Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support ssh-agent and external sign binaries for commit signing with ssh #2464

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

chirpcel
Copy link

@chirpcel chirpcel commented Jan 4, 2025

This Pull Request fixes/closes #2188.

It changes the following:

  • Respect configuration for alternative signing binary (for example 1Password ssh agent)
  • Using ssh-keygen for ssh signing operation to support ssh-agent
    • additional: sharing same implementation for default & configured binary

I followed the checklist:

  • I added unittests
  • I ran make check without errors
  • I tested the overall application
  • I added an appropriate item to the changelog

@chirpcel chirpcel force-pushed the feature/external-ssh-signer branch from 14f71cc to ebd8fc1 Compare January 4, 2025 22:22
@chirpcel chirpcel marked this pull request as ready for review January 4, 2025 22:23
@chirpcel
Copy link
Author

chirpcel commented Jan 4, 2025

There's one drawback. Like before, we don't support encrypted private keys which are not loaded to agent. The error message isn't as clear as before, but from a functionality point of view it isn't different. I would make a new issue for this behavior and take a look into supporting encrypted private keys.

@extrawurst
Copy link
Collaborator

The error message isn't as clear as before

cant we make it as clear as before and then followup

supporting encrypted private keys.

@chirpcel
Copy link
Author

chirpcel commented Jan 6, 2025

Actually I didn't figured out how to capture the passphrase prompt, as it's spawned directly on the tty.
But I just have an Idea, maybe we could provide an empty passphrase as arg to skip the password prompt and map the "wrong passphrase" error to the previous error message.
I'll take a look at it today.

@chirpcel
Copy link
Author

chirpcel commented Jan 6, 2025

@extrawurst Worked, we now have a meaningful error message. I tested with 1Password SSH-Agent, Default SSH-Agent, non encrypted keys on disk and encrypted keys on disk.

@chirpcel chirpcel force-pushed the feature/external-ssh-signer branch from 9d934d6 to 19f0891 Compare January 11, 2025 09:06
@chirpcel chirpcel force-pushed the feature/external-ssh-signer branch from 19f0891 to 004b135 Compare January 15, 2025 20:17
@DaRacci
Copy link

DaRacci commented Feb 22, 2025

Any movement on this?

This would allow me to use gitui without needing to fallback to shell to actually commit.

@chirpcel
Copy link
Author

@DaRacci Think maintainer is currently busy as asking for co-maintainers and migrating his repo to an org for better support by more people.
For now you can compile yourself with applied pr as I do or wait.

@naseschwarz naseschwarz self-requested a review March 20, 2025 15:39
Copy link
Contributor

@naseschwarz naseschwarz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey @chirpcel. Thank you for this implementation. I support this fully and agree that this should be the way commit signing is implemented at the moment. It is almost in compliance with git commit's implementation. Where changes will be required for currently unsupported git commit signing features, I have remarked them in this review. I wouldn't say that these are blockers, though.

I also have minor questions and nitpicks, mostly about corner cases, here and there and some FYIs.

On which platforms have you tested this? I have tested it on Linux and it works as promised. It would be great if someone tested this on Windows and Mac, too, though. (A test should consist of at least signing a commit and checking whether that commit's signature can be validated.)

Comment on lines +305 to +307
if &self.program == "ssh-keygen" {
cmd.arg("-P").arg("\"\"");
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Huh, ssh-keygen's documentation reads as if -P isn't supported, but it obviously works. Cool. So this is just an FYI:

-U is also a valid and documented option and ensures that ssh-keygen exits with an error message instead of prompting for a password:
image

I'm fine with either, I suppose. Just be aware that, should we ever allow stdin/stdout interacting with signing tools, I guess we will need to switch to -U if we want to conform with git's behavior, which is (a) prompting for passwords if files are provided as keys and there's no private key in the agent and (b) requiring an SSH agent to provide the private key if the public key is literal.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems like a more clean solution for me. I'll like to change it to that way

signing_key: &str,
) -> Result<PathBuf, SignBuilderError> {
let key_path = PathBuf::from(signing_key);
if signing_key.starts_with("ssh-") {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Comment on lines +196 to +198
let temp_file = temp_file.keep().map_err(|err| {
SignBuilderError::SSHSigningKey(err.to_string())
})?;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be nice if we would not clutter /tmp with public keys in case a handled error occurs before you get to remove it later on. Maybe we can keep the NamedTempFile instance around in SSHSign?

Comment on lines +328 to +334
let tmp_path = std::env::temp_dir();
if self.signing_key.starts_with(tmp_path) {
// Not handling error, as its not that bad. OS maintenance tasks will take care of it at a later point.
let _ = std::fs::remove_file(PathBuf::from(
&self.signing_key,
));
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd like to argue in favor of not deleting keys just because they start with the temporary files prefix. 😅

(See also my remark above. Keeping the NamedTempFile instance around solves this.)

.arg("-f")
.arg(&self.signing_key);

if &self.program == "ssh-keygen" {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, I don't really understand why you only pass -P if this condition is fulfilled.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cause there are some implementations which doesn't support empty -P with fallback to agent. For example the 1Password SSH-Agent and it's cli op-sign throws an error in that case. On default ssh-keygen its tested to work but it hasn't to be on 3rd parties.

@chirpcel
Copy link
Author

Thanks @naseschwarz for your cr! I commited your suggestions and commented on questions. I'll take a look at the remaining annotations of edge cases/optimizations. I'll update the pr soon.

I've tested the implementation on linux and macOS. Windows currently missing, maybe I can test it in a VM. Currently don't know about license/activation. Keep you updated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[ssh signing] support custom signing program
4 participants