hibby writes ("Bug#1115500: git-debpush should override git -c gpg.format"):
> Yep, gpg.format and user.signingkey are both set for the ssh,
> belt-and-braces would be to override both.

git-debpush doesn't currently *know* what to override
user.signingkey with.

I think probably the right answer *for this bug* is to override
gpg.format and then if the user has *also* set a user.signingkey and
doesn't override the key[1] then the attempt to make a signature will
fail?

[1] I mean, override uusing a currently-hypothetical option like in
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108267#40
so really I mean it will always fail.

An alternative could be to *inspect* gpg.format and fail if we don't
like the answer and no key override was found.

I guess it could *unset* user.signingkey if if finds itself overriding
gpg.format?  This all seems like too much (a) magic (b) violence.

> I had a read earlier based on your email, food for thought. 

Mmm.

> Salsa/Gitlab incentivises signing commits with verified badges - https://
> salsa.debian.org/help/user/project/repository/signed_commits/ssh.md, 

I quite understand why you followed their lead on this, but I'm afraid
my opinion about this is something like:

Idiotic corporations under pressure to Do Something about "Supply
Chain Security" (spit) add feature which is almost no work for them
but asks for extra work from floss maintainers, without consideration
of whether the feature is just useless "magic security sprinkles", or
indeed, much consideration of anything.

(Many will read that and say "story of a security engineer's life".)

Ian.

Reply via email to