commit | 9366cf0bca7dc511c66533c1b733a16d323ce145 | [log] [tgz] |
---|---|---|
author | DRC <information@libjpeg-turbo.org> | Thu Oct 20 01:01:27 2016 -0500 |
committer | DRC <information@libjpeg-turbo.org> | Thu Oct 20 01:13:11 2016 -0500 |
tree | 2c0b7dcbdfe16d8bb238945a88974f29dc6a2d83 | |
parent | 13e6b151b04566271b785bb47268096a6b0c159b [diff] |
Travis: GPG sign Linux binaries/source tarballs Since we're still deploying our Linux/macOS CI artifacts to a web server (specifically SourceForge Project Web Services) that doesn't support HTTPS, it's a good idea to sign them. But since the private key has to be checked into the repository, we use a different key for signing the pre-releases (per project policy, the private signing keys for our release binaries are never made available on any public server.)