Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(appium): test certificate without builiding #684

Closed
wants to merge 22 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
22 commits
Select commit Hold shift + click to select a range
ef3e1bf
chore(appium): test certificate without builiding
luisecm Apr 23, 2024
4ee28bf
chore(appium): change name of installer
luisecm Apr 23, 2024
1f50f41
chore(appium): add installer file
luisecm Apr 23, 2024
8d05c0e
chore(appium): update path for signing
luisecm Apr 23, 2024
907f600
chore(appium): use same gh action for signing
luisecm Apr 23, 2024
bf7c5e6
chore(appium): use same gh action for signing
luisecm Apr 23, 2024
3942562
chore(appium): use same gh action for signing
luisecm Apr 23, 2024
dc1f072
chore(appium): update certificate p12 file
luisecm Apr 23, 2024
05b83f9
chore(appium): test using pfx file
luisecm Apr 24, 2024
87ba980
chore(appium): use steps from digicert for signing
luisecm Apr 25, 2024
cec24e3
chore(appium): update setup certificate step
luisecm Apr 25, 2024
5dd13e7
chore(appium): update setup certificate step
luisecm Apr 25, 2024
a1b0941
chore(appium): update setup certificate step
luisecm Apr 25, 2024
2daa95a
chore(appium): add verbose debug options
luisecm Apr 25, 2024
e2156b4
chore(appium): modify command for signtool
luisecm Apr 25, 2024
ab18832
chore(appium): modify command for signtool
luisecm Apr 25, 2024
143d142
Merge branch 'dev' into luis/test-certificate-2
luisecm Apr 25, 2024
aaea0a9
chore(appium): use pfx base 64 encoded cer files
luisecm Apr 26, 2024
c79d083
chore(appium): use pfx base 64 encoded cer files
luisecm Apr 29, 2024
1cc7ca0
chore(appium): try workflow with new variables
luisecm Apr 30, 2024
a0e1bf4
chore(appium): use luis data to sign
luisecm May 2, 2024
57e7e7f
chore(appium): remove deprecated set output from workflow
luisecm May 3, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
62 changes: 62 additions & 0 deletions .github/workflows/test-certificate.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,62 @@
name: Test Windows Certificate πŸ§ͺ

on:
pull_request:
types: [opened, synchronize, reopened, edited]

jobs:
temp-windows:
runs-on:
labels: windows-latest

steps:
- name: Checkout Directory πŸ”–
uses: actions/checkout@v4

- name: Setup Certificate
run: |
echo "${{ secrets.SM_CLIENT_CERT_FILE_B64 }}" | base64 --decode > /d/certificate.p12
shell: bash

- name: Set variables
id: variables
run: |
dir
echo "version=${GITHUB_REF#refs/tags/v}" >> $GITHUB_OUTPUT
echo "KEYPAIR_NAME=gt-standard-keypair" >> $GITHUB_OUTPUT
echo "CERTIFICATE_NAME=gt-certificate" >> $GITHUB_OUTPUT
echo "SM_HOST=${{ secrets.SM_HOST }}" >> "$GITHUB_ENV"
echo "SM_API_KEY=${{ secrets.SM_API_KEY }}" >> "$GITHUB_ENV"
echo "SM_CLIENT_CERT_FILE=D:\\certificate.p12" >> "$GITHUB_ENV"
echo "SM_CLIENT_CERT_PASSWORD=${{ secrets.SM_CLIENT_CERT_PASSWORD }}" >> "$GITHUB_ENV"
echo "C:\Program Files (x86)\Windows Kits\10\App Certification Kit" >> $GITHUB_PATH
echo "C:\Program Files (x86)\Microsoft SDKs\Windows\v10.0A\bin\NETFX 4.8 Tools" >> $GITHUB_PATH
echo "C:\Program Files\DigiCert\DigiCert Keylocker Tools" >> $GITHUB_PATH
shell: bash

- name: Setup Keylocker KSP on windows
run: |
curl -X GET https://one.digicert.com/signingmanager/api-ui/v1/releases/Keylockertools-windows-x64.msi/download -H "x-api-key:%SM_API_KEY%" -o Keylockertools-windows-x64.msi
msiexec /i Keylockertools-windows-x64.msi /quiet /qn
smksp_registrar.exe list
smctl.exe keypair ls
C:\Windows\System32\certutil.exe -csp "DigiCert Signing Manager KSP" -key -user
shell: cmd

- name: Certificates Sync
run: |
smctl windows certsync
shell: cmd

- name: Signing using Signtool
run: |
signtool.exe sign /debug /sha1 ${{ secrets.SM_CODE_SIGNING_CERT_SHA1_HASH }} /tr http://timestamp.digicert.com /td SHA256 /fd SHA256 "./target/wix/*.msi"

- name: Verify signing
run: signtool.exe verify /v /pa "./target/wix/*.msi"

- name: Upload Executable ⬆️
uses: actions/upload-artifact@v4
with:
name: Uplink-windows-test
path: target/wix/*.msi
Binary file added target/wix/uplink-1.0.3-x86_64.msi
Binary file not shown.
Loading