-
-
Notifications
You must be signed in to change notification settings - Fork 3.1k
"ipfs update check" showing no updates on version 0.2.1 #837
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Yeah sorry ipfs update broke. We need to fix it. I want to start using ipfs itself for updates. This along with prebuilt (signed) packages will make it way easier to install and stay up to date. If anyone is interested in helping tackle this, reply here — On Fri, Feb 27, 2015 at 12:36 PM, headbite [email protected]
|
Please tell me more what you're talking about signed packages. What kind of package, what kind of signature? |
@Luzifer thinking of deploying the binaries, kind of what gets built with your cool tool, with ipfs itself to ipfs clients. Ideally the sig would be in a merkledag node itself (the signature datastructure isn't there yet), but mabe we could do with a sig file in the same dir for now? |
Yeah, I made some modifications especially to the upload process which should allow to add IPFS upload with only a bit of work. This is on my list right after the implementation of build-indicators (for people to see when the build is started)… The zip files currently are in fact hashed so their integrity should be verifiable by now. (I only don't display the hash somewhere but that's a no-brainer) |
Yep. I'd love to get to the point where users could verify that the update matches a particular git hash (not trivial unless they compile themselves and compilation is deterministic), and that it was signed by a private key the core dev team controls. There's lots of work done in this area already. Let's just do whatever makes the most sense for us. |
You can… The build process is done by an open source image so you can review the image is not changing anything. Also you could tag versions (my build system is using tags to keep older versions) with signed tags (
And http://gobuild.luzifer.io/github.com/Luzifer/gobuilder?branch=v1.4.0 Maybe I can build in verifying the tag into the gobuilder and display it as a verified build if it is signed by someone… |
Yep, signed git tags may be the easiest way to go for now.
Sounds like a good plan. Still, we dont have a good way to verify this builder (or any other) hasn't been compromised (without running the compilation separately in a "trusted compiler"). (cue lamport) |
Hmm thats hard. The image is built by automatic build system of hub.docker.com from latest GitHub code… You could review that… But still there is no guarantee it hasn't been modified in between… I don't have any idea how to verify the build system… It's using the official |
ipfs update is much cooler now. i will close this issue |
On version 0.2.1 "ipfs update check" responds with "Error: No update available". As of today 0.2.3 is the latest version. I've since manually updated using the go get method.
The text was updated successfully, but these errors were encountered: