Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SEC-2913] Update action to fit the new code signing flow #8

Merged
merged 165 commits into from
Aug 7, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
165 commits
Select commit Hold shift + click to select a range
e28bf18
Trigger code signing action
bisera-cognite Aug 1, 2023
f7676e1
Print certificate details
bisera-cognite Aug 1, 2023
63b9411
Use updated action version
bisera-cognite Aug 1, 2023
0b2e938
Get certificate information
bisera-cognite Aug 1, 2023
4c6a13b
Remove cert filtering
bisera-cognite Aug 1, 2023
35bd422
Use updated action version
bisera-cognite Aug 1, 2023
1fb0379
Test Digicert code signing
bisera-cognite Aug 2, 2023
fdc4925
Add SM_CODE_SIGNING_CERT_SHA1_HASH to env vars
bisera-cognite Aug 2, 2023
e5b19b1
Setup SSM KSP on windows latest
bisera-cognite Aug 2, 2023
d7eecce
Fix download URL
bisera-cognite Aug 2, 2023
7514a04
Remove nonexisting binaries
bisera-cognite Aug 2, 2023
39d08ef
Use Digicert GH action
bisera-cognite Aug 2, 2023
e0fa2e0
Specify version
bisera-cognite Aug 2, 2023
4da2e34
Try to list key pairs
bisera-cognite Aug 2, 2023
10fce11
Try signing with smctl
bisera-cognite Aug 2, 2023
e647c3c
Remove keypair sync
bisera-cognite Aug 2, 2023
53cbcde
Readd keypair sync
bisera-cognite Aug 2, 2023
7a1f45c
List keypairs
bisera-cognite Aug 2, 2023
13ec9fb
Include healthcheck
bisera-cognite Aug 2, 2023
f3d36f8
Use signtol with debug
bisera-cognite Aug 2, 2023
29eafe9
Use signtol with debug
bisera-cognite Aug 2, 2023
f74a504
Move smctl block
bisera-cognite Aug 2, 2023
86ac683
List certificates
bisera-cognite Aug 2, 2023
5ab1e56
List certificates
bisera-cognite Aug 2, 2023
7dbf4ba
Remove KSP
bisera-cognite Aug 2, 2023
cdb98d5
Remove KSP
bisera-cognite Aug 2, 2023
6d30c2f
Copy test .dll
bisera-cognite Aug 2, 2023
640a7de
Copy test .dll
bisera-cognite Aug 2, 2023
5dec3d4
Refactor
bisera-cognite Aug 2, 2023
93c55c2
Refactor
bisera-cognite Aug 2, 2023
4af1707
Refactor
bisera-cognite Aug 2, 2023
ad58ec3
Fix file copying
bisera-cognite Aug 2, 2023
72d5066
Readd SM_API_KEY to env vars
bisera-cognite Aug 2, 2023
e36e90a
Change name of binary to be signed
bisera-cognite Aug 2, 2023
cdf6808
Trigger code signing action
bisera-cognite Aug 2, 2023
f006264
Revert to old working workflow
bisera-cognite Aug 2, 2023
3bda13a
Remove smctl
bisera-cognite Aug 2, 2023
c7a4b7d
Sync certificate
bisera-cognite Aug 2, 2023
19f462f
Sync certificate
bisera-cognite Aug 2, 2023
13949b9
Add absolute path to file to be signed
bisera-cognite Aug 2, 2023
b77ad6b
Add absolute path to file to be signed
bisera-cognite Aug 2, 2023
0b89c6b
Add absolute path to file to be signed
bisera-cognite Aug 2, 2023
c636049
Add absolute path to file to be signed
bisera-cognite Aug 2, 2023
1426f24
Add absolute path to file to be signed
bisera-cognite Aug 2, 2023
94dcc27
Add absolute path to file to be signed
bisera-cognite Aug 2, 2023
6629b35
Trigger code signing action
bisera-cognite Aug 2, 2023
0bbe56c
Trigger code signing action
bisera-cognite Aug 2, 2023
96385ae
Remove .exe
bisera-cognite Aug 2, 2023
4c6c2c4
Remove apps from path
bisera-cognite Aug 2, 2023
fb6212e
Run composite action
