by notkaiho on 3/2/24, 10:49 PM with 12 comments
by fragmede on 3/3/24, 1:20 AM
by nusl on 3/3/24, 12:04 AM
What I gathered was that the author believes signing commits to be bad because;
1. It adds complexity that you otherwise don’t need
2. GitHub is the only place that cares or enables this and we don’t want to add to their Git monopoly
3. Signing the commit does little in reality since it doesn’t affect anything other than “Verified” on GitHub
4. Something about signatures being permanent?
Honestly I don’t get the argument. It’s not useless, not hard to set up, and not hard to maintain. You can initially lock yourself out of committing if you mess it up but usually it won’t lock you out. The extra assurance that someone signed the commit with a key that only they should have is really good if you care about that. That means someone can’t just spoof your name (which is very easy with Git) and sneak changes in more easily.
Humans are still a key part of working around source control. That means there is trust involved, and code is pretty sensitive. Folks now are also more distributed and it’s harder to control where they access work systems from, or if that environment is secure (eg coffee shop over VPN does little if you leave your computer unlocked and get up to get a refill). Any extra assurance can be meaningful, specially if it’s around your code.
If you want something to take more concrete action you can enforce that a bot reject any work with unsigned commits present. Your CI can do that quite trivially even.
It’s not perfect but it’s also, IMO, the future. GitHub supports it now but others will in time (or do). Then GitHub will have trained people to get it working and you don’t need to learn it again.
Long article for not really saying much.
by yogorenapan on 3/3/24, 2:16 AM
This is completely untrue. GitLab does this. GitTea does this. You can do this manually in the command line.
I don’t think the author knows that they’re talking about.
by fargle on 3/3/24, 2:54 AM