Skip to content
This repository has been archived by the owner on Dec 6, 2023. It is now read-only.
/ gitian.sigs Public archive

Gitian signatures and assertions for Dash

Notifications You must be signed in to change notification settings

dashpay/gitian.sigs

Repository files navigation

gitian.sigs

DEPRECATED: We no longer use Gitian to produce deterministic binaries; we use Guix instead. You can find corresponding signatures in the guix.sigs repository.

This repository is for deterministic build results for Dash releases.

See the release process in the Dash repository for how to deterministically build binaries and then pgp-sign them.

Instructions for setting up a virtual machine in which you can gitian build as well as public keys of developers and active contributors can also be found there.

You can verify PGP signatures produced by a specific author (e.g. with a nickname some_food) for a specific version (e.g. 0.9.9.9) via a simple bash script like this:

export VERSION=0.9.9.9 && export PR_AUTHOR=some_food \
  && gpg --status-fd 1 --verify-files $VERSION-{osx-*,win-*,linux}/$PR_AUTHOR/*.sig 2>/dev/null | grep -e GOODSIG \
  && gpg --status-fd 1 --verify-files $VERSION-{osx-*,win-*,linux}/$PR_AUTHOR/*.sig 2>/dev/null | grep -e BADSIG -B4 | grep -e BADSIG -e FILE_START

This should produce a few lines like

[GNUPG:] GOODSIG 9999999999999999 some_food <some_food@some_plate.org>

or something like

[GNUPG:] FILE_START 1 0.9.9.9-win-signed/some_food/dash-win-signer-build.assert.sig
[GNUPG:] BADSIG 9999999999999999 some_food <some_food@some_plate.org>

if there is a bad signature.

About

Gitian signatures and assertions for Dash

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages