vars.rs

  1use std::cell::RefCell;
  2
  3use gh_workflow::{Concurrency, Env, Expression, Step, WorkflowDispatchInput};
  4
  5use crate::tasks::workflows::{runners::Platform, steps::NamedJob};
  6
  7macro_rules! secret {
  8    ($secret_name:ident) => {
  9        pub const $secret_name: &str = concat!("${{ secrets.", stringify!($secret_name), " }}");
 10    };
 11}
 12
 13macro_rules! var {
 14    ($secret_name:ident) => {
 15        pub const $secret_name: &str = concat!("${{ vars.", stringify!($secret_name), " }}");
 16    };
 17}
 18
 19secret!(ANTHROPIC_API_KEY);
 20secret!(OPENAI_API_KEY);
 21secret!(GOOGLE_AI_API_KEY);
 22secret!(GOOGLE_CLOUD_PROJECT);
 23secret!(APPLE_NOTARIZATION_ISSUER_ID);
 24secret!(APPLE_NOTARIZATION_KEY);
 25secret!(APPLE_NOTARIZATION_KEY_ID);
 26secret!(AZURE_SIGNING_CLIENT_ID);
 27secret!(AZURE_SIGNING_CLIENT_SECRET);
 28secret!(AZURE_SIGNING_TENANT_ID);
 29secret!(CACHIX_AUTH_TOKEN);
 30secret!(DIGITALOCEAN_SPACES_ACCESS_KEY);
 31secret!(DIGITALOCEAN_SPACES_SECRET_KEY);
 32secret!(GITHUB_TOKEN);
 33secret!(MACOS_CERTIFICATE);
 34secret!(MACOS_CERTIFICATE_PASSWORD);
 35secret!(SENTRY_AUTH_TOKEN);
 36secret!(ZED_CLIENT_CHECKSUM_SEED);
 37secret!(ZED_CLOUD_PROVIDER_ADDITIONAL_MODELS_JSON);
 38secret!(ZED_SENTRY_MINIDUMP_ENDPOINT);
 39secret!(SLACK_APP_ZED_UNIT_EVALS_BOT_TOKEN);
 40secret!(ZED_ZIPPY_APP_ID);
 41secret!(ZED_ZIPPY_APP_PRIVATE_KEY);
 42secret!(DISCORD_WEBHOOK_RELEASE_NOTES);
 43secret!(WINGET_TOKEN);
 44secret!(VERCEL_TOKEN);
 45secret!(SLACK_WEBHOOK_WORKFLOW_FAILURES);
 46
 47// todo(ci) make these secrets too...
 48var!(AZURE_SIGNING_ACCOUNT_NAME);
 49var!(AZURE_SIGNING_CERT_PROFILE_NAME);
 50var!(AZURE_SIGNING_ENDPOINT);
 51
 52pub fn bundle_envs(platform: Platform) -> Env {
 53    let env = Env::default()
 54        .add("CARGO_INCREMENTAL", 0)
 55        .add("ZED_CLIENT_CHECKSUM_SEED", ZED_CLIENT_CHECKSUM_SEED)
 56        .add("ZED_MINIDUMP_ENDPOINT", ZED_SENTRY_MINIDUMP_ENDPOINT);
 57
 58    match platform {
 59        Platform::Linux => env,
 60        Platform::Mac => env
 61            .add("MACOS_CERTIFICATE", MACOS_CERTIFICATE)
 62            .add("MACOS_CERTIFICATE_PASSWORD", MACOS_CERTIFICATE_PASSWORD)
 63            .add("APPLE_NOTARIZATION_KEY", APPLE_NOTARIZATION_KEY)
 64            .add("APPLE_NOTARIZATION_KEY_ID", APPLE_NOTARIZATION_KEY_ID)
 65            .add("APPLE_NOTARIZATION_ISSUER_ID", APPLE_NOTARIZATION_ISSUER_ID),
 66        Platform::Windows => env
 67            .add("AZURE_TENANT_ID", AZURE_SIGNING_TENANT_ID)
 68            .add("AZURE_CLIENT_ID", AZURE_SIGNING_CLIENT_ID)
 69            .add("AZURE_CLIENT_SECRET", AZURE_SIGNING_CLIENT_SECRET)
 70            .add("ACCOUNT_NAME", AZURE_SIGNING_ACCOUNT_NAME)
 71            .add("CERT_PROFILE_NAME", AZURE_SIGNING_CERT_PROFILE_NAME)
 72            .add("ENDPOINT", AZURE_SIGNING_ENDPOINT)
 73            .add("FILE_DIGEST", "SHA256")
 74            .add("TIMESTAMP_DIGEST", "SHA256")
 75            .add("TIMESTAMP_SERVER", "http://timestamp.acs.microsoft.com"),
 76    }
 77}
 78
 79pub(crate) fn one_workflow_per_non_main_branch() -> Concurrency {
 80    Concurrency::default()
 81        .group("${{ github.workflow }}-${{ github.ref_name }}-${{ github.ref_name == 'main' && github.sha || 'anysha' }}")
 82        .cancel_in_progress(true)
 83}
 84
 85// Represents a pattern to check for changed files and corresponding output variable
 86pub(crate) struct PathCondition {
 87    pub name: &'static str,
 88    pub pattern: &'static str,
 89    pub invert: bool,
 90    pub set_by_step: RefCell<Option<String>>,
 91}
 92impl PathCondition {
 93    pub fn new(name: &'static str, pattern: &'static str) -> Self {
 94        Self {
 95            name,
 96            pattern,
 97            invert: false,
 98            set_by_step: Default::default(),
 99        }
100    }
101    pub fn inverted(name: &'static str, pattern: &'static str) -> Self {
102        Self {
103            name,
104            pattern,
105            invert: true,
106            set_by_step: Default::default(),
107        }
108    }
109    pub fn guard(&self, job: NamedJob) -> NamedJob {
110        let set_by_step = self
111            .set_by_step
112            .borrow()
113            .clone()
114            .unwrap_or_else(|| panic!("condition {},is never set", self.name));
115        NamedJob {
116            name: job.name,
117            job: job
118                .job
119                .add_need(set_by_step.clone())
120                .cond(Expression::new(format!(
121                    "needs.{}.outputs.{} == 'true'",
122                    &set_by_step, self.name
123                ))),
124        }
125    }
126}
127
128pub(crate) struct StepOutput {
129    name: &'static str,
130    step_id: String,
131}
132
133impl StepOutput {
134    pub fn new<T>(step: &Step<T>, name: &'static str) -> Self {
135        Self {
136            name,
137            step_id: step
138                .value
139                .id
140                .clone()
141                .expect("Steps that produce outputs must have an ID"),
142        }
143    }
144}
145
146impl serde::Serialize for StepOutput {
147    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
148    where
149        S: serde::Serializer,
150    {
151        serializer.serialize_str(&self.to_string())
152    }
153}
154
155impl std::fmt::Display for StepOutput {
156    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
157        write!(f, "${{{{ steps.{}.outputs.{} }}}}", self.step_id, self.name)
158    }
159}
160
161pub(crate) struct Input {
162    pub input_type: &'static str,
163    pub name: &'static str,
164    pub default: Option<String>,
165}
166
167impl Input {
168    pub fn string(name: &'static str, default: Option<String>) -> Self {
169        Self {
170            input_type: "string",
171            name,
172            default,
173        }
174    }
175
176    pub fn input(&self) -> WorkflowDispatchInput {
177        WorkflowDispatchInput {
178            description: self.name.to_owned(),
179            required: self.default.is_none(),
180            input_type: self.input_type.to_owned(),
181            default: self.default.clone(),
182        }
183    }
184}
185
186impl std::fmt::Display for Input {
187    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
188        write!(f, "${{{{ inputs.{} }}}}", self.name)
189    }
190}
191
192impl serde::Serialize for Input {
193    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
194    where
195        S: serde::Serializer,
196    {
197        serializer.serialize_str(&self.to_string())
198    }
199}
200
201pub mod assets {
202    // NOTE: these asset names also exist in the zed.dev codebase.
203    pub const MAC_AARCH64: &str = "Zed-aarch64.dmg";
204    pub const MAC_X86_64: &str = "Zed-x86_64.dmg";
205    pub const LINUX_AARCH64: &str = "zed-linux-aarch64.tar.gz";
206    pub const LINUX_X86_64: &str = "zed-linux-x86_64.tar.gz";
207    pub const WINDOWS_X86_64: &str = "Zed-x86_64.exe";
208    pub const WINDOWS_AARCH64: &str = "Zed-aarch64.exe";
209
210    pub const REMOTE_SERVER_MAC_AARCH64: &str = "zed-remote-server-macos-aarch64.gz";
211    pub const REMOTE_SERVER_MAC_X86_64: &str = "zed-remote-server-macos-x86_64.gz";
212    pub const REMOTE_SERVER_LINUX_AARCH64: &str = "zed-remote-server-linux-aarch64.gz";
213    pub const REMOTE_SERVER_LINUX_X86_64: &str = "zed-remote-server-linux-x86_64.gz";
214
215    pub fn all() -> Vec<&'static str> {
216        vec![
217            MAC_AARCH64,
218            MAC_X86_64,
219            LINUX_AARCH64,
220            LINUX_X86_64,
221            WINDOWS_X86_64,
222            WINDOWS_AARCH64,
223            REMOTE_SERVER_MAC_AARCH64,
224            REMOTE_SERVER_MAC_X86_64,
225            REMOTE_SERVER_LINUX_AARCH64,
226            REMOTE_SERVER_LINUX_X86_64,
227        ]
228    }
229}