Skip to content

Add MacOS signing #33

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open

Add MacOS signing #33

wants to merge 2 commits into from

Conversation

nmburgan
Copy link
Member

@nmburgan nmburgan commented May 1, 2025

This utilizes changes in Vanagon to enable signing locally, instead of shipping files to a signing server. Details for how to set this up given the appropriate certs/keys can be found on the wiki.

The vox:build task will sign the individual executables (puppet, pxp-agent, wrapper.sh) inside the package. The vox:sign task will sign the package inside the dmg, and then create a new dmg with the signed package in the "signed" directory.

This also removes the "commit" PR check, since we don't require adding ticket numbers or (maint) to each commit message like Perforce does.

This utilizes changes in Vanagon to enable signing locally, instead of shipping files to a signing server. Details for how to set this up given the appropriate certs/keys can be found on the wiki.

The vox:build task will sign the individual executables (puppet, pxp-agent, wrapper.sh) inside the package. The vox:sign task will sign the package inside the dmg, and then create a new dmg with the signed package in the "signed" directory.
proj.signing_username 'jenkins'
proj.signing_command 'security -q unlock-keychain -p \$$OSX_SIGNING_KEYCHAIN_PW \$$OSX_SIGNING_KEYCHAIN; codesign --timestamp --keychain \$$OSX_SIGNING_KEYCHAIN -vfs \"\$$OSX_CODESIGNING_CERT\"'
proj.use_local_signing true
proj.signing_command 'codesign --timestamp --keychain $$OSX_SIGNING_KEYCHAIN -vfs "$$OSX_CODESIGNING_CERT"'
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Because I have it set up to run as root and imported into the System keychain on my VM, we don't need to specifically unlock the keychain. Later on, when we move this into GHA, we may want a separate keychain, or we may end up doing this entirely differently.

This is checking for the presence of ticket names or (maint) in the commit message, as per Perforce policy. We don't use that, so removing it.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant