Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(build): windows codesign #4824

Merged
merged 1 commit into from
Jun 24, 2022
Merged

fix(build): windows codesign #4824

merged 1 commit into from
Jun 24, 2022

Conversation

Swiftb0y
Copy link
Member

Alternative to #4823

Using digicert broke signing, using sectigo (the codesigning certificates issuer).

Screenshots from CI builds. I didn't actually test the CmakeLists changes because I don't have a windows build environment set up.

Before:
image
After:
image

@github-actions github-actions bot added the build label Jun 23, 2022
Copy link
Member

@daschuer daschuer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perfect, thank you for digging that down on a foreign OS

else()
set(WINDOWS_CODESIGN_ARGS /f ${WINDOWS_CODESIGN_CERTIFICATE_PATH} /p ${WINDOWS_CODESIGN_CERTIFICATE_PASSWORD} CACHE STRING "parameters for signtool (list)")
set(WINDOWS_CODESIGN_ARGS /td sha256 /fd sha256 /f ${WINDOWS_CODESIGN_CERTIFICATE_PATH} /p ${WINDOWS_CODESIGN_CERTIFICATE_PASSWORD} CACHE STRING "parameters for signtool (list)")
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I forgot to add /tr http://timestamp.sectigo.com
At least in those builds, they won't get countersigned.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants