SignPath

Documentation  ❯  Crypto Providers   ❯   macOS CryptoTokenKit

General instructions

This section provides information to use SignPath with any tool that supports macOS CryptoTokenKit.

Supported versions

macOS 12.0 or higher

Installation

Simply copy-deploy the SignPathCryptoTokenKit.app application to the target system.

Background

macOS allows CryptoTokenKit extensions to be registered in the system. Through these extensions, key material and certificates can be provided. An extension is only available while the application that provides the extension is running. Therefore, before calling signing tools like codesign, the SignPathCryptoTokenKit.app needs to be started.

Usage

The SignPathCryptoTokenKit.app application loads all available certificates for the given parameters and makes them avaialble in the macOS keychain through a CryptoTokenKit extension. The application supports the following parameters (all of them are optional):

Parameter Value Description
--config /path/to/config/file.json Path to config file
--api-url $ApiUrl The base URL of the SignPath API, e.g. https://app.signpath.io/Api
--project-slug $ProjectSlug If not specified, the certificates from all available projects will be loaded
--signing-policy-slug $SigningPolicySlug If not specified, the certificates from all available signing policies will be loaded
--organization-id $OrganizationId The id of the organization to use
--api-token $ApiToken The API token for a CI or Interactive User (can be created in the “Users and Groups” UI)

Keys are not specified directly

When using a file-based configuration, the macOS CryptoTokenKit Crypto Provider requires the config file to be

  • named config.json and placed in the same directory as the SignPathCryptoTokenKit.app application or
  • its path to be specified via the --config parameter

Example call starting the application:

export SIGNPATH_API_TOKEN=...
open SignPathCryptoTokenKit.app --args \
  --project-slug MyProject \
  --signing-policy-slug release-signing \
  --organization-id 0241f767-69c8-448d-ad5e-8bd453916068

Troubleshooting

Loading the certificates and making them available in the macOS keychain can take up to 20 seconds.

Logs

Unless specified otherwise, the log files are stored in ~/Library/Logs/SignPathCryptoTokenKit/ and ~/Library/Containers/io.signpath.apps.CryptoTokenKit/Data/Library/Logs/ctk/ respectively.

Useful commands:

The following commands are helpful to make sure the setup is correct:

Using the security command, the registered smart cards can be listed. This list should contain an entry io.signpath.apps.SignPathCryptoTokenKit.ctk:<identifier>

security list-smartcard

Using the pluginkit tool, the registration of the token driver can be verified. The command lists all registered tokens and should also list io.signpath.apps.CryptoTokenKit($Version).

pluginkit -m -v -p com.apple.ctk-tokens

The smartcard service on macOS sometimes has issues. If the certificates cannot be loaded, the service can be restarted by running the following command:

killall ctkd

Info: Updated intermediate certificate

When creating a certificate in the Apple Developer portal, the intermediate certificate can be selected. On some machines, the new intermediate certificate is still missing. You can download it here.

Warning: Produce correct timestamps

When using codesign (or any other signing tool) directly, you are responsible for correct time stamping. See Timestamps

codesign

codesign is a command line tool by Apple.

codesign requires the following parameter to find the correct certificate:

Parameter Value Description
-s $SigningIdentity A descriptor of the code signing identity that is stored in the keychain by the SignPath CryptoTokenKit. Provide the common name (or a substring) of the certificate.

Sample: sign MyApp.app

codesign -s MyCertificateSubjectName MyApp.app

Info: Using the right certificate

codesign requires an “Apple Developer Application” certificate.

productsign

productsign is a command line tool by Apple.

productsign requires the following parameter to find the correct certificate:

Parameter Value Description
--sign $SigningIdentity A descriptor of the code signing identity that is stored in the keychain by the SignPath CryptoTokenKit. Provide the common name (or a substring) of the certificate.

Sample: sign MyInstaller.pkg

productsign --timestamp --sign "XX6NBJ3UUF" MyInstaller.pkg MyInstaller-signed.pkg

Info: Using the right certificate

productsign requires an “Apple Developer Installer” certificate.

Sign up for news and special offers