Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release process doc #112

Closed
Tracked by #75
laurentsimon opened this issue May 26, 2022 · 1 comment
Closed
Tracked by #75

Release process doc #112

laurentsimon opened this issue May 26, 2022 · 1 comment
Assignees
Labels
type:documentation Improvements or additions to documentation

Comments

@laurentsimon
Copy link
Collaborator

create a doc to explain the release process

@laurentsimon laurentsimon self-assigned this May 26, 2022
@laurentsimon laurentsimon added this to the v1 milestone May 26, 2022
@laurentsimon laurentsimon added the type:documentation Improvements or additions to documentation label May 26, 2022
@laurentsimon
Copy link
Collaborator Author

Done in #115. Closing.

laurentsimon added a commit to slsa-framework/slsa-verifier that referenced this issue Aug 25, 2023
How to LGTM this PR (I'll work on a proper doc for this in
slsa-framework/slsa-github-generator#112):

1.  Clone repo
```
$ git clone git@github.com:slsa-framework/slsa-verifier.git 
$ cd slsa-verifier
$ bash verify-release.sh v2.4.0 # NOTE: use the file in _this_ PR.
# Note down the path to the temporary dir use. The bash script will print its first line as "INFO: using dir: /tmp/tmp.VaYi6HfbmL"
```
2. Run command below and compare to SHA256SUM.md in this PR
```
$sha256sum /tmp/tmp.VaYi6HfbmL/*
```

The output hash should be the hash I'm updating to in this PR. If they
match, LGTM. If they don't, someone tampered with the released binary
and don't LGTM

---------

Signed-off-by: laurentsimon <laurentsimon@google.com>
laurentsimon added a commit to slsa-framework/slsa-verifier that referenced this issue Mar 26, 2024
This sets the expected sha256 of the v2.5.1 slsa-verifier released
binary.

How to LGTM this PR (I'll work on a proper doc for this in
slsa-framework/slsa-github-generator#112):

1. Download the binary and provenance from
https://github.com/slsa-framework/slsa-verifier/releases/tag/v0.0.1
2. Clone the slsa-verifier repo, compile and verify the provenance using
the steps described in
https://github.com/slsa-framework/slsa-verifier/blob/main/RELEASE.md#verify-provenance
```
$ git clone git@github.com:slsa-framework/slsa-verifier.git
$ cd slsa-verifier
$ bash verify-release.sh v2.5.1
```

The output hash should be the hash I'm updating to in this PR. If they
match, LGTM. If they don't, someone tampered with the released binary
and don't LGTM

---------

Signed-off-by: laurentsimon <laurentsimon@google.com>
ramonpetgrave64 pushed a commit to ramonpetgrave64/slsa-verifier that referenced this issue Apr 10, 2024
This sets the expected sha256 of the v2.5.1 slsa-verifier released
binary.

How to LGTM this PR (I'll work on a proper doc for this in
slsa-framework/slsa-github-generator#112):

1. Download the binary and provenance from
https://github.com/slsa-framework/slsa-verifier/releases/tag/v0.0.1
2. Clone the slsa-verifier repo, compile and verify the provenance using
the steps described in
https://github.com/slsa-framework/slsa-verifier/blob/main/RELEASE.md#verify-provenance
```
$ git clone git@github.com:slsa-framework/slsa-verifier.git
$ cd slsa-verifier
$ bash verify-release.sh v2.5.1
```

The output hash should be the hash I'm updating to in this PR. If they
match, LGTM. If they don't, someone tampered with the released binary
and don't LGTM

---------

Signed-off-by: laurentsimon <laurentsimon@google.com>
Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type:documentation Improvements or additions to documentation
Projects
None yet
Development

No branches or pull requests

1 participant