WidgetCertificateData result;
result.chainId = data.getSignatureNumber();
+ LogDebug("result.chainId : " << result.chainId);
result.owner = data.isAuthorSignature() ?
WidgetCertificateData::AUTHOR : WidgetCertificateData::DISTRIBUTOR;
AddStep(&TaskCertify::stepFinalize);
}
-void TaskCertify::processDistributorSignature(const SignatureData &data,
- bool first)
+void TaskCertify::processDistributorSignature(const SignatureData &data)
{
// this signature is verified -
// no point in check domain WAC_ROOT and WAC_RECOGNIZED
m_contextData.wacSecurity.getCertificateChainListRef().push_back(
collection);
- if (first) {
+ if (data.getSignatureNumber() == 1) {
m_contextData.wacSecurity.getCertificateListRef().push_back(
toWidgetCertificateData(data, true));
m_contextData.wacSecurity.getCertificateListRef().push_back(
{
LogInfo("================ Step: <<Signature>> ENTER ===============");
- std::string widgetPath = m_contextData.locations->getTemporaryRootDir() +
- "/";
+ std::string widgetPath;
+ if (m_contextData.widgetConfig.packagingType ==
+ WrtDB::PKG_TYPE_DIRECTORY_WEB_APP)
+ {
+ widgetPath = m_contextData.locations->getSourceDir() + "/";
+ } else {
+ widgetPath = m_contextData.locations->getTemporaryPackageDir() + "/";
+ }
SignatureFileInfoSet signatureFiles;
SignatureFinder signatureFinder(widgetPath);
SignatureFileInfoSet::reverse_iterator iter = signatureFiles.rbegin();
LogInfo("Number of signatures: " << signatureFiles.size());
- bool firstDistributorSignature = true;
bool testCertificate = false;
bool complianceMode = GlobalDAOReadOnly::getComplianceMode();
continue;
}
// now signature _must_ be verified
- processDistributorSignature(data, firstDistributorSignature);
- firstDistributorSignature = false;
+ processDistributorSignature(data);
}
bool developerMode = GlobalDAOReadOnly::GetDeveloperMode();