Verifying files by signature
Helix Server
administrators can use the p4 verify
command to validate stored
MD5 digests of each revision of the named files. The signatures created
when users store files in the depot can later be used to confirm proper
recovery in case of a crash: if the signatures of the recovered files
match the previously saved signatures, the files were recovered
accurately. If a new signature does not match the signature in the
Helix Server
database for that file revision,
Helix Server
displays the characters filenames
BAD!
after the signature.
It is good practice to run p4 verify
before
performing your nightly system backups, and to proceed with the backup
only if p4 verify
reports no corruption.
For large installations, p4 verify
can take some
time to run. The server is also under heavy load while files are being
verified, which can impact the performance of other
Helix Server
commands. Administrators of large sites might want to perform p4
verify
on a weekly basis, rather than a nightly basis.
If you ever see a BAD!
signature during a p4
verify
command, your database or versioned files might be
corrupt, and you should contact
Perforce
Technical Support.
Verifying files during server upgrades
It is good practice to use p4 verify
as follows
before and after server upgrades:
-
Before the upgrade, run:
$ p4 verify -q //...
to verify the integrity of your server before the upgrade.
- Take a checkpoint and copy the checkpoint and your versioned files to a safe place.
- Perform the server upgrade.
-
After the upgrade, run:
$ p4 verify -q //...
to verify the integrity of your new system.