-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow using ssh keys other than the default #46
Comments
Not sure how best to handle this. You mean you have different SSH keys bound to different Github accounts ? Otherwise, you could probably set the proper identity for I could add an option to pass arguments through to calls to |
Well I normally access github via an ssh |
Ah, I see. Then why not define the same ssh |
I'd like to test if that will work, is there a way to do a dry run without making a pull request to the main opam repository? |
You can make a PR to a different repo, see the
|
Met the same problem here, what about adding the option of just using HTTPS? |
Well, we need push access, so https is quite inconvenient there. |
@AltGr at GitHub HTTPS allows you to push without any problem. |
It seems that
opam-publish
doesgit clone [email protected]:ocaml/opam-repository.git
to get the repository. This only works if the key associated with your account is in your defaultssh
identity. When that is not the case you can't useopam publish
.So it would be useful to give more control on how the repository is created. Either specifically specifying an identity file (I'm not sure how to pass that on through git but I assume there is a way), or just allowing to specify the command which should be used to clone the repo.
The text was updated successfully, but these errors were encountered: