Opinionated conventional commit message linter with imperative mood detection
Project description
commit-guard
Opinionated conventional commit message linter with imperative mood detection.
Unlike regular expression only tools, commit-guard uses NLP (nltk POS tagging) to verify that commit descriptions start with an imperative verb.
Example
$ commit-guard
✗ subject does not match 'type(scope): description':
Merge pull request #5 from fix/branch
✗ missing 'Signed-off-by' trailer
✗ commit is not signed (GPG/SSH)
Installation
From PyPI:
uv tool install git-commit-guard
or:
pipx install git-commit-guard
From a local clone:
uv tool install -e .
During development:
uv run commit-guard
Usage
# check HEAD
commit-guard
# check specific commit
commit-guard abc1234
# check commit message file (for git hooks)
commit-guard --message-file .git/COMMIT_EDITMSG
# pipe message via stdin
echo "fix(auth): add token refresh" | commit-guard
Selecting checks
All checks run by default. Use --enable or --disable with
comma-separated values:
# only check subject format and imperative mood
commit-guard --enable subject,imperative
# skip body and signature checks
commit-guard --disable body,signed-off,signature
Available checks:
subject- Format matchestype(scope): description, valid type, lowercase start, no trailing period, max 72 charsimperative- First word is an imperative verb (for exampleaddnotadded)body- Body is present after a blank linesigned-off-Signed-off-by:trailer existssignature- Verify GPG or SSH signature
Subject length
The default maximum subject line length is 72 characters. Override with
--max-subject-length:
commit-guard --max-subject-length 100
By default there is no minimum description length. Enforce one with
--min-description-length:
commit-guard --min-description-length 10
Type validation
By default the standard conventional commit types are accepted. Use --types
to replace the allowed set entirely:
# restrict to a subset
commit-guard --types feat,fix,chore
# add a project-specific type
commit-guard --types feat,fix,docs,style,refactor,perf,test,build,ci,chore,revert,wip
Scope validation
By default any scope is accepted and scope is optional. Use --scopes to
restrict allowed values and --require-scope to enforce that a scope is always
present:
# only allow known scopes
commit-guard --scopes auth,api,db
# require a scope
commit-guard --require-scope
# combine both
commit-guard --scopes auth,api --require-scope
Configuration file
Place .commit-guard.toml in your project root (or any parent directory) to
set defaults for enable, disable, scopes, require-scope, types,
max-subject-length, and min-description-length. commit-guard searches
upward from the working directory and uses the first file found.
# .commit-guard.toml
disable = ["signature", "body"]
scopes = ["auth", "api", "db"]
require-scope = true
types = ["feat", "fix", "chore", "wip"]
max-subject-length = 100
min-description-length = 10
# .commit-guard.toml
enable = ["subject", "imperative"]
CLI flags (--enable, --disable, --scopes, --require-scope, --types,
--max-subject-length, --min-description-length) take full precedence and
ignore config file values when provided.
Checking a range of commits
Use --range to check all commits in a revision range. All commits are
checked and a single non-zero exit code is returned if any fail:
# check all commits in a PR
commit-guard --range origin/main..HEAD
# check between two tags
commit-guard --range v1.0..v2.0
# only subject checks on a range
commit-guard --range origin/main..HEAD --enable subject,imperative
Merge commits are excluded by default. Use --include-merges to check them:
commit-guard --range origin/main..HEAD --include-merges
An empty range (no commits) exits non-zero by default — this catches
misconfigured range specs in CI. Use --allow-empty to exit 0 instead:
commit-guard --range origin/main..HEAD --allow-empty
GitHub Actions
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- uses: benner/commit-guard@vX.Y.Z
Check all commits in a pull request:
jobs:
lint-commits:
runs-on: ubuntu-latest
env:
PR_BASE: ${{ github.event.pull_request.base.sha }}
PR_HEAD: ${{ github.event.pull_request.head.sha }}
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- uses: benner/commit-guard@vX.Y.Z
with:
range: ${{ env.PR_BASE }}..${{ env.PR_HEAD }}
All inputs are optional and mirror the CLI flags:
jobs:
lint-commits:
runs-on: ubuntu-latest
env:
PR_BASE: ${{ github.event.pull_request.base.sha }}
PR_HEAD: ${{ github.event.pull_request.head.sha }}
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- uses: benner/commit-guard@vX.Y.Z
with:
range: ${{ env.PR_BASE }}..${{ env.PR_HEAD }}
disable: signed-off,signature
scopes: auth,api,db
require-scope: 'true'
max-subject-length: '100'
min-description-length: '10'
pre-commit
Add to your .pre-commit-config.yaml:
---
repos:
- repo: https://github.com/benner/commit-guard
rev: v0.1.0
hooks:
- id: commit-guard
- id: commit-guard-signature
Install the hooks:
pre-commit install --hook-type commit-msg --hook-type post-commit
commit-guard runs at the commit-msg stage and checks message format.