bisera-cognite Aug 2, 2023
1894052
Run composite action
bisera-cognite Aug 2, 2023
eacdae9
Run composite action
bisera-cognite Aug 2, 2023
10ab1c9
Updat action version
bisera-cognite Aug 2, 2023
a5b3812
Update action version
bisera-cognite Aug 2, 2023
843c4be
Update action version
bisera-cognite Aug 2, 2023
5c50b44
Update action version
bisera-cognite Aug 2, 2023
693028b
Update action version
bisera-cognite Aug 2, 2023
30dbc9b
Update action version
bisera-cognite Aug 2, 2023
3413988
Update action version
bisera-cognite Aug 2, 2023
fb89a6d
Update action version
bisera-cognite Aug 2, 2023
d7c8dd5
Update action version
bisera-cognite Aug 2, 2023
56a93fe
Update action version
bisera-cognite Aug 2, 2023
b03c35f
Update action version
bisera-cognite Aug 2, 2023
25ee02f
Update action version
bisera-cognite Aug 2, 2023
fc3e589
Update action version
bisera-cognite Aug 2, 2023
190b8ad
Update action version
bisera-cognite Aug 2, 2023
72528da
Update action version
bisera-cognite Aug 2, 2023
534c07d
Update action version
bisera-cognite Aug 2, 2023
66d11f1
Update action version
bisera-cognite Aug 2, 2023
f888b45
Update action version
bisera-cognite Aug 2, 2023
5fb5ef0
Update action version
bisera-cognite Aug 2, 2023
c868244
Update action version
bisera-cognite Aug 2, 2023
691a889
Update action version
bisera-cognite Aug 2, 2023
066b247
Update action version
bisera-cognite Aug 2, 2023
f29f3e7
add linux signing workflow file
sondresolbakken Aug 3, 2023
6f5327a
use linux install command to create and write certificate to /d
sondresolbakken Aug 3, 2023
67f0929
Use apt-get to install osslcode and separate steps
sondresolbakken Aug 3, 2023
b6ba115
add quotes around certificate input
sondresolbakken Aug 3, 2023
a179eb5
Fix env reference
sondresolbakken Aug 3, 2023
b31003b
Add cert save command
sondresolbakken Aug 3, 2023
cc30784
output files in folder
sondresolbakken Aug 3, 2023
9cc3882
update linux signing
sondresolbakken Aug 3, 2023
e547e76
update
sondresolbakken Aug 3, 2023
94a359a
update
sondresolbakken Aug 3, 2023
45f7ee1
try signing curl
sondresolbakken Aug 3, 2023
e74bf98
test
sondresolbakken Aug 3, 2023
0800418
update
sondresolbakken Aug 3, 2023
4b14c7e
update
sondresolbakken Aug 3, 2023
9b2a087
update
sondresolbakken Aug 3, 2023
36e578c
update
sondresolbakken Aug 3, 2023
92a0754
update
sondresolbakken Aug 3, 2023
6f2a6e0
update
sondresolbakken Aug 3, 2023
1eeb59b
update
sondresolbakken Aug 3, 2023
06a62f4
update
sondresolbakken Aug 3, 2023
b7abbf8
update
sondresolbakken Aug 3, 2023
c74610a
update
sondresolbakken Aug 3, 2023
93d7ccc
update
sondresolbakken Aug 3, 2023
4cd9d74
update
sondresolbakken Aug 3, 2023
1d033fb
update
sondresolbakken Aug 3, 2023
3be8650
update2
sondresolbakken Aug 3, 2023
e6e3e00
update
sondresolbakken Aug 3, 2023
a82594c
update
sondresolbakken Aug 3, 2023
b7b4aad
update
sondresolbakken Aug 3, 2023
92e30da
update
sondresolbakken Aug 3, 2023
7427c5a
update
sondresolbakken Aug 3, 2023
9327d4f
update
sondresolbakken Aug 3, 2023
a60d069
update
sondresolbakken Aug 3, 2023
c020b9d
update
sondresolbakken Aug 3, 2023
14df25a
update
sondresolbakken Aug 3, 2023
aee2c0b
update
sondresolbakken Aug 3, 2023
a5df91f
update
sondresolbakken Aug 3, 2023
cd74ce8
update
sondresolbakken Aug 3, 2023
37d8223
update
sondresolbakken Aug 3, 2023
339c48a
update
sondresolbakken Aug 3, 2023
93bcb07
update
sondresolbakken Aug 3, 2023
2a9f54c
update
sondresolbakken Aug 3, 2023
93fbe87
update
sondresolbakken Aug 3, 2023
6b6cd9c
update
sondresolbakken Aug 3, 2023
6866ec2
update
sondresolbakken Aug 3, 2023
5ded5cb
update
sondresolbakken Aug 3, 2023
6da7bdf
update
sondresolbakken Aug 3, 2023
d121563
update
sondresolbakken Aug 3, 2023
d1f92a4
update
sondresolbakken Aug 3, 2023
31839f9
update
sondresolbakken Aug 3, 2023
5275c20
update
sondresolbakken Aug 4, 2023
a9fe85d
update
sondresolbakken Aug 4, 2023
2646010
update
sondresolbakken Aug 4, 2023
fb83bf0
update
sondresolbakken Aug 4, 2023
01e611b
update
sondresolbakken Aug 4, 2023
80dde5f
update
sondresolbakken Aug 4, 2023
de2023e
Try updated action file
sondresolbakken Aug 4, 2023
fdef969
Try updated action file
sondresolbakken Aug 4, 2023
6b9c999
Try updated action file
sondresolbakken Aug 4, 2023
5a67481
Try updated action file
sondresolbakken Aug 4, 2023
20c9cab
Try updated action file
sondresolbakken Aug 4, 2023
60db8b5
Try updated action file
sondresolbakken Aug 4, 2023
6a9379f
Update action version
bisera-cognite Aug 4, 2023
6503b00
Echo file path
bisera-cognite Aug 4, 2023
fdeeb71
Change to absolute path
bisera-cognite Aug 4, 2023
56ba5d3
Update action version
bisera-cognite Aug 4, 2023
43eddac
Update action version
bisera-cognite Aug 4, 2023
4579258
Update action version
bisera-cognite Aug 4, 2023
ce1fcc7
Only run action for single binary on Linux
bisera-cognite Aug 4, 2023
d6f7ead
Try dir instead of find on Windows
bisera-cognite Aug 4, 2023
4322a4a
Try Windows powershell
bisera-cognite Aug 4, 2023
301bc3b
Try Windows powershell
bisera-cognite Aug 4, 2023
b9c9b22
Try Windows bash
bisera-cognite Aug 4, 2023
a6817ac
Replace checkout
bisera-cognite Aug 4, 2023
5c5af77
Try Windows powershell
bisera-cognite Aug 4, 2023
fbafcac
Try Windows powershell
bisera-cognite Aug 7, 2023
ae9a5a9
Try Windows powershell
bisera-cognite Aug 7, 2023
0b9b372
Try Windows powershell
bisera-cognite Aug 7, 2023
fdf5269
Try Windows powershell
bisera-cognite Aug 7, 2023
a5cc6ec
Test multiple binaries
bisera-cognite Aug 7, 2023
9bf5c5b
Update action version
bisera-cognite Aug 7, 2023
6f7178a
Update action version
bisera-cognite Aug 7, 2023
b2f8667
Update action version
bisera-cognite Aug 7, 2023
dc37437
Test signle binary
bisera-cognite Aug 7, 2023
c6e2bab
Cleanup
bisera-cognite Aug 7, 2023
de7d7b8
Update version
bisera-cognite Aug 7, 2023
b33f1bf
Cleanup
bisera-cognite Aug 7, 2023
a994de2
Sign test binary in repository with Windows
bisera-cognite Aug 7, 2023
f5b6161
Remove -Recurse option
bisera-cognite Aug 7, 2023
014b820
Remove copying of binary
bisera-cognite Aug 7, 2023
f1bd29c
Change documentation to reflect the use of the new version of the act…
bisera-cognite Aug 7, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
83 changes: 41 additions & 42 deletions .github/workflows/run-action.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,64 +4,63 @@ on:
push:
branches:
- main
- 'releases/*'
- "releases/*"

# Run this action only once on a single runner. Multiple consecutive runs on the same runner could cause issues.
jobs:
run-action:
runs-on: windows-2022
steps:
- name: Copy libraries
shell: cmd
run: |
dir
mkdir files
copy C:\Windows\System32\wmp.dll files
cd files
mkdir subdirectory
copy C:\Windows\System32\wmp.dll subdirectory
- name: Checkout code
uses: actions/checkout@v3

- name: Run the action for a single binary
env:
CERTIFICATE: ${{ secrets.CODE_SIGNING_CERTIFICATE }}
CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CERTIFICATE_PASSWORD }}
uses: cognitedata/code-sign-action/@v1
CERTIFICATE_HOST: ${{ secrets.CODE_SIGNING_CERT_HOST }}
CERTIFICATE_HOST_API_KEY: ${{ secrets.CODE_SIGNING_CERT_HOST_API_KEY }}
CERTIFICATE_SHA1_HASH: ${{ secrets.CODE_SIGNING_CERT_SHA1_HASH }}
CLIENT_CERTIFICATE: ${{ secrets.CODE_SIGNING_CLIENT_CERT }}
CLIENT_CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CLIENT_CERT_PASSWORD }}
uses: cognitedata/code-sign-action/@v2
with:
path-to-binary: 'files\wmp.dll'
path-to-binary: 'test\test.dll'

# - name: Run the action for multiple binaries in a directory
# env:
# CERTIFICATE_HOST: ${{ secrets.CODE_SIGNING_CERT_HOST }}
# CERTIFICATE_HOST_API_KEY: ${{ secrets.CODE_SIGNING_CERT_HOST_API_KEY }}
# CERTIFICATE_SHA1_HASH: ${{ secrets.CODE_SIGNING_CERT_SHA1_HASH }}
# CLIENT_CERTIFICATE: ${{ secrets.CODE_SIGNING_CLIENT_CERT }}
# CLIENT_CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CLIENT_CERT_PASSWORD }}
# uses: cognitedata/code-sign-action/@v2
# with:
# path-to-binary: 'test'

- name: Run the action for all binaries under a folder
env:
CERTIFICATE: ${{ secrets.CODE_SIGNING_CERTIFICATE }}
CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CERTIFICATE_PASSWORD }}
uses: cognitedata/code-sign-action/@v1
with:
path-to-binary: 'files'
options: '-Recurse'

run-action-linux:
runs-on: ubuntu-22.04
steps:
- name: Copy libraries
run: |
ls
mkdir files
wget https://github.com/cognitedata/code-sign-action/raw/0dc0e0fff181f5c2147601d4402d6ce8d64e06ca/test.dll -O files/test.dll
cd files
mkdir subdirectory
cp test.dll subdirectory
- name: Checkout code
uses: actions/checkout@v3

- name: Run the action for a single binary
env:
CERTIFICATE: ${{ secrets.CODE_SIGNING_CERTIFICATE }}
CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CERTIFICATE_PASSWORD }}
uses: cognitedata/code-sign-action/@v1
CERTIFICATE_HOST: ${{ secrets.CODE_SIGNING_CERT_HOST }}
CERTIFICATE_HOST_API_KEY: ${{ secrets.CODE_SIGNING_CERT_HOST_API_KEY }}
CERTIFICATE_SHA1_HASH: ${{ secrets.CODE_SIGNING_CERT_SHA1_HASH }}
CLIENT_CERTIFICATE: ${{ secrets.CODE_SIGNING_CLIENT_CERT }}
CLIENT_CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CLIENT_CERT_PASSWORD }}
uses: cognitedata/code-sign-action/@v2
with:
path-to-binary: 'files/test.dll'
path-to-binary: "test/test.dll"

- name: Run the action for all binaries under a folder
env:
CERTIFICATE: ${{ secrets.CODE_SIGNING_CERTIFICATE }}
CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CERTIFICATE_PASSWORD }}
uses: cognitedata/code-sign-action/@v1
with:
path-to-binary: 'files'
options: '-Recurse'
# - name: Run the action for multiple binaries in a directory
# env:
# CERTIFICATE_HOST: ${{ secrets.CODE_SIGNING_CERT_HOST }}
# CERTIFICATE_HOST_API_KEY: ${{ secrets.CODE_SIGNING_CERT_HOST_API_KEY }}
# CERTIFICATE_SHA1_HASH: ${{ secrets.CODE_SIGNING_CERT_SHA1_HASH }}
# CLIENT_CERTIFICATE: ${{ secrets.CODE_SIGNING_CLIENT_CERT }}
# CLIENT_CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CLIENT_CERT_PASSWORD }}
# uses: cognitedata/code-sign-action/@v2
# with:
# path-to-binary: "test"
58 changes: 33 additions & 25 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,28 +1,26 @@
# code-sign-action

This Action can be used to sign Windows binaries. It has been tested on `windows-2022` runners.
This Action integrates with Digicert One and uses SignTool on Windows runners and JSign on Linux runners. It has been tested on `windows-2022`, `ubuntu-20.04` and `ubuntu-22.04` runners.

------------

## Usage

### Environment

- `CERTIFICATE`: Base64-encoded PKCS #12 archive (.pfx file).
- `CERTIFICATE_PASSWORD`: Pass phrase to decode the .pfx file.
- `CERTIFICATE_HOST`: https://clientauth.one.digicert.com
- `CERTIFICATE_HOST_API_KEY`: An API key created for the GitHub Actions service user in Digicert One.
- `CERTIFICATE_SHA1_HASH`: SHA1 fingerprint of the code signing certificate.
- `CLIENT_CERTIFICATE`: Client authentication certificate created for the GitHub Actions service user in Digicert One.(.p12 file)
- `CLIENT_CERTIFICATE_PASSWORD`: Client authentication certificate password created for the GitHub Actions service user in Digicert One.

### Inputs

- `path-to-binary`: path to the file to be signed.

#### Optional:
| Parameter | Description | Default |
| :----------: | :------------------------------------------------------------------------------------------: | :----------------: |
| options | Use "-Recurse" to recursively search for and sign files | null |
- `path-to-binary`: takes either a file path or a directory path containing the files to be signed.

### Examples

#### Sign one file
#### Sign a single file on Windows

```yaml
name: codesign-example-single-file
Expand All @@ -38,34 +36,44 @@ jobs:
steps:
- name: Run the action for a single binary
env:
CERTIFICATE: ${{ secrets.CODE_SIGNING_CERTIFICATE }}
CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CERTIFICATE_PASSWORD }}
uses: cognitedata/code-sign-action/@v1
CERTIFICATE_HOST: ${{ secrets.CODE_SIGNING_CERT_HOST }}
CERTIFICATE_HOST_API_KEY: ${{ secrets.CODE_SIGNING_CERT_HOST_API_KEY }}
CERTIFICATE_SHA1_HASH: ${{ secrets.CODE_SIGNING_CERT_SHA1_HASH }}
CLIENT_CERTIFICATE: ${{ secrets.CODE_SIGNING_CLIENT_CERT }}
CLIENT_CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CLIENT_CERT_PASSWORD }}
uses: cognitedata/code-sign-action/@v2
with:
path-to-binary: 'files\some_file.exe'
path-to-binary: 'test\test.dll'
```
#### Sign multiple files
#### Sign multiple files on Linux
```yaml
name: codesign-example-multiple-files
name: codesign-example-single-file
on:
pull_request:
push:
branches:
- main
- 'releases/*'
- "releases/*"

jobs:
run-action:
runs-on: windows-2022
run-action-linux:
runs-on: ubuntu-22.04
steps:
- name: Run the action for all binaries under a folder
- name: Checkout code
uses: actions/checkout@v3

- name: Run the action for a single binary
env:
CERTIFICATE: ${{ secrets.CODE_SIGNING_CERTIFICATE }}
CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CERTIFICATE_PASSWORD }}
uses: cognitedata/code-sign-action/@v1
CERTIFICATE_HOST: ${{ secrets.CODE_SIGNING_CERT_HOST }}
CERTIFICATE_HOST_API_KEY: ${{ secrets.CODE_SIGNING_CERT_HOST_API_KEY }}
CERTIFICATE_SHA1_HASH: ${{ secrets.CODE_SIGNING_CERT_SHA1_HASH }}
CLIENT_CERTIFICATE: ${{ secrets.CODE_SIGNING_CLIENT_CERT }}
CLIENT_CERTIFICATE_PASSWORD: ${{ secrets.CODE_SIGNING_CLIENT_CERT_PASSWORD }}
uses: cognitedata/code-sign-action/@v2
with:
path-to-binary: 'files'
options: '-Recurse'
path-to-binary: "test"

```

84 changes: 72 additions & 12 deletions action.yaml
Original file line number Diff line number Diff line change
@@ -1,20 +1,80 @@
name: 'Sign binary'
description: 'Sign a binary using a code signing certificate'
name: "Sign binary"
description: "Sign a binary using a code signing certificate"
inputs:
path-to-binary:
description: 'The folder that contains the files to sign'
description: "The folder that contains the files to sign"
required: true
options:
description: 'Use "-Recurse" to recursively search for files'
required: false
runs:
using: 'composite'
using: "composite"
steps:
- run: ${{ github.action_path }}/sign.ps1 ${{ inputs.path-to-binary }} ${{ inputs.options }}
- name: Setup Certificate Windows
run: |
echo "${{env.CLIENT_CERTIFICATE }}" | base64 --decode > /d/cognite_code_signing_github_actions.p12
if: runner.os == 'Windows'
shell: pwsh
- run: |
sudo apt install osslsigncode
${{ github.action_path }}/sign.sh ${{ inputs.path-to-binary }} ${{ inputs.options }}
shell: bash

- name: Setup Certificate Linux
run: |
echo "${{env.CLIENT_CERTIFICATE }}" | base64 --decode | sudo install -D /dev/stdin /d/cognite_code_signing_github_actions.p12
if: runner.os == 'Linux'
shell: bash

- name: Set variables
id: variables
run: |
echo "SM_HOST=${{ env.CERTIFICATE_HOST }}" >> "$GITHUB_ENV"
echo "SM_API_KEY=${{ env.CERTIFICATE_HOST_API_KEY }}" >> "$GITHUB_ENV"
echo "SM_CLIENT_CERT_PASSWORD=${{ env.CLIENT_CERTIFICATE_PASSWORD }}" >> "$GITHUB_ENV"
echo "SM_CODE_SIGNING_CERT_SHA1_HASH=${{ env.CERTIFICATE_SHA1_HASH }}" >> "$GITHUB_ENV"
if [ "${{ runner.os }}" == "Windows" ]
then
echo "SM_CLIENT_CERT_FILE=D:\\cognite_code_signing_github_actions.p12" >> "$GITHUB_ENV"
elif [ "${{ runner.os }}" == "Linux" ]
then
echo "SM_CLIENT_CERT_FILE=/d/cognite_code_signing_github_actions.p12" >> "$GITHUB_ENV"
echo "PKCS11_CONFIG=/tmp/DigiCert One Signing Manager Tools/smtools-linux-x64/pkcs11properties.cfg" >> "$GITHUB_ENV"
echo "/tmp/DigiCert One Signing Manager Tools/smtools-linux-x64" >> $GITHUB_PATH
fi
shell: bash

- name: Code signing with Secure Software Manager
uses: digicert/[email protected]
env:
SM_API_KEY: ${{ env.SM_API_KEY }}
SM_CLIENT_CERT_PASSWORD: ${{ env.SM_CLIENT_CERT_PASSWORD }}
SM_CLIENT_CERT_FILE: ${{ env.SM_CLIENT_CERT_FILE }}

- name: Sign with smctl Windows
env:
GITHUB_WORKSPACE: ${{ github.workspace }}
run: |
smctl windows certsync --keypair-alias="key_464138416"
$file_path = "${{ env.GITHUB_WORKSPACE }}\${{ inputs.path-to-binary }}"
$files_to_sign = @()
if (Test-Path -Path $file_path -PathType Leaf) {
$files_to_sign = @([PSCustomObject]@{FullName = $file_path})
}
else {
Get-ChildItem -Path $file_path -File -Recurse
$files_to_sign = @(Get-ChildItem -Path $file_path -File -Recurse)
}
foreach ( $f in $files_to_sign )
{
smctl sign --fingerprint ${{ env.SM_CODE_SIGNING_CERT_SHA1_HASH }} --input $f.FullName
smctl sign verify --input $f.FullName
}
if: runner.os == 'Windows'
shell: powershell


- name: Sign with smctl Linux
run: |
curl -fSslL https://github.com/ebourg/jsign/releases/download/3.1/jsign_3.1_all.deb -o jsign_3.1_all.deb
sudo dpkg --install jsign_3.1_all.deb
file_path="${{ inputs.path-to-binary }}"
for f in $(find $file_path -type f); do
echo $f
smctl sign -v --keypair-alias="key_464138416" --config-file="/tmp/DigiCert One Signing Manager Tools/smtools-linux-x64/pkcs11properties.cfg" --fingerprint "${{ env.SM_CODE_SIGNING_CERT_SHA1_HASH }}" --input "$f"
done
if: runner.os == 'Linux'
shell: bash
31 changes: 0 additions & 31 deletions sign.ps1

This file was deleted.

50 changes: 0 additions & 50 deletions sign.sh

This file was deleted.

File renamed without changes.