You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/components/utils/testnetsContent.ts
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ export default {
135
135
checksum_instructions:
136
136
'## Linux checksum verification instructions\n\n### Installer integrity\n\nVerify the sha256 hash:\n\n```shell\nsha256sum ~/Downloads/{{ filename }}\n```\n\nExpected:\n\n```shell\n{{ sha256 }}\n```\n',
137
137
signature_instructions:
138
-
'## Linux PGP signature verification instructions\n\n- Obtain both the Daedalus installer .bin file, and its corresponding .bin.asc signature file -- put them in the same directory.\n- Ensure that the gpg2 command is available (assuming Ubuntu Linux) in your shell, and if not -- execute the following shell command (shell commands further indicated by this bold monospace font):\n - `apt-get install gnupg2`\n- Unless you already have a personal GPG key, create one (this is required for step 5):\n - `gpg2 --generate-key`\n - Supply an user ID (real name and email) that suit you personally\n - Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use this key and GNUPG in future)\n- Import the IOHK key:\n - `gpg2 --keyserver hkp://keys.openpgp.org --search-keys [email protected]`\n - In the selection dialogue, choose the key with fingerprint 807F2ACD0171BC90\n- Sign the IOHK key (this designates trust and is required for the next step):\n - `gpg2 --lsign 31B3F22FA0CCE2E8382C04A2807F2ACD0171BC90`\n- Verify the installer binary using the .asc signature (the .asc signature file must reside in the same directory as the installer binary):\n - `gpg2 --verify {{ filename }}.asc`\n - Successful verification should produce a message like follows:\n\n```shell\ngpg: assuming signed data in {{ filename }}.pkggpg: Signature made ...DATE...gpg: using RSA key CD1F21F62477EB42D7C4F3DEB3AD9541F4DBD0FEgpg: checking the trustdbgpg: marginals needed: 3 completes needed: 1 trust model: pgpgpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1ugpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0ugpg: next trustdb check due at ...DATE...gpg: Good signature from IOHK Signing Authority <[email protected]>\n```\n',
138
+
'## Linux PGP signature verification instructions\n\n- Obtain both the Daedalus installer .bin file, and its corresponding .bin.asc signature file -- put them in the same directory.\n- Ensure that the gpg2 command is available (assuming Ubuntu Linux) in your shell, and if not -- execute the following shell command (shell commands further indicated by this bold monospace font):\n - `apt-get install gnupg2`\n- Unless you already have a personal GPG key, create one (this is required for step 5):\n - `gpg2 --generate-key`\n - Supply an user ID (real name and email) that suit you personally\n - Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use this key and GNUPG in future)\n- Import the IOHK key:\n - `gpg2 --keyserver hkp://keys.openpgp.org --search-keys [email protected]`\n - In the selection dialogue, choose the key with fingerprint 807F2ACD0171BC90\n- Sign the IOHK key (this designates trust and is required for the next step):\n - `gpg2 --lsign 31B3F22FA0CCE2E8382C04A2807F2ACD0171BC90`\n- Verify the installer binary using the .asc signature (the .asc signature file must reside in the same directory as the installer binary):\n - `gpg2 --verify {{ filename }}.asc`\n - Successful verification should produce a message like follows:\n\n```shell\ngpg: assuming signed data in {{ filename }}.pkg\ngpg: Signature made ...DATE...\ngpg: using RSA key CD1F21F62477EB42D7C4F3DEB3AD9541F4DBD0FE\ngpg: checking the trustdb\ngpg: marginals needed: 3 completes needed: 1 trust model: pgp\ngpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u\ngpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u\ngpg: next trustdb check due at ...DATE...\ngpg: Good signature from IOHK Signing Authority <[email protected]>\n```\n',
0 commit comments