Schedule back origins with visit_type "deb" (ongoing)
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Dec 8 2021
Dec 7 2021
Same done in production.
Triggered some debian loading in there.
And everything is working as expected.
staging deployment done ^
Dec 6 2021
Dec 2 2021
Dec 1 2021
Nov 26 2021
Copy of an email I sent on 2021-11-17:
Nov 22 2021
Nov 20 2021
Nov 10 2021
At least loader deposit and npm [1] are fine.
Nov 9 2021
Nov 8 2021
Here is an overview of the fields (+ internal version name + branch name) used by each package loader, after D6616:
Oct 8 2021
Sep 23 2021
Aug 6 2021
Jul 29 2021
Apr 12 2021
Mar 23 2021
Dec 11 2020
The main loader is now deployed.
Another task got opened to keep the references on the possible improvments [1]
Nov 3 2020
Nov 2 2020
Oct 23 2020
Oct 14 2020
Oct 12 2020
FTR, olasd, douardda and I discussed an inconsistency in keys used in kafka, and decided to use hashes for all origin/visits/visit statuses; and doing the same for ext metadata in both kafka and the DB solves the issue about defining unicity.
@rdicosmo a full example of what?
The suggestion was to have extrinsic metadata on directories that come from a deposit of a bundle (e.g. .tar.gz or .zip file coming from HAL), instead of on a synthetic revision as is currently the case, so they can be accessed knowing the hash of the directory (which is an intrinsic id).
Oct 8 2020
Alternatively, we could keep writing the metadata on revision/releases, and use the provenance service (when it's ready) to find them from a directory SWHID. What do you think?
Oct 6 2020
Sep 15 2020
Sep 2 2020
Aug 7 2020
Aug 2 2020
I'm currently using the following regex to filter the exposed urls .tar.gz$|.zip$|tar.bz2$|.tbz$|.tar.xz$|.tgz$|.tar$ but I'm pretty sure it could be improved.
Jul 26 2020
May 26 2020
If that ever happens again (I don't expect it but I have been wrong in the
past), we will have a logged exception with some context.