- full →
World Monitor - tech →
Tech Monitor
- full:
src-tauri/tauri.conf.json - tech:
src-tauri/tauri.tech.conf.json
Prerequisites
- Node.js + npm
- Rust toolchain
- OS-native Tauri build prerequisites:
- macOS: Xcode command-line tools
- Windows: Visual Studio Build Tools + NSIS + WiX
tauri binary from node_modules/.bin; no runtime npx package download is required after npm ci.
If the local CLI is missing, scripts/desktop-package.mjs now fails fast with an explicit npm ci remediation message.
Network preflight and remediation
Before running desktop packaging in CI or managed networks, verify connectivity and proxy config:- Internal npm mirror/proxy.
- Internal Cargo sparse index/registry mirror.
- Pre-vendored Rust crates (
src-tauri/vendor/) + Cargo offline mode. - CI artifact/caching strategy that restores required package inputs before build.
docs/TAURI_VALIDATION_REPORT.md for failure classification labels and troubleshooting flow.
Packaging commands
To view script usage/help:macOS (.app + .dmg)
Windows (.exe + .msi)
- macOS:
app,dmg - Windows:
nsis,msi
Rust dependency modes (online vs restricted network)
Fromsrc-tauri/, the project supports two packaging paths:
1) Standard online build (default)
Use normal Cargo behavior (crates.io):2) Restricted-network build (pre-vendored or internal mirror)
An optional vendored source is defined insrc-tauri/.cargo/config.toml. To use it, first prepare vendored crates on a machine that has registry access:
- One-off CLI override (no file changes):
- Local override file (recommended for CI/repeatable offline jobs):
src-tauri/vendor/ as an artifact and restore it before the restricted-network build. If your organization uses an internal crates mirror instead of vendoring, point source.crates-io.replace-with to that mirror in CI-specific Cargo config and run the same build commands.
Optional signing/notarization hooks
Unsigned packaging works by default. If signing credentials are present in environment variables, Tauri will sign/notarize automatically during the same packaging commands.macOS Apple Developer signing + notarization
Set before packaging (Developer ID signature):Windows Authenticode signing
Set before packaging (PowerShell):Variant-aware outputs (names/icons)
- Full variant:
World Monitor/world-monitor - Tech variant:
Tech Monitor/tech-monitor
src-tauri/tauri.conf.json→World Monitor/world-monitorsrc-tauri/tauri.tech.conf.json→Tech Monitor/tech-monitor
bundle.icon separately in each config and point each variant to dedicated icon assets.
Output locations
Artifacts are produced under:app/→ macOS.appdmg/→ macOS.dmgnsis/→ Windows.exeinstallermsi/→ Windows.msiinstaller
Release checklist (clean machine)
- Build required OS + variant package(s).
- Move artifacts to a clean machine (or fresh VM).
- Install/launch:
- macOS: mount
.dmg, drag app to Applications, launch. - Windows: run
.exeor.msi, launch from Start menu.
- macOS: mount
- Validate startup:
- App window opens without crash.
- Map view renders.
- Initial data loading path does not fatal-error.
- Validate variant identity:
- Window title and product name match expected variant.
- If signing was enabled:
- Verify code-signing metadata in OS dialogs/properties.
- Verify notarization/Gatekeeper acceptance on macOS.
