]> git.ipfire.org Git - thirdparty/git.git/commitdiff
fast-import: add 'strip-if-invalid' mode to --signed-commits=<mode>
authorChristian Couder <christian.couder@gmail.com>
Wed, 5 Nov 2025 06:19:18 +0000 (07:19 +0100)
committerJunio C Hamano <gitster@pobox.com>
Wed, 5 Nov 2025 21:36:35 +0000 (13:36 -0800)
Tools like `git filter-repo`[1] use `git fast-export` and
`git fast-import` to rewrite repository history. When rewriting
history using one such tool though, commit signatures might become
invalid because the commits they sign changed due to the changes
in the repository history made by the tool between the fast-export
and the fast-import steps.

Having invalid signatures in a rewritten repository could be
confusing, so users rewritting history might prefer to simply
discard signatures that are invalid at the fast-import step.

To let them do that, let's add a new 'strip-if-invalid' mode to the
`--signed-commits=<mode>` option of `git fast-import`.

It would be interesting for the `--signed-tags=<mode>` option to
have this mode too, but we leave that for a future improvement.

It might also be possible for `git fast-export` to have such a mode
in its `--signed-commits=<mode>` and `--signed-tags=<mode>`
options, but the use cases for it are much less clear, so we also
leave that for possible future improvements.

For now let's just die() if 'strip-if-invalid' is passed to these
options where it hasn't been implemented yet.

While at it, let's also mark for translation some error messages
linked to the `--signed-commits=<mode>` and `--signed-tags=<mode>`
in `git fast-export`.

[1]: https://github.com/newren/git-filter-repo

Signed-off-by: Christian Couder <chriscool@tuxfamily.org>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
Documentation/git-fast-import.adoc
builtin/fast-export.c
builtin/fast-import.c
gpg-interface.c
gpg-interface.h
t/t9305-fast-import-signatures.sh

index b74179a6c891d5ad72ef34b89e47de8cdf53b100..c9e49497cd95fdf2d411a338ebfa4365a64a6607 100644 (file)
@@ -66,15 +66,25 @@ fast-import stream! This option is enabled automatically for
 remote-helpers that use the `import` capability, as they are
 already trusted to run their own code.
 
---signed-tags=(verbatim|warn-verbatim|warn-strip|strip|abort)::
-       Specify how to handle signed tags.  Behaves in the same way
-       as the same option in linkgit:git-fast-export[1], except that
-       default is 'verbatim' (instead of 'abort').
-
---signed-commits=(verbatim|warn-verbatim|warn-strip|strip|abort)::
-       Specify how to handle signed commits.  Behaves in the same way
-       as the same option in linkgit:git-fast-export[1], except that
-       default is 'verbatim' (instead of 'abort').
+`--signed-tags=(verbatim|warn-verbatim|warn-strip|strip|abort)`::
+       Specify how to handle signed tags. Behaves in the same way as
+       the `--signed-commits=<mode>` below, except that the
+       `strip-if-invalid` mode is not yet supported. Like for signed
+       commits, the default mode is `verbatim`.
+
+`--signed-commits=<mode>`::
+       Specify how to handle signed commits. The following <mode>s
+       are supported:
++
+* `verbatim`, which is the default, will silently import commit
+  signatures.
+* `warn-verbatim` will import them, but will display a warning.
+* `abort` will make this program die when encountering a signed
+  commit.
+* `strip` will silently make the commits unsigned.
+* `warn-strip` will make them unsigned, but will display a warning.
+* `strip-if-invalid` will check signatures and, if they are invalid,
+  will strip them and display a warning.
 
 Options for Frontends
 ~~~~~~~~~~~~~~~~~~~~~
index 7adbc55f0dccb1878071aeb8af45f9b39ce3bf4c..1ad195b639a5da9a9dd5c380a654e3f2c6ef0656 100644 (file)
@@ -797,12 +797,10 @@ static void handle_commit(struct commit *commit, struct rev_info *rev,
               (int)(committer_end - committer), committer);
        if (signatures.nr) {
                switch (signed_commit_mode) {
-               case SIGN_ABORT:
-                       die("encountered signed commit %s; use "
-                           "--signed-commits=<mode> to handle it",
-                           oid_to_hex(&commit->object.oid));
+
+               /* Exporting modes */
                case SIGN_WARN_VERBATIM:
-                       warning("exporting %"PRIuMAX" signature(s) for commit %s",
+                       warning(_("exporting %"PRIuMAX" signature(s) for commit %s"),
                                (uintmax_t)signatures.nr, oid_to_hex(&commit->object.oid));
                        /* fallthru */
                case SIGN_VERBATIM:
@@ -811,12 +809,25 @@ static void handle_commit(struct commit *commit, struct rev_info *rev,
                                print_signature(item->string, item->util);
                        }
                        break;
+
+               /* Stripping modes */
                case SIGN_WARN_STRIP:
-                       warning("stripping signature(s) from commit %s",
+                       warning(_("stripping signature(s) from commit %s"),
                                oid_to_hex(&commit->object.oid));
                        /* fallthru */
                case SIGN_STRIP:
                        break;
+
+               /* Aborting modes */
+               case SIGN_ABORT:
+                       die(_("encountered signed commit %s; use "
+                             "--signed-commits=<mode> to handle it"),
+                           oid_to_hex(&commit->object.oid));
+               case SIGN_STRIP_IF_INVALID:
+                       die(_("'strip-if-invalid' is not a valid mode for "
+                             "git fast-export with --signed-commits=<mode>"));
+               default:
+                       BUG("invalid signed_commit_mode value %d", signed_commit_mode);
                }
                string_list_clear(&signatures, 0);
        }
@@ -934,23 +945,34 @@ static void handle_tag(const char *name, struct tag *tag)
                size_t sig_offset = parse_signed_buffer(message, message_size);
                if (sig_offset < message_size)
                        switch (signed_tag_mode) {
-                       case SIGN_ABORT:
-                               die("encountered signed tag %s; use "
-                                   "--signed-tags=<mode> to handle it",
-                                   oid_to_hex(&tag->object.oid));
+
+                       /* Exporting modes */
                        case SIGN_WARN_VERBATIM:
-                               warning("exporting signed tag %s",
+                               warning(_("exporting signed tag %s"),
                                        oid_to_hex(&tag->object.oid));
                                /* fallthru */
                        case SIGN_VERBATIM:
                                break;
+
+                       /* Stripping modes */
                        case SIGN_WARN_STRIP:
-                               warning("stripping signature from tag %s",
+                               warning(_("stripping signature from tag %s"),
                                        oid_to_hex(&tag->object.oid));
                                /* fallthru */
                        case SIGN_STRIP:
                                message_size = sig_offset;
                                break;
+
+                       /* Aborting modes */
+                       case SIGN_ABORT:
+                               die(_("encountered signed tag %s; use "
+                                     "--signed-tags=<mode> to handle it"),
+                                   oid_to_hex(&tag->object.oid));
+                       case SIGN_STRIP_IF_INVALID:
+                               die(_("'strip-if-invalid' is not a valid mode for "
+                                     "git fast-export with --signed-tags=<mode>"));
+                       default:
+                               BUG("invalid signed_commit_mode value %d", signed_commit_mode);
                        }
        }
 
index 493de57ef67bfb4f6426290b3fe1f750a0738e9c..e2c6894461044b60a8ced860d8c866c841f63988 100644 (file)
@@ -2772,7 +2772,7 @@ static void add_gpgsig_to_commit(struct strbuf *commit_data,
 {
        struct string_list siglines = STRING_LIST_INIT_NODUP;
 
-       if (!sig->hash_algo)
+       if (!sig || !sig->hash_algo)
                return;
 
        strbuf_addstr(commit_data, header);
@@ -2827,6 +2827,45 @@ static void finalize_commit_buffer(struct strbuf *new_data,
        strbuf_addbuf(new_data, msg);
 }
 
+static void handle_strip_if_invalid(struct strbuf *new_data,
+                                   struct signature_data *sig_sha1,
+                                   struct signature_data *sig_sha256,
+                                   struct strbuf *msg)
+{
+       struct strbuf tmp_buf = STRBUF_INIT;
+       struct signature_check signature_check = { 0 };
+       int ret;
+
+       /* Check signature in a temporary commit buffer */
+       strbuf_addbuf(&tmp_buf, new_data);
+       finalize_commit_buffer(&tmp_buf, sig_sha1, sig_sha256, msg);
+       ret = verify_commit_buffer(tmp_buf.buf, tmp_buf.len, &signature_check);
+
+       if (ret) {
+               const char *signer = signature_check.signer ?
+                       signature_check.signer : _("unknown");
+               const char *subject;
+               int subject_len = find_commit_subject(msg->buf, &subject);
+
+               if (subject_len > 100)
+                       warning(_("stripping invalid signature for commit '%.100s...'\n"
+                                 "  allegedly by %s"), subject, signer);
+               else if (subject_len > 0)
+                       warning(_("stripping invalid signature for commit '%.*s'\n"
+                                 "  allegedly by %s"), subject_len, subject, signer);
+               else
+                       warning(_("stripping invalid signature for commit\n"
+                                 "  allegedly by %s"), signer);
+
+               finalize_commit_buffer(new_data, NULL, NULL, msg);
+       } else {
+               strbuf_swap(new_data, &tmp_buf);
+       }
+
+       signature_check_clear(&signature_check);
+       strbuf_release(&tmp_buf);
+}
+
 static void parse_new_commit(const char *arg)
 {
        static struct strbuf msg = STRBUF_INIT;
@@ -2878,6 +2917,7 @@ static void parse_new_commit(const char *arg)
                        warning(_("importing a commit signature verbatim"));
                        /* fallthru */
                case SIGN_VERBATIM:
+               case SIGN_STRIP_IF_INVALID:
                        import_one_signature(&sig_sha1, &sig_sha256, v);
                        break;
 
@@ -2962,7 +3002,11 @@ static void parse_new_commit(const char *arg)
                        "encoding %s\n",
                        encoding);
 
-       finalize_commit_buffer(&new_data, &sig_sha1, &sig_sha256, &msg);
+       if (signed_commit_mode == SIGN_STRIP_IF_INVALID &&
+           (sig_sha1.hash_algo || sig_sha256.hash_algo))
+               handle_strip_if_invalid(&new_data, &sig_sha1, &sig_sha256, &msg);
+       else
+               finalize_commit_buffer(&new_data, &sig_sha1, &sig_sha256, &msg);
 
        free(author);
        free(committer);
@@ -2984,9 +3028,6 @@ static void handle_tag_signature(struct strbuf *msg, const char *name)
        switch (signed_tag_mode) {
 
        /* First, modes that don't change anything */
-       case SIGN_ABORT:
-               die(_("encountered signed tag; use "
-                     "--signed-tags=<mode> to handle it"));
        case SIGN_WARN_VERBATIM:
                warning(_("importing a tag signature verbatim for tag '%s'"), name);
                /* fallthru */
@@ -3003,7 +3044,13 @@ static void handle_tag_signature(struct strbuf *msg, const char *name)
                strbuf_setlen(msg, sig_offset);
                break;
 
-       /* Third, BUG */
+       /* Third, aborting modes */
+       case SIGN_ABORT:
+               die(_("encountered signed tag; use "
+                     "--signed-tags=<mode> to handle it"));
+       case SIGN_STRIP_IF_INVALID:
+               die(_("'strip-if-invalid' is not a valid mode for "
+                     "git fast-import with --signed-tags=<mode>"));
        default:
                BUG("invalid signed_tag_mode value %d from tag '%s'",
                    signed_tag_mode, name);
index d1e88da8c1bfde442663b13409b02f06538a639e..fe653b246433b8d283d86f70307ea01121d65177 100644 (file)
@@ -1146,6 +1146,8 @@ int parse_sign_mode(const char *arg, enum sign_mode *mode)
                *mode = SIGN_WARN_STRIP;
        else if (!strcmp(arg, "strip"))
                *mode = SIGN_STRIP;
+       else if (!strcmp(arg, "strip-if-invalid"))
+               *mode = SIGN_STRIP_IF_INVALID;
        else
                return -1;
        return 0;
index 50487aa14832743e2d294893319c3bfa70332448..71dde8cb8074373894c159163e8e742a22cb8415 100644 (file)
@@ -111,6 +111,7 @@ enum sign_mode {
        SIGN_VERBATIM,
        SIGN_WARN_STRIP,
        SIGN_STRIP,
+       SIGN_STRIP_IF_INVALID,
 };
 
 /*
index c2b427165862d3cf68fc7facd53fadc93e16ad43..db77ace4723d7aae0a37c8d9cb96c5ffc76761e4 100755 (executable)
@@ -79,7 +79,7 @@ test_expect_success GPG 'setup a commit with dual OpenPGP signatures on its SHA-
        echo B >explicit-sha256/B &&
        git -C explicit-sha256 add B &&
        test_tick &&
-       git -C explicit-sha256 commit -S -m "signed" B &&
+       git -C explicit-sha256 commit -S -m "signed commit" B &&
        SHA256_B=$(git -C explicit-sha256 rev-parse dual-signed) &&
 
        # Create the corresponding SHA-1 commit
