Пример #1
0
def upload_distribution():
    """Upload the built package to crates.io."""
    tools.assert_can_release()

    # Yes, cargo really will only look in this file. Yes this is terrible.
    # This only runs on Travis, so we may be assumed to own it, but still.
    unlink_if_present(CARGO_CREDENTIALS)

    # symlink so that the actual secret credentials can't be leaked via the
    # cache.
    os.symlink(tools.CARGO_API_KEY, CARGO_CREDENTIALS)

    # Give the key the right permissions.
    os.chmod(CARGO_CREDENTIALS, int("0600", 8))

    cargo("publish")
def upload_distribution():
    """Upload the built package to crates.io."""
    tools.assert_can_release()

    # Yes, cargo really will only look in this file. Yes this is terrible.
    # This only runs on Travis, so we may be assumed to own it, but still.
    unlink_if_present(CARGO_CREDENTIALS)

    # symlink so that the actual secret credentials can't be leaked via the
    # cache.
    os.symlink(tools.CARGO_API_KEY, CARGO_CREDENTIALS)

    # Give the key the right permissions.
    os.chmod(CARGO_CREDENTIALS, int("0600", 8))

    cargo("publish")
Пример #3
0
def upload_distribution():
    """Upload the built package to rubygems."""
    tools.assert_can_release()

    # Yes, rubygems really will only look in this file. Yes this is terrible.
    # This only runs on Travis, so we may be assumed to own it, but still.
    unlink_if_present(RUBYGEMS_CREDENTIALS)

    # symlink so that the actual secret credentials can't be leaked via the
    # cache.
    os.symlink(tools.RUBYGEMS_API_KEY, RUBYGEMS_CREDENTIALS)

    # Give the key the right permissions.
    os.chmod(RUBYGEMS_CREDENTIALS, int('0600', 8))

    subprocess.check_call(
        [install.GEM_EXECUTABLE, 'push', *glob('hypothesis-specs-*.gem')])
Пример #4
0
def upload_distribution():
    """Upload the built package to rubygems."""
    tools.assert_can_release()

    # Yes, rubygems really will only look in this file. Yes this is terrible.
    # This only runs on Travis, so we may be assumed to own it, but still.
    unlink_if_present(RUBYGEMS_CREDENTIALS)

    # symlink so that the actual secret credentials can't be leaked via the
    # cache.
    os.symlink(tools.RUBYGEMS_API_KEY, RUBYGEMS_CREDENTIALS)

    # Give the key the right permissions.
    os.chmod(RUBYGEMS_CREDENTIALS, int('0600', 8))

    subprocess.check_call([
        install.GEM_EXECUTABLE, 'push', *glob('hypothesis-specs-*.gem')
    ])