-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Signing Process for Windows Installer #4841
Comments
We do, as there are similar boxes coming up for the .deb and .rpm #3110 deb/apt #4716 rpm/yum We could also sign the regular checksums, just plain old ascii/sigs ?
|
Self signed cert can add the details so that the Publisher is displayed but it still will pop up this screen as the certificate won't be into the trusted root of the operating system. We need to get a known and valid certificate from a CA which is known. Not sure what the process is to get a certificate from a CA over here. |
@blueelvis - Not sure. Try asking #sig-release on Slack. |
Related to #5792 -- we're waiting on an official signing protocol from sig-release. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Yeah, we want to still do this. |
/sig security |
As of now, whenever the minikube installer is run, the following screen comes up which makes it look as if the executable is malicious to a user -
This also revolves around having infrastructure/process to sign the executables/installers so that they can be verified.
Not sure if we need to have for other operating systems as well.
-Pranav
The text was updated successfully, but these errors were encountered: