Skip to content

Releases: vcsjones/AzureSignTool

v7.0.1

24 Nov 16:35
v7.0.1
75c482f

Choose a tag to compare

  • [FIX] Restores compatibility with .NET 8 as .NET 10 is not ubiquitously available in all common CI environments yet.

This change only impacts the nuget tool distribution of AzureSignTool. As the stand-alone binaries are fully self-contained, they do contain any functional changes and are still built with .NET 10.

The 7.0.1 versions of the binaries are included for consistency of availability on GitHub releases, but it is not necessary to move to 7.0.1 if 7.0.0 is working for you.

v7.0.0

23 Nov 19:59
v7.0.0
9630104

Choose a tag to compare

What's Changed

  • [CHORE] Updated all dependencies
  • [BREAKING CHANGE] The NuGet packages now require .NET 10 or later.
  • [BUG FIX] File system globbing introduced in AzureSignTool 6.0.0 did not correctly handle globs patterns using absolute paths, like E:\stuff\*.dll. This adds a work around so that common absolute path forms work, such as drive-prefixed paths or UNC paths.
  • [CHORE] The WinGet binaries are now built with .NET 10.

New Contributors

Full Changelog: v6.0.1...v7.0.0

v6.0.1

14 Jan 21:28
v6.0.1
836e9d0

Choose a tag to compare

What's Changed

There are no functional changes in this release. This release is built with .NET 8.0.12 which addresses vulnerabilities fixed in the January servicing release. It is built from the same commit as the 6.0.0 release.

v6.0.0

15 Oct 16:39
v6.0.0
836e9d0

Choose a tag to compare

What's Changed

  • [BREAKING CHANGE] Replaced the McMaster.Extensions.CommandLineUtils with XenoAtom.CommandLine for command line
    The command line parsing library has been replaced with a Native AOT compatible one to allow for stand alone binaries to be published. While the new command line parser is largely compatible with the previous one, there may be differences in how they are interpreted.
  • [CHORE] Update all dependencies
  • [FEATURE] Add support for glob patterns in signing input.
  • [BREAKING CHANGE] Changed parallelism to use less concurrency to avoid throttling.
    --max-degree-of-parallelism now defaults to 4, instead of unlimited. This is to reduce the amount of signing throughput which can result in throttling from either Azure Key Vault or from a CA's timestamp infrastructure. The original behavior can be restored by explicitly setting --max-degree-of-parallelism to 0.
  • [FEATURE] Azure Key Vault retry policy. RSAKeyVaultProvider has been replaced with Azure's native functionality. This allows for retries, throttling, and back off for Azure Key Vault.
  • [FEATURE] --azure-key-vault-certificate-version can be used to specify a specific version of an Azure Key Vault certificate.

New Contributors

Full Changelog: v5.0.0...v6.0.0

v6.0.0-beta1

25 Sep 20:21
v6.0.0-beta1
e2f6759

Choose a tag to compare

v6.0.0-beta1 Pre-release
Pre-release

This release is for AzureSignTool 6.0.0 beta1.

Please see this announcement post for information about 6.0.0 beta1. #271

What's Changed

New Contributors

Full Changelog: v5.0.0...v6.0.0-beta1

v5.0.0

17 Mar 20:30
e857158

Choose a tag to compare

This is the 5.0 release of AzureSignTool.

  • The 5.0.0 version bumps the tool framework version to .NET 8.0.
  • Appending signatures is now supported on Windows 11 or later. Thanks to @VaronisContributor for the contribution.

v4.0.1

12 Dec 17:32
v4.0.1
9f30f7a

Choose a tag to compare

This upgrades AzureSignTool to .NET 6.

Other minor changes and typos included.

v3.0.0

18 Sep 17:24
v3.0.0
22c5e90

Choose a tag to compare

AzureSignTool 3.0.0 has been released.

Highlights:

  • Moved off of .NET Core 2.1 to .NET Core 3.1. AzureSignTool will moved to .NET 6.0 LTS later this year.
  • There are breaking changes in the CLI. The --azure-key-vault-tenant-id option may be required.
  • Fixed miscellaneous bugs where specifying invalid input on the CLI would result in zero output.

v2.0.17

05 Oct 05:41
v2.0.17
82ba1d6

Choose a tag to compare

1.0.1

11 Feb 03:14
1.0.1
3362e5d

Choose a tag to compare

  • Improved signing performance by avoiding a network call to Azure Key Vault.