[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
204/285: doc: Mention "make authenticate".
From: |
guix-commits |
Subject: |
204/285: doc: Mention "make authenticate". |
Date: |
Sun, 29 Dec 2019 20:44:30 -0500 (EST) |
kkebreau pushed a commit to branch wip-gnome3.34
in repository guix.
commit aaa8da866c5afb6763f82dd6346cfd72df6662c8
Author: Ludovic Courtès <address@hidden>
Date: Fri Dec 27 13:52:05 2019 +0100
doc: Mention "make authenticate".
* doc/contributing.texi (Building from Git): Add instructions to run
'git verify-commit' and 'make authenticate'.
---
doc/contributing.texi | 42 ++++++++++++++++++++++++++++++++++++++++++
1 file changed, 42 insertions(+)
diff --git a/doc/contributing.texi b/doc/contributing.texi
index 3c13005..e656676 100644
--- a/doc/contributing.texi
+++ b/doc/contributing.texi
@@ -38,6 +38,48 @@ version from the Git repository:
git clone https://git.savannah.gnu.org/git/guix.git
@end example
+@cindex authentication, of a Guix checkout
+How do you ensure that you obtained a genuine copy of the repository?
+Guix itself provides a tool to @dfn{authenticate} your checkout, but you
+must first make sure this tool is genuine in order to ``bootstrap'' the
+trust chain. To do that, run:
+
+@c XXX: Adjust instructions when there's a known tag to start from.
+@example
+git verify-commit `git log --format=%H build-aux/git-authenticate.scm`
+@end example
+
+The output must look something like:
+
+@example
+gpg: Signature made Fri 27 Dec 2019 01:27:41 PM CET
+gpg: using RSA key 3CE464558A84FDC69DB40CFB090B11993D9AEBB5
+@dots{}
+gpg: Signature made Fri 27 Dec 2019 01:25:22 PM CET
+gpg: using RSA key 3CE464558A84FDC69DB40CFB090B11993D9AEBB5
+@dots{}
+@end example
+
+@noindent
+... meaning that changes to this file are all signed with key
+@code{3CE464558A84FDC69DB40CFB090B11993D9AEBB5} (you may need to fetch
+this key from a key server, if you have not done it yet).
+
+From there on, you can authenticate all the commits included in your
+checkout by running:
+
+@example
+make authenticate
+@end example
+
+The first run takes a couple of minutes, but subsequent runs are faster.
+
+@quotation Note
+You are advised to run @command{make authenticate} after every
+@command{git pull} invocation. This ensures you keep receiving valid
+changes to the repository
+@end quotation
+
The easiest way to set up a development environment for Guix is, of
course, by using Guix! The following command starts a new shell where
all the dependencies and appropriate environment variables are set up to
- 178/285: gnu: gdal: Enable GPKG format driver., (continued)
- 178/285: gnu: gdal: Enable GPKG format driver., guix-commits, 2019/12/29
- 173/285: gnu: libgeotiff: Update to 1.5.1., guix-commits, 2019/12/29
- 185/285: gnu: Add dragon., guix-commits, 2019/12/29
- 188/285: gnu: Add libkcddb., guix-commits, 2019/12/29
- 194/285: gnu: Add kamoso., guix-commits, 2019/12/29
- 197/285: gnu: Add ffmpegthumbs., guix-commits, 2019/12/29
- 195/285: gnu: Add libkcompactdisc., guix-commits, 2019/12/29
- 196/285: gnu: Add audiocd-kio., guix-commits, 2019/12/29
- 199/285: gnu: emacs-org: Update to 9.3.1., guix-commits, 2019/12/29
- 201/285: Add 'build-aux/git-authenticate.scm'., guix-commits, 2019/12/29
- 204/285: doc: Mention "make authenticate".,
guix-commits <=
- 206/285: gnu: r-shortread: Update to 1.44.1., guix-commits, 2019/12/29
- 207/285: gnu: r-biocparallel: Update to 1.20.1., guix-commits, 2019/12/29
- 209/285: gnu: r-summarizedexperiment: Update to 1.16.1., guix-commits, 2019/12/29
- 214/285: gnu: r-bigmemory: Update to 4.5.36., guix-commits, 2019/12/29
- 215/285: gnu: r-robust: Update to 0.4-18.2., guix-commits, 2019/12/29
- 218/285: gnu: r-biocsingular: Update to 1.2.1., guix-commits, 2019/12/29
- 219/285: gnu: r-enrichplot: Update to 1.6.1., guix-commits, 2019/12/29
- 220/285: gnu: r-clusterprofiler: Update to 3.14.2., guix-commits, 2019/12/29
- 210/285: gnu: r-topgo: Update to 2.38.1., guix-commits, 2019/12/29
- 217/285: gnu: r-affycoretools: Update to 1.58.3., guix-commits, 2019/12/29