-
Notifications
You must be signed in to change notification settings - Fork 3
Description
This I don't have a proposal on other than what I did for https://github.com/hashbang/git-signatures which is a .gitsigners file that declares all the trusted keys for that repo that a tool can validate against.
While we are making standards, it might be a good idea to decide this too.
The current solution I am using is a ".gitsigners" file. Only the .gitsigners file that is currently in master is trusted (thus must do code review, and signing process to get new trusted signers put in).
Example: https://github.com/hashbang/git-signatures/blob/master/.gitsigners
This is a stupidly simple setup where just one whitelisted signing key per line. It does not have a concept of recommended number if signatures expected for trust on this repo, or defining different signing roles such as maintainer, ci, etc. We have support in git-signatures today for validating against different trustdbs, but it would be helpful to have indication on how to build those trustdbs on the fly from groupings of public keys in a configuration file in the root of the repo at a minimum.
Suddenly this becomes a json vs something else debate again as potentially we want to include more future data about signers, or default verification modes expected for a fiven repo. We could also maybe take hints from .gitmodules file and format it like that (but harder to parse).
Would love others thoughts on this in general!