-
-
Notifications
You must be signed in to change notification settings - Fork 346
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Releases should be signed #1354
Comments
StartSSL HowTo |
Piggybacking on this: SpaceDock/SpaceDock-Project#2 will require some sort of verification infrastructure (see SpaceDock/SpaceDock-Project#22 for a discussion of implementation ideas), and we were hoping to jump on hte CKAN metadata train, but the spec has no provisions for a |
Ok, we can get a signed certificate from Certum for only €14.00, which I'm willing to pay for. I'm not sure if that's an annual fee or a once-off, but I'm ok with it either way. It looks to me like their Open Source Code Signing is what we would need to use. @ayan4m1, do you have any relevant experience in this field? |
Bringing this issue back to life may be worthwhile. We should actually move to release signing, or close this issue. |
This comment was marked as outdated.
This comment was marked as outdated.
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This adds a signing step for our release assets in preparation for #1354. Although the CSR is not ready yet, this will make it easy for us to reference the download url when it is ready.
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This adds a signing step for our release assets in preparation for #1354. Although the CSR is not ready yet, this will make it easy for us to reference the download url when it is ready.
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This is a complete refactor and update of the release workflow in preparation for signed commits (KSP-CKAN#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
This is a complete refactor and update of the release workflow in preparation for signed commits (#1354). - Updates all actions versions - Remove mono containers - Reduce apt installations to only required - Use aws credentials actions instead of unmaintained sync action - Use ghcli for asset uploads instead of unmaintained assets upload action - Breaks apart steps into discrete jobs
There has been a bump in the sign release action version, with a breaking change. This passes through the artifact id, which is now a requirement. #1354
There has been a bump in the sign release action version, with a breaking change. This passes through the artifact id, which is now a requirement. #1354
There has been a bump in the sign release action version, with a breaking change. This passes through the artifact id, which is now a requirement. #1354
The release version is now available for signpath, though there are still a couple of steps to go through, this will ensure signing is working correctly with the release action. KSP-CKAN#1354
And this long standing annoyance can be called done! Thanks for the suggestion @pjf ! |
Right now, releases aren't signed, and users get a "yo, this is a file you downloaded from the internet" message on Windows.
Mono comes with the
signcode
utility which can do this, and while we'll need to create (and possibly pay a CA to sign) a certificate, that shouldn't be insurmountable.We'll still want travis to do the signing and release, but luckily we can encrypt things so that only travis can read them.
The text was updated successfully, but these errors were encountered: