From 3fc7ca0143d2ff6c07285a142b0aa9c4fe40a973 Mon Sep 17 00:00:00 2001 From: Sophie <29382425+sophietheking@users.noreply.github.com> Date: Thu, 14 Dec 2023 10:26:11 +0100 Subject: [PATCH] [Improvement]: Ruleset Information Compared to Branch Protection Rules (#46207) --- .../managing-rulesets/available-rules-for-rulesets.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/content/repositories/configuring-branches-and-merges-in-your-repository/managing-rulesets/available-rules-for-rulesets.md b/content/repositories/configuring-branches-and-merges-in-your-repository/managing-rulesets/available-rules-for-rulesets.md index db6f6d481432..08f455c07c28 100644 --- a/content/repositories/configuring-branches-and-merges-in-your-repository/managing-rulesets/available-rules-for-rulesets.md +++ b/content/repositories/configuring-branches-and-merges-in-your-repository/managing-rulesets/available-rules-for-rulesets.md @@ -50,6 +50,10 @@ You can require that changes are successfully deployed to specific environments When you enable required commit signing on a branch, contributors {% ifversion fpt or ghec %}and bots{% endif %} can only push commits that have been signed and verified to the branch. For more information, see "[AUTOTITLE](/authentication/managing-commit-signature-verification/about-commit-signature-verification)." +Branch protection rules and rulesets behave differently when you create a branch: with rulesets, we check only the commits that aren't accessible from other branches, whereas with branch protection rules, we do not verify signed commits unless you restrict pushes that create matching branches. With both, when you update a branch, we still check all the commits in the specified range, even if a commit is reachable from other branches. + +With both methods, we use the `verified_signature?` to confirm if a commit has a valid signature. If not, the update is not accepted. + {% note %} {% ifversion fpt or ghec %}