This repo contains the raw release signing keys in three forms:
The keys/ directory contains the raw ASCII-armored release signing keys listed above.
The gpg/ directory contains a GPG keyring preloaded with these release signing keys.
The gpg-only-active-keys/ directory contains a GPG keyring preloaded with
the active release signing keys. Use this if you only need to verify
signatures of “future” releases.
For additional verification of both the keys’ content and of the list of authorized signing
keys, you may cross-reference the list with nodejs.org and attempt to
fetch keys from alternative sources (instead of or in addition to this repo).
Then, prefix your gpg commands with the path to the cloned repo’s gpg/ directory.
For example, if you cloned the repo to /path/to/nodejs-keys, then the gpg command
to verify a release package will look something like this:
Then, import the release signing keys from this repo into your GPG keychain by invoking
the cli.sh script in this repo. For example, immediately after cloning the repo above,
the following command will import all release signing keys:
Node.js Release Keys
Primary GPG keys for Node.js Releasers (some Releasers sign with subkeys):
5BE8A3F6C8A5C01D106C0AD820B1A390B168D356DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7CC68F5A3106FF448322E48ED27F5E38D5B0A215F8FCCA13FEF1D0C2E91008E09770F7A9A5AE15600890C08DB8579162FEE0DF9DB8BEAB4DFCF555EF4C82FA3AE1CBEDC6BE46B9360C43CEC45C17AB93C108F52B48DB57BB0CC439B2997B01419BD92F80AA363A499291CBBC940DD62E41F10027AF002F8B0Other keys used to sign some previous releases:
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 Release Packages
This repo contains the raw release signing keys in three forms:
The keys/ directory contains the raw ASCII-armored release signing keys listed above.
The gpg/ directory contains a GPG keyring preloaded with these release signing keys.
The gpg-only-active-keys/ directory contains a GPG keyring preloaded with the active release signing keys. Use this if you only need to verify signatures of “future” releases.
For additional verification of both the keys’ content and of the list of authorized signing keys, you may cross-reference the list with nodejs.org and attempt to fetch keys from alternative sources (instead of or in addition to this repo).
Using the preloaded GPG keyring
First, clone this repo:
Then, prefix your
gpgcommands with the path to the cloned repo’s gpg/ directory. For example, if you cloned the repo to /path/to/nodejs-keys, then thegpgcommand to verify a release package will look something like this:Using your own GPG keyring
First, clone this repo:
Then, import the release signing keys from this repo into your GPG keychain by invoking the cli.sh script in this repo. For example, immediately after cloning the repo above, the following command will import all release signing keys: