Skip to content

Configuration Format #5

@lrvick

Description

@lrvick

This I don't have a proposal on other than what I did for https://github.com/hashbang/git-signatures which is a .gitsigners file that declares all the trusted keys for that repo that a tool can validate against.

While we are making standards, it might be a good idea to decide this too.

The current solution I am using is a ".gitsigners" file. Only the .gitsigners file that is currently in master is trusted (thus must do code review, and signing process to get new trusted signers put in).

Example: https://github.com/hashbang/git-signatures/blob/master/.gitsigners

This is a stupidly simple setup where just one whitelisted signing key per line. It does not have a concept of recommended number if signatures expected for trust on this repo, or defining different signing roles such as maintainer, ci, etc. We have support in git-signatures today for validating against different trustdbs, but it would be helpful to have indication on how to build those trustdbs on the fly from groupings of public keys in a configuration file in the root of the repo at a minimum.

Suddenly this becomes a json vs something else debate again as potentially we want to include more future data about signers, or default verification modes expected for a fiven repo. We could also maybe take hints from .gitmodules file and format it like that (but harder to parse).

Would love others thoughts on this in general!

Metadata

Metadata

Assignees

No one assigned

    Labels

    blockedBlocked on another issue

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions