According vermin, our code is compatible with 3.6+ (f-strings)
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Sat, Sep 13
Paths, packaging
Organize more as a monorepo, so we've room for other tools too, for example the MediaWiki client
Prune unused
Call credentials code from config, not from connector
Correctly works fine when invoked from reports repository root, with setenv PYTHONPATH $(pwd)/src.
Fri, Sep 12
Access works:
Run against db-B-001:
Claiming temporarily for credentials and if time allows this evening write helpers script. Will release afterwards, so anyone can create the bot.
On Agora, an account name is required for the automated agent / bot.
The agent will be called Rhyne-Wyse [1].
Hack to comply with SELinux and selinux Salt code.
When applying policy to /var/log/www, everything becomes var_log_t:
In T2123#32403, @dereckson wrote:Tests fix commits will be aggregated in datacube T2123-improve-tests-suite branch, so we can have a look of what's remaining to fix.
Use correct symbols in tests
Test paas_docker.is_nginx_service
Thu, Sep 11
Rebased. Don't create log directory for non-web services.
Tests commits will be aggregates in datacube T2123-improve-tests-suite branch, so we can have a look of what's remaining to fix.
Going to take this, as I wrote the tests suite, @DorianWinty will review.
black
Wed, Sep 10
Why not port encrypt to FreeBSD?
Support for PHP 8.4 is still there.
Deployed on Dwellers, works like a charm.
Allow to remove the socket too
Uninstalled certbot.
Pruned old Python 3 dependencies.
Updated EPEL repo to epel-release-10-6
Updated packages
Reinstalled certbot, now running under Python 3.12 too.
Just for information, working on T2113, I've first updated the packages non related to that conflict, so I had fresh packages for both systemd and selinux config.
https://snapcraft.io/starship - last update: 27 April 2023 - latest/edge
Was looking to offer a fix upstream, like read hostname from /proc/sys/kernel/hostname on Linux, but then I've realised this is an interaction issue with snap, starship, systemd and SELinux.
Decreasing priority, as it only occurs with Starship.
Normal behavior observed with the policy:
Still an error with last packages versions.
audit2allow policy
Bumping for 14.3, are still going on, it makes sense to target latest version
shellcheck
First step is to create a script to renew all needed certificates:
Updated to PHPUnit 12.