-
Notifications
You must be signed in to change notification settings - Fork 348
Description
SSH signed commits can be verified locally using gpg.ssh.allowedsignersfile. (https://git-scm.com/docs/git-config#Documentation/git-config.txt-gpgsshallowedSignersFile)
SourceGit appears to display all SSH signed commits as "Good signature with unknown validity". That message does not seem to make sense for SSH signing. As far as I know a SSH signature is either valid, invalid, or cannot be checked at all because the corresponding public key is unknown.
Git only assigns G and U to SSH signatures.
"To be able to differentiate between valid signatures and trusted signatures the trust level of a signature verification is set to
fullywhen the public key is present in the allowedSignersFile. Otherwise the trust level isundefinedand git verify-commit/tag will fail."
(https://git-scm.com/docs/git-config#Documentation/git-config.txt-gpgsshallowedSignersFile)
If GPG and SSH signatures can be differentiated, I think SSH signatures with U should be marked as "unverified" and SSH signatures with G should be marked as "verified".
Example current implementation
Here is an example. (I took that command from another issue where gpg signatures were discussed #614 (comment))
$ git log --decorate=full --pretty=format:"%H %G?"
638081867bda9fb1f95e39e51c49595453d8d718 G
456295604aaec346fc64cb6c871ed337584870fc U
Suggestion
