hanko keeps your Git allowed signers file up to date with signing keys configured on software development platforms like GitHub and GitLab.
Usage
Keeps your Git allowed signers file up to date with signing keys configured on software development platforms like GitHub and GitLab.
Usage: hanko [OPTIONS] <COMMAND>
Commands:
update Update the allowed signers file
signer Manage allowed signers
help Print this message or the help of the given subcommand(s)
Options:
-c, --config <PATH> The configuration file [env: HANKO_CONFIG=]
--file <PATH> The allowed signers file [env: HANKO_ALLOWED_SIGNERS=]
-v, --verbose... Use verbose output
-h, --help Print help
-V, --version Print version
Quickstart
&&
This will install hanko using cargo, create a configuration file containing a single allowed signer and update the allowed signers file accordingly. For other installation methods see installation.
Adding an allowed signer
To use hanko, a set of signers to track need to be configured first.
For starters, we'll add the GitHub user octocat with a single principal octocat@github.com.
Since we didn't have a configuration file yet, hanko went ahead and created one for us in the default location at ~/.config/hanko/config.toml, containing our newly added signer.
[[]]
= "octocat"
= ["octocat@github.com"]
Given that we told hanko not to touch the allowed signers file yet using the --no-update argument, it is left as-is. We'll update it in the next step.
[!TIP] Should you prefer to create the configuration file by hand, head to Configuration.
Updating the allowed signers file
Now that we've configured at least one signer, it's time to update the Git allowed signers file with their signing keys.
If an allowed signers file is configured in Git, hanko will write to that file.
Should no allowed signers file be configured within Git, or should you want to specify a different path, the --file runtime option may be used.
Our allowed signers file now contains all signing keys configured by octocat under the principal octocat@github.com.
octocat@github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN3ZSWa2S+RI/GdKi6WXl4k+FZ8ecAo0H2dtfLRWuhIs
octocat@github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILSK47p5e3KlWAqe1yPkPZUSK3TJVJUzLqKdaPq/ClOa
Any commits made by octocat with the email octocat@github.com and signed by one of their signing keys will now be considered as valid by Git.
Installation
Using Cargo
Or using cargo binstall should you prefer not to build yourself.
Using Homebrew
brew install srv6d/tap/hanko
Using Nix
nix-env -f channel:nixpkgs-unstable -iA hanko
Using Flox
flox install hanko
Using Apt on Debian based Linux
Add the apt.cli.rs repository, after which you can install hanko like any other system package.
sudo apt install hanko
Alternatively, static deb packages are also available for every release.
Using Docker
From scratch docker images are built and attested in CI for every release and are available through the GitHub container registry for this repository.
Using pre-built binaries
Binaries for most platforms are built and attested in CI and are available for every release.
Verifying Binaries and Release Assets
All release assets are built in CI and utilize Build Provenance Attestation, providing a way to cryptographically verify the build instructions, environment and git revision used in the process.
You can verify a release asset using the gh CLI.
Alternatively, using the sigstore cosign CLI, after downloading the appropriate attestation.
Configuration
Signers
Signers are the individuals or entities whose signing keys you want to track and include in your allowed signers file so they can be used to verify the authenticity and integrity of commits and tags. When a commit or tag is signed, Git uses the matching principal's public key to verify its authenticity. Each signer can have multiple principals (email addresses) and can be associated with multiple sources.
Options
name: The username of the signer on the given sources.principals: A list of email addresses associated with the signer. Used by Git to associate a commit with an allowed signer.sources(optional): A list of sources exposing the signers public keys. Defaults to GitHub if not specified.
Example
[[]]
= "torvalds"
= ["torvalds@linux-foundation.org"]
= ["github"]
Sources
Sources provide the public keys of allowed signers. Currently any source that is API compatible to either GitHub or GitLab is supported. If you are missing a source, don't hesitate to open an issue or give it a try yourself, as they are fairly trivial to implement. To use a source other than github.com or gitlab.com, e.g. a self-hosted GitLab instance, use the configuration options described below.
Options
name: The name of the source.provider: The type of the source. Eithergithuborgitlab.url: The URL of the source's API endpoint.
Example
[[]]
= "acme-corp"
= "gitlab"
= "https://git.acme.corp"
Full Example
Putting it all together, the following example configures two allowed signers, the first one using the default GitHub source, while the second uses a company specific GitLab instance.
[[]]
= "torvalds"
= ["torvalds@linux-foundation.org"]
[[]]
= "cwoods"
= ["cwoods@acme.corp"]
= ["acme-corp"]
[[]]
= "acme-corp"
= "gitlab"
= "https://git.acme.corp"
Optional Features
The following cargo features can be used to enable additional functionality.
- detect-allowed-signers (enabled by default): Enables use of the gix-config crate to detect the location of the allowed signers file from Git configuration.
Contributing
Contributions of all sizes that improve hanko in any way, be it DX/UX, documentation, performance or other are highly appreciated.
To get started, please read the contribution guidelines. Before starting work on a new feature you would like to contribute that may impact simplicity, reliability or performance, please open an issue first.
License
The source code of this project is licensed under the MIT License. For more information, see LICENSE.