-
-
Notifications
You must be signed in to change notification settings - Fork 277
Check commit signatures when using cz #575
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I'm open to it, the flag should be provided as a setting as well. |
In principle signing commits and verifying their signatures later is a great idea. However, like the Signing Your Work section of the
And also:
So, while we could probably add support for this to |
I think a section in the tutorials for "Working with signed commits" could help a lot, within the context of commitizen. Like crafted specially around the team requiring this flag |
Enforcing GPG signatures for all local commits + commits detected for example by the CI pipeline could be interesting. However, to avoid a requirement of all public keys, it could be split into two steps :
Example of commit 86fec63b8cbe091a8c3634fb53f6b17ee6f3a003 (HEAD -> master)
+gpg: Signature made Thu Aug 22 00:58:11 2024 UTC
+gpg: using RSA key 869BF1DE64A47C3CA620CC7BBC48BD5325580A88
+gpg: Good signature from "Your Name <you@example.com>" [ultimate]
Author: Your Name <you@example.com>
Date: Thu Aug 22 00:58:10 2024 +0000
fix: test
test
commit 33e0a4f30ec64dba45025327099fa6434828bb01
-gpg: Signature made Thu Aug 22 00:45:29 2024 UTC
-gpg: using RSA key B5223F050566C58849C4F8B36CCA433D9CD0572E
-gpg: Can't check signature: No public key
Author: Your Name <you@example.com>
Date: Thu Aug 22 00:45:29 2024 +0000
fix(test): test |
Description
To increase trust in commits, particularly in the context of current software supply-chain issues, it may be useful to enforce signed commits with various
cz
commands. To maintain backwards compatibility, this should be an opt-in feature.For example,
would fail if one or more of the commits for the change are unsigned.
Possible Solution
Iterate over the commits of a change set and use
git verify-commit <SHA>
.Additional context
Of the current commitizen commands:
the proposed, optional command-line switch
--require-signed-commits
could also be useful tocommit
,bump
,changelog
, andcheck
.Additional context
No response
The text was updated successfully, but these errors were encountered: