Download & Verify
This guide explains how to download pre-built binaries and verify their integrity using SHA256 checksums and PGP signatures.
Release Artifacts
Each GitHub release includes these assets:
Platform-specific binaries named by release tag and OS/arch, for example
clementine-cli-<RELEASE_TAG>-<OS>-<ARCH>orclementine-cli-<RELEASE_TAG>-<OS>-<ARCH>.exe.SHA256SUMSfile with checksums for all release binaries.SHA256SUMS.ascwhich is the PGP-signed checksum file.
Download the latest release binary for your platform from the Releases page.
Whenever you see placeholders like <RELEASE_TAG>-<OS>-<ARCH> in the commands below, replace them with the values for your download. Example values:
<RELEASE_TAG>:v0.1.0-rc.1<OS>:darwin,linux, orwindows<ARCH>:aarch64orx86_64
Example filename: clementine-cli-v0.1.0-rc.1-darwin-aarch64
Download
Download the release binary for your platform.
Download verification is optional but strongly recommended. These steps ensure the binaries and checksum files you downloaded are authentic and unmodified.
Download
SHA256SUMS.Download
SHA256SUMS.asc.Keep all three files together in the folder where the release artifacts were downloaded.
Import the Release Signing Key
Only trust a key after validating the full fingerprint out-of-band.
If GPG is not installed, install it before proceeding:
Windows users: the GPG executable path shown in this guide assumes Gpg4win is installed under C:\Program Files\GnuPG\bin\gpg.exe. If your installation uses a different path, update the commands to match your actual location.
References:
Keyserver:
hkps://keyserver.ubuntu.comPublic key repository: chainwayxyz/pgp-keys
Full fingerprints: FINGERPRINTS.md
Signer keys: clementine-cli-builder
macOS/Linux
From a keyserver
Use the fingerprint or key ID with no spaces in the recv-keys command.
Expected output:
gpgreports the key was retrieved/imported.The
gpg --fingerprintline shows the full fingerprint and matchesFINGERPRINTS.md.
From the public key repository
Select a trusted signer from the clementine-cli-builder directory and use that filename as <KEY_FILENAME>. For stronger assurance, verify against multiple trusted signers and compare fingerprints before trusting a key.
Expected output:
gpgreports the key was imported.The
gpg --fingerprintline shows the full fingerprint and matchesFINGERPRINTS.md.
Import all signer keys (optional)
Expected output:
gpgreports each key import.The fingerprints you intend to trust match
FINGERPRINTS.md.
Windows (PowerShell)
From a keyserver
Command Prompt:
Use the fingerprint or key ID with no spaces in the recv-keys command.
Expected output:
gpgreports the key was retrieved/imported.The
gpg --fingerprintline shows the full fingerprint and matchesFINGERPRINTS.md.
From the public key repository
Select a trusted signer from the clementine-cli-builder directory and use that filename as <KEY_FILENAME>. For stronger assurance, verify against multiple trusted signers and compare fingerprints before trusting a key.
Command Prompt:
Expected output:
gpgreports the key was imported.The
gpg --fingerprintline shows the full fingerprint and matchesFINGERPRINTS.md.
Replace <KEY_FILENAME> with the specific signer key file (for example, ahmet-oguz-engin.pgp) to avoid ambiguity.
Import all signer keys (optional)
Command Prompt:
Expected output:
gpgreports each key import.The fingerprints you intend to trust match
FINGERPRINTS.md.
The public key repository should contain:
Individual
.pgpkey files underclementine-cli-builder/FINGERPRINTS.mdto cross-check expected fingerprints
Verify the Checksum Signature
macOS/Linux
Run these commands from the folder where the release artifacts were downloaded.
Ensure the trusted signer keys are imported and the fingerprints match
FINGERPRINTS.md.Verify the checksum signature:
Windows (PowerShell)
Run these commands from the folder where the release artifacts were downloaded:
PowerShell:
cd $env:USERPROFILE\DownloadsCommand Prompt:
cd %UserProfile%\Downloads
Ensure the trusted signer keys are imported and the fingerprints match
FINGERPRINTS.md.Verify the checksum signature:
Command Prompt:
Expected output:
A line that starts with:
gpg: Good signatureA fingerprint line that matches one of the trusted fingerprints in
FINGERPRINTS.md
Depending on your OS and GPG version, you might not see a Primary key fingerprint: line. Some builds print the fingerprint without a label.
The fingerprint shown by GPG must match one of the trusted fingerprints you validated from FINGERPRINTS.md. If the signer differs from your trusted set, treat it as untrusted and stop.
You may also see warnings:
gpg: Can't check signature: No public keymeans GPG could not verify that signer's signature. If this appears for a signer you already imported, stop and fix the key import. Your download is only verified when you see at least onegpg: Good signaturefrom a trusted signer whose fingerprint matches FINGERPRINTS.md.gpg: WARNING: This key is not certified with a trusted signature!orWARNING: The key's User ID is not certified with a trusted signature!means GPG cannot establish trust. Confirm the fingerprint matches a trusted signer before proceeding.
Proceed only if the signature is valid and the fingerprint matches your trusted key record.
Verify the Binary Checksum
Use the checksum file to verify the binary you downloaded. Follow the section for your OS.
macOS/Linux
From the folder where the release artifacts were downloaded, run:
Expected output:
The line for your downloaded file ends with
OK(for example:clementine-cli-v0.1.0-rc.1-darwin-aarch64: OK).
To compute a hash directly for auditing or tooling and compare it to the matching line in SHA256SUMS:
Expected output:
A single SHA256 hash and filename; it must match the corresponding line in
SHA256SUMS.
Windows (PowerShell)
From the folder where the release artifacts were downloaded, run:
Expected output:
Truewhen the checksum matches.
Windows (Command Prompt)
From the folder where the release artifacts were downloaded, run:
Expected output:
The SHA256 value from
certutilmatches the corresponding line inSHA256SUMS(compare every character).
Windows (PowerShell) - Direct Hash
To compute a hash directly for auditing or tooling and compare it to the matching line in SHA256SUMS:
Expected output:
The
Hashvalue matches the corresponding line inSHA256SUMS.
Rename and Run
For easier usage, rename the binary to clementine-cli and ensure it is executable. On macOS/Linux, use ./ because the current directory is not in PATH by default, or add the directory containing the binary to your PATH for global access.
macOS/Linux
Windows (PowerShell)
Windows (Command Prompt)
Last updated
Was this helpful?