Struct apple_codesign::SigningSettings
source · [−]pub struct SigningSettings<'key> { /* private fields */ }Expand description
Represents code signing settings.
This type holds settings related to a single logical signing operation. Some settings (such as the signing key-pair are global). Other settings (such as the entitlements or designated requirement) can be applied on a more granular, scoped basis. The scoping of these lower-level settings is controlled via SettingsScope. If a setting is specified with a scope, it only applies to that scope. See that type’s documentation for more.
An instance of this type is bound to a signing operation. When the signing operation traverses into nested primitives (e.g. when traversing into the individual Mach-O binaries in a fat/universal binary or when traversing into nested bundles or non-main binaries within a bundle), a new instance of this type is transparently constructed by merging global settings with settings for the target scope. This allows granular control over which signing settings apply to which entity and enables a signing operation over a complex primitive to be configured/performed via a single SigningSettings and signing operation.
Implementations
sourceimpl<'key> SigningSettings<'key>
impl<'key> SigningSettings<'key>
sourcepub fn digest_type(&self) -> &DigestType
pub fn digest_type(&self) -> &DigestType
Obtain the digest type to use.
sourcepub fn set_digest_type(&mut self, digest_type: DigestType)
pub fn set_digest_type(&mut self, digest_type: DigestType)
Set the content digest to use.
The default is SHA-256. Changing this to SHA-1 can weaken security of digital signatures and may prevent the binary from running in environments that enforce more modern signatures.
sourcepub fn signing_key(
&self
) -> Option<&(&'key InMemorySigningKeyPair, CapturedX509Certificate)>
pub fn signing_key(
&self
) -> Option<&(&'key InMemorySigningKeyPair, CapturedX509Certificate)>
Obtain the signing key to use.
sourcepub fn set_signing_key(
&mut self,
private: &'key InMemorySigningKeyPair,
public: CapturedX509Certificate
)
pub fn set_signing_key(
&mut self,
private: &'key InMemorySigningKeyPair,
public: CapturedX509Certificate
)
Set the signing key-pair for producing a cryptographic signature over code.
If this is not called, signing will lack a cryptographic signature and will only contain digests of content. This is known as “ad-hoc” mode. Binaries lacking a cryptographic signature or signed without a key-pair issued/signed by Apple may not run in all environments.
sourcepub fn certificate_chain(&self) -> &[CapturedX509Certificate]
pub fn certificate_chain(&self) -> &[CapturedX509Certificate]
Obtain the certificate chain.
sourcepub fn chain_apple_certificates(
&mut self
) -> Option<Vec<CapturedX509Certificate>>
pub fn chain_apple_certificates(
&mut self
) -> Option<Vec<CapturedX509Certificate>>
Attempt to chain Apple CA certificates from a loaded Apple signed signing key.
If you are calling set_signing_key(), you probably want to call this immediately
afterwards, as it will automatically register Apple CA certificates if you are
using an Apple signed code signing certificate.
sourcepub fn chain_certificate(&mut self, cert: CapturedX509Certificate)
pub fn chain_certificate(&mut self, cert: CapturedX509Certificate)
Add a parsed certificate to the signing certificate chain.
When producing a cryptographic signature (see SigningSettings::set_signing_key), information about the signing key-pair is included in the signature. The signing key’s public certificate is always included. This function can be used to define additional X.509 public certificates to include. Typically, the signing chain of the signing key-pair up until the root Certificate Authority (CA) is added so clients have access to the full certificate chain for validation purposes.
This setting has no effect if SigningSettings::set_signing_key is not called.
sourcepub fn chain_certificate_der(
&mut self,
data: impl AsRef<[u8]>
) -> Result<(), AppleCodesignError>
pub fn chain_certificate_der(
&mut self,
data: impl AsRef<[u8]>
) -> Result<(), AppleCodesignError>
Add a DER encoded X.509 public certificate to the signing certificate chain.
This is like Self::chain_certificate except the certificate data is provided in its binary, DER encoded form.
sourcepub fn chain_certificate_pem(
&mut self,
data: impl AsRef<[u8]>
) -> Result<(), AppleCodesignError>
pub fn chain_certificate_pem(
&mut self,
data: impl AsRef<[u8]>
) -> Result<(), AppleCodesignError>
Add a PEM encoded X.509 public certificate to the signing certificate chain.
This is like Self::chain_certificate except the certificate is
specified as PEM encoded data. This is a human readable string like
-----BEGIN CERTIFICATE----- and is a common method for encoding certificate data.
(PEM is effectively base64 encoded DER data.)
Only a single certificate is read from the PEM data.
sourcepub fn time_stamp_url(&self) -> Option<&Url>
pub fn time_stamp_url(&self) -> Option<&Url>
Obtain the Time-Stamp Protocol server URL.
sourcepub fn set_time_stamp_url(
&mut self,
url: impl IntoUrl
) -> Result<(), AppleCodesignError>
pub fn set_time_stamp_url(
&mut self,
url: impl IntoUrl
) -> Result<(), AppleCodesignError>
Set the Time-Stamp Protocol server URL to use to generate a Time-Stamp Token.
When set and a signing key-pair is defined, the server will be contacted during signing and a Time-Stamp Token will be embedded in the cryptographic signature. This Time-Stamp Token is a cryptographic proof that someone in possession of the signing key-pair produced the cryptographic signature at a given time. It facilitates validation of the signing time via an independent (presumably trusted) entity.
sourcepub fn set_team_id(&mut self, value: impl ToString)
pub fn set_team_id(&mut self, value: impl ToString)
Set the team identifier for signed binaries.
sourcepub fn binary_identifier(
&self,
scope: impl AsRef<SettingsScope>
) -> Option<&str>
pub fn binary_identifier(
&self,
scope: impl AsRef<SettingsScope>
) -> Option<&str>
Obtain the binary identifier string for a given scope.
sourcepub fn set_binary_identifier(
&mut self,
scope: SettingsScope,
value: impl ToString
)
pub fn set_binary_identifier(
&mut self,
scope: SettingsScope,
value: impl ToString
)
Set the binary identifier string for a binary at a path.
This only has an effect when signing an individual Mach-O file (use the None path)
or the non-main executable in a bundle: when signing the main executable in a bundle,
the binary’s identifier is retrieved from the mandatory CFBundleIdentifier value in
the bundle’s Info.plist file.
The binary identifier should be a DNS-like name and should uniquely identify the
binary. e.g. com.example.my_program
sourcepub fn entitlements_xml(&self, scope: impl AsRef<SettingsScope>) -> Option<&str>
pub fn entitlements_xml(&self, scope: impl AsRef<SettingsScope>) -> Option<&str>
Obtain the entitlements XML string for a given scope.
sourcepub fn set_entitlements_xml(
&mut self,
scope: SettingsScope,
value: impl ToString
)
pub fn set_entitlements_xml(
&mut self,
scope: SettingsScope,
value: impl ToString
)
Set the entitlements to sign via an XML string.
The value should be an XML plist. The value is not validated.
sourcepub fn designated_requirement(
&self,
scope: impl AsRef<SettingsScope>
) -> &DesignatedRequirementMode
pub fn designated_requirement(
&self,
scope: impl AsRef<SettingsScope>
) -> &DesignatedRequirementMode
Obtain the designated requirements for a given scope.
sourcepub fn set_designated_requirement_expression(
&mut self,
scope: SettingsScope,
expr: &CodeRequirementExpression<'_>
) -> Result<(), AppleCodesignError>
pub fn set_designated_requirement_expression(
&mut self,
scope: SettingsScope,
expr: &CodeRequirementExpression<'_>
) -> Result<(), AppleCodesignError>
Set the designated requirement for a Mach-O binary given a CodeRequirementExpression.
The designated requirement (also known as “code requirements”) specifies run-time requirements for the binary. e.g. you can stipulate that the binary must be signed by a certificate issued/signed/chained to Apple. The designated requirement is embedded in Mach-O binaries and signed.
sourcepub fn set_designated_requirement_bytes(
&mut self,
scope: SettingsScope,
data: impl AsRef<[u8]>
) -> Result<(), AppleCodesignError>
pub fn set_designated_requirement_bytes(
&mut self,
scope: SettingsScope,
data: impl AsRef<[u8]>
) -> Result<(), AppleCodesignError>
Set the designated requirement expression for a Mach-O binary given serialized bytes.
This is like SigningSettings::set_designated_requirement_expression except the
designated requirement expression is given as serialized bytes. The bytes passed are
the value that would be produced by compiling a code requirement expression via
csreq -b.
sourcepub fn set_auto_designated_requirement(&mut self, scope: SettingsScope)
pub fn set_auto_designated_requirement(&mut self, scope: SettingsScope)
Set the designated requirement mode to auto, which will attempt to derive requirements automatically.
This setting recognizes when code signing is being performed with Apple issued code signing certificates and automatically applies appropriate settings for the certificate being used and the entity being signed.
Not all combinations may be supported. If you get an error, you will need to provide your own explicit requirement expression.
sourcepub fn code_signature_flags(
&self,
scope: impl AsRef<SettingsScope>
) -> Option<CodeSignatureFlags>
pub fn code_signature_flags(
&self,
scope: impl AsRef<SettingsScope>
) -> Option<CodeSignatureFlags>
Obtain the code signature flags for a given scope.
sourcepub fn set_code_signature_flags(
&mut self,
scope: SettingsScope,
flags: CodeSignatureFlags
)
pub fn set_code_signature_flags(
&mut self,
scope: SettingsScope,
flags: CodeSignatureFlags
)
Set code signature flags for signed Mach-O binaries.
The incoming flags will replace any already-defined flags.
sourcepub fn add_code_signature_flags(
&mut self,
scope: SettingsScope,
flags: CodeSignatureFlags
) -> CodeSignatureFlags
pub fn add_code_signature_flags(
&mut self,
scope: SettingsScope,
flags: CodeSignatureFlags
) -> CodeSignatureFlags
Add code signature flags for signed Mach-O binaries.
The incoming flags will be ORd with any existing flags for the path specified. The new flags will be returned.
sourcepub fn remove_code_signature_flags(
&mut self,
scope: SettingsScope,
flags: CodeSignatureFlags
) -> CodeSignatureFlags
pub fn remove_code_signature_flags(
&mut self,
scope: SettingsScope,
flags: CodeSignatureFlags
) -> CodeSignatureFlags
Remove code signature flags for signed Mach-O binaries.
The incoming flags will be removed from any existing flags for the path specified. The new flags will be returned.
sourcepub fn executable_segment_flags(
&self,
scope: impl AsRef<SettingsScope>
) -> Option<ExecutableSegmentFlags>
pub fn executable_segment_flags(
&self,
scope: impl AsRef<SettingsScope>
) -> Option<ExecutableSegmentFlags>
Obtain the executable segment flags for a given scope.
sourcepub fn set_executable_segment_flags(
&mut self,
scope: SettingsScope,
flags: ExecutableSegmentFlags
)
pub fn set_executable_segment_flags(
&mut self,
scope: SettingsScope,
flags: ExecutableSegmentFlags
)
Set executable segment flags for Mach-O binaries.
The incoming flags will replace any already defined flags for the path.
sourcepub fn info_plist_data(&self, scope: impl AsRef<SettingsScope>) -> Option<&[u8]>
pub fn info_plist_data(&self, scope: impl AsRef<SettingsScope>) -> Option<&[u8]>
Obtain the Info.plist data registered to a given scope.
sourcepub fn set_info_plist_data(&mut self, scope: SettingsScope, data: Vec<u8>)
pub fn set_info_plist_data(&mut self, scope: SettingsScope, data: Vec<u8>)
Define the Info.plist content.
Signatures can reference the digest of an external Info.plist file in
the bundle the binary is located in.
This function registers the raw content of that file is so that the content can be digested and the digest can be included in the code directory.
The value passed here should be the raw content of the Info.plist XML file.
When signing bundles, this function is called automatically with the Info.plist
from the bundle. This function exists for cases where you are signing
individual Mach-O binaries and the Info.plist cannot be automatically
discovered.
sourcepub fn code_resources_data(
&self,
scope: impl AsRef<SettingsScope>
) -> Option<&[u8]>
pub fn code_resources_data(
&self,
scope: impl AsRef<SettingsScope>
) -> Option<&[u8]>
Obtain the CodeResources XML file data registered to a given scope.
sourcepub fn set_code_resources_data(&mut self, scope: SettingsScope, data: Vec<u8>)
pub fn set_code_resources_data(&mut self, scope: SettingsScope, data: Vec<u8>)
Define the CodeResources XML file content for a given scope.
Bundles may contain a CodeResources XML file which defines additional
resource files and binaries outside the bundle’s main executable. The code
directory of the main executable contains a digest of this file to establish
a chain of trust of the content of this XML file.
This function defines the content of this external file so that the content can be digested and that digest included in the code directory of the binary being signed.
When signing bundles, this function is called automatically with the content
of the CodeResources XML file, if present. This function exists for cases
where you are signing individual Mach-O binaries and the CodeResources XML
file cannot be automatically discovered.
sourcepub fn as_nested_bundle_settings(&self, bundle_path: &str) -> Self
pub fn as_nested_bundle_settings(&self, bundle_path: &str) -> Self
Convert this instance to settings appropriate for a nested bundle.
sourcepub fn as_bundle_macho_settings(&self, path: &str) -> Self
pub fn as_bundle_macho_settings(&self, path: &str) -> Self
Convert this instance to settings appropriate for a Mach-O binary in a bundle.
sourcepub fn as_nested_macho_settings(&self, index: usize, cpu_type: CpuType) -> Self
pub fn as_nested_macho_settings(&self, index: usize, cpu_type: CpuType) -> Self
Convert this instance to settings appropriate for a nested Mach-O binary.
It is assumed the main scope of these settings is already targeted for a Mach-O binary. Any scoped settings for the Mach-O binary index and CPU type will be applied. CPU type settings take precedence over index scoped settings.
Trait Implementations
sourceimpl<'key> Clone for SigningSettings<'key>
impl<'key> Clone for SigningSettings<'key>
sourcefn clone(&self) -> SigningSettings<'key>
fn clone(&self) -> SigningSettings<'key>
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source. Read more
sourceimpl<'key> Debug for SigningSettings<'key>
impl<'key> Debug for SigningSettings<'key>
sourceimpl<'key> Default for SigningSettings<'key>
impl<'key> Default for SigningSettings<'key>
sourcefn default() -> SigningSettings<'key>
fn default() -> SigningSettings<'key>
Returns the “default value” for a type. Read more
Auto Trait Implementations
impl<'key> RefUnwindSafe for SigningSettings<'key>
impl<'key> Send for SigningSettings<'key>
impl<'key> Sync for SigningSettings<'key>
impl<'key> Unpin for SigningSettings<'key>
impl<'key> UnwindSafe for SigningSettings<'key>
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcefn clone_into(&self, target: &mut T)
fn clone_into(&self, target: &mut T)
toowned_clone_into)Uses borrowed data to replace owned data, usually by cloning. Read more
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber to this type, returning a
WithDispatch wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber to this type, returning a
WithDispatch wrapper. Read more