Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

actions: download: Add support for integrity checks #120

Open
ivy opened this issue Oct 7, 2018 · 0 comments
Open

actions: download: Add support for integrity checks #120

ivy opened this issue Oct 7, 2018 · 0 comments

Comments

@ivy
Copy link

ivy commented Oct 7, 2018

When downloading files from remote URLs, it would be helpful to have some sort of integrity check to ensure the file wasn't corrupted or tampered with. To start, I'd consider adding a new key, integrity, accepting a hash to specify the algorithm and hex-encoded checksum:

- action: download
  url: http://example.domain/path/filename.ext
  name: firmware
  integrity: 
    hash: sha256-5ecf8d2cc410094e8b82dd0bc178a57f3aa1e80916689beb00fe56148b1b1256

My reasoning for the nested struct/table is that it leaves this open for extension later, possibly adding support for GPG signatures.

refi64 pushed a commit to refi64/debos that referenced this issue Jan 24, 2023
120: gitignore: Correctly match fakemachine binary r=obbardc a=evelikov

Currently we match any file or folder called fakemachine, which means that any changes to files in b/cmd/fakemachine/ have to be forced via "git add --force"

Signed-off-by: Emil Velikov <[email protected]>

Co-authored-by: Emil Velikov <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant