@@ -271,8 +271,8 @@ extends:
271271 targetPath : ' $(Build.ArtifactStagingDirectory)/symbols'
272272 artifactName : ' ${{ dim.runtime }}_symbols'
273273 - output : pipelineArtifact
274- targetPath : ' $(Build.ArtifactStagingDirectory)/installers '
275- artifactName : ' ${{ dim.runtime }}_installers '
274+ targetPath : ' $(Build.ArtifactStagingDirectory)/installer '
275+ artifactName : ' ${{ dim.runtime }}_installer '
276276 steps :
277277 - checkout : self
278278 - task : UseDotNet@2
@@ -408,16 +408,16 @@ extends:
408408 --version="$(version)" \
409409 --runtime="${{ dim.runtime }}" \
410410 --package-path="$(Build.ArtifactStagingDirectory)/pkg" \
411- --output="$(Build.ArtifactStagingDirectory)/installers /gcm-${{ dim.runtime }}-$(version).pkg"
411+ --output="$(Build.ArtifactStagingDirectory)/installer /gcm-${{ dim.runtime }}-$(version).pkg"
412412 # ESRP code signing for macOS requires the files be packaged in a zip file first
413413 - task : Bash@3
414414 displayName : ' Prepare installer package for signing'
415415 inputs :
416416 targetType : inline
417417 script : |
418418 mkdir -p $(Build.ArtifactStagingDirectory)/tosign
419- cd $(Build.ArtifactStagingDirectory)/installers
420- zip -rX $(Build.ArtifactStagingDirectory)/tosign/installers .zip *.pkg
419+ cd $(Build.ArtifactStagingDirectory)/installer
420+ zip -rX $(Build.ArtifactStagingDirectory)/tosign/installer .zip *.pkg
421421 - task : EsrpCodeSigning@5
422422 condition : and(succeeded(), eq('${{ parameters.esrp }}', true))
423423 displayName : ' Sign installer package'
@@ -443,6 +443,13 @@ extends:
443443 "Parameters": {}
444444 }
445445 ]
446+ # Extract signed installer
447+ - task : Bash@3
448+ displayName : ' Extract signed installer package'
449+ inputs :
450+ targetType : inline
451+ script : |
452+ unzip -uo $(Build.ArtifactStagingDirectory)/tosign/installer.zip -d $(Build.ArtifactStagingDirectory)/installer
446453 - task : EsrpCodeSigning@5
447454 condition : and(succeeded(), eq('${{ parameters.esrp }}', true))
448455 displayName : ' Notarize installer package'
@@ -454,8 +461,8 @@ extends:
454461 authAkvName : ' $(esrpKeyVaultName)'
455462 authSignCertName : ' $(esrpSignReqCertName)'
456463 serviceEndpointUrl : ' $(esrpEndpointUrl)'
457- folderPath : ' $(Build.ArtifactStagingDirectory)/tosign '
458- pattern : ' installers.zip '
464+ folderPath : ' $(Build.ArtifactStagingDirectory)/installer '
465+ pattern : ' *.pkg '
459466 useMinimatch : true
460467 signConfigType : inlineSignParams
461468 inlineOperation : |
@@ -470,13 +477,6 @@ extends:
470477 }
471478 }
472479 ]
473- # Extract signed and notarized installer pkg files, overwriting the unsigned files, ready for upload
474- - task : Bash@3
475- displayName : ' Extract signed installer package'
476- inputs :
477- targetType : inline
478- script : |
479- unzip -uo $(Build.ArtifactStagingDirectory)/tosign/installers.zip -d $(Build.ArtifactStagingDirectory)/installers
480480
481481 #
482482 # Linux build jobs
0 commit comments