Closed KazuCocoa closed 2 weeks ago
Are the test runs already using the OpenJS certificates? I downloaded the macOS artifact and installed the arm64 dmg file, but it was still returning the same warning about Apple being unable to check it for malicious software. Unsure if this is to be expected.
We will also need to disable the runs in Azure, but I guess that can only be done in the Azure configuration.
Are the test runs already using the OpenJS certificates?
Only https://github.com/appium/appium-inspector/actions/runs/11700110550 , yes. This PR's description is by the package. Other old ones did not have the certificate secrets.
Unsure if this is to be expected.
Well, even dmg, I think downloaded content from the internet will be handled as malicious software. Possibly downloaded via GitHub release page is different, though. Invalid certificate case is addressed as a "damaged" content ( https://github.com/appium/appium-inspector/actions/runs/11699133241 is not openjs's one), so I think the certificate itself is fine.
We will also need to disable the runs in Azure, but I guess that can only be done in the Azure configuration.
Yea, this PR merge will remove the script for Azure, so after this merge, Azure's script will not run. I'll remove Azure's pipeline itself from the web page after confirming this via GHA package release work
@eglitise @KazuCocoa i think we need to do 'notarization' in addition to code signing to do away with that warning. I think I have the details from OpenJS necessary to make this happen, but not sure how to do the technical notarization steps with electron-builder.
I just tried with the Windows app. The executable is certainly signed now, unlike the current release (on the right): However, if I look at the signing details, Windows still thinks there's something missing: Not entirely sure if this causes issues during installation, though - I did get the same Windows Defender SmartScreen warning on first open, but it's possible that I downloaded the artifact from 'Create packages' run 2 (which was not signed), and I cannot get the popup again with either the run 2 or run 3 artifacts.
Maybe we could create a version with the current Azure config, which has the same signature once and compare this result with it
with the current Azure config, which has the same signature
Do you mean that the new OpenJS certificates were also added to Azure? If not, then the version built there will be completely unsigned, like in my first screenshot.
Yea. I have updated Azure's CSC_LINK
and CSC_KEY_PASSWORD
with latest one we recently obtained. So this script and Azure only have differences in the destination of content upload.
Then, this PR itself can be merged and what we need to do here (potentially) is the certificate notarization as a followup PR to env var update later?
Sounds good 👍
FWIW we do not have new windows certs at all. Only macOS certs were provided so far. So it's not surprising that windows doesn't work.
Let me release a new version with this by adding a tag
https://github.com/appium/appium-inspector/releases/tag/untagged-38ffb8027be18a982f9d @jlipps @eglitise, how do we currently update the release note? Manual or script...?
Packages look fine.
I do it manually. Not sure if it was worth running a release just for this though, since there's not really any other changes.
@jlipps could we also get Windows certs? I think both would be equally important for improving the installation UX.
Yes, I will kick off the process for Windows certs with OpenJSF
I have removed the Azure project. So from now on, our package creation env can be managed in this repository config (env var etc) only
e.g. https://github.com/appium/appium-inspector/actions/runs/11700110550