Fix ./script/bundle to allow passing key

This commit is contained in:
Conrad Irwin 2023-10-09 08:59:25 -06:00
parent 34b7537948
commit 5dbda70235
5 changed files with 8 additions and 13 deletions

View file

@ -799,7 +799,6 @@ impl Client {
}
}
status = status_rx.next().fuse() => {
dbg!(status);
return Err(anyhow!("authentication canceled"));
}
}

View file

@ -1014,7 +1014,6 @@ extern "C" fn open_urls(this: &mut Object, _: Sel, _: id, urls: id) {
}
extern "C" fn continue_user_activity(this: &mut Object, _: Sel, _: id, user_activity: id, _: id) {
dbg!("yay!");
let url = unsafe {
let url: id = msg_send!(user_activity, webpageURL);
if url == nil {
@ -1028,7 +1027,6 @@ extern "C" fn continue_user_activity(this: &mut Object, _: Sel, _: id, user_acti
)
}
};
dbg!(&url);
let platform = unsafe { get_foreground_platform(this) };
if let Some(callback) = platform.0.borrow_mut().open_urls.as_mut() {
callback(url.into_iter().collect());

View file

@ -4162,7 +4162,6 @@ async fn join_channel_internal(
active_call: &ModelHandle<ActiveCall>,
cx: &mut AsyncAppContext,
) -> Result<bool> {
dbg!("join channel internal");
let should_prompt = active_call.read_with(cx, |active_call, cx| {
let Some(room) = active_call.room().map(|room| room.read(cx)) else {
return false;
@ -4195,7 +4194,6 @@ async fn join_channel_internal(
return Ok(false); // unreachable!() hopefully
}
}
dbg!("asdajdkjkasd");
let client = cx.read(|cx| active_call.read(cx).client());
@ -4221,8 +4219,6 @@ async fn join_channel_internal(
}
}
dbg!("past here");
let room = active_call
.update(cx, |active_call, cx| {
active_call.join_channel(channel_id, cx)
@ -4231,8 +4227,6 @@ async fn join_channel_internal(
room.update(cx, |room, _| room.next_room_update()).await;
dbg!("wow");
let task = room.update(cx, |room, cx| {
if let Some((project, host)) = room.most_active_project() {
return Some(join_remote_project(project, host, app_state.clone(), cx));
@ -4273,7 +4267,6 @@ pub fn join_channel(
&mut cx,
)
.await;
dbg!("joined!");
// join channel succeeded, and opened a window
if matches!(result, Ok(true)) {

View file

@ -279,7 +279,6 @@ fn main() {
}
OpenRequest::JoinChannel { channel_id } => cx
.update(|cx| {
dbg!("joining channel");
workspace::join_channel(channel_id, app_state.clone(), None, cx)
})
.detach(),

View file

@ -128,7 +128,11 @@ fi
echo "Copying WebRTC.framework into the frameworks folder"
mkdir "${app_path}/Contents/Frameworks"
cp -R target/${local_target_triple}/${target_dir}/WebRTC.framework "${app_path}/Contents/Frameworks/"
if [ "$local_arch" = false ]; then
cp -R target/${local_target_triple}/${target_dir}/WebRTC.framework "${app_path}/Contents/Frameworks/"
else
cp -R target/${target_dir}/WebRTC.framework "${app_path}/Contents/Frameworks/"
fi
if [[ -n $MACOS_CERTIFICATE && -n $MACOS_CERTIFICATE_PASSWORD && -n $APPLE_NOTARIZATION_USERNAME && -n $APPLE_NOTARIZATION_PASSWORD ]]; then
echo "Signing bundle with Apple-issued certificate"
@ -144,7 +148,9 @@ if [[ -n $MACOS_CERTIFICATE && -n $MACOS_CERTIFICATE_PASSWORD && -n $APPLE_NOTAR
else
echo "One or more of the following variables are missing: MACOS_CERTIFICATE, MACOS_CERTIFICATE_PASSWORD, APPLE_NOTARIZATION_USERNAME, APPLE_NOTARIZATION_PASSWORD"
echo "Performing an ad-hoc signature, but this bundle should not be distributed"
codesign --force --deep --entitlements crates/zed/resources/zed.entitlements --sign - "${app_path}" -v
echo "If you see 'The application cannot be opened for an unexpected reason,' you likely don't have the necessary entitlements to run the application in your signing keychain"
echo "You will need to download a new signing key from developer.apple.com, add it to keychain, and export MACOS_SIGNING_KEY=<email address of signing key>"
codesign --force --deep --entitlements crates/zed/resources/zed.entitlements --sign ${MACOS_SIGNING_KEY:- -} "${app_path}" -v
fi
if [[ "$target_dir" = "debug" && "$local_only" = false ]]; then