Skip to content

New version: MichalTrojnara.osslsigncode version 2.10 #267875

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jun 24, 2025

Conversation

Dragon1573
Copy link
Contributor

@Dragon1573 Dragon1573 commented Jun 24, 2025

Checklist for Pull Requests

Manifests

  • Have you checked that there aren't other open pull requests for the same manifest update/change?
  • This PR only modifies one (1) manifest
  • Have you validated your manifest locally with winget validate --manifest <path>?
  • Have you tested your manifest locally with winget install --manifest <path>?
  • Does your manifest conform to the 1.10 schema?

Note: <path> is the directory's name containing the manifest you're submitting.

Manual validation

Installation logs

--> Injecting proxy settings from the host
    --> Injecting with WinHTTP

Current WinHTTP proxy settings:

    Proxy Server(s) :  http://alist.dragon1573.local:57890
    Bypass List     :  <local>,*.local,*.cn

    --> Injecting with Windows Registry


ProxyEnable   : 1
ProxyServer   : http://alist.dragon1573.local:57890
ProxyOverride : <local>,*.local,*.cn



--> Installing WinGet
--> Disabling safety warning when running installers
Tip: you can type 'Update-EnvironmentVariables' to update your environment variables, such as after installing a new software.

--> Configuring Winget
已启用管理员设置 'LocalManifestFiles'。
已启用管理员设置 'LocalArchiveMalwareScanOverride'。
已启用管理员设置 'ProxyCommandLineOptions'。
将管理员设置 'DefaultProxy' 设置为 'http://alist.dragon1573.local:57890'。

--> Installing the Manifest 2.10

已找到 osslsigncode [MichalTrojnara.osslsigncode] 版本 2.10
此应用程序由其所有者授权给你。
Microsoft 对第三方程序包概不负责,也不向第三方程序包授予任何许可证。
此包需要以下依赖项:
  - 程序包
      Microsoft.VCRedist.2015+.x64
(1/1) 已找到 Microsoft Visual C++ 2015-2022 Redistributable (x64) [Microsoft.VCRedist.2015+.x64] 版本 14.44.35211.0
此应用程序由其所有者授权给你。
Microsoft 对第三方程序包概不负责,也不向第三方程序包授予任何许可证。
正在下载 https://download.visualstudio.microsoft.com/download/pr/73aabf2e-9532-4f68-99f7-3247081a619c/CC0FF0EB1DC3F5188AE6300FAEF32BF5BEEBA4BDD6E8E445A9184072096B713B/VC_redist.x64.exe
  ██████████████████████████████  24.4 MB / 24.4 MB
已成功验证安装程序哈希
正在启动程序包安装...
已成功安装

正在下载 https://github.com/mtrojnar/osslsigncode/releases/download/2.10/osslsigncode-2.10-windows-x64-mingw.zip
  ██████████████████████████████  2.14 MB / 2.14 MB
已成功验证安装程序哈希
正在提取存档...
已成功提取存档
正在启动程序包安装...
已修改路径环境变量;重启 shell 以使用新值。
添加了命令行别名: "osslsigncode"
已成功安装

--> Refreshing environment variables

--> Comparing ARP Entries

DisplayName                                                        DisplayVersion Publisher             ProductCode
-----------                                                        -------------- ---------             -----------
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.44.35211 14.44.35211.0  Microsoft Corporation {d8bbe9f9-7c5b-42c6-b715-9ee898a...
osslsigncode                                                       2.10           Michał Trojnara       MichalTrojnara.osslsigncode__Def...

PS C:\Users\WDAGUtilityAccount\Desktop\winget-pkgs> Get-ARPTable | Where-Object -Property DisplayName -Like "osslsigncode" | Format-Table

DisplayName  DisplayVersion Publisher       ProductCode                                Scope
-----------  -------------- ---------       -----------                                -----
osslsigncode 2.10           Michał Trojnara MichalTrojnara.osslsigncode__DefaultSource User

Validation logs

PS C:\Users\WDAGUtilityAccount\Desktop\winget-pkgs> osslsigncode.exe --version
osslsigncode 2.10, using:
        OpenSSL 3.1.2 1 Aug 2023 (Library: OpenSSL 3.1.2 1 Aug 2023)
No default -CAfile location detected

Please send bug-reports to Michal.Trojnara@stunnel.org

PS C:\Users\WDAGUtilityAccount\Desktop\winget-pkgs> osslsigncode.exe --help
osslsigncode 2.10, using:
        OpenSSL 3.1.2 1 Aug 2023 (Library: OpenSSL 3.1.2 1 Aug 2023)
No default -CAfile location detected

Please send bug-reports to Michal.Trojnara@stunnel.org

osslsigncode is a small tool that implements part of the functionality of the Microsoft
tool signtool.exe - more exactly the Authenticode signing and timestamping.
It can sign and timestamp PE (EXE/SYS/DLL/etc), CAB, CAT, MSI and APPX files,
as well as script files with extensions .ps1, .ps1xml, .psc1, .psd1,
.psm1, .cdxml, .mof and .js,
supports getting the timestamp through a proxy as well.
osslsigncode also supports signature verification, removal and extraction.

--version | -v         = print osslsigncode version and usage
--help                 = print osslsigncode help menu

Commands:
add                    = add an unauthenticated blob or a timestamp to a previously-signed file
attach-signature       = sign file using a given signature
extract-signature      = extract signature from a previously-signed file
remove-signature       = remove sections of the embedded signature on a file
sign                   = digitally sign a file
verify                 = verifies the digital signature of a file

For help on a specific command, enter C:\Users\WDAGUtilityAccount\AppData\Local\Microsoft\WinGet\Packages\MichalTrojnara.osslsigncode__DefaultSource\bin\osslsigncode.exe <command> --help

Usage: C:\Users\WDAGUtilityAccount\AppData\Local\Microsoft\WinGet\Packages\MichalTrojnara.osslsigncode__DefaultSource\bin\osslsigncode.exe

 [ --version | -v ]
 [ --help ]

 [ sign ] -pkcs12 <pkcs12file> | ( [ -certs <certfile> | -spc <certfile> ]
            ( -key <keyfile> | ( -key <pkcs11 key URI> -pkcs11module <module> [ -pkcs11cert <pkcs11 cert URI> ] )
            [ -provider <provider> | ( -engine <engine> [ -login ] [ -engineCtrl <command[:parameter]> ] ) ] ) )
            [ -nolegacy ]
            [ -pass <password> [ -readpass <file> ]
            (use "-" with readpass to read from stdin)
            [ -ac <crosscertfile> ]
            [ -h {md5,sha1,sha2(56),sha384,sha512} ]
            [ -n <desc> ] [ -i <url> ] [ -jp <level> ] [ -comm ]
            [ -ph ]
            [ -t <timestampurl> [ -t ... ] [ -p <proxy> ] [ -noverifypeer  ]
            [ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]
            [ -TSA-certs <TSA-certfile> ] [ -TSA-key <TSA-keyfile> ]
            [ -TSA-time <unix-time> ]
            [ -HTTPS-CAfile <infile> ]
            [ -HTTPS-CRLfile <infile> ]
            [ -time <unix-time> ]
            [ -addUnauthenticatedBlob [ -blobFile <blobfile> ] ]
            [ -nest ]
            [ -verbose ]
            [ -add-msi-dse ]
            [ -pem ]
            [ -in ] <infile> [-out ] <outfile>

 extract-data [ -pem ]
            [ -h {md5,sha1,sha2(56),sha384,sha512} ]
            [ -ph ]
            [ -add-msi-dse ]
            [ -in ] <infile> [ -out ] <datafile>

 add [ -addUnauthenticatedBlob [ -blobFile <blobfile> ] ]
            [ -t <timestampurl> [ -t ... ] [ -p <proxy> ] [ -noverifypeer  ]
            [ -ts <timestampurl> [ -ts ... ] [ -p <proxy> ] [ -noverifypeer ] ]
            [ -TSA-certs <TSA-certfile> ] [ -TSA-key <TSA-keyfile> ]
            [ -TSA-time <unix-time> ]
            [ -HTTPS-CAfile <infile> ]
            [ -HTTPS-CRLfile <infile> ]
            [ -h {md5,sha1,sha2(56),sha384,sha512} ]
            [ -index <index> ]
            [ -verbose ]
            [ -add-msi-dse ]
            [ -in ] <infile> [ -out ] <outfile>

 attach-signature [ -sigin ] <sigfile>
            [ -CAfile <infile> ]
            [ -CRLfile <infile> ]
            [ -TSA-CAfile <infile> ]
            [ -TSA-CRLfile <infile> ]
            [ -time <unix-time> ]
            [ -h {md5,sha1,sha2(56),sha384,sha512} ]
            [ -require-leaf-hash {md5,sha1,sha2(56),sha384,sha512}:XXXXXXXXXXXX... ]
            [ -nest ]
            [ -add-msi-dse ]
            [ -in ] <infile> [ -out ] <outfile>

 extract-signature [ -pem ]
            [ -in ] <infile> [ -out ] <sigfile>

 remove-signature [ -in ] <infile> [ -out ] <outfile>

 verify [ -in ] <infile>
            [ -c | -catalog <infile> ]
            [ -CAfile <infile> ]
            [ -CRLfile <infile> ]
            [ -HTTPS-CAfile <infile> ]
            [ -HTTPS-CRLfile <infile> ]
            [ -TSA-CAfile <infile> ]
            [ -TSA-CRLfile <infile> ]
            [ -p <proxy> ]
            [ -index <index> ]
            [ -ignore-timestamp ]
            [ -ignore-cdp ]
            [ -ignore-crl ]
            [ -time <unix-time> ]
            [ -require-leaf-hash {md5,sha1,sha2(56),sha384,sha512}:XXXXXXXXXXXX... ]
            [ -verbose ]


Microsoft Reviewers: Open in CodeFlow

@wingetbot
Copy link
Collaborator

Service Badge  Service Badge  

@wingetbot
Copy link
Collaborator

Validation Pipeline Run WinGetSvc-Validation-65-267875-20250624-1

@wingetbot wingetbot added New-Manifest Azure-Pipeline-Passed Validation pipeline passed. There may still be manual validation requirements. Validation-Completed Validation passed labels Jun 24, 2025
@stephengillie stephengillie added the Moderator-Approved One of the Moderators has reviewed and approved this PR label Jun 24, 2025
@wingetbot wingetbot added Validation-Completed Validation passed and removed Validation-Completed Validation passed labels Jun 24, 2025
@stephengillie stephengillie merged commit c68f10c into microsoft:master Jun 24, 2025
1 check passed
@wingetbot
Copy link
Collaborator

Publish pipeline succeeded for this Pull Request. Once you refresh your index, this change should be present.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Azure-Pipeline-Passed Validation pipeline passed. There may still be manual validation requirements. Moderator-Approved One of the Moderators has reviewed and approved this PR New-Manifest Publish-Pipeline-Succeeded Validation-Completed Validation passed
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Update Request]: MichalTrojnara.osslsigncode Version 2.10
3 participants