@@ -223,26 +223,26 @@ jobs:
223
223
custom : tool
224
224
arguments : install --tool-path . sign --version 0.9.1-beta.23530.1
225
225
226
- - pwsh : |
227
- .\sign code azure-key-vault `
228
- "**/*.nupkg" `
229
- --base-directory "$(Build.ArtifactStagingDirectory)" `
230
- --file-list "$(Build.Repository.LocalPath)\config\filelist.txt" `
231
- --description "$(nugetPackageName)" `
232
- --description-url "https://github.com/$env:Build_Repository_Name" `
233
- --azure-key-vault-tenant-id "$(SignTenantId)" `
234
- --azure-key-vault-client-id "$(SignClientId)" `
235
- --azure-key-vault-client-secret "$(SignClientSecret)" `
236
- --azure-key-vault-certificate "$(SignKeyVaultCertificate)" `
237
- --azure-key-vault-url "$(SignKeyVaultUrl)" `
238
- --timestamp-url http://timestamp.digicert.com
239
- displayName : Sign packages
240
- continueOnError : true
241
- condition : >-
242
- and(
243
- succeeded(),
244
- eq(variables['System.PullRequest.PullRequestId'], '')
245
- )
226
+ - pwsh : |
227
+ .\sign code azure-key-vault `
228
+ "**/*.nupkg" `
229
+ --base-directory "$(Build.ArtifactStagingDirectory)" `
230
+ --file-list "$(Build.Repository.LocalPath)\config\filelist.txt" `
231
+ --description "$(nugetPackageName)" `
232
+ --description-url "https://github.com/$env:Build_Repository_Name" `
233
+ --azure-key-vault-tenant-id "$(SignTenantId)" `
234
+ --azure-key-vault-client-id "$(SignClientId)" `
235
+ --azure-key-vault-client-secret "$(SignClientSecret)" `
236
+ --azure-key-vault-certificate "$(SignKeyVaultCertificate)" `
237
+ --azure-key-vault-url "$(SignKeyVaultUrl)" `
238
+ --timestamp-url http://timestamp.digicert.com
239
+ displayName: Sign packages
240
+ continueOnError: true
241
+ condition: >-
242
+ and(
243
+ succeeded(),
244
+ eq(variables['System.PullRequest.PullRequestId'], '')
245
+ )
246
246
247
247
# publish artifacts (only possible if this is not a PR originated on a fork)
248
248
- task : PublishBuildArtifacts@1
0 commit comments