Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SHA256SUM.md format is messy (not machine friendly) #759

Open
udf2457 opened this issue Apr 23, 2024 · 2 comments
Open

SHA256SUM.md format is messy (not machine friendly) #759

udf2457 opened this issue Apr 23, 2024 · 2 comments

Comments

@udf2457
Copy link

udf2457 commented Apr 23, 2024

Please can you make SHA256SUM.md more machine/script friendly.

At present, for example, it is not possible to use it in scripts with pipefail enabled beause sha256sum -c --ignore-missing --strict SHA256SUM.md returns multiple values for the same file and sha256sum will exit !=0 if any check is !=OK.

This means you have to do a somewhat messy workaround of removing pipefail and doing sha256sum -c --ignore-missing --strict SHA256SUM.md | grep -F OK and checking the exit code from grep.

Maybe (as a minimum) you could start issuing something like SHA256SUM_CURRENT which contains only the data for the current release ? And issue it in machine readable form without markdown etc.

Alternatively, if you want to keep the historical data in one place, maybe don't issue it in markdown format, but json format. Then at least people can parse it with jq to get the data for the release they want.

@ianlewis
Copy link
Member

I'm not sure why we don't just include a checksums file for each release tbh. Would that solve this issue?

Otherwise we could build binaries with the version name included in the binary name and keep a running checksums file but I'm not sure there's a reason to do that.

@udf2457
Copy link
Author

udf2457 commented Aug 6, 2024

@ianlewis I see you're now pulled SHA256SUM entirely, replacing with intoto.jsonl ? Is that your proposed solution to this issue ?

If so, it might be good if you updated the README with updated verification instructions ? https://github.com/slsa-framework/slsa-verifier?tab=readme-ov-file#download-the-binary

Also isn't using intoto.jsonl a chicken & egg because it needs slsa-verifier to verify... which you can't verify ....

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants