-
Notifications
You must be signed in to change notification settings - Fork 697
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add git:// protocol check #10261
Add git:// protocol check #10261
Conversation
941574d
to
ae7ef39
Compare
Review ready. Note:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd expect it to say something about "popular platforms, like GitHub, don't support it" but maybe it's too much detail...
We can absolutely check that it's |
I left the warning vague (“Furthermore, popular forges like GitHub do not support it.”) and general (displayed always) because I other platforms choke on Shall the message be more generic? Shall we tailor the “Furthermore” to specific forges? |
I think the current version is the perfect balance between specific and general. I am not a fan of making the code more complex than it needs to be to analyze the URI and tailor the message to the specific platform dynamically. |
There are many packages on hackage which use Perhaps it's worth considering a softer migration so that uploads of new versions of these packages are not blocked? I'm not sure on this one but wanted to point out it could affect a lot of users. |
I believe with a changelog entry and the possibility of running Also let's keep in mind that first this will land in From the relevant Git Book section (which Brandon provided), there seems to be no sensible reason to still use |
Sounds good! |
Please remind me - what is the problem this PR is supposed to fix? And why is it wrong to reduce the level to "warning"? |
@mouse07410 The issue which was reported is that many of the source repository links on hackage are dead as they use the So this PR doesn't fix that issue directly but would achieve something similar (getting people to update their links to https variants). |
A lot of my repos are addressed via |
No, just to avoid |
@mouse07410 On the contrary you are using the SSH protocol which is good! Could you perhaps take a look at the suggested message in this PR and tell us if it could have been phrased better? |
Specifically, any URL using |
Frankly, yes - especially since with this PR Cabal will error out such packages. I'll post a suggestion here, or in a Review when I get to my desktop computer tomorrow or day after. |
I'm confused. This check is fine with ssh; it's the old git server protocol that is rejected, which hasn't been accepted by GitHub in 3 years. |
dbfa1e3
to
e581306
Compare
@mouse07410 I did not remove the If you could illustrate what your problems are with the wording (or the logic), I can quickly write a fixup patch. To be clear, if you have this stanza in your
Apologies for the messing-up, I was under the impression that further comments reset the 48-hours delay window for automatic merging. |
Include the following checklist in your PR:
Manual QA
source-repository
stanza.location:
substitutehttps://
(or what you have) withgit://.
git:// is not secure
warning.