Commit Graph

5 Commits

Author SHA1 Message Date
Jeremy Attali
91985c7994 fix(release): properly check sha256 remote content
We need to verify the sources from github match our local content.
We do this by building our own version of the git release (using `git
archive`) and checking the SHA-256 checksums against the local and
remote.

After that it's safe to sign the remote `tar.gz` and upload the
signature file to the release.

One caveat is that if Github upates their git release commmand, this
script will break. We'll worry about it when that happens.

This drops support for `zip` signature. I wish there was a way to
prevent the zip source code when doing a new release.

Closes #90
2021-02-20 16:25:21 -05:00
Jeremy Attali
439a3f5ddc chore(script): add sign-post-release helper script 2021-02-17 21:24:40 -05:00
Jeremy Attali
2878474e7c
chore(release): add bump meson script (#39)
Mixing C code with Javascript files, what's not to love.

Simply run the following line to generate a new standard version:

```
npx standard-version --sign
```
2020-06-22 23:03:37 -04:00
Jeremy Attali
7e8b2a4641 revert:"chore(ci): run clang format during build"
This reverts commit c8f1bb89b8.
2020-01-01 14:56:26 -05:00
Jeremy Attali
c8f1bb89b8 chore(ci): run clang format during build 2019-12-31 02:05:39 -05:00