diff --git a/README.md b/README.md
index 52ef76f7..92a1823d 100644
--- a/README.md
+++ b/README.md
@@ -32,6 +32,7 @@ Jsign is free to use and licensed under the [Apache License version 2.0](https:/
* Cloud key management systems:
* [AWS KMS](https://aws.amazon.com/kms/)
* [Azure Key Vault](https://azure.microsoft.com/services/key-vault/)
+ * [Azure Trusted Signing](https://learn.microsoft.com/en-us/azure/trusted-signing/)
* [DigiCert ONE](https://one.digicert.com)
* [Google Cloud KMS](https://cloud.google.com/security-key-management)
* [HashiCorp Vault](https://www.vaultproject.io/)
@@ -51,6 +52,7 @@ See https://ebourg.github.io/jsign for more information.
#### Version 6.1 (in development)
+* The Azure Trusted Signing service has been integrated
* The Oracle Cloud signing service has been integrated
* Signing of NuGet packages has been implemented (contributed by Sebastian Stamm)
* Jsign now checks if the certificate subject matches the app manifest publisher before signing APPX/MSIX packages
diff --git a/docs/index.html b/docs/index.html
index 205df81e..083881c3 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -70,6 +70,7 @@
Features
No, automatically detected for file based keystores. |
@@ -472,6 +474,7 @@ Command Line Tool
- GOOGLECLOUD: Google Cloud KMS
- HASHICORPVAULT: Google Cloud KMS via HashiCorp Vault
- ORACLECLOUD: Oracle Cloud Key Management Service
+ - TRUSTEDSIGNING: Azure Trusted Signing
-a,--alias <NAME> The alias of the certificate used for signing in the keystore.
--keypass <PASSWORD> The password of the private key. When using a keystore,
this parameter can be omitted if the keystore shares the
@@ -641,6 +644,35 @@ Signing with Azure Key Vault
The Azure account used must have the "Key Vault Crypto User" and "Key Vault Certificate User" roles.
+Signing with Azure Trusted Signing
+
+With the Azure Trusted Signing service
+the keystore
parameter specifies the endpoint URI, and the alias
combines the account name and
+the certificate profile. The Azure API access token is used as the keystore password.
+
+
+ jsign --storetype TRUSTEDSIGNING \
+ --keystore weu.codesigning.azure.net \
+ --storepass <api-access-token> \
+ --alias <account>/<profile> application.exe
+
+
+The access token can be obtained with the Azure CLI:
+
+
+ az account get-access-token --resource https://codesigning.azure.net
+
+
+The Azure account used must have the "Code Signing Certificate Profile Signer" role.
+
+The certificates issued by Azure Trusted Signing have a lifetime of 3 days only, and timestamping is necessary to
+ensure the long term validity of the signature. For this reason timestamping is automatically enabled when signing
+with this service.
+
+Implementation note: Jsign performs an extra call to the signing API to retrieve the current certificate chain before
+signing. When signing multiple files it's recommended to invoke Jsign only once with the list of files to avoid doubling
+the quota usage.
+
Signing with DigiCert ONE
Certificates and keys stored in the DigiCert ONE Secure Software Manager
diff --git a/jsign-cli/src/main/java/net/jsign/JsignCLI.java b/jsign-cli/src/main/java/net/jsign/JsignCLI.java
index f57b4f14..089329d5 100644
--- a/jsign-cli/src/main/java/net/jsign/JsignCLI.java
+++ b/jsign-cli/src/main/java/net/jsign/JsignCLI.java
@@ -78,7 +78,8 @@ public static void main(String... args) {
+ "- ESIGNER: SSL.com eSigner\n"
+ "- GOOGLECLOUD: Google Cloud KMS\n"
+ "- HASHICORPVAULT: Google Cloud KMS via HashiCorp Vault\n"
- + "- ORACLECLOUD: Oracle Cloud Key Management Service\n").build());
+ + "- ORACLECLOUD: Oracle Cloud Key Management Service\n"
+ + "- TRUSTEDSIGNING: Azure Trusted Signing\n").build());
options.addOption(Option.builder("a").hasArg().longOpt(PARAM_ALIAS).argName("NAME").desc("The alias of the certificate used for signing in the keystore.").build());
options.addOption(Option.builder().hasArg().longOpt(PARAM_KEYPASS).argName("PASSWORD").desc("The password of the private key. When using a keystore, this parameter can be omitted if the keystore shares the same password.").build());
options.addOption(Option.builder().hasArg().longOpt(PARAM_KEYFILE).argName("FILE").desc("The file containing the private key. PEM and PVK files are supported. ").type(File.class).build());
diff --git a/jsign-core/src/main/java/net/jsign/KeyStoreType.java b/jsign-core/src/main/java/net/jsign/KeyStoreType.java
index 36eab934..c30bf05c 100644
--- a/jsign-core/src/main/java/net/jsign/KeyStoreType.java
+++ b/jsign-core/src/main/java/net/jsign/KeyStoreType.java
@@ -37,6 +37,7 @@
import net.jsign.jca.AmazonCredentials;
import net.jsign.jca.AmazonSigningService;
import net.jsign.jca.AzureKeyVaultSigningService;
+import net.jsign.jca.AzureTrustedSigningService;
import net.jsign.jca.DigiCertOneSigningService;
import net.jsign.jca.ESignerSigningService;
import net.jsign.jca.GoogleCloudSigningService;
@@ -469,6 +470,30 @@ Provider getProvider(KeyStoreBuilder params) {
}
return new SigningServiceJcaProvider(new OracleCloudSigningService(credentials, getCertificateStore(params)));
}
+ },
+
+ /**
+ * Azure Trusted Signing Service. The keystore parameter specifies the API endpoint (for example
+ * weu.codesigning.azure.net
). The Azure API access token is used as the keystore password,
+ * it can be obtained using the Azure CLI with:
+ *
+ *
az account get-access-token --resource https://codesigning.azure.net
+ */
+ TRUSTEDSIGNING(false, false, false) {
+ @Override
+ void validate(KeyStoreBuilder params) {
+ if (params.keystore() == null) {
+ throw new IllegalArgumentException("keystore " + params.parameterName() + " must specify the Azure endpoint (.codesigning.azure.net)");
+ }
+ if (params.storepass() == null) {
+ throw new IllegalArgumentException("storepass " + params.parameterName() + " must specify the Azure API access token");
+ }
+ }
+
+ @Override
+ Provider getProvider(KeyStoreBuilder params) {
+ return new SigningServiceJcaProvider(new AzureTrustedSigningService(params.keystore(), params.storepass()));
+ }
};
diff --git a/jsign-core/src/main/java/net/jsign/SignerHelper.java b/jsign-core/src/main/java/net/jsign/SignerHelper.java
index 6e661e79..d4549700 100644
--- a/jsign-core/src/main/java/net/jsign/SignerHelper.java
+++ b/jsign-core/src/main/java/net/jsign/SignerHelper.java
@@ -384,6 +384,13 @@ private AuthenticodeSigner build() throws SignerException {
} catch (Exception e) {
throw new SignerException("Couldn't initialize proxy", e);
}
+
+ // enable timestamping with Azure Trusted Signing
+ if (tsaurl == null && storetype == KeyStoreType.TRUSTEDSIGNING) {
+ tsaurl = "http://timestamp.acs.microsoft.com/";
+ tsmode = TimestampingMode.RFC3161.name();
+ tsretries = 3;
+ }
// configure the signer
return new AuthenticodeSigner(chain, privateKey)
diff --git a/jsign-core/src/main/java/net/jsign/jca/AzureTrustedSigningService.java b/jsign-core/src/main/java/net/jsign/jca/AzureTrustedSigningService.java
new file mode 100644
index 00000000..6f247d56
--- /dev/null
+++ b/jsign-core/src/main/java/net/jsign/jca/AzureTrustedSigningService.java
@@ -0,0 +1,189 @@
+/**
+ * Copyright 2024 Emmanuel Bourg
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package net.jsign.jca;
+
+import java.io.ByteArrayInputStream;
+import java.io.IOException;
+import java.security.GeneralSecurityException;
+import java.security.InvalidAlgorithmParameterException;
+import java.security.KeyStoreException;
+import java.security.UnrecoverableKeyException;
+import java.security.cert.Certificate;
+import java.security.cert.CertificateException;
+import java.security.cert.CertificateFactory;
+import java.util.ArrayList;
+import java.util.Base64;
+import java.util.Collection;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+
+import com.cedarsoftware.util.io.JsonWriter;
+
+import net.jsign.DigestAlgorithm;
+
+/**
+ * Signing service using the Azure Trusted Signing API.
+ *
+ * @since 6.1
+ */
+public class AzureTrustedSigningService implements SigningService {
+
+ /** Cache of certificate chains indexed by alias */
+ private final Map certificates = new HashMap<>();
+
+ private final RESTClient client;
+
+ /** Timeout in seconds for the signing operation */
+ private long timeout = 60;
+
+ /**
+ * Mapping between Java and Azure signing algorithms.
+ * @see Key Vault API - JonWebKeySignatureAlgorithm
+ */
+ private final Map algorithmMapping = new HashMap<>();
+ {
+ algorithmMapping.put("SHA256withRSA", "RS256");
+ algorithmMapping.put("SHA384withRSA", "RS384");
+ algorithmMapping.put("SHA512withRSA", "RS512");
+ algorithmMapping.put("SHA256withECDSA", "ES256");
+ algorithmMapping.put("SHA384withECDSA", "ES384");
+ algorithmMapping.put("SHA512withECDSA", "ES512");
+ algorithmMapping.put("SHA256withRSA/PSS", "PS256");
+ algorithmMapping.put("SHA384withRSA/PSS", "PS384");
+ algorithmMapping.put("SHA512withRSA/PSS", "PS512");
+ }
+
+ public AzureTrustedSigningService(String endpoint, String token) {
+ if (!endpoint.startsWith("http")) {
+ endpoint = "https://" + endpoint;
+ }
+ client = new RESTClient(endpoint, conn -> conn.setRequestProperty("Authorization", "Bearer " + token));
+ }
+
+ void setTimeout(int timeout) {
+ this.timeout = timeout;
+ }
+
+ @Override
+ public String getName() {
+ return "TrustedSigning";
+ }
+
+ @Override
+ public List aliases() throws KeyStoreException {
+ return new ArrayList<>();
+ }
+
+ @Override
+ public Certificate[] getCertificateChain(String alias) throws KeyStoreException {
+ if (!certificates.containsKey(alias)) {
+ try {
+ String account = alias.substring(0, alias.indexOf('/'));
+ String profile = alias.substring(alias.indexOf('/') + 1);
+ SignStatus status = sign(account, profile, "RS256", new byte[32]);
+ certificates.put(alias, status.getCertificateChain().toArray(new Certificate[0]));
+ } catch (Exception e) {
+ throw new KeyStoreException("Unable to retrieve the certificate chain '" + alias + "'", e);
+ }
+ }
+
+ return certificates.get(alias);
+ }
+
+ @Override
+ public SigningServicePrivateKey getPrivateKey(String alias, char[] password) throws UnrecoverableKeyException {
+ return new SigningServicePrivateKey(alias, "RSA", this);
+ }
+
+ @Override
+ public byte[] sign(SigningServicePrivateKey privateKey, String algorithm, byte[] data) throws GeneralSecurityException {
+ String alg = algorithmMapping.get(algorithm);
+ if (alg == null) {
+ throw new InvalidAlgorithmParameterException("Unsupported signing algorithm: " + algorithm);
+ }
+
+ DigestAlgorithm digestAlgorithm = DigestAlgorithm.of(algorithm.substring(0, algorithm.toLowerCase().indexOf("with")));
+ data = digestAlgorithm.getMessageDigest().digest(data);
+
+ String alias = privateKey.getId();
+ String account = alias.substring(0, alias.indexOf('/'));
+ String profile = alias.substring(alias.indexOf('/') + 1);
+ try {
+ SignStatus status = sign(account, profile, alg, data);
+ return status.signature;
+ } catch (IOException e) {
+ throw new GeneralSecurityException(e);
+ }
+ }
+
+ private SignStatus sign(String account, String profile, String algorithm, byte[] data) throws IOException {
+ Map request = new HashMap<>();
+ request.put("signatureAlgorithm", algorithm);
+ request.put("digest", Base64.getEncoder().encodeToString(data));
+
+ Map args = new HashMap<>();
+ args.put(JsonWriter.TYPE, "false");
+
+ Map response = client.post("/codesigningaccounts/" + account + "/certificateprofiles/" + profile + "/sign?api-version=2022-06-15-preview", JsonWriter.objectToJson(request, args));
+
+ String operationId = (String) response.get("operationId");
+
+ // poll until the operation is completed
+ long startTime = System.currentTimeMillis();
+ int i = 0;
+ while (System.currentTimeMillis() - startTime < timeout * 1000) {
+ try {
+ Thread.sleep(Math.min(1000, 50 + 10 * i++));
+ } catch (InterruptedException e) {
+ break;
+ }
+ response = client.get("/codesigningaccounts/" + account + "/certificateprofiles/" + profile + "/sign/" + operationId + "?api-version=2022-06-15-preview");
+ String status = (String) response.get("status");
+ if ("InProgress".equals(status)) {
+ continue;
+ }
+ if ("Succeeded".equals(status)) {
+ break;
+ }
+
+ throw new IOException("Signing operation " + operationId + " failed: " + status);
+ }
+
+ if (!"Succeeded".equals(response.get("status"))) {
+ throw new IOException("Signing operation " + operationId + " timed out");
+ }
+
+ SignStatus status = new SignStatus();
+ status.signature = Base64.getDecoder().decode((String) response.get("signature"));
+ status.signingCertificate = new String(Base64.getDecoder().decode((String) response.get("signingCertificate")));
+
+ return status;
+ }
+
+ private static class SignStatus {
+ public byte[] signature;
+ public String signingCertificate;
+
+ public Collection extends Certificate> getCertificateChain() throws CertificateException {
+ byte[] cerbin = Base64.getMimeDecoder().decode(signingCertificate);
+
+ CertificateFactory certificateFactory = CertificateFactory.getInstance("X.509");
+ return certificateFactory.generateCertificates(new ByteArrayInputStream(cerbin));
+ }
+ }
+}
diff --git a/jsign-core/src/main/java/net/jsign/jca/RESTClient.java b/jsign-core/src/main/java/net/jsign/jca/RESTClient.java
index d9314819..fb31367c 100644
--- a/jsign-core/src/main/java/net/jsign/jca/RESTClient.java
+++ b/jsign-core/src/main/java/net/jsign/jca/RESTClient.java
@@ -26,6 +26,7 @@
import java.util.function.Consumer;
import com.cedarsoftware.util.io.JsonReader;
+import com.cedarsoftware.util.io.JsonWriter;
import org.apache.commons.io.IOUtils;
class RESTClient {
@@ -136,6 +137,10 @@ private String getErrorMessage(Map response) {
String error = (String) response.get("__type");
String description = (String) response.get("message");
message.append(error).append(": ").append(description);
+ } else if (response.containsKey("title") && response.containsKey("errors")) {
+ // error from Azure Code Signing API
+ String errors = JsonWriter.objectToJson(response.get("errors"));
+ message.append(response.get("status")).append(" - ").append(response.get("title")).append(": ").append(errors);
} else if (response.containsKey("code") && response.containsKey("message")) {
// error from OCI API
message.append(response.get("code")).append(": ").append(response.get("message"));
diff --git a/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java b/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java
index c79c148d..3a813134 100644
--- a/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java
+++ b/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java
@@ -329,6 +329,32 @@ public void testBuildOracleCloud() throws Exception {
assertNotNull("keystore", keystore);
}
+ @Test
+ public void testBuildTrustedSigning() throws Exception {
+ KeyStoreBuilder builder = new KeyStoreBuilder().storetype(TRUSTEDSIGNING);
+
+ try {
+ builder.build();
+ fail("Exception not thrown");
+ } catch (IllegalArgumentException e) {
+ assertEquals("message", "keystore parameter must specify the Azure endpoint (.codesigning.azure.net)", e.getMessage());
+ }
+
+ builder.keystore("https://weu.codesigning.azure.net");
+
+ try {
+ builder.build();
+ fail("Exception not thrown");
+ } catch (IllegalArgumentException e) {
+ assertEquals("message", "storepass parameter must specify the Azure API access token", e.getMessage());
+ }
+
+ builder.storepass("0123456789ABCDEF");
+
+ KeyStore keystore = builder.build();
+ assertNotNull("keystore", keystore);
+ }
+
@Test
public void testBuildJKS() throws Exception {
KeyStoreBuilder builder = new KeyStoreBuilder().storetype(JKS);
diff --git a/jsign-core/src/test/java/net/jsign/SignerHelperTest.java b/jsign-core/src/test/java/net/jsign/SignerHelperTest.java
index ebfdfddf..bf26beb5 100644
--- a/jsign-core/src/test/java/net/jsign/SignerHelperTest.java
+++ b/jsign-core/src/test/java/net/jsign/SignerHelperTest.java
@@ -311,6 +311,27 @@ public void testOracleCloud() throws Exception {
SignatureAssert.assertSigned(new PEFile(targetFile), SHA256);
}
+ @Test
+ public void testTrustedSigning() throws Exception {
+ File sourceFile = new File("target/test-classes/wineyes.exe");
+ File targetFile = new File("target/test-classes/wineyes-signed-with-azure-trusted-signing.exe");
+
+ FileUtils.copyFile(sourceFile, targetFile);
+
+ SignerHelper helper = new SignerHelper(new StdOutConsole(1), "option")
+ .storetype("TRUSTEDSIGNING")
+ .keystore("weu.codesigning.azure.net")
+ .storepass(Azure.getAccessToken("https://codesigning.azure.net"))
+ .alias("MyAccount/MyProfile")
+ .alg("SHA-256");
+
+ helper.sign(targetFile);
+
+ Signable signable = Signable.of(targetFile);
+ SignatureAssert.assertSigned(signable, SHA256);
+ SignatureAssert.assertTimestamped("Invalid timestamp", signable.getSignatures().get(0));
+ }
+
@Test
public void testPIV() throws Exception {
PIVCardTest.assumeCardPresent();
diff --git a/jsign-core/src/test/java/net/jsign/jca/Azure.java b/jsign-core/src/test/java/net/jsign/jca/Azure.java
index 59a2ebf9..99fa71c4 100644
--- a/jsign-core/src/test/java/net/jsign/jca/Azure.java
+++ b/jsign-core/src/test/java/net/jsign/jca/Azure.java
@@ -29,9 +29,16 @@ public class Azure {
* Generates an Azure access token using the CLI: az account get-access-token --resource "https://vault.azure.net"
*/
public static String getAccessToken() throws IOException, InterruptedException {
+ return getAccessToken("https://vault.azure.net");
+ }
+
+ /**
+ * Generates an Azure access token using the CLI: az account get-access-token --resource <resource>
+ */
+ public static String getAccessToken(String resource) throws IOException, InterruptedException {
Process process = null;
try {
- ProcessBuilder builder = new ProcessBuilder("az.cmd", "account", "get-access-token", "--resource", "https://vault.azure.net");
+ ProcessBuilder builder = new ProcessBuilder("az.cmd", "account", "get-access-token", "--resource", resource);
process = builder.start();
process.waitFor();
Assume.assumeTrue("Couldn't get Azure API token", process.exitValue() == 0);
diff --git a/jsign-core/src/test/java/net/jsign/jca/AzureTrustedSigningServiceTest.java b/jsign-core/src/test/java/net/jsign/jca/AzureTrustedSigningServiceTest.java
new file mode 100644
index 00000000..86108c3e
--- /dev/null
+++ b/jsign-core/src/test/java/net/jsign/jca/AzureTrustedSigningServiceTest.java
@@ -0,0 +1,212 @@
+/**
+ * Copyright 2024 Emmanuel Bourg
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package net.jsign.jca;
+
+import java.io.FileInputStream;
+import java.security.GeneralSecurityException;
+import java.security.KeyStoreException;
+import java.security.cert.Certificate;
+import java.security.cert.X509Certificate;
+import java.util.Collections;
+import java.util.List;
+
+import org.junit.After;
+import org.junit.Before;
+import org.junit.Test;
+
+import static net.jadler.Jadler.*;
+import static org.junit.Assert.*;
+
+public class AzureTrustedSigningServiceTest {
+
+ @Before
+ public void setUp() {
+ initJadler().withDefaultResponseStatus(404);
+ }
+
+ @After
+ public void tearDown() {
+ closeJadler();
+ }
+
+ @Test
+ public void testGetAliases() throws Exception {
+ SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token");
+ List aliases = service.aliases();
+
+ assertEquals("aliases", Collections.emptyList(), aliases);
+ }
+
+ @Test
+ public void testGetCertificateChain() throws Exception {
+ onRequest()
+ .havingMethodEqualTo("POST")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(202)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}");
+ onRequest()
+ .havingMethodEqualTo("GET")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign/1f234bd9-16cf-4283-9ee6-a460d31207bb")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(200)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}")
+ .thenRespond()
+ .withStatus(200)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}")
+ .thenRespond()
+ .withStatus(200)
+ .withBody(new FileInputStream("target/test-classes/services/trustedsigning-sign.json"));
+
+ SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token");
+ Certificate[] chain = service.getCertificateChain("MyAccount/MyProfile");
+ assertNotNull("null chain", chain);
+ assertEquals("length", 4, chain.length);
+ assertEquals("subject 1", "CN=Emmanuel Bourg, O=Emmanuel Bourg, L=Paris, ST=Ile de France, C=FR", ((X509Certificate) chain[0]).getSubjectDN().getName());
+ assertEquals("subject 2", "CN=Microsoft ID Verified CS EOC CA 01, O=Microsoft Corporation, C=US", ((X509Certificate) chain[1]).getSubjectDN().getName());
+ assertEquals("subject 3", "CN=Microsoft ID Verified Code Signing PCA 2021, O=Microsoft Corporation, C=US", ((X509Certificate) chain[2]).getSubjectDN().getName());
+ assertEquals("subject 4", "CN=Microsoft Identity Verification Root Certificate Authority 2020, O=Microsoft Corporation, C=US", ((X509Certificate) chain[3]).getSubjectDN().getName());
+ }
+
+ @Test
+ public void testGetCertificateChainWithError() {
+ onRequest()
+ .havingMethodEqualTo("POST")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(403);
+
+ SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token");
+ try {
+ service.getCertificateChain("MyAccount/MyProfile");
+ fail("No exception thrown");
+ } catch (KeyStoreException e) {
+ assertEquals("message", "Unable to retrieve the certificate chain 'MyAccount/MyProfile'", e.getMessage());
+ }
+ }
+
+ @Test
+ public void testGetPrivateKey() throws Exception {
+ SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token");
+ SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null);
+ assertNotNull("null key", privateKey);
+ assertEquals("id", "MyAccount/MyProfile", privateKey.getId());
+ assertEquals("algorithm", "RSA", privateKey.getAlgorithm());
+ }
+
+ @Test
+ public void testSign() throws Exception {
+ onRequest()
+ .havingMethodEqualTo("POST")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(202)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}");
+ onRequest()
+ .havingMethodEqualTo("GET")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign/1f234bd9-16cf-4283-9ee6-a460d31207bb")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(200)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}")
+ .thenRespond()
+ .withStatus(200)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}")
+ .thenRespond()
+ .withStatus(200)
+ .withBody(new FileInputStream("target/test-classes/services/trustedsigning-sign.json"));
+
+ AzureTrustedSigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token");
+ SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null);
+
+ byte[] signature = service.sign(privateKey, "SHA256withRSA", "Hello".getBytes());
+
+ assertNotNull("null signature", signature);
+ assertEquals("length", 384, signature.length);
+ }
+
+ @Test
+ public void testSignWithTimeout() throws Exception {
+ onRequest()
+ .havingMethodEqualTo("POST")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(202)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}");
+ onRequest()
+ .havingMethodEqualTo("GET")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign/1f234bd9-16cf-4283-9ee6-a460d31207bb")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(200)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}");
+
+ AzureTrustedSigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token");
+ service.setTimeout(2);
+ SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null);
+ try {
+ service.sign(privateKey, "SHA256withRSA", "Hello".getBytes());
+ fail("No exception thrown");
+ } catch (GeneralSecurityException e) {
+ assertEquals("message", "java.io.IOException: Signing operation 1f234bd9-16cf-4283-9ee6-a460d31207bb timed out", e.getMessage());
+ }
+ }
+
+ @Test
+ public void testSignWithFailure() throws Exception {
+ onRequest()
+ .havingMethodEqualTo("POST")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(202)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}");
+ onRequest()
+ .havingMethodEqualTo("GET")
+ .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign/1f234bd9-16cf-4283-9ee6-a460d31207bb")
+ .havingQueryStringEqualTo("api-version=2022-06-15-preview")
+ .respond()
+ .withStatus(200)
+ .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"Failed\",\"signature\":null,\"signingCertificate\":null}");
+
+ AzureTrustedSigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token");
+ SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null);
+ try {
+ service.sign(privateKey, "SHA256withRSA", "Hello".getBytes());
+ fail("No exception thrown");
+ } catch (GeneralSecurityException e) {
+ assertEquals("message", "java.io.IOException: Signing operation 1f234bd9-16cf-4283-9ee6-a460d31207bb failed: Failed", e.getMessage());
+ }
+ }
+
+ @Test
+ public void testSignWithInvalidAlgorithm() throws Exception {
+ SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token");
+ SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null);
+ try {
+ service.sign(privateKey, "SHA1withRSA", "Hello".getBytes());
+ fail("No exception thrown");
+ } catch (GeneralSecurityException e) {
+ assertEquals("message", "Unsupported signing algorithm: SHA1withRSA", e.getMessage());
+ }
+ }
+}
diff --git a/jsign-core/src/test/java/net/jsign/jca/SigningServiceTest.java b/jsign-core/src/test/java/net/jsign/jca/SigningServiceTest.java
index 4400e1f1..cdc407ab 100644
--- a/jsign-core/src/test/java/net/jsign/jca/SigningServiceTest.java
+++ b/jsign-core/src/test/java/net/jsign/jca/SigningServiceTest.java
@@ -200,4 +200,14 @@ public void testOracleCloudProvider() throws Exception {
testCustomProvider(provider, keystore, "ocid1.key.oc1.eu-paris-1.h5tafwboaahxq.abrwiljrwkhgllb5zfqchmvdkmqnzutqeq5pz7yo6z7yhl2zyn2yncwzxiza", "");
}
+
+ @Test
+ public void testTrustedSigningProvider() throws Exception {
+ String token = Azure.getAccessToken("https://codesigning.azure.net");
+ Provider provider = new SigningServiceJcaProvider(new AzureTrustedSigningService("https://weu.codesigning.azure.net", token));
+ KeyStore keystore = KeyStore.getInstance("TRUSTEDSIGNING", provider);
+ keystore.load(null, "".toCharArray());
+
+ testCustomProvider(provider, keystore, "MyAccount/MyProfile", "");
+ }
}
diff --git a/jsign-core/src/test/resources/services/trustedsigning-sign.json b/jsign-core/src/test/resources/services/trustedsigning-sign.json
new file mode 100644
index 00000000..1e6e22ad
--- /dev/null
+++ b/jsign-core/src/test/resources/services/trustedsigning-sign.json
@@ -0,0 +1,6 @@
+{
+ "operationId": "1f234bd9-16cf-4283-9ee6-a460d31207bb",
+ "status": "Succeeded",
+ "signature": "fyrDRW1Xf063cYW+PCI2Adf4gX4PxFzBzvGHOkUxWbaofwxhZe8qm5QrxMLb4mMHCi6OQ9/RYCBxKBD4IiYzbyDd+dSlXcZQlkxixcwC3755glSNrlkObuPLQCbwMzdmfA+KchJCjpgbGO7Z7txNx6qp7nvuKagomPtNWxrp6MA1VLryfcE750ek/4zS0ik5wDYjaIbsT7t3qkTzR4Q5o1D4aaF/RcXwTjeELLgyxkYQd9E/9g88uwtSmXSSSRdQVzh4jU8rWhAbJy010DwunKmobZZsp0d47pI1IQBbXjCa4cW/PcidQtDkPOV+Py06cGjXUvqeBRUyNGzF8pOpkEVjHnfsSGH03cYAYBrj4oCwOtpOUcYMotyKsQ02zGDA8FBTDsVLtvRflQHJeKdpAFYom8fOERNmqdNiSu2NFKQK8l5w6a1pjfmxXRCG8JbD+xWgZSG2coAVk1xiSblse31DYsa4l+chyui0JESxo6jwyRAQw6OIvBIicnrJbmA3",
+ "signingCertificate": "MIIi3wYJKoZIhvcNAQcCoIIi0DCCIswCAQExADCCBwAGCSqGSIb3DQEHAaCCBvEE
ggbtMIIG6TCCBNGgAwIBAgITMwAAYMa2xlQhJT8t5gAAAABgxjANBgkqhkiG9w0B
AQwFADBaMQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
aW9uMSswKQYDVQQDEyJNaWNyb3NvZnQgSUQgVmVyaWZpZWQgQ1MgRU9DIENBIDAx
MB4XDTI0MDQwMTIyNTcyMFoXDTI0MDQwNDIyNTcyMFowZzELMAkGA1UEBhMCRlIx
FjAUBgNVBAgTDUlsZSBkZSBGcmFuY2UxDjAMBgNVBAcTBVBhcmlzMRcwFQYDVQQK
Ew5FbW1hbnVlbCBCb3VyZzEXMBUGA1UEAxMORW1tYW51ZWwgQm91cmcwggGiMA0G
CSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQCeCrl7jstmJsHbdu3hf6vNV1YUTR0i
CvZlE4GdmmmdDzod1qlhXV0u406AMBne9RAVu3CEk+2FuIuiD5BBSYAmlq1CtZy8
UkT5IrmEy6wep6HO+WjP0ZdbJZ3XgOeQeJKFT3Sf8vK3tCtUbU6CkrosQ3x+DWvF
rkjqY3oWWkk7smyrk3MlM+wpO0gKbSzQodmHiWVUza6D3UlOsaEcFw4lCcqUxovM
J01IQPCcfnN1yJdAkmceDItytVjPiBgl3o4zbbYuyQ0LaEZrvhmORlzuaT0qYuhI
GPpcxEVvMO1HD/rS/IGgh0HP2/xi6fh81AIswrkHD8gtkI4WixQsrcXguXRaE8mw
p3FlwD6/SoldJtq9Bpm10HFPNnhE+psFKT6oyhnZsnV7qBV2yogAjN8z1V+AaOic
bZ0/ao4o4jjR+jGiofMMQPWb1OO6JWQ/Zow1dymPV1UNTM8Ad/OmngmG6dUNYio3
4KWd6+TSC+bpO/IIhf1/uBCqBrkdhzb7LisCAwEAAaOCAhkwggIVMAwGA1UdEwEB
/wQCMAAwDgYDVR0PAQH/BAQDAgeAMDwGA1UdJQQ1MDMGCisGAQQBgjdhAQAGCCsG
AQUFBwMDBhsrBgEEAYI3YYGM/vZMguHCi1+C8bHWGdfslmswHQYDVR0OBBYEFLHU
8OhcUoK/AC2JguVFQqBWPFUsMB8GA1UdIwQYMBaAFHacNnQT0ZB9YV+zAuuA9JlL
pT6FMGcGA1UdHwRgMF4wXKBaoFiGVmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
a2lvcHMvY3JsL01pY3Jvc29mdCUyMElEJTIwVmVyaWZpZWQlMjBDUyUyMEVPQyUy
MENBJTIwMDEuY3JsMIGlBggrBgEFBQcBAQSBmDCBlTBkBggrBgEFBQcwAoZYaHR0
cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBJ
RCUyMFZlcmlmaWVkJTIwQ1MlMjBFT0MlMjBDQSUyMDAxLmNydDAtBggrBgEFBQcw
AYYhaHR0cDovL29uZW9jc3AubWljcm9zb2Z0LmNvbS9vY3NwMGYGA1UdIARfMF0w
UQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9z
b2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTAIBgZngQwBBAEwDQYJ
KoZIhvcNAQEMBQADggIBAH5NadJ/0udJGRYl4X5cQn9jSGH2VKs1ebleNeimjqMe
koo91uiG/J167rdsW1feUxbOPnNALV72fbtzBd2ET68chAbW51nSgxn6m/DSBkkj
PHuXYXnZGvYbCyo/EY07fuCd5gNIvjSNkbNPvMN1NmkZmC7J8UhgMX0VdhvU7z3I
9n+3GKMGskJ6ia+bWdX3g8cgerBxI3BSrzHg5RsqZD+R+TmNMJNbLFzMaf6BCDRp
8IqjVuslTsyhoV19/2P0f1LsSj+C6ksk70sH1p7kZbDJND+Lb+84MDQUEgzGBzmM
fUidygo+v4QxjWGqtWsWZ/vDnPwtIO0TzfD3clzgEwPu0OAWOnoJNvuNSrXcg54D
nqj92Jw+c0yk2tnqM/Pxs+BaJeyLvB/0aRWHCKG+BNTAYnsl5pv6LW/mabM6R40a
jzCEnop4myp7GpmBtMWJDuzeZVdCCmiD0hkbGL9ry0uC4KbfyMpSIUtPM1szZk3e
3xcMsb5zDWNOKrcO8LOodgdsHxJ7dw3gHYpaLOqQ9BfE3hoFX6duwGGZR++a7pxq
cgjuv+hMQwlF4FxUJVpJaywzJ+okvs4a88D+91Zl2VrzN9e5WgBmL+uOOIjaT3cc
jO8XKyVBFSrZz39A5zzJBD3Op/q7UBQaCl/Sionb2y/4k65eU04rbW8x75AwrE+X
oIIbvTCCBukwggTRoAMCAQICEzMAAGDGtsZUISU/LeYAAAAAYMYwDQYJKoZIhvcN
AQEMBQAwWjELMAkGA1UEBhMCVVMxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
dGlvbjErMCkGA1UEAxMiTWljcm9zb2Z0IElEIFZlcmlmaWVkIENTIEVPQyBDQSAw
MTAeFw0yNDA0MDEyMjU3MjBaFw0yNDA0MDQyMjU3MjBaMGcxCzAJBgNVBAYTAkZS
MRYwFAYDVQQIEw1JbGUgZGUgRnJhbmNlMQ4wDAYDVQQHEwVQYXJpczEXMBUGA1UE
ChMORW1tYW51ZWwgQm91cmcxFzAVBgNVBAMTDkVtbWFudWVsIEJvdXJnMIIBojAN
BgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAngq5e47LZibB23bt4X+rzVdWFE0d
Igr2ZROBnZppnQ86HdapYV1dLuNOgDAZ3vUQFbtwhJPthbiLog+QQUmAJpatQrWc
vFJE+SK5hMusHqehzvloz9GXWyWd14DnkHiShU90n/Lyt7QrVG1OgpK6LEN8fg1r
xa5I6mN6FlpJO7Jsq5NzJTPsKTtICm0s0KHZh4llVM2ug91JTrGhHBcOJQnKlMaL
zCdNSEDwnH5zdciXQJJnHgyLcrVYz4gYJd6OM222LskNC2hGa74ZjkZc7mk9KmLo
SBj6XMRFbzDtRw/60vyBoIdBz9v8Yun4fNQCLMK5Bw/ILZCOFosULK3F4Ll0WhPJ
sKdxZcA+v0qJXSbavQaZtdBxTzZ4RPqbBSk+qMoZ2bJ1e6gVdsqIAIzfM9VfgGjo
nG2dP2qOKOI40foxoqHzDED1m9TjuiVkP2aMNXcpj1dVDUzPAHfzpp4JhunVDWIq
N+Clnevk0gvm6TvyCIX9f7gQqga5HYc2+y4rAgMBAAGjggIZMIICFTAMBgNVHRMB
Af8EAjAAMA4GA1UdDwEB/wQEAwIHgDA8BgNVHSUENTAzBgorBgEEAYI3YQEABggr
BgEFBQcDAwYbKwYBBAGCN2GBjP72TILhwotfgvGx1hnX7JZrMB0GA1UdDgQWBBSx
1PDoXFKCvwAtiYLlRUKgVjxVLDAfBgNVHSMEGDAWgBR2nDZ0E9GQfWFfswLrgPSZ
S6U+hTBnBgNVHR8EYDBeMFygWqBYhlZodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v
cGtpb3BzL2NybC9NaWNyb3NvZnQlMjBJRCUyMFZlcmlmaWVkJTIwQ1MlMjBFT0Ml
MjBDQSUyMDAxLmNybDCBpQYIKwYBBQUHAQEEgZgwgZUwZAYIKwYBBQUHMAKGWGh0
dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIw
SUQlMjBWZXJpZmllZCUyMENTJTIwRU9DJTIwQ0ElMjAwMS5jcnQwLQYIKwYBBQUH
MAGGIWh0dHA6Ly9vbmVvY3NwLm1pY3Jvc29mdC5jb20vb2NzcDBmBgNVHSAEXzBd
MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jv
c29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wCAYGZ4EMAQQBMA0G
CSqGSIb3DQEBDAUAA4ICAQB+TWnSf9LnSRkWJeF+XEJ/Y0hh9lSrNXm5XjXopo6j
HpKKPdbohvydeu63bFtX3lMWzj5zQC1e9n27cwXdhE+vHIQG1udZ0oMZ+pvw0gZJ
Izx7l2F52Rr2GwsqPxGNO37gneYDSL40jZGzT7zDdTZpGZguyfFIYDF9FXYb1O89
yPZ/txijBrJCeomvm1nV94PHIHqwcSNwUq8x4OUbKmQ/kfk5jTCTWyxczGn+gQg0
afCKo1brJU7MoaFdff9j9H9S7Eo/gupLJO9LB9ae5GWwyTQ/i2/vODA0FBIMxgc5
jH1IncoKPr+EMY1hqrVrFmf7w5z8LSDtE83w93Jc4BMD7tDgFjp6CTb7jUq13IOe
A56o/dicPnNMpNrZ6jPz8bPgWiXsi7wf9GkVhwihvgTUwGJ7Jeab+i1v5mmzOkeN
Go8whJ6KeJsqexqZgbTFiQ7s3mVXQgpog9IZGxi/a8tLguCm38jKUiFLTzNbM2ZN
3t8XDLG+cw1jTiq3DvCzqHYHbB8Se3cN4B2KWizqkPQXxN4aBV+nbsBhmUfvmu6c
anII7r/oTEMJReBcVCVaSWssMyfqJL7OGvPA/vdWZdla8zfXuVoAZi/rjjiI2k93
HIzvFyslQRUq2c9/QOc8yQQ9zqf6u1AUGgpf0oqJ29sv+JOuXlNOK21vMe+QMKxP
lzCCB1owggVCoAMCAQICEzMAAAAGShr6zwVhanQAAAAAAAYwDQYJKoZIhvcNAQEM
BQAwYzELMAkGA1UEBhMCVVMxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
bjE0MDIGA1UEAxMrTWljcm9zb2Z0IElEIFZlcmlmaWVkIENvZGUgU2lnbmluZyBQ
Q0EgMjAyMTAeFw0yMTA0MTMxNzMxNTRaFw0yNjA0MTMxNzMxNTRaMFoxCzAJBgNV
BAYTAlVTMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKzApBgNVBAMT
Ik1pY3Jvc29mdCBJRCBWZXJpZmllZCBDUyBFT0MgQ0EgMDEwggIiMA0GCSqGSIb3
DQEBAQUAA4ICDwAwggIKAoICAQDH48g/9CHdxhnAu8XLq64nh9OneWfsaqzuzyVN
XJ+A4lY/VoAHCTb+jF1WN9IdSrgxM9eKUvnuqL98ftid0Qrgqd3e7lx50XCvZodJ
Onq+X88vV0Av2x+gO82l0bQ39HzgCFg2kFBOGk7j8GrGYKCXeIhF+GHagVU66JOI
NVa9cGDvptyOcecQS1fO8BbAm7RsFTuhFGpB53hVcm0gJW35mgpRKOpjnBSWEB3A
eH7fUGekE8LMW0pWIunrMS1HI7FF6BqAVT7IuBe++Z3TsgM3RLZMti6JmNPD6Rxg
62g2AqvuTQLoT1Z/cfiMdq+TYzGoWm2B8vSAv7NtJv5UE0qJVPSarNckgmZaarDQ
r4Pcwp+YJ6vd7cJus/4XlG0JvRdoTS5Fwk9kmNbByIMHEEhuQ0XgYvXaGXm/J2AU
ybNBw26h0rJf//eUsnWrbaugdVLVyC2wuCmNZhmUGWEJNxcl5nfG5om9dkH2twsJ
fXk6BcvbW1RTAkIsTbtXkAZnGQ7eLniaBIKzC06ZZTgAp38H97cq1e/pcFREq4C1
57PUSmCWhpnBB6P2Xl031SHxbX0FmD0iUuX7EdFfi8OIxYBR//sA17gyhL3wXjmv
vogYnSELTYQy4xnEASvBmPSWfRovncTOUxrkkKJE5tvRSgsd8ZJ00mwyDS6PcMBA
N1VZMQIDAQABo4ICDjCCAgowDgYDVR0PAQH/BAQDAgGGMBAGCSsGAQQBgjcVAQQD
AgEAMB0GA1UdDgQWBBR2nDZ0E9GQfWFfswLrgPSZS6U+hTBUBgNVHSAETTBLMEkG
BFUdIAAwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br
aW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
QwBBMBIGA1UdEwEB/wQIMAYBAf8CAQAwHwYDVR0jBBgwFoAU2UEpsA8PY2zvadf1
zSmepEhqMOYwcAYDVR0fBGkwZzBloGOgYYZfaHR0cDovL3d3dy5taWNyb3NvZnQu
Y29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwSUQlMjBWZXJpZmllZCUyMENvZGUl
MjBTaWduaW5nJTIwUENBJTIwMjAyMS5jcmwwga4GCCsGAQUFBwEBBIGhMIGeMG0G
CCsGAQUFBzAChmFodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz
L01pY3Jvc29mdCUyMElEJTIwVmVyaWZpZWQlMjBDb2RlJTIwU2lnbmluZyUyMFBD
QSUyMDIwMjEuY3J0MC0GCCsGAQUFBzABhiFodHRwOi8vb25lb2NzcC5taWNyb3Nv
ZnQuY29tL29jc3AwDQYJKoZIhvcNAQEMBQADggIBAGovCZ/YsHVCNSBrQbvMWRsZ
3w0FAsc/Qo4UFY0kVmJO0p+k7RtnZZ+zq/m+ogqMTfZDozz0bhmRVy9a4QAD52+M
tOFLLz1jT/+b9ZNIrBi2JHUTCfvHWTD8WD3fBCmzYLVZSP7TT/q42sX53gxUnFXU
egEgP73lkhbQqSpmimc4DjDm8/hPlwGmtlACU/+8wbIHQf36kc2jSNP1DyB8ok3M
dL2LUOAGaa58Z1b1MHK6ejwYCLMUyEuUizTxvmWKUiQTnPcUwBQCv5eAgjUU1mdv
jc4jpB3bM6KNuNh+6uxdQI0cL5FLAkablQvM/KZiCCcn6SEk6ruhKWo8aluvvSEY
F4/D8nv+aZKqnuFOC3SY+KRLWLhqnzH4/fJ6ZhKGcWuBXXvnZMj4Czr0t+Au2GQh
O9/tsUcHy+YiFp1kI5LS9MLHcH785VwQws07ZsnQ72KRzUmpHQW+rHucDAxFKHcV
WqiyDMFtadWRAmruhYXAxV8Uhifos9Fky3jy7qIxQIUFI912w8D/qTzmYS/7TxTl
YJDvJ2PUpVXZMet7/yYseJ6b3B/8LOiGpGe3EzYT/H40fLpMEydI9BGqGE1+46BQ
MBYRiaUz9kcZo8hvvE699XItD/uXph+iBPd6m3CngY4ZGMfnP6Ab2SkEjHxCtGXo
6KWeXFETGiSYx+UvuXXZMIIHnjCCBYagAwIBAgITMwAAAAeHozSje6WOHAAAAAAA
BzANBgkqhkiG9w0BAQwFADB3MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9z
b2Z0IENvcnBvcmF0aW9uMUgwRgYDVQQDEz9NaWNyb3NvZnQgSWRlbnRpdHkgVmVy
aWZpY2F0aW9uIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMjAwHhcNMjEw
NDAxMjAwNTIwWhcNMzYwNDAxMjAxNTIwWjBjMQswCQYDVQQGEwJVUzEeMBwGA1UE
ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTQwMgYDVQQDEytNaWNyb3NvZnQgSUQg
VmVyaWZpZWQgQ29kZSBTaWduaW5nIFBDQSAyMDIxMIICIjANBgkqhkiG9w0BAQEF
AAOCAg8AMIICCgKCAgEAsvDArxmIKOLdVHpMSWxpCFUJtFL/ekr4weslKPdnF3cp
TeuV8veqtmKVgok2rO0D05BpyvUDCg1wdsoEtuxACEGcgHfjPF/nZsOkg7c0mV8h
pMT/GvB4uhDvWXMIeQPsDgCzUGzTvoi76YDpxDOxhgf8JuXWJzBDoLrmtThX01CE
1TCCvH2sZD/+Hz3RDwl2MsvDSdX5rJDYVuR3bjaj2QfzZFmwfccTKqMAHlrz4B7a
c8g9zyxlTpkTuJGtFnLBGasoOnn5NyYlf0xF9/bjVRo4Gzg2Yc7KR7yhTVNiuTGH
5h4eB9ajm1OCShIyhrKqgOkc4smz6obxO+HxKeJ9bYmPf6KLXVNLz8UaeARo0Bat
vJ82sLr2gqlFBdj1sYfqOf00Qm/3B4XGFPDK/H04kteZEZsBRc3VT2d/iVd7OTLp
SH9yCORV3oIZQB/Qr4nD4YT/lWkhVtw2v2s0TnRJubL/hFMIQa86rcaGMhNsJrhy
sLNNMeBhiMezU1s5zpusf54qlYu2v5sZ5zL0KvBDLHtL8F9gn6jOy3v7Jm0bbBHj
rW5yQW7S36ALAt03QDpwW1JG1Hxu/FUXJbBO2AwwVG4Fre+ZQ5Od8ouwt59FpBxV
OBGfN4vN2m3fZx1gqn52GvaiBz6ozorgIEjn+PhUXILhAV5Q/ZgCJ0u2+ldFGjcC
AwEAAaOCAjUwggIxMA4GA1UdDwEB/wQEAwIBhjAQBgkrBgEEAYI3FQEEAwIBADAd
BgNVHQ4EFgQU2UEpsA8PY2zvadf1zSmepEhqMOYwVAYDVR0gBE0wSzBJBgRVHSAA
MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
RG9jcy9SZXBvc2l0b3J5Lmh0bTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAP
BgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFMh+0mqFKhvKGZgEByfPUBBPaKii
MIGEBgNVHR8EfTB7MHmgd6B1hnNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
b3BzL2NybC9NaWNyb3NvZnQlMjBJZGVudGl0eSUyMFZlcmlmaWNhdGlvbiUyMFJv
b3QlMjBDZXJ0aWZpY2F0ZSUyMEF1dGhvcml0eSUyMDIwMjAuY3JsMIHDBggrBgEF
BQcBAQSBtjCBszCBgQYIKwYBBQUHMAKGdWh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
bS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwSWRlbnRpdHklMjBWZXJpZmljYXRp
b24lMjBSb290JTIwQ2VydGlmaWNhdGUlMjBBdXRob3JpdHklMjAyMDIwLmNydDAt
BggrBgEFBQcwAYYhaHR0cDovL29uZW9jc3AubWljcm9zb2Z0LmNvbS9vY3NwMA0G
CSqGSIb3DQEBDAUAA4ICAQB/JSqe/tSr6t1mCttXI0y6XmyQ41uGWzl9xw+WYhvO
L47BV09Dgfnm/tU4ieeZ7NAR5bguorTCNr58HOcA1tcsHQqt0wJsdClsu8bpQD9e
/al+lUgTUJEV80Xhco7xdgRrehbyhUf4pkeAhBEjABvIUpD2LKPho5Z4DPCT5/0T
lK02nlPwUbv9URREhVYCtsDM+31OFU3fDV8BmQXv5hT2RurVsJHZgP4y26dJDVF+
3pcbtvh7R6NEDuYHYihfmE2HdQRq5jRvLE1Eb59PYwISFCX2DaLZ+zpU4bX0I16n
tKq4poGOFaaKtjIA1vRElItaOKcwtc04CBrXSfyL2Op6mvNIxTk4OaswIkTXbFL8
1ZKGD+24uMCwo/pLNhn7VHLfnxlMVzHQVL+bHa9KhTyzwdG/L6uderJQn0cGpLQM
StUuNDArxW2wF16QGZ1NtBWgKA8Kqv48M8HfFqNifN6+zt6J0GwzvU8g0rYGgTZR
8zDEIJfeZxwWDHpSxB5FJ1VVU1LIAtB7o9PXbjXzGifaIMYTzU4YKt4vMNwwBmet
QDHhdAtTPplOXrnI9SI6HeTtjDD3iUN/7ygbahmYOHk7VB7fwT4ze+ErCbMh6gHV
1UuXPiLciloNxH6K4aMfZN1oLVk6YFeIJEokuPgNPa6EnTiOL60cPqfny+Fq8Uiu
ZzCCBcwwggO0oAMCAQICEFSY0tHUWxmVSBN5yBHAh5kwDQYJKoZIhvcNAQEMBQAw
dzELMAkGA1UEBhMCVVMxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjFI
MEYGA1UEAxM/TWljcm9zb2Z0IElkZW50aXR5IFZlcmlmaWNhdGlvbiBSb290IENl
cnRpZmljYXRlIEF1dGhvcml0eSAyMDIwMB4XDTIwMDQxNjE4MzYxNloXDTQ1MDQx
NjE4NDQ0MFowdzELMAkGA1UEBhMCVVMxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
b3JhdGlvbjFIMEYGA1UEAxM/TWljcm9zb2Z0IElkZW50aXR5IFZlcmlmaWNhdGlv
biBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDIwMIICIjANBgkqhkiG9w0B
AQEFAAOCAg8AMIICCgKCAgEAs5EqB4MGZ/2eneDHwLek5kIEfw+m21/71VrXRaD7
dwvwgPOmbVpNeVPYoIaEV0Ugx6JU+8eiv4rHbjXzohXEL07jSoWWSQ3/vpnYFPa8
JwfuQpsr9QuSBuT9aRNlqJFy8piE64M9DuTXcRJIIcsN7fZHSbeb+cnHF7aET/+4
rJrXc2dJheOGvTdA0CWG1N61wm1iatWpeLwtb0n55WwUFP0Ux9NlFjfey268XimN
/WKbFSzWBea5iTIzo2LH19ZSZwjELvRWK54Lh8zsp7SmqusFzRlXpToLBCcckWee
LWItLx6+2sAgywQZyjP7ib6Y4nKgcjW+eeGcg2/kbRdvkPM9AIZ1OI7Q4Emau9vT
+DDK1VeIaE1y079tf3HY/b0NrpJkSLdbb3kmtc2blSGE0e8PMj17V4zzRQdMfOBe
GA41dottnss2dKsF+OBzXTJWlGeXJQrGNT2Ul+fBRIuA/cH49HQZ5TD2BvshVz4G
HItrFYYnSXuCk8pZ6HVH6D849MdTeaC2tOJcUe+9XzjBE+Z4DJVaLsVAWSjMDyTA
7LoJdyOZOKa2HNrHuiC21zfYfzevCOM7cdtucxt9mXKw5IYzWXS1FgB7UG3GhhPa
/cQ5gj0kAJpg2rqUwAVRLDSsUJkTh7uzBYCyTTACXLgmg120Y3PvriOVT2AovjfV
W6UCAwEAAaNUMFIwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYD
VR0OBBYEFMh+0mqFKhvKGZgEByfPUBBPaKiiMBAGCSsGAQQBgjcVAQQDAgEAMA0G
CSqGSIb3DQEBDAUAA4ICAQCvat3mGectlEMZTsvpUJVkpQORAoviNoA7FaJSwhYZ
tmpaXXRDMPSb/2B0CbEhHpAWbcUkj1xmiGP0T8x98hJMQBCLAZ/aqciu8pUbz50F
60k+dKBoW+VWLGUcgn5T2lbZRhd5kkXEEDYIUikXyy+m8n7UaSSKHo+wcw3MHEqr
sqrtp5FjAWQiqDK4fjIos2dzLZG03DEBC/dHCqbx10rtVmDELAije0CwvHQnUofW
vojdN4qJbmeIHfXJXaD+tqs6gNcalzwXNiJBHqxN1YPmPDi9TzDpVKnTtgTDMnZh
u7AYxSsYs8CA1beVsF5RTSL87Fiq6NiUtKUu7ZLe5xh8IVfdVWP3v23NH9Kmdyhw
x+JbOlsI0ltOyACWs+GDNq+GCmVcdPbq7HpqdKDwS+7vlKOsUPKH7dc6MIPJ+31X
vuXj+EHK5WSus6PsWOyFmszvuerzVhi5XHOar8V3F4NZ2zcaGHJUpUHStiN1o0Oa
5Xd8lnm3QY2/7NyAoJ/Rd3VYXzUT4CUaZwt9ziX6BwrkYSHY1BzlB8Y2mfSW0MYV
/k7N166LndsW/QTGkr3UiOapo6q792Q4O1/MDNA1vnQZA6bFqkyiYTaCPh3zK7yX
XdtLeDst9TvvYCPo9ewLIzaVr5hmv1PTe7hpSiqWZmnElMb0X26smHiIgAZcorLt
ojEA
"
+}
diff --git a/jsign-maven-plugin/src/main/java/net/jsign/JsignMojo.java b/jsign-maven-plugin/src/main/java/net/jsign/JsignMojo.java
index ecb1b2bd..7ed36115 100644
--- a/jsign-maven-plugin/src/main/java/net/jsign/JsignMojo.java
+++ b/jsign-maven-plugin/src/main/java/net/jsign/JsignMojo.java
@@ -87,7 +87,7 @@ public class JsignMojo extends AbstractMojo {
/**
* The type of the keystore (JKS, JCEKS, PKCS12, PKCS11, ETOKEN, NITROKEY, OPENPGP, OPENSC, PIV, YUBIKEY, AWS,
- * AZUREKEYVAULT, DIGICERTONE, ESIGNER, GOOGLECLOUD, HASHICORPVAULT or ORACLECLOUD).
+ * AZUREKEYVAULT, DIGICERTONE, ESIGNER, GOOGLECLOUD, HASHICORPVAULT, ORACLECLOUD or TRUSTEDSIGNING).
*/
@Parameter( property = "jsign.storetype" )
private String storetype;
diff --git a/jsign/src/deb/data/usr/share/bash-completion/completions/jsign b/jsign/src/deb/data/usr/share/bash-completion/completions/jsign
index 9e90a6a1..e158fa2b 100644
--- a/jsign/src/deb/data/usr/share/bash-completion/completions/jsign
+++ b/jsign/src/deb/data/usr/share/bash-completion/completions/jsign
@@ -22,7 +22,7 @@ _jsign()
return 0
;;
--storetype)
- COMPREPLY=( $( compgen -W 'JKS JCEKS PKCS12 PKCS11 AWS AZUREKEYVAULT DIGICERTONE ESIGNER ETOKEN GOOGLECLOUD HASHICORPVAULT ORACLECLOUD YUBIKEY NITROKEY OPENPGP OPENSC PIV' -- "$cur" ) )
+ COMPREPLY=( $( compgen -W 'JKS JCEKS PKCS12 PKCS11 AWS AZUREKEYVAULT DIGICERTONE ESIGNER ETOKEN GOOGLECLOUD HASHICORPVAULT ORACLECLOUD TRUSTEDSIGNING YUBIKEY NITROKEY OPENPGP OPENSC PIV' -- "$cur" ) )
return 0
;;
--storepass|-a|--alias|--keypass|-t|--tsaurl|-r|--tsretries|-w|--tsretrywait|-n|--name|-u|--url|-e|--encoding)
diff --git a/jsign/src/deb/data/usr/share/man/man1/jsign.1 b/jsign/src/deb/data/usr/share/man/man1/jsign.1
index faa6a8bd..c78b69ac 100644
--- a/jsign/src/deb/data/usr/share/man/man1/jsign.1
+++ b/jsign/src/deb/data/usr/share/man/man1/jsign.1
@@ -75,6 +75,8 @@ The type of the keystore:
.br
- ORACLECLOUD : Oracle Cloud Key Management Service
.br
+- TRUSTEDSIGNING: Azure Trusted Signing
+.br
This option is not required for file based keystores (JKS, JCEKS and PKCS12).
.TP
@@ -315,6 +317,32 @@ The Azure account used must have the "Key Vault Crypto User" and "Key Vault Cert
.TP
+Signing with Azure Trusted Signing
+
+With the Azure Trusted Signing service the keystore parameter specifies the endpoint URI, and the alias combines
+the account name and the certificate profile. The Azure API access token is used as the keystore password.
+
+jsign --storetype TRUSTEDSIGNING \
+ --keystore weu.codesigning.azure.net \
+ --storepass \
+ --alias / application.exe
+
+The access token can be obtained with the Azure CLI:
+
+az account get-access-token --resource https://codesigning.azure.net
+
+The Azure account used must have the "Code Signing Certificate Profile Signer" role.
+
+The certificates issued by Azure Trusted Signing have a lifetime of 3 days only, and timestamping is necessary to
+ensure the long term validity of the signature. For this reason timestamping is automatically enabled when signing
+with this service.
+
+Implementation note: Jsign performs an extra call to the signing API to retrieve the current certificate chain before
+signing. When signing multiple files it's recommended to invoke Jsign only once with the list of files to avoid doubling
+the quota usage.
+
+.TP
+
Signing with DigiCert ONE:
Certificates and keys stored in the DigiCert ONE Secure Software Manager can be used directly without installing