commit-guard-signature runs at the post-commit stage and verifies
the GPG/SSH signature after the commit object is created.
To selectively enable or disable checks, pass args:
- id: commit-guard
args: ["--enable", "subject,imperative"]
Imperative mood detection
commit-guard combines two strategies to detect non-imperative descriptions:
- nltk POS tagging — flags words tagged as past tense (
VBD), gerund (VBG), third person (VBZ), etc. - WordNet morphology as a fallback for words the tagger misclassifies.
This catches common mistakes like added logging or fixes bug while
keeping false positives low.
Conventional commit format
type(scope): description
body
trailers
Default types: feat, fix, docs, style, refactor, perf, test,
build, ci, chore, revert. Override with --types or the types config
key.
Scope is optional. Mark breaking changes with ! before
the colon.
License
GPLv2
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file git_commit_guard-0.12.0.tar.gz.
File metadata
- Download URL: git_commit_guard-0.12.0.tar.gz
- Upload date:
- Size: 40.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0d474d2f17247991d9af13c95898c9a31061449610179a18289ca1a4f2786e18
|
|
| MD5 |
5e26885c0d49eb36a030c848d49d2af1
|
|
| BLAKE2b-256 |
b3e155e4240aa97dbeb98658b4988031a1da9078e3495862553d953ce116dc44
|
Provenance
The following attestation bundles were made for git_commit_guard-0.12.0.tar.gz:
Publisher:
release.yml on benner/commit-guard
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
git_commit_guard-0.12.0.tar.gz -
Subject digest:
0d474d2f17247991d9af13c95898c9a31061449610179a18289ca1a4f2786e18 - Sigstore transparency entry: 1368369116
- Sigstore integration time:
-
Permalink:
benner/commit-guard@cad366366cd6d2691f7c36ff5e7a9999279906dd -
Branch / Tag:
refs/tags/v0.12.0 - Owner: https://github.com/benner
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@cad366366cd6d2691f7c36ff5e7a9999279906dd -
Trigger Event:
push
-
Statement type:
File details
Details for the file git_commit_guard-0.12.0-py3-none-any.whl.
File metadata
- Download URL: git_commit_guard-0.12.0-py3-none-any.whl
- Upload date:
- Size: 15.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
80a824db0108af83441c03199abca867eddb9bf501c55611c90be00fcc72351b
|
|
| MD5 |
573a66fd1290119756a725986d3bac82
|
|
| BLAKE2b-256 |
d6176fdeb96528d88f556e093bc8b4640e7fb3ada839c79dacb09c6fd7a1430e
|
Provenance
The following attestation bundles were made for git_commit_guard-0.12.0-py3-none-any.whl:
Publisher:
release.yml on benner/commit-guard
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
git_commit_guard-0.12.0-py3-none-any.whl -
Subject digest:
80a824db0108af83441c03199abca867eddb9bf501c55611c90be00fcc72351b - Sigstore transparency entry: 1368369123
- Sigstore integration time:
-
Permalink:
benner/commit-guard@cad366366cd6d2691f7c36ff5e7a9999279906dd -
Branch / Tag:
refs/tags/v0.12.0 - Owner: https://github.com/benner
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@cad366366cd6d2691f7c36ff5e7a9999279906dd -
Trigger Event:
push
-
Statement type: