Authenticode signature failure for v6.2.0 release
The v6.2.0 release doesn't have an Authenticode signature which breaks install and update using PowerShellGet cmdlets:
PS C:\Windows\system32> Install-Module -Name DSInternals -Verbose
PackageManagement\Install-Package : The module 'DSInternals' cannot be installed or updated because the authenticode signature of the file 'DSInternals.cat' is not valid.
At C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1:1809 char:21
+ ... $null = PackageManagement\Install-Package @PSBoundParameters
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : InvalidOperation: (Microsoft.Power....InstallPackage:InstallPackage) [Install-Package], Exception
+ FullyQualifiedErrorId : InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage
I've verified this is the case by manually downloading the new release and inspecting the security catalogue in the .nupkg. The immediately prior release, v6.1.1, does have a valid signature on its security catalogue.
The error can be overridden using the -SkipPublisherCheck parameter, but that's obviously not ideal, particularly given previous releases did have a valid signature.
Hi @ralish , I am aware of this issue and it is also stated in the release notes.
Here is some context: My previous code signing certificate has expired in November and Sectigo no longer supports issuance to Azure Key Vault because of attestation requirements. I thus had to cancel the renewal request and switch to DigiCert. I have been stuck in their identity verification process for 6+ weeks, which is totally unexpected.
After some consideration, I decided to release the new version of the PowerShell module without the signature, as it contains a couple of bugfixes. I hope to get a new certificate soon, so that the next release can be properly signed again. The -SkipPublisherCheck parameter would still be unavoidable though, because of CA change.
If the bugs fixed in v6.2.0 do not affect you, there is no need to upgrade from v6.1.1.
Hi @MichaelGrafnetter, sorry for missing the release notes! It didn't occur to me this might be a known issue. Having had to acquire code-signing certificates several times I know first-hand how much of a pain it can be.
It might be worthwhile keeping this issue open until the certificate is issued and a new signed release published just to help with discoverability? Regardless, thanks for all the work you put into this excellent module.