[#67346] Future of test suites for Ruby — Charles Oliver Nutter <headius@...>
I'll try to be brief so we can discuss all this. tl;dr: RubySpec is
19 messages
2015/01/05
[#67353] Re: Future of test suites for Ruby
— Tanaka Akira <akr@...>
2015/01/05
2015-01-06 7:18 GMT+09:00 Charles Oliver Nutter <headius@headius.com>:
[#67444] [ruby-trunk - Feature #10718] [Open] IO#close should not raise IOError on closed IO objects. — akr@...
Issue #10718 has been reported by Akira Tanaka.
3 messages
2015/01/09
[#67689] Keyword Arguments — Anthony Crumley <anthony.crumley@...>
Please forgive my ignorance as I am new to MRI development and am still
5 messages
2015/01/20
[#67733] [ruby-trunk - Bug #10761] Marshal.dump 100% slower in 2.2.0 vs 2.1.5 — normalperson@...
Issue #10761 has been updated by Eric Wong.
4 messages
2015/01/21
[#67736] Re: [ruby-trunk - Bug #10761] Marshal.dump 100% slower in 2.2.0 vs 2.1.5
— Eric Wong <normalperson@...>
2015/01/22
normalperson@yhbt.net wrote:
[#67772] Preventing Redundant Email Messages — Jeremy Evans <code@...>
For a long time, I've wondered why I sometimes receive redundant email
5 messages
2015/01/23
[ruby-core:67878] [ruby-trunk - Feature #10793] Infrastructure/Release-Management: Sign releases
From:
naruse@...
Date:
2015-01-29 06:31:51 UTC
List:
ruby-core #67878
Issue #10793 has been updated by Yui NARUSE. As far as I remember we discussed this topic before (but I can't find the ticket/mail). Anyway the conclusion is hash digests for tarballs should be available through https. If people can get hash digest through a trusted way, people can trust the tarball. (though MD5 is not suitable as you say) A release announce has such hash digests through https. You can use this https://www.ruby-lang.org/ja/news/2014/12/25/ruby-2-2-0-released/ ---------------------------------------- Feature #10793: Infrastructure/Release-Management: Sign releases https://bugs.ruby-lang.org/issues/10793#change-51281 * Author: Roland Moriz * Status: Open * Priority: Normal * Assignee: ---------------------------------------- Hi, currently Ruby releases are not cryptographically signed and distributed unencrypted via http. While there are some MD5-hashes on the web-site, it's cumbersome to automate and MD5 is already insecure. This is a huge security risk because currently it just takes a simple HTTP MITM attack to inject a backdoored ruby to downstream projects and end users, like e.g. the official Docker image (see https://github.com/docker-library/ruby/blob/master/2.2/Dockerfile#L12). Please sign the release files with a release/maintainer pgp/gpg key. Other OSS projects already sign their releases, e.g.: - PHP http://php.net/downloads.php - Python https://www.python.org/downloads/release/python-278/ Thank you. -- https://bugs.ruby-lang.org/