Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release/6.0-rc2] [workloads] Use the dual signed wix version for workload msis #59501

Merged
merged 1 commit into from
Sep 23, 2021

Conversation

github-actions[bot]
Copy link
Contributor

@github-actions github-actions bot commented Sep 22, 2021

Backport of #59500 to release/6.0-rc2

/cc @lewing

rc2 fix for #59498

From that issue:

Description: Some customers have strict CI policies around Device Guard. Even though WiX binaries are signed with the .NET Foundation authenticode certificates, the root certificate may not be in the allow list. Some customers do not want to add custom exclusions or install additional certificates on their machines.

To mitigate this, we've dual signed the WiX binaries with the Microsoft 3rd Party App SHA2 authenticode certificate in addition to the .NET Foundation SHA2

Impact: Installers that rely on built-in custom actions from WiX as well as some binaries that ship in the standalone bundles.

Risk: Low

Repos: This change is required in both dotnet/runtime and dotnet/emsdk (We cannot open issues there as it's a fork)

Release: 6.0 RC2

Notes: This has been on tactics' radar for the last two weeks and already agreed to do this for RC2 so we have time to react to any issues before GA.

We have both a nupkg and .zip available. See dotnet/installer#12078 for an example. Note that the package ID have changed. The version tracks both the internal build and the WiX release so we can better manage rebuilds of the package or taking new releases from WiX.

@ghost
Copy link

ghost commented Sep 22, 2021

Tagging subscribers to this area: @Anipik, @safern, @ViktorHofer
See info in area-owners.md if you want to be subscribed.

Issue Details

Backport of #59500 to release/6.0-rc2

/cc @lewing

Customer Impact

Testing

Risk

Author: github-actions[bot]
Assignees: -
Labels:

area-Infrastructure-libraries

Milestone: -

@lewing lewing requested review from joeloff and directhex September 22, 2021 20:36
@steveisok steveisok self-requested a review September 23, 2021 15:46
@mmitche mmitche merged commit 1d67e27 into release/6.0-rc2 Sep 23, 2021
@lewing lewing deleted the backport/pr-59500-to-release/6.0-rc2 branch September 23, 2021 19:58
@ghost ghost locked as resolved and limited conversation to collaborators Nov 3, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants