vars.rs

  1use std::cell::RefCell;
  2
  3use gh_workflow::{Concurrency, Env, Expression, Step, WorkflowDispatchInput};
  4
  5use crate::tasks::workflows::{runners::Platform, steps::NamedJob};
  6
  7macro_rules! secret {
  8    ($secret_name:ident) => {
  9        pub const $secret_name: &str = concat!("${{ secrets.", stringify!($secret_name), " }}");
 10    };
 11}
 12
 13macro_rules! var {
 14    ($secret_name:ident) => {
 15        pub const $secret_name: &str = concat!("${{ vars.", stringify!($secret_name), " }}");
 16    };
 17}
 18
 19secret!(ANTHROPIC_API_KEY);
 20secret!(APPLE_NOTARIZATION_ISSUER_ID);
 21secret!(APPLE_NOTARIZATION_KEY);
 22secret!(APPLE_NOTARIZATION_KEY_ID);
 23secret!(AZURE_SIGNING_CLIENT_ID);
 24secret!(AZURE_SIGNING_CLIENT_SECRET);
 25secret!(AZURE_SIGNING_TENANT_ID);
 26secret!(CACHIX_AUTH_TOKEN);
 27secret!(DIGITALOCEAN_SPACES_ACCESS_KEY);
 28secret!(DIGITALOCEAN_SPACES_SECRET_KEY);
 29secret!(GITHUB_TOKEN);
 30secret!(MACOS_CERTIFICATE);
 31secret!(MACOS_CERTIFICATE_PASSWORD);
 32secret!(SENTRY_AUTH_TOKEN);
 33secret!(ZED_CLIENT_CHECKSUM_SEED);
 34secret!(ZED_CLOUD_PROVIDER_ADDITIONAL_MODELS_JSON);
 35secret!(ZED_SENTRY_MINIDUMP_ENDPOINT);
 36secret!(SLACK_APP_ZED_UNIT_EVALS_BOT_TOKEN);
 37secret!(ZED_ZIPPY_APP_ID);
 38secret!(ZED_ZIPPY_APP_PRIVATE_KEY);
 39secret!(DISCORD_WEBHOOK_RELEASE_NOTES);
 40secret!(WINGET_TOKEN);
 41secret!(VERCEL_TOKEN);
 42secret!(SLACK_WEBHOOK_WORKFLOW_FAILURES);
 43
 44// todo(ci) make these secrets too...
 45var!(AZURE_SIGNING_ACCOUNT_NAME);
 46var!(AZURE_SIGNING_CERT_PROFILE_NAME);
 47var!(AZURE_SIGNING_ENDPOINT);
 48
 49pub fn bundle_envs(platform: Platform) -> Env {
 50    let env = Env::default()
 51        .add("CARGO_INCREMENTAL", 0)
 52        .add("ZED_CLIENT_CHECKSUM_SEED", ZED_CLIENT_CHECKSUM_SEED)
 53        .add("ZED_MINIDUMP_ENDPOINT", ZED_SENTRY_MINIDUMP_ENDPOINT);
 54
 55    match platform {
 56        Platform::Linux => env,
 57        Platform::Mac => env
 58            .add("MACOS_CERTIFICATE", MACOS_CERTIFICATE)
 59            .add("MACOS_CERTIFICATE_PASSWORD", MACOS_CERTIFICATE_PASSWORD)
 60            .add("APPLE_NOTARIZATION_KEY", APPLE_NOTARIZATION_KEY)
 61            .add("APPLE_NOTARIZATION_KEY_ID", APPLE_NOTARIZATION_KEY_ID)
 62            .add("APPLE_NOTARIZATION_ISSUER_ID", APPLE_NOTARIZATION_ISSUER_ID),
 63        Platform::Windows => env
 64            .add("AZURE_TENANT_ID", AZURE_SIGNING_TENANT_ID)
 65            .add("AZURE_CLIENT_ID", AZURE_SIGNING_CLIENT_ID)
 66            .add("AZURE_CLIENT_SECRET", AZURE_SIGNING_CLIENT_SECRET)
 67            .add("ACCOUNT_NAME", AZURE_SIGNING_ACCOUNT_NAME)
 68            .add("CERT_PROFILE_NAME", AZURE_SIGNING_CERT_PROFILE_NAME)
 69            .add("ENDPOINT", AZURE_SIGNING_ENDPOINT)
 70            .add("FILE_DIGEST", "SHA256")
 71            .add("TIMESTAMP_DIGEST", "SHA256")
 72            .add("TIMESTAMP_SERVER", "http://timestamp.acs.microsoft.com"),
 73    }
 74}
 75
 76pub(crate) fn one_workflow_per_non_main_branch() -> Concurrency {
 77    Concurrency::default()
 78        .group("${{ github.workflow }}-${{ github.ref_name }}-${{ github.ref_name == 'main' && github.sha || 'anysha' }}")
 79        .cancel_in_progress(true)
 80}
 81
 82// Represents a pattern to check for changed files and corresponding output variable
 83pub(crate) struct PathCondition {
 84    pub name: &'static str,
 85    pub pattern: &'static str,
 86    pub invert: bool,
 87    pub set_by_step: RefCell<Option<String>>,
 88}
 89impl PathCondition {
 90    pub fn new(name: &'static str, pattern: &'static str) -> Self {
 91        Self {
 92            name,
 93            pattern,
 94            invert: false,
 95            set_by_step: Default::default(),
 96        }
 97    }
 98    pub fn inverted(name: &'static str, pattern: &'static str) -> Self {
 99        Self {
100            name,
101            pattern,
