Currently, GPG based signature configuration is not respected by default, even though users would expect commits to be created just like Git would.
For instance, creating a commit in a virtual branch and pushing that will cause the commit to be unsigned, even if the user configured commit signatures, i.e.:
[user]
name = User
email = user@example.com
signingkey = 4D90A8D52B4321F7
[commit]
gpgsign = true
Right now there is an option (default off) to sign with a locally generated key…
…but using that wouldn't imply that it is trusted by other parties.
Sources of Confusion
- The "Use Git executable" authentication method actually affects how to fetch and push, with
auth* being implied. Users may think that this rather means to use Git for all (or most) operations so that their settings would be respected no matter what.
Related Issues
Currently, GPG based signature configuration is not respected by default, even though users would expect commits to be created just like Git would.
For instance, creating a commit in a virtual branch and pushing that will cause the commit to be unsigned, even if the user configured commit signatures, i.e.:
Right now there is an option (default off) to sign with a locally generated key…
…but using that wouldn't imply that it is trusted by other parties.
Sources of Confusion
auth*being implied. Users may think that this rather means to use Git for all (or most) operations so that their settings would be respected no matter what.Related Issues