GitHub PR Fix: "Commits must have verified signatures" blocking PR merge
Problem GitHub branch protection requires all commits to have verified GPG signatures. Two commits at the base of the branch (made before GPG signing was configured) were unsigned, blocking the merge. Root cause Commits made before commit.gpgsign=true was configured in git have no GPG signature. GitHub requires all commits in a PR to be verified - one unsigned commit blocks the merge regardless of approvals. Steps to fix 1. Identify unsigned commits git log --format="%G? %ad %s" --date=short origin/main..HEAD Look for lines starting with N (no signature). Note the hash of the oldest unsigned commitβs parent on main. ...
Connect to AWS SSO and SSH into EC2 Instance
This how-to article explains steps required to configure AWS account with and without need of AWS SSO and then SSH into an EC2 instance. The steps are generic in nature and can be customized to apply to any environment or any project. Prerequisites AWS CLI v2 AWS SSO access Terminal AWS IAM user credentials (Access Key ID and Secret Access Key) Directory structure ~/ βββ .aws/ β βββ config β βββ credentials βββ .ssh/ βββ ec2-key.pem βββ config Setup .aws config without SSO Create .aws folder if it doesnβt exist. ...