- Introduction
- Target Audience
- Technical Background
- The Challenge
- Solution Approach
- Implementation Steps
- 1. Setting Up Basic Development Environment
- 2. Setting Up GitHub Authentication (for Private Repositories)
- 3. Cloning the Repository and Preparing the Development Environment
- 4. Installing Node.js and Yarn
- 5. Setting Up the Code Signing Environment
- 6. Setting Up Electron Application Build Environment
- 7. Building and Signing the Electron Application
- Results and Benefits
- Conclusion
- References
Introduction
- Key points: This article explains how Mac users can build Electron apps and sign them using a USB token in a virtual Windows environment
- Technology stack: Windows (virtual environment), Node.js, Electron, electron-builder, GlobalSign certificate, USB token
This article is a continuation of our previous articles "How to Sign Code in a Virtual Windows Environment on Mac" and "Recovery Procedure for GlobalSign Certificate Download Failures". Using the virtual Windows environment we set up previously and the certificate stored on the USB token, we’ll now explain how to actually build and sign Electron applications.
Target Audience
- Mac users who have already stored certificates on USB tokens
- Those who have already set up a virtual Windows environment
- Developers who want to release signed Electron applications
- Anyone wanting to learn the basics of setting up Node.js projects in a Windows environment
Technical Background
Electron applications benefit from code signing during distribution to avoid security warnings and demonstrate safety to end users. Since April 2023, code signing certificates must be stored on USB tokens, and Mac users can use a virtual Windows environment to perform the signing process.
electron-builder is a tool that automates the packaging and code signing of Electron apps, but configuration in a Windows environment requires some finesse. Especially when using USB tokens for signing, things might not work properly without the right settings.
USB Tokens and CI/CD
The USB token requirement has changed the development landscape. Previously, PFX files enabled fully automated signing in CI/CD pipelines, but now physical tokens necessitate a semi-manual approach. Most developers now automate the build process but perform signing manually. For Mac users working with Windows applications, the virtual environment approach described here provides a practical solution.
The Challenge
Application development and signing in a virtual Windows environment comes with several challenges:
- Development environment setup: You need to properly configure basic tools like editors, Git, and Node.js
- Access to private GitHub repositories: Setting up authentication credentials securely takes some work
- Signing from a USB token: You need to configure your build process to use the certificate stored on the token
- Managing environment variables: Setting up all the parameters needed for development, building, and signing
Particularly, using a certificate from a USB token to sign with electron-builder requires several configuration steps.
Solution Approach
In this article, we’ll tackle these challenges with the following approach:
- We’ll use Cursor editor as our integrated development environment (though similar steps work for VS Code too)
- We’ll set up repository access using GitHub CLI for modern authentication methods
- We’ll configure the Windows certificate store to work with the USB token
- We’ll set up the signtool.exe path and environment variables for electron-builder
With this approach, you can develop, build, and sign in the virtual environment just like you would in a production environment.
Implementation Steps
1. Setting Up Basic Development Environment
Start by installing Cursor editor and Git to set up a basic development environment.
Installing Cursor Editor
Visit https://cursor.sh
Click "Download for Windows"
Run the downloaded installer (.exe)
Follow the installation wizard instructions
Installing Git
Visit https://git-scm.com/download/win
Download 64-bit Git for Windows Setup
Run the installer with mostly default settings
For "Adjusting your PATH environment," select "Git from the command line and also from 3rd-party software"
These tools provide the necessary environment for code editing and version control.
2. Setting Up GitHub Authentication (for Private Repositories)
Configure GitHub authentication in line with the latest security standards.
Installing and Configuring GitHub CLI
GitHub CLI provides a modern and secure method for accessing GitHub.
# Create a temporary directory
mkdir -p ~/temp/gh-cli && cd ~/temp/gh-cli
# Download the latest version (replace with the current version from the releases page)
curl -LO https://github.com/cli/cli/releases/download/v2.45.0/gh_2.45.0_windows_amd64.zip
# Extract the ZIP
unzip gh_2.45.0_windows_amd64.zip
# Add to PATH (temporary)
export PATH="$PATH:$HOME/temp/gh-cli/gh_2.45.0_windows_amd64/bin"
# For permanent PATH addition
echo 'export PATH="$PATH:$HOME/temp/gh-cli/gh_2.45.0_windows_amd64/bin"' >> ~/.bashrc
source ~/.bashrc
# Login with GitHub CLI
gh auth login
# Follow the interactive prompts:
# - Select GitHub.com
# - Select HTTPS
# - Select browser authentication
# - Authenticate in the browser that opens with your GitHub account
This approach uses browser authentication, providing a secure way to access repositories without managing personal access tokens.
Initial Git Configuration
# Set user information (only needed once)
git config --global user.name "Your Name"
git config --global user.email "your.email@example.com"
This configuration is recorded in commit history, so it’s recommended to set it up properly.
3. Cloning the Repository and Preparing the Development Environment
Retrieve the project code and set up the development environment.
Cloning from GitHub
# Right-click in an appropriate location (like Desktop) and select "Git Bash Here"
# Using GitHub CLI
gh repo clone username/repository-name
cd repository-name
# Or clone via HTTPS
git clone https://github.com/username/repository-name.git
cd repository-name
Example of actual cloning:
Sasaki@WIN-RF7UMHPTK93 CLANGARM64 ~
$ git clone https://github.com/your-company/your-app-name
Cloning into 'your-app-name'...
remote: Enumerating objects: 246, done.
remote: Counting objects: 100% (246/246), done.
remote: Compressing objects: 100% (124/124), done.
remote: Total 246 (delta 80), reused 212 (delta 46), pack-reused 0 (from 0)
Receiving objects: 100% (246/246), 1.38 MiB | 3.88 MiB/s, done.
Resolving deltas: 100% (80/80), done.
Opening the Repository in Cursor
Launch Cursor
Select "File" → "Open Folder" and choose the cloned repository folder
Now you’re ready for code editing.
4. Installing Node.js and Yarn
Install Node.js and Yarn necessary for developing and building Electron apps.
# Install Node.js (using curl)
cd ~/Downloads
curl -O https://nodejs.org/dist/v20.11.1/node-v20.11.1-x64.msi
# Run the downloaded MSI file (open in Explorer)
explorer .
# After installation, restart Git Bash and verify
node --version
npm --version
# Install Yarn
npm install -g yarn
# Verify installation
yarn --version
If versions are displayed, the installation was successful. It’s recommended to use the latest LTS version.
5. Setting Up the Code Signing Environment
Prepare the environment for signing applications using the USB token.
Configuring signtool.exe Path
Add the path to signtool.exe from the Windows SDK. This assumes you’ve already installed the Windows SDK from the previous article.
# Add to .bashrc file (for Git Bash)
echo 'export PATH="$PATH:/c/Program Files (x86)/Windows Kits/10/bin/10.0.26100.0/X64"' >> ~/.bashrc
# Apply the setting
source ~/.bashrc
Verification:
# Check if signtool command is available
signtool.exe /?
If help information is displayed, the path is configured correctly. When actually using it, you’ll need to specify the certificate name and timestamp server URL appropriately.
Exporting Certificate from USB Token and Importing to Windows
Registering the token’s certificate in the Windows certificate store streamlines the signing process.
- Exporting Certificate from SafeNet Authentication Client
1. Launch SafeNet Authentication Client (SAC)
2. Select the token and log in with the PIN code
3. Select "Certificates" from the left panel
4. Right-click the certificate you want to use for signing and select "Export"
5. Choose "DER encoded binary X.509 (.CER)"
6. Specify the save location and filename (e.g., `YourCompany_Cert.cer`)
- Importing to Windows Certificate Store
Using PowerShell:
# Open PowerShell as administrator and run
Import-Certificate -FilePath "C:\path\to\YourCompany_Cert.cer" -CertStoreLocation Cert:\CurrentUser\My
Similar operations can be done via GUI. To verify the certificate was imported correctly:
# Run in PowerShell
Get-ChildItem -Path Cert:\CurrentUser\My | Where-Object { $_.Subject -like "*YourCompany*" } | Format-List Subject, Thumbprint
In actual projects, replace company name sections appropriately.
6. Setting Up Electron Application Build Environment
Now let’s focus on the specific configuration needed for code signing with a USB token.
Setting Up the Signing Script
For signing with a USB token, create a custom signing script called sign-with-token.ts
:
// scripts/sign-with-token.ts
exports.default = async function(configuration) {
const { path } = configuration;
const { execSync } = require('child_process');
console.log(`Signing: ${path}`);
try {
execSync(`signtool sign /tr http://timestamp.globalsign.com/tsa/r6advanced1 /fd sha256 /td sha256 /n "Your Company Name" "${path}"`,
{ stdio: 'inherit' });
return true;
} catch (error) {
console.error('Signing error:', error);
throw error;
}
};
Key signtool parameters:
/tr
: Timestamp server URL/fd sha256
and/td sha256
: SHA-256 hash algorithm/n "Your Company Name"
: Certificate subject name in Windows certificate store
Configuring package.json
Configure electron-builder to use your signing script:
{
"scripts": {
"build:win": "yarn build && electron-builder -w --publish=never"
},
"build": {
"win": {
"sign": "./sign-with-token.ts"
}
}
}
This setup will execute the signing script for each file during the packaging process.
7. Building and Signing the Electron Application
Finally, build and sign the application.
Building the Application
# Navigate to the project directory
cd path/to/project
# Install dependencies
yarn install
# Make sure the USB token is connected
# Build the application
yarn build:win
This command runs the build script defined in package.json, and electron-builder handles the packaging and signing of the app.
Checking Build Artifacts
# Navigate to the artifacts directory
cd artifacts
Main artifacts:
-
win-unpacked: Unpacked application folder
YourApp.exe
: Main executable (signed)resources
: App resources
-
Installer files:
YourApp Setup x.x.x.exe
: Windows installer (signed)YourApp-x.x.x-win.zip
: Portable version (zip format)
Verifying the Signature
Here’s how to verify the signature through the Windows UI:
-
Locate the signed file in Explorer:
- Find
YourApp Setup x.x.x.exe
in the artifacts folder
- Find
-
Open file properties:
- Right-click on the file and select "Properties"
-
Check the Digital Signatures tab:
- Click on the "Digital Signatures" tab in the Properties window
- You should see "Your Company Name" in the signature list
-
View signature details:
- Select the signature and click the "Details" button
- Click "View Certificate" to examine the certificate information
- Here you can verify issuer information, validity period, timestamp, and other details
If the Digital Signatures tab displays correctly and you can view the certificate information, the signing process was successful. It’s also good to verify that a valid timestamp has been applied.
Results and Benefits
Following these steps provides several benefits:
- Enhanced security: Secure signing process using USB token
- Automation: Automated building and signing with electron-builder
- Cross-platform development: Build Windows apps in a virtual environment on Mac
- Secure distribution: Ensure reliability with signed applications
In my experience, this method allowed me to build signed Electron apps directly from Mac without needing a dedicated Windows machine.
Conclusion
This article outlines the process for building and signing Electron apps with a USB token in a virtual Windows environment on Mac. This approach allows you to:
- Create signed Windows apps on a Mac without a physical Windows machine
- Maintain security while ensuring reliable application distribution
- Streamline development, build, and signing in one environment
As security requirements evolve, USB token signing will continue to be important for application distribution.
References
- electron-builder official documentation
- GlobalSign Code Signing Certificate Guide
- Windows SDK documentation
- GitHub CLI official guide
- Node.js official website
- SafeNet Authentication Client User Guide