Releases: omnibor/omnibor-rs
omnibor-v0.10.0
chore: bump omnibor to v0.10.0 Signed-off-by: Andrew Lilley Brinker <alilleybrinker@gmail.com>
omnibor-cli-v0.9.3
Install omnibor-cli 0.9.3
Install prebuilt binaries via shell script
curl --proto '=https' --tlsv1.2 -LsSf https://github.com/omnibor/omnibor-rs/releases/download/omnibor-cli-v0.9.3/omnibor-cli-installer.sh | sh
Install prebuilt binaries via powershell script
powershell -ExecutionPolicy Bypass -c "irm https://github.com/omnibor/omnibor-rs/releases/download/omnibor-cli-v0.9.3/omnibor-cli-installer.ps1 | iex"
Download omnibor-cli 0.9.3
File | Platform | Checksum |
---|---|---|
omnibor-cli-aarch64-apple-darwin.tar.xz | Apple Silicon macOS | checksum |
omnibor-cli-x86_64-apple-darwin.tar.xz | Intel macOS | checksum |
omnibor-cli-x86_64-pc-windows-msvc.zip | x64 Windows | checksum |
omnibor-cli-aarch64-unknown-linux-gnu.tar.xz | ARM64 Linux | checksum |
omnibor-cli-x86_64-unknown-linux-gnu.tar.xz | x64 Linux | checksum |
omnibor-cli-x86_64-unknown-linux-musl.tar.xz | x64 MUSL Linux | checksum |
Verifying GitHub Artifact Attestations
The artifacts in this release have attestations generated with GitHub Artifact Attestations. These can be verified by using the GitHub CLI:
gh attestation verify <file-path of downloaded artifact> --repo omnibor/omnibor-rs
You can also download the attestation from GitHub and verify against that directly:
gh attestation verify <file-path of downloaded artifact> --bundle <file-path of downloaded attestation>
omnibor-v0.9.0
chore: Release omnibor version 0.9.0
omnibor-v0.8.0
chore: Release omnibor version 0.8.0
omnibor-cli-v0.8.0
Install omnibor-cli 0.8.0
Install prebuilt binaries via shell script
curl --proto '=https' --tlsv1.2 -LsSf https://github.com/omnibor/omnibor-rs/releases/download/omnibor-cli-v0.8.0/omnibor-cli-installer.sh | sh
Install prebuilt binaries via powershell script
powershell -ExecutionPolicy ByPass -c "irm https://github.com/omnibor/omnibor-rs/releases/download/omnibor-cli-v0.8.0/omnibor-cli-installer.ps1 | iex"
Download omnibor-cli 0.8.0
File | Platform | Checksum |
---|---|---|
omnibor-cli-aarch64-apple-darwin.tar.xz | Apple Silicon macOS | checksum |
omnibor-cli-x86_64-apple-darwin.tar.xz | Intel macOS | checksum |
omnibor-cli-x86_64-pc-windows-msvc.zip | x64 Windows | checksum |
omnibor-cli-x86_64-unknown-linux-gnu.tar.xz | x64 Linux | checksum |
omnibor-cli-x86_64-unknown-linux-musl.tar.xz | x64 MUSL Linux | checksum |
Verifying GitHub Artifact Attestations
The artifacts in this release have attestations generated with GitHub Artifact Attestations. These can be verified by using the GitHub CLI:
gh attestation verify <file-path of downloaded artifact> --repo omnibor/omnibor-rs
You can also download the attestation from GitHub and verify against that directly:
gh attestation verify <file-path of downloaded artifact> --bundle <file-path of downloaded attestation>
omnibor-v0.7.0
chore: Release omnibor version 0.7.0
gitoid-0.9.0 - 2025-01-29
omnibor-v0.6.0
Version 0.6.0
of omnibor
brings a lot of improvements! A quick summary:
- We now produce a Rust library, C static library, and C dynamic library, to
enable linking with theomnibor
crate and using it through the Foreign
Function Interface (FFI). - The
ArtifactId
type now has a notion of a "safe name," which is a version
of the string representation of anArtifactId
which we expect to be safe
to set as a file name. There are times when you may want to do this, and it's
good and useful to have a defined way of representing this. - Moved the previously-available binary crate under the
omnibor
package out
to its ownomnibor-cli
crate. This simplifies a lot of things for us in
terms of handling releases, and hopefully makes using and interacting with
the crates simpler too. - Added support for
InputManifest
, including building them, and storing them
on disk! This was a big lift, and means we now cover a much larger chunk of
the OmniBOR specification.
We have not yet implemented embedding mode for manifests, meaning when they're
created, the target artifact is not updated to reflect the manifest's ID. The
code is built to support adding this in the future, and we've left todo
s
in the code for anyone interested in contributing!
omnibor-cli-v0.7.0
Install omnibor-cli 0.7.0
Install prebuilt binaries via shell script
curl --proto '=https' --tlsv1.2 -LsSf https://github.com/omnibor/omnibor-rs/releases/download/omnibor-cli-v0.7.0/omnibor-cli-installer.sh | sh
Install prebuilt binaries via powershell script
powershell -ExecutionPolicy ByPass -c "irm https://github.com/omnibor/omnibor-rs/releases/download/omnibor-cli-v0.7.0/omnibor-cli-installer.ps1 | iex"
Download omnibor-cli 0.7.0
File | Platform | Checksum |
---|---|---|
omnibor-cli-aarch64-apple-darwin.tar.xz | Apple Silicon macOS | checksum |
omnibor-cli-x86_64-apple-darwin.tar.xz | Intel macOS | checksum |
omnibor-cli-x86_64-pc-windows-msvc.zip | x64 Windows | checksum |
omnibor-cli-x86_64-unknown-linux-gnu.tar.xz | x64 Linux | checksum |
omnibor-cli-x86_64-unknown-linux-musl.tar.xz | x64 MUSL Linux | checksum |
Verifying GitHub Artifact Attestations
The artifacts in this release have attestations generated with GitHub Artifact Attestations. These can be verified by using the GitHub CLI:
gh attestation verify <file-path of downloaded artifact> --repo omnibor/omnibor-rs
You can also download the attestation from GitHub and verify against that directly:
gh attestation verify <file-path of downloaded artifact> --bundle <file-path of downloaded attestation>
gitoid-v0.8.0 - 2024-09-26
Release Notes
The big news in gitoid@0.8.0
is that we've added support for swapping out the
cryptography-provider backend, and now support three options:
rustcrypto
boringssl
openssl
All of these can be controlled via features on the crate. You do have to pick
at least one of them, but you can pick more than one if you want and then
decide which to use at runtime.
We also added some benchmarks to enable comparing them.
Huge thank you to @fkautz for the work on this!