From 4ce4fbcbd1e274139de5501f7089487860f25c2b Mon Sep 17 00:00:00 2001 From: Paul Savoie Date: Wed, 4 Dec 2024 11:35:09 +0100 Subject: [PATCH] changes for release 3.0 --- Jenkinsfile.executable.release-signing | 4 ---- Jenkinsfile.executable.test-signing | 4 ---- Jenkinsfile.installer.release-signing | 4 ---- Jenkinsfile.installer.test-signing | 4 ---- Jenkinsfile.installer.test-signing.api_token | 4 ---- README.md | 2 +- 6 files changed, 1 insertion(+), 21 deletions(-) diff --git a/Jenkinsfile.executable.release-signing b/Jenkinsfile.executable.release-signing index 6b3eaed..179b693 100644 --- a/Jenkinsfile.executable.release-signing +++ b/Jenkinsfile.executable.release-signing @@ -1,10 +1,8 @@ pipeline { agent any parameters { - string(name: 'API_URL', defaultValue: 'https://app.signpath.io/api') string(name: 'ORGANIZATION_ID', defaultValue: '') string(name: 'API_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.ExecutableProject.ApiToken') - string(name: 'TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.TrustedBuildSystemToken') } stages { stage('Build') { @@ -21,10 +19,8 @@ pipeline { steps { script { signingRequestId = submitSigningRequest( - apiUrl: "${params.API_URL}", organizationId: "${params.ORGANIZATION_ID}", apiTokenCredentialId: "${params.API_TOKEN_CREDENTIAL_ID}", - trustedBuildSystemTokenCredentialId: "${params.TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID}", projectSlug: "executable", signingPolicySlug: "release-signing", inputArtifactPath: "build-output/unsigned/executable.exe", diff --git a/Jenkinsfile.executable.test-signing b/Jenkinsfile.executable.test-signing index 090dfeb..fbae507 100644 --- a/Jenkinsfile.executable.test-signing +++ b/Jenkinsfile.executable.test-signing @@ -1,10 +1,8 @@ pipeline { agent any parameters { - string(name: 'API_URL', defaultValue: 'https://app.signpath.io/api') string(name: 'ORGANIZATION_ID', defaultValue: '') string(name: 'API_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.ExecutableProject.ApiToken') - string(name: 'TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.TrustedBuildSystemToken') } stages { stage('Build') { @@ -20,10 +18,8 @@ pipeline { stage('Sign with SignPath') { steps { submitSigningRequest( - apiUrl: "${params.API_URL}", organizationId: "${params.ORGANIZATION_ID}", apiTokenCredentialId: "${params.API_TOKEN_CREDENTIAL_ID}", - trustedBuildSystemTokenCredentialId: "${params.TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID}", projectSlug: "executable", signingPolicySlug: "test-signing", inputArtifactPath: "build-output/unsigned/executable.exe", diff --git a/Jenkinsfile.installer.release-signing b/Jenkinsfile.installer.release-signing index a8d2dc3..13a537d 100644 --- a/Jenkinsfile.installer.release-signing +++ b/Jenkinsfile.installer.release-signing @@ -1,10 +1,8 @@ pipeline { agent any parameters { - string(name: 'API_URL', defaultValue: 'https://app.signpath.io/api') string(name: 'ORGANIZATION_ID', defaultValue: '') string(name: 'API_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.InstallerProject.ApiToken') - string(name: 'TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.TrustedBuildSystemToken') } stages { stage('Build') { @@ -21,10 +19,8 @@ pipeline { steps { script { signingRequestId = submitSigningRequest( - apiUrl: "${params.API_URL}", organizationId: "${params.ORGANIZATION_ID}", apiTokenCredentialId: "${params.API_TOKEN_CREDENTIAL_ID}", - trustedBuildSystemTokenCredentialId: "${params.TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID}", projectSlug: "installer", signingPolicySlug: "release-signing", inputArtifactPath: "build-output/unsigned/installer.msi", diff --git a/Jenkinsfile.installer.test-signing b/Jenkinsfile.installer.test-signing index b3df255..7740e53 100644 --- a/Jenkinsfile.installer.test-signing +++ b/Jenkinsfile.installer.test-signing @@ -1,10 +1,8 @@ pipeline { agent any parameters { - string(name: 'API_URL', defaultValue: 'https://app.signpath.io/api') string(name: 'ORGANIZATION_ID', defaultValue: '') string(name: 'API_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.InstallerProject.ApiToken') - string(name: 'TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.TrustedBuildSystemToken') } stages { stage('Build') { @@ -20,10 +18,8 @@ pipeline { stage('Sign with SignPath') { steps { submitSigningRequest( - apiUrl: "${params.API_URL}", organizationId: "${params.ORGANIZATION_ID}", apiTokenCredentialId: "${params.API_TOKEN_CREDENTIAL_ID}", - trustedBuildSystemTokenCredentialId: "${params.TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID}", projectSlug: "installer", signingPolicySlug: "test-signing", inputArtifactPath: "build-output/unsigned/installer.msi", diff --git a/Jenkinsfile.installer.test-signing.api_token b/Jenkinsfile.installer.test-signing.api_token index 75ace3c..9b22c16 100644 --- a/Jenkinsfile.installer.test-signing.api_token +++ b/Jenkinsfile.installer.test-signing.api_token @@ -1,10 +1,8 @@ pipeline { agent any parameters { - string(name: 'API_URL', defaultValue: 'https://app.signpath.io/api') string(name: 'ORGANIZATION_ID', defaultValue: '') string(name: 'CI_USER_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.InstallerProject.CIUserToken') - string(name: 'TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID', defaultValue: 'SignPath.TrustedBuildSystemToken') } stages { stage('Build') { @@ -21,10 +19,8 @@ pipeline { steps { sh 'curl -o build-output/unsigned/bigArtifact.exe https://www.rubicon.eu/downloads/26bb711a-5771-49fb-b41c-cdb2e48243ee/SFX_512MB.exe' submitSigningRequest( - apiUrl: "${params.API_URL}", organizationId: "${params.ORGANIZATION_ID}", apiTokenCredentialId: "${params.CI_USER_TOKEN_CREDENTIAL_ID}", - trustedBuildSystemTokenCredentialId: "${params.TRUSTED_BUILD_SYSTEM_TOKEN_CREDENTIAL_ID}", projectSlug: "installer", signingPolicySlug: "test-signing", inputArtifactPath: "build-output/unsigned/bigArtifact.exe", diff --git a/README.md b/README.md index 5e77c1b..bab646f 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ Preview sample of [Jenkins SignPath Plugin](https://github.com/jenkinsci/signpat # Demo -1. Install the Jenkins CIConnector Plugin +1. Install the [Code Signing with SignPath Jenkins Plugin](https://plugins.jenkins.io/signpath/) 2. Add `SignPath.TrustedBuildSystemToken` (Scope: System) and `SignPath.ExecutableProject.ApiToken` (Scope: Global) 3. Create a new Pipeline `Sign Executable (test-signing)` * Add a parameter `ORGANIZATION_ID` with the org id as default