Skip to content

Commit dce7b31

Browse files
adaszkogitster
authored andcommitted
ssh signing: better error message when key not in agent
When signing a commit with a SSH key, with the private key missing from ssh-agent, a confusing error message is produced: error: Load key "/var/folders/t5/cscwwl_n3n1_8_5j_00x_3t40000gn/T//.git_signing_key_tmpkArSj7": invalid format? fatal: failed to write commit object The temporary file .git_signing_key_tmpkArSj7 created by git contains a valid *public* key. The error message comes from `ssh-keygen -Y sign' and is caused by a fallback mechanism in ssh-keygen whereby it tries to interpret .git_signing_key_tmpkArSj7 as a *private* key if it can't find in the agent [1]. A fix is scheduled to be released in OpenSSH 9.1. All that needs to be done is to pass an additional backward-compatible option -U to 'ssh-keygen -Y sign' call. With '-U', ssh-keygen always interprets the file as public key and expects to find the private key in the agent. As a result, when the private key is missing from the agent, a more accurate error message gets produced: error: Couldn't find key in agent [1] https://bugzilla.mindrot.org/show_bug.cgi?id=3429 Signed-off-by: Adam Szkoda <[email protected]> Signed-off-by: Junio C Hamano <[email protected]>
1 parent 844ede3 commit dce7b31

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

gpg-interface.c

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -998,13 +998,15 @@ static int sign_buffer_ssh(struct strbuf *buffer, struct strbuf *signature,
998998
char *ssh_signing_key_file = NULL;
999999
struct strbuf ssh_signature_filename = STRBUF_INIT;
10001000
const char *literal_key = NULL;
1001+
int literal_ssh_key = 0;
10011002

10021003
if (!signing_key || signing_key[0] == '\0')
10031004
return error(
10041005
_("user.signingKey needs to be set for ssh signing"));
10051006

10061007
if (is_literal_ssh_key(signing_key, &literal_key)) {
10071008
/* A literal ssh key */
1009+
literal_ssh_key = 1;
10081010
key_file = mks_tempfile_t(".git_signing_key_tmpXXXXXX");
10091011
if (!key_file)
10101012
return error_errno(
@@ -1039,8 +1041,10 @@ static int sign_buffer_ssh(struct strbuf *buffer, struct strbuf *signature,
10391041
"-Y", "sign",
10401042
"-n", "git",
10411043
"-f", ssh_signing_key_file,
1042-
buffer_file->filename.buf,
10431044
NULL);
1045+
if (literal_ssh_key)
1046+
strvec_push(&signer.args, "-U");
1047+
strvec_push(&signer.args, buffer_file->filename.buf);
10441048

10451049
sigchain_push(SIGPIPE, SIG_IGN);
10461050
ret = pipe_command(&signer, NULL, 0, NULL, 0, &signer_stderr, 0);

0 commit comments

Comments
 (0)