-
Notifications
You must be signed in to change notification settings - Fork 29.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for signing commits with GPG #5065
Comments
Doesn't GitHub's authentication basically do the same thing, since you need to auth with GitHub to push to repos you have access to? |
GitHub auth is NOT related to GPG-signed commits if I know right. |
Basically, I would like built-in functionality for appending the |
Sure, but isn't what it's accomplishing done by GitHub account/email linking? You need to link your email to an account and need credentials to the account to push. |
GPG can be used in any git environment (for instance: GitLab, BitBucket, etc.) I though this could be actual after seeing the blog post of GitHub about verifying commits. |
@joaomoreno thoughts? |
I'd argue that for any given repo, you'd either want to sign all commits or none. Based on that, I suggest to use the Does that work for you @kripod? |
I use exactly that, but when I try to commit from VS Code with that config attribute set, I get the following error output in the Git console of Code:
|
I misread the issue, I thought you were talking about the vscode repo starting to sign commits, not adding the feature. @joaomoreno while looking into signing commits yesterday, this I came across this http://stackoverflow.com/a/10166916/1156119
|
@kripod Not just vscode is affected: Bazaar Launchpad bug #847388 If you're using an agent: As a workaround (a configuration change affecting not just vscode) it's possible to add echo 'no-tty' >> ~/.gnupg/gpg.conf Snippet from gnupg docs explaining
From what I've noticed, If you're not using an agent: Again referring to Launchpad, this time the bzr (Bazaar) package, you seem to be out of luck. |
Well, having listened to @Tyriar, I'm not signing my commits anymore, but thank you for all the help provided! |
It is not strictly accurate that signing each commit is "totally stupid." |
it would be nice if vscode gave me the opportunity to sign a commit. |
Signing commits is not "totally stupid" and, in fact, has very real security implications. Not all Git code happens to be "pushed" to Github or BitBucket. Many places use git internally for all sorts of things and git commit signing is a very needed feature and often a requirement. I am using a gpg-agent and still am unable to sign commits in VSCode, for what it's worth. |
^ seems that git support is divided into two parts - one is git workbench that's in Is there any progress on this? |
i dont there is any work going on yet. |
I like to confirm I am starting work on this. I will a pull request with a WIP title to show progress soon |
@dmportella Hi! Any progress updates? :) |
got all the changes needed mapped now going to add menus items etc |
I have the change almost complete just tidying up and getting ready to commit. |
Pull request #27136 |
would love to see this. |
Me too, it was added to the June milestone that got me excited but now its back in the backlog.... So I don't know whats going on. The pull request is this one: #27136 |
@Tyriar Please, that comment, which is purely subjective, is very old and it's quoting achieves nothing, but FUD. Impersonating authors on GitHub is easily done and signing ALL commits is good practice. Especially with hardware tokens, such as Yubikeys. I mean no harm with 30912, I am merely showing how easy it is to submit a commit by another. I feel GitHub could do more here too. On the main page, images are small and easily distracted (I could even change mine, I guess ... and my name). But the "Verified" means we've signed that commit. I believe it's important, as others seem to have commented also. |
I verify ALL my commit is important and we do use yubikeys here at my organisation |
@Tyriar GPG signing provides authentication on the commits themselves. What you said in #5065 (comment) and subsequent comments are irrelevant to the issue. Because without signing the commit, I can easily fake you as the author and submit a fraudulent patch (e.g. intentionally infringing copyright of your rival company) via other channels (e.g. email) to another committer, who will be having a hard time to know whether you actually wrote the patch or not. And if that committer push the CL to GitHub, GitHub will happily link that to your account. See this commit for example: |
Hi all, no need to try to convince me anymore 😄 |
YEAHHHHH! 🎉 🎉 🎉 🎉 |
This error
can be cause by password protected gpg key. |
something related to the error you seen: isaacs/github#675 |
I got it to work for me, but only after signing a previous commit (~5 minutes prior) manually through the integrated terminal. I have a hunch that the root cause of the error message If you already entered your password via prompt previously, VS Code signs the commits perfectly fine. |
You'll probably want to use a pinentry program that remembers the pass code
or prompts graphically.
(sorry if terse)
…On Tue, 17 Oct 2017, 08:33 Jeremy Loy, ***@***.***> wrote:
I got it to work for me, but only after signing a previous commit (~5
minutes prior) manually through the integrated terminal.
I have a hunch that the root cause of the error message gpg failed to
sign the data, is that VS Code is requesting to open the prompt, and
failing to do so.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#5065 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ADH7Sd07gVJgVSJ-XqzSoTMiKWgEDrWEks5stBjpgaJpZM4IBuGD>
.
|
usually you see this problem when you dont things set up properly for gpg signing. that has been my experience |
In Linux, I solve /dev/tty problem by adding binary exec of gpg2 path to git global config |
VS Code should optionally be able to sign git commits with a given GPG key, as it is a good practice for authorization nowadays.
The text was updated successfully, but these errors were encountered: