mirror of
https://github.com/freedomofpress/dangerzone.git
synced 2025-05-05 13:11:49 +02:00
Compare commits
3 commits
3a6b99cb24
...
74187f624e
Author | SHA1 | Date | |
---|---|---|---|
![]() |
74187f624e | ||
![]() |
2706080bc8 | ||
![]() |
20354e7c11 |
2 changed files with 5 additions and 5 deletions
2
.github/workflows/scan_released.yml
vendored
2
.github/workflows/scan_released.yml
vendored
|
@ -19,7 +19,7 @@ jobs:
|
|||
uses: actions/checkout@v4
|
||||
- name: Download container image for the latest release and load it
|
||||
run: |
|
||||
VERSION=$(curl https://api.github.com/repos/freedomofpress/dangerzone/releases/latest | jq -r '.tag_name')
|
||||
VERSION=$(curl https://api.github.com/repos/freedomofpress/dangerzone/releases/latest | grep "tag_name" | cut -d '"' -f 4)
|
||||
CONTAINER_FILENAME=container-${VERSION:1}-${{ matrix.arch }}.tar.gz
|
||||
wget https://github.com/freedomofpress/dangerzone/releases/download/${VERSION}/${CONTAINER_FILENAME} -O ${CONTAINER_FILENAME}
|
||||
docker load -i ${CONTAINER_FILENAME}
|
||||
|
|
|
@ -188,13 +188,14 @@ def main():
|
|||
# In this case the installer errors until Dangerzone 0.8.0 is uninstalled again
|
||||
#
|
||||
# TODO: Revert this once we are reasonably certain there aren't too many affected Dangerzone installations.
|
||||
property_el = ET.SubElement(package_el, "Property", Id="OLDDANGERZONEFOUND")
|
||||
dir_search_el = ET.SubElement(
|
||||
property_el,
|
||||
find_old_el = ET.SubElement(package_el, "Property", Id="OLDDANGERZONEFOUND")
|
||||
directory_search_el = ET.SubElement(
|
||||
find_old_el,
|
||||
"DirectorySearch",
|
||||
Id="dangerzone_install_folder",
|
||||
Path="C:\\Program Files (x86)\\Dangerzone",
|
||||
)
|
||||
ET.SubElement(directory_search_el, "FileSearch", Name="dangerzone.exe")
|
||||
registry_search_el = ET.SubElement(package_el, "Property", Id="DANGERZONE080FOUND")
|
||||
ET.SubElement(
|
||||
registry_search_el,
|
||||
|
@ -204,7 +205,6 @@ def main():
|
|||
Name="DisplayName",
|
||||
Type="raw",
|
||||
)
|
||||
ET.SubElement(dir_search_el, "FileSearch", Name="dangerzone.exe")
|
||||
ET.SubElement(
|
||||
package_el,
|
||||
"Launch",
|
||||
|
|
Loading…
Reference in a new issue