Skip to content

Conversation

@rtfeldman
Copy link
Contributor

Summary

Adds code signing and notarization to the nightly new compiler workflow for macOS builds. When users download the roc binary on macOS, it will run without Gatekeeper warnings.

  • Imports Developer ID certificate into a temporary CI keychain
  • Signs the binary with hardened runtime (-o runtime)
  • Submits to Apple's notarization service and waits for approval
  • Adds documentation for required GitHub secrets in ci/MACOS_CODE_SIGNING.md

Required Secrets

Before this works, these secrets need to be configured:

  • MACOS_CERTIFICATE - Base64-encoded .p12 Developer ID certificate
  • MACOS_CERTIFICATE_PWD - Password for the .p12 file
  • MACOS_CERTIFICATE_NAME - Certificate identity name
  • MACOS_CI_KEYCHAIN_PWD - Password for temp keychain
  • APPLE_NOTARIZATION_KEY_ID - App Store Connect API key ID
  • APPLE_NOTARIZATION_ISSUER - App Store Connect issuer UUID
  • APPLE_NOTARIZATION_KEY - Private key content (.p8)

Co-authored by Claude Opus 4.5

Sign and notarize the roc binary for macOS builds so users can
download and run it without Gatekeeper warnings.

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants