl healthcheck --all |
| 134 | + shell: cmd |
| 135 | + |
| 136 | + - name: Install Rust |
| 137 | + uses: actions-rust-lang/setup-rust-toolchain@v1 |
| 138 | + with: |
| 139 | + toolchain: ${{ env.RUST_VERSION }}-x86_64-pc-windows-msvc |
| 140 | + |
| 141 | + - name: Install Rust |
| 142 | + uses: actions-rust-lang/setup-rust-toolchain@v1 |
| 143 | + with: |
| 144 | + toolchain: ${{ env.RUST_VERSION }}-x86_64-pc-windows-gnu |
| 145 | + |
| 146 | + - name: Setup node folder |
| 147 | + run: | |
| 148 | + mkdir -p "C:/Program Files/node/include" |
| 149 | + Add-Content -Path $env:GITHUB_PATH -Value "C:/Program Files/node" |
| 150 | +
|
| 151 | + - name: Install flatbuffers |
| 152 | + run: | |
| 153 | + curl -L -O https://github.com/google/flatbuffers/releases/download/v${{ env.FLATBUFFERS_VERSION }}/Windows.flatc.binary.zip |
| 154 | + unzip Windows.flatc.binary.zip |
| 155 | + mv flatc.exe "C:/Program Files/node/" |
| 156 | +
|
| 157 | + - name: Install protobuf (protoc) |
| 158 | + run: | |
| 159 | + curl -L -O https://github.com/protocolbuffers/protobuf/releases/download/v${{ env.PROTOC_VERSION }}/protoc-${{ env.PROTOC_VERSION }}-win64.zip |
| 160 | + unzip protoc-${{ env.PROTOC_VERSION }}-win64.zip |
| 161 | + mv bin/protoc.exe "C:/Program Files/node/" |
| 162 | + mv include/* "C:/Program Files/node/include" |
| 163 | +
|
| 164 | + - name: Setup Haskell |
| 165 | + uses: haskell-actions/setup@v2 |
| 166 | + with: |
| 167 | + ghc-version: ${{ env.GHC_VERSION }} |
| 168 | + enable-stack: true |
| 169 | + stack-version: ${{ env.STACK_VERSION }} |
| 170 | + |
| 171 | + - uses: milliewalky/setup-7-zip@v1 |
| 172 | + |
| 173 | + - name: Install GCC |
| 174 | + run: | |
| 175 | + curl -L -O https://github.com/brechtsanders/winlibs_mingw/releases/download/14.2.0posix-19.1.1-12.0.0-msvcrt-r2/winlibs-x86_64-posix-seh-gcc-14.2.0-llvm-19.1.1-mingw-w64msvcrt-12.0.0-r2.7z |
| 176 | + 7z x winlibs-x86_64-posix-seh-gcc-14.2.0-llvm-19.1.1-mingw-w64msvcrt-12.0.0-r2.7z -oC:/gcc |
| 177 | + Add-Content -Path $env:GITHUB_PATH -Value "C:/gcc/mingw64/bin" |
| 178 | +
|
| 179 | + - name: Install LMDB |
| 180 | + run: stack exec -- pacman -S --noconfirm mingw-w64-x86_64-lmdb |
| 181 | + |
| 182 | + - name: Build and Sign Windows Node |
| 183 | + env: |
| 184 | + WINDOWS_PKCS11_CONFIG: ${{ steps.digicert_client.outputs.PKCS11_CONFIG }} |
| 185 | + WINDOWS_SM_KEYPAIR_ALIAS: ${{ secrets.WINDOWS_SM_KEYPAIR_ALIAS }} |
| 186 | + SM_HOST: ${{ vars.WINDOWS_SM_HOST }} |
| 187 | + SM_API_KEY: ${{ secrets.WINDOWS_SM_API_KEY }} |
| 188 | + SM_CLIENT_CERT_FILE: ${{ steps.windows_certificate.outputs.CERTIFICATE_PATH }} |
| 189 | + SM_CLIENT_CERT_PASSWORD: ${{ secrets.WINDOWS_SM_CLIENT_CERT_PASSWORD }} |
| 190 | + SM_ARGS: "--verbose --exit-non-zero-on-fail --failfast" |
| 191 | + run: | |
| 192 | + Write-Output "${{ secrets.WINDOWS_SM_KEYPAIR_ALIAS }}"" |
| 193 | + ./scripts/distribution/windows/build-all.ps1 -nodeVersion ${{ needs.validate-preconditions.outputs.version }} -rustVersion ${{ env.RUST_VERSION }} |
| 194 | + shell: cmd |
| 195 | + |
| 196 | + |
| 197 | + - name: Sign installer with smctl |
| 198 | + working-directory: ${{steps.build.outputs.bin_dir}} |
| 199 | + env: |
| 200 | + WINDOWS_PKCS11_CONFIG: ${{ steps.digicert_client.outputs.PKCS11_CONFIG }} |
| 201 | + WINDOWS_SM_KEYPAIR_ALIAS: ${{ secrets.WINDOWS_SM_KEYPAIR_ALIAS }} |
| 202 | + SM_HOST: ${{ vars.WINDOWS_SM_HOST }} |
| 203 | + SM_API_KEY: ${{ secrets.WINDOWS_SM_API_KEY }} |
| 204 | + SM_CLIENT_CERT_FILE: ${{ steps.windows_certificate.outputs.CERTIFICATE_PATH }} |
| 205 | + SM_CLIENT_CERT_PASSWORD: ${{ secrets.WINDOWS_SM_CLIENT_CERT_PASSWORD }} |
| 206 | + SM_ARGS: "--verbose --exit-non-zero-on-fail --failfast" |
| 207 | + run: | |
| 208 | + smctl sign --keypair-alias ${{ env.WINDOWS_SM_KEYPAIR_ALIAS }} --input ./service/windows/installer/Node.msi --config-file ${{ env.WINDOWS_PKCS11_CONFIG }} ${{ env.SM_ARGS }} |
| 209 | + shell: cmd |
| 210 | + |
| 211 | + - name: Rename the package to target filename. |
| 212 | + run: | |
| 213 | + cp ./service/windows/installer/Node.msi ./${{ env.ARTIFACT_NAME }} |
| 214 | +
|
| 215 | + - name: Upload artifact |
| 216 | + uses: actions/upload-artifact@v4 |
| 217 | + with: |
| 218 | + name: ${{ github.job }} |
| 219 | + path: ${{ env.ARTIFACT_NAME }} |
0 commit comments