Skip to content

.git_allowed_signers: Add explicit local verification method for SSH-key-based sigs. #51

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 23, 2025

Conversation

ivucica
Copy link
Member

@ivucica ivucica commented Jun 10, 2025

.git_allowed_signers: Add explicit local verification method for SSH-key-based sigs.

Without this file, the verification for commits depends solely on keys uploaded through hosting platform UIs. The action to declare trusted keys is also made into an explicit action on the repository.

Ideally, this would belong in a separate repository containing trusted maintainer identities in general. This could in the future include hosting-platform-provided identities, auto-generated, but for verification and historical records we should keep this separate.

…key-based sigs.

Without this file, the verification for commits depends solely on keys uploaded through hosting platform UIs. The action to declare trusted keys is also made into an explicit action on the repository.

Ideally, this would belong in a separate repository containing trusted maintainer identities in general. This could in the future include hosting-platform-provided identities, auto-generated, but for verification and historical records we should keep this separate.
@ivucica ivucica requested a review from rfm as a code owner June 10, 2025 15:33
@rfm rfm merged commit d033c5f into gnustep:master Jul 23, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants