Skip to content

Commit 9fb391b

Browse files
FStelzergitster
authored andcommitted
ssh signing: clarify trustlevel usage in docs
facca53 added verification for ssh signatures but incorrectly described the usage of gpg.minTrustLevel. While the verifications trustlevel is stil set to fully or undefined depending on if the key is known or not it has no effect on the verification result. Unknown keys will always fail verification. This commit updates the docs to match this behaviour. Signed-off-by: Fabian Stelzer <[email protected]> Signed-off-by: Junio C Hamano <[email protected]>
1 parent 9d12546 commit 9fb391b

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

Documentation/config/gpg.txt

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,7 @@ gpg.ssh.allowedSignersFile::
5252
SSH has no concept of trust levels like gpg does. To be able to differentiate
5353
between valid signatures and trusted signatures the trust level of a signature
5454
verification is set to `fully` when the public key is present in the allowedSignersFile.
55-
Therefore to only mark fully trusted keys as verified set gpg.minTrustLevel to `fully`.
56-
Otherwise valid but untrusted signatures will still verify but show no principal
57-
name of the signer.
55+
Otherwise the trust level is `undefined` and git verify-commit/tag will fail.
5856
+
5957
This file can be set to a location outside of the repository and every developer
6058
maintains their own trust store. A central repository server could generate this

0 commit comments

Comments
 (0)