Home Explore Blog CI



nix

1st chunk of `src/nix/verify.md`
0a149f2b1e549bbb3c1d8d2bcec37ffb8fe51359042e70cf00000001000004b0
R""(

# Examples

* Verify the entire Nix store:

  ```console
  # nix store verify --all
  ```

* Check whether each path in the closure of Firefox has at least 2
  signatures:

  ```console
  # nix store verify --recursive --sigs-needed 2 --no-contents $(type -p firefox)
  ```

* Verify a store path in the binary cache `https://cache.nixos.org/`:

  ```console
  # nix store verify --store https://cache.nixos.org/ \
      /nix/store/v5sv61sszx301i0x6xysaqzla09nksnd-hello-2.10
  ```

# Description

This command verifies the integrity of the store paths [*installables*](./nix.md#installables),
or, if `--all` is given, the entire Nix store. For each path, it
checks that

* its contents match the NAR hash recorded in the Nix database; and

* it is *trusted*, that is, it is signed by at least one trusted
  signing key, is content-addressed, or is built locally ("ultimately
  trusted").

# Exit status

The exit status of this command is the sum of the following values:

* **1** if any path is corrupted (i.e. its contents don't match the
  recorded NAR hash).

* **2** if any path is untrusted.

* **4** if any path couldn't be verified for any other reason (such as
  an I/O error).


)""

Title: nix store verify: Examples, Description, and Exit Status
Summary
The `nix store verify` command checks the integrity of store paths or the entire Nix store. It verifies that the contents match the recorded NAR hash and that the path is trusted (signed, content-addressed, or built locally). The command exits with a status code indicating corruption (1), untrusted paths (2), or other verification errors (4).