Update to NixOS 24.11 - Vicuna π« #234
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: πͺ | |
on: | |
push: | |
tags: | |
- 'v*' | |
branches: | |
- main | |
paths: | |
- '.github/workflows/windows.yml' | |
- 'windows**' | |
- '**.go' | |
- 'go.*' | |
- '.goreleaser.yaml' | |
- 'config' | |
- '!**.md' | |
pull_request: | |
paths: | |
- '.github/workflows/windows.yml' | |
- 'windows**' | |
- '**.go' | |
- 'go.*' | |
- '.goreleaser.yaml' | |
- 'config' | |
- '!**.md' | |
workflow_dispatch: | |
permissions: | |
contents: write | |
pull-requests: write | |
checks: read # For private repositories | |
actions: read # For private repositories | |
defaults: | |
run: | |
# To respect exit code and make fail-fast behaviors. See GH-617 | |
# | |
# NOTE: `pwsh` specifier is defined in below | |
# - https://github.com/actions/runner/blob/6d7446a45ebc638a842895d5742d6cf9afa3b66d/src/Runner.Worker/Handlers/ScriptHandlerHelpers.cs#L16-L17 | |
# - https://github.com/actions/runner/blob/6d7446a45ebc638a842895d5742d6cf9afa3b66d/src/Runner.Worker/Handlers/ScriptHandlerHelpers.cs#L60-L65 | |
shell: | | |
pwsh -command "$PSNativeCommandUseErrorActionPreference = $true; $ErrorActionPreference = 'stop'; . '{0}'" | |
jobs: | |
inspect_runner: | |
runs-on: windows-2022 | |
steps: | |
- name: Print some variables which is applied in GH-617 | |
run: | | |
$PSVersionTable | |
$PSNativeCommandUseErrorActionPreference | |
$ErrorActionPreference | |
# This job has many comment-out style note, agree to ugly, but do NOT remove for now. | |
# See #443 for detail. | |
# | |
# Not Terraform :) | |
terraform: | |
runs-on: windows-2022 | |
steps: | |
- name: Prepare Windows Defender | |
# https://github.com/actions/runner-images/issues/855#issuecomment-626692949 may help to understand | |
run: | | |
& "C:\Program Files\Windows Defender\MpCmdRun.exe" -ListAllDynamicSignatures | |
# https://github.com/actions/runner-images/blob/61df9288f9be9f6aeaaaa4ad52a7332432913fc3/images/windows/scripts/build/Configure-WindowsDefender.ps1#L38-L44 | |
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection' -Name 'ForceDefenderPassiveMode' -Value '0' -Type 'DWORD' | |
Start-Service -DisplayName *Defend* -WhatIf | |
Start-Service -Name WinDefend | |
# Get-Item -Path "Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" | |
# Get-Item -Path "Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" | |
# I can't find any resource of this key in web also GitHub, but Copilot said... So testing in action runner may be interest :) | |
# Set-ItemProperty -Force -Path "Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" -Name JoinMicrosoftSpyNet -Value 1 | |
# Get-Item -Path "Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" | |
# Remove cache: https://news.mynavi.jp/article/win10tips-410/ | |
& "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -DynamicSignatures | |
# Enable cloud-based protection | |
Set-MpPreference -MAPSReporting Advanced | |
# Enable automatic sample submission | |
Set-MpPreference -SubmitSamplesConsent SendSafeSamples | |
# Restart-Service -Name WinDefend | |
Set-Service -Name wuauserv -StartupType Manual -Status Running | |
& "C:\Program Files\Windows Defender\MpCmdRun.exe" -SignatureUpdate | |
Update-MpSignature | |
# Restart-Service -Name WinDefend | |
& "C:\Program Files\Windows Defender\MpCmdRun.exe" -ListAllDynamicSignatures | |
# Disable to skip(=Enable). When I removed, `Scanning D:\a\dotfiles\dotfiles\distributed-artifact.zip was skipped.` logged | |
Remove-MpPreference -ExclusionPath (Get-MpPreference).ExclusionPath | |
- name: Make sure dynamic signatures are enabled ... or not | |
run: | | |
Get-MpComputerStatus | |
# Remove this to raise error if you REALIZED to enable Dynamic Signature scans | |
# if (!((& "C:\Program Files\Windows Defender\MpCmdRun.exe" -ListAllDynamicSignatures) | Select-String -Pattern "SignatureSet ID:")) { | |
# Exit 42 | |
# } | |
& "C:\Program Files\Windows Defender\MpCmdRun.exe" -ListAllDynamicSignatures | |
- uses: actions/checkout@v4 | |
with: | |
# KEEP fetch-depth for goreleaser | |
# https://github.com/goreleaser/goreleaser-action/blob/696b757ee8f3742e68b261173b9eeeb96306a57f/README.md?plain=1#L77 | |
fetch-depth: 0 | |
- name: Set up Go | |
uses: actions/setup-go@v5 | |
with: | |
go-version-file: 'go.mod' | |
cache-dependency-path: 'go.sum' | |
- name: Install goreleaser | |
uses: goreleaser/goreleaser-action@v6 | |
with: | |
install-only: true | |
version: 'v2.4.4' # selfup { "extract": "\\d[^']+", "replacer": ["bash", "-c", "goreleaser --version | grep 'GitVersion:'"], "nth": 2 } | |
- name: List files - before build | |
run: Get-ChildItem | |
- name: Build winit-* | |
run: goreleaser build --snapshot --clean | |
- name: List files - after build | |
run: | | |
Get-ChildItem | |
Get-ChildItem -Recurse .\dist | |
# https://github.com/goreleaser/goreleaser-action/tree/5fdedb94abba051217030cc86d4523cf3f02243d#upload-artifacts | |
- name: Upload artifact | |
id: upload-artifact | |
uses: actions/upload-artifact@v4 | |
with: | |
name: winit | |
path: dist/**/*.exe | |
- name: Download the artifact to make sure we can actually use it | |
env: | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
run: | | |
gh api -H "Accept: application/vnd.github+json" -H "X-GitHub-Api-Version: 2022-11-28" ` | |
repos/${{ github.repository }}/actions/artifacts/${{ steps.upload-artifact.outputs.artifact-id }}/zip > distributed-artifact.zip | |
- name: Check Windows Defender does not false positive detect the product | |
run: | | |
& "C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -Trace -File "$(pwd)\dist" | |
& "C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -Trace -File "$(pwd)\distributed-artifact.zip" | |
# Do not enable this as possible, too slow ... Scanning all folders with this option? :< | |
# Start-MpScan -ScanPath "$pwd" | |
Get-MpThreat | |
Get-MpThreatDetection | |
# Skipping because of bit slow... | |
# - name: Collect Defender log | |
# run: | | |
# New-Item -Force -ItemType "Directory" -Path MpCmdRun-logs | |
# & "C:\Program Files\Windows Defender\MpCmdRun.exe" -GetFiles -SupportLogLocation "$(pwd)\MpCmdRun-logs" | |
# | |
# Enable this section when you want to update logics and check it | |
# - name: Upload artifact | |
# id: upload-defender-log | |
# uses: actions/upload-artifact@v4 | |
# with: | |
# name: MpCmdRun-logs | |
# path: MpCmdRun-logs/** | |
# | |
# Do not write depending winget logcs for now | |
# - windows-2025 definitely enable it by default | |
# - windows-2022 may realize with the action: https://github.com/microsoft/winget-cli/issues/3872 | |
# - proposal: https://github.com/actions/runner-images/issues/910 | |
# - note: https://github.com/microsoft/winget-cli/blob/b07d2ebb7d865f95320e2bc708a2d1efb2152c5a/README.md#L14 | |
- name: Rebel against unacceptable default | |
run: | | |
.\dist\winit-reg_windows_amd64_v1\winit-reg.exe list | |
.\dist\winit-reg_windows_amd64_v1\winit-reg.exe run --all | |
# This logics can be finished even if tools are not installed | |
- name: Put config files around terminals | |
run: | | |
Write-Host "$PROFILE" | |
.\dist\winit-conf_windows_amd64_v1\winit-conf.exe run | |
Install-Module -Force -Name PSFzfHistory | |
.\dist\winit-conf_windows_amd64_v1\winit-conf.exe generate -path="config/powershell/Profile.ps1" > "$PROFILE" | |
- name: Make sure it correctly copied some config files | |
run: | | |
Test-Path "$PROFILE" | |
Get-Content "$PROFILE" | |
- name: Release the product | |
if: startsWith(github.ref, 'refs/tags/') | |
run: | | |
goreleaser release --clean |