2022-01-07 22:07:12 +02:00
# allowed_signers file for SSH/git
Git 2.34 brings support for signing commits with SSH key and having a SSH-compatible
smartcard, I have to try this. It likely getting more common in the future doesn't
hurt either and I have [pgp-alt-wot ](https://gitea.blesmrt.net/Mikaela/pgp-alt-wot )
which does about the same for PGP.
## Where to find keys
2022-01-09 21:18:34 +02:00
* GitHub, Giteas and GitLabs expose user public keys (without useful names)
when you append a `.keys` after their profile page
* For example: https://github.com/Mikaela.keys https://gitea.blesmrt.net/Mikaela.keys https://gitlab.com/Mikaela.keys
* Good ideas are made to be copied, so maybe there will be more repositories like this :wink:
2022-01-07 22:07:12 +02:00
2022-01-09 21:11:30 +02:00
## Quick howto
I don't mean this to be used directly, only to be took inspiration from. See the first
link in further reading.
```bash
mkdir -p ~/src/gitea.blesmrt.net/Mikaela
cd ~/src/gitea.blesmrt.net/Mikaela
git clone https://gitea.blesmrt.net/Mikaela/ssh-allowed_signers.git
git config --global gpg.ssh.allowedSignersFile ~/src/gitea.blesmrt.net/Mikaela/ssh-allowed_signers/allowed_signers
```
2022-01-10 22:28:45 +02:00
Git commands, such as `git verify-commit --raw HEAD` or `git log --show-signature` ,
should now recognised commits signed with keys I have allowed.
2022-01-09 21:11:30 +02:00
In the last command it's fine to remove `--global` to only affect the single
repository you are on (while I haven't tested this), should that repository
be something only I am signing in or something I need to verify otherwise
enough to list it here.
On the last command, `git config` turns it into absolute path, while manually
edited `.gitconfig` can literally have the above. I wonder if the command
would understand `--` before the file, but not enough to actually try it :smiley:
2022-03-07 17:44:33 +02:00
## Mirrors
* https://gitea.blesmrt.net/mikaela/ssh-allowed_signers
* https://github.com/mikaela/ssh-allowed_signers
* https://gitlab.com/mikaela/ssh-allowed_signers
* https://git.com.de/mikaela/ssh-allowed_signers & http://gitea.qzzf2qcfbhievvs5nzkccuwddroipy62qjocqtmgcgh75vd6w57m7yad.onion/Mikaela/ssh-allowed_signers
2022-01-07 22:07:12 +02:00
## Further reading
2022-01-09 21:13:26 +02:00
* [Caleb Hearth: Signing Git Commits with Your SSH Key ](https://calebhearth.com/sign-git-with-ssh ) ([web.archive.org](https://web.archive.org/web/20211117182628/https://calebhearth.com/sign-git-with-ssh)) inspired me to try this
2022-01-09 22:01:19 +02:00
* [Andrew Ayer: It's Now Possible To Sign Arbitrary Data With Your SSH Keys ](https://www.agwa.name/blog/post/ssh_signatures ) instructs on signing and verifying files outside of git
2022-01-09 21:56:58 +02:00
### Forge support
2022-02-05 17:44:39 +02:00
* 🥇 [Gitea v1.16.0 brought support for SSH signed commits on 2022-01-30. ](https://blog.gitea.io/2022/02/gitea-1.16.0-and-1.16.1-released/ ) ([tag](https://github.com/go-gitea/gitea/releases/tag/v1.16.0))
2022-02-22 10:39:33 +02:00
* [Their Git hosting comparison also includes SSH Signed Commits ](https://docs.gitea.io/en-us/comparison/#code-management ).
2022-08-23 20:15:26 +03:00
* 🥈 [GitHub started supporting SSH signed commits on 2022-08-23 ](https://github.blog/changelog/2022-08-23-ssh-commit-verification-now-supported/ )
2022-03-22 20:44:24 +02:00
* [GitLab issues: Support for SSH signed commits ](https://gitlab.com/gitlab-org/gitlab/-/issues/343879 ) and [a draft merge request on the subject ](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/78200 )
* TODO: (a) better link(s) when this happens