1.1.8 - Corepack #664
Replies: 8 comments 20 replies
-
Hey, a heads-up/question. I get this after downloading the nvm-update.zip , is it normal? (sorry if this isn't the adequate place for this comment) |
Beta Was this translation helpful? Give feedback.
-
our endpoint security actually quarantined the nvm.exe file. you really need to scan for virus. the maintenance release before this one passes the scan |
Beta Was this translation helpful? Give feedback.
-
Folks - yes, the antivirus tools may mark unrecognized executables as a virus. This happened with the initial 1.1.7 release as well. Notice how most of the threats are labeled with "ML" or "!ml" - that stands for machine learning with most antivirus providers. In other words, the antivirus suites are guessing... these are not signature threats. A signature threat is one which has been confirmed (i.e. the signature of the executable has been explicitly identified as containing a virus). The antivirus suites often use ML patterns on "untrusted" executables. An untrusted executable is one which is not code-signed. Apps signed with basic code signing certificates are trusted by Windows after enough people install the app. Apps signed with an extended validation certificate are immediately trusted by Windows. This version of NVM4W is not code-signed at all, because my last certificate expired in 2020. The extended validation certificates cost around $1000, which is more than the lifetime earnings of this project. So, unless someone wants to cover that cost, I have no plans to code sign this release (as noted in the release notes). The best way to help is to register a "false threat" with your antivirus provider. I cannot test all the different antivirus software. Most antivirus software will let you make an exception for apps, so I recommend doing that if you run into quarantines/deletions. |
Beta Was this translation helpful? Give feedback.
-
Can anyone confirm the checksum for nvm-update.zip? The accompanying text file states that it should be Name: nvm-update.zip
Size: 3420632 bytes (3340 KiB)
CRC32: FBC0BCF6
CRC64: 078BFD3D4C73E774
SHA256: 749AF837AD391858D39FA5FD0DFCF40D7F347CA2D233C70ED8871A6EBA081283
SHA1: BBC90F60EEE0D87AD580B622C210F68541447B1C
BLAKE2sp: 231AB60EACFEE0F3B1FFE378B092EC5D5B1889785B39C530AE1EDC9AC4E0E032 Or has it been calculated using some other algorithm perhaps? |
Beta Was this translation helpful? Give feedback.
-
The Linux Foundation has announced a project for producing free code-signing certificates. It is still in beta, but will be available in the near future. https://www.sigstore.dev/ |
Beta Was this translation helpful? Give feedback.
-
I've got a work-around. Just download and install the previous release - 1.1.7. Then download the 1.1.8 zip version. Unzip and copy the nvm.exe to <nvm 1.1.7 home dir> and overwrite the old one ;-) |
Beta Was this translation helpful? Give feedback.
-
NVM for Windows v1.1.8 Notes
Truth be told, I did not want to release this version right now. I am working on the successor project rt. v1.1.7 was supposed to be the last version before the rt release. However, notable changes in the Node ecosystem warrant a new version now.
Node Corepack
In September 2021, Node.js v16.9.0 introduced corepack. This experimental new feature allows transparent use of npm, pnpm, or yarn. To support this feature, NVM4W must download and process a different distribution file than it has used previously.
As a result, NVM for Windows 1.1.8 is being released to support corepack.
How to Upgrade
All files can be found on the release page.
If you do not have NVM for Windows installed
Use the instructions in the README.
If you already have an older version of NVM for Windows installed
Download nvm-update.zip and extract it. You will find a file called nvm-update.exe. Double click to run it. This will prompt for the version you wish to upgrade to (pre-populated w/ 1.1.8).
nvm-update.exe can also be run from the command line using the
/S
flag to suppress the prompt. To do this, runnvm-update.exe 1.1.8 /S
.What's New
Several long-requested features/fixes have been merged since v1.1.7. I did not get to test all of them as extensively as I wanted to, but I believe they are stable. These features include:
nvm install latest
- installs the latest patch version of Node (instead of latest minor).nvm install lts
- installs the latest LTS patch version (new).nvm use latest
,nvm use lts
, andnvm use newest
(new) now supported.nvm current
(new) displays the active version.Numerous edge case fixes have been applied as well.
What didn't make it in?
WARNING
Version 1.1.8 is not code signed. Code-signed applications are trusted by Windows and will install easily. Users are prompted with a screen like this one:
Non-code-signed applications can usually be installed, but they will throw a warning like this:
Why?
I paid for the last code signing certificates out of pocket, but they've expired. Sponsorships, to date, haven't even come close to covering the cost of a new code signing certificate (let alone the last one).
Who will this affect?
This won't affect most users, but enterprise users and those distributing NVM4W in corporate environments may run into problems.
If your organization is impacted by this, I will accept sponsorship money to expedite the delivery of a code-signed version. The required EV certificate is about $1000. Please direct message me on Twitter @goldglovecb if you'd like to help cover this cost.
This discussion was created from the release 1.1.8 - Corepack.
Beta Was this translation helpful? Give feedback.
All reactions