-
Notifications
You must be signed in to change notification settings - Fork 252
NuGet Verify Command
Status: Review
Task for Specing and Task for execution
Signed packages help with authenticity and integrity of a package when it is being consumed by NuGet users. Currently there is no way to verify that a signature in a package is valid.
All NuGet package authors and NuGet package consumers.
Part of the larger package signing effort.
We will add a first level command to NuGet.exe which will allow package authors and package sources to verify NuGet packages, this command will have a flag for signatures verification.
usage: NuGet verify -Signatures <package_path> [options]
Verifies a NuGet package.
argument:
-Signatures - Specifies the type of verification to be done. Currently only signatures verification is supported.
package_path - Path to the package(s) that needs to be verified.
options:
-Verbosity <level> - Specifies the level of detail displayed in the output: quiet, normal, detailed
-CertificateFingerprint "<cert_fingerprint>;..." - Verify that the signer certificate matches with one of the specified fingerprints.
A certificate fingerprint is a SHA-1 hash of the certificate used to identify the certificate.
If more than one fingerprint is provided, the input should be a string with
each fingerprint separated by a semicolon.
Note: The option CertificateFingerprint
will not be implemented for Wave 1 of package signature work.
Verify Command returns one of the following exit codes when it terminates.
Exit code | Description |
---|---|
0 | Execution was successful. |
1 | Execution has failed. |
If multiple packages are provided, an error in one package will not be fatal to the verification of the other packages. If multiple errors and warning are present, they will be displayed on the console.
The details that should be displayed on each verbosity level are described below. Each level should display the same as the level below plus whatever is specified in that level. In that sense, quiet will be give the less amount of information, while detailed the most.
quiet
- No output on successful execution and minimal output for failed execution.
normal
- Path to package being verified
- For each signature present
- Type of signature (author or repository)
- Hash of signature
- If the signature is valid/trusted.
- Hashing algorithm used for signature
- Signature Timestamp
detailed
- Information about each signing certificate and chain
- Issued to
- Issued by
- Expires
- Fingerprint
- Information about each Timestamper certificate and chain
- Issued to
- Issued by
- Expires
- Fingerprint
Warnings are errors should be displayed if present no matter the verbosity level chosen.
Some errors and warnings that should be displayed are:
Warnings
- A signing certificate doesn't chain up to a trusted root
- A timestamper certificate doesn't chain up to a trusted root
- Unable to retrieve revocation information for signing certificate.
Errors
- Package not found
- Package is not signed
- The version of the signature is not supported
- The version of the manifest is not supported
- The hashing algorithm of the signature is not supported
- Signature file is too big
- Invalid signature. File might have been tampered.
- Signer certificate does not match any of the fingerprints provided.
In future we would like to add support for the following platforms -
-
Dotnet CLI -
dotnet nuget verify -Signatures <package_path> [Options]
-
MSBuild target -
msbuild /t:verifypackage -Signaturues <package_path> [Options]
Please use the tracking issue to provide feedback or any questions that you might have. Thanks!
Check out the proposals in the accepted
& proposed
folders on the repository, and active PRs for proposals being discussed today.