You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ RUN curl https://.. | preflight run <digest>
53
53
54
54
If you want to just get started quickly on your workstation, you can [download a release](https://github.com/spectralops/preflight/releases) or install `preflight` with homebrew:
55
55
56
-
```
56
+
```bash
57
57
$ brew tap spectralops/tap && brew install preflight
When updating an old binary or script to a new updated version, there will be at least two (2) valid digests "live" and just replacing the single digest used will fail for the older runnable which may still be running somewhere.
To support updates and rolling/auto updates of scripts and binaries we basically need to validate against `<old hash>` + `<new hash>` at all times, until everyone upgrades to the new script. Preflight validates against a `list of hashes` or better, give it a _live_ URL of `valid hashes` and it will validate against it.
216
216
217
217
218
-
```
218
+
```bash
219
219
curl .. | ./ci/preflight run sha256=d6aa3207c4908d123bd8af62ec0538e3f2b9f257c3de62fad4e29cd3b59b41d9,sha256=<new hash>,...
220
220
```
221
221
222
222
Or to a live URL:
223
-
```
223
+
```bash
224
224
curl .. | ./ci/preflight run https://dl.example.com/hashes.txt
225
225
```
226
226
@@ -306,7 +306,7 @@ With this configured `preflight` will search for all digest types in this file b
306
306
307
307
Here is a full example for your CI, combining `preflight` with Malshare:
308
308
309
-
```
309
+
```yaml
310
310
env:
311
311
PF_FILE_LOOKUP: malshare.current.sha256.txt
312
312
@@ -317,7 +317,7 @@ steps:
317
317
318
318
**Result:**
319
319
320
-
```
320
+
```bash
321
321
$ PF_FILE_LOOKUP=malshare.current.sha256.txt preflight run fe6d02cf15642ff8d5f61cad6d636a62fd46a5e5a49c06733fece838f5fa9d85 test.sh
322
322
⌛️ Preflight starting using file lookup: malshare.current.sha256.txt
323
323
❌ Preflight failed: Digest matches but marked as vulnerable.
@@ -340,7 +340,7 @@ With this configured `preflight` will automatically create the VirusTotal lookup
340
340
341
341
Here is a full example for your CI, combining `preflight` with VirusTotal:
0 commit comments