From 233c397ae69f979c505c6cf3f7ceb0a8ca5c7bc4 Mon Sep 17 00:00:00 2001 From: XAVIERMP <110884154+XavierMP14@users.noreply.github.com> Date: Tue, 26 Aug 2025 23:58:53 -0600 Subject: [PATCH] Create dotnet-desktop.yml xNotes xavier_2go@hotmail.com xavier_2go@hotmail.com xavier_2go@hotmail.com xavier.martinez.pastrana_outlook.com#ext#@xavierm Xavier Martinez xavier.martinez.pastrana_outlook.com#EXT#@xaviermartinezpastranaoutlo.onmicrosoft.com Conectado Error Code: 500121 Request Id: be09992d-a0e9-47d1-8a9c-2e960ee01500 Correlation Id: 45f0c5c5-79f6-4251-add7-7b153afc150d Timestamp: 2025-08-27T05:24:40Z Error Code: 500121 Request Id: be09992d-a0e9-47d1-8a9c-2e960ee01500 Correlation Id: 45f0c5c5-79f6-4251-add7-7b153afc150d Timestamp: 2025-08-27T05:24:40Z czz Request Id: 54a4be72-e569-47c0-ac16-c526d7ed1a00 Correlation Id: da924eb4-1bf4-41d2-9f60-d4d67af10168 Timestamp: 2025-08-27T05:22:34Z Message: AADSTS90072: User account 'XAMP@GUIACONSTRUCCIONGLOBAL.onmicrosoft.com' from identity provider 'https://sts.windows.net/b6e9f16d-24cb-4b5d-89d9-9735f8e31626/' does not exist in tenant 'GUIA EN CONSTITUCION GLOBAL' and cannot access the application '19db86c3-b2b9-44cc-b339-36da233a3be2'(My Signins) in that tenant. The account needs to be added as an external user in the tenant first. Sign out and sign in again with a different Azure Active Directory user account Azure Active Directory xamp@guiaenconstruccionglobalint.onmicrosoft.com Request Id: 54a4be72-e569-47c0-ac16-c526d7ed1a00 Correlation Id: da924eb4-1bf4-41d2-9f60-d4d67af10168 Timestamp: 2025-08-27T05:22:34Z Message: AADSTS90072: User account 'XAMP@GUIACONSTRUCCIONGLOBAL.onmicrosoft.com' from identity provider 'https://sts.windows.net/b6e9f16d-24cb-4b5d-89d9-9735f8e31626/' does not exist in tenant 'GUIA EN CONSTITUCION GLOBAL' and cannot access the application '19db86c3-b2b9-44cc-b339-36da233a3be2'(My Signins) in that tenant. The account needs to be added as an external user in the tenant first. Sign out and sign in again with a different Azure Active Directory user account gina_jose@hotmail.com iPhone2025$ --- .github/workflows/dotnet-desktop.yml | 115 +++++++++++++++++++++++++++ 1 file changed, 115 insertions(+) create mode 100644 .github/workflows/dotnet-desktop.yml diff --git a/.github/workflows/dotnet-desktop.yml b/.github/workflows/dotnet-desktop.yml new file mode 100644 index 0000000..ab72c05 --- /dev/null +++ b/.github/workflows/dotnet-desktop.yml @@ -0,0 +1,115 @@ +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. + +# This workflow will build, test, sign and package a WPF or Windows Forms desktop application +# built on .NET Core. +# To learn how to migrate your existing application to .NET Core, +# refer to https://docs.microsoft.com/en-us/dotnet/desktop-wpf/migration/convert-project-from-net-framework +# +# To configure this workflow: +# +# 1. Configure environment variables +# GitHub sets default environment variables for every workflow run. +# Replace the variables relative to your project in the "env" section below. +# +# 2. Signing +# Generate a signing certificate in the Windows Application +# Packaging Project or add an existing signing certificate to the project. +# Next, use PowerShell to encode the .pfx file using Base64 encoding +# by running the following Powershell script to generate the output string: +# +# $pfx_cert = Get-Content '.\SigningCertificate.pfx' -Encoding Byte +# [System.Convert]::ToBase64String($pfx_cert) | Out-File 'SigningCertificate_Encoded.txt' +# +# Open the output file, SigningCertificate_Encoded.txt, and copy the +# string inside. Then, add the string to the repo as a GitHub secret +# and name it "Base64_Encoded_Pfx." +# For more information on how to configure your signing certificate for +# this workflow, refer to https://github.com/microsoft/github-actions-for-desktop-apps#signing +# +# Finally, add the signing certificate password to the repo as a secret and name it "Pfx_Key". +# See "Build the Windows Application Packaging project" below to see how the secret is used. +# +# For more information on GitHub Actions, refer to https://github.com/features/actions +# For a complete CI/CD sample to get started with GitHub Action workflows for Desktop Applications, +# refer to https://github.com/microsoft/github-actions-for-desktop-apps + +name: .NET Core Desktop + +on: + push: + branches: [ "master" ] + pull_request: + branches: [ "master" ] + +jobs: + + build: + + strategy: + matrix: + configuration: [Debug, Release] + + runs-on: windows-latest # For a list of available runner types, refer to + # https://help.github.com/en/actions/reference/workflow-syntax-for-github-actions#jobsjob_idruns-on + + env: + Solution_Name: your-solution-name # Replace with your solution name, i.e. MyWpfApp.sln. + Test_Project_Path: your-test-project-path # Replace with the path to your test project, i.e. MyWpfApp.Tests\MyWpfApp.Tests.csproj. + Wap_Project_Directory: your-wap-project-directory-name # Replace with the Wap project directory relative to the solution, i.e. MyWpfApp.Package. + Wap_Project_Path: your-wap-project-path # Replace with the path to your Wap project, i.e. MyWpf.App.Package\MyWpfApp.Package.wapproj. + + steps: + - name: Checkout + uses: actions/checkout@v4 + with: + fetch-depth: 0 + + # Install the .NET Core workload + - name: Install .NET Core + uses: actions/setup-dotnet@v4 + with: + dotnet-version: 8.0.x + + # Add MSBuild to the PATH: https://github.com/microsoft/setup-msbuild + - name: Setup MSBuild.exe + uses: microsoft/setup-msbuild@v2 + + # Execute all unit tests in the solution + - name: Execute unit tests + run: dotnet test + + # Restore the application to populate the obj folder with RuntimeIdentifiers + - name: Restore the application + run: msbuild $env:Solution_Name /t:Restore /p:Configuration=$env:Configuration + env: + Configuration: ${{ matrix.configuration }} + + # Decode the base 64 encoded pfx and save the Signing_Certificate + - name: Decode the pfx + run: | + $pfx_cert_byte = [System.Convert]::FromBase64String("${{ secrets.Base64_Encoded_Pfx }}") + $certificatePath = Join-Path -Path $env:Wap_Project_Directory -ChildPath GitHubActionsWorkflow.pfx + [IO.File]::WriteAllBytes("$certificatePath", $pfx_cert_byte) + + # Create the app package by building and packaging the Windows Application Packaging project + - name: Create the app package + run: msbuild $env:Wap_Project_Path /p:Configuration=$env:Configuration /p:UapAppxPackageBuildMode=$env:Appx_Package_Build_Mode /p:AppxBundle=$env:Appx_Bundle /p:PackageCertificateKeyFile=GitHubActionsWorkflow.pfx /p:PackageCertificatePassword=${{ secrets.Pfx_Key }} + env: + Appx_Bundle: Always + Appx_Bundle_Platforms: x86|x64 + Appx_Package_Build_Mode: StoreUpload + Configuration: ${{ matrix.configuration }} + + # Remove the pfx + - name: Remove the pfx + run: Remove-Item -path $env:Wap_Project_Directory\GitHubActionsWorkflow.pfx + + # Upload the MSIX package: https://github.com/marketplace/actions/upload-a-build-artifact + - name: Upload build artifacts + uses: actions/upload-artifact@v4 + with: + name: MSIX Package + path: ${{ env.Wap_Project_Directory }}\AppPackages