This action signs files that are supported by signtool.exe
with a key hosted on google KMS. This enables EV code-signing certificates to be used in a CI pipeline. It only works on Windows and should run on windows-latest
.
This is a forked/cloudified version of dlemstra/code-sign-action/
Required The base64 encoded certificate chain in PEM format.
Required The google KMS resource ID to use.
Required The base64 encoded JSON credentials to use.
Optional The RFC3161 timestamping server URL to use (or an empty string if no timestamping is required).
Optional The /d parameter of signtool.exe.
Optional The /du parameter of signtool.exe.
Optional The /ph and /nph parameter of signtool.exe.
Required The folder that contains the libraries to sign.
Optional Recursively search for DLL files.
runs-on: windows-latest
steps:
uses: nextgens/authenticode-sign-action@v1.0.1
with:
certificate: '${{ secrets.CERTIFICATES }}'
key-uri: 'projects/myProject/locations/europe-west2/keyRings/code-signing/cryptoKeys/ev/cryptoKeyVersions/1'
credentials: '${{ secrets.GOOGLE_APPLICATION_CREDENTIALS }}'
timestamp-url: 'http://timestamp.digicert.com'
description: ''
description-url: ''
page-hash: true
folder: 'files'
recursive: true