all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
* guix git authenticate throws hard
@ 2022-10-26  2:33 jgart
  2022-10-26  5:21 ` Julien Lepiller
  0 siblings, 1 reply; 7+ messages in thread
From: jgart @ 2022-10-26  2:33 UTC (permalink / raw)
  To: Guix Devel

 guix git authenticate 95620d8845a75c9721876441e66bf28ba4a95eff jgart
Backtrace:
          11 (primitive-load "/home/jgart/.config/guix/current/bin/g…")
In guix/ui.scm:
   2263:7 10 (run-guix . _)
  2226:10  9 (run-guix-command _ . _)
In ice-9/boot-9.scm:
  1752:10  8 (with-exception-handler _ _ #:unwind? _ # _)
  1752:10  7 (with-exception-handler _ _ #:unwind? _ # _)
  1747:15  6 (with-exception-handler #<procedure 7f89c0e3bf30 at ic…> …)
In guix/channels.scm:
   164:10  5 (_)
In guix/base16.scm:
     71:7  4 (_ "a")
In unknown file:
           3 (string-fold #<procedure 7f89c0e3d4a0 at guix/base16.s…> …)
In guix/base16.scm:
    76:31  2 (_ _ 0)
In ice-9/boot-9.scm:
  1685:16  1 (raise-exception _ #:continuable? _)
  1685:16  0 (raise-exception _ #:continuable? _)

ice-9/boot-9.scm:1685:16: In procedure raise-exception:
In procedure bytevector-u8-set!: Argument 2 out of range: 0

WDYT


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: guix git authenticate throws hard
  2022-10-26  2:33 guix git authenticate throws hard jgart
@ 2022-10-26  5:21 ` Julien Lepiller
  2022-10-26  5:35   ` jgart
  0 siblings, 1 reply; 7+ messages in thread
From: Julien Lepiller @ 2022-10-26  5:21 UTC (permalink / raw)
  To: guix-devel, jgart

[-- Attachment #1: Type: text/plain, Size: 1174 bytes --]

From the manual: "signer is the OpenPGP fingerprint of public key used to sign commit.", but we should still catch this error :)

Le 26 octobre 2022 04:33:50 GMT+02:00, jgart <jgart@dismail.de> a écrit :
> guix git authenticate 95620d8845a75c9721876441e66bf28ba4a95eff jgart
>Backtrace:
>          11 (primitive-load "/home/jgart/.config/guix/current/bin/g…")
>In guix/ui.scm:
>   2263:7 10 (run-guix . _)
>  2226:10  9 (run-guix-command _ . _)
>In ice-9/boot-9.scm:
>  1752:10  8 (with-exception-handler _ _ #:unwind? _ # _)
>  1752:10  7 (with-exception-handler _ _ #:unwind? _ # _)
>  1747:15  6 (with-exception-handler #<procedure 7f89c0e3bf30 at ic…> …)
>In guix/channels.scm:
>   164:10  5 (_)
>In guix/base16.scm:
>     71:7  4 (_ "a")
>In unknown file:
>           3 (string-fold #<procedure 7f89c0e3d4a0 at guix/base16.s…> …)
>In guix/base16.scm:
>    76:31  2 (_ _ 0)
>In ice-9/boot-9.scm:
>  1685:16  1 (raise-exception _ #:continuable? _)
>  1685:16  0 (raise-exception _ #:continuable? _)
>
>ice-9/boot-9.scm:1685:16: In procedure raise-exception:
>In procedure bytevector-u8-set!: Argument 2 out of range: 0
>
>WDYT
>

[-- Attachment #2: Type: text/html, Size: 1472 bytes --]

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: guix git authenticate throws hard
  2022-10-26  5:21 ` Julien Lepiller
@ 2022-10-26  5:35   ` jgart
  2022-10-26  7:07     ` Julien Lepiller
  0 siblings, 1 reply; 7+ messages in thread
From: jgart @ 2022-10-26  5:35 UTC (permalink / raw)
  To: Julien Lepiller; +Cc: guix-devel

On Wed, 26 Oct 2022 07:21:35 +0200 Julien Lepiller <julien@lepiller.eu> wrote:
> From the manual: "signer is the OpenPGP fingerprint of public key used to sign commit.", but we should still catch this error :)

Is it possible to give the email instead of the fingerprint?

Deduce the fingerprint from the email?


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: guix git authenticate throws hard
  2022-10-26  5:35   ` jgart
@ 2022-10-26  7:07     ` Julien Lepiller
  2022-10-27  0:07       ` jgart
  0 siblings, 1 reply; 7+ messages in thread
From: Julien Lepiller @ 2022-10-26  7:07 UTC (permalink / raw)
  To: jgart; +Cc: guix-devel

[-- Attachment #1: Type: text/plain, Size: 490 bytes --]

It says fingerprint, so it's fingerprint. Using email or name would not be as secure.

Le 26 octobre 2022 07:35:20 GMT+02:00, jgart <jgart@dismail.de> a écrit :
>On Wed, 26 Oct 2022 07:21:35 +0200 Julien Lepiller <julien@lepiller.eu> wrote:
>> From the manual: "signer is the OpenPGP fingerprint of public key used to sign commit.", but we should still catch this error :)
>
>Is it possible to give the email instead of the fingerprint?
>
>Deduce the fingerprint from the email?

[-- Attachment #2: Type: text/html, Size: 890 bytes --]

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: guix git authenticate throws hard
  2022-10-26  7:07     ` Julien Lepiller
@ 2022-10-27  0:07       ` jgart
  2022-10-27  0:09         ` jgart
  2022-10-27  5:23         ` Julien Lepiller
  0 siblings, 2 replies; 7+ messages in thread
From: jgart @ 2022-10-27  0:07 UTC (permalink / raw)
  To: Julien Lepiller; +Cc: guix-devel

On Wed, 26 Oct 2022 09:07:57 +0200 Julien Lepiller <julien@lepiller.eu> wrote:
> It says fingerprint, so it's fingerprint. Using email or name would not be as secure.
> 
> Le 26 octobre 2022 07:35:20 GMT+02:00, jgart <jgart@dismail.de> a écrit :
> >On Wed, 26 Oct 2022 07:21:35 +0200 Julien Lepiller <julien@lepiller.eu> wrote:
> >> From the manual: "signer is the OpenPGP fingerprint of public key used to sign commit.", but we should still catch this error :)
> >
> >Is it possible to give the email instead of the fingerprint?
> >
> >Deduce the fingerprint from the email?

Julien and/or anyone else,

What do you think if we have a CLI flag for git authenticate that would
allow us to do this to authenticate the last 5 commits against the
3B1D7F19E36BB60C0F5B2CA9A52AA2B477B6DD35 fingerprint, for example:

guix git authenticate 3B1D7F19E36BB60C0F5B2CA9A52AA2B477B6DD35 -5

I've run into situations where I can't remember if I signed a commit or not. 

IWBC if I could just say authenticate the last commits against my
fingerprint instead of going one by one. If this already exists and is
not documented then we should definitely document that usage with an
example to let others know.

all best,

jgart


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: guix git authenticate throws hard
  2022-10-27  0:07       ` jgart
@ 2022-10-27  0:09         ` jgart
  2022-10-27  5:23         ` Julien Lepiller
  1 sibling, 0 replies; 7+ messages in thread
From: jgart @ 2022-10-27  0:09 UTC (permalink / raw)
  To: Julien Lepiller; +Cc: guix-devel

On Wed, 26 Oct 2022 19:07:40 -0500 jgart <jgart@dismail.de> wrote:
> On Wed, 26 Oct 2022 09:07:57 +0200 Julien Lepiller <julien@lepiller.eu> wrote:
> What do you think if we have a CLI flag for git authenticate

I meant `guix authenticate` not `git authenticate` ;()


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: guix git authenticate throws hard
  2022-10-27  0:07       ` jgart
  2022-10-27  0:09         ` jgart
@ 2022-10-27  5:23         ` Julien Lepiller
  1 sibling, 0 replies; 7+ messages in thread
From: Julien Lepiller @ 2022-10-27  5:23 UTC (permalink / raw)
  To: jgart; +Cc: guix-devel

[-- Attachment #1: Type: text/plain, Size: 1751 bytes --]

Commit signing is a git feature, so git itself can be used to check your last commits are signed:

git log --show-signature

This will look the same as git log if the commit is unsigned, and show the result of gpg —verify otherwise. Red background if unverified (eg. you don't have the public key) and green otherwise. This should zake it easy to spot whether you signed the last commits or not

Le 27 octobre 2022 02:07:40 GMT+02:00, jgart <jgart@dismail.de> a écrit :
>On Wed, 26 Oct 2022 09:07:57 +0200 Julien Lepiller <julien@lepiller.eu> wrote:
>> It says fingerprint, so it's fingerprint. Using email or name would not be as secure.
>> 
>> Le 26 octobre 2022 07:35:20 GMT+02:00, jgart <jgart@dismail.de> a écrit :
>> >On Wed, 26 Oct 2022 07:21:35 +0200 Julien Lepiller <julien@lepiller.eu> wrote:
>> >> From the manual: "signer is the OpenPGP fingerprint of public key used to sign commit.", but we should still catch this error :)
>> >
>> >Is it possible to give the email instead of the fingerprint?
>> >
>> >Deduce the fingerprint from the email?
>
>Julien and/or anyone else,
>
>What do you think if we have a CLI flag for git authenticate that would
>allow us to do this to authenticate the last 5 commits against the
>3B1D7F19E36BB60C0F5B2CA9A52AA2B477B6DD35 fingerprint, for example:
>
>guix git authenticate 3B1D7F19E36BB60C0F5B2CA9A52AA2B477B6DD35 -5
>
>I've run into situations where I can't remember if I signed a commit or not. 
>
>IWBC if I could just say authenticate the last commits against my
>fingerprint instead of going one by one. If this already exists and is
>not documented then we should definitely document that usage with an
>example to let others know.
>
>all best,
>
>jgart

[-- Attachment #2: Type: text/html, Size: 2436 bytes --]

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2022-10-27  5:24 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-10-26  2:33 guix git authenticate throws hard jgart
2022-10-26  5:21 ` Julien Lepiller
2022-10-26  5:35   ` jgart
2022-10-26  7:07     ` Julien Lepiller
2022-10-27  0:07       ` jgart
2022-10-27  0:09         ` jgart
2022-10-27  5:23         ` Julien Lepiller

Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.