102            invert: true,
103            set_by_step: Default::default(),
104        }
105    }
106    pub fn guard(&self, job: NamedJob) -> NamedJob {
107        let set_by_step = self
108            .set_by_step
109            .borrow()
110            .clone()
111            .unwrap_or_else(|| panic!("condition {},is never set", self.name));
112        NamedJob {
113            name: job.name,
114            job: job
115                .job
116                .add_need(set_by_step.clone())
117                .cond(Expression::new(format!(
118                    "needs.{}.outputs.{} == 'true'",
119                    &set_by_step, self.name
120                ))),
121        }
122    }
123}
124
125pub(crate) struct StepOutput {
126    name: &'static str,
127    step_id: String,
128}
129
130impl StepOutput {
131    pub fn new<T>(step: &Step<T>, name: &'static str) -> Self {
132        Self {
133            name,
134            step_id: step
135                .value
136                .id
137                .clone()
138                .expect("Steps that produce outputs must have an ID"),
139        }
140    }
141}
142
143impl serde::Serialize for StepOutput {
144    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
145    where
146        S: serde::Serializer,
147    {
148        serializer.serialize_str(&self.to_string())
149    }
150}
151
152impl std::fmt::Display for StepOutput {
153    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
154        write!(f, "${{{{ steps.{}.outputs.{} }}}}", self.step_id, self.name)
155    }
156}
157
158pub(crate) struct Input {
159    pub input_type: &'static str,
160    pub name: &'static str,
161    pub default: Option<String>,
162}
163
164impl Input {
165    pub fn string(name: &'static str, default: Option<String>) -> Self {
166        Self {
167            input_type: "string",
168            name,
169            default,
170        }
171    }
172
173    pub fn input(&self) -> WorkflowDispatchInput {
174        WorkflowDispatchInput {
175            description: self.name.to_owned(),
176            required: self.default.is_none(),
177            input_type: self.input_type.to_owned(),
178            default: self.default.clone(),
179        }
180    }
181}
182
183impl std::fmt::Display for Input {
184    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
185        write!(f, "${{{{ inputs.{} }}}}", self.name)
186    }
187}
188
189impl serde::Serialize for Input {
190    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
191    where
192        S: serde::Serializer,
193    {
194        serializer.serialize_str(&self.to_string())
195    }
196}
197
198pub mod assets {
199    // NOTE: these asset names also exist in the zed.dev codebase.
200    pub const MAC_AARCH64: &str = "Zed-aarch64.dmg";
201    pub const MAC_X86_64: &str = "Zed-x86_64.dmg";
202    pub const LINUX_AARCH64: &str = "zed-linux-aarch64.tar.gz";
203    pub const LINUX_X86_64: &str = "zed-linux-x86_64.tar.gz";
204    pub const WINDOWS_X86_64: &str = "Zed-x86_64.exe";
205    pub const WINDOWS_AARCH64: &str = "Zed-aarch64.exe";
206
207    pub const REMOTE_SERVER_MAC_AARCH64: &str = "zed-remote-server-macos-aarch64.gz";
208    pub const REMOTE_SERVER_MAC_X86_64: &str = "zed-remote-server-macos-x86_64.gz";
209    pub const REMOTE_SERVER_LINUX_AARCH64: &str = "zed-remote-server-linux-aarch64.gz";
210    pub const REMOTE_SERVER_LINUX_X86_64: &str = "zed-remote-server-linux-x86_64.gz";
211
212    pub fn all() -> Vec<&'static str> {
213        vec![
214            MAC_AARCH64,
215            MAC_X86_64,
216            LINUX_AARCH64,
217            LINUX_X86_64,
218            WINDOWS_X86_64,
219            WINDOWS_AARCH64,
220            REMOTE_SERVER_MAC_AARCH64,
221            REMOTE_SERVER_MAC_X86_64,
222            REMOTE_SERVER_LINUX_AARCH64,
223            REMOTE_SERVER_LINUX_X86_64,
224        ]
225    }
226}