You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 8, 2021. It is now read-only.
Hi @dgouldin do you have any ideas how this usually works with rpms? I assume some kind of md5 hash is stored in a separate file but there is likely a standard that we can reuse for rpms?
I know RPMs do have a verification process, but I'm not sure what the internals look like. Just publishing an md5 hash on the release page or in a file in the same s3 bucket is probably good enough. This is basically what pypi does for python packages (example: https://pypi.python.org/pypi/cryptography/2.1.4 ). If you want to go the extra mile, the way the node.js community signs their shasum files is pretty nice (example: https://nodejs.org/dist/latest/SHASUMS256.txt.asc )
@ldormoy I believe we have two kinds of checksums here. the stackoverflow discussion is about the checksum of the "source file" that is downloaded when the RPM is created. In our case, we download the zipped repo from GitHub.
Can you publish checksums along with your RPM releases? I'd like some way to validate that the RPM I've downloaded is legitimate.
The text was updated successfully, but these errors were encountered: