fix: GPG agent forwarding crash with SSH signing keys (#731)#732
fix: GPG agent forwarding crash with SSH signing keys (#731)#732
Conversation
|
Important Review skippedDraft detected. Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
If you're new to commit signing, there are different ways to set it up: Sign commits with
|
c6b235a to
1c85086
Compare
1c85086 to
07eff03
Compare
When the user has SSH-based commit signing configured (gpg.format=ssh), the GPG agent forwarding code no longer passes the SSH key path as --gitkey to setup-gpg. SSH signing keys are handled by the separate SSH signature helper path.
Setting user.signingKey in the container is optional — if it fails, GPG agent forwarding and the SSH server should still start. This prevents a bad signing key configuration from tearing down the entire tunnel.
Validates that workspace starts successfully when GPG agent forwarding is enabled and the host has gpg.format=ssh with an SSH signing key. This is the exact scenario reported in issue #731.
07eff03 to
52edd73
Compare
--gitkeytosetup-gpgwhengpg.format = ssh, since SSH signing keys are handled by the separate SSH signature helper pathsetup-gpgso a failure doesn't tear down the entire tunnel and kill the SSH serverFixes #731