aboutsummaryrefslogtreecommitdiff
path: root/tests/signing.sh
AgeCommit message (Collapse)Author
2022-09-22Dodge "trusted" vs "trustworthy" by being explicit John Ericson
Hopefully this is best!
2022-09-22"valid signature" -> "trustworthy signature"John Ericson
I just had a colleague get confused by the previous phrase for good reason. "valid" sounds like an *objective* criterion, e.g. and *invalid signature* would be one that would be trusted by no one, e.g. because it misformatted or something. What is actually going is that there might be a signature which is perfectly valid to *someone else*, but not to the user, because they don't trust the corresponding public key. This is a *subjective* criterion, because it depends on the arbitrary and personal choice of which public keys to trust. I therefore think "trustworthy" is a better adjective to use. Whether something is worthy of trust is clearly subjective, and then "trust" within that word nicely evokes `trusted-public-keys` and friends.
2021-01-13Rename 'nix store sign-paths' to 'nix store sign'Eelco Dolstra
2020-12-03Move most store-related commands to 'nix store'Eelco Dolstra
2018-09-25Add a test for signed content-addressed pathsWill Fancher
2017-12-07Fix testEelco Dolstra
2017-11-20Add tests for verifying/copying content-addressed pathsEelco Dolstra
These don't require signatures.
2017-11-20Add tests for signature checking when copying between local storesEelco Dolstra
2017-11-20binary-cache-public-keys -> trusted-public-keysEelco Dolstra
The name had become a misnomer since it's not only for substitution from binary caches, but when adding/copying any (non-content-addressed) path to a store.
2017-11-14nix sign-paths: Support binary cachesEelco Dolstra
2017-11-14Add tests for "nix verify", "nix sign-paths" etc.Eelco Dolstra