@@ -178,11 +178,17 @@ jobs:
178178 vmImage : ' windows-latest'
179179
180180 variables :
181- DOTNET_NOLOGO : true
182- buildPlatform : ' x64'
183- buildConfiguration : ' Release'
184- solution : ' nanoFirmwareFlasher.sln'
185- run_update_dependents : $[dependencies.Check_Build_Options.outputs['BuildOptions.RUN_UPDATE_DEPENDENTS']]
181+ - group : sign-client-credentials
182+ - name : DOTNET_NOLOGO
183+ value : true
184+ - name : buildPlatform
185+ value : ' x64'
186+ - name : buildConfiguration
187+ value : ' Release'
188+ - name : solution
189+ value : ' nanoFirmwareFlasher.sln'
190+ - name : run_update_dependents
191+ value : $[dependencies.Check_Build_Options.outputs['BuildOptions.RUN_UPDATE_DEPENDENTS']]
186192
187193 steps :
188194
@@ -336,7 +342,7 @@ jobs:
336342 flattenFolders : true
337343
338344 - task : DotNetCoreCLI@2
339- displayName : Install SignTool tool
345+ displayName : Install Sign Client CLI
340346 condition : >-
341347 and(
342348 succeeded(),
@@ -346,19 +352,21 @@ jobs:
346352 inputs :
347353 command : custom
348354 custom : tool
349- arguments : install --tool-path . SignClient
355+ arguments : install --tool-path . sign --version 0.9.1-beta.23530.1
350356
351357 - pwsh : |
352- .\SignClient "Sign" `
353- --baseDirectory "$(Build.ArtifactStagingDirectory)" `
354- --input "**/*.nupkg" `
355- --config "$(Build.Repository.LocalPath)\config\SignClient.json" `
356- --filelist "$(Build.Repository.LocalPath)\config\filelist.txt" `
357- --user "$(SignClientUser)" `
358- --secret '$(SignClientSecret)' `
359- --name ".NET nanoFramework firmware flasher" `
358+ .\sign code azure-key-vault `
359+ "**/*.nupkg" `
360+ --base-directory "$(Build.ArtifactStagingDirectory)" `
361+ --file-list "$(Build.Repository.LocalPath)\config\filelist.txt" `
360362 --description ".NET nanoFramework firmware flasher" `
361- --descriptionUrl "https://github.com/$env:Build_Repository_Name"
363+ --description-url "https://github.com/$env:Build_Repository_Name" `
364+ --azure-key-vault-tenant-id "$(SignTenantId)" `
365+ --azure-key-vault-client-id "$(SignClientId)" `
366+ --azure-key-vault-client-secret "$(SignClientSecret)" `
367+ --azure-key-vault-certificate "$(SignKeyVaultCertificate)" `
368+ --azure-key-vault-url "$(SignKeyVaultUrl)" `
369+ --timestamp-url http://timestamp.digicert.com
362370 displayName: Sign packages
363371 continueOnError: true
364372 condition: >-
0 commit comments