782

I followed few articles over the pretty attributes on Git 2.10 release note. Going through which upgraded the git to 2.10.0 and made changes to global .gitconfig resulting as follows -

[filter "lfs"] clean = git-lfs clean %f smudge = git-lfs smudge %f required = true [user] name = xyz email = [email protected] signingkey = AAAAAAA [core] excludesfile = /Users/xyz/.gitignore_global editor = 'subl' --wait [difftool "sourcetree"] cmd = opendiff \"$LOCAL\" \"$REMOTE\" path = [mergetool "sourcetree"] cmd = /Applications/SourceTree.app/Contents/Resources/opendiff-w.sh \"$LOCAL\" \"$REMOTE\" -ancestor \"$BASE\" -merge \"$MERGED\" trustExitCode = true [alias] lg = log --graph --pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' --abbrev-commit --date=relative [color "diff"] old = red strike new = green italic 

But now that I try to sign my commits using

git commit -a -S -m "message" 

I get to see the following error -

You need a passphrase to unlock the secret key for

user: "XYZ (Digitally Signed) "

2048-bit RSA key, ID AAAAAAAA, created 2016-07-01

error: gpg failed to sign the data fatal: failed to write commit object

Note - I can still commit changes using git commit -a -m "message"

Is there a way to overcome the same? Or any change required in gpg configs to get along with the upgradation of git?


Update 1

Also seeking further usefulness, following Is there a way to "autosign" commits in Git with a GPG key?. I've already configured the key using

git config --global user.signingkey ED5CDE14(with my key) git config --global commit.gpgsign true 

and quite obviously getting the same error anyway.

12
  • 5
    I face similar issue. I uninstalled Git 2.8 (git-scm) on Windows. And installed 2.10. Now I get gpg failed to sign the data every time I use -S. In 2.8, I can sign a commit without problem. I don't know what happen. Commented Sep 16, 2016 at 15:30
  • 12
    Adding user.signingkey fixed my issue, strangely enough. Commented Mar 22, 2017 at 3:34
  • 3
    An irony, I'd changed my machine to set up things afresh and ended up looking for my own question and none of the suggested solution looks clean enough to me to just get started simply. Commented Mar 15, 2018 at 4:11
  • 77
    Try gpgconf --kill gpg-agent as discussed here Commented Mar 8, 2019 at 22:38
  • 18
    Make sure that git config --get-all user.name and git config --get-all user.email are same as key used for signing, which can be checked via gpg -K --keyid-format SHORT Commented Apr 16, 2020 at 15:13

55 Answers 55

1040
+100

I ran into this issue with macOS.

Original answer:

It seems like a gpg update (of brew) changed to location of gpg to gpg1, you can change the binary where git looks up the gpg:

git config --global gpg.program gpg1 

If you don't have gpg1: brew install gpg1.

Updated answer:

It looks like gpg1 is being deprecated/"gently nudged out of usage", so you probably should actually update to gpg2, unfortunately this involves quite a few more steps/a bit of time:

brew upgrade gnupg # This has a make step which takes a while brew link --overwrite gnupg brew install pinentry-mac echo "pinentry-program $(brew --prefix)/bin/pinentry-mac" >> ~/.gnupg/gpg-agent.conf killall gpg-agent 

The first part installs gpg2, and latter is a hack required to use it. For troubleshooting, see this answer (though that is about linux not brew), it suggests a good test:

echo "test" | gpg --clearsign # on linux it's gpg2 but brew stays as gpg 

If this test is successful (no error/output includes PGP signature), you have successfully updated to the latest gpg version.

You should now be able to use git signing again!
It's worth noting you'll need to have:

git config --global gpg.program gpg # perhaps you had this already? On linux maybe gpg2 git config --global commit.gpgsign true # if you want to sign every commit 

Note: After you've run a signed commit, you can verify it signed with:

git log --show-signature -1 

which will include gpg info for the last commit.

Sign up to request clarification or add additional context in comments.

32 Comments

Setting gpg.program to /usr/local/bin/gpg (no "1") fixed it for me.
It seems an update of gnupg2 with brew messed with symlinks thus gpg was removed, I had fix links using brew link --overwrite gnupg2.
hm... doesn't work. still gives my error with signing in xcode.
killall gpg-agent && gpg-agent --daemon --use-standard-socket --pinentry-program /usr/local/bin/pinentry finally fixed it for me
It only worked with me when i used the short ID git config --global user.signingkey <short Key ID> 😖.
|
813
+150

If gnupg2 and gpg-agent 2.x are used, be sure to set the environment variable GPG_TTY.

export GPG_TTY=$(tty) 

See GPG’s documentation about common problems.

13 Comments

If using fish, put set -x GPG_TTY (tty) on your profile.
I added the variable to ~/.zshrc and I can make commits again, now that it connects correctly to the terminal. Thanks for all your help!
This is also in the GitHub instructions: help.github.com/articles/telling-git-about-your-gpg-key
This is what I needed for WSL2.
zsh users with Powerlevel10k with Instant Prompt enabled beware, you might end up with a not a tty value: unix.stackexchange.com/a/608921/5095. A quick workaround is to just use a much faster and safer (in the context of Zsh): export GPG_TTY=$TTY.
|
542

GIT_TRACE=1 shows what git is actually doing:

$ GIT_TRACE=1 git commit -m "example commit message" 20:52:58.902766 git.c:328 trace: built-in: git 'commit' '-vvv' '-m' 'example commit message' 20:52:58.918467 run-command.c:626 trace: run_command: 'gpg' '--status-fd=2' '-bsau' '23810377252EF4C2' error: gpg failed to sign the data fatal: failed to write commit object 

Now run the failing command manually:

$ echo "dummy" | gpg -bsau 23810377252EF4C2 gpg: skipped "23810377252EF4C2": Unusable secret key gpg: signing failed: Unusable secret key 

Turns out that my key was expired, and git was not to blame.

19 Comments

This actually helped me solve my own problem, and it's a solution for every type of problem with this status message. +1
Thanks! This led me to my problem. Strangely enough my local .git/config had a name specified in one project that did not match my signing email. That was enough to reject it.
Well, executing gpg -bsau <key> on my machine doesn't execute anything. Is this suppose to take too long to execute? Or does that mean the key is fine to be used? @VonC any insights?
If your key was expired, you can renew it following the instructions here: stackoverflow.com/a/43728576/2635190
This is the only correct answer. Better to know what's going on than to try a million different possible solutions blindly
|
262
+50

Follow the below url to setup signed commit https://help.github.com/en/articles/telling-git-about-your-signing-key

if still getting gpg failed to sign the data fatal: failed to write commit object

this is not issue with git ,this is with GPG follow below steps

  1. gpg --version
  2. echo "test" | gpg --clearsign

if it is showing:

gpg: signing failed: Inappropriate ioctl for device gpg: [stdin]: clear-sign failed: Inappropriate ioctl for device 
  1. then use export GPG_TTY=$(tty)

  2. then again try echo "test" | gpg --clearsign in which PGP signature is got.

  3. git config -l | grep gpg

gpg.program=gpg commit.gpgsign=true 
  1. apply git commit -S -m "commitMsz"

7 Comments

export GPG_TTY=$(tty) was the trick. Added that to my .zshrc file
Success with Ubuntu 20.04. Thanks! This wasn't the first Answer to offer export GPG_TTY=$(tty). The difference here is that @jayesh also offered a test and nothing about gpg2, fish, or brew which are not related (?) to anything in Ubuntu. This is also a more recent answer, which for my purposes means at this moment this answer might be better than those that are a couple years old. So good job on this short, effective, and up-to-date posting.
I confirm this works on WSL2! In Git Bash I didn't need to do this configuration i. e. The GUI appeared naturally. However, in WSL2, despite having GUI support via an X server, it didn't work without export GPG_TTY=$(tty). This worked beautifully.
SAVED MY DAY (AND NIGHT). Can you tell what export GPG_TTY=$(tty) means?
for any body who face the issue that he/she want to enter this command in every new session you can add this step 3. and step 4 line in .bashrc
|
185

I've DONE it through this short and easy recipe:

UPDATE for the era of LLMs

Start from: export GPG_TTY=$(tty)

If no success, then: killall pgp-agent


Auto-sign commits on macOS (Globally and with different IDEs):

Get your signingkey in this way.

brew install gnupg gnupg2 pinentry-mac git config --global user.signingkey <YOUR_SIGNING_KEY> git config --global commit.gpgsign true git config --global gpg.program gpg 

Put the following in gpg.conf file (edit file with nano ~/.gnupg/gpg.conf command):

no-tty 

Put the following in gpg-agent.conf file (edit file with nano ~/.gnupg/gpg-agent.conf command):

pinentry-program /usr/local/bin/pinentry-mac 

Update:

As suggested in the comments, you might need to execute killall gpg-agent command after editing the configurations file, gpg.conf, according to the comments. needless to say that this command will terminate the GPG (Gnu Privacy Guard) agent.

11 Comments

Can you also explain what those commands are doing? It will help with understanding.
I also had to run a killall gpg-agent after setting the config files, then it worked!
In case it helps others, my issue was that I had an invalid local user.signingkey set, which I didn't notice in my sourcetree configuration, nor my global settings (because I didn't think to look at local config) Ensure both local (git config --local --get user.signingkey) and global (git config --global --get user.signingkey) are the same, or even better, unset the local one if it is invalid (git config --local --unset user.signingkey)
On Apple Silicon with native brew, the path to pinentry-mac will be /opt/homebrew/bin/pinentry-mac
in my case, on a Mac, pinentry-mac was broken. Found this out by trying to run /opt/homebrew/bin/pinentry-mac. I then got dyld[5076]: Library not loaded: /opt/homebrew/opt/libassuan/lib/libassuan.0.dylib which I fixed by running brew reinstall libassuan
|
123

May help killing process gpg-agent that might stuck with old data. So new gpg-agent started would ask for password.

5 Comments

Use gpg-agent --daemon to start it
i had to restart gpg-agent as well
To kill process on macOS: killall gpg-agent
on ubuntu gpgconf --kill gpg-agent
for Mac users: once the gpg-agent is killed, running the commit command asks for the password .. to not to redo the same steps again make sure to add the password to mac keychain
62

To anybody who is facing this issue on MacOS machines, try this:

  1. brew uninstall gpg
  2. brew install gpg2
  3. brew install pinentry-mac (if needed)
  4. gpg --full-generate-key Create a key by using an algorithm.
  5. Get generated key by executing: gpg --list-keys
  6. Set the key here git config --global user.signingkey <Key from your list>
  7. git config --global gpg.program $(which gpg)
  8. git config --global commit.gpgsign true
  9. If you want to export your Key to GitHub then: gpg --armor --export <key> and add this key to GitHub at GPG keys: https://github.com/settings/keys (with START and END line included)

If the issue still exists:

test -r ~/.bash_profile && echo 'export GPG_TTY=$(tty)' >> ~/.bash_profile

echo 'export GPG_TTY=$(tty)' >> ~/.profile

If the issue still exists:

Install https://gpgtools.org and sign the key that you used by pressing Sign from the menu bar: Key->Sign

If the issue still exists:

Go to: ‎⁨your global .gitconfig file which in my case is at: ‎⁨/Users/gent/.gitconfig And modify the .gitconfig file (please make sure Email and Name are the same with the one that you have created while generating the Key):

[user] email = [email protected] name = Gent signingkey = <YOURKEY> [gpg] program = /usr/local/bin/gpg [commit] gpsign = true gpgsign = true [filter "lfs"] process = git-lfs filter-process required = true clean = git-lfs clean -- %f smudge = git-lfs smudge -- %f [credential] helper = osxkeychain 

5 Comments

Adding 'gpsign = true' in .gitconfig fixed it for me
I had to run 'gpg-agent --daemon' and that fixed it for me (OS X, brew).
for Github client on Windows it works! After configure and add the gpg key (on git bash) you have to add the gpg to set program = C:\\Program Files\\Git\\usr\\bin\\gpg.exe path on git configure; Uou cand fint the details on gist.github.com/xavierfoucrier/c156027fcc6ae23bcee1204199f177da
The signingkey was what I was missing in mine. Because I didn't have this, it was using my name and email from the config. I ran gpg --list-secret-keys --keyid-format=long to get my signing key (the sequence of alphanumeric characters after the / on the sec line). I then ran git config --global user.signingkey <signingkey> replacing <signingkey> with what I got in the first step and my commits are now being signed
I have to add just the git config --global commit.gpgsign true, as @Pierre and I solve my problem. I have to enter a passphrase, the one I type when I create the key.
46

My two cents here:

When you create and add a key to gpg-agent you define something called passphrase. Now that passphrase at some point expires, and gpg needs you to enter it again to unlock your key so that you can start signing again.

When you use any other program that interfaces with gpg, gpg's prompt to you to enter your passphrase does not appear (basically gpg-agent when daemonized cannot possibly show you the input dialog in stdin).

One of the solutions is gpg --sign a_file.txt then enter the passphrase that you have entered when you created your key and then everything should be fine (gpg-agent should automatically sign)

See this answer on how to set longer timeouts for your passphrase so that you do not have to do this all the time.

Or you can completely remove the passphrase with ssh-keygen -p

Edit: Do a man gpg-agent to read some stuff on how to have the above happen automatically and add the lines:

GPG_TTY=$(tty) export GPG_TTY 

on your .bashrc if you are using bash(this is the correct answer but I am keeping my train of thought above as well) then source your .bashrc file or relogin.

1 Comment

This solved my problem. Using GIT_TRACE=1 git commit as suggested somewhere did not yield any useful information so it was difficult to figure out what's wrong.
37

I've seen similar answers, but nothing exactly like what worked for me. On Linux, I had to kill and restart my gpg-agent with:

$ pkill gpg-agent $ gpg-agent --daemon $ git commit ... 

This did the trick for me. It looks like you do need to have user.signingkey set to your private key as well from what some other comments are saying.

$ git config --global user.signingkey [your_key_hash] 

5 Comments

This worked for me on MacOS 10.15.6 with gpg (GnuPG) 2.2.23 installed from brew. Thanks for the tip!
this signingkey is from where? github/codecommit etc?
@JamieHutber you have to create your own signing key and add it to GitHub. You can follow the GitHub docs here: docs.github.com/en/authentication/connecting-to-github-with-ssh/…
I didn't realise you need to add them to github... got you. Though i'm using codecommit on AWS
@JamieHutber there should be a way to add the key to AWS as well. You follow similar instructions to create it and then you'll need to work with your admin or do some searching online to figure out how to add it to your profile on AWS. I am not as familiar with that setup.
30

On OS X, using gnupg2 via brew I just had to kill the gpg agent, happens sometimes:

pkill -9 gpg-agent 

And set the env variable if needed:

export GPG_TTY=$(tty) 

See Common GPG problems also and this answer here too.

3 Comments

This worked for me as well. I have created a new alias alias fix-gpg='pkill -9 gpg-agent && export GPG_TTY=$(tty)'.
This works fine, thanks. Didn't even need to set the env variable afterward.
I had to kill the gpg agent after reinstalling python. It started working afterwards.
28

I get that error every time I logout then login again on my macOS. The solution is just a simple single command:

killall gpg-agent 

I think it's just an error from gpg agent, kill it then working again.

1 Comment

jsk ts BB gxlnxrzoyc ggpns,is isvgsingsisb sigs
19

The git trace was very revealing for my situation...

 GIT_TRACE=1 git commit -m "a commit message" 
 13:45:39.940081 git.c:344 trace: built-in: git commit -m 'a commit message' 13:45:39.977999 run-command.c:640 trace: run_command: gpg --status-fd=2 -bsau 'full name <[email protected]>' error: gpg failed to sign the data fatal: failed to write commit object 

I needed to generate an initial key per the format that git was checking against. It's best to copy the value passed to -bsau above in the logs as is and use below.

So it becomes,

 gpg --quick-generate-key "full name <[email protected]>" 

Then it worked.

3 Comments

mate...you cannot image how many hours i spent trying to sort this out until i reached your Answer ... it was the naming of the key all along .. thank you! thank you! thank you!
Man I just added a comment and it created the uid as "[Real name] (comment) <email>" and just cuz of that it was not matching the -bsau tag. It was so confusing but just a small fix.
12
+25

Update Oct. 2016: issue 871 did mention "Signing stopped working in Git 2.9.3"

Git for Windows 2.10.1 released two days ago (Oct. 4th, 2016) has fixed Interactive GPG signing of commits and tag.

the recent gpg-sign change in git (which introduces no problem on Linux) exposes a problem in the way in which, on Windows, non-MSYS2-git interacts with MSYS2-gpg.


Original answer:

Reading "7.4 Git Tools - Signing Your Work", I assume you have your "user.signingkey" configuration set.

The last big refactoring (before Git 2.10) around gpg was in commit 2f47eae2a, here that error message was moved to gpg-interface.c

A log on that file reveals the recent change in commit af2b21e (Git 2.10)

gpg2 already uses the long format by default, but most distributions seem to still have "gpg" be the older 1.x version due to compatibility reasons. And older versions of gpg only show the 32-bit short ID, which is quite insecure.

This doesn't actually matter for the verification itself: if the verification passes, the pgp signature is good.
But if you don't actually have the key yet, and want to fetch it, or you want to check exactly which key was used for verification and want to check it, we should specify the key with more precision.

So check how you specified your user.signingkey configuration, and the version of gpg you are using (gpg1 or gpg2), to see if those have any effect on the error message.

There is also commit 0581b54 which changes the condition for the gpg failed to sign the data error message (in complement to commit 0d2b664):

We don't read from stderr at all currently. However, we will want to in a future patch, so this also prepares us there (and in that case gpg does write before reading all of the input, though again, it is unlikely that a key uid will fill up a pipe buffer).

Commit 4322353 shows gpg now uses a temporary file, so there could be right issues around that.

Let's convert to using a tempfile object, which handles the hard cases for us, and add the missing cleanup call.

7 Comments

I do have my user.signingkey config set. Also using gpg (GnuPG) 2.0.3.
@nullpointer I have edited my answer. Can you check if the issue persists with Gti For Windows 2.10.1.
sorry for the late update, working on MacOSX not Windows so couldn't verify this.
Another potential issue with Windows users is if they have installed gnupg in adddition to the version of gnupg that ships with git -- gpg --list-keys won't give the same output as "C:\Program Files\Git\usr\bin\gpg.exe" --list-keys thus, git won't find your key when trying to sign a commit because it's using the "wrong" gpg
@sytech Right, I remember having to do the same here: stackoverflow.com/a/61849206/6309
|
12

I got this error on Ubuntu 18.04 and it turned out that my key was expired.

To see this, I ran this and it confirmed that my keys were expired:

gpg --list-keys 

To correct this, I ran (using the ID displayed in the previous command):

gpg --edit-key <ID> 

From there, I extended the expiration of key 0 and key 1 following these instructions which boiled down to typing key 0 then expire and following the prompts. Then repeating for key 1.

Afterward, to test this, I ran:

echo test | gpg --clearsign 

And before the fix, it failed with the error:

gpg: no default secret key: No secret key
gpg: [stdin]: clear-sign failed: No secret key

But after the fix, the same command successfully signed the message so I knew things were working again!

1 Comment

Confirming this fixed an issue when importing a valid key from Mac OSX Catalina to CentOS7. Fought with this beast for well over two hours trying to figure out why it kept asking for a password amongst other things. Oddly enough it was already set to never expire, and I set it to still never expire.
10

Using cygwin, I recently switched to gpg2. Then I had the same problem for signing with git after setting git config gpg.program gpg2.

Try echo "test" | gpg2 --clearsign to see whether gpg2 is working. I found it the easiest solution to just set git config gpg.program gpg, because that works. But you will also get a better error this way - e.g. that you need to install pinentry.

2 Comments

Actually, on some Linux distros you may end up with the same issue. Git always uses gpg, not gpg2. See also: stackoverflow.com/questions/34766123/…
This revealed for me the error gpg: signing failed: Inappropriate ioctl for device which can be solved by export GPG_TTY=$(tty). Source: github.com/keybase/keybase-issues/issues/2798
9

If you use homebrew on a M1 chip without Rosetta, you need to specify a different location of the pinentry-program binary because it's installed at a different place.

Andy Hayden's updated answer should be modified as follow:

brew upgrade gnupg # This has a make step which takes a while arch -arm64 brew link --overwrite gnupg arch -arm64 brew install pinentry-mac echo "pinentry-program /opt/homebrew/bin/pinentry-mac" >> ~/.gnupg/gpg-agent.conf killall gpg-agent 

3 Comments

For some reason, signing stopped working on my M1: echo "test" | gpg --clearsign output was gpg: signing failed: Inappropriate ioctl for device gpg: [stdin]: clear-sign failed: Inappropriate ioctl for device. This worked for me.
The only solution that worked for me. Though everything was already installed for the arm64 target for me, you also don't have to specify arch -arm64 every time if you are on m1, follow this to install brew for m1
@Shawn Koh best easy working answer for all the answers provided kudos
8

Might be a hanging gpg-agent.

Try gpgconf --kill gpg-agent as discussed here

Comments

8

I am using M1 Mac, where I have tried above most common of the solutions and didn't work, my problem was that GPG binary missing here => usr/local/bin

Originally, I installed GPG via brew and I tried re-installing it but couldn't find the binary where it stored, later I installed GPG Suite GUI from here => GPG Suite Tools and it worked.

Finally, I can sign-in commit and get verify badge on Github.

2 Comments

This trick worked for me and it should work for anyone who is with M1 Mac. Thanks
It worked for me, I am using M3. Thanks
6

After searching a lot, I found that gpg key was the issue in my case.

To check if gpg key is an issue for you, first check output of the following:

GIT_TRACE=1 git commit -m 'message' 

If something is wrong then you will see something like:

10:37:22.346480 run-command.c:637 trace: run_command: gpg --status-fd=2 -bsau <your GPG key> 

It was showing my name and email in GPG key here but this should have the key. You can try running gpg --status-fd=2 -bsau <your GPG key>

To update your correct key, do the following: check key using: gpg --list-secret-keys --keyid-format=long

It should have the following output:

/Users/hubot/.gnupg/secring.gpg ------------------------------------ sec 4096R/3AA5C34371567BD2 2016-03-10 [expires: 2017-03-10] uid Hubot ssb 4096R/42B317FD4BA89E7A 2016-03-10 

And then update the key using:

git config --global user.signingkey 3AA5C34371567BD2 

Now check the commit again and it should success if key was the issue. You need to set the passphrase to update the key which you can do using GitHub docs.

More details are at: https://gist.github.com/paolocarrasco/18ca8fe6e63490ae1be23e84a7039374

Comments

6

I must have accidentally updated gpg somehow because I got this after trying to test if gpg works:

gpg: WARNING: server 'gpg-agent' is older than us (2.1.21 < 2.2.10) gpg: Note: Outdated servers may lack important security fixes. gpg: Note: Use the command "gpgconf --kill all" to restart them. 

Running gpgconf --kill all fixed it for me.

Comments

6

I stumbled upon this error not because of any configuration issue, but because my key was expired. The easiest way to extend its validity on OSX is to open the GPG Keychain app (if you have it installed) and it will automatically prompt you to extend it. Two clicks, and you're done.

Comments

6

I had the same error , after VSCode update. Although my security commit was working fine, after update of VSCode I got this error:

error: gpg failed to sign the data fatal: failed to write commit object 

The only thing that restored the functionality was this command:

echo "test" | gpg --clearsign 

The command returned error with this:

gpg: signing failed: Screen or window too small gpg: [stdin]: clear-sign failed: Screen or window too small 

After increasing the terminal i was able to type my pass phrase. Very bizzare situation.

Comments

6

I found it very helpful to check what git commit is doing under the hood. Run the following commit with GIT_TRACE=1 as follow:

GIT_TRACE=1 git commit -S -m "MESSAGE" 

This will show what user name, email and signing key git uses when committing.

In my case, I found that git was picking up the wrong user's and key details for signing the commit. I mainly intended to use the local config of the repo rather than the global and adding the following to the local git config (located at "REPO_PATH/.git/config") got signing the commit to work both in Terminal and VSCode

[user] name = USER NAME email = USER EMAIL signingKey = SIGNING KEY 

It can also be set with the following:

git config --local user.name "USER NAME" git config --local user.email "USER EMAIL" git config --local user.signingkey "USIGNING KEY" 

1 Comment

Thanks for mentioning GIT_TRACE=1 , that helped me get to the root cause of my issue.
5

I ran into the same problem. I'm happy to report that the issue lies not with git 2.10.0 but with gnupg 1.4.21.

Temporarily downgrading gnupg to 1.4.20 fixed the issue for me.

If you're using homebrew and you upgraded your packages like I did, you can probably just run brew switch gnupg 1.4.20 to revert back.

Comments

5

Make sure you have your email set properly.

git config --global user.email "[email protected]" 

3 Comments

This is the only solution that worked for me, was helpful to follow the correct method of generating a GPG key via github
In my case the problem was that I was using a company e-mail in a specific repo, for which I didn't have PGP key generated.
Since this question comes up on Google quite often, this really helpful answer should be way higher up in the answers list. Before uninstalling and installing a ton of software trying to fix something that's not broken, just check that you've specified the right e-mail address.
5

In my case, the problem was with the relative name of gpg inside ~/.gitconfig. I changed it to this and the problem disappeared (Monterey, Macbook M1):

[gpg] program = /opt/homebrew/bin/gpg 

The explanation is simple: when git is trying to run gpg it does it in a new shell, without running ~/.profile where I configure PATH for homebrew. So, it simply can't find gpg at all.

Comments

5

Solution work for me is :

  • Firstly I tried to get details about why this is NOT working. Try below cmd on terminal
 $ echo "Hello" > test.txt $ gpg --sign --default-key <your-email-id> test.txt 
  • Observed error with details : gpg: signing failed: No pinentry
gpg-agent[59045]: can't connect to the PIN entry module '/usr/local/bin/pinentry': IPC connect call failed gpg-agent[59045]: failed to unprotect the secret key: No pinentry 
  • From terminal I hit below cmd :
 cat ~/.gnupg/gpg-agent.conf 
  • Check if below statement is present. Need to add if not present in gpg-agent.conf

pinentry-program /usr/local/MacGPG2/libexec/pinentry-mac.app/Contents/MacOS/pinentry-mac

  • After adding pinentry path, Run
 $ gpgconf --kill gpg-agent $ gpg --sign --default-key <your-email-id> test.txt 
  • See the output :
 gpg: using <your-email-id> as default secret key for signing 

2 Comments

gpgconf --kill gpg-agent is what I needed after installing pinentry-mac :)
@borlafu Once you kill the agent then you should use default key to sign gpg. If you follow steps your issue should get resolved. May I know what error you are facing?
4

If the email assoicated to your GPG key's uid is different to the email you are using in git, you'll need to add another user id to your key OR use a key which email matches exactly.

You can add another UID by using:

$ gpg --edit-key

See for mo https://superuser.com/questions/293184/one-gnupg-pgp-key-pair-two-emails

Comments

4

The answers above are great but they did not work for me. What solved my issue was exporting both the public and secret keys.

list the keys from machine where we are exporting from

$ gpg --list-keys /home/user/.gnupg/pubring.gpg -------------------------------- pub 1024D/ABCDFE01 2008-04-13 uid firstname lastname (description) <[email protected]> sub 2048g/DEFABC01 2008-04-13 

export the keys

$ gpg --output mygpgkey_pub.gpg --armor --export ABCDFE01 $ gpg --output mygpgkey_sec.gpg --armor --export-secret-key ABCDFE01 

go to machine we are importing to and import

$ gpg --import ~/mygpgkey_pub.gpg $ gpg --allow-secret-key-import --import ~/mygpgkey_sec.gpg 

bingo bongo, you're done!

reference: https://www.debuntu.org/how-to-importexport-gpg-key-pair/

ps. My keys were originally made on bootcamp windows 7 and I exported them onto my mac air (same physical machine, different virtually)

Comments

4

This started happening all of a sudden for me on Ubuntu, not sure if some recent update did it, but none of the existing issues were applicable for me (I had GPG_TTY set, tried killing the agent etc.). The standalone gpg command was failing with this error:

$ echo "test" | gpg --clearsign -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 test gpg: signing failed: Operation cancelled gpg: [stdin]: clear-sign failed: Operation cancelled 

I tried running gpg with --debug-all option and noticed the below output:

gpg: DBG: chan_3 <- INQUIRE PINENTRY_LAUNCHED 27472 gnome3 1.1.0 /dev/pts/6 screen-256color - gpg: DBG: chan_3 -> END gpg: DBG: chan_3 <- ERR 83886179 Operation cancelled <Pinentry> gpg: signing failed: Operation cancelled 

The above indicates that there is some issue with the pinentry program. Gpg normally runs pinentry-curses for me, so I changed it to pinentry-tty (I had to aptitude install it first) and the error went away (though I no longer get the fullscreen password entry, but I don't like that anyway). To make this change, I had to add the line pinentry-program /usr/bin/pinentry-tty to ~/.gnupg/gpg-agent.conf and kill the agent with gpgconf --kill gpg-agent (it gets restarted the next time).

Comments

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.