-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] Axe.Windows files are signed with the 3rd party certificate #995
Comments
microsoft-github-policy-service
bot
added
the
status: new
This issue is new and requires triage by DRI.
label
Jan 26, 2024
JGibson2019
moved this from Needs triage
to Accepted - vendor
in Accessibility Insights
Jan 29, 2024
1 task
v-viyada
added a commit
that referenced
this issue
Jan 31, 2024
#### Details Changed certificate from 3rd Party to Microsoft for signing output files. Verified the artifacts generated and files have Microsoft corporation signature. Link for test run https://dev.azure.com/mseng/1ES/_build/results?buildId=26036565&view=results Steps used for verification: 1. Download .nupkg file from artifacts of the pipeline run 2. Change the .nupkg extension to .zip 3. Extract the contents of the .zip file 4. Examine the properties of any of the DLL's under the lib\netstandard20 folder 5. Check the details of the digital signature ##### Motivation addresses issue #995 ##### Context <!-- Are there any parts that you've intentionally left out-of-scope for a later PR to handle? --> <!-- Were there any alternative approaches you considered? What tradeoffs did you consider? --> #### Pull request checklist <!-- If a checklist item is not applicable to this change, write "n/a" in the checkbox --> - [x] Addresses an existing issue: #995
v-viyada
added
status: resolved
This issue has been merged into main.
and removed
status: new
This issue is new and requires triage by DRI.
labels
Jan 31, 2024
This has been released in https://github.com/microsoft/axe-windows/releases/tag/v2.3.1. Closing. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Please check whether the bug has already been filed.
We've been signing the Axe.Windows files files the Microsoft 3rd party certiicate. This certificate is intended for external (non-Microsoft) files that we trust and redistribute with Microsoft products. We should probably be signing the Axe.Windows*.dll files with the same certificate that we use to sign Accessibility Insights (and that other teams use to sign the ApplicationInsights or ADO packages that Microsoft builds)
To Reproduce
Steps to reproduce the behavior:
.nupkg
extension to.zip
.zip
filelib\netstandard20
folderExpected behavior
The signer name should (I think) be "Microsoft Corporation".
Actual behavior
The signer name is "Microsoft 3rd Party Application Component"
Additional context
I checked versions back to 2020. This is not a new problem and has nothing to do with any pipeline template work.
Priority requested -
The text was updated successfully, but these errors were encountered: