Skip to content

This action allows for authenticode code-signing using a key hosted on google key management service

Notifications You must be signed in to change notification settings

nextgens/authenticode-sign-action

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Authenticode cloud signer

This action signs files that are supported by signtool.exe with a key hosted on google KMS. This enables EV code-signing certificates to be used in a CI pipeline. It only works on Windows and should run on windows-latest.

This is a forked/cloudified version of dlemstra/code-sign-action/

Inputs

certificate

Required The base64 encoded certificate chain in PEM format.

key-uri

Required The google KMS resource ID to use.

credentials

Required The base64 encoded JSON credentials to use.

timestamp-url

Optional The RFC3161 timestamping server URL to use (or an empty string if no timestamping is required).

description

Optional The /d parameter of signtool.exe.

description-url

Optional The /du parameter of signtool.exe.

page-hash

Optional The /ph and /nph parameter of signtool.exe.

folder

Required The folder that contains the libraries to sign.

recursive

Optional Recursively search for DLL files.

Example usage

runs-on: windows-latest
steps:
  uses: nextgens/authenticode-sign-action@v1.0.1
  with:
    certificate: '${{ secrets.CERTIFICATES }}'
    key-uri: 'projects/myProject/locations/europe-west2/keyRings/code-signing/cryptoKeys/ev/cryptoKeyVersions/1'
    credentials: '${{ secrets.GOOGLE_APPLICATION_CREDENTIALS }}'
    timestamp-url: 'http://timestamp.digicert.com'
    description: ''
    description-url: ''
    page-hash: true
    folder: 'files'
    recursive: true

About

This action allows for authenticode code-signing using a key hosted on google key management service

Resources

Stars

Watchers

Forks

Packages

No packages published