* [bug#36844] [PATCH] doc: Add note about signing keys.
@ 2019-07-29 22:36 Jakob L. Kreuze
2019-08-06 19:32 ` bug#36844: " Christopher Lemmer Webber
0 siblings, 1 reply; 2+ messages in thread
From: Jakob L. Kreuze @ 2019-07-29 22:36 UTC (permalink / raw)
To: 36844
[-- Attachment #1: Type: text/plain, Size: 1186 bytes --]
* doc/guix.texi (Invoking guix deploy): Add note explaining that
deployment targets must authorize the coordinator machine's signing key.
---
doc/guix.texi | 16 ++++++++++++++++
1 file changed, 16 insertions(+)
diff --git a/doc/guix.texi b/doc/guix.texi
index ccc36a8a97..efed08d8fa 100644
--- a/doc/guix.texi
+++ b/doc/guix.texi
@@ -25527,6 +25527,22 @@ complex deployment may involve, for example, starting virtual machines through
a Virtual Private Server (VPS) provider. In such a case, a different
@var{environment} type would be used.
+Do note that you first need to generate a key pair on the coordinator machine
+to allow the daemon to export signed archives of files from the store
+(@pxref{Invoking guix archive}).
+
+@example
+# guix archive --generate-key
+@end example
+
+@noindent
+Each target machine must authorize the key of the master machine so that it
+accepts store items it receives from the coordinator:
+
+@example
+# guix archive --authorize < coordinator-public-key.txt
+@end example
+
@deftp {Data Type} machine
This is the data type representing a single machine in a heterogeneous Guix
deployment.
--
2.22.0
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]
^ permalink raw reply related [flat|nested] 2+ messages in thread
* bug#36844: [PATCH] doc: Add note about signing keys.
2019-07-29 22:36 [bug#36844] [PATCH] doc: Add note about signing keys Jakob L. Kreuze
@ 2019-08-06 19:32 ` Christopher Lemmer Webber
0 siblings, 0 replies; 2+ messages in thread
From: Christopher Lemmer Webber @ 2019-08-06 19:32 UTC (permalink / raw)
To: guix-patches; +Cc: 36844-done
Looks good. Merged & pushed.
Jakob L. Kreuze writes:
> * doc/guix.texi (Invoking guix deploy): Add note explaining that
> deployment targets must authorize the coordinator machine's signing key.
> ---
> doc/guix.texi | 16 ++++++++++++++++
> 1 file changed, 16 insertions(+)
>
> diff --git a/doc/guix.texi b/doc/guix.texi
> index ccc36a8a97..efed08d8fa 100644
> --- a/doc/guix.texi
> +++ b/doc/guix.texi
> @@ -25527,6 +25527,22 @@ complex deployment may involve, for example, starting virtual machines through
> a Virtual Private Server (VPS) provider. In such a case, a different
> @var{environment} type would be used.
>
> +Do note that you first need to generate a key pair on the coordinator machine
> +to allow the daemon to export signed archives of files from the store
> +(@pxref{Invoking guix archive}).
> +
> +@example
> +# guix archive --generate-key
> +@end example
> +
> +@noindent
> +Each target machine must authorize the key of the master machine so that it
> +accepts store items it receives from the coordinator:
> +
> +@example
> +# guix archive --authorize < coordinator-public-key.txt
> +@end example
> +
> @deftp {Data Type} machine
> This is the data type representing a single machine in a heterogeneous Guix
> deployment.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2019-08-06 19:33 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-07-29 22:36 [bug#36844] [PATCH] doc: Add note about signing keys Jakob L. Kreuze
2019-08-06 19:32 ` bug#36844: " Christopher Lemmer Webber
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).