ci: SignPath Windows installer signing#579
Conversation
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Path: .coderabbit.yaml Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (1)
🚧 Files skipped from review as they are similar to previous changes (1)
WalkthroughExpose the Windows build artifact ID, add a ChangesWindows Installer Code Signing
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes Possibly related PRs
Poem
🚥 Pre-merge checks | ✅ 5✅ Passed checks (5 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Greptile Summary
Confidence Score: 4/5Safe to merge once the pre-merge checklist items (repo secret, artifact slug, Trusted Build System) are confirmed; no blocking code defects found. No P0 or P1 findings. Previous review concerns (mutable action tag, hardcoded test-signing policy) are both addressed. The only open item is a P2 suggestion to cap the wait-for-completion blocking time to avoid a worst-case 6-hour pipeline stall. .github/workflows/build-desktop-platforms.yml — verify the artifact-configuration-slug: 'initial-version' matches the actual SignPath UI slug before merging (noted as assumed in the PR description). Important Files Changed
Sequence DiagramsequenceDiagram
participant BW as build-windows
participant SW as sign-windows
participant SP as SignPath API
participant R as release
BW->>BW: Gradle build (.exe, .msi)
BW->>BW: upload-artifact → windows-installers
SW->>SW: "Verify SIGNPATH_* config"
SW->>SP: Submit signing request (artifact-id, OIDC token, policy slug)
SP-->>SW: Signed artifact
SW->>SW: upload-artifact → windows-installers-signed
R->>R: download-artifact (all)
R->>R: Stage signed .exe/.msi → release-files/
R->>R: gh release create (draft)
Reviews (3): Last reviewed commit: "ci(signpath): pin action to SHA, gate po..." | Re-trigger Greptile |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.
Inline comments:
In @.github/workflows/build-desktop-platforms.yml:
- Line 88: The workflow is using a mutable tag for the SignPath action ("uses:
signpath/github-action-submit-signing-request@v1"); replace the tag with the
action's full commit SHA to pin the dependency (e.g., "uses:
signpath/github-action-submit-signing-request@<full-commit-sha>") by looking up
the desired commit in the signpath/github-action-submit-signing-request
repository and updating the uses line accordingly so the workflow references an
immutable SHA instead of `@v1`.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Path: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Run ID: e0a4dd0d-2d5c-416d-bd31-a0b500f12284
📒 Files selected for processing (1)
.github/workflows/build-desktop-platforms.yml
Wire SignPath Foundation signing into the Windows installer pipeline so users stop seeing "Unknown publisher" on .exe/.msi (issue #394).
Flow: build-windows → sign-windows (submit to SignPath, wait, fetch signed zip) → release uses signed artifact.
Currently policy=test-signing (release cert CSR pending). Swap to release-signing once SignPath issues prod cert.
Pre-merge checklist:
Closes #394
Summary by CodeRabbit