User Details
- User Since
- Oct 7 2020, 6:01 PM (187 w, 6 d)
- Availability
- Available
- IRC Nick
- blancadesal
- LDAP User
- Slavina Stefanova
- MediaWiki User
- SStefanova (WMF) [ Global Accounts ]
Yesterday
Here, we are only talking about allowing tools to set up and use s3-style buckets, correct? Is there any intersection/dependency between this use case and enabling ceph-backed PVCs in toolforge k8s, e.g. the toolforge k8s nodes being able to access and authenticate with the ceph cluster?
Mon, May 13
Option 2 seems to me like the obviously good choice :)
Mon, May 6
Sun, May 5
Sat, Apr 27
Thu, Apr 18
Just acknowledging that I've seen this discussion, but that I don't know enough about this topic to have a preference.
Option 1 for an MVP, then iterate on it as needed.
Mon, Apr 15
In this scenario, your Egress NetworkPolicy targets more than one namespace using their label names. For this to work, you need to label the target namespaces. For example:
kubectl label namespace frontend namespace=frontend
kubectl label namespace backend namespace=backendAdd the labels under namespaceSelector in your NetworkPolicy document. For example:
Apr 12 2024
Apr 11 2024
+1
Apr 10 2024
Apr 8 2024
Apr 5 2024
Indeed, this seems to have been an issue only in (my particular setup of) lima-kilo. Sorry for the confusion! Non-admin permissions are not broken in Harbor 2.10. Closing this as invalid and moving on. I've tested maintain-harbor in production (!) and nothing breaks.
I don't see that we have to be explicit in the wiki page about what we currently do, other than recommending "follow the conventions in whatever repository you are contributing to", "dare propose changes as you see fit", and if you start a new repository "use common sense and consult with whomever else will be the main contributors".
I want option 1 because it's the only one that is not prescriptive. To me it's a coincidence that option 5 aligns with what I think would happen by going with B1. That said, if the majority vote is B5, I'm fine with that.
My preference would be to continue with what I perceive is the status quo, which I would describe as something like this:
Apr 4 2024
Upon further investigation, this seems to have been an artifact of my lima-kilo harbor instance, where I had a few test projects that weren't created/admin'd by maintain-harbor. I will do a bit more testing, but hopefully this turns out to be a non-issue.
To clarify, do we want AGPL-3.0-only or AGPL-3.0-or-later?
Apr 3 2024
To do this right, we need to add a license notice to every file in the repo in addition to a COPYING file. Is that correct?
Mar 20 2024
Mar 19 2024
Mar 18 2024
Using the new Build Service is now the recommended method for deploying Django applications on Toolforge. I think a better idea would be to:
Mar 15 2024
The current error message probably comes from the envvars API that envvars-cli talks to. The repo is here: https://gitlab.wikimedia.org/repos/cloud/toolforge/envvars-api
Mar 14 2024
Do we want to expose the /healthz and /metrics endpoints in the unified spec?