# Copyright (c) 2021 Digital Asset (Switzerland) GmbH and/or its affiliates. All rights reserved. # SPDX-License-Identifier: Apache-2.0 parameters: var_name: '' steps: - bash: | set -euo pipefail TMP=$(mktemp) PROJ_DIR="$(pwd)" cat > $TMP <<'END' escape_slack() { local r r="$1" r="${r//&/&}" r="${r//>/>}" r="${r///dev/null 2>&1; then echo $(cat ci/slack_user_ids | grep $email | awk '{print $2}') else echo "" fi } tell_slack() { local message channel message="$1" channel=${2:-$(Slack.team-daml)} jq -n --arg message "$message" '{"text": $message}' \ | curl -XPOST -i -H 'Content-Type: application/json' -d @- $channel } gcs() { local args cleanup cmd cred key restore_trap ret ret=1 cred="$1" cmd="$2" args=(${@:3}) key=$(mktemp) # There may already be a trap; this will save it restore_trap=$(trap -p EXIT) config_dir=$(mktemp -d) cleanup="rm -rf $key $config_dir" trap "$cleanup; $restore_trap" EXIT echo "$cred" > $key export CLOUDSDK_CONFIG="$config_dir" gcloud auth activate-service-account --key-file=$key BOTO_CONFIG=/dev/null gsutil $cmd "${args[@]}" ret=$? eval "$cleanup" trap - EXIT eval "$restore_trap" return $ret } gpg_verify() { local key gpg_dir signature_file res signature_file=$1 key=$(mktemp) cat > $key <