-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
There is no way to verify the binary #101
Comments
Good point, next release should have CHECKSUMS file. |
Can anyone recommend good practices for this? |
For now I think we can have at least some checksums released with binaries. We can add signature by one of our PGP keys but it would solve complete paranoia when any of our machines (as builders of binaries) are infected by something. Only recepie here is to inspect sources and build yourself. |
Sounds good. Can you incorporate all the necessary signing tasks into the release/Makefile. We'll share the keys ourselves privately of course. |
Checksums are definitely good enough. +1 @asergeyev How can I build websocketd? I'm not really that familiar with Go development tools, so not sure what to install or how to properly compile it. |
I guess you'll end up with stuff that you don't need this way but we have release makefile that could be helpful:
Then you should get out/0.2.10 dir with bunch of cross-compiled things. You might reduce number of things that it would built by changing PLATFORMS variable in Makefile or in command line... e.g:
|
See also CHECKSUMS in pre-release https://github.com/joewalnes/websocketd/releases/tag/v0.2.10 (not yet signed, subject to change) |
Ok, signed checksums will be available. No promises about signing with same key made but it's verifiable now. |
I know this might seem paranoid, but if the only way to get websocketd is to download a binary over HTTP ...
The text was updated successfully, but these errors were encountered: