@node Install
+@cindex install
+@cindex packages
+@cindex ports
+@cindex tarball
+@cindex download
+@cindex PGP
@unnumbered Install
-Preferable way is to download tarball with the signature from website:
+Possibly @command{goredo} package already exists for your distribution:
+@itemize
-@example
-$ [fetch|wget] http://www.goredo.cypherpunks.ru/download/goredo-@value{VERSION}.tar.zst
-$ [fetch|wget] http://www.goredo.cypherpunks.ru/download/goredo-@value{VERSION}.tar.zst.sig
-$ gpg --verify goredo-@value{VERSION}.tar.zst.sig goredo-@value{VERSION}.tar.zst
-$ zstd -d < goredo-@value{VERSION}.tar.zst | tar xf -
-$ cd goredo-@value{VERSION}
-$ GOPATH=`pwd` go build go.cypherpunks.ru/goredo
-$ ./goredo -symlinks # create redo-* commands symlinks
-$ export PATH=`pwd`:$PATH # let your system know about goredo
-@end example
+@cindex ALT Linux
+@item ALT Linux @url{http://www.sisyphus.ru/ru/srpm/Sisyphus/goredo, Sisyphus}
-@include download.texi
+@cindex Arch Linux
+@item Arch Linux @url{https://aur.archlinux.org/packages/goredo, AUR}
-You @strong{have to} verify downloaded tarballs integrity and
-authenticity to be sure that you retrieved trusted and untampered
-software. @url{https://www.gnupg.org/, GNU Privacy Guard} is used
-for that purpose.
+@cindex container image
+@item Container @url{https://github.com/rdavid/goredoer, image}
-For the very first time it is necessary to get signing public key and
-import it. It is provided below, but you should check alternative
-resources.
+@cindex Fedora
+@item Fedora @url{https://github.com/rpmsphere/source/tree/master/g, RPM Sphere}
-@verbatim
-pub ed25519/0x3A528DDE952C7E93 2021-01-09 [SC]
- 7531BB84FAF0BF35960C63B93A528DDE952C7E93
-uid goredo releases <goredo@cypherpunks.ru>
-@end verbatim
+@cindex FreeBSD
+@item @url{https://www.freshports.org/devel/goredo/, FreeBSD ports}
-@itemize
+@cindex Homebrew
+@cindex macOS
+@item macOS @url{https://formulae.brew.sh/formula/goredo, Homebrew}
-@item
-@example
-$ gpg --auto-key-locate dane --locate-keys goredo at cypherpunks dot ru
-$ gpg --auto-key-locate wkd --locate-keys goredo at cypherpunks dot ru
-@end example
+@cindex NetBSD
+@item @url{https://pkgsrc.se/devel/goredo, NetBSD package}
-@item
-@verbatiminclude ../PUBKEY.asc
+@cindex NixOS
+@item @url{https://github.com/NixOS/nixpkgs/tree/master/pkgs/by-name/go/goredo, NixOS packages}
@end itemize
-It is also @command{go get}-able:
+Preferable way is to download tarball with the signature from website:
+
+@example
+$ [fetch|wget] http://www.goredo.cypherpunks.ru/download/goredo-@value{VERSION}.tar.zst
+$ [fetch|wget] http://www.goredo.cypherpunks.ru/download/goredo-@value{VERSION}.tar.zst.@{asc,sig@}
+[verify signature]
+$ zstd -d < goredo-@value{VERSION}.tar.zst | tar xf -
+$ cd goredo-@value{VERSION}/src
+$ go build -mod=vendor
+$ ./goredo -symlinks # create redo-* commands symlinks
+$ export PATH=`pwd`:$PATH # let your system know about goredo
+@end example
+
+@include download.texi
+@include integrity.texi
+
+@command{goredo} is also @command{go install}-able:
@example
-$ go get go.cypherpunks.ru/goredo
+$ go install go.cypherpunks.ru/goredo
$ goredo -symlinks
@end example
+@vindex GOPRIVATE
If you have problems with @code{*.golang.org}'s inability to verify
authenticity of @code{go.cypherpunks.ru} TLS connection, then you can
-disable their usage by setting @env{GOPRIVATE=go.cypherpunks.ru}. You
-can override CA certificate file path with @env{SSL_CERT_FILE} and
-@env{GIT_SSL_CAINFO} environment variables.
+disable their usage by setting @env{$GOPRIVATE=go.cypherpunks.ru}. You
+can override CA certificate file path with @env{$SSL_CERT_FILE} and
+@env{$GIT_SSL_CAINFO} environment variables.
+@cindex git
You can obtain development source code with
@command{git clone git://git.cypherpunks.ru/goredo.git}
(also you can use @url{https://git.cypherpunks.ru/goredo.git}).
+
+Also there is @url{https://yggdrasil-network.github.io/, Yggdrasil}
+accessible address: @url{http://y.www.goredo.cypherpunks.ru/}.