Navigation

    Inedo Community Forums

    Forums

    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    1. Home
    2. tyler_5201
    3. Topics
    T
    • Profile
    • Following
    • Followers
    • Topics
    • Posts
    • Best
    • Groups

    Topics created by tyler_5201

    • T

      Universal Package Versioning
      Support • • tyler_5201  

      4
      0
      Votes
      4
      Posts
      23
      Views

      dean-houston

      Hi @tyler_5201, The UI package search is pretty basic, so it's not going to look through those metadata properties. They are something you could obviously search/find through the API. Depending on what you're trying to do, we do have a Whitelabel feature that makes the UI a lot easier to consume for end-users: https://docs.inedo.com/docs/proget/administration/whitelabel https://inedo.com/proget/case-studies/salient In particular, the "Tile View" on Universal Packages may help. But it's not very popular and is something we work closely with our users on, so let us know if that's of interest. -- Dean
    • T

      The ConnectionString property has not been initialized
      Support • • tyler_5201  

      5
      0
      Votes
      5
      Posts
      38
      Views

      T

      Hey Alana, No worries. I have a similar issue with an Ansible deployment in Kubernetes with permissions. So I have a special file share now for images that don't support changing the user/group that processes run as. Basically, the file share exposed and consumed by the image is configured (when using squashing) to have certain permissions. And we can make docker containers or Kubernetes deployments compatible by specifying the securityContext to tell it when user & group to run the pod as, or some containers allow specifying a user ID and group ID as environment variables. This is just to control the linux permissions for folder/file access. Somewhere in the image setup, there's configuration forcing it to access /var/proget/database as the user "postgres" and with the group "root", and it tries changing permissions on that folder at some point. If the image supported the securityContext or the user/group ID environment variables, it would run as those specified permissions instead - but - your image would need to be able to run as those permissions, and it would probably take some work to get the image reconfigured to allow that, and to do testing. For now, it works. It would take some evaluation to see if your image would support changing the user/group away from the current postgres/root.
    • T

      Docker image attempts chown on NFS
      Support • • tyler_5201  

      6
      0
      Votes
      6
      Posts
      51
      Views

      atripp

      Hi @tyler_5201 , We'll address this via PG-3098 in an upcoming maintenance release; basically we will add a permission check before chown on Docker/Linux for PostgreSQL. If the permissions are there, then chown won't be run. Thanks, Alana
    • 1 / 1