@@ -223,26 +223,26 @@ jobs:
223223 custom : tool
224224 arguments : install --tool-path . sign --version 0.9.1-beta.23530.1
225225
226- - pwsh : |
227- .\sign code azure-key-vault `
228- "**/*.nupkg" `
229- --base-directory "$(Build.ArtifactStagingDirectory)" `
230- --file-list "$(Build.Repository.LocalPath)\config\filelist.txt" `
231- --description "$(nugetPackageName)" `
232- --description-url "https://github.com/$env:Build_Repository_Name" `
233- --azure-key-vault-tenant-id "$(SignTenantId)" `
234- --azure-key-vault-client-id "$(SignClientId)" `
235- --azure-key-vault-client-secret "$(SignClientSecret)" `
236- --azure-key-vault-certificate "$(SignKeyVaultCertificate)" `
237- --azure-key-vault-url "$(SignKeyVaultUrl)" `
238- --timestamp-url http://timestamp.digicert.com
239- displayName : Sign packages
240- continueOnError : true
241- condition : >-
242- and(
243- succeeded(),
244- eq(variables['System.PullRequest.PullRequestId'], '')
245- )
226+ - pwsh : |
227+ .\sign code azure-key-vault `
228+ "**/*.nupkg" `
229+ --base-directory "$(Build.ArtifactStagingDirectory)" `
230+ --file-list "$(Build.Repository.LocalPath)\config\filelist.txt" `
231+ --description "$(nugetPackageName)" `
232+ --description-url "https://github.com/$env:Build_Repository_Name" `
233+ --azure-key-vault-tenant-id "$(SignTenantId)" `
234+ --azure-key-vault-client-id "$(SignClientId)" `
235+ --azure-key-vault-client-secret "$(SignClientSecret)" `
236+ --azure-key-vault-certificate "$(SignKeyVaultCertificate)" `
237+ --azure-key-vault-url "$(SignKeyVaultUrl)" `
238+ --timestamp-url http://timestamp.digicert.com
239+ displayName: Sign packages
240+ continueOnError: true
241+ condition: >-
242+ and(
243+ succeeded(),
244+ eq(variables['System.PullRequest.PullRequestId'], '')
245+ )
246246
247247 # publish artifacts (only possible if this is not a PR originated on a fork)
248248 - task : PublishBuildArtifacts@1
0 commit comments