ci: add Windows code signing to desktop release workflow#1
Merged
Radhikaa-chauhan merged 1 commit intomainfrom Feb 18, 2026
Merged
ci: add Windows code signing to desktop release workflow#1Radhikaa-chauhan merged 1 commit intomainfrom
Radhikaa-chauhan merged 1 commit intomainfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Fixes CircuitVerse#636
Describe the changes you have made in this PR -
This PR adds Windows code signing support to the desktop release pipeline.
Key changes include:
signtoolwith SHA256 hashing and DigiCert timestamping to sign the generated Windows executable.These changes improve the security, trust, and distribution readiness of Windows desktop releases.
Screenshots of the UI changes (If any) -
N/A (No UI changes)
Code Understanding and AI Usage
Did you use AI assistance (ChatGPT, Claude, Copilot, etc.) to write any part of this code?
Explain your implementation approach:
The goal was to ensure that Windows desktop binaries produced by the release pipeline are properly code-signed, preventing security warnings and improving user trust.
I chose to integrate code signing directly into the existing Tauri release workflow instead of creating a separate pipeline, so signing happens automatically during releases.
The implementation works as follows:
certutil..exeis signed usingsigntoolwith SHA256 for both file digest and timestamp digest.This approach keeps the pipeline secure, minimal, and platform-specific, while following best practices for Windows Authenticode signing.
Checklist before requesting a review
Note: Please check Allow edits from maintainers if you would like us to assist in the PR.