A GitHub Action to import a GPG private key into a runner's keychain for signing commits, tags, and pushes.
ghaction-import-gpg is a GitHub Action that imports a GPG private key into a workflow runner's keychain. It solves the problem of automating cryptographic signing for Git operations like commits and tags within CI/CD pipelines, ensuring that automated changes are verifiable and trusted.
Developers and DevOps engineers who use GitHub Actions and need to sign Git commits, tags, or pushes automatically in their workflows, particularly in security-sensitive or compliance-driven projects.
Developers choose this action because it provides a straightforward, cross-platform way to integrate GPG signing into GitHub Actions without manual setup, with features like subkey support, Git configuration, and cleanup to maintain security and workflow efficiency.
GitHub Action to import a GPG key
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Works on Linux, macOS, and Windows GitHub Actions runners, as explicitly stated in the features, ensuring consistent behavior across different environments.
Automatically configures Git to sign commits, tags, and pushes with inputs like git_commit_gpgsign, reducing manual setup and boilerplate code in workflows.
Supports specifying a signing-only subkey via fingerprint, allowing for better security practices by limiting key usage, as detailed in the usage examples.
Purges imported GPG keys and kills gpg-agent post-execution, helping to prevent key leakage on shared runners, a feature highlighted in the README.
Requires users to generate and export GPG keys manually outside the action, adding complexity and potential errors in the initial setup process, as noted in prerequisites.
Exclusively designed for GitHub Actions, making it unsuitable for projects using other CI/CD systems or those planning to migrate away from GitHub's ecosystem.
Relies on GitHub Secrets for private keys and passphrases, which, if misconfigured or exposed, could lead to key compromise without built-in auditing or rotation features.