Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using GitHub Actions Secrets to Store Certificates/Keys | josh-ops #45

Open
utterances-bot opened this issue Feb 7, 2025 · 1 comment

Comments

@utterances-bot
Copy link

Using GitHub Actions Secrets to Store Certificates/Keys | josh-ops

Storing a certificate/private key as a GitHub Actions secret

https://josh-ops.com/posts/storing-certificates-as-github-secrets/

Copy link

Thank you for the tutorial. I used your decoding command:

echo -n "$MACOS_CERTIFICATE" | base64 -d -o certificate.p12

However, I'm consistently getting the following error:

security: SecKeychainItemImport: MAC verification failed during PKCS12 import (wrong password?)

This happens when I try to run a command to add "certificate.p12" to my keychain (for signing/notarizing for macOS):

security import certificate.p12 -k build.keychain -P "$MACOS_CERTIFICATE_PASS" -A -T /usr/bin/codesign

I have verified round-trip base64 encoding-decoding on my local machine, and I have even compared hash functions on my local machine to the macOS runner in GitHub Actions. There is no corruption taking place in the .p12 file. However, my certificate password appears to consistently fail on the macOS runner. I have verified that my password is correct in GitHub Secrets.

The only thing that I can think of is my local machine is running Windows, while the runner is macOS. However, I have verified that the encryption method is SHA256RSA, and thus, I don't see how this could be the issue.

If anyone has any suggestions, I'd be very thankful. And once again, thanks Josh for pointing me in the right direction.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants