Skip to content

Commit 4bd5380

Browse files
authored
Bump to .NET 10. (#331)
2 parents ab9e2ab + da9d737 commit 4bd5380

File tree

10 files changed

+16
-18
lines changed

10 files changed

+16
-18
lines changed

.github/workflows/pr.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ jobs:
1717
name: Checkout
1818
- uses: actions/setup-dotnet@v5
1919
with:
20-
dotnet-version: '8.0'
20+
dotnet-version: '10.0'
2121
- run: dotnet test
2222

2323
dependency-review:

Directory.Packages.props

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@
33
<PackageVersion Include="Azure.Identity" Version="1.17.0" />
44
<PackageVersion Include="Azure.Security.KeyVault.Certificates" Version="4.8.0" />
55
<PackageVersion Include="Azure.Security.KeyVault.Keys" Version="4.8.0" />
6-
<PackageVersion Include="Microsoft.Extensions.FileSystemGlobbing" Version="8.0.0" />
7-
<PackageVersion Include="Microsoft.Extensions.Logging" Version="8.0.1" />
8-
<PackageVersion Include="Microsoft.Extensions.Logging.Console" Version="8.0.1" />
6+
<PackageVersion Include="Microsoft.Extensions.FileSystemGlobbing" Version="10.0.0" />
7+
<PackageVersion Include="Microsoft.Extensions.Logging" Version="10.0.0" />
8+
<PackageVersion Include="Microsoft.Extensions.Logging.Console" Version="10.0.0" />
99

1010
<PackageVersion Include="System.Net.Http" Version="4.3.4" />
11-
<PackageVersion Include="System.Text.Json" Version="8.0.6" />
11+
<PackageVersion Include="System.Text.Json" Version="10.0.0" />
1212
<PackageVersion Include="System.Text.RegularExpressions" Version="4.3.1" />
1313

1414
<PackageVersion Include="XenoAtom.CommandLine" Version="1.0.1" />

src/AzureSign.Core/AzureSign.Core.csproj

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@
44
<TargetFrameworks>netstandard2.0;net8.0</TargetFrameworks>
55
<Description>Authenticode signing library.</Description>
66
<GenerateDocumentationFile>true</GenerateDocumentationFile>
7-
<RuntimeIdentifiers>win-x64;win-arm64;win-x86</RuntimeIdentifiers>
87
<AllowUnsafeBlocks>true</AllowUnsafeBlocks>
98
<MinVerTagPrefix>v</MinVerTagPrefix>
109
<Nullable>enable</Nullable>

src/AzureSignTool/AzureSignTool.csproj

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,10 @@
22

33
<PropertyGroup>
44
<OutputType>Exe</OutputType>
5-
<TargetFramework>net8.0</TargetFramework>
5+
<TargetFramework>net10.0</TargetFramework>
66
<PackAsTool>true</PackAsTool>
77
<ToolCommandName>azuresigntool</ToolCommandName>
88
<Description>Azure Sign Tool is similar to signtool in the Windows SDK, with the major difference being that it uses Azure Key Vault for performing the signing process. The usage is like signtool, except with a limited set of options for signing and options for authenticating to Azure Key Vault.</Description>
9-
<RuntimeIdentifiers>win-x64;win-arm64;win-x86</RuntimeIdentifiers>
109
<MinVerTagPrefix>v</MinVerTagPrefix>
1110
<AllowUnsafeBlocks>true</AllowUnsafeBlocks>
1211
<PublishAot Condition="$(RuntimeIdentifier.EndsWith('64'))">true</PublishAot>

src/AzureSignTool/KeyVaultConfigurationDiscoverer.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ public async Task<ErrorOr<AzureKeyVaultMaterializedConfiguration>> Materialize(A
6464
}
6565
_logger.LogTrace($"Retrieved certificate with Id {azureCertificate.Id}.");
6666

67-
certificate = new X509Certificate2(azureCertificate.Cer);
67+
certificate = X509CertificateLoader.LoadCertificate(azureCertificate.Cer);
6868
}
6969
catch (Exception e)
7070
{

src/AzureSignTool/Program.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -563,7 +563,7 @@ private static ErrorOr<X509Certificate2Collection> GetAdditionalCertificates(IEn
563563
case X509ContentType.Cert:
564564
case X509ContentType.Authenticode:
565565
case X509ContentType.SerializedCert:
566-
var certificate = new X509Certificate2(path);
566+
var certificate = X509CertificateLoader.LoadCertificateFromFile(path);
567567
logger.LogTrace("Including additional certificate {thumbprint}.", certificate.Thumbprint);
568568
collection.Add(certificate);
569569
break;

