1use std::cell::RefCell;
  2
  3use gh_workflow::{Env, Expression};
  4
  5use crate::tasks::workflows::steps::NamedJob;
  6
  7macro_rules! secret {
  8    ($secret_name:ident) => {
  9        pub const $secret_name: &str = concat!("${{ secrets.", stringify!($secret_name), " }}");
 10    };
 11}
 12
 13macro_rules! var {
 14    ($secret_name:ident) => {
 15        pub const $secret_name: &str = concat!("${{ vars.", stringify!($secret_name), " }}");
 16    };
 17}
 18
 19secret!(APPLE_NOTARIZATION_ISSUER_ID);
 20secret!(APPLE_NOTARIZATION_KEY);
 21secret!(APPLE_NOTARIZATION_KEY_ID);
 22secret!(AZURE_SIGNING_CLIENT_ID);
 23secret!(AZURE_SIGNING_CLIENT_SECRET);
 24secret!(AZURE_SIGNING_TENANT_ID);
 25secret!(CACHIX_AUTH_TOKEN);
 26secret!(DIGITALOCEAN_SPACES_ACCESS_KEY);
 27secret!(DIGITALOCEAN_SPACES_SECRET_KEY);
 28secret!(GITHUB_TOKEN);
 29secret!(MACOS_CERTIFICATE);
 30secret!(MACOS_CERTIFICATE_PASSWORD);
 31secret!(SENTRY_AUTH_TOKEN);
 32secret!(ZED_CLIENT_CHECKSUM_SEED);
 33secret!(ZED_CLOUD_PROVIDER_ADDITIONAL_MODELS_JSON);
 34secret!(ZED_SENTRY_MINIDUMP_ENDPOINT);
 35
 36// todo(ci) make these secrets too...
 37var!(AZURE_SIGNING_ACCOUNT_NAME);
 38var!(AZURE_SIGNING_CERT_PROFILE_NAME);
 39var!(AZURE_SIGNING_ENDPOINT);
 40
 41pub const GITHUB_SHA: &str = "${{ github.event.pull_request.head.sha || github.sha }}";
 42
 43pub fn mac_bundle_envs() -> Env {
 44    Env::default()
 45        .add("MACOS_CERTIFICATE", MACOS_CERTIFICATE)
 46        .add("MACOS_CERTIFICATE_PASSWORD", MACOS_CERTIFICATE_PASSWORD)
 47        .add("APPLE_NOTARIZATION_KEY", APPLE_NOTARIZATION_KEY)
 48        .add("APPLE_NOTARIZATION_KEY_ID", APPLE_NOTARIZATION_KEY_ID)
 49        .add("APPLE_NOTARIZATION_ISSUER_ID", APPLE_NOTARIZATION_ISSUER_ID)
 50}
 51
 52pub fn windows_bundle_envs() -> Env {
 53    Env::default()
 54        .add("AZURE_TENANT_ID", AZURE_SIGNING_TENANT_ID)
 55        .add("AZURE_CLIENT_ID", AZURE_SIGNING_CLIENT_ID)
 56        .add("AZURE_CLIENT_SECRET", AZURE_SIGNING_CLIENT_SECRET)
 57        .add("ACCOUNT_NAME", AZURE_SIGNING_ACCOUNT_NAME)
 58        .add("CERT_PROFILE_NAME", AZURE_SIGNING_CERT_PROFILE_NAME)
 59        .add("ENDPOINT", AZURE_SIGNING_ENDPOINT)
 60        .add("FILE_DIGEST", "SHA256")
 61        .add("TIMESTAMP_DIGEST", "SHA256")
 62        .add("TIMESTAMP_SERVER", "http://timestamp.acs.microsoft.com")
 63}
 64
 65// Represents a pattern to check for changed files and corresponding output variable
 66pub(crate) struct PathCondition {
 67    pub name: &'static str,
 68    pub pattern: &'static str,
 69    pub invert: bool,
 70    pub set_by_step: RefCell<Option<String>>,
 71}
 72impl PathCondition {
 73    pub fn new(name: &'static str, pattern: &'static str) -> Self {
 74        Self {
 75            name,
 76            pattern,
 77            invert: false,
 78            set_by_step: Default::default(),
 79        }
 80    }
 81    pub fn inverted(name: &'static str, pattern: &'static str) -> Self {
 82        Self {
 83            name,
 84            pattern,
 85            invert: true,
 86            set_by_step: Default::default(),
 87        }
 88    }
 89    pub fn guard(&self, job: NamedJob) -> NamedJob {
 90        let set_by_step = self
 91            .set_by_step
 92            .borrow()
 93            .clone()
 94            .unwrap_or_else(|| panic!("condition {},is never set", self.name));
 95        NamedJob {
 96            name: job.name,
 97            job: job
 98                .job
 99                .add_needs(set_by_step.clone())
100                .cond(Expression::new(format!(
101                    "needs.{}.outputs.{} == 'true'",
102                    &set_by_step, self.name
103                ))),
104        }
105    }
106}