Notarize your macOS Electron Apps
Перейти к файлу
Charles Kerr e7ea248a8a
Merge pull request #76 from electron/dependabot/npm_and_yarn/normalize-url-4.5.1
build(deps): bump normalize-url from 4.5.0 to 4.5.1
2021-06-11 12:48:44 -05:00
.circleci build: cleanup & add test infrastructure (#36) 2020-03-06 21:18:05 -08:00
src feat: add validation function for authorizationArgs (#35) 2020-03-27 18:10:26 -07:00
test feat: add validation function for authorizationArgs (#35) 2020-03-27 18:10:26 -07:00
.gitignore Initial Commit 2018-10-23 16:36:41 +11:00
.npmignore Initial Commit 2018-10-23 16:36:41 +11:00
.prettierrc.json chore: replace tslint with prettier 2019-06-25 22:54:38 -07:00
.releaserc.json build: use circleci for releases 2019-11-01 22:21:22 -07:00
LICENSE chore: add metadata to the package (#44) 2020-06-09 08:22:33 -07:00
README.md Readme: Clarify appleIdPassword 2020-06-10 13:30:48 +01:00
jest.config.js build: cleanup & add test infrastructure (#36) 2020-03-06 21:18:05 -08:00
package.json build(deps-dev): bump semantic-release from 15.13.29 to 17.2.3 2020-11-18 15:06:26 -08:00
tsconfig.json build: cleanup & add test infrastructure (#36) 2020-03-06 21:18:05 -08:00
yarn.lock Merge pull request #76 from electron/dependabot/npm_and_yarn/normalize-url-4.5.1 2021-06-11 12:48:44 -05:00

README.md

Electron Notarize

Notarize your Electron apps seamlessly for macOS

CircleCI status NPM package

Installation

# npm
npm install electron-notarize --save-dev

# yarn
yarn add electron-notarize --dev

What is app "notarization"?

From Apple's docs in XCode:

A notarized app is a macOS app that was uploaded to Apple for processing before it was distributed. When you export a notarized app from Xcode, it code signs the app with a Developer ID certificate and staples a ticket from Apple to the app. The ticket confirms that you previously uploaded the app to Apple.

On macOS 10.14 and later, the user can launch notarized apps when Gatekeeper is enabled. When the user first launches a notarized app, Gatekeeper looks for the apps ticket online. If the user is offline, Gatekeeper looks for the ticket that was stapled to the app.

Apple has made this a hard requirement as of 10.15 (Catalina).

Prerequisites

For notarization, you need the following things:

  1. Xcode 10 or later installed on your Mac.
  2. An Apple Developer account.
  3. An app-specific password for your ADC accounts Apple ID.
  4. Your app may need to be signed with hardened-runtime and the following entitlements:
    1. com.apple.security.cs.allow-jit
    2. com.apple.security.cs.allow-unsigned-executable-memory

API

Method: notarize(opts): Promise<void>

  • options Object
    • appBundleId String - The app bundle identifier your Electron app is using. E.g. com.github.electron
    • appPath String - The absolute path to your .app file
    • ascProvider String (optional) - Your Team Short Name.
    • There are two methods available: user name with password:
      • appleId String - The username of your apple developer account
      • appleIdPassword String - The app-specific password (not your Apple ID password).
    • ... or apiKey with apiIssuer:
      • appleApiKey String - Required for JWT authentication. See Note on JWT authentication below.
      • appleApiIssuer String - Issuer ID. Required if appleApiKey is specified.

Safety when using appleIdPassword

  1. Never hard code your password into your packaging scripts, use an environment variable at a minimum.
  2. It is possible to provide a keychain reference instead of your actual password (assuming that you have already logged into the Application Loader from Xcode). For example:
const password = `@keychain:"Application Loader: ${appleId}"`;

Another option is that you can add a new keychain item using either the Keychain Access app or from the command line using the security utility:

security add-generic-password -a "AC_USERNAME" -w <app_specific_password> -s "AC_PASSWORD"

where AC_USERNAME should be replaced with your Apple ID, and then in your code you can use:

const password = `@keychain:AC_PASSWORD`;

Notes on JWT authentication

You can obtain an API key from Appstore Connect. Create a key with App Manager access. Note down the Issuer ID and download the .p8 file. This file is your API key and comes with the name of AuthKey_<api_key>.p8. This is the string you have to supply when calling notarize.

Based on the ApiKey, altool will look in the following places for that file:

  • ./private_keys
  • ~/private_keys
  • ~/.private_keys
  • ~/.appstoreconnect/private_keys

Notes on your Team Short Name

If you are a member of multiple teams or organizations, you have to tell Apple on behalf of which organization you're uploading. To find your team's short name), you can ask iTMSTransporter, which is part of the now deprecated Application Loader as well as the newer Transporter.

With Transporter installed, run:

/Applications/Transporter.app/Contents/itms/bin/iTMSTransporter -m provider -u APPLE_DEV_ACCOUNT -p APP_PASSWORD

Alternatively, with older versions of Xcode, run:

/Applications/Xcode.app/Contents/Applications/Application Loader.app/Contents/itms/bin/iTMSTransporter -m provider -u APPLE_DEV_ACCOUNT -p APP_PASSWORD

Example Usage

import { notarize } from 'electron-notarize';

async function packageTask () {
  // Package your app here, and code sign with hardened runtime
  await notarize({
    appBundleId,
    appPath,
    appleId,
    appleIdPassword,
    ascProvider, // This parameter is optional
  });
}