From 9581af66a1a3a69313cd3f82a8a3595277577c0b Mon Sep 17 00:00:00 2001 From: Joseph Flinn Date: Thu, 31 Dec 2020 17:07:14 +0000 Subject: [PATCH] testing secret in process.env --- .az-pipelines/windows-build-sign.yml | 2 +- sign.js | 12 ++---------- 2 files changed, 3 insertions(+), 11 deletions(-) diff --git a/.az-pipelines/windows-build-sign.yml b/.az-pipelines/windows-build-sign.yml index 9694dd363e..f899ed2036 100644 --- a/.az-pipelines/windows-build-sign.yml +++ b/.az-pipelines/windows-build-sign.yml @@ -9,7 +9,7 @@ pool: vmImage: 'windows-latest' variables: -- group: code-signing-test +- group: build-sign-test steps: - task: NodeTool@0 diff --git a/sign.js b/sign.js index e43ba814c7..9c27c8a421 100644 --- a/sign.js +++ b/sign.js @@ -1,17 +1,9 @@ exports.default = async function(configuration) { //console.log(`config:\n${JSON.stringify(configuration, null, 4)}`) - console.log(`env test - vault URL: ${process.env.SigningVaultURL}`) + console.log(`env test - secret test ${process.env.secretTest}`) require("child_process").execSync( - `azuresigntool sign \ - -kvu ${process.env.SigningVaultURL} \ - -kvi ${process.env.SigningClientId} \ - -kvs ${process.env.SigningClientSecret} \ - -kvc ${process.env.SigningCertName} \ - -fd ${configuration.hash} - -du ${configuration.site} - -tr http://timestamp.digicert.com \ - ${configuration.path}`, + `azuresigntool sign -kvu ${process.env.SigningVaultURL} -kvi ${process.env.SigningClientId} -kvs ${process.env.SigningClientSecret} -kvc ${process.env.SigningCertName} -fd ${configuration.hash}-du ${configuration.site} -tr http://timestamp.digicert.com ${configuration.path}`, { stdio: "inherit" }