nix-super/src/nix/verify.md

52 lines
1.3 KiB
Markdown
Raw Normal View History

2020-12-10 00:45:06 +02:00
R""(
# Examples
* Verify the entire Nix store:
```console
# nix store verify --all
```
* Check whether each path in the closure of Firefox has at least 2
signatures:
```console
2023-04-30 16:55:08 +03:00
# nix store verify --recursive --sigs-needed 2 --no-contents $(type -p firefox)
2020-12-10 00:45:06 +02:00
```
* Verify a store path in the binary cache `https://cache.nixos.org/`:
```console
# nix store verify --store https://cache.nixos.org/ \
/nix/store/v5sv61sszx301i0x6xysaqzla09nksnd-hello-2.10
```
# Description
This command verifies the integrity of the store paths [*installables*](./nix.md#installables),
2020-12-10 00:45:06 +02:00
or, if `--all` is given, the entire Nix store. For each path, it
checks that
* its contents match the NAR hash recorded in the Nix database; and
* it is *trusted*, that is, it is signed by at least one trusted
signing key, is content-addressed, or is built locally ("ultimately
trusted").
# Exit status
The exit status of this command is the sum of the following values:
* **1** if any path is corrupted (i.e. its contents don't match the
recorded NAR hash).
* **2** if any path is untrusted.
* **4** if any path couldn't be verified for any other reason (such as
an I/O error).
[Nix Archive]: @docroot@/store/file-system-object/content-address.md#serial-nix-archive
2020-12-10 00:45:06 +02:00
)""