release 0.2.1
This commit is contained in:
parent
6f0c86777a
commit
2aeb9a695d
1
packages/0.2.1/README.mkd
vendored
Normal file
1
packages/0.2.1/README.mkd
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
**To save a file** click on the link and click 'View Raw'
|
BIN
packages/0.2.1/udevil-0.2.1-installer.sh
vendored
Normal file
BIN
packages/0.2.1/udevil-0.2.1-installer.sh
vendored
Normal file
Binary file not shown.
65
packages/0.2.1/udevil-0.2.1.SHA256.asc
vendored
Normal file
65
packages/0.2.1/udevil-0.2.1.SHA256.asc
vendored
Normal file
|
@ -0,0 +1,65 @@
|
|||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA256
|
||||
|
||||
bf866287d4295047015dca995903b703b23deabbc4daf3a23ff281c218118116 udevil-0.2.1.tar.xz
|
||||
10f5dc8b7cece535c9a5bab32f5f69631606a8b3479ec7edcdcdfd7b7d689385 udevil-0.2.1-installer.sh
|
||||
89c6e4b23427f4a8b94acd2301e0241ce3c85a965ec384d595c2e57374bb7487 udevil_0.2.1-1_all.deb
|
||||
|
||||
#
|
||||
# This file (udevil-0.2.1.SHA256.asc) is used to authenticate download of
|
||||
# udevil version 0.2.1
|
||||
#
|
||||
# Homepage: http://ignorantguru.github.com/udevil/
|
||||
#
|
||||
#
|
||||
# Why Authenticate?
|
||||
#
|
||||
# Verifying the authenticity of downloaded files prior to installation is
|
||||
# important to ensure that your download is not corrupt and that no one has
|
||||
# tampered with the server holding the files.
|
||||
#
|
||||
#
|
||||
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
|
||||
#
|
||||
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
|
||||
# (if you receive an error, try again)
|
||||
#
|
||||
# Also visually verify that the given fingerprint matches the one shown here:
|
||||
# http://igurublog.wordpress.com/contact-ignorantguru/
|
||||
#
|
||||
#
|
||||
# 2) Download one or more files (the first is required):
|
||||
#
|
||||
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.1/udevil-0.2.1.SHA256.asc
|
||||
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.1/udevil-0.2.1.tar.xz
|
||||
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.1/udevil-0.2.1-installer.sh
|
||||
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.1/udevil_0.2.1-1_all.deb
|
||||
#
|
||||
#
|
||||
# 3) Check signature and files:
|
||||
#
|
||||
# gpg -d udevil-0.2.1.SHA256.asc | sha256sum --check
|
||||
#
|
||||
# This should report a good signature and an OK for each file present:
|
||||
#
|
||||
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
|
||||
# --> udevil-0.2.1.tar.xz: OK
|
||||
# --> udevil-0.2.1-installer.sh: OK
|
||||
# --> udevil_0.2.1-1_all.deb: OK
|
||||
# --> gpg: Good signature from IgnorantGuru <EMAIL>
|
||||
# gpg: WARNING: This key is not certified with a trusted signature!
|
||||
# gpg: There is no indication that the signature belongs to the owner.
|
||||
# sha256sum: WARNING: x lines are improperly formatted
|
||||
#
|
||||
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
|
||||
# next to any file you plan to use, DO NOT USE the file. A "key is not
|
||||
# certified" warning (shown above) is normal and can be safely ignored if
|
||||
# you visually verified the key fingerprint in step 1.
|
||||
#
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v1.4.12 (GNU/Linux)
|
||||
|
||||
iF4EAREIAAYFAk+/xZ0ACgkQJ6WsWgGTdiEJ4QEA1KBnvHm/wv2y6LVV8IwyiGvC
|
||||
MCqUfUvW3asaVAlU9fABAIu6Pd8Otchnn51g7b1ZMUhvXvCTTd/+y2HnSutZbU0r
|
||||
=rYfk
|
||||
-----END PGP SIGNATURE-----
|
BIN
packages/0.2.1/udevil-0.2.1.tar.xz
vendored
Normal file
BIN
packages/0.2.1/udevil-0.2.1.tar.xz
vendored
Normal file
Binary file not shown.
BIN
packages/0.2.1/udevil_0.2.1-1_all.deb
vendored
Normal file
BIN
packages/0.2.1/udevil_0.2.1-1_all.deb
vendored
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user