-
-
Notifications
You must be signed in to change notification settings - Fork 249
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verify Windows & Mac Signatures are present on all necessary executables #3494
Verify Windows & Mac Signatures are present on all necessary executables #3494
Comments
An example of a silent failure:
|
To ensure the resulting artifacts attached to the build job are signed (just in case copy artifact fails silently), I propose adding a new job after all signing has been done, to "VerifySigning" |
Is there a reason to not check the signature straight after signing a single binary? E.g right now I believe we loop though each binary and sign it. The most logical place to catch the error would be straight afterwards I'm guessing? We could then even add a retry logic to the curl command. My only concern there is that right now all our signing is done on the Linux codesign VM, I'm not sure how easy it would be to check the signature on Linux |
following up, It looks like uthenticode can be used to check windows signatures on Linux |
I've also been able to validate windows code signatures using osslsigncode:
|
@gdams so yeah the eclipse-sign-node is Linux, but also I was thinking i'd like to verify the "actual" artifacts on the upstream job, just in case something goes awry from after signing and the artifacts being copied to the upstream job. |
oh and there's another aspect, in that we have 3 places where signing/notarise occurs:
The verify will unpack the jdk/jre and verify all .exe/dll/dylib, and also notarize check the .pkg using spctl. |
Note that if you're going to wait until this stage you may as well skip macOS checking. It is impossible to notarize an installer without every binary being signed so we may as well rely on Apple to do these checks for us |
good point, that's very true for Mac |
@gdams although it's only the "installers" .pkg that are notarised? the .tar.gz are not. |
yes but the installers contain the extracted tar.gz so there's never going to be a difference between the contents |
|
We now sign both Windows & Mac JMOD executeables, as well as the bin executables. Due to the danger of the signing service failing silently we should add a simple verify test to the SmokeTests
Windows:
Mac:
The text was updated successfully, but these errors were encountered: