Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 2.5.1 #1648

Merged
merged 13 commits into from
Jul 2, 2024
Merged

Release 2.5.1 #1648

merged 13 commits into from
Jul 2, 2024

Conversation

mjcheetham
Copy link
Collaborator

Changes:

ldennington and others added 13 commits April 19, 2024 17:43
NuGet requires that signed packages have a matching registered signing
certificate [1]. Update release workflow to capture this certificate from the Sign
CLI tool and upload it as a release artifact.

1: https://learn.microsoft.com/en-us/nuget/create-packages/sign-a-package#register-the-certificate-on-nugetorg
NuGet requires that signed packages have a matching [registered signing
certificate](https://learn.microsoft.com/en-us/nuget/create-packages/sign-a-package#register-the-certificate-on-nugetorg).
Update release workflow to capture this certificate from the Sign CLI
tool and upload it as a release artifact. Note that this means we will
need to manually update this certificate to the
[`git-credential-manager`
organization](https://www.nuget.org/profiles/git-credential-manager) in
nuget.org prior to publishing the .NET tool version for each release.

Tested the end-to-end flow in [my
fork](https://github.com/ldennington/git-credential-manager) which
resulted in publication of [this
package](https://int.nugettest.org/packages/git-credential-manager) to
the NuGet QA Gallery.
Update the Managed Identity and Service Principal docs
to include the reference to a known issue with some MI formats.
Update all our dependencies to the latest verisons:

- MSAL 4.61.3
- Avalonia 11.0.11
Update all our dependencies to the latest versions:

- MSAL 4.61.3
- Avalonia 11.0.11
Use the new azure/trusted-signing-action in place of the now deprecated
azure/azure-code-signing-action.

https://github.com/azure/azure-code-signing-action
https://github.com/azure/trusted-signing-action
Use our customised version of the dotnet/sign tool for Trusted Signing,
including export of the certificate.
)

- Update to the latest version of the GitHub Action (the
`azure/azure-code-signing-action` action has been replaced by the
`azure/trusted-signing-action` one).

- Deploy a forked version of the `Sign.Cli` tool for Trusted Signing,
which includes the ability to export the certificate. The fork can be
found here https://github.com/mjcheetham/sign/tree/export-opt, and the
PR to submit this change upstream here
dotnet/sign#734.

With these changes we are now completely secret/credential free, and
rely on federation only.
Use a 3rd party tool to extract the NuGet signing certificate for upload
rather than relying on an option added to the sign.exe tool in a private
fork.
Use the `dotnet tool install` command to acquire the code signing tool,
rather than rely on our Azure blob store.
Drop the `-d` and `-u` options from the sign.exe CLI; they are no longer
required.
…1647)

Use a 3rd party tool to extract the NuGet signing certificate for upload
rather than relying on an option added to the sign.exe tool in a private
fork. At the same time let's use the `dotnet tool install` command to
acquire the code signing tool, rather than rely on our Azure blob store.

Also let's drop the `-d` and `-u` options from the sign.exe CLI; they
are no longer required
([source](dotnet/sign#734 (comment))).
@mjcheetham mjcheetham requested review from dscho and vdye July 2, 2024 21:08
@mjcheetham
Copy link
Collaborator Author

Failing centos 8 error is related to:
https://serverfault.com/questions/1161816/mirrorlist-centos-org-no-longer-resolve

cc @dscho

Copy link
Collaborator

@dscho dscho left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure what is going on with the CentOS build, but changes look good to me!

@dscho
Copy link
Collaborator

dscho commented Jul 2, 2024

Failing centos 8 error is related to:
https://serverfault.com/questions/1161816/mirrorlist-centos-org-no-longer-resolve

cc @dscho

Ah. That explains it all right!

@mjcheetham
Copy link
Collaborator Author

This version of CentOS is out of date, so I'm not going to bother investigating much further for this point-1 release. Until I have enough 'budget' to work on issues like this in GCM, I'm afraid I'll just need to merge with this check continuing to fail.

@mjcheetham mjcheetham merged commit 4b0808b into release Jul 2, 2024
16 of 17 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants