Skip to content

Commit ef39339

Browse files
committed
filip(chore): update gpg daedalus wallet values for cardano testnet
1 parent b6f8dcd commit ef39339

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

src/components/utils/testnetsContent.ts

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -119,23 +119,23 @@ export default {
119119
checksum_instructions:
120120
'## Windows checksum verification instructions\n\n### Installer integrity\n\nSHA256 checksum can be verified using the following command:\n\n```shell\ncertutil -hashfile C:\\Users\\YOUR_USERNAME\\Downloads\\{{ filename }} SHA256\n```\n\nInstead of typing the path to the Daedalus installer executable use drag and drop:\n\n1. Press Windows Start Menu\n1. Type cmd\n1. You should see cmd.exe in the list of results. Click on cmd.exe to launch it.\n1. Type or paste: certutil -hashfile\n1. Press space\n1. Drag and drop Daedalus installer from Explorer to Command Prompt\n1. Press space\n1. Type or paste: SHA256\n1. Press enter key\n\nYou should see the following output, where string on the second line is the SHA256 checksum:\n\n```shell\nSHA256 hash of file C:\\Users\\YOUR_USERNAME\\Downloads\\{{ filename }}:\n\n{{ sha256 }}\n\nCertUtil: -hashfile command completed successfully.\n```\n',
121121
signature_instructions:
122-
"## Windows PGP signature verification instructions\n\n1. Obtain both the Daedalus installer .exe file, and its corresponding .exe.asc signature file -- put them in the same directory.\n1. Obtain the GNUPG package from [https://www.gpg4win.org/](https://www.gpg4win.org/)\n1. Proceed with installation and launch the Kleopatra component.\n1. Unless you already have a personal GPG key, you will have to create one (which is required for step 6):\n - Select the menu item File -> New keypair -> Create a personal OpenPGP key pair.\n - Enter a name and an email address that suit you personally.\n - Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use GNUPG in future).\n1. Import the IOHK key:\n - File -> Lookup on Server\n - Allow network access to 'dirmngr', if the prompt arises\n - Search for signing.authority@iohk.io\n - Import the key\n - Do not certify the key just yet\n - Right-click on the key, and choose \"Details\"\n - Ensure that the fingerprint is D32587D4090FE461CAEE0FF4966E5CB9CBFAA9BA\n - If it's not, the wrong key was imported, right click and delete\n - If it is, we are good to go\n1. Certify the IOHK key (this designates trust and is required for the next step):\n - Once you have a personal GPG key, right-click on the imported IOHK key and choose Certify\n - Enable the IOHK user ID\n - Tick the I have verified the fingerprint checkbox (since you did, as per step 5), and proceed.\n - You should receive a message saying Certification successful\n1. Verify the installer binary:\n - Click the Decrypt/Verify button on the Kleopatra toolbar\n - Choose the Daedalus installer .exe file in the file dialog (the .asc signature file must reside in the same directory)\n1. If the verification is successful, you will receive a green-tinted message box saying:\n - Valid signature by signing.authority@iohk.io\n - Date of signature\n - With certificate D325 87D4 090F E461 CAEE 0FF4 966E 5CB9 CBFA A9BA\n - Anything else would constitute a signature verification failure.\n",
122+
"## Windows PGP signature verification instructions\n\n1. Obtain both the Daedalus installer .exe file, and its corresponding .exe.asc signature file -- put them in the same directory.\n1. Obtain the GNUPG package from [https://www.gpg4win.org/](https://www.gpg4win.org/)\n1. Proceed with installation and launch the Kleopatra component.\n1. Unless you already have a personal GPG key, you will have to create one (which is required for step 6):\n - Select the menu item File -> New keypair -> Create a personal OpenPGP key pair.\n - Enter a name and an email address that suit you personally.\n - Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use GNUPG in future).\n1. Import the IOHK key:\n - File -> Lookup on Server\n - Allow network access to 'dirmngr', if the prompt arises\n - Search for signing.authority@iohk.io\n - Import the key\n - Do not certify the key just yet\n - Right-click on the key, and choose \"Details\"\n - Ensure that the fingerprint is 31B3F22FA0CCE2E8382C04A2807F2ACD0171BC90\n - If it's not, the wrong key was imported, right click and delete\n - If it is, we are good to go\n1. Certify the IOHK key (this designates trust and is required for the next step):\n - Once you have a personal GPG key, right-click on the imported IOHK key and choose Certify\n - Enable the IOHK user ID\n - Tick the I have verified the fingerprint checkbox (since you did, as per step 5), and proceed.\n - You should receive a message saying Certification successful\n1. Verify the installer binary:\n - Click the Decrypt/Verify button on the Kleopatra toolbar\n - Choose the Daedalus installer .exe file in the file dialog (the .asc signature file must reside in the same directory)\n1. If the verification is successful, you will receive a green-tinted message box saying:\n - Valid signature by signing.authority@iohk.io\n - Date of signature\n - With certificate 31B3 F22F A0CC E2E8 382C 04A2 807F 2ACD 0171 BC90\n - Anything else would constitute a signature verification failure.\n",
