forked from osmocom/wireshark
GitLab CI: Print package sizes and hashes.
Print the sizes of our source, Windows, and macOS packages. Print the hash of our macOS package.
This commit is contained in:
parent
f51b018f87
commit
916dac3316
|
@ -203,6 +203,7 @@ Source Package:
|
|||
- build/packaging/source/git-export-release.sh -d .
|
||||
after_script:
|
||||
# - ccache --max-size $( du --summarize --block-size=1M "$CI_PROJECT_DIR/build" | awk '{printf ("%dM", $1 * 1.5)}' )
|
||||
- stat --format="%n %s bytes" wireshark-*.tar.*
|
||||
- for digest in sha256 rmd160 sha1 ; do openssl $digest wireshark-*.tar.* ; done
|
||||
# This will break if we produce multiple tarballs, which is arguably a good thing.
|
||||
- if [ -n "$AWS_ACCESS_KEY_ID" ] && [ -n "$AWS_SECRET_ACCESS_KEY" ] && [ -n "$S3_DESTINATION_DIST" ] ; then aws s3 cp wireshark-*.tar.* "$S3_DESTINATION_DIST/" ; fi
|
||||
|
@ -347,6 +348,7 @@ Win64 Package:
|
|||
- msbuild /verbosity:minimal pdb_zip_package.vcxproj
|
||||
- C:\gitlab-builds\bin\mse-scan.ps1
|
||||
- $packages = Get-ChildItem "packaging\nsis\Wireshark-win??-*.exe", "packaging\wix\Wireshark-win??-*.msi", "packaging\portableapps\WiresharkPortable??_*.paf.exe", "Wireshark-pdb-win??-*.zip"
|
||||
- foreach ($package in $packages) { Write-Host $package.name $package.length "bytes" }
|
||||
- foreach ($package in $packages) { certutil -hashfile $package SHA256 }
|
||||
- |
|
||||
if ((Test-Path env:AWS_ACCESS_KEY_ID) -and (Test-Path env:AWS_SECRET_ACCESS_KEY) -and (Test-Path env:S3_DESTINATION_WIN64)) {
|
||||
|
@ -394,6 +396,7 @@ Win32 Package:
|
|||
- msbuild /verbosity:minimal pdb_zip_package.vcxproj
|
||||
- C:\gitlab-builds\bin\mse-scan.ps1
|
||||
- $packages = Get-ChildItem "packaging\nsis\Wireshark-win??-*.exe", "packaging\wix\Wireshark-win??-*.msi", "packaging\portableapps\WiresharkPortable??_*.paf.exe", "Wireshark-pdb-win??-*.zip"
|
||||
- foreach ($package in $packages) { Write-Host $package.name $package.length "bytes" }
|
||||
- foreach ($package in $packages) { certutil -hashfile $package SHA256 }
|
||||
- |
|
||||
if ((Test-Path env:AWS_ACCESS_KEY_ID) -and (Test-Path env:AWS_SECRET_ACCESS_KEY) -and (Test-Path env:S3_DESTINATION_WIN32)) {
|
||||
|
@ -435,6 +438,8 @@ macOS Arm Package:
|
|||
- arch -arch arm64 ninja dmg_package
|
||||
- cd run
|
||||
- notarize-build
|
||||
- stat --format="%N %z bytes" Wireshark*Arm*.dmg
|
||||
- for digest in sha256 rmd160 sha1 ; do openssl $digest Wireshark*Arm*.dmg ; done
|
||||
- |
|
||||
if [ -n "$AWS_ACCESS_KEY_ID" ] && [ -n "$AWS_SECRET_ACCESS_KEY" ] && [ -n "$S3_DESTINATION_MACOS_ARM64" ] ; then
|
||||
aws s3 cp Wireshark*Arm*.dmg "$S3_DESTINATION_MACOS_ARM64/"
|
||||
|
|
Loading…
Reference in New Issue