Author: maartenc Date: Sun Jan 5 10:51:22 2025 New Revision: 1922898 URL: http://svn.apache.org/viewvc?rev=1922898&view=rev Log: Updated KEYS URL
Modified: ant/site/ivy/production/download.html ant/site/ivy/sources/download.html Modified: ant/site/ivy/production/download.html URL: http://svn.apache.org/viewvc/ant/site/ivy/production/download.html?rev=1922898&r1=1922897&r2=1922898&view=diff ============================================================================== --- ant/site/ivy/production/download.html (original) +++ ant/site/ivy/production/download.html Sun Jan 5 10:51:22 2025 @@ -198,7 +198,7 @@ ant jar </pre> Then you will find ivy.jar in <b>build/artifact</b>.<br class="xooki-br"/><br class="xooki-br"/><h2>Snapshot build</h2> The Apache Software Foundation hosts an installation of the Jenkins CI-system where a continuous build of Ivy is available. Note that these are not official builds and they are not endorsed or even supported by the Apache Ivy team. But if you have problems with testing the latest (successful) build, you are welcome to post that on the mailinglist. <br class="xooki-br"/><br class="xooki-br"/>The project page of Apache Ivy on this Jenkins installation is: <a href="https://builds.apache.org/job/Ivy/">https://builds.apache.org/job/Ivy/</a>. Here you can find links to the latest version of the jars.<br class="xooki-br"/><br class="xooki-br"/><h2><a name="VerifyReleases">Verify Releases</a></h2> -It is essential that you verify the integrity of the downloaded files using the PGP signature or the SHA512 checksum. The checksums are not as strong indicators as the PGP signature.<br class="xooki-br"/><br class="xooki-br"/>The PGP signatures can be verified using PGP or GPG. First download the <a href="https://www.apache.org/dist/ant/KEYS">KEYS</a> as well as the asc signature file for the particular distribution. Make sure you get these files from the <a href="https://downloads.apache.org/ant/ivy/">main distribution directory</a>, rather than from a mirror. Then verify the signatures using<br class="xooki-br"/> +It is essential that you verify the integrity of the downloaded files using the PGP signature or the SHA512 checksum. The checksums are not as strong indicators as the PGP signature.<br class="xooki-br"/><br class="xooki-br"/>The PGP signatures can be verified using PGP or GPG. First download the <a href="https://downloads.apache.org/ant/KEYS">KEYS</a> as well as the asc signature file for the particular distribution. Make sure you get these files from the <a href="https://downloads.apache.org/ant/ivy/">main distribution directory</a>, rather than from a mirror. Then verify the signatures using<br class="xooki-br"/> <pre> % pgpk -a KEYS<br class="xooki-br"/>% pgpv apache-ivy-2.5.3-bin.tar.gz.asc </pre> Modified: ant/site/ivy/sources/download.html URL: http://svn.apache.org/viewvc/ant/site/ivy/sources/download.html?rev=1922898&r1=1922897&r2=1922898&view=diff ============================================================================== --- ant/site/ivy/sources/download.html (original) +++ ant/site/ivy/sources/download.html Sun Jan 5 10:51:22 2025 @@ -90,7 +90,7 @@ The project page of Apache Ivy on this J <h2><a name="VerifyReleases">Verify Releases</a></h2> It is essential that you verify the integrity of the downloaded files using the PGP signature or the SHA512 checksum. The checksums are not as strong indicators as the PGP signature. -The PGP signatures can be verified using PGP or GPG. First download the <a href="https://www.apache.org/dist/ant/KEYS">KEYS</a> as well as the asc signature file for the particular distribution. Make sure you get these files from the <a href="https://downloads.apache.org/ant/ivy/">main distribution directory</a>, rather than from a mirror. Then verify the signatures using +The PGP signatures can be verified using PGP or GPG. First download the <a href="https://downloads.apache.org/ant/KEYS">KEYS</a> as well as the asc signature file for the particular distribution. Make sure you get these files from the <a href="https://downloads.apache.org/ant/ivy/">main distribution directory</a>, rather than from a mirror. Then verify the signatures using <code> % pgpk -a KEYS