@@ -103,4 +103,120 @@ test_expect_success GPG 'strip both OpenPGP signatures with --signed-commits=war
        test_line_count = 2 out
 '
 
+test_expect_success GPG 'import commit with no signature with --signed-commits=strip-if-invalid' '
+       git fast-export main >output &&
+       git -C new fast-import --quiet --signed-commits=strip-if-invalid <output >log 2>&1 &&
+       test_must_be_empty log
+'
+
+test_expect_success GPG 'keep valid OpenPGP signature with --signed-commits=strip-if-invalid' '
+       rm -rf new &&
+       git init new &&
+
+       git fast-export --signed-commits=verbatim openpgp-signing >output &&
+       git -C new fast-import --quiet --signed-commits=strip-if-invalid <output >log 2>&1 &&
+       IMPORTED=$(git -C new rev-parse --verify refs/heads/openpgp-signing) &&
+       test $OPENPGP_SIGNING = $IMPORTED &&
+       git -C new cat-file commit "$IMPORTED" >actual &&
+       test_grep -E "^gpgsig(-sha256)? " actual &&
+       test_must_be_empty log
+'
+
+test_expect_success GPG 'strip signature invalidated by message change with --signed-commits=strip-if-invalid' '
+       rm -rf new &&
+       git init new &&
+
+       git fast-export --signed-commits=verbatim openpgp-signing >output &&
+
+       # Change the commit message, which invalidates the signature.
+       # The commit message length should not change though, otherwise the
+       # corresponding `data <length>` command would have to be changed too.
+       sed "s/OpenPGP signed commit/OpenPGP forged commit/" output >modified &&
+
+       git -C new fast-import --quiet --signed-commits=strip-if-invalid <modified >log 2>&1 &&
+
+       IMPORTED=$(git -C new rev-parse --verify refs/heads/openpgp-signing) &&
+       test $OPENPGP_SIGNING != $IMPORTED &&
+       git -C new cat-file commit "$IMPORTED" >actual &&
+       test_grep ! -E "^gpgsig" actual &&
+       test_grep "stripping invalid signature" log
+'
+
+test_expect_success GPG 'keep valid dual OpenPGP signatures with --signed-commits=strip-if-invalid' '
+       rm -rf new &&
+       git init new &&
+
+       git -C explicit-sha256 fast-export --signed-commits=verbatim dual-signed >output &&
+       git -C new fast-import --quiet --signed-commits=strip-if-invalid <output >log 2>&1 &&
+
+       git -C new cat-file commit refs/heads/dual-signed >actual &&
+       test_grep -E "^gpgsig " actual &&
+       test_grep -E "^gpgsig-sha256 " actual &&
+       test_must_be_empty log &&
+
+       IMPORTED=$(git -C new rev-parse refs/heads/dual-signed) &&
+       if test "$GIT_DEFAULT_HASH" = "sha1"
+       then
+               test $SHA1_B = $IMPORTED
+       else
+               test $SHA256_B = $IMPORTED
+       fi
+'
+
+test_expect_success GPG 'strip both invalid dual OpenPGP signatures with --signed-commits=strip-if-invalid' '
+       rm -rf new &&
+       git init new &&
+
+       git -C explicit-sha256 fast-export --signed-commits=verbatim dual-signed >output &&
+
+       # Change the commit message, which invalidates the signature.
+       # The commit message length should not change though, otherwise the
+       # corresponding `data <length>` command would have to be changed too.
+       sed "s/signed commit/forged commit/" output >modified &&
+
+       git -C new fast-import --quiet --signed-commits=strip-if-invalid <modified >log 2>&1 &&
+
+       git -C new cat-file commit refs/heads/dual-signed >actual &&
+       test_grep ! -E "^gpgsig " actual &&
+       test_grep ! -E "^gpgsig-sha256 " actual &&
+
+       IMPORTED=$(git -C new rev-parse refs/heads/dual-signed) &&
+       if test "$GIT_DEFAULT_HASH" = "sha1"
+       then
+               test $SHA1_B != $IMPORTED
+       else
+               test $SHA256_B != $IMPORTED
+       fi &&
+
+       test_grep "stripping invalid signature" log
+'
+
+test_expect_success GPGSM 'keep valid X.509 signature with --signed-commits=strip-if-invalid' '
+       rm -rf new &&
+       git init new &&
+
+       git fast-export --signed-commits=verbatim x509-signing >output &&
+       git -C new fast-import --quiet --signed-commits=strip-if-invalid <output >log 2>&1 &&
+       IMPORTED=$(git -C new rev-parse --verify refs/heads/x509-signing) &&
+       test $X509_SIGNING = $IMPORTED &&
+       git -C new cat-file commit "$IMPORTED" >actual &&
+       test_grep -E "^gpgsig(-sha256)? " actual &&
+       test_must_be_empty log
+'
+
+test_expect_success GPGSSH 'keep valid SSH signature with --signed-commits=strip-if-invalid' '
+       rm -rf new &&
+       git init new &&
+
+       test_config -C new gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
+
+       git fast-export --signed-commits=verbatim ssh-signing >output &&
+       git -C new fast-import --quiet --signed-commits=strip-if-invalid <output >log 2>&1 &&
+       IMPORTED=$(git -C new rev-parse --verify refs/heads/ssh-signing) &&
+       test $SSH_SIGNING = $IMPORTED &&
+       git -C new cat-file commit "$IMPORTED" >actual &&
+       test_grep -E "^gpgsig(-sha256)? " actual &&
+       test_must_be_empty log
+'
+
 test_done