Closed
Bug 710200
Opened 13 years ago
Closed 8 years ago
Signed release deliverables should be verified
Categories
(Release Engineering :: Release Automation: Other, defect, P3)
Release Engineering
Release Automation: Other
Tracking
(Not tracked)
RESOLVED
INCOMPLETE
People
(Reporter: rail, Unassigned)
References
Details
(Whiteboard: [kanban:engops:https://mozilla.kanbanize.com/ctrl_board/6/2154] [releases][automation][signing])
Since we're going to obsolete signing procedure as a separate process, we'll need to implement signing sanity checks for all signed deliverables. This includes internal and external signature checks, integrity checks using checksums (MD5SUMS and SHA1SUMS) files.
Updated•13 years ago
|
OS: Linux → All
Priority: -- → P3
Hardware: x86_64 → All
Comment 1•11 years ago
|
||
Found in triage.
Component: Release Engineering → Release Engineering: Automation (Release Automation)
QA Contact: bhearsum
Assignee | ||
Updated•11 years ago
|
Product: mozilla.org → Release Engineering
Updated•10 years ago
|
Whiteboard: [releases][automation][signing] → [kanban:engops:https://mozilla.kanbanize.com/ctrl_board/6/2144] [releases][automation][signing]
Updated•10 years ago
|
Whiteboard: [kanban:engops:https://mozilla.kanbanize.com/ctrl_board/6/2144] [releases][automation][signing] → [kanban:engops:https://mozilla.kanbanize.com/ctrl_board/6/2153] [releases][automation][signing]
Updated•10 years ago
|
Whiteboard: [kanban:engops:https://mozilla.kanbanize.com/ctrl_board/6/2153] [releases][automation][signing] → [kanban:engops:https://mozilla.kanbanize.com/ctrl_board/6/2154] [releases][automation][signing]
Reporter | ||
Comment 3•8 years ago
|
||
Let's kill this because: * we run update verify tests which rely on signed binaries on Windows (and Mac?) * chain of trust will make everything perfect! :)
Status: NEW → RESOLVED
Closed: 8 years ago
Resolution: --- → INCOMPLETE
You need to log in
before you can comment on or make changes to this bug.
Description
•