Do not announce robot account token before account ID is available
[chromium-blink-merge.git] / chrome / installer / mac / sign_app.sh.in
blob25b78298a5cba2de2bd53f6d3cf25e82489f9e52
1 #!/bin/bash -p
3 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
4 # Use of this source code is governed by a BSD-style license that can be
5 # found in the LICENSE file.
7 # Using codesign, sign the application. After signing, the signatures on the
8 # inner bundle components are verified, and the application's own signature is
9 # verified. Inner bundle components are expected to be signed before this
10 # script is called. See sign_versioned_dir.sh.
12 set -eu
14 # Environment sanitization. Set a known-safe PATH. Clear environment variables
15 # that might impact the interpreter's operation. The |bash -p| invocation
16 # on the #! line takes the bite out of BASH_ENV, ENV, and SHELLOPTS (among
17 # other features), but clearing them here ensures that they won't impact any
18 # shell scripts used as utility programs. SHELLOPTS is read-only and can't be
19 # unset, only unexported.
20 export PATH="/usr/bin:/bin:/usr/sbin:/sbin"
21 unset BASH_ENV CDPATH ENV GLOBIGNORE IFS POSIXLY_CORRECT
22 export -n SHELLOPTS
24 ME="$(basename "${0}")"
25 readonly ME
27 if [[ ${#} -ne 3 ]]; then
28 echo "usage: ${ME} app_path codesign_keychain codesign_id" >& 2
29 exit 1
32 app_path="${1}"
33 codesign_keychain="${2}"
34 codesign_id="${3}"
36 # Use custom resource rules for the browser application.
37 script_dir="$(dirname "${0}")"
38 browser_app_rules="${script_dir}/app_resource_rules.plist"
40 versioned_dir="${app_path}/Contents/Versions/@VERSION@"
42 browser_app="${app_path}"
43 framework="${versioned_dir}/@MAC_PRODUCT_NAME@ Framework.framework"
44 helper_app="${versioned_dir}/@MAC_PRODUCT_NAME@ Helper.app"
45 helper_eh_app="${versioned_dir}/@MAC_PRODUCT_NAME@ Helper EH.app"
46 helper_np_app="${versioned_dir}/@MAC_PRODUCT_NAME@ Helper NP.app"
48 requirement_string="\
49 designated => \
50 (identifier \"com.google.Chrome\" or identifier \"com.google.Chrome.canary\") \
51 and certificate leaf = H\"85cee8254216185620ddc8851c7a9fc4dfe120ef\"\
54 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
55 "${browser_app}" --resource-rules "${browser_app_rules}" \
56 -r="${requirement_string}"
58 # Show the signature.
59 codesign --display -r- -vvvvvv "${browser_app}"
61 # Verify everything. Check the framework and helper apps to make sure that the
62 # signatures are present and weren't altered by the signing process. Don't use
63 # --deep on the framework because Keystone's signature is in a transitional
64 # state (radar 18474911). Use --no-strict on the app because it uses custom
65 # resource rules.
66 codesign --verify -vvvvvv "${framework}"
67 codesign --verify --deep -vvvvvv "${helper_app}"
68 codesign --verify --deep -vvvvvv "${helper_eh_app}"
69 codesign --verify --deep -vvvvvv "${helper_np_app}"
70 codesign --verify --deep --no-strict -vvvvvv "${browser_app}"
72 # Verify with spctl, which uses the same rules that Gatekeeper does for
73 # validation.
74 spctl --assess -vv "${browser_app}"