Skip to content

Commit bc695aa

Browse files
chore(deps): update dependency prettier to v3.6.2 (#3519)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: Ayres Vitor <gitkey@virtuaires.com.br>
1 parent 2cf782e commit bc695aa

File tree

6 files changed

+5
-35
lines changed

6 files changed

+5
-35
lines changed

pnpm-lock.yaml

Lines changed: 5 additions & 5 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/content/docs/distribute/Sign/windows.mdx

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,7 @@ There are a few things we have to do to get Windows prepared for code signing. T
4747
<Steps>
4848

4949
1. #### Convert your `.cer` to `.pfx`
50-
5150
- You will need the following:
52-
5351
- certificate file (mine is `cert.cer`)
5452
- private key file (mine is `private-key.key`)
5553

@@ -60,15 +58,13 @@ There are a few things we have to do to get Windows prepared for code signing. T
6058
- You should be prompted to enter an export password **DON'T FORGET IT!**
6159

6260
2. #### Import your `.pfx` file into the keystore.
63-
6461
- We now need to import our `.pfx` file.
6562

6663
- Assign your export password to a variable using `$WINDOWS_PFX_PASSWORD = 'MYPASSWORD'`
6764

6865
- Now Import the certificate using `Import-PfxCertificate -FilePath certificate.pfx -CertStoreLocation Cert:\CurrentUser\My -Password (ConvertTo-SecureString -String $WINDOWS_PFX_PASSWORD -Force -AsPlainText)`
6966

7067
3. #### Prepare Variables
71-
7268
- Start ➡️ `certmgr.msc` to open Personal Certificate Management, then open Personal/Certificates.
7369

7470
- Find the certificate we just imported and double-click on it, then click on the Details tab.
@@ -129,7 +125,6 @@ The secrets we used are as follows
129125
#### Workflow Modifications
130126

131127
1. We need to add a step in the workflow to import the certificate into the Windows environment. This workflow accomplishes the following
132-
133128
1. Assign GitHub secrets to environment variables
134129
2. Create a new `certificate` directory
135130
3. Import `WINDOWS_CERTIFICATE` into tempCert.txt
@@ -307,21 +302,16 @@ You need to install [trusted-signing-cli](https://github.com/Levminer/trusted-si
307302
<Steps>
308303

309304
1. #### Install trusted-signing-cli
310-
311305
- `cargo install trusted-signing-cli`
312306

313307
2. #### Configure environment variables
314-
315308
- trusted-signing-cli needs the following environment variables to be set, don't forget to add these as Github Actions [secrets](https://docs.github.com/en/actions/security-for-github-actions/security-guides/using-secrets-in-github-actions):
316-
317309
- `AZURE_CLIENT_ID`: The client ID of your [App Registration](https://melatonin.dev/blog/code-signing-on-windows-with-azure-trusted-signing/#step-4-create-app-registration-user-credentials)
318310
- `AZURE_CLIENT_SECRET`: The client secret of [App Registration](https://melatonin.dev/blog/code-signing-on-windows-with-azure-trusted-signing/#step-4-create-app-registration-user-credentials)
319311
- `AZURE_TENANT_ID`: The tenant ID of your Azure directory, you can also get this from your [App Registration](https://melatonin.dev/blog/code-signing-on-windows-with-azure-trusted-signing/#step-4-create-app-registration-user-credentials)
320312

321313
3. ### Modify your `tauri.conf.json` file
322-
323314
- You can modify your `tauri.conf.json` or you can create a specific config file for Windows. Replace the URL and the certificate name with your own values.
324-
325315
- -e: The endpoint of your Azure Code Signing account
326316
- -a: The name of your Azure Code Signing Account
327317
- -c: The name of your Certificate profile inside your Azure Code Signing Account

src/content/docs/distribute/debian.mdx

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,12 +54,10 @@ Manual compilation is suitable when you don't need to compile your application f
5454
<Steps>
5555

5656
1. #### Install Rust targets for your desired architecture
57-
5857
- For ARMv7 (32-bit): `rustup target add armv7-unknown-linux-gnueabihf`
5958
- For ARMv8 (ARM64, 64-bit): `rustup target add aarch64-unknown-linux-gnu`
6059

6160
2. #### Install the corresponding linker for your chosen architecture
62-
6361
- For ARMv7: `sudo apt install gcc-arm-linux-gnueabihf`
6462
- For ARMv8 (ARM64): `sudo apt install gcc-aarch64-linux-gnu`
6563

@@ -74,7 +72,6 @@ Manual compilation is suitable when you don't need to compile your application f
7472
```
7573

7674
4. #### Enable the respective architecture in the package manager
77-
7875
- For ARMv7: `sudo dpkg --add-architecture armhf`
7976
- For ARMv8 (ARM64): `sudo dpkg --add-architecture arm64`
8077

@@ -159,14 +156,12 @@ Manual compilation is suitable when you don't need to compile your application f
159156
6. #### Update the package information: `sudo apt-get update && sudo apt-get upgrade -y`
160157

161158
7. #### Install the required webkitgtk library for your chosen architecture
162-
163159
- For ARMv7: `sudo apt install libwebkit2gtk-4.1-dev:armhf`
164160
- For ARMv8 (ARM64): `sudo apt install libwebkit2gtk-4.1-dev:arm64`
165161

166162
8. #### Install OpenSSL or use a vendored version
167163

168164
This is not always required so you may want to proceed first and check if you see errors like `Failed to find OpenSSL development headers`.
169-
170165
- Either install the development headers system-wide:
171166
- For ARMv7: `sudo apt install libssl-dev:armhf`
172167
- For ARMv8 (ARM64): `sudo apt install libssl-dev:arm64`
@@ -177,12 +172,10 @@ Manual compilation is suitable when you don't need to compile your application f
177172
```
178173

179174
9. #### Set the `PKG_CONFIG_SYSROOT_DIR` to the appropriate directory based on your chosen architecture
180-
181175
- For ARMv7: `export PKG_CONFIG_SYSROOT_DIR=/usr/arm-linux-gnueabihf/`
182176
- For ARMv8 (ARM64): `export PKG_CONFIG_SYSROOT_DIR=/usr/aarch64-linux-gnu/`
183177

184178
10. #### Build the app for your desired ARM version
185-
186179
- For ARMv7: cargo tauri build --target armv7-unknown-linux-gnueabihf
187180
- For ARMv8 (ARM64): cargo tauri build --target aarch64-unknown-linux-gnu
188181

src/content/docs/distribute/rpm.mdx

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -366,12 +366,10 @@ Manual compilation is suitable when you don't need to compile your application f
366366
<Steps>
367367

368368
1. #### Install Rust targets for your desired architecture
369-
370369
- For ARMv7 (32-bit): `rustup target add armv7-unknown-linux-gnueabihf`
371370
- For ARMv8 (ARM64, 64-bit): `rustup target add aarch64-unknown-linux-gnu`
372371

373372
2. #### Install the corresponding linker for your chosen architecture
374-
375373
- For ARMv7: `sudo apt install gcc-arm-linux-gnueabihf`
376374
- For ARMv8 (ARM64): `sudo apt install gcc-aarch64-linux-gnu`
377375

@@ -386,7 +384,6 @@ Manual compilation is suitable when you don't need to compile your application f
386384
```
387385

388386
4. #### Enable the respective architecture in the package manager
389-
390387
- For ARMv7: `sudo dpkg --add-architecture armhf`
391388
- For ARMv8 (ARM64): `sudo dpkg --add-architecture arm64`
392389

@@ -471,14 +468,12 @@ Manual compilation is suitable when you don't need to compile your application f
471468
6. #### Update the package information: `sudo apt-get update && sudo apt-get upgrade -y`
472469

473470
7. #### Install the required webkitgtk library for your chosen architecture
474-
475471
- For ARMv7: `sudo apt install libwebkit2gtk-4.1-dev:armhf`
476472
- For ARMv8 (ARM64): `sudo apt install libwebkit2gtk-4.1-dev:arm64`
477473

478474
8. #### Install OpenSSL or use a vendored version
479475

480476
This is not always required so you may want to proceed first and check if you see errors like `Failed to find OpenSSL development headers`.
481-
482477
- Either install the development headers system-wide:
483478
- For ARMv7: `sudo apt install libssl-dev:armhf`
484479
- For ARMv8 (ARM64): `sudo apt install libssl-dev:arm64`
@@ -489,12 +484,10 @@ Manual compilation is suitable when you don't need to compile your application f
489484
```
490485

491486
9. #### Set the `PKG_CONFIG_SYSROOT_DIR` to the appropriate directory based on your chosen architecture
492-
493487
- For ARMv7: `export PKG_CONFIG_SYSROOT_DIR=/usr/arm-linux-gnueabihf/`
494488
- For ARMv8 (ARM64): `export PKG_CONFIG_SYSROOT_DIR=/usr/aarch64-linux-gnu/`
495489

496490
10. #### Build the app for your desired ARM version
497-
498491
- For ARMv7: cargo tauri build --target armv7-unknown-linux-gnueabihf
499492
- For ARMv8 (ARM64): cargo tauri build --target aarch64-unknown-linux-gnu
500493

src/content/docs/zh-cn/distribute/Sign/android.mdx

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,6 @@ import { Steps } from '@astrojs/starlight/components';
6969
4. 在 Gradle 中配置签名
7070

7171
通过编辑 `[project]/src-tauri/gen/android/app/build.gradle.kts` 文件,配置 gradle 在发布模式下构建应用时使用您的上传密钥。
72-
7372
1. 在文件开头添加所需的导入。
7473

7574
```kotlin

src/content/docs/zh-cn/distribute/Sign/windows.mdx

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,7 @@ import { Steps } from '@astrojs/starlight/components';
4444
<Steps>
4545

4646
1. #### `.cer` 转换为 `.pfx`
47-
4847
- 你将需要以下内容:
49-
5048
- 证书文件 (我是 `cert.cer`)
5149
- 私钥文件 (我是 `private-key.key`)
5250

@@ -57,15 +55,13 @@ import { Steps } from '@astrojs/starlight/components';
5755
- 你应该被提示输入导出密码**别忘了!**
5856

5957
2. #### 将你的 `.pfx` 文件导入密钥库。
60-
6158
- 我们现在需要导入我们的 `.pfx` 文件。
6259

6360
- 使用 `$WINDOWS_PFX_PASSWORD = 'MYPASSWORD'` 将您的导出密码分配到一个变量
6461

6562
- 现在使用 `Import-PfxCertificate -FilePath certificate.pfx -CertStoreLocation Cert:\CurrentUser\My -Password (ConvertTo-SecureString -String $WINDOWS_PFX_PASSWORD -Force -AsPlainText)` 导入证书。
6663

6764
3. #### 准备变量
68-
6965
- 开始 ➡️ 打开 `certmgr.msc` 以打开个人证书管理,然后打开"个人/证书"。
7066

7167
- 找到刚导入的证书,双击它,然后点击 Details 选项卡。
@@ -126,7 +122,6 @@ info: "Done Adding Additional Store\r\nSuccessfully signed: APPLICATION FILE PAT
126122
#### 工作流的修改
127123

128124
1. 我们需要在工作流中添加一个步骤来将证书导入 Windows 环境。该工作流完成以下工作。
129-
130125
1. 将 GitHub 密钥分配给环境变量
131126
2. 创建一个新的 `certificate` 目录
132127
3.`WINDOWS_CERTIFICATE` 导入到 tempCert.txt 文件中

0 commit comments

Comments
 (0)