You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When downloading files from remote URLs, it would be helpful to have some sort of integrity check to ensure the file wasn't corrupted or tampered with. To start, I'd consider adding a new key, integrity, accepting a hash to specify the algorithm and hex-encoded checksum:
120: gitignore: Correctly match fakemachine binary r=obbardc a=evelikov
Currently we match any file or folder called fakemachine, which means that any changes to files in b/cmd/fakemachine/ have to be forced via "git add --force"
Signed-off-by: Emil Velikov <[email protected]>
Co-authored-by: Emil Velikov <[email protected]>
When downloading files from remote URLs, it would be helpful to have some sort of integrity check to ensure the file wasn't corrupted or tampered with. To start, I'd consider adding a new key,
integrity
, accepting ahash
to specify the algorithm and hex-encoded checksum:My reasoning for the nested struct/table is that it leaves this open for extension later, possibly adding support for GPG signatures.
The text was updated successfully, but these errors were encountered: