|
17 | 17 | env: |
18 | 18 | PGP_PASSPHRASE: ${{ secrets.PGP_PASSPHRASE }} |
19 | 19 | SONATYPE_PASSWORD: ${{ secrets.SONATYPE_PASSWORD }} |
| 20 | + SONATYPE_CREDENTIAL_HOST: ${{ secrets.SONATYPE_CREDENTIAL_HOST }} |
20 | 21 | SONATYPE_USERNAME: ${{ secrets.SONATYPE_USERNAME }} |
21 | 22 | PGP_SECRET: ${{ secrets.PGP_SECRET }} |
22 | 23 | GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} |
|
81 | 82 | if: matrix.java == 'temurin@8' |
82 | 83 | run: 'sbt ''project ${{ matrix.project }}'' ''++${{ matrix.scala }}'' ''set Global/scalaJSStage := ${{ matrix.sjsStage }}'' headerCheckAll scalafmtCheckAll ''project /'' scalafmtSbtCheck' |
83 | 84 |
|
84 | | - - name: fastOptJS |
| 85 | + - name: scalaJSLink |
85 | 86 | if: matrix.project == 'rootJS' |
86 | | - run: 'sbt ''project ${{ matrix.project }}'' ''++${{ matrix.scala }}'' ''set Global/scalaJSStage := ${{ matrix.sjsStage }}'' Test/fastOptJS' |
| 87 | + run: 'sbt ''project ${{ matrix.project }}'' ''++${{ matrix.scala }}'' ''set Global/scalaJSStage := ${{ matrix.sjsStage }}'' Test/scalaJSLinkerResult' |
87 | 88 |
|
88 | 89 | - name: Test |
89 | 90 | run: 'sbt ''project ${{ matrix.project }}'' ''++${{ matrix.scala }}'' ''set Global/scalaJSStage := ${{ matrix.sjsStage }}'' test' |
@@ -219,12 +220,12 @@ jobs: |
219 | 220 |
|
220 | 221 | - name: Import signing key |
221 | 222 | if: env.PGP_SECRET != '' && env.PGP_PASSPHRASE == '' |
222 | | - run: echo $PGP_SECRET | base64 -d | gpg --import |
| 223 | + run: echo $PGP_SECRET | base64 -di | gpg --import |
223 | 224 |
|
224 | 225 | - name: Import signing key and strip passphrase |
225 | 226 | if: env.PGP_SECRET != '' && env.PGP_PASSPHRASE != '' |
226 | 227 | run: | |
227 | | - echo "$PGP_SECRET" | base64 -d > /tmp/signing-key.gpg |
| 228 | + echo "$PGP_SECRET" | base64 -di > /tmp/signing-key.gpg |
228 | 229 | echo "$PGP_PASSPHRASE" | gpg --pinentry-mode loopback --passphrase-fd 0 --import /tmp/signing-key.gpg |
229 | 230 | (echo "$PGP_PASSPHRASE"; echo; echo) | gpg --command-fd 0 --pinentry-mode loopback --change-passphrase $(gpg --list-secret-keys --with-colons 2> /dev/null | grep '^sec:' | cut --delimiter ':' --fields 5 | tail -n 1) |
230 | 231 |
|
|
0 commit comments