GitHub Enterprise Hosts
Gitquarry is GitHub.com-first, but it can also target GitHub Enterprise hosts through--host.
Accepted Host Inputs
Gitquarry accepts:- bare hostnames like
github.example.com - full web URLs like
https://github.example.com - explicit API roots like
https://github.example.com/api/v3 - localhost-style API roots for tests like
http://127.0.0.1:8787/api/v3
Normalization Rules
Gitquarry normalizes every host input into:- a canonical web host used for credential lookup
- a canonical API base used for HTTP requests
github.comwww.github.comapi.github.com
- web host:
github.com - API base:
https://api.github.com
/api/v3 if needed.
Examples:
| Input | Normalized web host | Normalized API base |
|---|---|---|
github.com | github.com | https://api.github.com |
https://git.example.com | git.example.com | https://git.example.com/api/v3 |
http://git.example.com | git.example.com | http://git.example.com/api/v3 |
https://git.example.com/api/v3 | git.example.com | https://git.example.com/api/v3 |
http://127.0.0.1:8787/api/v3 | 127.0.0.1:8787 | http://127.0.0.1:8787/api/v3 |
Host-Scoped Auth
Credentials are stored and resolved per normalized host. That means:- logging into GitHub.com does not log you into GitHub Enterprise
- each host can have a different PAT
auth statusandauth logoutare host-aware
Host-Specific Environment Variables
Gitquarry derives one environment variable name per normalized host:- host-specific env var
- global
GITQUARRY_TOKEN - saved secure credential
- explicit insecure-file fallback
Good Enterprise Workflow
GITQUARRY_CONFIG_DIR to an isolated temp directory during tests or CI.
Common Mistakes
- Passing an empty
--hostvalue. That fails withE_HOST_INVALID. - Assuming GitHub.com credentials automatically apply to GitHub Enterprise.
- Mixing web hosts and API bases mentally. Gitquarry normalizes them, but auth is keyed to the normalized web host.
- Expecting device flow or browser login. v1 is PAT-only.