diff --git a/README.md b/README.md index 52ef76f7..92a1823d 100644 --- a/README.md +++ b/README.md @@ -32,6 +32,7 @@ Jsign is free to use and licensed under the [Apache License version 2.0](https:/ * Cloud key management systems: * [AWS KMS](https://aws.amazon.com/kms/) * [Azure Key Vault](https://azure.microsoft.com/services/key-vault/) + * [Azure Trusted Signing](https://learn.microsoft.com/en-us/azure/trusted-signing/) * [DigiCert ONE](https://one.digicert.com) * [Google Cloud KMS](https://cloud.google.com/security-key-management) * [HashiCorp Vault](https://www.vaultproject.io/) @@ -51,6 +52,7 @@ See https://ebourg.github.io/jsign for more information. #### Version 6.1 (in development) +* The Azure Trusted Signing service has been integrated * The Oracle Cloud signing service has been integrated * Signing of NuGet packages has been implemented (contributed by Sebastian Stamm) * Jsign now checks if the certificate subject matches the app manifest publisher before signing APPX/MSIX packages diff --git a/docs/index.html b/docs/index.html index 205df81e..083881c3 100644 --- a/docs/index.html +++ b/docs/index.html @@ -70,6 +70,7 @@

Features

No, automatically detected for file based keystores. @@ -472,6 +474,7 @@

Command Line Tool

- GOOGLECLOUD: Google Cloud KMS - HASHICORPVAULT: Google Cloud KMS via HashiCorp Vault - ORACLECLOUD: Oracle Cloud Key Management Service + - TRUSTEDSIGNING: Azure Trusted Signing -a,--alias <NAME> The alias of the certificate used for signing in the keystore. --keypass <PASSWORD> The password of the private key. When using a keystore, this parameter can be omitted if the keystore shares the @@ -641,6 +644,35 @@

Signing with Azure Key Vault

The Azure account used must have the "Key Vault Crypto User" and "Key Vault Certificate User" roles.

+

Signing with Azure Trusted Signing

+ +

With the Azure Trusted Signing service +the keystore parameter specifies the endpoint URI, and the alias combines the account name and +the certificate profile. The Azure API access token is used as the keystore password.

+ +
+ jsign --storetype TRUSTEDSIGNING \
+       --keystore weu.codesigning.azure.net \
+       --storepass <api-access-token> \
+       --alias <account>/<profile> application.exe
+
+ +

The access token can be obtained with the Azure CLI:

+ +
+ az account get-access-token --resource https://codesigning.azure.net
+
+ +

The Azure account used must have the "Code Signing Certificate Profile Signer" role.

+ +

The certificates issued by Azure Trusted Signing have a lifetime of 3 days only, and timestamping is necessary to +ensure the long term validity of the signature. For this reason timestamping is automatically enabled when signing +with this service.

+ +

Implementation note: Jsign performs an extra call to the signing API to retrieve the current certificate chain before +signing. When signing multiple files it's recommended to invoke Jsign only once with the list of files to avoid doubling +the quota usage.

