-
Notifications
You must be signed in to change notification settings - Fork 510
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New check: signed commits #779
Comments
some related discussion at #223 |
I can't really give any indication of when this will be generally available. There is still a bit of review / discussion of specifics going on. And even if it is merged/released soon i have no idea on when github might provide the feature. |
Thanks! |
duplicate #379 |
landed git/git#1041! |
It is a going to take a while before it lands in GitHub |
The change was merged to master. So it should be in git 2.34 which will probably release in mid november. edit: sorry misread your question. Github could publish the signers file, or you could build an individual one (a ‚trust on first use‘ feature in git will follow). Or a project could require all signed commits and then check a list into the repo itself. Who to trust can still be a personal or a projects decision. |
good first step, but it is not part of the commit history. Makes it hard to retroactively validate commit history via other tooling. To decouple trust from github, may also be useful to have a transparency log for this. There's been a lot of proposal about this in the past, in particular w.r.t identities for chat apps like Signal. Seems like a natural fit for this problem... in theory :-D
agreed it's up to users. |
the allowedSignersFile has a valid-before/after option for every key and is meant to be edited/appended continually. this allows for verifying the history up to the point the file was created. if you deem your repo secure enough to also store this allowed signers list you can then add it to the repo and everyone can verify the whole commit history using just plain git (and the necessary ssh-keygen tool). ideally github could default to the users already present ssh key but also allow for uploading one only used for signing (i use different keys for signing & auth). |
Stale issue message |
(Noting the official thread for SSH signing: community/community#7744) |
This issue is stale because it has been open for 60 days with no activity. |
@spencerschrock @afmarcum and others: From our Jan 25 meeting, we said we'd close this one as a "won't do." |
Additionally this one is a duplicate of #379. Any future discussion should take place there. |
there seems to be a setting under branch protection called
Require signed commits
which may be useful to add.We could also have this as part of separate check when git/git#1041 is merged and operational.
@FStelzer @djmdjm do you have some rough estimate when ssh signing git/git#1041 will go live and if it will be supported as part of the branch protection setting?
The text was updated successfully, but these errors were encountered: