-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
Problem
When a user needs to wipe and recreate their identity (e.g., during development or after key compromise), the process is manual and error-prone:
- Must manually
rm -rf ~/.authsto remove the old identity auths init --forcecreates a new identity but doesn't clean up stale data:- Old
refs/auths/registryrefs remain in repos with mismatched attestations - Old entries in
~/.ssh/allowed_signersaccumulate (though this is harmless) - Old SSH key files remain in
~/.ssh/ .auths/allowed_signersin repos still references the old key
- Old
- Must manually
git update-ref -d refs/auths/registryin each repo, then re-push - Multiple
auths initruns can accumulate broken attestations in the registry
Expected behavior
Provide a clean reset path:
auths resetorauths init --cleanthat:- Removes the old identity from
~/.auths - Cleans up
refs/auths/registryin the current repo - Updates
~/.ssh/allowed_signers(removes old entry, adds new) - Updates
.auths/allowed_signersin the current repo - Warns about other repos that may still reference the old identity
- Removes the old identity from
Context
During dogfooding, multiple identity recreations left stale attestations in the registry. The widget showed "InvalidSignature" because old attestations referenced a different identity's key. Had to manually git update-ref -d refs/auths/registry and re-init to fix.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels