While downloading from GitHub via HTTPS gives a reasonable level of security, I'd still prefer to have the binaries verified against their respective checksum files.
I propose to add a field with a URL to a checksum file together with a checksum of the file itself. Example:
foo_binary:
fetch:
url: https://github.com/...
checksums:
type: sha256 # Hash type used in checksums.txt as well as in `hash` below.
url: https://github.com/foo/bar/releases/.../checksums.txt
hash: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
After downloading an archive for foo_binary, binenv would also download the checksums.txt file, verify its integrity, and then verify the integrity of the archive against the appropriate checksum in checksums.txt.
An alternative would be to include all the hashes in distributions.yaml itself, but I think it'd be way too verbose.
I'm happy to contribute a PR once an agreement is reached on the details.
While downloading from GitHub via HTTPS gives a reasonable level of security, I'd still prefer to have the binaries verified against their respective checksum files.
I propose to add a field with a URL to a checksum file together with a checksum of the file itself. Example:
After downloading an archive for
foo_binary,binenvwould also download thechecksums.txtfile, verify its integrity, and then verify the integrity of the archive against the appropriate checksum inchecksums.txt.An alternative would be to include all the hashes in
distributions.yamlitself, but I think it'd be way too verbose.I'm happy to contribute a PR once an agreement is reached on the details.