diff --git a/CODEOWNERS b/CODEOWNERS index 2f97cc4cb9cdadb3158424476f7914e6f3918c36..9fb3c850f5ffc04af42a33abfb040ce7f98f3805 100644 --- a/CODEOWNERS +++ b/CODEOWNERS @@ -1 +1 @@ -* @alexander.khabarov @matthew.clarkson +* @alexander.khabarov diff --git a/README.md b/README.md index e2172d30536928b44ff36d6ea1877751719b347c..b0d8d3186785d43781f73c8c33b43c348e73b309 100644 --- a/README.md +++ b/README.md @@ -48,9 +48,9 @@ or, a username and password: #### GitLab -Creating a [Deploy Token][deploy-token] with `write_repository` permission is the preferred method to restrict the access. +Creating a [Deploy Token][deploy-token] with `write_package_registry` permission is the preferred method to restrict the access. -The deploy token can be use with the `uv` username/password authentication to publish packages. +The deploy token can be used with the `uv` username/password authentication to publish packages. ### `uv` diff --git a/test/integration.test.mjs b/test/integration.test.mjs index 756e2639b62095258186c4910f24a6c76e413aa9..099b1d575371eef042ea267954ee5d32f80c4f9c 100644 --- a/test/integration.test.mjs +++ b/test/integration.test.mjs @@ -180,7 +180,7 @@ test('username/password', success, async t => { test('no `uv` path - token', success, async t => { t.context.m = {...t.context.m, verifyConditions: async (..._) => null}; t.context.ctx.env.UV_PUBLISH_TOKEN_LOCALHOST = '201'; - t.context.cfg.uv = undefined; + delete t.context.cfg.uv; }); test('no `uv` path - username/password', success, async t => { @@ -188,7 +188,12 @@ test('no `uv` path - username/password', success, async t => { delete t.context.ctx.env.UV_PUBLISH_TOKEN_LOCALHOST; t.context.ctx.env.UV_PUBLISH_USERNAME_LOCALHOST = 'placeholder'; t.context.ctx.env.UV_PUBLISH_PASSWORD_LOCALHOST = '201'; - t.context.cfg.uv = undefined; + delete t.context.cfg.uv; +}); + +test('no `uv` path - no repositories', success, async t => { + delete t.context.cfg.repositories; + delete t.context.cfg.uv; }); test('PyPI repository', success, async t => {