diff --git a/quorum-vault-system/src/component-documents/git-basics.md b/quorum-vault-system/src/component-documents/git-basics.md index ca4c30b..47029e9 100644 --- a/quorum-vault-system/src/component-documents/git-basics.md +++ b/quorum-vault-system/src/component-documents/git-basics.md @@ -11,7 +11,7 @@ $ cp -r /media/vaults ~/vaults/ $ cd ~/vaults $ git add . - $ git commit -m -S "" + $ git commit -S -m "" $ git push origin HEAD ``` // ANCHOR_END: content diff --git a/quorum-vault-system/src/component-documents/git-commit-signing.md b/quorum-vault-system/src/component-documents/git-commit-signing.md index 7822507..53d622e 100644 --- a/quorum-vault-system/src/component-documents/git-commit-signing.md +++ b/quorum-vault-system/src/component-documents/git-commit-signing.md @@ -12,8 +12,8 @@ $ git config --global user.name $ git config --global user.email $ git config --global user.signingKey - $ git config --global commit.gpgsign = true - $ git config --global commit.merge = true + $ git config --global commit.gpgsign true + $ git config --global commit.merge true ``` 1. Configure ssh to authenticate with smartcard diff --git a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/coins/template-gen-address-1.md b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/coins/template-gen-address-1.md index ff4850d..12d8c73 100644 --- a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/coins/template-gen-address-1.md +++ b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/coins/template-gen-address-1.md @@ -5,9 +5,9 @@ * Import OpenPGP keys: - * `gpg --import /media//vaults/keys/all/*.asc` + * `gpg --import /media/vaults/keys/all/*.asc` - * `gpg --detach-sign $account_id.txt` + * `gpg --detach-sign $account_id.json` 1. You may repeat the previous steps, starting at the step where the `account_id` is set. @@ -19,4 +19,4 @@ 1. Unplug the Ceremony SD card and place it into High Visibility Storage // ANCHOR_END: content -/* ANCHOR_END: all */ \ No newline at end of file +/* ANCHOR_END: all */ diff --git a/quorum-vault-system/src/generated-documents/level-2/fixed-location/provisioner/provision-airgapos.md b/quorum-vault-system/src/generated-documents/level-2/fixed-location/provisioner/provision-airgapos.md index efb53b7..2f7fe59 100644 --- a/quorum-vault-system/src/generated-documents/level-2/fixed-location/provisioner/provision-airgapos.md +++ b/quorum-vault-system/src/generated-documents/level-2/fixed-location/provisioner/provision-airgapos.md @@ -6,7 +6,7 @@ * Tamper proofing evidence (photographs) -* [SD Card Pack(s)](../procurer/procure-sd-card-pack.md) +* [SD Card Pack(s)](../procurer/procure-sd-card-pack.md) * High Visibility Storage @@ -18,7 +18,7 @@ 1. Turn on one of the computers - this one will be used for writing the SD cards -1. Build the software according to the [readme](https://git.distrust.co/public/airgap) in the repository. +1. Build the software according to the [readme](https://git.distrust.co/public/airgap) in the repository. 1. Use the `make reproduce` command @@ -36,9 +36,9 @@ 1. Flash `airgap.iso` to an SD Card: - * `dd if=out/airgap.iso of=/dev/ bs=4M status=progress conv=fsync` + * `dd if=out/airgap.iso of=/dev/ bs=4M conv=fsync` -1. Reset the computer, and boot the SD card +1. Reset the computer, and boot the SD card 1. Once booted, the card needs to be locked using `sdtool` which is available in `AirgapOS`: @@ -56,6 +56,6 @@ 1. Verify the card can't be written to: - * `echo "42" | dd of=/dev/` + * `echo "42" | dd of=/dev/` -{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }} \ No newline at end of file +{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}