+

Signing with DigiCert ONE

Certificates and keys stored in the DigiCert ONE Secure Software Manager diff --git a/jsign-cli/src/main/java/net/jsign/JsignCLI.java b/jsign-cli/src/main/java/net/jsign/JsignCLI.java index f57b4f14..089329d5 100644 --- a/jsign-cli/src/main/java/net/jsign/JsignCLI.java +++ b/jsign-cli/src/main/java/net/jsign/JsignCLI.java @@ -78,7 +78,8 @@ public static void main(String... args) { + "- ESIGNER: SSL.com eSigner\n" + "- GOOGLECLOUD: Google Cloud KMS\n" + "- HASHICORPVAULT: Google Cloud KMS via HashiCorp Vault\n" - + "- ORACLECLOUD: Oracle Cloud Key Management Service\n").build()); + + "- ORACLECLOUD: Oracle Cloud Key Management Service\n" + + "- TRUSTEDSIGNING: Azure Trusted Signing\n").build()); options.addOption(Option.builder("a").hasArg().longOpt(PARAM_ALIAS).argName("NAME").desc("The alias of the certificate used for signing in the keystore.").build()); options.addOption(Option.builder().hasArg().longOpt(PARAM_KEYPASS).argName("PASSWORD").desc("The password of the private key. When using a keystore, this parameter can be omitted if the keystore shares the same password.").build()); options.addOption(Option.builder().hasArg().longOpt(PARAM_KEYFILE).argName("FILE").desc("The file containing the private key. PEM and PVK files are supported. ").type(File.class).build()); diff --git a/jsign-core/src/main/java/net/jsign/KeyStoreType.java b/jsign-core/src/main/java/net/jsign/KeyStoreType.java index 36eab934..c30bf05c 100644 --- a/jsign-core/src/main/java/net/jsign/KeyStoreType.java +++ b/jsign-core/src/main/java/net/jsign/KeyStoreType.java @@ -37,6 +37,7 @@ import net.jsign.jca.AmazonCredentials; import net.jsign.jca.AmazonSigningService; import net.jsign.jca.AzureKeyVaultSigningService; +import net.jsign.jca.AzureTrustedSigningService; import net.jsign.jca.DigiCertOneSigningService; import net.jsign.jca.ESignerSigningService; import net.jsign.jca.GoogleCloudSigningService; @@ -469,6 +470,30 @@ Provider getProvider(KeyStoreBuilder params) { } return new SigningServiceJcaProvider(new OracleCloudSigningService(credentials, getCertificateStore(params))); } + }, + + /** + * Azure Trusted Signing Service. The keystore parameter specifies the API endpoint (for example + * weu.codesigning.azure.net). The Azure API access token is used as the keystore password, + * it can be obtained using the Azure CLI with: + * + *

  az account get-access-token --resource https://codesigning.azure.net
+ */ + TRUSTEDSIGNING(false, false, false) { + @Override + void validate(KeyStoreBuilder params) { + if (params.keystore() == null) { + throw new IllegalArgumentException("keystore " + params.parameterName() + " must specify the Azure endpoint (.codesigning.azure.net)"); + } + if (params.storepass() == null) { + throw new IllegalArgumentException("storepass " + params.parameterName() + " must specify the Azure API access token"); + } + } + + @Override + Provider getProvider(KeyStoreBuilder params) { + return new SigningServiceJcaProvider(new AzureTrustedSigningService(params.keystore(), params.storepass())); + } }; diff --git a/jsign-core/src/main/java/net/jsign/SignerHelper.java b/jsign-core/src/main/java/net/jsign/SignerHelper.java index 6e661e79..d4549700 100644 --- a/jsign-core/src/main/java/net/jsign/SignerHelper.java +++ b/jsign-core/src/main/java/net/jsign/SignerHelper.java @@ -384,6 +384,13 @@ private AuthenticodeSigner build() throws SignerException { } catch (Exception e) { throw new SignerException("Couldn't initialize proxy", e); } + + // enable timestamping with Azure Trusted Signing + if (tsaurl == null && storetype == KeyStoreType.TRUSTEDSIGNING) { + tsaurl = "http://timestamp.acs.microsoft.com/"; + tsmode = TimestampingMode.RFC3161.name(); + tsretries = 3; + } // configure the signer return new AuthenticodeSigner(chain, privateKey) diff --git a/jsign-core/src/main/java/net/jsign/jca/AzureTrustedSigningService.java b/jsign-core/src/main/java/net/jsign/jca/AzureTrustedSigningService.java new file mode 100644 index 00000000..6f247d56 --- /dev/null +++ b/jsign-core/src/main/java/net/jsign/jca/AzureTrustedSigningService.java @@ -0,0 +1,189 @@ +/** + * Copyright 2024 Emmanuel Bourg + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package net.jsign.jca; + +import java.io.ByteArrayInputStream; +import java.io.IOException; +import java.security.GeneralSecurityException; +import java.security.InvalidAlgorithmParameterException; +import java.security.KeyStoreException; +import java.security.UnrecoverableKeyException; +import java.security.cert.Certificate; +import java.security.cert.CertificateException; +import java.security.cert.CertificateFactory; +import java.util.ArrayList; +import java.util.Base64; +import java.util.Collection; +import java.util.HashMap; +import java.util.List; +import java.util.Map; + +import com.cedarsoftware.util.io.JsonWriter; + +import net.jsign.DigestAlgorithm; + +/** + * Signing service using the Azure Trusted Signing API. + * + * @since 6.1 + */ +public class AzureTrustedSigningService implements SigningService { + + /** Cache of certificate chains indexed by alias */ + private final Map certificates = new HashMap<>(); + + private final RESTClient client; + + /** Timeout in seconds for the signing operation */ + private long timeout = 60; + + /** + * Mapping between Java and Azure signing algorithms. + * @see Key Vault API - JonWebKeySignatureAlgorithm + */ + private final Map algorithmMapping = new HashMap<>(); + { + algorithmMapping.put("SHA256withRSA", "RS256"); + algorithmMapping.put("SHA384withRSA", "RS384"); + algorithmMapping.put("SHA512withRSA", "RS512"); + algorithmMapping.put("SHA256withECDSA", "ES256"); + algorithmMapping.put("SHA384withECDSA", "ES384"); + algorithmMapping.put("SHA512withECDSA", "ES512"); + algorithmMapping.put("SHA256withRSA/PSS", "PS256"); + algorithmMapping.put("SHA384withRSA/PSS", "PS384"); + algorithmMapping.put("SHA512withRSA/PSS", "PS512"); + } + + public AzureTrustedSigningService(String endpoint, String token) { + if (!endpoint.startsWith("http")) { + endpoint = "https://" + endpoint; + } + client = new RESTClient(endpoint, conn -> conn.setRequestProperty("Authorization", "Bearer " + token)); + } + + void setTimeout(int timeout) { + this.timeout = timeout; + } + + @Override + public String getName() { + return "TrustedSigning"; + } + + @Override + public List aliases() throws KeyStoreException { + return new ArrayList<>(); + } + + @Override + public Certificate[] getCertificateChain(String alias) throws KeyStoreException { + if (!certificates.containsKey(alias)) { + try { + String account = alias.substring(0, alias.indexOf('/')); + String profile = alias.substring(alias.indexOf('/') + 1); + SignStatus status = sign(account, profile, "RS256", new byte[32]); + certificates.put(alias, status.getCertificateChain().toArray(new Certificate[0])); + } catch (Exception e) { + throw new KeyStoreException("Unable to retrieve the certificate chain '" + alias + "'", e); + } + } + + return certificates.get(alias); + } + + @Override + public SigningServicePrivateKey getPrivateKey(String alias, char[] password) throws UnrecoverableKeyException { + return new SigningServicePrivateKey(alias, "RSA", this); + } + + @Override + public byte[] sign(SigningServicePrivateKey privateKey, String algorithm, byte[] data) throws GeneralSecurityException { + String alg = algorithmMapping.get(algorithm); + if (alg == null) { + throw new InvalidAlgorithmParameterException("Unsupported signing algorithm: " + algorithm); + } + + DigestAlgorithm digestAlgorithm = DigestAlgorithm.of(algorithm.substring(0, algorithm.toLowerCase().indexOf("with"))); + data = digestAlgorithm.getMessageDigest().digest(data); + + String alias = privateKey.getId(); + String account = alias.substring(0, alias.indexOf('/')); + String profile = alias.substring(alias.indexOf('/') + 1); + try { + SignStatus status = sign(account, profile, alg, data); + return status.signature; + } catch (IOException e) { + throw new GeneralSecurityException(e); + } + } + + private SignStatus sign(String account, String profile, String algorithm, byte[] data) throws IOException { + Map request = new HashMap<>(); + request.put("signatureAlgorithm", algorithm); + request.put("digest", Base64.getEncoder().encodeToString(data)); + + Map args = new HashMap<>(); + args.put(JsonWriter.TYPE, "false"); + + Map response = client.post("/codesigningaccounts/" + account + "/certificateprofiles/" + profile + "/sign?api-version=2022-06-15-preview", JsonWriter.objectToJson(request, args)); + + String operationId = (String) response.get("operationId"); + + // poll until the operation is completed + long startTime = System.currentTimeMillis(); + int i = 0; + while (System.currentTimeMillis() - startTime < timeout * 1000) { + try { + Thread.sleep(Math.min(1000, 50 + 10 * i++)); + } catch (InterruptedException e) { + break; + } + response = client.get("/codesigningaccounts/" + account + "/certificateprofiles/" + profile + "/sign/" + operationId + "?api-version=2022-06-15-preview"); + String status = (String) response.get("status"); + if ("InProgress".equals(status)) { + continue; + } + if ("Succeeded".equals(status)) { + break; + } + + throw new IOException("Signing operation " + operationId + " failed: " + status); + } + + if (!"Succeeded".equals(response.get("status"))) { + throw new IOException("Signing operation " + operationId + " timed out"); + } + + SignStatus status = new SignStatus(); + status.signature = Base64.getDecoder().decode((String) response.get("signature")); + status.signingCertificate = new String(Base64.getDecoder().decode((String) response.get("signingCertificate"))); + + return status; + } + + private static class SignStatus { + public byte[] signature; + public String signingCertificate; + + public Collection getCertificateChain() throws CertificateException { + byte[] cerbin = Base64.getMimeDecoder().decode(signingCertificate); + + CertificateFactory certificateFactory = CertificateFactory.getInstance("X.509"); + return certificateFactory.generateCertificates(new ByteArrayInputStream(cerbin)); + } + } +} diff --git a/jsign-core/src/main/java/net/jsign/jca/RESTClient.java b/jsign-core/src/main/java/net/jsign/jca/RESTClient.java index d9314819..fb31367c 100644 --- a/jsign-core/src/main/java/net/jsign/jca/RESTClient.java +++ b/jsign-core/src/main/java/net/jsign/jca/RESTClient.java @@ -26,6 +26,7 @@ import java.util.function.Consumer; import com.cedarsoftware.util.io.JsonReader; +import com.cedarsoftware.util.io.JsonWriter; import org.apache.commons.io.IOUtils; class RESTClient { @@ -136,6 +137,10 @@ private String getErrorMessage(Map response) { String error = (String) response.get("__type"); String description = (String) response.get("message"); message.append(error).append(": ").append(description); + } else if (response.containsKey("title") && response.containsKey("errors")) { + // error from Azure Code Signing API + String errors = JsonWriter.objectToJson(response.get("errors")); + message.append(response.get("status")).append(" - ").append(response.get("title")).append(": ").append(errors); } else if (response.containsKey("code") && response.containsKey("message")) { // error from OCI API message.append(response.get("code")).append(": ").append(response.get("message")); diff --git a/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java b/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java index c79c148d..3a813134 100644 --- a/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java +++ b/jsign-core/src/test/java/net/jsign/KeyStoreBuilderTest.java @@ -329,6 +329,32 @@ public void testBuildOracleCloud() throws Exception { assertNotNull("keystore", keystore); } + @Test + public void testBuildTrustedSigning() throws Exception { + KeyStoreBuilder builder = new KeyStoreBuilder().storetype(TRUSTEDSIGNING); + + try { + builder.build(); + fail("Exception not thrown"); + } catch (IllegalArgumentException e) { + assertEquals("message", "keystore parameter must specify the Azure endpoint (.codesigning.azure.net)", e.getMessage()); + } + + builder.keystore("https://weu.codesigning.azure.net"); + + try { + builder.build(); + fail("Exception not thrown"); + } catch (IllegalArgumentException e) { + assertEquals("message", "storepass parameter must specify the Azure API access token", e.getMessage()); + } + + builder.storepass("0123456789ABCDEF"); + + KeyStore keystore = builder.build(); + assertNotNull("keystore", keystore); + } + @Test public void testBuildJKS() throws Exception { KeyStoreBuilder builder = new KeyStoreBuilder().storetype(JKS); diff --git a/jsign-core/src/test/java/net/jsign/SignerHelperTest.java b/jsign-core/src/test/java/net/jsign/SignerHelperTest.java index ebfdfddf..bf26beb5 100644 --- a/jsign-core/src/test/java/net/jsign/SignerHelperTest.java +++ b/jsign-core/src/test/java/net/jsign/SignerHelperTest.java @@ -311,6 +311,27 @@ public void testOracleCloud() throws Exception { SignatureAssert.assertSigned(new PEFile(targetFile), SHA256); } + @Test + public void testTrustedSigning() throws Exception { + File sourceFile = new File("target/test-classes/wineyes.exe"); + File targetFile = new File("target/test-classes/wineyes-signed-with-azure-trusted-signing.exe"); + + FileUtils.copyFile(sourceFile, targetFile); + + SignerHelper helper = new SignerHelper(new StdOutConsole(1), "option") + .storetype("TRUSTEDSIGNING") + .keystore("weu.codesigning.azure.net") + .storepass(Azure.getAccessToken("https://codesigning.azure.net")) + .alias("MyAccount/MyProfile") + .alg("SHA-256"); + + helper.sign(targetFile); + + Signable signable = Signable.of(targetFile); + SignatureAssert.assertSigned(signable, SHA256); + SignatureAssert.assertTimestamped("Invalid timestamp", signable.getSignatures().get(0)); + } + @Test public void testPIV() throws Exception { PIVCardTest.assumeCardPresent(); diff --git a/jsign-core/src/test/java/net/jsign/jca/Azure.java b/jsign-core/src/test/java/net/jsign/jca/Azure.java index 59a2ebf9..99fa71c4 100644 --- a/jsign-core/src/test/java/net/jsign/jca/Azure.java +++ b/jsign-core/src/test/java/net/jsign/jca/Azure.java @@ -29,9 +29,16 @@ public class Azure { * Generates an Azure access token using the CLI: az account get-access-token --resource "https://vault.azure.net" */ public static String getAccessToken() throws IOException, InterruptedException { + return getAccessToken("https://vault.azure.net"); + } + + /** + * Generates an Azure access token using the CLI: az account get-access-token --resource <resource> + */ + public static String getAccessToken(String resource) throws IOException, InterruptedException { Process process = null; try { - ProcessBuilder builder = new ProcessBuilder("az.cmd", "account", "get-access-token", "--resource", "https://vault.azure.net"); + ProcessBuilder builder = new ProcessBuilder("az.cmd", "account", "get-access-token", "--resource", resource); process = builder.start(); process.waitFor(); Assume.assumeTrue("Couldn't get Azure API token", process.exitValue() == 0); diff --git a/jsign-core/src/test/java/net/jsign/jca/AzureTrustedSigningServiceTest.java b/jsign-core/src/test/java/net/jsign/jca/AzureTrustedSigningServiceTest.java new file mode 100644 index 00000000..86108c3e --- /dev/null +++ b/jsign-core/src/test/java/net/jsign/jca/AzureTrustedSigningServiceTest.java @@ -0,0 +1,212 @@ +/** + * Copyright 2024 Emmanuel Bourg + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package net.jsign.jca; + +import java.io.FileInputStream; +import java.security.GeneralSecurityException; +import java.security.KeyStoreException; +import java.security.cert.Certificate; +import java.security.cert.X509Certificate; +import java.util.Collections; +import java.util.List; + +import org.junit.After; +import org.junit.Before; +import org.junit.Test; + +import static net.jadler.Jadler.*; +import static org.junit.Assert.*; + +public class AzureTrustedSigningServiceTest { + + @Before + public void setUp() { + initJadler().withDefaultResponseStatus(404); + } + + @After + public void tearDown() { + closeJadler(); + } + + @Test + public void testGetAliases() throws Exception { + SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token"); + List aliases = service.aliases(); + + assertEquals("aliases", Collections.emptyList(), aliases); + } + + @Test + public void testGetCertificateChain() throws Exception { + onRequest() + .havingMethodEqualTo("POST") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(202) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}"); + onRequest() + .havingMethodEqualTo("GET") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign/1f234bd9-16cf-4283-9ee6-a460d31207bb") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(200) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}") + .thenRespond() + .withStatus(200) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}") + .thenRespond() + .withStatus(200) + .withBody(new FileInputStream("target/test-classes/services/trustedsigning-sign.json")); + + SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token"); + Certificate[] chain = service.getCertificateChain("MyAccount/MyProfile"); + assertNotNull("null chain", chain); + assertEquals("length", 4, chain.length); + assertEquals("subject 1", "CN=Emmanuel Bourg, O=Emmanuel Bourg, L=Paris, ST=Ile de France, C=FR", ((X509Certificate) chain[0]).getSubjectDN().getName()); + assertEquals("subject 2", "CN=Microsoft ID Verified CS EOC CA 01, O=Microsoft Corporation, C=US", ((X509Certificate) chain[1]).getSubjectDN().getName()); + assertEquals("subject 3", "CN=Microsoft ID Verified Code Signing PCA 2021, O=Microsoft Corporation, C=US", ((X509Certificate) chain[2]).getSubjectDN().getName()); + assertEquals("subject 4", "CN=Microsoft Identity Verification Root Certificate Authority 2020, O=Microsoft Corporation, C=US", ((X509Certificate) chain[3]).getSubjectDN().getName()); + } + + @Test + public void testGetCertificateChainWithError() { + onRequest() + .havingMethodEqualTo("POST") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(403); + + SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token"); + try { + service.getCertificateChain("MyAccount/MyProfile"); + fail("No exception thrown"); + } catch (KeyStoreException e) { + assertEquals("message", "Unable to retrieve the certificate chain 'MyAccount/MyProfile'", e.getMessage()); + } + } + + @Test + public void testGetPrivateKey() throws Exception { + SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token"); + SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null); + assertNotNull("null key", privateKey); + assertEquals("id", "MyAccount/MyProfile", privateKey.getId()); + assertEquals("algorithm", "RSA", privateKey.getAlgorithm()); + } + + @Test + public void testSign() throws Exception { + onRequest() + .havingMethodEqualTo("POST") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(202) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}"); + onRequest() + .havingMethodEqualTo("GET") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign/1f234bd9-16cf-4283-9ee6-a460d31207bb") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(200) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}") + .thenRespond() + .withStatus(200) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}") + .thenRespond() + .withStatus(200) + .withBody(new FileInputStream("target/test-classes/services/trustedsigning-sign.json")); + + AzureTrustedSigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token"); + SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null); + + byte[] signature = service.sign(privateKey, "SHA256withRSA", "Hello".getBytes()); + + assertNotNull("null signature", signature); + assertEquals("length", 384, signature.length); + } + + @Test + public void testSignWithTimeout() throws Exception { + onRequest() + .havingMethodEqualTo("POST") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(202) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}"); + onRequest() + .havingMethodEqualTo("GET") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign/1f234bd9-16cf-4283-9ee6-a460d31207bb") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(200) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}"); + + AzureTrustedSigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token"); + service.setTimeout(2); + SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null); + try { + service.sign(privateKey, "SHA256withRSA", "Hello".getBytes()); + fail("No exception thrown"); + } catch (GeneralSecurityException e) { + assertEquals("message", "java.io.IOException: Signing operation 1f234bd9-16cf-4283-9ee6-a460d31207bb timed out", e.getMessage()); + } + } + + @Test + public void testSignWithFailure() throws Exception { + onRequest() + .havingMethodEqualTo("POST") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(202) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"InProgress\",\"signature\":null,\"signingCertificate\":null}"); + onRequest() + .havingMethodEqualTo("GET") + .havingPathEqualTo("/codesigningaccounts/MyAccount/certificateprofiles/MyProfile/sign/1f234bd9-16cf-4283-9ee6-a460d31207bb") + .havingQueryStringEqualTo("api-version=2022-06-15-preview") + .respond() + .withStatus(200) + .withBody("{\"operationId\":\"1f234bd9-16cf-4283-9ee6-a460d31207bb\",\"status\":\"Failed\",\"signature\":null,\"signingCertificate\":null}"); + + AzureTrustedSigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token"); + SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null); + try { + service.sign(privateKey, "SHA256withRSA", "Hello".getBytes()); + fail("No exception thrown"); + } catch (GeneralSecurityException e) { + assertEquals("message", "java.io.IOException: Signing operation 1f234bd9-16cf-4283-9ee6-a460d31207bb failed: Failed", e.getMessage()); + } + } + + @Test + public void testSignWithInvalidAlgorithm() throws Exception { + SigningService service = new AzureTrustedSigningService("http://localhost:" + port(), "token"); + SigningServicePrivateKey privateKey = service.getPrivateKey("MyAccount/MyProfile", null); + try { + service.sign(privateKey, "SHA1withRSA", "Hello".getBytes()); + fail("No exception thrown"); + } catch (GeneralSecurityException e) { + assertEquals("message", "Unsupported signing algorithm: SHA1withRSA", e.getMessage()); + } + } +} diff --git a/jsign-core/src/test/java/net/jsign/jca/SigningServiceTest.java b/jsign-core/src/test/java/net/jsign/jca/SigningServiceTest.java index 4400e1f1..cdc407ab 100644 --- a/jsign-core/src/test/java/net/jsign/jca/SigningServiceTest.java +++ b/jsign-core/src/test/java/net/jsign/jca/SigningServiceTest.java @@ -200,4 +200,14 @@ public void testOracleCloudProvider() throws Exception { testCustomProvider(provider, keystore, "ocid1.key.oc1.eu-paris-1.h5tafwboaahxq.abrwiljrwkhgllb5zfqchmvdkmqnzutqeq5pz7yo6z7yhl2zyn2yncwzxiza", ""); } + + @Test + public void testTrustedSigningProvider() throws Exception { + String token = Azure.getAccessToken("https://codesigning.azure.net"); + Provider provider = new SigningServiceJcaProvider(new AzureTrustedSigningService("https://weu.codesigning.azure.net", token)); + KeyStore keystore = KeyStore.getInstance("TRUSTEDSIGNING", provider); + keystore.load(null, "".toCharArray()); + + testCustomProvider(provider, keystore, "MyAccount/MyProfile", ""); + } } diff --git a/jsign-core/src/test/resources/services/trustedsigning-sign.json b/jsign-core/src/test/resources/services/trustedsigning-sign.json new file mode 100644 index 00000000..1e6e22ad --- /dev/null +++ b/jsign-core/src/test/resources/services/trustedsigning-sign.json @@ -0,0 +1,6 @@ +{ + "operationId": "1f234bd9-16cf-4283-9ee6-a460d31207bb", + "status": "Succeeded", + "signature": "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", + "signingCertificate": "MIIi3wYJKoZIhvcNAQcCoIIi0DCCIswCAQExADCCBwAGCSqGSIb3DQEHAaCCBvEE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" +} diff --git a/jsign-maven-plugin/src/main/java/net/jsign/JsignMojo.java b/jsign-maven-plugin/src/main/java/net/jsign/JsignMojo.java index ecb1b2bd..7ed36115 100644 --- a/jsign-maven-plugin/src/main/java/net/jsign/JsignMojo.java +++ b/jsign-maven-plugin/src/main/java/net/jsign/JsignMojo.java @@ -87,7 +87,7 @@ public class JsignMojo extends AbstractMojo { /** * The type of the keystore (JKS, JCEKS, PKCS12, PKCS11, ETOKEN, NITROKEY, OPENPGP, OPENSC, PIV, YUBIKEY, AWS, - * AZUREKEYVAULT, DIGICERTONE, ESIGNER, GOOGLECLOUD, HASHICORPVAULT or ORACLECLOUD). + * AZUREKEYVAULT, DIGICERTONE, ESIGNER, GOOGLECLOUD, HASHICORPVAULT, ORACLECLOUD or TRUSTEDSIGNING). */ @Parameter( property = "jsign.storetype" ) private String storetype; diff --git a/jsign/src/deb/data/usr/share/bash-completion/completions/jsign b/jsign/src/deb/data/usr/share/bash-completion/completions/jsign index 9e90a6a1..e158fa2b 100644 --- a/jsign/src/deb/data/usr/share/bash-completion/completions/jsign +++ b/jsign/src/deb/data/usr/share/bash-completion/completions/jsign @@ -22,7 +22,7 @@ _jsign() return 0 ;; --storetype) - COMPREPLY=( $( compgen -W 'JKS JCEKS PKCS12 PKCS11 AWS AZUREKEYVAULT DIGICERTONE ESIGNER ETOKEN GOOGLECLOUD HASHICORPVAULT ORACLECLOUD YUBIKEY NITROKEY OPENPGP OPENSC PIV' -- "$cur" ) ) + COMPREPLY=( $( compgen -W 'JKS JCEKS PKCS12 PKCS11 AWS AZUREKEYVAULT DIGICERTONE ESIGNER ETOKEN GOOGLECLOUD HASHICORPVAULT ORACLECLOUD TRUSTEDSIGNING YUBIKEY NITROKEY OPENPGP OPENSC PIV' -- "$cur" ) ) return 0 ;; --storepass|-a|--alias|--keypass|-t|--tsaurl|-r|--tsretries|-w|--tsretrywait|-n|--name|-u|--url|-e|--encoding) diff --git a/jsign/src/deb/data/usr/share/man/man1/jsign.1 b/jsign/src/deb/data/usr/share/man/man1/jsign.1 index faa6a8bd..c78b69ac 100644 --- a/jsign/src/deb/data/usr/share/man/man1/jsign.1 +++ b/jsign/src/deb/data/usr/share/man/man1/jsign.1 @@ -75,6 +75,8 @@ The type of the keystore: .br - ORACLECLOUD : Oracle Cloud Key Management Service .br +- TRUSTEDSIGNING: Azure Trusted Signing +.br This option is not required for file based keystores (JKS, JCEKS and PKCS12). .TP @@ -315,6 +317,32 @@ The Azure account used must have the "Key Vault Crypto User" and "Key Vault Cert .TP +Signing with Azure Trusted Signing + +With the Azure Trusted Signing service the keystore parameter specifies the endpoint URI, and the alias combines +the account name and the certificate profile. The Azure API access token is used as the keystore password. + +jsign --storetype TRUSTEDSIGNING \ + --keystore weu.codesigning.azure.net \ + --storepass \ + --alias / application.exe + +The access token can be obtained with the Azure CLI: + +az account get-access-token --resource https://codesigning.azure.net + +The Azure account used must have the "Code Signing Certificate Profile Signer" role. + +The certificates issued by Azure Trusted Signing have a lifetime of 3 days only, and timestamping is necessary to +ensure the long term validity of the signature. For this reason timestamping is automatically enabled when signing +with this service. + +Implementation note: Jsign performs an extra call to the signing API to retrieve the current certificate chain before +signing. When signing multiple files it's recommended to invoke Jsign only once with the list of files to avoid doubling +the quota usage. + +.TP + Signing with DigiCert ONE: Certificates and keys stored in the DigiCert ONE Secure Software Manager can be used directly without installing