Skip to content

Expand Trusted Signing E2E coverage#5

Merged
Marc-André Moreau (mamoreau-devolutions) merged 1 commit into
masterfrom
mamoreau-devolutions/trusted-signing-gap-plan
May 21, 2026
Merged

Expand Trusted Signing E2E coverage#5
Marc-André Moreau (mamoreau-devolutions) merged 1 commit into
masterfrom
mamoreau-devolutions/trusted-signing-gap-plan

Conversation

@mamoreau-devolutions
Copy link
Copy Markdown
Contributor

Summary

  • expand psign-server Artifact Signing mocks for alternate LRO/response shapes, poll failures, PEM-chain certificates, and request-shape assertions
  • add local auth hooks for client credentials and managed identity E2E coverage without real Azure dependencies
  • broaden portable Trusted Signing E2E coverage for submit/sign, WinMD, trust verification, timestamp-aware trust, and non-PE routing failures
  • update the signing platform gap doc to reflect current PE/WinMD portable REST embedding support

Validation

  • cargo fmt --all
  • cargo clippy --workspace --all-targets --locked
  • cargo test -p psign --test cli_pe_digest --features "timestamp-server artifact-signing-rest timestamp-http" --locked
  • cargo test --workspace --locked

Add psign-server Artifact Signing response modes, local auth hooks, and E2E coverage for alternate REST responses, certificate payloads, trust verification, WinMD signing, and portable non-PE routing. Update the gap analysis to reflect current PE/WinMD portable embedding support.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@mamoreau-devolutions Marc-André Moreau (mamoreau-devolutions) deleted the mamoreau-devolutions/trusted-signing-gap-plan branch May 21, 2026 03:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

1 participant