-
Notifications
You must be signed in to change notification settings - Fork 5.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
8308042: [macos] Developer ID Application Certificate not picked up by jpackage if it contains UNICODE characters #15394
Conversation
…y jpackage if it contains UNICODE characters
👋 Welcome back almatvee! A progress list of the required criteria for merging this PR into |
@sashamatveev The following label will be automatically applied to this pull request:
When this pull request is ready to be reviewed, an "RFR" email will be sent to the corresponding mailing list. If you would like to change these labels, use the /label pull request command. |
Mailing list message from Alan Snyder on core-libs-dev: I?m confused by this. The issue is marked as macOS, but on macOS you don?t need to ?find? the certificate, codesign finds it using the text supplied by the user. jpackage does not need to understand this text. Surely codesign can handle certificates with unicode names, can?t it? |
@sashamatveev This change now passes all automated pre-integration checks. ℹ️ This project also has non-automated pre-integration requirements. Please see the file CONTRIBUTING.md for details. After integration, the commit message for the final commit will be:
You can use pull request commands such as /summary, /contributor and /issue to adjust it as needed. At the time when this comment was updated there had been 129 new commits pushed to the
As there are no conflicts, your changes will automatically be rebased on top of these commits when integrating. If you prefer to avoid this automatic rebasing, please check the documentation for the /integrate command for further details. ➡️ To integrate this PR with the above commit message to the |
/integrate |
Going to push as commit 57a322d.
Your commit was automatically rebased without conflicts. |
@sashamatveev Pushed as commit 57a322d. 💡 You may see a message that your pull request was closed with unmerged commits. This can be safely ignored. |
Mailing list message from Alexander Matveev on core-libs-dev: Hi Alan,
This is done for error handling. If signing is requested jpackage tries to find the certificate to make sure it is exist and is not expired and will exit with error if it does not exist or expired. In case if we just pass user provided information to codesign, then jpackage will fail during signing and after app image was generated. jpackage will fail faster if user mistyped certificate name in case when jpackage checks for it first. Second reason is that both jpackage and codesign will find certificate if it contains provided key name/identity. codesign will fail if it finds two or more certificates, but jpackage will use first one with warning message.
Yes it can, but problem was is that our certificate validation code was not able to handle certificates with Unicode names. Thanks, |
Mailing list message from Alan Snyder on core-libs-dev:
The problem with this solution is that it introduces bugs. This bug and JDK-8311877 both result from jpackage trying to perform its own certificate search instead of letting codesign do the search. The claimed advantage of failing ?faster" is negligible (it is a small difference and only happens when the user has made a mistake) and not worth the (proven) risk of introducing bugs. If you think you can do a better job of diagnosing the failure to find a certificate than codesign, then you should post-process the failure of codesign. But I don?t see this as a worthwhile investment.
Exactly my point. By doing your own certificate validation you risk doing it wrong.
|
Mailing list message from Michael Hall on core-libs-dev:
Assuming code sign will catch the errors discussed or even not. Would it make sense to do post validation of the entire app after completion? echo '*******************' I don?t remember why I killed the spctl checks. Maybe they were flagging errors that weren?t? -------------- next part -------------- |
Mailing list message from Alan Snyder on core-libs-dev: What?s the point of reviewing if the reviews are ignored? |
Mailing list message from Alexander Matveev on core-libs-dev: Hi Alan, On Aug 22, 2023, at 7:40 PM, Alan Snyder <javalists at cbfiddle.com<mailto:javalists at cbfiddle.com>> wrote: On Aug 22, 2023, at 4:42 PM, Alexander Matveev <alexander.matveev at oracle.com<mailto:alexander.matveev at oracle.com>> wrote: Hi Alan, On Aug 22, 2023, at 3:35 PM, Alan Snyder <javalists at cbfiddle.com<mailto:javalists at cbfiddle.com>> wrote: I?m confused by this. The issue is marked as macOS, but on macOS you don?t need to ?find? the certificate, codesign finds it using the text supplied by the user. jpackage does not need to understand this text. This is done for error handling. If signing is requested jpackage tries to find the certificate to make sure it is exist and is not expired and will exit with error if it does not exist or expired. In case if we just pass user provided information to codesign, then jpackage will fail during signing and after app image was generated. jpackage will fail faster if user mistyped certificate name in case when jpackage checks for it first. The problem with this solution is that it introduces bugs. This bug and JDK-8311877 both result from jpackage trying to perform its own certificate search instead of letting codesign do the search. The claimed advantage of failing ?faster" is negligible (it is a small difference and only happens when the user has made a mistake) and not worth the (proven) risk of introducing bugs. If you think you can do a better job of diagnosing the failure to find a certificate than codesign, then you should post-process the failure of codesign. But I don?t see this as a worthwhile investment. JDK-8308042 is about fixing bug in current approach used by jpackage. You suggestion is to passthrough value from ?--mac-signing-key-user-name? to codesign and use it as value for "--sign? argument in codesign will change behavior of ?--mac-signing-key-user-name? and I do not think that we should be doing this as part of this bug fix.From documentation: If you want to distribute your application outside the Mac App Store, then you'll need the certificates "Developer ID Application: <user or team name>" and "Developer ID Installer: <user or team name>". If you want to deploy your application through the Mac App Store, then you'll need the certificates "3rd Party Mac Developer Application: <user or team name>" and "3rd Party Mac Developer Installer: <user or team name>?. If --mac-app-store is set we will look for "3rd Party Mac Developer Application: <user or team name>? and if we cannot find it we will fallback to "Developer ID Application: <user or team name>? and if it is not found we will fail. If --mac-app-store is not set we will look for "Developer ID Application: <user or team name>?. <user or team name> is value provided via ?--mac-signing-key-user-name?. I think you suggestion is to add additional argument to jpackage which will be used as passthrough value for "--sign? argument in codesign. I am still not sure if we should be doing this, but I am currently considering it as a solution for https://bugs.openjdk.org/browse/JDK-8311877 instead of adding "Apple Development? as fallback if we cannot find "Developer ID Application?. Thanks, Second reason is that both jpackage and codesign will find certificate if it contains provided key name/identity. codesign will fail if it finds two or more certificates, but jpackage will use first one with warning message. Surely codesign can handle certificates with unicode names, can?t it? Yes it can, but problem was is that our certificate validation code was not able to handle certificates with Unicode names. Exactly my point. By doing your own certificate validation you risk doing it wrong. Thanks, On Aug 22, 2023, at 3:15 PM, Alexander Matveev <almatvee at openjdk.org<mailto:almatvee at openjdk.org>> wrote: - Added support for certificates with UNICODE characters. ------------- Commit messages: Changes: https://git.openjdk.org/jdk/pull/15394/files PR: https://git.openjdk.org/jdk/pull/15394 -------------- next part -------------- |
Mailing list message from Alexander Matveev on core-libs-dev: Hi Michael, On Aug 22, 2023, at 11:33 PM, Michael Hall <mik3hall at gmail.com<mailto:mik3hall at gmail.com>> wrote: On Aug 22, 2023, at 9:40 PM, Alan Snyder <javalists at cbfiddle.com<mailto:javalists at cbfiddle.com>> wrote: On Aug 22, 2023, at 4:42 PM, Alexander Matveev <alexander.matveev at oracle.com<mailto:alexander.matveev at oracle.com>> wrote: Hi Alan, On Aug 22, 2023, at 3:35 PM, Alan Snyder <javalists at cbfiddle.com<mailto:javalists at cbfiddle.com>> wrote: I?m confused by this. The issue is marked as macOS, but on macOS you don?t need to ?find? the certificate, codesign finds it using the text supplied by the user. jpackage does not need to understand this text. This is done for error handling. If signing is requested jpackage tries to find the certificate to make sure it is exist and is not expired and will exit with error if it does not exist or expired. In case if we just pass user provided information to codesign, then jpackage will fail during signing and after app image was generated. jpackage will fail faster if user mistyped certificate name in case when jpackage checks for it first. The problem with this solution is that it introduces bugs. This bug and JDK-8311877 both result from jpackage trying to perform its own certificate search instead of letting codesign do the search. The claimed advantage of failing ?faster" is negligible (it is a small difference and only happens when the user has made a mistake) and not worth the (proven) risk of introducing bugs. If you think you can do a better job of diagnosing the failure to find a certificate than codesign, then you should post-process the failure of codesign. But I don?t see this as a worthwhile investment. Second reason is that both jpackage and codesign will find certificate if it contains provided key name/identity. codesign will fail if it finds two or more certificates, but jpackage will use first one with warning message. Surely codesign can handle certificates with unicode names, can?t it? Yes it can, but problem was is that our certificate validation code was not able to handle certificates with Unicode names. Exactly my point. By doing your own certificate validation you risk doing it wrong. Assuming code sign will catch the errors discussed or even not. Would it make sense to do post validation of the entire app after completion? Good point, but I am not sure if we should be doing this. Thanks, echo '*******************' I don?t remember why I killed the spctl checks. Maybe they were flagging errors that weren?t? -------------- next part -------------- |
Mailing list message from Michael Hall on core-libs-dev:
I?m not quite following that. The spctl maybe not, again I?m not remembering details but that might be related to notarizing. I figured it out once and it?s been broken for my builds ever since. I think you have to do some connection with Apple servers and wait until you get a response? Not an easy process to automate. The codesign verify I?m not sure what would be the harm. If there are any application signing issues this should catch them. You would be assured in your testing that you hadn?t accidentally broken signing. In support it might tell you if the user has somehow done something to accidentally break signing. Mike |
Mailing list message from Alan Snyder on core-libs-dev: Hi Alex, Yes, I understand that this issue is about fixing a bug in the current approach. Although it is a moot point, my opinion is that the current approach is ill-conceived and should be scrapped, The problems with the current approach: 1. An attempt is made to emulate the behavior of codesign for the purpose of predicting when it will fail. The problem here is that if the emulation is not perfect, it can cause the packaging operation to abort needlessly. If you are determined to try to predict when codesign will fail, it seems to me that a better approach is 2. An attempt is made to enforce Apple?s policies and naming conventions. There are two problems with this attempt. One is that Apple can change its policies and naming The other problem is that you are assuming how the packaged application is going to be used. A bit of design philosophy: As far as I know, the issues faced by Java application developers regarding The focus of jpackage should be on JDK related issues. For code signing, that means identifying Alan
-------------- next part -------------- |
Progress
Issue
Reviewers
Reviewing
Using
git
Checkout this PR locally:
$ git fetch https://git.openjdk.org/jdk.git pull/15394/head:pull/15394
$ git checkout pull/15394
Update a local copy of the PR:
$ git checkout pull/15394
$ git pull https://git.openjdk.org/jdk.git pull/15394/head
Using Skara CLI tools
Checkout this PR locally:
$ git pr checkout 15394
View PR using the GUI difftool:
$ git pr show -t 15394
Using diff file
Download this PR as a diff file:
https://git.openjdk.org/jdk/pull/15394.diff
Webrev
Link to Webrev Comment