@@ -67,6 +67,10 @@ steps:
6767 Include : ' '
6868 ExportCommand : SignCommand
6969 SigningCertificate : ${{ parameters.SigningCertificate }}
70+ # WiX is struggling with WIF authentication and sign.exe right now,
71+ # so we still rely on the client secret for legacy builds.
72+ # We disable the service connection here to skip the login steps.
73+ AzureServiceConnectionName : ' '
7074
7175 - powershell : |
7276 $cmd = $env:SignCommand -replace '"', '\"'
@@ -81,12 +85,12 @@ steps:
8185 displayName: 'Build launcher installer'
8286 env:
8387 Platform: x86
88+ # Only need the variable here for msi.props to detect
89+ SigningCertificate: ${{ parameters.SigningCertificate }}
8490 ${{ if parameters.SigningCertificate }}:
8591 AZURE_TENANT_ID: $(TrustedSigningTenantId)
8692 AZURE_CLIENT_ID: $(TrustedSigningClientId)
87- AZURE_CLIENT_SECRET: $(TrustedSigningSecret)
88- # Only need the variable here for msi.props to detect
89- SigningCertificate: ${{ parameters.SigningCertificate }}
93+ AZURE_CLIENT_SECRET: $(TrustedSigningClientSecret)
9094
9195 - ${{ each b in parameters.Bundles }} :
9296 - script : |
@@ -99,12 +103,12 @@ steps:
99103 PYTHONHOME: $(Build.SourcesDirectory)
100104 ${{ if b.TclTkArtifact }}:
101105 TclTkLibraryDir: $(Pipeline.Workspace)\${{ b.TclTkArtifact }}
106+ # Only need the variable here for msi.props to detect
107+ SigningCertificate: ${{ parameters.SigningCertificate }}
102108 ${{ if parameters.SigningCertificate }}:
103109 AZURE_TENANT_ID: $(TrustedSigningTenantId)
104110 AZURE_CLIENT_ID: $(TrustedSigningClientId)
105- AZURE_CLIENT_SECRET: $(TrustedSigningSecret)
106- # Only need the variable here for msi.props to detect
107- SigningCertificate: ${{ parameters.SigningCertificate }}
111+ AZURE_CLIENT_SECRET: $(TrustedSigningClientSecret)
108112
109113 - powershell : |
110114 del $env:ResponseFile -ErrorAction Continue
0 commit comments