User Details
- User Since
- Oct 26 2015, 4:00 PM (527 w, 5 d)
- Roles
- Administrator
- Availability
- Available
- IRC Nick
- Urbanecm
- LDAP User
- Urbanecm
- MediaWiki User
- Martin Urbanec [ Global Accounts ]
Tue, Dec 2
I believe this request should be granted. As documented by the list @Novem_Linguae created in the description, they are routinely helping with security tickets in components that are neglected by other developers, such as SecurePoll or Flaggedrevs. Novem Linguae is already a +2 holder (granted in T364531), which indicates a great amount of trust, and as far as I can see, they exercise their judgement with care.
Tue, Nov 25
Tue, Nov 18
Switching to my volunteer Steward Liason role: We should be extra careful here before we make it happen. Assuming the rate limit between named and temporary accounts is not shared, switching to regular accounts when temporary ones are exhausted (or vice-versa) is the quickest way to bypass Six Account Limit (and make it a Twelve-Account-Limit instead). I'm not 100% sure how to account for this, but we should consider this risk and incorporate it into the decisions we make here.
Nov 4 2025
@pmiazga reached out to me about this task. I tried it out, and the result is available as https://people.wikimedia.org/~urbanecm/screencasts/T256185.webm. It seems to work now (likely because we have now removed the .m. domain).
Nov 3 2025
That URL address...should never be actually generated by anything. MediaWiki sometimes uses links in the format of en.wikipedia.org/w/index.php?oldid=xxx and/or en.wikipedia.org/w/index.php?curid=xxx (such as https://en.wikipedia.org/w/index.php?oldid=1316080086 or https://en.wikipedia.org/w/index.php?curid=162281). Is there a realistic example of how this can be triggered?
Oct 22 2025
Oct 20 2025
I'm not sure about this. On one hand, I absolutely agree we should care of the good first tasks to make sure they're good. On the other hand, I'm unsure if time is a good indicator. From my experience, even simplish tasks (=take me up to 30 minutes to figure out and write a patch) are often left untouched for a good while. This is because every such task eats a bit of my resources (and the reviewer's resources too) and being humans, we only have finite amount of resources.
Oct 16 2025
Noting that I just received a community question about this :). It looks like the error message is way less confusing in the newer form, thank you for working on this!
Oct 9 2025
Both Phabricator accounts are now disabled. Note I'm also happy to add you to acl*userdisable if you're interested, to be able to self-serve account disabling.
Oct 7 2025
Sep 16 2025
Sep 11 2025
Okay... It is not visible in the management interface (as eg. autoconfirmed is), but it _is_ visible via the API.
Sep 1 2025
Aug 29 2025
SRE: Would you mind confirming the appropriate IPs or ranges that would need to be allowlisted to include analytics cluster?
Wikimedia Enterprise: Would you mind doing the allowlist once the IPs are confirmed?
Aug 23 2025
Hello @Gallemore, thank you for reporting this. Nothing really changed per se. MediaWiki treats spaces and underscores as equivalent (docs) and as far as my memory serves, this was always the case. It is possible whatever tool you are using to process/request the data has changed the representation it sends to its users, but I can't comment in more details on that without details about how you access page title-related data. In any case, as long as you communicate with MediaWiki directly, it shouldn't matter whether you use spaces or underscores, as they are equal to each other.
Aug 21 2025
CC @MusikAnimal as the patch author (seems to originate from https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CommunityRequests/+/1165637).
Aug 13 2025
I think we are mixing two questions here:
@RLazarus Do you have any thoughts on how to tackle this one, please?
I also noticed that even if the code was executed, the announcement would be somehow broken (at least on MW-on-K8s), as SUDO_USER is no longer populated. I filled T401803: mwscript-k8s does not include an environment variable with the username of the executing user for this problem.
I changed that setting and copy-pasted AddWiki:: notifyNewProjects() into a shell.php session. I tested that with both my staff address and the list. Both messages got sent properly, and I can see the list one in list archives. So, the issue seems to be that AddWiki is simply not executing the notifying codepath for some reason.
Aug 12 2025
I went ahead and deployed @Zabe's patch. This is now done. Thank you all!
Aug 9 2025
Aug 7 2025
Aug 4 2025
Jul 30 2025
Jul 29 2025
[urbanecm@deploy1003 ~]$ mwscript-k8s --comment="T396091" --follow -- extensions/CentralAuth/maintenance/migrateAccount.php --wiki=aawiki --username='Inverted Pages' --auto ⏳ Starting extensions/CentralAuth/maintenance/migrateAccount.php on Kubernetes as job mw-script.eqiad.1oe9u59m ... 🚀 Job is running. 📜 Streaming logs: CentralAuth account migration for: Inverted Pages INFO: Incomplete migration for 'Inverted Pages' 2025-07-29 20:06:12 processed 1 usernames (5.2/sec), 0 (0.0%) fully migrated, 1 (100.0%) partially migrated done. [urbanecm@deploy1003 ~]$ cat > users.txt Inverted Pages [urbanecm@deploy1003 ~]$ mwscript-k8s --file=users.txt --follow -- extensions/CentralAuth/maintenance/attachAccount.php --wiki=aawiki --userlist users.txt ⏳ Starting extensions/CentralAuth/maintenance/attachAccount.php on Kubernetes as job mw-script.eqiad.telg5a5w ... ⏳ Waiting for the container to start... 🚀 Job is running. 📜 Streaming logs: CentralAuth account attach for: Inverted Pages ATTACHING: Inverted Pages@loginwiki ATTACHING: Inverted Pages@metawiki [2025-07-29 20:07:37] processed: 1 (7.1/sec); ok: 0 (0.0%); attached: 1 (100.0%); partial: 0 (0.0%); failed: 0 (0.0%); missing: 0 (0.0%); done. [urbanecm@deploy1003 ~]$
Jul 13 2025
I wondering whether this should be completed in the first place. If we decided administrators do not need the unblocking permission, this should apply for blocks by filters as well, right? If we do this, I'm wondering where would be the line where unblocks need to be done by another admin.
Jul 12 2025
See prior convo in T327034 about this.
Jun 26 2025
Other thing I'm wondering about: Among other things, Autoreveal suppresses logging of individual reveals. I'm wondering about what are the possible routes to trigger that effect if you want to hide you revealed something. But not sure if this opens any other avenues besides enabling the full autoreveal experience.
@Dreamy_Jazz Hmm, that seems to also mean I can enable autoreveal for the next 20 years if I want to:
Thanks for filling this! Definitely something to look into and fix.
Jun 15 2025
@EMill-WMF For your awareness. This causes issues with the mandatory 2FA rollout we're currently working on. Would you mind flagging this to the appropriate subteam, please?
Jun 3 2025
May 3 2025
@Dreamy_Jazz and I discussed this at Wikimedia-Hackathon-2025. Dreamy_Jazz pointed out this might happen if a cookie block gets involved. After some testing, I can confirm that hypothesis, a cookie block is issued for IP hard blocks. I previously wasn't able to reproduce on desktop, but I was testing this with a soft-blocked IP instead.
Mar 11 2025
That is the expected behavior, then I did everything correctly. Can we move stewards-l to actual runs then, please?
Please see T351202#10616848 for a more general note on moving the maillists (other than stewards-l).
Mar 9 2025
A general note on this: The biggest remaining problem to solve is the "it is very hard to see what you just done" problem. When running the sync, the onboarder tool doesn't tell you what changes are being made (as compared to the current maillist membership), mostly because it does not have a way how. Here is how the Gitlab integration currently behaves (for comparison and a "ideal end result" description):
@Dzahn Boldly assigning to you for step (1)!
Mar 7 2025
@Dzahn Would you mind helping with this, please?
Feb 24 2025
Feb 22 2025
Feb 16 2025
Approved from my end.
Feb 15 2025
Resolving, as the patch has been merged.
Feb 14 2025
Feb 13 2025
Filled T386410: TranslatableBundleMover does not lift the lock if an asynchronous move failed to be schedule as a related issue (when moving a translatable page, it erroneously stays locked even though the job was not actually scheduled, and thus no move is happening).
Happening for me as well (when moving translatable pages). Moved ~10 pages and got the error for 3 of them. I looked through the logs and found this:
Feb 11 2025
Feb 10 2025
Feb 6 2025
Approved.
Feb 4 2025
Started to receive emails for wmcz-stats about this:
Feb 3 2025
Done (both).
