Launcher signing
To reduce the frequency of antivirus programs flagging your Launcher, it needs to be signed with a Code Signing certificate. Ideally, you should contact one of the many trusted certification authorities to obtain this certificate. However, to start, we will sign our launcher with a self-signed certificate.
Certificate Generation
For a convenient and user-friendly interface, we will use XCA. Download and install it.
- First, go to the
File
menu and selectNew Database
. Name it as you like and place it wherever you want. - In the
Certificates
tab, click onNew Certificate
. Now we will create a root certificate. - Go to the
Subject
tab and fill in thecommonName
field (e.g.,ServerMC Root CA
), this is required. Other fields are optional. - At the bottom, you will see the
Generate a new key
button. Select the key typeRSA
and length4096 bit
. A new key must be created for each new certificate. - Go to the
Extensions
tab, selectCertification Authority
from theType
list. In theValidity Period
section, specify how many years the certificate will be valid. The typical validity period for a root certificate is between 10 and 50 years. Don't forget to clickApply
to calculate the dates. - Go to the
Key Usage
tab and selectCertificate Sign
andCRL Sign
in the left column. - Go to the
Netscape
tab, nothing should be filled in or selected here. - Create the root certificate by clicking
OK
. - To enhance security, you can create an intermediate certificate. To do this, repeat the steps above, but in the
Signing
section, specify the root certificate. All subsequent certificates should have a shorter validity period than the root certificate. - Create a Code Signing certificate by specifying the intermediate certificate (or root certificate) in the
Signing
section. - Fill in the
Subject
tab similarly. - In the
Extensions
tab, selectEnd Entity
from theType
list. Set the validity period as desired. - In the
Key Usage
tab, selectDigital Signature
in the left column andCode Signing
andMicrosoft Individual Code Signing
in the right column. - Create the Code Signing certificate by clicking
OK
. - Select the Code Signing certificate and click
Export
in thePKCS#12 chain
format. Remember the password, as it will be needed for setting upcertificatePassword
.
Executable file signing
After generating the certificate, we drop it into the ssl
folder (or any other) and edit the script/electron-build.ts
file. We look for these lines
ts
"nsis": {
"artifactName": "${name}-Setup-${version}.${ext}"
},
And add these lines after.
ts
"win": {
"target": "nsis",
"signingHashAlgorithms": [
"sha256"
],
"certificateFile": "./ssl/Sign.pfx",
"certificatePassword": "password"
},
Description of config settings
target
- leave unchangedsigningHashAlgorithms
- what type of hash generation was used. If you generated a certificate leave unchangedcertificateFile
- path to certificate filecertificatePassword
- certificate passwordartifactName
- installer file name mask