git-signed
v0.1.3
Published
git commit signing made easy (and enforceable)
Downloads
17
Readme
Why?
Signing your commits ensure:
- That your commits cannot be re-edited by someone else (using git commit --amend)
- That no one cant impersonate you and try to add commits to a codebase
However, getting started with commit signing is often a tedious process. Many developers still do not sign their commits despite both GitHub and GitLab promoting its use.
Also, without having imported the public key of collaborators on the project, you will not be able to confirm that their commits are indeed signed. This means that locally (either during development or on a CI server), you will likely not have a straightforward way to verify and ensure that all commits in your repository are indeed signed.
git-signed solves both problems by providing a workflow for creating, publishing, and locally syncing GPG keys. It also configures the local repository to automatically sign all commits with the selected key.
Requirements
You will need gpgme
installed locally on your machine.
- Arch Linux:
pacman -S gpgme
oryaourt -S gpgme
- Ubuntu:
apt-get install gpgme
- macOS:
brew install gpgme
Windows users do not need to install gpgme, we will be using
the copy of gnupg that is installed alongside git
.
Installation
npm install --save-dev git-signed
Usage
Click here to see our tutorial
In package.json
:
{
"scripts": {
"collaborator:join": "git-signed --join",
"collaborator:export-key": "git-signed --export",
"collaborator:sync-keys": "git-signed --sync",
"test:commit-signatures": "git-signed"
}
}
Then, add yourself as a collaborator. This will add a collaborators
entry
in you package.json
file that will be augmented with information about
how to fetch your key.
npm run collaborator:join
On GitHub and GitLab PRs, signed commit will have a "verified" badge attached to them.
To add your GPG key to GitHub, GitLab, or other systems, export your key.
npm run collaborator:export-key
As collaborators join the project, more collaborators
entries will be added
to your package.json
. You will need to fetch their keys so to see their
commits as properly signed.
npm run collaborator:sync-keys
Once you have synced the keys to your localk keyring, you can now test that all commits are indeed signed.
test:commit-signatures
In some cases, you will want to start checking for signed
commits only from a certain point in history (for instance, if all previous
commits on the project were not signed until this point). Adding a commit
short hash to the git-signed
command will ignore all previous commits
in your commit tree.
{
"scripts": {
"test:commit-signatures": "git-signed 86ce8bc"
}
}
Finally, note that git-signed
will only scan commits in the current branch.
To scan another branch, simply switch to it, and run git-signed again.
Integrating with Husky
Husky allows for the automated setup of commit hooks. One common use of git-signed is to add a post-commit test to let developers know that they need to sign their work.
{
"scripts": {
"precommit": "npm run test",
"postcommit": "npm run test:commit-signatures",
"postmerge": "npm install && npm run collaborator:sync-keys",
"update": "npm install && npm run collaborator:sync-keys"
}
}
You may find a more complete example in the package.json file of this project.
Repository configuration
If you are using GitHub or GitLab, you will need to disable Allow squash commit
and Allow rebase commit
; this is due to the fact that signed commits would eithet
be squashed into an unsigned one, or simply get unsigned.
License
MIT.
Acknowledgements
Git graphic by tnp_sergey_novosyolov from TheNounProject is licensed under CC BY 3.0. Check out the new logo that I created on LogoMaker.com https://logomakr.com/1D6HDT