Update (2024-09): Azure now offers Trusted Signing which is much simpler to set up and use. I was able to sign within 5 minutes of entering my company details. However this is again limited to companies, is not a direct swap for EV signing at this time.
This post throws you in at the deep end. There’s an excellent blog by Sudara on EV signing in Github actions.
I’ve broken this down into a few sections, as depending on where you’re at you might already have a certificate and just want to get to the Github Action workflow, or you might be stumbling your way through it like I did the first time.
The short of it is, yes you can sign your Tauri application in Github actions using a Cloud HSM provider (Azure) and a certificate authority (GlobalSign).
Sudara mentions that there are a few Cloud HSM services, but it looks like things have changed a little since the blog was originally written. With AWS offerring CloudHSM to complement the offerings from Azure & GCP.
Some providers offer special ceremonies for a nice added fee. I’ve seen these for AWS and GCP.
I stuck with GlobalSign, it was (fairly) clear that they could work with Azure. I could not say the same about the other providers. The other downside to the other providers is finding a reliable way to make it work with Github Actions. At least now with Microsoft’s ownership of the signing toolchain, Github, and Azure, it seems like they should all work together smoothly.
I ordered the ‘Extended Validation (EV) Code Signing (HSM)’. There were some issues paying for it, so you might end up having to call them, but everyone I spoke to was very friendly and the process quick.
So what now? This may vary dependent on several factors such as where the company you’re applying for is based, the age of the company, how it is listed, which way the wind is blowing, etc.
You will need:
For companies under 3 years old you’ll also need:
I had a certificate in under a week, but I had my colleagues scrambling to get information, phone numbers redirected, accountants looped in, etc. to ensure we worked our way through it as quickly as possible.
Well, not quite. Time to set up Azure and pick up your certificate. When I tried there was this promising shaped button that said something like ‘Add certificates in Key Vault issued by partnered CAs’, and there was even a neat guide. Which of course didn’t work, and instead threw an error. So instead I followed the guide from Sudara but let’s face it, it’ll be different when you try. Good luck.
Once the certificate is set up, continue to follow the guide from Sudara. Assuming you have a Tauri app you can stop before step 6 ‘Package things up’.
Now it’s just time to sign:
gist:MGough/afb1386176f84a0221d27f6c20f65961#tauri_ev.yaml
That should do it 🙂.
This job runs a matrix despite it only being one OS, but who cares, you’ll probably end up adding another OS soon enough!
I’d recommend injecting version numbers, other secrets, etc. and potentially making this a workflow dispatch job, rather than on push so you can re-use it as a template. All that’s really missing though is uploading your artifacts somewhere at the end!
Cover photo by Phil Shaw on Unsplash
Rope Swing photo by Jakob Owens on Unsplash