-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use SSH for the forked remote, even if the non-forked one is https #56
Comments
jaymzh
added a commit
that referenced
this issue
Nov 21, 2020
A user who clones-and-forks an https repo they don't have commit access to, still wants their forked repo to be using SSH so they can push to it and make PRs. In addition, we were misparsing repo paths in a variety of different ways, so this centralizes that parsing into two methods, uses them consistently, and then unittests them in a variety of cases. This closes #56
jaymzh
added a commit
that referenced
this issue
Nov 21, 2020
A user who clones-and-forks an https repo they don't have commit access to, still wants their forked repo to be using SSH so they can push to it and make PRs. In addition, we were misparsing repo paths in a variety of different ways, so this centralizes that parsing into two methods, uses them consistently, and then unittests them in a variety of cases. This closes #56 Signed-off-by: Phil Dibowitz <phil@ipom.com>
jaymzh
added a commit
that referenced
this issue
Nov 21, 2020
A user who clones-and-forks an https repo they don't have commit access to, still wants their forked repo to be using SSH so they can push to it and make PRs. In addition, we were misparsing repo paths in a variety of different ways, so this centralizes that parsing into two methods, uses them consistently, and then unittests them in a variety of cases. This closes #56 Signed-off-by: Phil Dibowitz <phil@ipom.com>
jaymzh
added a commit
that referenced
this issue
Nov 21, 2020
A user who clones-and-forks an https repo they don't have commit access to, still wants their forked repo to be using SSH so they can push to it and make PRs. In addition, we were misparsing repo paths in a variety of different ways, so this centralizes that parsing into two methods, uses them consistently, and then unittests them in a variety of cases. This closes #56 Signed-off-by: Phil Dibowitz <phil@ipom.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
people
sclone
onhttps://github.com/foo/bar
or justfoo/bar
which defaults to https. This makes sense as they likely don't have write access to it. We fork that, and then also use https, but we should use ssh for that since they DO have access to that.The text was updated successfully, but these errors were encountered: