#!/usr/bin/env bash # intended to run on MacOS only # signs all executable files in a given folder (as $1) with developer certificate # required variables: # APPLE_DEVELOPER_IDENTITY: "Developer ID Application: ()" # APPLE_DEVELOPER_ID_BUNDLE: base64-encoded content of apple developer id certificate bundle in pksc12 format # APPLE_DEVELOPER_ID_BUNDLE_PASSWORD: password used when exporting the bundle # note: 'bundle' in apple terminology is 'identity' set -euo pipefail PKSC12_FILE="$HOME/developer-id-application.p12" base64 --decode > "${PKSC12_FILE}" <<<"${APPLE_DEVELOPER_ID_BUNDLE}" KEYCHAIN='emqx.keychain-db' KEYCHAIN_PASSWORD="$(openssl rand -base64 32)" security create-keychain -p "${KEYCHAIN_PASSWORD}" "${KEYCHAIN}" security set-keychain-settings -lut 21600 "${KEYCHAIN}" security unlock-keychain -p "${KEYCHAIN_PASSWORD}" "${KEYCHAIN}" security import "${PKSC12_FILE}" -P "${APPLE_DEVELOPER_ID_BUNDLE_PASSWORD}" -t cert -f pkcs12 -k "${KEYCHAIN}" -T /usr/bin/codesign security set-key-partition-list -S "apple-tool:,apple:,codesign:" -s -k "${KEYCHAIN_PASSWORD}" "${KEYCHAIN}" security verify-cert -k "${KEYCHAIN}" -c "${PKSC12_FILE}" security find-identity -p codesigning "${KEYCHAIN}" # add new keychain into the search path for codesign, otherwise the stuff does not work keychains=$(security list-keychains -d user) keychain_names=(); for keychain in ${keychains} do basename=$(basename "${keychain}") keychain_name=${basename::${#basename}-4} keychain_names+=("${keychain_name}") done security -v list-keychains -s "${keychain_names[@]}" "${KEYCHAIN}" set -x REL_DIR="${1}" codesign -s "${APPLE_DEVELOPER_IDENTITY}" -f --verbose=4 --options runtime --timestamp=none "${REL_DIR}"/erts-*/bin/{erlexec,erl}