diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 379e2b8d..475c4e51 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -621,7 +621,7 @@ jobs: tenant-id: ${{ secrets.AZUREKEYVAULTTENANTID }} subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} - name: Sign Windows x64 files - uses: azure/trusted-signing-action@v0.5.10 + uses: azure/trusted-signing-action@v0.5.11 with: endpoint: https://eus.codesigning.azure.net/ trusted-signing-account-name: juliahubwincertsaccount @@ -632,7 +632,7 @@ jobs: timestamp-rfc3161: http://timestamp.acs.microsoft.com timestamp-digest: SHA256 - name: Sign Windows x86 files - uses: azure/trusted-signing-action@v0.5.10 + uses: azure/trusted-signing-action@v0.5.11 with: endpoint: https://eus.codesigning.azure.net/ trusted-signing-account-name: juliahubwincertsaccount @@ -727,7 +727,7 @@ jobs: tenant-id: ${{ secrets.AZUREKEYVAULTTENANTID }} subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} - name: Sign Store binary files - uses: azure/trusted-signing-action@v0.5.10 + uses: azure/trusted-signing-action@v0.5.11 with: endpoint: https://eus.codesigning.azure.net/ trusted-signing-account-name: juliahubwincertsaccount @@ -739,7 +739,7 @@ jobs: timestamp-rfc3161: http://timestamp.acs.microsoft.com timestamp-digest: SHA256 - name: Sign Appinstaller binary files - uses: azure/trusted-signing-action@v0.5.10 + uses: azure/trusted-signing-action@v0.5.11 with: endpoint: https://eus.codesigning.azure.net/ trusted-signing-account-name: juliahubwincertsaccount @@ -755,7 +755,7 @@ jobs: - name: Build MSIX App Installer run: cargo msix --release --bundle-name winappinstallermsix --source-build-output-path ${{ format('{0}/target/winappinstaller', github.workspace) }} - name: Sign msix files - uses: azure/trusted-signing-action@v0.5.10 + uses: azure/trusted-signing-action@v0.5.11 with: endpoint: https://eus.codesigning.azure.net/ trusted-signing-account-name: juliahubwincertsaccount @@ -827,7 +827,7 @@ jobs: tenant-id: ${{ secrets.AZUREKEYVAULTTENANTID }} subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} - name: Sign x64 binary files - uses: azure/trusted-signing-action@v0.5.10 + uses: azure/trusted-signing-action@v0.5.11 with: endpoint: https://eus.codesigning.azure.net/ trusted-signing-account-name: juliahubwincertsaccount @@ -838,7 +838,7 @@ jobs: timestamp-rfc3161: http://timestamp.acs.microsoft.com timestamp-digest: SHA256 - name: Sign x86 binary files - uses: azure/trusted-signing-action@v0.5.10 + uses: azure/trusted-signing-action@v0.5.11 with: endpoint: https://eus.codesigning.azure.net/ trusted-signing-account-name: juliahubwincertsaccount @@ -853,7 +853,7 @@ jobs: wix build -ext WixToolset.UI.wixext .\deploy\msi\Julia.wxs -b .\target\msi\x86_64-pc-windows-gnu\release\ -arch x64 -o target\msi\Julia-v${{ env.VERSION }}-x64.msi -d ${{ env.VERSION }} wix build -ext WixToolset.UI.wixext .\deploy\msi\Julia.wxs -b .\target\msi\i686-pc-windows-gnu\release\ -arch x86 -o target\msi\Julia-v${{ env.VERSION }}-x86.msi -d ${{ env.VERSION }} - name: Sign MSI files - uses: azure/trusted-signing-action@v0.5.10 + uses: azure/trusted-signing-action@v0.5.11 with: endpoint: https://eus.codesigning.azure.net/ trusted-signing-account-name: juliahubwincertsaccount