-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MIDRC-536 MIDRC-653 Add expiration bucket lifecycle rule #112
Conversation
Please find the detailed integration test report here Please find the ci env pod logs here |
Please find the detailed integration test report here Please find the ci env pod logs here |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nothing major, just a minor question.
b0ef0e0
to
b2a38c1
Compare
Please find the detailed integration test report here Please find the ci env pod logs here |
@@ -233,14 +233,14 @@ var isUserAuthorizedForPayModels = func(userName string, allowedPayModels []stri | |||
var isUserAuthorizedForResourcePaths = func(userName string, accessToken string, resourcePaths []string) (bool, error) { | |||
Config.Logger.Printf("DEBUG: Checking user '%s' access to resource paths %v (service 'jupyterhub', method 'launch')", userName, resourcePaths) | |||
|
|||
body := "{ \"requests\": [" | |||
body := fmt.Sprintf("{\"user\": {\"token\": \"%s\"}, \"requests\": [", accessToken) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Wondering why do we need to change this? Is sending the access token
as a Bearer token not working anymore?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it never worked, this arborist endpoint expects the token in the body
Link to JIRA ticket if there is one: https://ctds-planx.atlassian.net/browse/MIDRC-536, https://ctds-planx.atlassian.net/browse/MIDRC-653
New Features
nextflow-global.s3-objects-expiration-days
setting to configure when to delete objects created in S3 by NextflowBreaking Changes
Bug Fixes
Improvements
Dependency updates
Deployment changes