Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

InstallAppleCertificate: Please allow installing p12 from source (read desc before you judge me!) #13913

Open
kythin opened this issue Nov 18, 2020 · 15 comments
Labels
Area: ABTT Akvelon Build Tasks Team area of work enhancement stale

Comments

@kythin
Copy link

kythin commented Nov 18, 2020

Question, Bug, or Feature?
Type: Feature

Enter Task Name: InstallAppleCertificate

Environment

  • Azure Pipelines (cloud). No specific project / build.
  • Hosted Agent, MacOS 10.15

Issue Description

TL:DR; The InstallAppleCertificate task only works for secure files. Please add an option to install the certificate from a local working directory instead, as part of the normal execution phase.

We use a custom bash task early in the pipeline to populate the environment variables and download/decode some secure files based on our external secrets storage service (We use doppler.com but this could also apply to hashicorp vault or any other non-azure secure file service).

When building and signing iOS .ipa files, this process falls down because the InstallAppleCertificate task will ONLY work with azure pipeline secure files.

At the moment our temporary solve is to keep a copy of the p12 file in azure secure files, as well as our external vault. We also have to copy the password twice too, since the InstallAppleCertificate runs pre-job-execution before our external vault script has populated any variables. So, not ideal!

Thanks in advance 👍

@EzzhevNikita EzzhevNikita added Area: ABTT Akvelon Build Tasks Team area of work and removed route labels Nov 18, 2020
@github-actions
Copy link

This issue is stale because it has been open for 180 days with no activity. Remove the stale label or comment on the issue otherwise this will be closed in 5 days

@github-actions github-actions bot added the stale label May 27, 2021
@kythin
Copy link
Author

kythin commented May 27, 2021

Not stale, still an issue :(

@github-actions github-actions bot removed the stale label May 28, 2021
@toddwalstad-eaton
Copy link

Agreed pulling from disk should be an option.

We are trying to work around this issue by uploading to secure file during the pipeline using this hack . I am also going to look at the source for this task and see if there is an easy way to add this.

@dragon788
Copy link

The Javascript is pretty annoying to reverse engineer, but this is the same process just less convoluted.

https://docs.github.com/en/actions/deployment/installing-an-apple-certificate-on-macos-runners-for-xcode-development

@github-actions
Copy link

github-actions bot commented Apr 3, 2022

This issue is stale because it has been open for 180 days with no activity. Remove the stale label or comment on the issue otherwise this will be closed in 5 days

@github-actions github-actions bot added the stale label Apr 3, 2022
@toddwalstad-eaton
Copy link

toddwalstad-eaton commented Apr 4, 2022

Not stale, this is still a valid request. @dragon788, can you add a comment, my comment isn't removing the stale flag it seems.

@anatolybolshakov
Copy link
Contributor

Hi @toddwalstad-eaton thanks for reporting! We are working on more prioritized issues at the moment, but will get back to this one once be able to. This would probably require additional checks from the point of security.

@github-actions github-actions bot removed the stale label Apr 4, 2022
@ghost
Copy link

ghost commented Aug 17, 2022

I would like to suggest this issue is actually expanded to allow the task to work secrets from KeyVault, either directly fetching from Key Vault or using an output variable from the AzureKeyVault task.

@Jaharmi
Copy link

Jaharmi commented Jan 24, 2023

Agree with @asdaandrewhaigh. Support for certificates/identities store in Key Vault and/or using the output of AzureKeyVault task step would be logical improvements.

@dragon788
Copy link

dragon788 commented Jan 25, 2023 via email

@github-actions
Copy link

This issue is stale because it has been open for 180 days with no activity. Remove the stale label or comment on the issue otherwise this will be closed in 5 days

@github-actions github-actions bot added the stale label Jul 24, 2023
@toddwalstad-eaton
Copy link

Keeping this alive as I am not seeing any progress toward a resolution.

@github-actions github-actions bot removed the stale label Jul 24, 2023
Copy link

This issue is stale because it has been open for 180 days with no activity. Remove the stale label or comment on the issue otherwise this will be closed in 5 days

@github-actions github-actions bot added the stale label Jan 20, 2024
@toddwalstad-eaton
Copy link

Any chance this could be worked on?

@github-actions github-actions bot removed the stale label Jan 22, 2024
Copy link

github-actions bot commented Aug 8, 2024

This issue is stale because it has been open for 180 days with no activity. Remove the stale label or comment on the issue otherwise this will be closed in 5 days

@github-actions github-actions bot added the stale label Aug 8, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Area: ABTT Akvelon Build Tasks Team area of work enhancement stale
Projects
None yet
Development

No branches or pull requests

6 participants