sign packages
This commit is contained in:
		
							parent
							
								
									cb00a81b67
								
							
						
					
					
						commit
						b3641efeae
					
				|  | @ -25,4 +25,5 @@ README.html | ||||||
| /.metadata.make | /.metadata.make | ||||||
| bitly_token | bitly_token | ||||||
| github_deploy_key | github_deploy_key | ||||||
|  | gpg.signing.key | ||||||
| .secret-files.tar | .secret-files.tar | ||||||
|  |  | ||||||
										
											Binary file not shown.
										
									
								
							|  | @ -12,6 +12,8 @@ addons: | ||||||
|     - libgnome-keyring-dev |     - libgnome-keyring-dev | ||||||
|     - fakeroot |     - fakeroot | ||||||
|     - zip |     - zip | ||||||
|  |     - debsigs | ||||||
|  |     - gpg | ||||||
| go: | go: | ||||||
| - 1.12.x | - 1.12.x | ||||||
| services: | services: | ||||||
|  | @ -28,18 +30,19 @@ install: | ||||||
|   - rvm 2.0.0 do gem install --no-document fpm |   - rvm 2.0.0 do gem install --no-document fpm | ||||||
| before_script: | before_script: | ||||||
|   # Create your own deploy key, tar it, and encrypt the file to make this work. Optionally add a bitly_token file to the archive. |   # Create your own deploy key, tar it, and encrypt the file to make this work. Optionally add a bitly_token file to the archive. | ||||||
|   - openssl aes-256-cbc -K $encrypted_e3d3b4b2abab_key -iv $encrypted_e3d3b4b2abab_iv -in .secret-files.tar.enc -out .secret-files.tar -d |   - openssl aes-256-cbc -K $encrypted_9f3147001275_key -iv $encrypted_9f3147001275_iv -in .secret-files.tar.enc -out .secret-files.tar -d | ||||||
|   - tar -xf .secret-files.tar |   - tar -xf .secret-files.tar | ||||||
|   - source .metadata.sh |   - source .metadata.sh | ||||||
|   - make vendor |   - make vendor | ||||||
| script: | script: | ||||||
|  |   - gpg --import gpg.signing.key | ||||||
|   # Test Go and Docker. |   # Test Go and Docker. | ||||||
|   - make test |   - make test | ||||||
|   - make docker |   - make docker | ||||||
|   # Test built docker image. |   # Test built docker image. | ||||||
|   - docker run $BINARY -v 2>&1 | grep -Eq "^$BINARY v$VERSION" |   - docker run $BINARY -v 2>&1 | grep -Eq "^$BINARY v$VERSION" | ||||||
|   # Build everything |   # Build everything | ||||||
|   - rvm 2.0.0 do make release |   - rvm 2.0.0 do SIGNING_KEY=616A79D1ADA2F0FD6F5E2A9166AB29F0EC5718FF make release | ||||||
| after_success: | after_success: | ||||||
|   # Display Release Folder |   # Display Release Folder | ||||||
|   - ls -l release/ |   - ls -l release/ | ||||||
|  |  | ||||||
							
								
								
									
										9
									
								
								Makefile
								
								
								
								
							
							
						
						
									
										9
									
								
								Makefile
								
								
								
								
							|  | @ -57,6 +57,7 @@ release: clean macos windows linux_packages | ||||||
| 	# Generating File Hashes | 	# Generating File Hashes | ||||||
| 	openssl dgst -r -sha256 $@/* | sed 's#release/##' | tee $@/checksums.sha256.txt | 	openssl dgst -r -sha256 $@/* | sed 's#release/##' | tee $@/checksums.sha256.txt | ||||||
| 
 | 
 | ||||||
|  | 
 | ||||||
| # Delete all build assets.
 | # Delete all build assets.
 | ||||||
| clean: | clean: | ||||||
| 	# Cleaning up. | 	# Cleaning up. | ||||||
|  | @ -131,41 +132,49 @@ rpm: $(BINARY)-$(RPMVERSION)-$(ITERATION).x86_64.rpm | ||||||
| $(BINARY)-$(RPMVERSION)-$(ITERATION).x86_64.rpm: package_build_linux check_fpm | $(BINARY)-$(RPMVERSION)-$(ITERATION).x86_64.rpm: package_build_linux check_fpm | ||||||
| 	@echo "Building 'rpm' package for $(BINARY) version '$(RPMVERSION)-$(ITERATION)'." | 	@echo "Building 'rpm' package for $(BINARY) version '$(RPMVERSION)-$(ITERATION)'." | ||||||
| 	fpm -s dir -t rpm $(PACKAGE_ARGS) -a x86_64 -v $(RPMVERSION) -C $< | 	fpm -s dir -t rpm $(PACKAGE_ARGS) -a x86_64 -v $(RPMVERSION) -C $< | ||||||
|  | 	[ "$(SIGNING_KEY)" == "" ] || rpmsign --key-id=$(SIGNING_KEY) --addsign $(BINARY)-$(RPMVERSION)-$(ITERATION).x86_64.rpm | ||||||
| 
 | 
 | ||||||
| deb: $(BINARY)_$(VERSION)-$(ITERATION)_amd64.deb | deb: $(BINARY)_$(VERSION)-$(ITERATION)_amd64.deb | ||||||
| $(BINARY)_$(VERSION)-$(ITERATION)_amd64.deb: package_build_linux check_fpm | $(BINARY)_$(VERSION)-$(ITERATION)_amd64.deb: package_build_linux check_fpm | ||||||
| 	@echo "Building 'deb' package for $(BINARY) version '$(VERSION)-$(ITERATION)'." | 	@echo "Building 'deb' package for $(BINARY) version '$(VERSION)-$(ITERATION)'." | ||||||
| 	fpm -s dir -t deb $(PACKAGE_ARGS) -a amd64 -v $(VERSION) -C $< | 	fpm -s dir -t deb $(PACKAGE_ARGS) -a amd64 -v $(VERSION) -C $< | ||||||
|  | 	[ "$(SIGNING_KEY)" == "" ] || debsigs --default-key="$(SIGNING_KEY)" --sign=origin $(BINARY)_$(VERSION)-$(ITERATION)_amd64.deb | ||||||
| 
 | 
 | ||||||
| rpm386: $(BINARY)-$(RPMVERSION)-$(ITERATION).i386.rpm | rpm386: $(BINARY)-$(RPMVERSION)-$(ITERATION).i386.rpm | ||||||
| $(BINARY)-$(RPMVERSION)-$(ITERATION).i386.rpm: package_build_linux_386 check_fpm | $(BINARY)-$(RPMVERSION)-$(ITERATION).i386.rpm: package_build_linux_386 check_fpm | ||||||
| 	@echo "Building 32-bit 'rpm' package for $(BINARY) version '$(RPMVERSION)-$(ITERATION)'." | 	@echo "Building 32-bit 'rpm' package for $(BINARY) version '$(RPMVERSION)-$(ITERATION)'." | ||||||
| 	fpm -s dir -t rpm $(PACKAGE_ARGS) -a i386 -v $(RPMVERSION) -C $< | 	fpm -s dir -t rpm $(PACKAGE_ARGS) -a i386 -v $(RPMVERSION) -C $< | ||||||
|  | 	[ "$(SIGNING_KEY)" == "" ] || rpmsign --key-id=$(SIGNING_KEY) --addsign $(BINARY)-$(RPMVERSION)-$(ITERATION).i386.rpm | ||||||
| 
 | 
 | ||||||
| deb386: $(BINARY)_$(VERSION)-$(ITERATION)_i386.deb | deb386: $(BINARY)_$(VERSION)-$(ITERATION)_i386.deb | ||||||
| $(BINARY)_$(VERSION)-$(ITERATION)_i386.deb: package_build_linux_386 check_fpm | $(BINARY)_$(VERSION)-$(ITERATION)_i386.deb: package_build_linux_386 check_fpm | ||||||
| 	@echo "Building 32-bit 'deb' package for $(BINARY) version '$(VERSION)-$(ITERATION)'." | 	@echo "Building 32-bit 'deb' package for $(BINARY) version '$(VERSION)-$(ITERATION)'." | ||||||
| 	fpm -s dir -t deb $(PACKAGE_ARGS) -a i386 -v $(VERSION) -C $< | 	fpm -s dir -t deb $(PACKAGE_ARGS) -a i386 -v $(VERSION) -C $< | ||||||
|  | 	[ "$(SIGNING_KEY)" == "" ] || debsigs --default-key="$(SIGNING_KEY)" --sign=origin $(BINARY)_$(VERSION)-$(ITERATION)_i386.deb | ||||||
| 
 | 
 | ||||||
| rpmarm: $(BINARY)-$(RPMVERSION)-$(ITERATION).arm64.rpm | rpmarm: $(BINARY)-$(RPMVERSION)-$(ITERATION).arm64.rpm | ||||||
| $(BINARY)-$(RPMVERSION)-$(ITERATION).arm64.rpm: package_build_linux_arm64 check_fpm | $(BINARY)-$(RPMVERSION)-$(ITERATION).arm64.rpm: package_build_linux_arm64 check_fpm | ||||||
| 	@echo "Building 64-bit ARM8 'rpm' package for $(BINARY) version '$(RPMVERSION)-$(ITERATION)'." | 	@echo "Building 64-bit ARM8 'rpm' package for $(BINARY) version '$(RPMVERSION)-$(ITERATION)'." | ||||||
| 	fpm -s dir -t rpm $(PACKAGE_ARGS) -a arm64 -v $(RPMVERSION) -C $< | 	fpm -s dir -t rpm $(PACKAGE_ARGS) -a arm64 -v $(RPMVERSION) -C $< | ||||||
|  | 	[ "$(SIGNING_KEY)" == "" ] || rpmsign --key-id=$(SIGNING_KEY) --addsign $(BINARY)-$(RPMVERSION)-$(ITERATION).arm64.rpm | ||||||
| 
 | 
 | ||||||
| debarm: $(BINARY)_$(VERSION)-$(ITERATION)_arm64.deb | debarm: $(BINARY)_$(VERSION)-$(ITERATION)_arm64.deb | ||||||
| $(BINARY)_$(VERSION)-$(ITERATION)_arm64.deb: package_build_linux_arm64 check_fpm | $(BINARY)_$(VERSION)-$(ITERATION)_arm64.deb: package_build_linux_arm64 check_fpm | ||||||
| 	@echo "Building 64-bit ARM8 'deb' package for $(BINARY) version '$(VERSION)-$(ITERATION)'." | 	@echo "Building 64-bit ARM8 'deb' package for $(BINARY) version '$(VERSION)-$(ITERATION)'." | ||||||
| 	fpm -s dir -t deb $(PACKAGE_ARGS) -a arm64 -v $(VERSION) -C $< | 	fpm -s dir -t deb $(PACKAGE_ARGS) -a arm64 -v $(VERSION) -C $< | ||||||
|  | 	[ "$(SIGNING_KEY)" == "" ] || debsigs --default-key="$(SIGNING_KEY)" --sign=origin $(BINARY)_$(VERSION)-$(ITERATION)_arm64.deb | ||||||
| 
 | 
 | ||||||
| rpmarmhf: $(BINARY)-$(RPMVERSION)-$(ITERATION).armhf.rpm | rpmarmhf: $(BINARY)-$(RPMVERSION)-$(ITERATION).armhf.rpm | ||||||
| $(BINARY)-$(RPMVERSION)-$(ITERATION).armhf.rpm: package_build_linux_armhf check_fpm | $(BINARY)-$(RPMVERSION)-$(ITERATION).armhf.rpm: package_build_linux_armhf check_fpm | ||||||
| 	@echo "Building 32-bit ARM6/7 HF 'rpm' package for $(BINARY) version '$(RPMVERSION)-$(ITERATION)'." | 	@echo "Building 32-bit ARM6/7 HF 'rpm' package for $(BINARY) version '$(RPMVERSION)-$(ITERATION)'." | ||||||
| 	fpm -s dir -t rpm $(PACKAGE_ARGS) -a armhf -v $(RPMVERSION) -C $< | 	fpm -s dir -t rpm $(PACKAGE_ARGS) -a armhf -v $(RPMVERSION) -C $< | ||||||
|  | 	[ "$(SIGNING_KEY)" == "" ] || rpmsign --key-id=$(SIGNING_KEY) --addsign $(BINARY)-$(RPMVERSION)-$(ITERATION).armhf.rpm | ||||||
| 
 | 
 | ||||||
| debarmhf: $(BINARY)_$(VERSION)-$(ITERATION)_armhf.deb | debarmhf: $(BINARY)_$(VERSION)-$(ITERATION)_armhf.deb | ||||||
| $(BINARY)_$(VERSION)-$(ITERATION)_armhf.deb: package_build_linux_armhf check_fpm | $(BINARY)_$(VERSION)-$(ITERATION)_armhf.deb: package_build_linux_armhf check_fpm | ||||||
| 	@echo "Building 32-bit ARM6/7 HF 'deb' package for $(BINARY) version '$(VERSION)-$(ITERATION)'." | 	@echo "Building 32-bit ARM6/7 HF 'deb' package for $(BINARY) version '$(VERSION)-$(ITERATION)'." | ||||||
| 	fpm -s dir -t deb $(PACKAGE_ARGS) -a armhf -v $(VERSION) -C $< | 	fpm -s dir -t deb $(PACKAGE_ARGS) -a armhf -v $(VERSION) -C $< | ||||||
|  | 	[ "$(SIGNING_KEY)" == "" ] || debsigs --default-key="$(SIGNING_KEY)" --sign=origin $(BINARY)_$(VERSION)-$(ITERATION)_armhf.deb | ||||||
| 
 | 
 | ||||||
| # Build an environment that can be packaged for linux.
 | # Build an environment that can be packaged for linux.
 | ||||||
| package_build_linux: readme man linux | package_build_linux: readme man linux | ||||||
|  |  | ||||||
							
