From e1b2e77df07a14a1fb264bc2694bad46d0360bcd Mon Sep 17 00:00:00 2001 From: Bill Zissimopoulos Date: Tue, 18 Oct 2022 12:19:36 +0100 Subject: [PATCH 1/4] build: version: 2022.2 --- Changelog.md | 15 +++++++++++++++ build/VStudio/build.version.props | 4 ++-- 2 files changed, 17 insertions(+), 2 deletions(-) diff --git a/Changelog.md b/Changelog.md index 89c0e634..a3ccd718 100644 --- a/Changelog.md +++ b/Changelog.md @@ -1,6 +1,21 @@ # Changelog +## v1.12 (2022.2) + +- [NEW] WinFsp now supports mounting as directory using the Mount Manager. Use the syntax `\\.\C:\Path\To\Mount\Directory`. + +- [NEW] A new registry setting `MountUseMountmgrFromFSD` has been added. See [WinFsp Registry Settings](https://github.com/winfsp/winfsp/wiki/WinFsp-Registry-Settings) for details. + +- [FIX] A problem with Windows containers has been fixed. (GitHub issue #438.) + +- [FIX] File systems can now be mounted as directories on ARM64. (GitHub issue #448.) + +- [FIX] The passthrough file system now reports correct `IndexNumber`. (GitHub issue #325.) + +- [BUILD] Product configuration for the relative paths to the File System Driver, Network Provider and EventLog is now possible via the file `build.version.props` located in `build\VStudio`. + + ## v1.12B2 (2022.2 Beta2) - [NEW] WinFsp now supports mounting as directory using the Mount Manager. Use the syntax `\\.\C:\Path\To\Mount\Directory`. diff --git a/build/VStudio/build.version.props b/build/VStudio/build.version.props index 96e0615c..1d3eef44 100644 --- a/build/VStudio/build.version.props +++ b/build/VStudio/build.version.props @@ -20,8 +20,8 @@ 1.12 - 2022.2 Beta2 - Beta + 2022.2 + Gold DigiCertGlobalG3CodeSigningECCSHA3842021CA1.cer DigiCert From 80fa156e7bea7bb0cadd5c2966bd89c5a92e2d2d Mon Sep 17 00:00:00 2001 From: Bill Zissimopoulos Date: Thu, 1 Dec 2022 10:59:48 +0000 Subject: [PATCH 2/4] tools: build.bat: remove SHA1 signatures --- tools/build.bat | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/tools/build.bat b/tools/build.bat index 9e5ebad7..a78b9cb5 100755 --- a/tools/build.bat +++ b/tools/build.bat @@ -78,9 +78,7 @@ if X%SignedPackage%==X ( launchctl-a64.exe launchctl-x64.exe launchctl-x86.exe^ fsptool-a64.exe fsptool-x64.exe fsptool-x86.exe^ memfs-a64.exe memfs-x64.exe memfs-x86.exe memfs-dotnet-msil.exe - signtool sign /ac %CrossCert% /i %Issuer% /n %Subject% /fd sha1 /t http://timestamp.digicert.com !signfiles! - if errorlevel 1 set /a signfail=signfail+1 - signtool sign /as /ac %CrossCert% /i %Issuer% /n %Subject% /fd sha256 /tr http://timestamp.digicert.com /td sha256 !signfiles! + signtool sign /ac %CrossCert% /i %Issuer% /n %Subject% /fd sha256 /tr http://timestamp.digicert.com /td sha256 !signfiles! if errorlevel 1 set /a signfail=signfail+1 popd @@ -116,10 +114,8 @@ devenv winfsp.sln /build "Installer.%Configuration%|x86" if errorlevel 1 goto fail for %%f in (build\%Configuration%\%MyProductFileName%-*.msi) do ( - signtool sign /ac %CrossCert% /i %Issuer% /n %Subject% /fd sha1 /t http://timestamp.digicert.com /d %MsiName% %%f + signtool sign /ac %CrossCert% /i %Issuer% /n %Subject% /fd sha256 /tr http://timestamp.digicert.com /td sha256 /d %MsiName% %%f if errorlevel 1 set /a signfail=signfail+1 - REM signtool sign /ac %CrossCert% /i %Issuer% /n %Subject% /fd sha256 /tr http://timestamp.digicert.com /td sha256 /d %MsiName% %%f - REM if errorlevel 1 set /a signfail=signfail+1 ) if not %signfail%==0 echo SIGNING FAILED! The product has been successfully built, but not signed. From 619e41a18e6a86dcbf5922e4ad7dc9d0ae647559 Mon Sep 17 00:00:00 2001 From: Bill Zissimopoulos Date: Thu, 1 Dec 2022 11:09:58 +0000 Subject: [PATCH 3/4] changelog: update for v1.12.22335 --- Changelog.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) diff --git a/Changelog.md b/Changelog.md index a3ccd718..5f63b1d8 100644 --- a/Changelog.md +++ b/Changelog.md @@ -1,6 +1,23 @@ # Changelog +## v1.12.22335 (2022.2 Update1) + +*Note: This release (`v1.12.22335`) is the same as the previous release (`v1.12`) except that release assets have been signed with SHA-256 only. Prior to this release, assets were signed with both SHA-256 and SHA-1. (This change was necessary to fix a problem in older versions of Windows such as Windows 7.)* + +- [NEW] WinFsp now supports mounting as directory using the Mount Manager. Use the syntax `\\.\C:\Path\To\Mount\Directory`. + +- [NEW] A new registry setting `MountUseMountmgrFromFSD` has been added. See [WinFsp Registry Settings](https://github.com/winfsp/winfsp/wiki/WinFsp-Registry-Settings) for details. + +- [FIX] A problem with Windows containers has been fixed. (GitHub issue #438.) + +- [FIX] File systems can now be mounted as directories on ARM64. (GitHub issue #448.) + +- [FIX] The passthrough file system now reports correct `IndexNumber`. (GitHub issue #325.) + +- [BUILD] Product configuration for the relative paths to the File System Driver, Network Provider and EventLog is now possible via the file `build.version.props` located in `build\VStudio`. + + ## v1.12 (2022.2) - [NEW] WinFsp now supports mounting as directory using the Mount Manager. Use the syntax `\\.\C:\Path\To\Mount\Directory`. From c61679a35d041d843173fa3b2eba106b5ab7b01f Mon Sep 17 00:00:00 2001 From: Bill Zissimopoulos Date: Mon, 5 Dec 2022 13:06:18 +0000 Subject: [PATCH 4/4] tools: build.bat: make cab file from unsigned drivers --- Changelog.md | 4 ++-- tools/build.bat | 14 +++++++++++--- 2 files changed, 13 insertions(+), 5 deletions(-) diff --git a/Changelog.md b/Changelog.md index 5f63b1d8..e3f27837 100644 --- a/Changelog.md +++ b/Changelog.md @@ -1,9 +1,9 @@ # Changelog -## v1.12.22335 (2022.2 Update1) +## v1.12.22339 (2022.2 Update1) -*Note: This release (`v1.12.22335`) is the same as the previous release (`v1.12`) except that release assets have been signed with SHA-256 only. Prior to this release, assets were signed with both SHA-256 and SHA-1. (This change was necessary to fix a problem in older versions of Windows such as Windows 7.)* +*Note: This release (`v1.12.22339`) is the same as the previous release (`v1.12`) except that: (1) the kernel-mode drivers are now digitally signed only with the Microsoft Attestation signature, and that: (2) no release assets are digitally signed with SHA-1. (This change was necessary to fix a problem in older versions of Windows such as Windows 7.)* - [NEW] WinFsp now supports mounting as directory using the Mount Manager. Use the syntax `\\.\C:\Path\To\Mount\Directory`. diff --git a/tools/build.bat b/tools/build.bat index a78b9cb5..05e61829 100755 --- a/tools/build.bat +++ b/tools/build.bat @@ -83,6 +83,14 @@ if X%SignedPackage%==X ( popd pushd build\%Configuration% + mkdir unsigned + for %%f in (!signfiles!) do ( + copy "%%f" unsigned >nul + ) + pushd unsigned + signtool remove /q /s !signfiles! + if errorlevel 1 set /a signfail=signfail+1 + popd echo .OPTION EXPLICIT >driver.ddf echo .Set CabinetFileCountThreshold=0 >>driver.ddf echo .Set FolderFileCountThreshold=0 >>driver.ddf @@ -97,13 +105,13 @@ if X%SignedPackage%==X ( echo .Set DiskDirectory1=. >>driver.ddf echo .Set DestinationDir=a64 >>driver.ddf echo driver-a64.inf >>driver.ddf - echo %MyProductFileName%-a64.sys >>driver.ddf + echo unsigned\%MyProductFileName%-a64.sys >>driver.ddf echo .Set DestinationDir=x64 >>driver.ddf echo driver-x64.inf >>driver.ddf - echo %MyProductFileName%-x64.sys >>driver.ddf + echo unsigned\%MyProductFileName%-x64.sys >>driver.ddf echo .Set DestinationDir=x86 >>driver.ddf echo driver-x86.inf >>driver.ddf - echo %MyProductFileName%-x86.sys >>driver.ddf + echo unsigned\%MyProductFileName%-x86.sys >>driver.ddf makecab /F driver.ddf signtool sign /ac %CrossCert% /i %Issuer% /n %Subject% /fd sha256 /tr http://timestamp.digicert.com /td sha256 driver.cab if errorlevel 1 set /a signfail=signfail+1