cargo: bump aws-smithy-http from 0.49.0 to 0.56.1 #1199
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: CI Release | |
on: | |
push: | |
branches: | |
- main | |
tags: | |
- "v*.*.*" | |
pull_request: | |
jobs: | |
test: | |
name: Test | |
if: startsWith(github.ref, 'refs/tags/') | |
strategy: | |
matrix: | |
os: [ubuntu-18.04, macOS-latest, windows-2019] | |
runs-on: ${{ matrix.os }} | |
steps: | |
- name: Remove MSys64 MingW64 Binaries | |
if: runner.os == 'Windows' | |
# remove this because there is a bad libclang.dll that confuses bindgen | |
run: Remove-Item -LiteralPath "C:\msys64\mingw64\bin" -Force -Recurse | |
- name: Install Dependencies | |
if: runner.os == 'Windows' | |
run: choco install llvm -y | |
- name: Git Checkout | |
uses: actions/checkout@v2 | |
- name: Rust Toolchain | |
uses: actions-rs/toolchain@v1 | |
with: | |
profile: minimal | |
toolchain: stable | |
override: true | |
- name: Cargo Build | |
uses: actions-rs/cargo@v1 | |
with: | |
command: build | |
args: --verbose | |
- name: Cargo Test | |
uses: actions-rs/cargo@v1 | |
with: | |
command: test | |
args: --verbose | |
release: | |
name: Release | |
needs: [test] | |
if: startsWith(github.ref, 'refs/tags/') | |
strategy: | |
matrix: | |
include: | |
- os: ubuntu-18.04 | |
variant: linux | |
bin: qldb | |
- os: windows-2019 | |
variant: windows | |
bin: qldb.exe | |
- os: macos-latest | |
variant: mac | |
bin: qldb | |
runs-on: ${{ matrix.os }} | |
steps: | |
- uses: aws-actions/configure-aws-credentials@v1 | |
with: | |
role-skip-session-tagging: true | |
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
aws-region: us-west-2 | |
role-to-assume: ${{ secrets.AWS_ROLE_TO_ASSUME }} | |
role-external-id: ${{ secrets.AWS_ROLE_EXTERNAL_ID }} | |
role-duration-seconds: 1800 | |
- name: Remove MSys64 MingW64 Binaries | |
if: runner.os == 'Windows' | |
# remove this because there is a bad libclang.dll that confuses bindgen | |
run: Remove-Item -LiteralPath "C:\msys64\mingw64\bin" -Force -Recurse | |
- name: Install Dependencies | |
if: runner.os == 'Windows' | |
run: choco install llvm -y | |
- name: Install stable toolchain | |
uses: actions-rs/toolchain@v1 | |
with: | |
profile: minimal | |
toolchain: stable | |
override: true | |
- name: Install ubuntu tools | |
if: matrix.os == 'ubuntu-18.04' | |
run: | | |
sudo apt-get install -y musl-tools pkg-config libssl-dev | |
- name: Checkout | |
uses: actions/checkout@v2 | |
- name: Package | |
shell: bash | |
if: matrix.os == 'ubuntu-18.04' || matrix.os == 'macos-latest' | |
run: | | |
name=qldb | |
tag=$(git describe --tags --abbrev=0) | |
release_name="$name-$tag-${{ matrix.variant }}" | |
release_tar="${release_name}.tar.gz" | |
mkdir "$release_name" | |
cargo fetch && cargo build --release | |
if [ "${{ matrix.os }}" != "windows-2019" ]; then | |
strip "target/${{ matrix.target }}/release/${{ matrix.bin }}" | |
fi | |
cp "target/release/${{ matrix.bin }}" "$release_name/" | |
cp README.md LICENSE CHANGELOG.md "$release_name/" | |
tar czvf "$release_tar" "$release_name" | |
rm -r "$release_name" | |
echo -n "$(shasum -ba 256 "${release_tar}" | cut -d " " -f 1)" > "${release_tar}.sha256" | |
git tag -l -n --format="%(contents:subject)" $(git describe --tags --abbrev=0) > TAG-COMMENT.txt | |
- name: MSI | |
shell: powershell | |
if: matrix.os == 'windows-2019' | |
run: | | |
$name='qldb' | |
$tag=git describe --tags --abbrev=0 | |
$release_name="$name-$tag" | |
cargo fetch | |
cargo build --release | |
cd target/release | |
# Push unsigned EXE to S3 | |
$put_object_response=( aws s3api put-object --bucket ${{ secrets.AWS_UNSIGNED_BUCKET }} --key ${{ secrets.AWS_KEY_EXE }} --body ${{ matrix.bin }} --acl bucket-owner-full-control ) | ConvertFrom-Json | |
$version_id = $put_object_response.VersionId | |
$job_id = "" | |
$num_of_retries_to_get_job_id = 3 | |
# Attempt to get Job ID from bucket tagging, will retry up to 3 times before exiting with a failure code. | |
# Will sleep for 5 seconds between retries. | |
for (($i = 0); $i -lt $num_of_retries_to_get_job_id; $i++) | |
{ | |
$get_object_tagging_response=( aws s3api get-object-tagging --bucket ${{ secrets.AWS_UNSIGNED_BUCKET }} --key ${{ secrets.AWS_KEY_EXE }} --version-id $version_id ) | ConvertFrom-Json | |
$id = $get_object_tagging_response.TagSet[0].Value | |
if ($id) | |
{ | |
$job_id = $id | |
break | |
} | |
Start-Sleep -s 5 | |
} | |
if ($job_id -eq "") | |
{ | |
echo "Exiting because unable to retrieve job ID" | |
exit 1 | |
} | |
# Poll signed S3 bucket to see if the signed artifact is there | |
aws s3api wait object-exists --bucket ${{ secrets.AWS_SIGNED_BUCKET }} --key ${{ secrets.AWS_KEY_EXE }}-$job_id | |
# Get signed EXE from S3 | |
aws s3api get-object --bucket ${{ secrets.AWS_SIGNED_BUCKET }} --key ${{ secrets.AWS_KEY_EXE }}-$job_id ${{ matrix.bin }} | |
cd ../../ | |
# Install cargo-wix to compile main.wxs | |
cargo install cargo-wix | |
# Read the shell version from the cargo.toml file | |
$version = Get-Content .\Cargo.toml | Select-String -Pattern '^version\s*=\s*\"\d*\.\d*\.\d*' | |
# Convert $version to semantic version (removing characters at the end) | |
$semantic = 'semantic' + $version.Matches[0].Value + '"' | |
# Write the semantic version in the wix variable file | |
$content = '<?xml version="1.0" encoding="utf-8"?><Include><?define ' + $semantic + ' ?></Include>' | |
Set-Content -Path ./wixvariables.wxi $content | |
# Create MSI based on target/wix/main.wxs | |
cargo wix --nocapture | |
cd target/wix | |
mv amazon_qldb_shell*.msi ../../$release_name.msi | |
cd ../../ | |
$complete_file_name = $release_name + ".msi" | |
# Push unsigned MSI to S3 | |
$put_object_response=( aws s3api put-object --bucket ${{ secrets.AWS_UNSIGNED_BUCKET }} --key ${{ secrets.AWS_KEY }} --body $complete_file_name --acl bucket-owner-full-control ) | ConvertFrom-Json | |
$version_id = $put_object_response.VersionId | |
$job_id = "" | |
$num_of_retries_to_get_job_id = 3 | |
# Attempt to get Job ID from bucket tagging, will retry up to 3 times before exiting with a failure code. | |
# Will sleep for 5 seconds between retries. | |
for (($i = 0); $i -lt $num_of_retries_to_get_job_id; $i++) | |
{ | |
$get_object_tagging_response=( aws s3api get-object-tagging --bucket ${{ secrets.AWS_UNSIGNED_BUCKET }} --key ${{ secrets.AWS_KEY }} --version-id $version_id ) | ConvertFrom-Json | |
$id = $get_object_tagging_response.TagSet[0].Value | |
if ($id) | |
{ | |
$job_id = $id | |
break | |
} | |
Start-Sleep -s 5 | |
} | |
if ($job_id -eq "") | |
{ | |
echo "Exiting because unable to retrieve job ID" | |
exit 1 | |
} | |
# Poll signed S3 bucket to see if the signed artifact is there | |
aws s3api wait object-exists --bucket ${{ secrets.AWS_SIGNED_BUCKET }} --key ${{ secrets.AWS_KEY }}-$job_id | |
# Get signed MSI from S3 | |
aws s3api get-object --bucket ${{ secrets.AWS_SIGNED_BUCKET }} --key ${{ secrets.AWS_KEY }}-$job_id $complete_file_name | |
- name: Publish | |
uses: softprops/action-gh-release@v1 | |
with: | |
draft: true | |
prerelease: true | |
files: "qldb*" | |
body_path: TAG-COMMENT.txt | |
env: | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} |