								
								
									
										15
									
								
								README.md
								
								
								
								
							
							
						
						
									
										15
									
								
								README.md
								
								
								
								
							|  | @ -109,6 +109,21 @@ You can drill down into specific sites, switches, and ports. Compare ports in di | ||||||
| sites side-by-side. So easy! This screenshot barely does it justice. | sites side-by-side. So easy! This screenshot barely does it justice. | ||||||
|  |  | ||||||
| 
 | 
 | ||||||
|  | ## Integrations | ||||||
|  | 
 | ||||||
|  | The following fine folks are providing their services, completely free! These service | ||||||
|  | integrations are used for things like storage, building, compiling, distribution and | ||||||
|  | documentation support. This project succeeds because of them. Thank you! | ||||||
|  | <p style="text-align: center;"> | ||||||
|  |   <a title="Packagecloud" alt="Packagecloud" href="https://Packagecloud.io"><img src="https://docs.golift.io/integrations/packagecloud.png"/></a> | ||||||
|  |   <a title="GitHub" alt="GitHub" href="https://GitHub.com"><img src="https://docs.golift.io/integrations/octocat.png"/></a> | ||||||
|  |   <a title="Docker Cloud" alt="Docker" href="https://cloud.docker.com"><img src="https://docs.golift.io/integrations/docker.png"/></a> | ||||||
|  |   <a title="Travis-CI" alt="Travis-CI" href="https://Travis-CI.com"><img src="https://docs.golift.io/integrations/travis-ci.png"/></a> | ||||||
|  |   <a title="Homebrew" alt="Homebrew" href="https://brew.sh"><img src="https://docs.golift.io/integrations/homebrew.png"/></a> | ||||||
|  |   <a title="Go Lift" alt="Go Lift" href="https://golift.io"><img src="https://docs.golift.io/integrations/golift.png"/></a> | ||||||
|  |   <a title="Grafana" alt="Grafana" href="https://grafana.com"><img src="https://docs.golift.io/integrations/grafana.png"/></a> | ||||||
|  | </p> | ||||||
|  | 
 | ||||||
| ## Copyright & License | ## Copyright & License | ||||||
| <img style="float: right;" align="right" width="200px" src="https://raw.githubusercontent.com/wiki/davidnewhall/unifi-poller/images/unifi-poller-logo.png"> | <img style="float: right;" align="right" width="200px" src="https://raw.githubusercontent.com/wiki/davidnewhall/unifi-poller/images/unifi-poller-logo.png"> | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue