I am trying to sign then notarize with one command using the Eden SDK.
For the “secure timestamp”, you need to pass --timestamp
(usually without any value) to codesign
when initially signing (i.e. before notarization). See the man page of codesign
for reference:
--timestamp [=URL]
During signing, requests that a timestamp authority server be contacted to authenticate the time of signing. The
server contacted is given by the URL value. If this option is given without a value, a default server provided by
Apple is used. Note that this server may not support signatures made with identities not furnished by Apple.
I believe that, for using the EDEN SDK, you had to sign an NDA that forbids public discussions of technical details.
While I agree that we’re not discussing sensitive aspects, I think we’re not formally allowed to talk about this here.
Perhaps, now that PACE owns the place, a separate section of the forum could be created for discussion of EDEN usage, with access restricted to only those accounts that also have signed the NDA?
https://developer.apple.com/account/resources/certificates/add
You will need one of each if you plan to use a standard macOS installer package :
but you use the latter to sign your plugins before notarisation.
After testing for a few days I came up with this thanks to everyone with the resources.
@jnicol that really helped.
I am going to leave an exact guide here for anyone in the future wanting a straight forward guide to the entire process of notarizing. I ended up code signing with apple rather than Eden, which is a whole other bear.
If the process with Apple is easier than Eden, then wow. Because Apple’s process is is royal PITA.
Don’t know if useful but this is my text that I copy and paste (with changes to the bold text). It’s never failed to notarize and is decidedly simple…
1.
Sign plugin files in terminal.
codesign -s "DEVELOPER ID APPLICATION: YOURCOMPANY (CODE)" "FILEPATH.COMPONENT" --timestamp
codesign -s "DEVELOPER ID APPLICATION: YOURCOMPANY (CODE)" "FILEPATH.VST3" --timestamp
2.
Create pkg using packages (with signing certificate).
3.
Notarize.
xcrun altool --notarize-app -f "FILEPATH.PKG" --primary-bundle-id com.BUNDLE.pkg --username "DEVELOPER EMAIL" --password "APP SPECIFIC PASSWORD"
4.
Wait for email and then staple.
xcrun stapler staple "FILEPATH.PKG"
5.
Checks.
spctl -a -vvv -t install "FILEPATH.PKG"
That’s pretty much what I ended up doing. Thanks for posting that!
Also for AAX…
I code signed with apple, then notarized, stapled, then code signed with Eden. Then zipped.
I’m hoping that will take care of all the binaries.
I think you should check if the binary resulting from all this process still counts as being notarized according to Apple, because the EDEN signature may alter the binary itself to embed its signature, and in the eyes of Apple that may become a different binary that’s not notarized.
I haven’t had to code sign using PACE for sometime but I suggest you double check the documentation. From what I remember when you code sign using the PACE tools you pass the information required such that PACE will do the apple signing stuff for you. Also when notarising you should normally aim to notarise the actual thing you will deliver to the customer such as a pkg or dmg. Again PACE may very well cover some additional information about notarisation in the documentation.
So far this is the best solution for notarizing on this forum. One snag I ran into on my machine… for --password
I needed to add @keychain:APP_SPECIFIC
(note APP_SPECIFIC is what I named my password inside the keychain app, your name may be different).
Also I did receive an Your Apple ID account is attached to other providers. You will need to specify which provider you intend to submit content to. Please contact us if you have questions or need help. (1627)
message.
To solve this specify --asc-provider "XXXXXXXXXX"
when notarizing.
Now just waiting… No errors uploading... and a RequestUUID
Thanks @DavidCNAntonia
Great, glad it could be helpful! Yes, for password I just put my app specific password directly in there. I’ll try adding it to the keychain to simplify the method, thanks.
No idea what that other message is about, glad you could get it to work though!
Thanks for the easy to read details! Does this mean I don’t have to notarize my plugins if they are distributed inside a pkg? Only the installer needs to be notarized and then the plugins work 100% on Catalina when using the installer?
Yes.
If you notarize the pkg installer it will notarize all the components contained within it. So they do have to be notasrized it’s just that it’s reduced to a single step.
the automatic signing of xcode doesn’t work anymore. I had to add the --force
option when manually signing to be sure the signatures are replaced, otherwise the notarization fails
codesign --force -s "DEVELOPER ID APPLICATION: YOURCOMPANY (CODE)" "FILEPATH.COMPONENT" --timestamp
@lalala I had to sign something for the the first time since you posted that today. Interestingly my original method is still working for me without “–force”. We must be doing something different somewhere!
Could it be that you haven’t set the “Development Team ID” in Projucer (in the xcode options)?
(in which case xcode would not do a first signing before we do it manually)
Hi, Have you figured out how to solve the problem?
We run into the same problem. i.e., we use PACE to wrap our binaries, and then use the command below to code-sign it:
codesign --deep --force --options runtime --sign [Developer ID Application] [file path]
then run the signed app or load the signed vst from AudioPluginHost, it will crash and report “Invalid Signature”.
If we don’t manually code-sign the binaries since PACE wrapper will code-sign the binaries anyway, then notarizing process will fail because the binaries are not signed with “runtime” option turned on.
You can sign with the hardened runtime with the PACE tool by adding the --dsigharden
command line option.
And make use of --extrasigningoptions
if you have to specify other options to the “codesign” invocation that the PACE tool does internally (perhaps to add an entitlements file with --entitlements
)
Sorry for the succint explaination, but we’re in NDA territory here. Use the above as hints to look the details in the help for the PACE tool