123123
},
124124
darwin: {
125125
short_label: 'Mac OS',
126126
full_label: 'Mac OS 64 bit',
127127
checksum_instructions:
128128
'## MacOS checksum verification instructions\n\n### Installer integrity\n\nSHA256 checksum can be verified using the following command:\n\n```shell\nshasum -a 256 ~/Downloads/{{ filename }}\n```\n\nInstead of typing the path to the Daedalus installer executable use drag and drop:\n\n1. Open Terminal\n1. Type or paste: `shasum -a 256`\n1. Press space key\n1. Drag and drop Daedalus installer from Finder to Terminal\n1. Press enter key\n\nYou should see the following output, where string before the file path is the SHA256 checksum:\n\n```shell\n{{ sha256 }} ~/Downloads/{{ filename }}\n```\n',
129129
signature_instructions:
130-
"## MacOS PGP signature verification instructions\n\n1. Obtain both the Daedalus installer .pkg file, and its corresponding .pkg.asc signature file -- put them in the same directory.\n1. If you already have the GPG Suite installed, and a personal key generated, please skip to step 5, and if not, proceed with the next step.\n1. Go to [https://gpgtools.org](https://gpgtools.org), head to the GPG Suite section, download the .dmg file and install it:\n * Right-click the .dmg file, then Open, which will open a new window with two icons: Install and Uninstall\n * Right-click the Install icon, and choose Open with.. -> Installer, which should start the GPG Suite installer\n * Follow through the installation wizard\n1. Once GPG Suite installation completes, it will ask you to create a new key pair (this is required for step 6, so please don’t skip it):\n * Enter a name and an email that suit you personally.\n * Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use this key and GPG Suite in future).\n1. Import the IOHK key using the GPG Keychain application:\n * Select Key -> Lookup Key on Key Server in the application menu\n * Search for signing.authority@iohk.io\n * Choose the key with fingerprint CBFAA9BA with the user ID “IOHK Signing Authority ”, then click Retrieve Key\n * Verify (right-click the imported key, then Details) that the fingerprint of the imported key is D325 87D4 090F E461 CAEE 0FF4 966E 5CB9 CBFA A9BA\n * If it's not, the wrong key was imported, right click and delete\n * If it is, we are good to proceed with the next step.\n1. Sign the imported IOHK key (this designates trust and is required for the next step):\n * Right-click on the imported IOHK key, then “Sign”.\n1. Verify the installer binary:\n * Right-click the Daedalus installer (.pkg file) in Finder (do NOT right click on the .asc file, that will not work), then select Services -> OpenPGP: Verify Signature of File (the .asc signature file must reside in the same directory)\n * The Verification Results dialog will then appear with the verdict in the Result column:\n 1. “Signed by: IOHK Signing Authority 1471941A -- full trust” -- if successful\n 1. ..anything else means there was no valid signature for the installer.\n",
130+
"## MacOS PGP signature verification instructions\n\n1. Obtain both the Daedalus installer .pkg file, and its corresponding .pkg.asc signature file -- put them in the same directory.\n1. If you already have the GPG Suite installed, and a personal key generated, please skip to step 5, and if not, proceed with the next step.\n1. Go to [https://gpgtools.org](https://gpgtools.org), head to the GPG Suite section, download the .dmg file and install it:\n * Right-click the .dmg file, then Open, which will open a new window with two icons: Install and Uninstall\n * Right-click the Install icon, and choose Open with.. -> Installer, which should start the GPG Suite installer\n * Follow through the installation wizard\n1. Once GPG Suite installation completes, it will ask you to create a new key pair (this is required for step 6, so please don’t skip it):\n * Enter a name and an email that suit you personally.\n * Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use this key and GPG Suite in future).\n1. Import the IOHK key using the GPG Keychain application:\n * Select Key -> Lookup Key on Key Server in the application menu\n * Search for signing.authority@iohk.io\n * Choose the key with fingerprint 0171BC90 with the user ID “IOHK Signing Authority ”, then click Retrieve Key\n * Verify (right-click the imported key, then Details) that the fingerprint of the imported key is 31B3 F22F A0CC E2E8 382C 04A2 807F 2ACD 0171 BC90\n * If it's not, the wrong key was imported, right click and delete\n * If it is, we are good to proceed with the next step.\n1. Sign the imported IOHK key (this designates trust and is required for the next step):\n * Right-click on the imported IOHK key, then “Sign”.\n1. Verify the installer binary:\n * Right-click the Daedalus installer (.pkg file) in Finder (do NOT right click on the .asc file, that will not work), then select Services -> OpenPGP: Verify Signature of File (the .asc signature file must reside in the same directory)\n * The Verification Results dialog will then appear with the verdict in the Result column:\n 1. “Signed by: IOHK Signing Authority F4DBD0FE -- full trust” -- if successful\n 1. ..anything else means there was no valid signature for the installer.\n",
131131
},
132132
linux: {
133133
short_label: 'Linux',
134134
full_label: 'Linux 64 bit',
135135
checksum_instructions:
136136
'## Linux checksum verification instructions\n\n### Installer integrity\n\nVerify the sha256 hash:\n\n```shell\nsha256sum ~/Downloads/{{ filename }}\n```\n\nExpected:\n\n```shell\n{{ sha256 }}\n```\n',
137137
signature_instructions:
138-
'## Linux PGP signature verification instructions\n\n- Obtain both the Daedalus installer .bin file, and its corresponding .bin.asc signature file -- put them in the same directory.\n- Ensure that the gpg2 command is available (assuming Ubuntu Linux) in your shell, and if not -- execute the following shell command (shell commands further indicated by this bold monospace font):\n - `apt-get install gnupg2`\n- Unless you already have a personal GPG key, create one (this is required for step 5):\n - `gpg2 --generate-key`\n - Supply an user ID (real name and email) that suit you personally\n - Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use this key and GNUPG in future)\n- Import the IOHK key:\n - `gpg2 --keyserver hkp://keys.openpgp.org --search-keys signing.authority@iohk.io`\n - In the selection dialogue, choose the key with fingerprint 966E5CB9CBFAA9BA\n- Sign the IOHK key (this designates trust and is required for the next step):\n - `gpg2 --lsign D32587D4090FE461CAEE0FF4966E5CB9CBFAA9BA`\n- Verify the installer binary using the .asc signature (the .asc signature file must reside in the same directory as the installer binary):\n - `gpg2 --verify {{ filename }}.asc`\n - Successful verification should produce a message like follows:\n\n```shell\ngpg: assuming signed data in {{ filename }}.pkggpg: Signature made ...DATE...gpg: using RSA key 9F9840B50AE539A2732CF646C131557F1471941Agpg: checking the trustdbgpg: marginals needed: 3 completes needed: 1 trust model: pgpgpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1ugpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0ugpg: next trustdb check due at ...DATE...gpg: Good signature from IOHK Signing Authority <signing.authority@iohk.io>\n```\n',
138+
'## Linux PGP signature verification instructions\n\n- Obtain both the Daedalus installer .bin file, and its corresponding .bin.asc signature file -- put them in the same directory.\n- Ensure that the gpg2 command is available (assuming Ubuntu Linux) in your shell, and if not -- execute the following shell command (shell commands further indicated by this bold monospace font):\n - `apt-get install gnupg2`\n- Unless you already have a personal GPG key, create one (this is required for step 5):\n - `gpg2 --generate-key`\n - Supply an user ID (real name and email) that suit you personally\n - Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use this key and GNUPG in future)\n- Import the IOHK key:\n - `gpg2 --keyserver hkp://keys.openpgp.org --search-keys signing.authority@iohk.io`\n - In the selection dialogue, choose the key with fingerprint 807F2ACD0171BC90\n- Sign the IOHK key (this designates trust and is required for the next step):\n - `gpg2 --lsign 31B3F22FA0CCE2E8382C04A2807F2ACD0171BC90`\n- Verify the installer binary using the .asc signature (the .asc signature file must reside in the same directory as the installer binary):\n - `gpg2 --verify {{ filename }}.asc`\n - Successful verification should produce a message like follows:\n\n```shell\ngpg: assuming signed data in {{ filename }}.pkggpg: Signature made ...DATE...gpg: using RSA key CD1F21F62477EB42D7C4F3DEB3AD9541F4DBD0FE: checking the trustdbgpg: marginals needed: 3 completes needed: 1 trust model: pgpgpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1ugpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0ugpg: next trustdb check due at ...DATE...gpg: Good signature from IOHK Signing Authority <signing.authority@iohk.io>\n```\n',
139139
},
140140
},
141141
}

0 commit comments

Comments
 (0)