test/AzureSign.Core.Tests/AuthenticodeKeyVaultSignerTests.cs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ public AuthenticodeKeyVaultSignerTests()
2222
[MemberData(nameof(RsaCertificates))]
2323
public void ShouldSignExeWithRSASigningCertificates_Sha1FileDigest(string certificate)
2424
{
25-
var signingCert = new X509Certificate2(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
25+
var signingCert = X509CertificateLoader.LoadPkcs12FromFile(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
2626
var signer = new AuthenticodeKeyVaultSigner(signingCert.GetRSAPrivateKey(), signingCert, HashAlgorithmName.SHA1, TimeStampConfiguration.None);
2727
var fileToSign = GetFileToSign();
2828
var result = signer.SignFile(fileToSign, null, null, null);
@@ -40,7 +40,7 @@ public void ShouldSignExeWithRSASigningCertificates_Sha1FileDigest(string certif
4040
[MemberData(nameof(RsaCertificates))]
4141
public void ShouldSignExeWithRSASigningCertificates_Sha256FileDigest(string certificate)
4242
{
43-
var signingCert = new X509Certificate2(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
43+
var signingCert = X509CertificateLoader.LoadPkcs12FromFile(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
4444
var signer = new AuthenticodeKeyVaultSigner(signingCert.GetRSAPrivateKey(), signingCert, HashAlgorithmName.SHA256, TimeStampConfiguration.None);
4545
var fileToSign = GetFileToSign();
4646
var result = signer.SignFile(fileToSign, null, null, null);
@@ -59,7 +59,7 @@ public void ShouldSignExeWithRSASigningCertificates_Sha256FileDigest(string cert
5959
[MemberData(nameof(ECDsaCertificates))]
6060
public void ShouldSignExeWithECDsaSigningCertificates_Sha256FileDigest(string certificate)
6161
{
62-
var signingCert = new X509Certificate2(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
62+
var signingCert = X509CertificateLoader.LoadPkcs12FromFile(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
6363
var signer = new AuthenticodeKeyVaultSigner(signingCert.GetECDsaPrivateKey(), signingCert, HashAlgorithmName.SHA256, TimeStampConfiguration.None);
6464
var fileToSign = GetFileToSign();
6565
var result = signer.SignFile(fileToSign, null, null, null);
@@ -77,7 +77,7 @@ public void ShouldSignExeWithECDsaSigningCertificates_Sha256FileDigest(string ce
7777
[MemberData(nameof(ECDsaCertificates))]
7878
public void ShouldSignExeWithECDsaSigningCertificates_Sha256FileDigest_WithTimestamps(string certificate)
7979
{
80-
var signingCert = new X509Certificate2(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
80+
var signingCert = X509CertificateLoader.LoadPkcs12FromFile(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
8181
var timestampConfig = new TimeStampConfiguration("http://timestamp.digicert.com", HashAlgorithmName.SHA256, TimeStampType.RFC3161);
8282
var signer = new AuthenticodeKeyVaultSigner(signingCert.GetECDsaPrivateKey(), signingCert, HashAlgorithmName.SHA256, timestampConfig);
8383
var fileToSign = GetFileToSign();
@@ -97,7 +97,7 @@ public void ShouldSignExeWithECDsaSigningCertificates_Sha256FileDigest_WithTimes
9797
[MemberData(nameof(RsaCertificates))]
9898
public void ShouldSignExeWithRSASigningCertificates_Sha256FileDigest_WithTimestamps(string certificate)
9999
{
100-
var signingCert = new X509Certificate2(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
100+
var signingCert = X509CertificateLoader.LoadPkcs12FromFile(certificate, "test", X509KeyStorageFlags.EphemeralKeySet);
101101
var timestampConfig = new TimeStampConfiguration("http://timestamp.digicert.com", HashAlgorithmName.SHA256, TimeStampType.RFC3161);
102102
var signer = new AuthenticodeKeyVaultSigner(signingCert.GetRSAPrivateKey(), signingCert, HashAlgorithmName.SHA256, timestampConfig);
103103
var fileToSign = GetFileToSign();

test/AzureSign.Core.Tests/AzureSign.Core.Tests.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<Project Sdk="Microsoft.NET.Sdk">
22

33
<PropertyGroup>
4-
<TargetFramework>net8.0</TargetFramework>
4+
<TargetFramework>net10.0</TargetFramework>
55

66
<IsPackable>false</IsPackable>
77
</PropertyGroup>

test/AzureSign.Core.Tests/MemoryCertificateStoreTests.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ public void ShouldAddCertificate()
2929
{
3030
using (var store = MemoryCertificateStore.Create())
3131
{
32-
using (var cert = new X509Certificate2("testcerts\\kevin_jones.cer"))
32+
using (var cert = X509CertificateLoader.LoadCertificateFromFile("testcerts\\kevin_jones.cer"))
3333
{
3434
Assert.Empty(store.Certificates);
3535
store.Add(cert);

test/AzureSignTool.Tests/AzureSignTool.Tests.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<Project Sdk="Microsoft.NET.Sdk">
22

33
<PropertyGroup>
4-
<TargetFrameworks>net8.0</TargetFrameworks>
4+
<TargetFrameworks>net10.0</TargetFrameworks>
55

66
<IsPackable>false</IsPackable>
77
</PropertyGroup>

0 commit comments

Comments
 (0)