Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

dulwich: try default keys when no identity is set in asyncssh vendor #259

Merged
merged 1 commit into from
Jul 25, 2023

Conversation

pmrowla
Copy link
Contributor

@pmrowla pmrowla commented Jul 25, 2023

Will close iterative/dvc#9737

@pmrowla pmrowla self-assigned this Jul 25, 2023
@codecov-commenter
Copy link

codecov-commenter commented Jul 25, 2023

Codecov Report

Patch coverage: 75.00% and project coverage change: +0.06% 🎉

Comparison is base (2f9c281) 80.31% compared to head (c69778a) 80.37%.

Additional details and impacted files
@@            Coverage Diff             @@
##             main     #259      +/-   ##
==========================================
+ Coverage   80.31%   80.37%   +0.06%     
==========================================
  Files          27       27              
  Lines        4114     4118       +4     
  Branches      727      730       +3     
==========================================
+ Hits         3304     3310       +6     
+ Misses        681      678       -3     
- Partials      129      130       +1     
Files Changed Coverage Δ
src/scmrepo/git/backend/dulwich/asyncssh_vendor.py 63.24% <75.00%> (+1.91%) ⬆️

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@pmrowla pmrowla merged commit 67435a0 into iterative:main Jul 25, 2023
13 checks passed
@pmrowla pmrowla deleted the asyncssh-default-keys branch July 25, 2023 08:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

import: failing with SSH key-based authentication from a GitHub repo
2 participants