Eclipse ${release} ${buildTypeName} Build: ${label}
This page provides access to the various deliverables of Eclipse Platform build along with its logs and tests.
- New and Noteworthy
- Acknowledgments
- Eclipse Project ${releaseShort} Readme
- Eclipse Project Plan
- Target Platforms and Environments
Reports
The Reports page provides detailed build and tests logs and analyses of various aspects of this build.
Test Results Summary
| Tested Platform | Failed | Passed | Total | Runtime |
|---|
Git Log
The following Git repositories changed since ${gitBaselineTag} until this build (${gitTag}):
Checksums (SHA 512) and GPG Signatures
The SHA512 checksum of each artifact is provided individually in the tables below.
To verify the integrity of a downloaded artifact its checksum, computed by any suitable program (the details below provide examples), can be compared with the listed one.
The following instructions describe how to also verify a downloaded artifact's authenticity.
Obtain checksums and signature files
To verify the authenticity and integrity of any artifact provided on this page,
download the SHA512 Checksums file and its GPG signature,
to the same directory as the files to check.
On the CLI both can be downloaded using, for example, the commands:
curl -O https://download.eclipse.org/eclipse/downloads/drops4/${identifier}/eclipse-${label}-checksums
curl -O https://download.eclipse.org/eclipse/downloads/drops4/${identifier}/eclipse-${label}-checksums.asc
Verify checksums authenticity
The authenticity of the checksums file can be verified by executing the command:
gpg --verify eclipse-${label}-checksums.asc
On successful verification the output is similar to:
gpg: assuming signed data in 'eclipse-${label}-checksums'
gpg: Signature made Tue Jan 27 00:32:27 2026
gpg: using RSA key 9E3044071B758EBCB7E45673700E4F39BC05364B
gpg: Good signature from "Eclipse Platform Project <platform-releng-dev@eclipse.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 3C91 FED3 922D 5229 6888 BAE9 B6D3 AB9B CC64 1282
Subkey fingerprint: 9E30 4407 1B75 8EBC B7E4 5673 700E 4F39 BC05 364B
If Eclipse artifacts are verified for the first time, the displayed output will probably indicate that the public key is missing:
gpg: Can't check signature: public key not found
In this case the the public key has to be received first, for example by executing:
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys 9E3044071B758EBCB7E45673700E4F39BC05364B
Verify artifact integrity
To verify that an artifact, downloaded from this page and located in the same directory as the signature file, matches the checksum recorded in the authentic checksums file, run:- On Linux (or Windows in a POSIX environment)
sha512sum --check --ignore-missing eclipse-${label}-checksumsThe output should be similar to
eclipse-SDK-${label}-linux-gtk-x86_64.tar.gz: OK - On Windows:
certutil -hashFile <file-to-verify> SHA512and compare the displayed checksum with the one recorded in the signed checksums file for the corresponding artifact.
Eclipse p2 Repository
To update your Eclipse installation to this development stream, you can use the software repository at
${updatesP2RepositoryComposite}
To update your build to use this specific build, you can use the software repository at
${updatesP2Repository}