Cache the certificate used for signing? #197
Replies: 1 comment 1 reply
-
The certificate is cached, or at least is should be. The actual public certificate is fetched exactly once when the configuration is materialized here: That public certificate is then fed in to the signing operations here:
AzureSignTool does not do local signing. For every sign operation, we say "Hey Azure Key Vault, please sign this with the private key". This is so that
Two follow up questions: Are you using a software or HSM backed key? I'm assuming HSM since I think that is required by CA/B at this point, but want to double check. |
Beta Was this translation helpful? Give feedback.
-
We have an AzDO pipeline that uses AzureSignTool to sign all the dlls and executables before being packaged by our installer. Our product is an entire "platform" with thousands of dlls, passing them in a text file using the ifl parameter..
We are often getting throttled by the azure keyvault, and have had to reduce mdop to 2, which in turn slows the signing process significantly.
{"error":{"code":"Throttled","message":"Request was not processed because too many requests were received. Reason: VaultOperationLimitReached"}}
My guess is that this is happening because AzureSignTool is retrieving the certificate from the keyvault for every file being signed. Would it be possible to cache the certificate and reuse it so that only a single access to the keyvault needs to be made?
Beta Was this translation helpful? Give feedback.
All reactions