2020-10-24 09:08:40 +00:00
#!/bin/bash -xe
2020-10-17 15:05:10 +00:00
2021-04-04 18:24:22 +00:00
lipo \
-create \
build/bin/SolveSpace.app/Contents/Resources/libomp.dylib \
build-arm64/bin/SolveSpace.app/Contents/Resources/libomp.dylib \
-output \
build/bin/SolveSpace.app/Contents/Resources/libomp.dylib
2021-02-08 00:07:21 +00:00
lipo \
-create \
build/bin/SolveSpace.app/Contents/MacOS/SolveSpace \
build-arm64/bin/SolveSpace.app/Contents/MacOS/SolveSpace \
-output \
build/bin/SolveSpace.app/Contents/MacOS/SolveSpace
lipo \
-create \
build/bin/SolveSpace.app/Contents/MacOS/solvespace-cli \
build-arm64/bin/SolveSpace.app/Contents/MacOS/solvespace-cli \
-output \
build/bin/SolveSpace.app/Contents/MacOS/solvespace-cli
2020-10-17 15:05:10 +00:00
cd build
2021-04-04 17:15:00 +00:00
openmp = "bin/SolveSpace.app/Contents/Resources/libomp.dylib"
2020-10-19 09:24:37 +00:00
app = "bin/SolveSpace.app"
2020-10-17 15:05:10 +00:00
dmg = "bin/SolveSpace.dmg"
bundle_id = "com.solvespace.solvespace"
2020-10-20 07:39:26 +00:00
if [ " $CI " = "true" ] ; then
# get the signing certificate (this is the Developer ID:Application: Your Name, exported to a p12 file, then converted to base64, e.g.: cat ~/Desktop/certificate.p12 | base64 | pbcopy)
echo $MACOS_CERTIFICATE_P12 | base64 --decode > certificate.p12
2020-10-17 15:05:10 +00:00
2020-10-20 07:39:26 +00:00
# create a keychain
security create-keychain -p secret build.keychain
security default-keychain -s build.keychain
security unlock-keychain -p secret build.keychain
2020-10-17 15:05:10 +00:00
2020-10-20 07:39:26 +00:00
# import the key
2020-10-20 12:14:49 +00:00
security import certificate.p12 -k build.keychain -P " ${ MACOS_CERTIFICATE_PASSWORD } " -T /usr/bin/codesign
2020-10-17 15:05:10 +00:00
2020-10-20 07:39:26 +00:00
security set-key-partition-list -S apple-tool:,apple: -s -k secret build.keychain
2020-10-17 15:05:10 +00:00
2020-10-20 07:39:26 +00:00
# check if all is good
security find-identity -v
fi
2020-10-17 15:05:10 +00:00
2020-10-26 02:38:32 +00:00
# sign openmp
codesign -s " ${ MACOS_DEVELOPER_ID } " --timestamp --options runtime -f --deep " ${ openmp } "
2020-10-19 09:24:37 +00:00
# sign the .app
codesign -s " ${ MACOS_DEVELOPER_ID } " --timestamp --options runtime -f --deep " ${ app } "
# create the .dmg from the signed .app
hdiutil create -srcfolder " ${ app } " " ${ dmg } "
2020-10-17 15:05:10 +00:00
# sign the .dmg
2020-10-18 08:50:02 +00:00
codesign -s " ${ MACOS_DEVELOPER_ID } " --timestamp --options runtime -f --deep " ${ dmg } "
2020-10-17 15:05:10 +00:00
# notarize and store request uuid in variable
notarize_uuid = $( xcrun altool --notarize-app --primary-bundle-id " ${ bundle_id } " --username " ${ MACOS_APPSTORE_USERNAME } " --password " ${ MACOS_APPSTORE_APP_PASSWORD } " --file " ${ dmg } " 2>& 1 | grep RequestUUID | awk '{print $3' } )
2020-10-18 08:50:02 +00:00
echo $notarize_uuid
2020-10-17 15:05:10 +00:00
# wait a bit so we don't get errors during checking
2020-10-21 19:13:49 +00:00
sleep 10
2020-10-17 15:05:10 +00:00
success = 0
for ( ( ; ; ) )
do
echo "Checking progress..."
progress = $( xcrun altool --notarization-info " ${ notarize_uuid } " -u " ${ MACOS_APPSTORE_USERNAME } " -p " ${ MACOS_APPSTORE_APP_PASSWORD } " 2>& 1)
2020-10-25 20:00:40 +00:00
# echo "${progress}"
2021-06-24 14:47:49 +00:00
2020-10-17 15:05:10 +00:00
if [ $? -ne 0 ] || [ [ " ${ progress } " = ~ "Invalid" ] ] ; then
echo "Error with notarization. Exiting"
break
fi
2021-06-24 14:47:49 +00:00
2020-10-17 15:05:10 +00:00
if [ [ " ${ progress } " = ~ "success" ] ] ; then
success = 1
break
else
echo "Not completed yet. Sleeping for 10 seconds"
fi
sleep 10
done
# staple
2021-06-24 14:47:49 +00:00
xcrun stapler staple " ${ dmg } "