Closed apettinen closed 3 years ago
@cdrage
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten
.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten
This is still valid AFAIK, especially now with the M1 chip and macOS 11.
/remove-lifecycle rotten
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten
.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten
Rotten issues close after 30d of inactivity.
Reopen the issue with /reopen
.
Mark the issue as fresh with /remove-lifecycle rotten
.
Send feedback to sig-contributor-experience at kubernetes/community. /close
@k8s-triage-robot: Closing this issue.
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close
@k8s-triage-robot: Closing this issue.
As the maintainer of kompose Autopkg recipes, I would like to add checksum verification to the download recipe, in order to automatically verify the integrity of the download. While parsing and regexing the releases page is technically possible, it is also cumbersome and error prone process. Therefore, I propose to do what e.g. minikube project does, and provide the checksums as Assets alongside the downloadable binaries/archives. This would benefit not only AutoPkg recipies, but other automated download/package managing projects.
Additionally, it would be nice if the binary could be codesigned and notarized. This would benefit/speed up the adoption in more tightly secured environments, and more importantly, would adhere to Apple's new security guidelines, which most likely become standard in future macOS releases. I acknowledge that this might require some changes on your build pipeline in addition to a Apple developer certificate, and thus is not necessarily a trivial task.
I am happy to provide any assistance my feeble skills are good enough for. Thank you in advance.