Skip to content
This repository was archived by the owner on Mar 15, 2022. It is now read-only.

Conversation

@jon-r-marston
Copy link

Forgive me if I'm being a plonker, but doesn't it make more sense to use the locally stored sha256hash to verify the .zip file?

If the remote file repo has been compromised then it makes sense that the nefarious individual involved might also alter the hash file to match their new version of the file.

If you're only protecting against corrupt downloads, then admittedly, the original method would suffice.

…repo. This should be more resilient to remote file corruption/interference.
@hashicorp-cla
Copy link

hashicorp-cla commented Apr 22, 2020

CLA assistant check
All committers have signed the CLA.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants