Skip to content

feat: verify release checksum and cosign signature#550

Merged
caarlos0 merged 2 commits intomasterfrom
checksums-sign
Apr 18, 2026
Merged

feat: verify release checksum and cosign signature#550
caarlos0 merged 2 commits intomasterfrom
checksums-sign

Conversation

@caarlos0
Copy link
Copy Markdown
Member

Download checksums.txt for the release and verify the SHA-256 of the
downloaded archive against it. When cosign is available in PATH, also
download checksums.txt.sigstore.json and verify the signature against
the goreleaser/goreleaser-pro release workflow identity. Both steps
degrade gracefully (with a warning) when the corresponding artifacts
or tooling are missing.

Co-authored-by: Copilot 223556219+Copilot@users.noreply.github.com

Download checksums.txt for the release and verify the SHA-256 of the
downloaded archive against it. When cosign is available in PATH, also
download checksums.txt.sigstore.json and verify the signature against
the goreleaser/goreleaser-pro release workflow identity. Both steps
degrade gracefully (with a warning) when the corresponding artifacts
or tooling are missing.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@caarlos0 caarlos0 requested a review from crazy-max as a code owner April 18, 2026 12:14
Drop the http-client download helper from verifyChecksum integration
tests; call goreleaser.install() instead so the test exercises the
public API path and avoids duplicating download logic.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@caarlos0 caarlos0 merged commit 4b462d3 into master Apr 18, 2026
45 checks passed
@caarlos0 caarlos0 deleted the checksums-sign branch April 18, 2026 17:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant