This is a MSBuild custom task that provides batch signing and simple verification for MicroBuild environments. The tool is intended to be run as a post-build step and is able to automatically infer the files that need to be signed given a list of container files (.nupkg, .vsix, etc) as input. The high level features of this tool are:
- Performance: It operates as a post-build step and uses the minimum number of requests possible. This can have a dramatic performance improvement over the typical implementation which signs as a post-compile step. For example, in Roslyn it took build + sign times down from 1-2 hours to 8 minutes.
- Automated: It is able to recursively open container files (like .nupkg, .vsix) and create a list of nested files that need to be signed. Therefore, you don't need to manually specify which files need to be signed.
- Explicit Signing Info:
- The tool supports receiving an explicit list of files that need to be signed or ignored from the signing process.
- The tool support specifying which certificate should be used for each file and is able to identify files based on public key token, target framework, extension and file name.
- The tool will report an error if a signable file is discovered for which no signing information was found. That means that all signable files will need to be either explicitly ignored or have signing information attributed in one of the many ways explained below.
- Containers: It can handle the nesting issues that come with container files: both nested PE and nested containers. The tool will correctly sign the inner most content first, repack the containing package with the signed content and then sign the outermost container. Arbitrary levels of nesting are supported.
- Post signing checks: It takes extra steps to ensure that PE files are properly signed after the signing process completes. This tool parses the signed binary file to make sure the binary was modified and marked as signed.
- Dual certificates: The tool can receive a list of certificate descriptors which contain a property that can flag a certificate as dual. Dual certificates can be used to sign already signed files.
Name | Type | Description |
---|---|---|
DryRun | bool | When true the list of files to be signed will be created but won't be sent to the signing server. Default is false. |
TestSign | bool | When true the binaries will be test signed. The default is to real sign. |
DoStrongNameCheck | bool | When true binaries will be checked for valid strong name signature. The default is false. |
ItemsToSign | Array | This is a list of full path to files that need to be signed. Container files will be expanded to look for nested files that need to be signed. |
ItemsToSkipStrongNameCheck | Array | This is a list of file names that should be skipped when performing strong-name check. |
StrongNameSignInfo | Array | Should store the default certificate name and strong name to be used for a given Public Key Token. See details below. |
FileSignInfo | Array | Used to override the default certificate information for specific files and target frameworks combinations. If not specified default information is used or error occurs. See details below. |
FileExtensionSignInfo | Array | This is a mapping between extension (in the format ".ext") to default sign information for those kind of files. Overriding of the default sign info is done using the other parameters. |
CertificatesSignInfo | Array | List of certificate names that can be flagged using the DualSigningAllowed attribute as dual certificates. |
MicroBuildCorePath | Dir Path | Path to MicroBuild.Core package directory. |
MSBuildPath | Exe path | Path to the MSBuild.exe binary used to run the signing process on MicroBuild. |
SNBinaryPath | Exe path | Path to the sn.exe binary used to strong-name sign / validate signature of managed files. |
TempDir | Dir path | Used to store temporary files during the process of calling MicroBuild signing. |
LogDir | Dir path | MSBuild binary log information from the signing rounds will be stored in this directory. |
Note:
Items in bold are required: ItemsToSign
, MicroBuildCorePath
and TempDir
.
MSBuildPath
, SNBinaryPath
and LogDir
are only required if DryRun == false
.
StrongNameSignInfo - Optional parameter
This field requires the following metadata: PublicKeyToken
, CertificateName
and the Include
field is assumed to hold the Strong Name
. This information will be used as the default certificate and strong name information for all PE files that match the PublicKeyToken
.
FileExtensionSignInfo - Optional parameter
This field requires two metadata attributes: CertificateName
and Include
which should be a file extension in the format .ext
. This field is used to configure a default certificate for all files that have an specific extension.
CertificatesSignInfo - Optional parameter
This field requires the following metadata: DualSigningAllowed
(boolean) and Include
which is assumed to hold a valid certificate name. Use this list to explicitly configure the tool to allow the use of the specified certificate as a dual certificate - i.e., be able to use it to sign already signed files.
FileSignInfo - Optional parameter
This field accepts the following metadata: PublicKeyToken
(optional), CertificateName
, TargetFramework
(optional) and the Include
field is assumed to hold a file name (including extension; not a full path). The CertificateName
attribute accepts the value "None" to flag a file that should not be signed.
All files that match the provided combination will use the Signing information provided. This applies to files discovered during recursive signing.
ItemsToSign - Required parameter
This field only attribute should be Include
. This field holds a list of full path to files that need to be considered during the signing process. Path to containers and regular files are accepted. Containers will be opened and their content will be processed recursively.
The signing information (SI) for a given file is looked up in the order shown below. Later conditions override previous ones.
- A default SI is looked up on
FileExtensionSignInfo
based on the extension of the file. - If the file is a managed PE file, SI based on the file Public Key Token (and only on it) is looked up in the
StrongNameSignInfo
parameter. - If the file is a PE file (not necessarily managed), SI based on a combination of file name, public key token and target framework is looked up in
FileSignInfo
. If there is no match, then: - If the file is a PE file (not necessarily managed), SI based on a combination of file name and public key token is looked up in
FileSignInfo
. If there is no match, then: - SI based only on file name is looked up in
FileSignInfo
.
Note that the logic starts looking for SI on a broad scope and then looks for specific information for the file. Also, the last three conditions are mutually exclusive.
At the end, if the file is signable but no signing information was determined for the file an error message will be logged and execution is expected to fail.
The Arcade SDK include a set of predefined configurations for the SignTool in the Sign.proj file. However, you can override/remove/update any of these configurations by including a file named Signing.props
in the \eng\
folder of your repository. See examples on the next section.
Any 3rd party assembly which is distributed on public Microsoft feeds is supposed to be signed with the "3PartySHA2" certificate - a dual certificate. Arcade itself use the SignTool and as such the Arcade SDK is configured to dual sign 3rd party libraries that it uses. In case you need to sign 3rd party files take a look at how Arcade does it.
The Arcade SDK will include all NuGet packages from the $(ArtifactsPackagesDir)
and all VSIX packages from the$(VisualStudioSetupOutputPath)
folder (these properties are set here) in the list of containers to be looked up for - ItemsToSign
. Note that only projects marked with <IsPackable>true</IsPackable>
will be packed and copied to these folders.
The default configuration of Arcade SDK + SignTool also assigns default certificates to many signable file types and to all files that have the 31bf3856ad364e35
Public Key Token. Therefore, if all files that your repo need to sign are covered under these conditions you won't need to do any specific setup for the tool.
If you repo have signable files that have a different Public Key Token than the one preconfigured in the SDK (i.e., 31bf3856ad364e35
) you might add an entry to StrongNameSignInfo
to specify the certificate name that should be used for those files. To do that, place an entry like the one show below in your eng\Signing.props
file.
<ItemGroup>
<StrongNameSignInfo Include="StrongName1" PublicKeyToken="4321abcda1b2c3d4" CertificateName="DifferentCertName" />
</ItemGroup>
If that is your only custom configuration all files with that Public Key Token will be signed with the DifferentCertName
certificate and StrongName1
strong name.
It is possible to override the default signing information or explicitly skip signing for specific files. For that you need to use the FileSignInfo
property. For instance, in the snippet below the certificate MyCustomCert
will be used for My.Library.dll
when it targets .NETStandard,Version=v2.0
and has Public Key Token 31bf3856ad364e35
:
<ItemGroup>
<FileSignInfo Include="My.Library.dll" TargetFramework=".NETStandard,Version=v2.0" PublicKeyToken="31bf3856ad364e35" CertificateName="MyCustomCert" />
</ItemGroup>
In this snippet the library Other.Library.dll
with Public Key Token 31bf3856ad364e35
won't be signed, independent of its target framework:
<ItemGroup>
<FileSignInfo Include="Other.Library.dll" PublicKeyToken="31bf3856ad364e35" CertificateName="None" />
</ItemGroup>
To remove all preconfigured signing information put the following snippet in your eng\Signing.props
file:
<ItemGroup>
<!-- Remove all predefined dual certificate information -->
<CertificatesSignInfo Remove="@(CertificatesSignInfo)" />
<!-- Remove all automatically included packages -->
<ItemsToSign Remove="@(ItemsToSign)" />
<!-- Remove default signing for `31bf3856ad364e35` PKT -->
<StrongNameSignInfo Remove="@(StrongNameSignInfo)" />
<!-- Remove default signing for signable extensions -->
<FileExtensionSignInfo Remove="@(FileExtensionSignInfo)" />
</ItemGroup>
Assuming that you don't want to use any of the preconfigured information in the SDK and want to specify by yourself the list of files to be signed and the certificate to be used for each file, take a look at the example below:
<ItemGroup>
<!-- Remove all preconfigured signing info as shown above in (4). -->
<!-- My custom list of files to be signed -->
<ItemsToSign Include="c:\build\file1.dll" />
<ItemsToSign Include="c:\build\file2.ps1" />
<ItemsToSign Include="c:\build\file3.js" />
<ItemsToSign Include="c:\build\file4.nupkg" />
<!-- configure the certificate for each file -->
<FileSignInfo Include="file1.dll" CertificateName="DLLCert" />
<FileSignInfo Include="file2.ps1" CertificateName="PS1Cert" />
<FileSignInfo Include="file3.js" CertificateName="JSCert" />
<FileSignInfo Include="file4.nupkg" CertificateName="NuGet" />
<!-- Assuming this file is present in file4.nupkg -->
<!--
If we hadn't specified this information here the signing process
would fail because no signing information would be found for a
signable file (.dll)
-->
<FileSignInfo Include="nested.dll" CertificateName="DeepCert" />
</ItemGroup>
The tool assumes that you will be able to differentiate the files using name, public key token or target framework. If you have two files with the same name your only option (currently) is to differentiate them using public key token or target framework as below:
<ItemGroup>
<!-- Note that these are full paths -->
<ItemsToSign Include="c:\build\pack1\lib.dll" />
<ItemsToSign Include="c:\build\pack2\lib.dll" />
<ItemsToSign Include="c:\build\pack3\lib.dll" />
<!-- Note that here only file names + extension are used -->
<FileSignInfo Include="lib.dll"
CertificateName="File1Cert"
PublicKeyToken="a1b2c3d4e5f6g7h8"
TargetFramework=".NETStandard,Version=v2.0" />
<FileSignInfo Include="lib.dll"
CertificateName="File2Cert"
PublicKeyToken="abcdefghi12345678"
TargetFramework=".NETCore,Version=v2.0" />
<FileSignInfo Include="lib.dll"
CertificateName="File3Cert"
PublicKeyToken="abcdefghi12345678"
TargetFramework=".NETStandard,Version=v2.0" />
</ItemGroup>
Click here to see how the Arcade SDK calls the SignToolTask
. Here's a snippet:
...
<Microsoft.DotNet.SignTool.SignToolTask
DryRun="$(DryRun)"
TestSign="$(TestSign)"
CertificatesSignInfo="$(CertificatesSignInfo)"
ItemsToSign="@(ItemsToSign)"
StrongNameSignInfo="@(StrongNameSignInfo)"
FileSignInfo="@(FileSignInfo)"
FileExtensionSignInfo="@(FileExtensionSignInfo)"
TempDir="$(ArtifactsTmpDir)"
LogDir="$(ArtifactsLogDir)"
MSBuildPath="$(DesktopMSBuildPath)"
MicroBuildCorePath="$(NuGetPackageRoot)microbuild.core\$(MicroBuildCoreVersion)"/>
...
The log messages from the SignToolTask itself will be included in the log (+.binlog) of the original build process. The binary log of executing the MicroBuild signing plugin will be stored in files named SigningX.binlog
in the LogDir
folder. The project files used to call the MicroBuild plugin will be stored in files named RoundX.proj
in the TempDir
folder. In both cases the X
in the name refers to a signing round.
Certificate Name: name of the Authenticode certificate to use for signing. Valid values include Microsoft402
, WindowsPhone623
, MicrosoftSHA1Win8WinBlue
and VsixSHA2
.
Strong Name: name of the key to use when strong naming the binary. This can be null
for values which do not require strong name signing such as VSIX files.
Target Framework: valid values include (but are not limited to): .NETStandard,Version=v2.0
, .NETFramework,Version=v4.6.1
, .NET Core,Version=v2.0
, etc.
Public Key Token: valid values are 16 characters in length comprising values between [0-9]
and [a-Z]
.