-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to sign ClickOnce manifests since commit 6584f5d (KeyVault with HSM storage) #753
Comments
Can you confirm if PR #755 solves your issue? I am unable to test this properly myself because I no longer have a valid certificate in my Azure key vault. |
Hello again @dlemstra. I performed more debugging today and I think I’ve found the issue. It looks like the Azure.Security.KeyVault.Keys package requires the Without this permission, when KeyVaultService.GetRsaAsync calls internally CryptographyClient.InitializeAsync, it triggers a I added the permission and tried again with version If that makes sense, you may want to update the minimum permissions in best-practices. Thanks! |
Thanks for helping us with this and coming back with a detailed explanation |
@pjobin-semex, thanks for opening this issue and your detailed investigation. I updated documentation on necessary permissions. |
I wanted to add onto this that this only works if your key vault is using Access Policies. If your key vault is using RBAC, or Access control (IAM), following this will result in all accounts configured with roles to be locked out. The short of it is that we have a custom role for a custom automated application used for code signing that has the following three permissions. We had to add {
"id": "/subscriptions/***SECRET***/providers/Microsoft.Authorization/roleDefinitions/***SECRET***",
"properties": {
"roleName": "Code Signing Operator",
"description": "Enables getting Certificates and signing with Keys",
"assignableScopes": [
"/subscriptions/***SECRET***/resourceGroups/ResourceGroup"
],
"permissions": [
{
"actions": [],
"notActions": [],
"dataActions": [
"Microsoft.KeyVault/vaults/keys/read",
"Microsoft.KeyVault/vaults/keys/sign/action",
"Microsoft.KeyVault/vaults/certificates/read"
],
"notDataActions": []
}
]
}
} I don't know what the minimum built-in roles are to meet these requirements, but I believe Admittedly, I'm generally very lost when it comes to this code signing business and I was very confused as to why I was able to test the |
We use a GlobalSign EV CodeSign Cert stored in a premium Key Vault (HSM storage).
Since commit 6584f5d the process crashes while signing a ClickOnce manifest:
Everything works properly when we use the previous version at commit 74cd61f.
Additional context
The text was updated successfully, but these errors were encountered: