|
// Licensed to the .NET Foundation under one or more agreements.
// The .NET Foundation licenses this file to you under the MIT license.
using Microsoft.Arcade.Test.Common;
using Microsoft.Build.Framework;
using Microsoft.Build.Utilities;
using System;
using System.Collections.Generic;
using System.IO;
using System.IO.Compression;
using System.Linq;
using System.Runtime.InteropServices;
using Xunit;
using Xunit.Abstractions;
using FluentAssertions;
namespace Microsoft.DotNet.SignTool.Tests
{
public class SignToolTests : IDisposable
{
private readonly string _tmpDir;
private readonly ITestOutputHelper _output;
// Default extension based signing information
private static readonly Dictionary<string, List<SignInfo>> s_fileExtensionSignInfo = new Dictionary<string, List<SignInfo>>()
{
{".js", new List<SignInfo>{ new SignInfo("JSCertificate") } },
{".jar", new List<SignInfo>{ new SignInfo("JARCertificate") } },
{".ps1", new List<SignInfo>{ new SignInfo("PSCertificate") } },
{".psd1", new List<SignInfo>{ new SignInfo("PSDCertificate") } },
{".psm1", new List<SignInfo>{ new SignInfo("PSMCertificate") } },
{".psc1", new List<SignInfo>{ new SignInfo("PSCCertificate") } },
{".dylib", new List<SignInfo>{ new SignInfo("DylibCertificate") } },
{".deb", new List<SignInfo>{ new SignInfo("LinuxSign") } },
{".dll", new List<SignInfo>{ new SignInfo("Microsoft400") } }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{".exe", new List<SignInfo>{ new SignInfo("Microsoft400") } }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{".msi", new List<SignInfo>{ new SignInfo("Microsoft400") } }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{".vsix", new List<SignInfo>{ new SignInfo("VsixSHA2") } },
{".zip", new List<SignInfo>{ SignInfo.Ignore } },
{".tgz", new List<SignInfo>{ SignInfo.Ignore } },
{".py", new List<SignInfo>{ new SignInfo("Microsoft400") } }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{".nupkg", new List<SignInfo>{ new SignInfo("NuGet") } },
{".symbols.nupkg", new List<SignInfo>{ SignInfo.Ignore } },
};
private static readonly Dictionary<string, List<SignInfo>> s_fileExtensionSignInfoWithCollisionId =
new Dictionary<string, List<SignInfo>>()
{
{".js", new List<SignInfo>{ new SignInfo("JSCertificate", collisionPriorityId: "123") } },
{".jar", new List<SignInfo>{ new SignInfo("JARCertificate", collisionPriorityId: "123") } },
{ ".ps1", new List<SignInfo>{ new SignInfo("PSCertificate", collisionPriorityId: "123") } },
{ ".psd1", new List<SignInfo>{ new SignInfo("PSDCertificate", collisionPriorityId: "123") } },
{ ".psm1", new List<SignInfo>{ new SignInfo("PSMCertificate", collisionPriorityId: "123") } },
{ ".psc1", new List<SignInfo>{ new SignInfo("PSCCertificate", collisionPriorityId: "123") } },
{ ".dylib", new List<SignInfo>{ new SignInfo("DylibCertificate", collisionPriorityId: "123") } },
{ ".deb", new List<SignInfo>{ new SignInfo("LinuxSign", collisionPriorityId: "123") } },
{ ".dll", new List<SignInfo>
{
new SignInfo("Microsoft400", collisionPriorityId: "123"), // lgtm [cs/common-default-passwords] Safe, these are certificate names
new SignInfo("FakeOne", collisionPriorityId: "456")
}
},
{ ".exe", new List<SignInfo>{ new SignInfo("Microsoft400", collisionPriorityId: "123") } }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{ ".msi", new List<SignInfo>{ new SignInfo("Microsoft400", collisionPriorityId: "123") } }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{ ".vsix", new List<SignInfo>{ new SignInfo("VsixSHA2", collisionPriorityId: "123") } },
{ ".zip", new List<SignInfo>{ SignInfo.Ignore } },
{ ".tgz", new List<SignInfo>{ SignInfo.Ignore } },
{ ".nupkg", new List<SignInfo>{ new SignInfo("NuGet", collisionPriorityId: "123") } },
{ ".symbols.nupkg", new List<SignInfo>{ SignInfo.Ignore } },
};
// Default extension based signing information post build
private static readonly ITaskItem[] s_fileExtensionSignInfoPostBuild = new ITaskItem[]
{
new TaskItem(".js", new Dictionary<string, string> {
{ "CertificateName", "JSCertificate" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".jar", new Dictionary<string, string> {
{ "CertificateName", "JARCertificate" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".ps1", new Dictionary<string, string> {
{ "CertificateName", "PSCertificate" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".psd1", new Dictionary<string, string> {
{ "CertificateName", "PSDCertificate" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".psm1", new Dictionary<string, string> {
{ "CertificateName", "PSMCertificate" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".psc1", new Dictionary<string, string> {
{ "CertificateName", "PSCCertificate" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".dylib", new Dictionary<string, string> {
{ "CertificateName", "DylibCertificate" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".deb", new Dictionary<string, string> {
{ "CertificateName", "LinuxSign" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".dll", new Dictionary<string, string> {
{ "CertificateName", "Microsoft400" }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".exe", new Dictionary<string, string> {
{ "CertificateName", "Microsoft400" }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".zip", new Dictionary<string, string> {
{ "CertificateName", "None" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".tgz", new Dictionary<string, string> {
{ "CertificateName", "None" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".nupkg", new Dictionary<string, string> {
{ "CertificateName", "NuGet" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".vsix", new Dictionary<string, string> {
{ "CertificateName", "VsixSHA2" },
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(".js", new Dictionary<string, string> {
{ "CertificateName", "JSCertificate" },
{ SignToolConstants.CollisionPriorityId, "234" }
}),
new TaskItem(".jar", new Dictionary<string, string> {
{ "CertificateName", "JARCertificate" },
{ SignToolConstants.CollisionPriorityId, "234" }
}),
new TaskItem(".ps1", new Dictionary<string, string> {
{ "CertificateName", "PSCertificate" },
{ SignToolConstants.CollisionPriorityId, "234" }
}),
new TaskItem(".psd1", new Dictionary<string, string> {
{ "CertificateName", "PSDCertificate" },
{ SignToolConstants.CollisionPriorityId, "234" }
}),
new TaskItem(".dll", new Dictionary<string, string> {
{ "CertificateName", "Microsoft400" }, // lgtm [cs/common-default-passwords] Safe, these are certificate names
{ SignToolConstants.CollisionPriorityId, "234" }
}),
new TaskItem(".nupkg", new Dictionary<string, string> {
{ "CertificateName", "NuGet" },
{ SignToolConstants.CollisionPriorityId, "234" }
}),
new TaskItem(".vsix", new Dictionary<string, string> {
{ "CertificateName", "VsixSHA2" },
{ SignToolConstants.CollisionPriorityId, "234" }
})
};
/// <summary>
/// List of known signable extensions. Copied, removing duplicates, from here:
/// https://microsoft.sharepoint.com/teams/codesigninfo/Wiki/Signable%20Files.aspx
/// </summary>
public static readonly string[] SignableExtensions =
{
".exe",
".dll",
".rll",
".olb",
".ocx",
".cab",
".cat",
".vbs",
".js",
".wfs",
".msi",
".mui",
".msp",
".msu",
".psf",
".mpb",
".mp",
".msm",
".doc",
".xls",
".ppt",
".xla",
".vdx",
".xsn",
".mpp",
".xlam",
".xlsb",
".xlsm",
".xltm",
".potm",
".ppsm",
".pptm",
".docm",
".dotm",
".ttf",
".otf",
".ps1",
".ps1xml",
".psm1",
".psd1",
".psc1",
".cdxml",
".wsf",
".mof",
".sft",
".dsft",
".vsi",
".xap",
".efi",
".vsix",
".jar",
".winmd",
".appx",
".appxbundle",
".esd",
".py",
".pyd",
".deb",
};
public static IEnumerable<object[]> GetSignableExtensions()
{
foreach (var extension in SignableExtensions)
{
yield return new object[] { extension };
}
}
public SignToolTests(ITestOutputHelper output)
{
_tmpDir = Path.Combine(Path.GetTempPath(), Guid.NewGuid().ToString());
Directory.CreateDirectory(_tmpDir);
_output = output;
}
private string GetWixToolPath()
{
return Path.Combine(Path.GetDirectoryName(typeof(SignToolTests).Assembly.Location), "tools", "wix");
}
private static string s_tarToolPath = Path.Combine(Path.GetDirectoryName(typeof(SignToolTests).Assembly.Location), "tools", "tar", "Microsoft.Dotnet.Tar.dll");
private string GetResourcePath(string name, string relativePath = null)
{
var srcPath = Path.Combine(Path.GetDirectoryName(typeof(SignToolTests).Assembly.Location), "Resources", name);
var dstDir = _tmpDir;
if (relativePath != null)
{
dstDir = Path.Combine(dstDir, relativePath);
Directory.CreateDirectory(dstDir);
}
var dstPath = Path.Combine(dstDir, name);
if (!File.Exists(dstPath))
{
File.Copy(srcPath, dstPath);
}
return dstPath;
}
private string CreateTestResource(string name)
{
var dstPath = Path.Combine(_tmpDir, name);
File.WriteAllText(dstPath, "This is a test file content");
return dstPath;
}
public void Dispose()
{
try
{
Directory.Delete(_tmpDir, recursive: true);
}
catch
{
}
}
private void ValidateGeneratedProject(
ITaskItem[] itemsToSign,
Dictionary<string, List<SignInfo>> strongNameSignInfo,
Dictionary<ExplicitCertificateKey, string> fileSignInfo,
Dictionary<string, List<SignInfo>> extensionsSignInfo,
string[] expectedXmlElementsPerSigningRound,
ITaskItem[] dualCertificates = null,
string wixToolsPath = null)
{
var buildEngine = new FakeBuildEngine();
var task = new SignToolTask { BuildEngine = buildEngine };
// The path to MSBuild and DotNet will always be null in these tests, this will force
// the signing logic to call our FakeBuildEngine.BuildProjectFile with a path
// to the XML that store the content of the would be Microbuild sign request.
var signToolArgs = new SignToolArgs(_tmpDir, microBuildCorePath: "MicroBuildCorePath", testSign: true, msBuildPath: null, dotnetPath: null, _tmpDir, enclosingDir: "", "", wixToolsPath: wixToolsPath, tarToolPath: s_tarToolPath);
var signTool = new FakeSignTool(signToolArgs, task.Log);
var configuration = new Configuration(signToolArgs.TempDir, itemsToSign, strongNameSignInfo, fileSignInfo, extensionsSignInfo, dualCertificates, tarToolPath: s_tarToolPath, task.Log);
var signingInput = configuration.GenerateListOfFiles();
var util = new BatchSignUtil(
task.BuildEngine,
task.Log,
signTool,
signingInput,
new string[] { },
configuration._hashToCollisionIdMap);
var beforeSigningEngineFilesList = Directory.GetFiles(signToolArgs.TempDir, "*-engine.exe", SearchOption.AllDirectories);
util.Go(doStrongNameCheck: true);
var afterSigningEngineFilesList = Directory.GetFiles(signToolArgs.TempDir, "*-engine.exe", SearchOption.AllDirectories);
// validate no intermediate msi engine files have populated the drop (they fail signing validation).
beforeSigningEngineFilesList.SequenceEqual(afterSigningEngineFilesList).Should().BeTrue();
// The list of files that would be signed was captured inside the FakeBuildEngine,
// here we check if that matches what we expected
var actualXmlElementsPerSigningRound = buildEngine.FilesToSign.Select(round => string.Join(Environment.NewLine, round));
actualXmlElementsPerSigningRound.Count().Should().Be(expectedXmlElementsPerSigningRound.Length);
int i = 0;
foreach (var actual in actualXmlElementsPerSigningRound)
{
var actualXml = AssertEx.NormalizeWhitespace(actual);
var expectedXml = AssertEx.NormalizeWhitespace(expectedXmlElementsPerSigningRound[i]);
actualXml.Should().Be(expectedXml);
i++;
}
task.Log.HasLoggedErrors.Should().BeFalse();
}
private void ValidateFileSignInfos(
ITaskItem[] itemsToSign,
Dictionary<string, List<SignInfo>> strongNameSignInfo,
Dictionary<ExplicitCertificateKey, string> fileSignInfo,
Dictionary<string, List<SignInfo>> extensionsSignInfo,
string[] expected,
string[] expectedCopyFiles = null,
ITaskItem[] dualCertificates = null,
string[] expectedErrors = null,
string[] expectedWarnings = null)
{
var engine = new FakeBuildEngine();
var task = new SignToolTask { BuildEngine = engine };
var signingInput = new Configuration(_tmpDir, itemsToSign, strongNameSignInfo, fileSignInfo, extensionsSignInfo, dualCertificates, tarToolPath: s_tarToolPath, task.Log).GenerateListOfFiles();
signingInput.FilesToSign.Select(f => f.ToString()).Should().BeEquivalentTo(expected);
signingInput.FilesToCopy.Select(f => $"{f.Key} -> {f.Value}").Should().BeEquivalentTo(expectedCopyFiles ?? Array.Empty<string>());
engine.LogErrorEvents.Select(w => w.Message).Should().BeEquivalentTo(expectedErrors ?? Array.Empty<string>());
engine.LogWarningEvents.Select(w => $"{w.Code}: {w.Message}").Should().BeEquivalentTo(expectedWarnings ?? Array.Empty<string>());
}
[Fact]
public void EmptySigningList()
{
var itemsToSign = new ITaskItem[0];
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>();
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
var task = new SignToolTask { BuildEngine = new FakeBuildEngine() };
var signingInput = new Configuration(_tmpDir, itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, null, tarToolPath: s_tarToolPath, task.Log).GenerateListOfFiles();
signingInput.FilesToSign.Should().BeEmpty();
signingInput.ZipDataMap.Should().BeEmpty();
task.Log.HasLoggedErrors.Should().BeFalse();
}
[Fact]
public void EmptySigningListForTask()
{
var task = new SignToolTask
{
BuildEngine = new FakeBuildEngine(),
ItemsToSign = Array.Empty<ITaskItem>(),
StrongNameSignInfo = Array.Empty<ITaskItem>(),
LogDir = "LogDir",
TempDir = "TempDir",
DryRun = false,
TestSign = true,
MSBuildPath = CreateTestResource("msbuild.fake"),
DotNetPath = CreateTestResource("dotnet.fake"),
SNBinaryPath = CreateTestResource("fake.sn.exe")
};
task.Execute().Should().BeTrue();
}
[Fact]
public void SignWhenSnExeIsNotRequired()
{
var task = new SignToolTask
{
BuildEngine = new FakeBuildEngine(_output),
ItemsToSign = Array.Empty<ITaskItem>(),
StrongNameSignInfo = Array.Empty<ITaskItem>(),
LogDir = "LogDir",
TempDir = "TempDir",
DryRun = false,
TestSign = true,
MSBuildPath = CreateTestResource("msbuild.fake"),
DotNetPath = CreateTestResource("dotnet.fake"),
DoStrongNameCheck = false,
SNBinaryPath = null,
};
task.Execute().Should().BeTrue();
}
[Fact]
public void OnlyContainer()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("ContainerOne.1.0.0.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo> {new SignInfo("3PartySHA2", "ArcadeStrongTest", "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.1.0.0.nupkg' Certificate='NuGet'",
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "lib/native/NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
}*/);
}
[Fact]
public void SkipSigning()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("ContainerOne.1.0.0.nupkg"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo> {new SignInfo("3PartySHA2", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>
{
{ new ExplicitCertificateKey("NativeLibrary.dll"), "None" },
{ new ExplicitCertificateKey("ProjectOne.dll", publicKeyToken: "581d91ccdfc4ea9c", targetFramework: ".NETCoreApp,Version=v2.1"), "None" }
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.1.0.0.nupkg' Certificate='NuGet'"
});
}
[Fact]
public void OnlyAuthenticodeSignByPKT()
{
var fileToTest = "ProjectOne.dll";
var pktToTest = "581d91ccdfc4ea9c";
var certificateToTest = "3PartySHA2";
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath(fileToTest), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ pktToTest, new List<SignInfo> { new SignInfo(certificateToTest, collisionPriorityId: "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, new Dictionary<string, List<SignInfo>>(), new[]
{
$"File '{fileToTest}' TargetFramework='.NETStandard,Version=v2.0' Certificate='{certificateToTest}'",
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, new Dictionary<string, List<SignInfo>>(), new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, fileToTest))}"">
<Authenticode>{certificateToTest}</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void OnlyContainerAndOverridingByPKT()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath(GetResourcePath("ContainerOne.1.0.0.nupkg")))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo> { new SignInfo("3PartySHA2", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>()
{
{ new ExplicitCertificateKey("ProjectOne.dll", "581d91ccdfc4ea9c"), "OverriddenCertificate" }
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='OverriddenCertificate' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='OverriddenCertificate' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='OverriddenCertificate' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='OverriddenCertificate' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.1.0.0.nupkg' Certificate='NuGet'"
},
expectedWarnings: new[]
{
// Reenable after https://github.com/dotnet/arcade/issues/10293
// $@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "lib/native/NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "3", "lib/net461/ProjectOne.dll")}' with Microsoft certificate 'OverriddenCertificate'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "5", "lib/netcoreapp2.0/ProjectOne.dll")}' with Microsoft certificate 'OverriddenCertificate'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "6", "lib/netcoreapp2.1/ProjectOne.dll")}' with Microsoft certificate 'OverriddenCertificate'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "7", "lib/netstandard2.0/ProjectOne.dll")}' with Microsoft certificate 'OverriddenCertificate'. The library is considered 3rd party library due to its copyright: ''."
});
}
[Fact]
public void OnlyContainerAndOverridingByFileName()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("ContainerOne.1.0.0.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo> { new SignInfo("ArcadeCertTest", "ArcadeStrongTest", collisionPriorityId: "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>()
{
{ new ExplicitCertificateKey("NativeLibrary.dll", collisionPriorityId: "123"), "OverriddenCertificate1" },
{ new ExplicitCertificateKey("ProjectOne.dll", collisionPriorityId: "123"), "3PartySHA2" }
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'NativeLibrary.dll' Certificate='OverriddenCertificate1'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='ArcadeCertTest' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.1.0.0.nupkg' Certificate='NuGet'"
},
expectedWarnings: new[]
{
// Reenable after https://github.com/dotnet/arcade/issues/10293
// $@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "lib/native/NativeLibrary.dll")}' with Microsoft certificate 'OverriddenCertificate1'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "4", "lib/netcoreapp2.0/ContainerOne.dll")}' with Microsoft certificate 'ArcadeCertTest'. The library is considered 3rd party library due to its copyright: ''."
});
}
[Fact]
public void EmptyPKT()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("EmptyPKT.dll"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>()
{
{ new ExplicitCertificateKey("EmptyPKT.dll"), "3PartySHA2" }
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'EmptyPKT.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='3PartySHA2'",
});
}
[Fact]
public void CrossGenerated()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("CoreLibCrossARM.dll"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("AspNetCoreCrossLib.dll"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "7cec85d7bea7798e", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest", "123") } },
{ "adb9793829ddae60", new List<SignInfo>{ new SignInfo("Microsoft400", "AspNetCore", "123") } } // lgtm [cs/common-default-passwords] Safe, these are certificate names
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>()
{
{ new ExplicitCertificateKey("EmptyPKT.dll", collisionPriorityId: "123"), "3PartySHA2" }
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, new Dictionary<string, List<SignInfo>>(), new[]
{
"File 'CoreLibCrossARM.dll' Certificate='ArcadeCertTest'",
"File 'AspNetCoreCrossLib.dll' TargetFramework='.NETCoreApp,Version=v3.0' Certificate='Microsoft400'",
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, new Dictionary<string, List<SignInfo>>(), new[]
{
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "CoreLibCrossARM.dll"))}"">
<Authenticode>ArcadeCertTest</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "AspNetCoreCrossLib.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>",
});
}
[Fact]
public void DefaultCertificateForAssemblyWithoutStrongName()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("EmptyPKT.dll"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "", new List<SignInfo>{ new SignInfo("3PartySHA2", collisionPriorityId: "123") } }
};
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>() { };
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'EmptyPKT.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='3PartySHA2'",
});
}
[Fact]
public void CustomTargetFrameworkAttribute()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("CustomTargetFrameworkAttribute.dll"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "", new List<SignInfo>{ new SignInfo("DefaultCertificate", collisionPriorityId: "123") } }
};
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>()
{
{ new ExplicitCertificateKey("CustomTargetFrameworkAttribute.dll", targetFramework: ".NETFramework,Version=v2.0", collisionPriorityId: "123"), "3PartySHA2" }
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'CustomTargetFrameworkAttribute.dll' TargetFramework='.NETFramework,Version=v2.0' Certificate='3PartySHA2'",
});
}
[Fact]
public void ThirdPartyLibraryMicrosoftCertificate()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("EmptyPKT.dll"))
};
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>() { };
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>() { };
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'EmptyPKT.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='Microsoft400'",
},
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "EmptyPKT.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''."
});
}
[WindowsOnlyFact]
[Trait("Category", "SkipWhenLiveUnitTesting")]
public void DoubleNestedContainer()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("PackageWithWix.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("MsiBootstrapper.exe.wixpack.zip"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2", "ArcadeStrongTest", "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'MsiSetup.msi' Certificate='Microsoft400'",
"File 'MsiBootstrapper.exe' Certificate='Microsoft400'",
"File 'PackageWithWix.nupkg' Certificate='NuGet'"
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293
expectedWarnings: new[]
{
// $@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "4", "MsiBootstrapper.exe")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: 'Copyright (c). All rights reserved.'."
}*/);
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "4", "ABCDEFG/MsiSetup.msi"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>",
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "engines\\0\\MsiBootstrapper.exe-engine.exe"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>",
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "4", "MsiBootstrapper.exe"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>",
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "PackageWithWix.nupkg"))}"">
<Authenticode>NuGet</Authenticode>
</FilesToSign>"
},
wixToolsPath: GetWixToolPath());
}
[Fact]
public void NestedContainer()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("NestedContainer.1.0.0.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2", "ArcadeStrongTest", "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerTwo.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.1.0.0.nupkg' Certificate='NuGet'",
"File 'NestedContainer.1.0.0.nupkg' Certificate='NuGet'"
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "lib/native/NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''."
}*/);
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "lib/native/NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "3", "lib/net461/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "4", "lib/netcoreapp2.0/ContainerTwo.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "5", "lib/netcoreapp2.0/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "6", "lib/netcoreapp2.1/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "7", "lib/netstandard2.0/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "9", "lib/netcoreapp2.0/ContainerOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "8", "ContainerOne.1.0.0.nupkg"))}"">
<Authenticode>NuGet</Authenticode>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(GetResourcePath("NestedContainer.1.0.0.nupkg"))}"">
<Authenticode>NuGet</Authenticode>
</FilesToSign>"
});
}
[Fact]
public void NestedContainerWithCollisions()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("NestedContainer.1.0.0.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2", "ArcadeStrongTest", "123") } }
};
// Overriding information. Since ContainerOne.dll collides with ContainerTwo.dll already in the hash mapping
// table with collition id 123, we end up using ArcadeStrongTest instead of OverriddenCertificate1
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>()
{
{ new ExplicitCertificateKey("ContainerOne.dll", collisionPriorityId: "456"), "OverriddenCertificate1" }
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerTwo.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.1.0.0.nupkg' Certificate='NuGet'",
"File 'NestedContainer.1.0.0.nupkg' Certificate='NuGet'"
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "lib/native/NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''."
}*/);
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "lib/native/NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "3", "lib/net461/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "4", "lib/netcoreapp2.0/ContainerTwo.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "5", "lib/netcoreapp2.0/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "6", "lib/netcoreapp2.1/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "7", "lib/netstandard2.0/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "9", "lib/netcoreapp2.0/ContainerOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "8", "ContainerOne.1.0.0.nupkg"))}"">
<Authenticode>NuGet</Authenticode>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(GetResourcePath("NestedContainer.1.0.0.nupkg"))}"">
<Authenticode>NuGet</Authenticode>
</FilesToSign>"
});
}
[Fact]
public void SignZipFile()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("test.zip"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'Nested.NativeLibrary.dll' Certificate='Microsoft400'",
"File 'Nested.SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'test.zip' Certificate=''",
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "0", "NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
}*/);
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "0", "NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "1", "SOS.NETCore.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "3", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.SOS.NETCore.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void SignTarGZipFile()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("test.tgz"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'Nested.NativeLibrary.dll' Certificate='Microsoft400'",
"File 'Nested.SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'test.tgz' Certificate=''",
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "0", "test/NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "test/this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
}*/);
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "0", "test/NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "1", "test/SOS.NETCore.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "test/this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "3", "test/this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.SOS.NETCore.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void SymbolsNupkg()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("test.symbols.nupkg"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'Nested.NativeLibrary.dll' Certificate='Microsoft400'",
"File 'Nested.SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'test.symbols.nupkg' Certificate=''",
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "0", "NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
}*/);
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "0", "NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "1", "SOS.NETCore.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "3", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.SOS.NETCore.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void SignedSymbolsNupkg()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("test.symbols.nupkg"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
var tempFileExtensionSignInfo = s_fileExtensionSignInfo.Where(s => s.Key != ".symbols.nupkg").ToDictionary(e => e.Key, e => e.Value);
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, tempFileExtensionSignInfo, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'Nested.NativeLibrary.dll' Certificate='Microsoft400'",
"File 'Nested.SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'test.symbols.nupkg' Certificate='NuGet'",
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "0", "NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
}*/);
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "0", "NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "1", "SOS.NETCore.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.NativeLibrary.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "3", "this_is_a_big_folder_name_look/this_is_an_even_more_longer_folder_name/but_this_one_is_ever_longer_than_the_previous_other_two/Nested.SOS.NETCore.dll"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void CheckDebSigning()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("test.deb"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>();
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'test.deb' Certificate='LinuxSign'"
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "test.deb"))}"">
<Authenticode>LinuxSign</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void CheckPowershellSigning()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("SignedScript.ps1")),
new TaskItem(GetResourcePath("UnsignedScript.ps1"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>();
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'UnsignedScript.ps1' Certificate='PSCertificate'"
});
}
/* These tests return different results on netcoreapp. ie, we can only truly validate nuget integrity when running on framework.
* NuGet behaves differently on core vs framework
* - https://github.com/NuGet/NuGet.Client/blob/e88a5a03a1b26099f8be225d3ee3a897b2edb1d0/build/common.targets#L18-L25
*/
#if NETFRAMEWORK
[Fact]
public void VerifyNupkgIntegrity()
{
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("SignedPackage.1.0.0.nupkg")),
new TaskItem(GetResourcePath("IncorrectlySignedPackage.1.0.0.nupkg"))
};
ValidateFileSignInfos(itemsToSign,
new Dictionary<string, List<SignInfo>>(),
new Dictionary<ExplicitCertificateKey, string>(),
s_fileExtensionSignInfo,
new[] { "File 'IncorrectlySignedPackage.1.0.0.nupkg' Certificate='NuGet'" });
}
[Fact]
public void SignNupkgWithUnsignedContents()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("UnsignedContents.nupkg")),
new TaskItem(GetResourcePath("FakeSignedContents.nupkg"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>();
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'UnsignedScript.ps1' Certificate='PSCertificate'",
"File 'UnsignedContents.nupkg' Certificate='NuGet'",
"File 'FakeSignedContents.nupkg' Certificate='NuGet'"
});
}
#endif
[WindowsOnlyFact]
[Trait("Category", "SkipWhenLiveUnitTesting")]
public void SignMsiEngine()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("MsiBootstrapper.exe")),
new TaskItem(GetResourcePath("MsiBootstrapper.exe.wixpack.zip"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'MsiSetup.msi' Certificate='Microsoft400'",
"File 'MsiBootstrapper.exe' Certificate='Microsoft400'"
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "MsiBootstrapper.exe")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: 'Copyright (c). All rights reserved.'."
}*/);
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "0", "ABCDEFG/MsiSetup.msi"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>",
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "engines", "0", "MsiBootstrapper.exe-engine.exe"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>",
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "MsiBootstrapper.exe"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>"
},
wixToolsPath: GetWixToolPath());
}
[WindowsOnlyFact]
[Trait("Category", "SkipWhenLiveUnitTesting")]
public void MsiWithWixpack()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("MsiSetup.msi"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("MsiSetup.msi.wixpack.zip"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest", "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'MsiApplication.exe' TargetFramework='.NETFramework,Version=v4.7.2' Certificate='Microsoft400'",
"File 'MsiSetup.msi' Certificate='Microsoft400'"
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "0", "ABCDEFG/MsiApplication.exe"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>",
$@"<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "MsiSetup.msi"))}"">
<Authenticode>Microsoft400</Authenticode>
</FilesToSign>"
},
wixToolsPath: GetWixToolPath());
}
/// <summary>
/// Validate that an invalid wix toolset path causes an error
/// </summary>
[WindowsOnlyFact]
public void BadWixToolsetPath()
{
var badPath = Path.Combine(GetWixToolPath(), "badpath");
var fakeBuildEngine = new FakeBuildEngine(_output);
var task = new SignToolTask
{
BuildEngine = fakeBuildEngine,
ItemsToSign = Array.Empty<ITaskItem>(),
StrongNameSignInfo = Array.Empty<ITaskItem>(),
FileExtensionSignInfo = Array.Empty<ITaskItem>(),
LogDir = "LogDir",
TempDir = "TempDir",
DryRun = true,
MSBuildPath = CreateTestResource("msbuild.fake"),
DotNetPath = null,
DoStrongNameCheck = false,
SNBinaryPath = null,
WixToolsPath = badPath
};
task.Execute().Should().BeFalse();
task.Log.HasLoggedErrors.Should().BeTrue();
fakeBuildEngine.LogErrorEvents.ForEach(a => a.Message.Should().EndWithEquivalent(" does not exist." ));
}
[Fact]
public void MPackFile()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("test.mpack"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'VisualStudio.Mac.Banana.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2'",
"File 'test.mpack' Certificate=''",
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "1", "VisualStudio.Mac.Banana.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void VsixPackage_DuplicateVsixAfter()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("test.vsix"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("PackageWithRelationships.vsix"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2", "ArcadeStrongTest", "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'PackageWithRelationships.vsix' Certificate='VsixSHA2'",
"File 'test.vsix' Certificate='VsixSHA2'",
},
new[]
{
$"{Path.Combine(_tmpDir, "ContainerSigning", "6", "PackageWithRelationships.vsix")} -> {Path.Combine(_tmpDir, "PackageWithRelationships.vsix")}"
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "1", "lib/net461/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "lib/netstandard2.0/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "8", "Contents/Common7/IDE/PrivateAssemblies/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "6", "PackageWithRelationships.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "test.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void VsixPackage_WithSpaces()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("TestSpaces.vsix"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("PackageWithRelationships.vsix"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2", "ArcadeStrongTest", "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'PackageWithRelationships.vsix' Certificate='VsixSHA2'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'TestSpaces.vsix' Certificate='VsixSHA2'"
},
new[]
{
$"{Path.Combine(_tmpDir, "ContainerSigning", "4", "PackageWithRelationships.vsix")} -> {Path.Combine(_tmpDir, "PackageWithRelationships.vsix")}"
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "6", "Contents/Common7/IDE/PrivateAssemblies/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "10", "Team%20Tools/Dynamic Code Coverage/net461/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "11", "Team%20Tools/Dynamic Code Coverage/netstandard2.0/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "4", "PackageWithRelationships.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "TestSpaces.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void VsixPackage_DuplicateVsixBefore()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("PackageWithRelationships.vsix")),
new TaskItem(GetResourcePath("test.vsix"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'PackageWithRelationships.vsix' Certificate='VsixSHA2'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'test.vsix' Certificate='VsixSHA2'",
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "Contents/Common7/IDE/PrivateAssemblies/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "7", "lib/net461/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "8", "lib/netstandard2.0/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "PackageWithRelationships.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "test.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void VsixPackage_DuplicateVsixBeforeAndAfter()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("PackageWithRelationships.vsix", relativePath: "A"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("test.vsix"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("PackageWithRelationships.vsix", relativePath: "B"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2", "ArcadeStrongTest", "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'PackageWithRelationships.vsix' Certificate='VsixSHA2'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'test.vsix' Certificate='VsixSHA2'",
},
new[]
{
$"{Path.Combine(_tmpDir, "A", "PackageWithRelationships.vsix")} -> {Path.Combine(_tmpDir, "B", "PackageWithRelationships.vsix")}"
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "Contents/Common7/IDE/PrivateAssemblies/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "7", "lib/net461/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "8", "lib/netstandard2.0/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "A", "PackageWithRelationships.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "test.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>
"
});
}
[Fact]
public void VsixPackageWithRelationships()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("PackageWithRelationships.vsix"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("3PartySHA2", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'PackageWithRelationships.vsix' Certificate='VsixSHA2'"
});
ValidateGeneratedProject(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "ContainerSigning", "2", "Contents/Common7/IDE/PrivateAssemblies/ProjectOne.dll"))}"">
<Authenticode>3PartySHA2</Authenticode>
<StrongName>ArcadeStrongTest</StrongName>
</FilesToSign>",
$@"
<FilesToSign Include=""{Uri.EscapeDataString(Path.Combine(_tmpDir, "PackageWithRelationships.vsix"))}"">
<Authenticode>VsixSHA2</Authenticode>
</FilesToSign>"
});
}
[Fact]
public void ZeroLengthFilesShouldNotBeSigned()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("ZeroLengthPythonFile.py"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>();
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>()
{
{ new ExplicitCertificateKey("ZeroLengthPythonFile.py"), "3PartySHA2" }
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, Array.Empty<string>());
}
[Fact]
public void CheckFileExtensionSignInfo()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(CreateTestResource("dynalib.dylib"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("javascript.js"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("javatest.jar"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("power.ps1"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("powerc.psc1"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("powerd.psd1"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("powerm.psm1"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>();
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'dynalib.dylib' Certificate='DylibCertificate'",
"File 'javascript.js' Certificate='JSCertificate'",
"File 'javatest.jar' Certificate='JARCertificate'",
"File 'power.ps1' Certificate='PSCertificate'",
"File 'powerc.psc1' Certificate='PSCCertificate'",
"File 'powerd.psd1' Certificate='PSDCertificate'",
"File 'powerm.psm1' Certificate='PSMCertificate'",
});
}
[Fact]
public void ValidateParseFileExtensionEntriesForSameCollisionPriorityIdFails()
{
var fileExtensionSignInfo = new List<ITaskItem>();
// Validate that multiple entries will collide and fail
fileExtensionSignInfo.Add(new TaskItem(".js", new Dictionary<string, string>
{
{ "CertificateName", "JSCertificate" },
{ "CollisionPriorityId", "123" }
}));
fileExtensionSignInfo.Add(new TaskItem(".js", new Dictionary<string, string>{
{ "CertificateName", "None" },
{ "CollisionPriorityId", "123" }
}));
runTask(fileExtensionSignInfo: fileExtensionSignInfo.ToArray()).Should().BeFalse();
}
[Fact]
public void ValidateParseFileExtensionEntriesForDifferentCollisionPriorityIdSucceeds()
{
var fileExtensionSignInfo = new List<ITaskItem>();
// Validate that multiple entries will collide and fail
fileExtensionSignInfo.Add(new TaskItem(".js", new Dictionary<string, string>
{
{ "CertificateName", "JSCertificate" },
{ "CollisionPriorityId", "123" }
}));
fileExtensionSignInfo.Add(new TaskItem(".js", new Dictionary<string, string>{
{ "CertificateName", "None" }
}));
fileExtensionSignInfo.Add(new TaskItem(".js", new Dictionary<string, string>
{
{ "CertificateName", "JSCertificate" },
{ "CollisionPriorityId", "456" }
}));
runTask(fileExtensionSignInfo: fileExtensionSignInfo.ToArray()).Should().BeTrue();
}
[Fact]
public void ValidateParseFileExtensionEntriesForTarGzExtensionPasses()
{
var fileExtensionSignInfo = new List<ITaskItem>();
fileExtensionSignInfo.Add(new TaskItem(".tar.gz", new Dictionary<string, string>
{
{ "CertificateName", "None" }
}));
runTask(fileExtensionSignInfo: fileExtensionSignInfo.ToArray()).Should().BeTrue();
}
// Given:
// - "SameFiles1.zip" contains "Simple1.exe" and "Simple2.exe"
// - "SameFiles2.zip" contains "Simple1.exe"
// - "Simple1.exe" and "Simple2.exe" have identical contents
// This test shows that:
// - even though Simple1 and Simple2 have identical contents, they are treated as unique files
// - Simple1 from SameFiles1.zip and Simple1 from SameFiles2.zip are treated as the same files because they have the
// same content and the same name
[Fact]
public void FilesAreUniqueByName()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("SameFiles1.zip"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("SameFiles2.zip"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
ValidateFileSignInfos(itemsToSign, new Dictionary<string, List<SignInfo>>(), new Dictionary<ExplicitCertificateKey, string>(), s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'Simple1.exe' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='Microsoft400'",
"File 'Simple2.exe' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='Microsoft400'",
"File 'SameFiles1.zip' Certificate=''",
"File 'SameFiles2.zip' Certificate=''",
},
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "0", "Simple1.exe")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "1", "Simple2.exe")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''."
});
}
/// <summary>
/// This test is intended to validate that the argument parsing which occurs
/// in the SignToolTask class are properly parsed before they are passed
/// to sign tool.
/// </summary>
[Fact]
public void ValidateSignToolTaskParsing()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
// Unsigned package
new TaskItem(GetResourcePath("ContainerOne.1.0.0.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
// Signed pe file
new TaskItem(GetResourcePath("SignedLibrary.dll"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
var strongNameSignInfo = new ITaskItem[]
{
new TaskItem("ArcadeStrongTest", new Dictionary<string, string>
{
{ "CertificateName", "3PartySHA2" },
{ "PublicKeyToken", "581d91ccdfc4ea9c" },
{ "CollisionPriorityId", "123" }
})
};
// Overriding file signing information
var fileSignInfo = new ITaskItem[]
{
new TaskItem("ProjectOne.dll", new Dictionary<string, string>
{
{ "TargetFramework", ".NETStandard,Version=v2.0" },
{ "CertificateName", "OverrideCertificateName" },
{ "PublicKeyToken", "581d91ccdfc4ea9c" },
{ "CollisionPriorityId", "123" }
}),
new TaskItem("SignedLibrary.dll", new Dictionary<string, string>
{
{ "TargetFramework", ".NETCoreApp,Version=v2.0" },
{ "CertificateName", "DualSignCertificate" },
{ "PublicKeyToken", "31bf3856ad364e35" },
{ "CollisionPriorityId", "123" }
})
};
// Enable dual signing for signed library
var certificatesSignInfo = new ITaskItem[]
{
new TaskItem("DualSignCertificate", new Dictionary<string, string>
{
{ "DualSigningAllowed", "true" }
})
};
var task = new SignToolTask
{
BuildEngine = new FakeBuildEngine(_output),
ItemsToSign = itemsToSign,
StrongNameSignInfo = strongNameSignInfo,
FileExtensionSignInfo = s_fileExtensionSignInfoPostBuild,
FileSignInfo = fileSignInfo,
CertificatesSignInfo = certificatesSignInfo,
LogDir = "LogDir",
TempDir = "TempDir",
DryRun = true,
MSBuildPath = CreateTestResource("msbuild.fake"),
DotNetPath = CreateTestResource("dotnet.fake"),
MicroBuildCorePath = "MicroBuildCorePath",
DoStrongNameCheck = false,
SNBinaryPath = null,
TarToolPath = s_tarToolPath,
};
task.Execute().Should().BeTrue();
var expected = new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='3PartySHA2' StrongName='ArcadeStrongTest'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='OverrideCertificateName' StrongName='ArcadeStrongTest'",
"File 'ContainerOne.1.0.0.nupkg' Certificate='NuGet'",
"File 'SignedLibrary.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='DualSignCertificate'"
};
task.ParsedSigningInput.FilesToSign.Select(f => f.ToString()).Should().BeEquivalentTo(expected);
}
private bool runTask(ITaskItem[] itemsToSign = null, ITaskItem[] strongNameSignInfo = null, ITaskItem[] fileExtensionSignInfo = null)
{
var task = new SignToolTask
{
BuildEngine = new FakeBuildEngine(_output),
ItemsToSign = itemsToSign ?? Array.Empty<ITaskItem>(),
StrongNameSignInfo = strongNameSignInfo ?? Array.Empty<ITaskItem>(),
FileExtensionSignInfo = fileExtensionSignInfo ?? Array.Empty<ITaskItem>(),
LogDir = "LogDir",
TempDir = "TempDir",
DryRun = true,
MSBuildPath = CreateTestResource("msbuild.fake"),
DotNetPath = CreateTestResource("dotnet.fake"),
DoStrongNameCheck = false,
SNBinaryPath = null,
};
return task.Execute();
}
[Fact]
public void ValidateAppendingCertificate()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("SignedLibrary.dll")),
};
var dualCertificates = new ITaskItem[]
{
new TaskItem("DualCertificateName"),
};
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "31bf3856ad364e35", new List<SignInfo>{ new SignInfo(dualCertificates.First().ItemSpec, null) } }
};
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
$"File 'SignedLibrary.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='{dualCertificates.First()}'",
},
dualCertificates: dualCertificates);
}
[Fact]
public void PackageWithZipFile()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem( GetResourcePath("PackageWithZip.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest", "123") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfoWithCollisionId, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'test.zip' Certificate=''",
"File 'PackageWithZip.nupkg' Certificate='NuGet'",
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "2", "NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''."
}*/);
}
[Fact]
public void NestedZipFile()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem( GetResourcePath("NestedZip.zip"))
};
// Default signing information
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo>{ new SignInfo("ArcadeCertTest", "ArcadeStrongTest") } }
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>();
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'NativeLibrary.dll' Certificate='Microsoft400'",
"File 'SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'InnerZipFile.zip' Certificate=''",
"File 'Mid.SOS.NETCore.dll' TargetFramework='.NETCoreApp,Version=v1.0' Certificate='Microsoft400'",
"File 'MidNativeLibrary.dll' Certificate='Microsoft400'",
"File 'NestedZip.zip' Certificate=''",
}/*,
Reenable after https://github.com/dotnet/arcade/issues/10293,
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "0", "NativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "4", "MidNativeLibrary.dll")}' with Microsoft certificate 'Microsoft400'. The library is considered 3rd party library due to its copyright: ''."
}*/);
}
[Fact]
public void SpecificFileSignInfos()
{
// List of files to be considered for signing
var itemsToSign = new ITaskItem[]
{
new TaskItem(CreateTestResource("test.js"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("test.jar"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("test.ps1"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("test.psd1"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("test.psm1"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("test.psc1"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(CreateTestResource("test.dylib"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("EmptyPKT.dll"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("test.vsix"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
new TaskItem(GetResourcePath("Simple.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
// This symbols nupkg has the same hash as Simple.nupkg.
// It should still get signed with a different signature.
new TaskItem(GetResourcePath("Simple.symbols.nupkg"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
}),
};
var strongNameSignInfo = new Dictionary<string, List<SignInfo>>()
{
{ "581d91ccdfc4ea9c", new List<SignInfo> {new SignInfo("ArcadeCertTest", "StrongNameValue", "123") } },
};
// Overriding information
var fileSignInfo = new Dictionary<ExplicitCertificateKey, string>()
{
{ new ExplicitCertificateKey("test.js", collisionPriorityId: "123"), "JSCertificate" },
{ new ExplicitCertificateKey("test.jar", collisionPriorityId: "123"), "JARCertificate" },
{ new ExplicitCertificateKey("test.ps1", collisionPriorityId: "123"), "PS1Certificate" },
{ new ExplicitCertificateKey("test.psd1", collisionPriorityId: "123"), "PSD1Certificate" },
{ new ExplicitCertificateKey("test.psm1", collisionPriorityId: "123"), "PSM1Certificate" },
{ new ExplicitCertificateKey("test.psc1", collisionPriorityId: "123"), "PSC1Certificate" },
{ new ExplicitCertificateKey("test.dylib", collisionPriorityId: "123"), "DYLIBCertificate" },
{ new ExplicitCertificateKey("EmptyPKT.dll", collisionPriorityId: "123"), "DLLCertificate" },
{ new ExplicitCertificateKey("test.vsix", collisionPriorityId: "123"), "VSIXCertificate" },
{ new ExplicitCertificateKey("PackageWithRelationships.vsix", collisionPriorityId: "123"), "VSIXCertificate2" },
{ new ExplicitCertificateKey("Simple.dll", collisionPriorityId: "123"), "DLLCertificate2" },
{ new ExplicitCertificateKey("Simple.nupkg", collisionPriorityId: "123"), "NUPKGCertificate" },
{ new ExplicitCertificateKey("Simple.symbols.nupkg", collisionPriorityId: "123"), "NUPKGCertificate2" },
{ new ExplicitCertificateKey("ProjectOne.dll", "581d91ccdfc4ea9c", ".NETFramework,Version=v4.6.1", "123"), "DLLCertificate3" },
{ new ExplicitCertificateKey("ProjectOne.dll", "581d91ccdfc4ea9c", ".NETStandard,Version=v2.0", "123"), "DLLCertificate4" },
{ new ExplicitCertificateKey("ProjectOne.dll", "581d91ccdfc4ea9c", ".NETCoreApp,Version=v2.0", "123"), "DLLCertificate5" },
};
ValidateFileSignInfos(itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, new[]
{
"File 'test.js' Certificate='JSCertificate'",
"File 'test.jar' Certificate='JARCertificate'",
"File 'test.ps1' Certificate='PS1Certificate'",
"File 'test.psd1' Certificate='PSD1Certificate'",
"File 'test.psm1' Certificate='PSM1Certificate'",
"File 'test.psc1' Certificate='PSC1Certificate'",
"File 'test.dylib' Certificate='DYLIBCertificate'",
"File 'EmptyPKT.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='DLLCertificate'",
"File 'ProjectOne.dll' TargetFramework='.NETFramework,Version=v4.6.1' Certificate='DLLCertificate3' StrongName='StrongNameValue'",
"File 'ProjectOne.dll' TargetFramework='.NETStandard,Version=v2.0' Certificate='DLLCertificate4' StrongName='StrongNameValue'",
"File 'ProjectOne.dll' TargetFramework='.NETCoreApp,Version=v2.0' Certificate='DLLCertificate5' StrongName='StrongNameValue'",
"File 'PackageWithRelationships.vsix' Certificate='VSIXCertificate2'",
"File 'test.vsix' Certificate='VSIXCertificate'",
"File 'Simple.dll' TargetFramework='.NETCoreApp,Version=v2.1' Certificate='DLLCertificate2'",
"File 'Simple.nupkg' Certificate='NUPKGCertificate'",
"File 'Simple.symbols.nupkg' Certificate='NUPKGCertificate2'",
},
expectedWarnings: new[]
{
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "EmptyPKT.dll")}' with Microsoft certificate 'DLLCertificate'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "9", "lib/net461/ProjectOne.dll")}' with Microsoft certificate 'DLLCertificate3'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "10", "lib/netstandard2.0/ProjectOne.dll")}' with Microsoft certificate 'DLLCertificate4'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "16", "Contents/Common7/IDE/PrivateAssemblies/ProjectOne.dll")}' with Microsoft certificate 'DLLCertificate5'. The library is considered 3rd party library due to its copyright: ''.",
$@"SIGN004: Signing 3rd party library '{Path.Combine(_tmpDir, "ContainerSigning", "23", "Simple.dll")}' with Microsoft certificate 'DLLCertificate2'. The library is considered 3rd party library due to its copyright: ''."
});
}
[Theory]
[MemberData(nameof(GetSignableExtensions))]
public void MissingCertificateName(string extension)
{
var needContent = new Dictionary<string, string>(StringComparer.OrdinalIgnoreCase)
{
{ ".dll", "EmptyPKT.dll" },
{ ".vsix", "Simple.vsix" },
{ ".nupkg", "Simple.nupkg" },
{ ".exe", "Simple.exe" }
};
var task = new SignToolTask { BuildEngine = new FakeBuildEngine() };
var inputFilePath = needContent.TryGetValue(extension, out var resourcePath) ?
GetResourcePath(resourcePath) :
CreateTestResource("test" + extension);
var itemsToSign = new ITaskItem[]
{
new TaskItem(inputFilePath)
};
new Configuration(_tmpDir,
itemsToSign,
new Dictionary<string, List<SignInfo>>(),
new Dictionary<ExplicitCertificateKey, string>(),
new Dictionary<string, List<SignInfo>>(),
new ITaskItem[0],
tarToolPath: s_tarToolPath,
task.Log)
.GenerateListOfFiles();
task.Log.HasLoggedErrors.Should().BeTrue();
}
[Theory]
[MemberData(nameof(GetSignableExtensions))]
public void MissingCertificateNameButExtensionIsIgnored(string extension)
{
var needContent = new Dictionary<string, string>(StringComparer.OrdinalIgnoreCase)
{
{ ".dll", "EmptyPKT.dll" },
{ ".vsix", "Simple.vsix" },
{ ".nupkg", "Simple.nupkg" },
{ ".exe", "Simple.exe" }
};
var task = new SignToolTask { BuildEngine = new FakeBuildEngine() };
var inputFilePath = needContent.TryGetValue(extension, out var resourcePath) ?
GetResourcePath(resourcePath) :
CreateTestResource("test" + extension);
var itemsToSign = new ITaskItem[]
{
new TaskItem(inputFilePath)
};
new Configuration(_tmpDir,
itemsToSign,
new Dictionary<string, List<SignInfo>>(),
new Dictionary<ExplicitCertificateKey, string>(),
new Dictionary<string, List<SignInfo>>() { { extension, new List<SignInfo> { SignInfo.Ignore } } },
new ITaskItem[0],
tarToolPath: s_tarToolPath,
task.Log)
.GenerateListOfFiles();
task.Log.HasLoggedErrors.Should().BeFalse();
}
[Fact]
public void CrossGeneratedLibraryWithoutPKT()
{
var itemsToSign = new ITaskItem[]
{
new TaskItem(GetResourcePath("SPCNoPKT.dll"), new Dictionary<string, string>
{
{ SignToolConstants.CollisionPriorityId, "123" }
})
};
ValidateFileSignInfos(
itemsToSign,
new Dictionary<string, List<SignInfo>>(),
new Dictionary<ExplicitCertificateKey,
string>(),
s_fileExtensionSignInfoWithCollisionId,
new string[0]);
ValidateGeneratedProject(
itemsToSign,
new Dictionary<string, List<SignInfo>>(),
new Dictionary<ExplicitCertificateKey, string>(),
s_fileExtensionSignInfoWithCollisionId,
new string[0]);
}
/// <summary>
/// Verify that running the wixpack returns passing result and that the expected output file
/// is created, or a negative result if the wix tool fails.
/// </summary>
[WindowsOnlyTheory]
[InlineData(true)]
[InlineData(false)]
[Trait("Category", "SkipWhenLiveUnitTesting")]
public void RunWixToolRunsOrFailsProperly(bool deleteWixobjBeforeRunningTool)
{
var task = new SignToolTask { BuildEngine = new FakeBuildEngine() };
const string expectedExe = "MsiBootstrapper.exe";
const string wixPack = "MsiBootstrapper.exe.wixpack.zip";
var wixToolsPath = GetWixToolPath();
var wixpackPath = GetResourcePath(wixPack);
var tempDir = Path.GetTempPath();
string workingDir = Path.Combine(tempDir, "extract", Guid.NewGuid().ToString());
string outputDir = Path.Combine(tempDir, "output", Guid.NewGuid().ToString());
string createFileName = Path.Combine(workingDir, "create.cmd");
string outputFileName = Path.Combine(outputDir, expectedExe);
Directory.CreateDirectory(outputDir);
try
{
// Unzip the wixpack zip, run the tool, and check the exit code
ZipFile.ExtractToDirectory(wixpackPath, workingDir);
if (deleteWixobjBeforeRunningTool)
{
File.Delete(Path.Combine(workingDir, "Bundle.wixobj"));
}
BatchSignUtil.RunWixTool(createFileName, outputDir, workingDir, wixToolsPath, task.Log).Should().Be(!deleteWixobjBeforeRunningTool);
File.Exists(outputFileName).Should().Be(!deleteWixobjBeforeRunningTool);
}
finally
{
Directory.Delete(workingDir, true);
Directory.Delete(outputDir, true);
}
}
/// <summary>
/// Run a wix tool, but with an empty wix path.
/// </summary>
[Fact]
public void RunWixToolThrowsErrorIfNoWixToolsProvided()
{
var fakeBuildEngine = new FakeBuildEngine();
var task = new SignToolTask { BuildEngine = fakeBuildEngine };
BatchSignUtil.RunWixTool("create.cmd", "foodir", "bardir", null, task.Log).Should().BeFalse();
task.Log.HasLoggedErrors.Should().BeTrue();
fakeBuildEngine.LogErrorEvents.Should().Contain(e => e.Message.Contains("WixToolsPath must be defined to run WiX tooling"));
}
/// <summary>
/// If attempting to repack a wix container, but a wix path was not
/// provided
/// </summary>
[Fact]
public void RunWixToolThrowsErrorIfWixToolsProvidedButDirDoesNotExist()
{
const string totalWixToolDir = "totally/wix/tools";
var fakeBuildEngine = new FakeBuildEngine();
var task = new SignToolTask { BuildEngine = fakeBuildEngine };
BatchSignUtil.RunWixTool("create.cmd", "foodir", "bardir", "totally/wix/tools", task.Log).Should().BeFalse();
task.Log.HasLoggedErrors.Should().BeTrue();
fakeBuildEngine.LogErrorEvents.Should().Contain(e => e.Message.Contains($"WixToolsPath '{totalWixToolDir}' not found."));
}
}
}
|