Skip to content

Revert incorrect code signing workflow environment name change#8

Closed
Copilot wants to merge 3 commits intomainfrom
copilot/fix-reference-issue
Closed

Revert incorrect code signing workflow environment name change#8
Copilot wants to merge 3 commits intomainfrom
copilot/fix-reference-issue

Conversation

Copy link
Contributor

Copilot AI commented Feb 17, 2026

The code signing workflow was failing with 403 Forbidden when attempting to sign binaries. Initial analysis incorrectly identified the environment name as the issue, but the repository owner confirmed that codesigning is the correct environment name where all Azure Trusted Signing secrets are configured.

Changes

  • Reverted .github/workflows/codesign.yml to use environment: codesigning (the correct configured environment)

Note

The 403 Forbidden error from Azure Trusted Signing is an authentication/authorization issue on the Azure service side, not related to the GitHub environment name. Potential causes include:

  • Service principal lacking permissions on the Azure Trusted Signing resource
  • Certificate profile or signing account configuration issues
  • Expired or incorrect credentials

Reference: https://github.com/adamgell/IntuneGUI/actions/runs/22119061592/job/63934507307#step:9:1

Original prompt

Reference: https://github.com/adamgell/IntuneGUI/actions/runs/22119061592/job/63934507307#step:9:1 fix


✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.

…ing'

Co-authored-by: adamgell <27519+adamgell@users.noreply.github.com>
Copilot AI changed the title [WIP] Fix reference issue in IntuneGUI actions Fix code signing workflow environment name Feb 17, 2026
Copilot AI requested a review from adamgell February 17, 2026 23:35
@adamgell adamgell requested review from Copilot and removed request for adamgell February 17, 2026 23:37
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR fixes a critical bug in the code signing workflow that was causing 403 Forbidden errors during release signing. The workflow was referencing a non-existent GitHub environment name (codesigning), preventing access to the Azure Trusted Signing secrets stored in the actual signing environment.

Changes:

  • Corrected the GitHub Actions environment name from codesigning to signing in the code signing workflow

@adamgell
Copy link
Owner

@copilot the environment codesigning is correct. I have all the env there.

Co-authored-by: adamgell <27519+adamgell@users.noreply.github.com>
Copy link
Contributor Author

Copilot AI commented Feb 17, 2026

@copilot the environment codesigning is correct. I have all the env there.

You're correct - I've reverted the change back to codesigning in commit 28b8519.

The 403 Forbidden error from Azure Trusted Signing suggests the issue is Azure-side permissions rather than the GitHub environment name. The service principal may need permissions on the Azure Trusted Signing resource, or the certificate profile configuration may need adjustment.

Copilot AI changed the title Fix code signing workflow environment name Revert incorrect code signing workflow environment name change Feb 17, 2026
Copilot AI requested a review from adamgell February 17, 2026 23:45
@adamgell
Copy link
Owner

@copilot What permissions do I need to assign the app registration

Copy link
Contributor Author

Copilot AI commented Feb 17, 2026

@copilot What permissions do I need to assign the app registration

For Azure Trusted Signing, assign the "Trusted Signing Certificate Profile Signer" role to your service principal (app registration). This is the minimum required permission for signing operations.

To assign the role:

  1. Go to your Azure portal → Trusted Signing account → Certificate Profile
  2. Navigate to Access Control (IAM)
  3. Add role assignment → Select "Trusted Signing Certificate Profile Signer"
  4. Assign to your service principal (the app with Client ID from your GitHub secrets)

Via Azure CLI:

az role assignment create \
  --assignee <service-principal-object-id> \
  --role "Trusted Signing Certificate Profile Signer" \
  --scope "/subscriptions/<sub-id>/resourceGroups/<rg-name>/providers/Microsoft.CodeSigning/codeSigningAccounts/<account-name>/certificateProfiles/<profile-name>"

Assigning at the certificate profile level follows least privilege principles. This should resolve the 403 Forbidden error.

@adamgell adamgell closed this Feb 18, 2026
@adamgell adamgell deleted the copilot/fix-reference-issue branch February 18, 2026 02:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants

Comments