Le 02/11/2016 à 18:23, Stefan Hajnoczi a écrit :
> On Wed, Nov 2, 2016 at 5:17 PM, Stefan Hajnoczi <stefa...@gmail.com> wrote:
>> On Wed, Nov 2, 2016 at 5:12 PM, Laurent Vivier <laur...@vivier.eu> wrote:
>>> Le 02/11/2016 à 18:07, Stefan Hajnoczi a écrit :
>>>> On Mon, Oct 31, 2016 at 10:50:29AM +0100, Laurent Vivier wrote:
>>>>> The following changes since commit 
>>>>> 5b2ecabaeabc17f032197246c4846b9ba95ba8a6:
>>>>>
>>>>>   Merge remote-tracking branch 'remotes/kraxel/tags/pull-ui-20161028-1' 
>>>>> into staging (2016-10-28 17:59:04 +0100)
>>>>>
>>>>> are available in the git repository at:
>>>>>
>>>>>   g...@github.com:vivier/qemu-m68k.git tags/m68k-for-2.8-pull-request
>>>>
>>>> This URI is not publicly accessible.  Some tools will fail to apply your
>>>> pull request because of this.
>>>>
>>>> Please adjust your .gitconfig:
>>>>
>>>> [remote "origin"]
>>>>     url = git://github.com/vivier/qemu.git
>>>>     pushurl = g...@github.com:vivier/qemu.git
>>>
>>> Thank you Stefan.
>>>
>>> I'm using your tool "git-publish", is there a way to detect this problem
>>> automatically?
>>
>> Right now git-publish doesn't check the generated URI.  In some use
>> cases it's reasonable to use an SSH URI so adding an error or even
>> warning to git-publish isn't ideal.
>>
>> I am modifying the patches tool (https://github.com/stefanha/patches)
>> to automatically translate GitHub URIs since they are so prevalent...
>> This will allow me to apply pull requests that have GitHub SSH URIs.
> 
> On second thought, even that isn't a general solution.  If people are
> collaborating on private GitHub repos then translating URIs to HTTPS
> is not correct either.
> 
> Instead of trying to do magic I'll ask pull request submitters to fix
> their .gitconfig.

Perhaps you can also update git-publish README.rst?

Thanks,
Laurent

Reply via email to