I think gpg signing of commits is a good practice. It also strongly
discourages rebasing on master and release branches, which is also a good
thing. On ORC, we try to sign all of our commits.

.. Owen

On Fri, Feb 24, 2017 at 3:36 AM, Steve Loughran <ste...@hortonworks.com>
wrote:

>
> For the next few days I'm experimenting with the -S option on signing
> commits, which tells git to ask gpg to sign the commit, which will then
> somehow get the little yubikey plugged into my laptop to do the signing
>
> Because I've uploaded the public bit of the key to my github repo, Github
> can authenticate that it really was me doing the commit
>
> https://github.com/apache/hadoop/commit/9c22a91662af24569191ce45289ef8
> 266e8755cc
>
> and, if i'm trusted in your keyring, a git log --show-signature
>
>  git log --show-signature 9c22a91662
> commit 9c22a91662af24569191ce45289ef8266e8755cc
> gpg: Signature made Fri 24 Feb 10:41:40 2017 GMT
> gpg:                using RSA key 950CC3E032B79CA2
> gpg: Good signature from "Steve Loughran <ste...@apache.org<mailto:stev
> e...@apache.org>>" [ultimate]
> Author: Steve Loughran <ste...@apache.org<mailto:ste...@apache.org>>
> Date:   Fri Feb 24 10:41:36 2017 +0000
>
>     HADOOP-14114 S3A can no longer handle unencoded + in URIs. Contributed
> by Sean Mackrory.
>
>     (cherry picked from commit ff87ca84418a710c6dc884fe8c70947fcc6489d5)
>
> You ca also use GPG to sign a tag, then use git verify-tag to check the
> signature; this stops anyone being able to silently move a tag: you can
> move a tag, but then it's signature is invalid
>
> Will it help make our code and development process more secure? Not
> really, not if our build depends on pulling down artfacts from random
> places with an MD5 or SHA1 validation *at best*. And signing patches
> doesn't magically make the code inside secure. But it does at least add
> some chain of provenance to who actually put stuff in, rather than the
> logged committer of any patch being whoever that user chose to declare
> themselves to be.
>
> I'm only doing this for the never-rebased branches, and of course when
> something gets cherry picked, the signature becomes invalid. I'll decide
> after a week or two whether its a viable process. The opinions/experience
> of others would be useful here
>
> -Steve
>
> ps, key in question: https://pgp.mit.edu/pks/lookup?op=get&search=
> 0x950CC3E032B79CA2
>
>
>

Reply via email to