[05:13:55] (03PS2) 10Ori.livneh: Optimize SVGs [extensions/MultimediaViewer] - 10https://gerrit.wikimedia.org/r/254922 [09:05:52] 6Multimedia, 6Commons, 10MediaWiki-File-management, 7Community-consensus-needed: Commons uploads: Support spreadsheet data format ODS - https://phabricator.wikimedia.org/T45151#1827615 (10Nemo_bis) >>! In T45151#1826985, @Platonides wrote: > These are zip-based files, so there's the usual problem with simi... [09:06:02] 6Multimedia, 6Commons, 10MediaWiki-File-management, 7Community-consensus-needed: Commons uploads: Support spreadsheet data format ODS - https://phabricator.wikimedia.org/T45151#1827618 (10Nemo_bis) [09:06:06] 6Multimedia, 6Commons, 10MediaWiki-File-management: Commons uploads: Support spreadsheet data format ODS - https://phabricator.wikimedia.org/T45151#432869 (10Nemo_bis) [09:37:22] o/ [11:36:41] 6Multimedia, 10UploadWizard, 7Easy, 3Google-Code-In-2015: Add a warning about choosing a date in the future - https://phabricator.wikimedia.org/T117117#1827828 (10Aklapper) matmarex will mentor this task, as mentors must be community members already. [11:36:53] 6Multimedia, 10UploadWizard, 7Easy, 3Google-Code-In-2015: Revision history of campaign pages is lacking title - https://phabricator.wikimedia.org/T56012#1827829 (10Aklapper) matmarex will mentor this task, as mentors must be community members already. [13:38:53] 6Multimedia, 10MediaWiki-General-or-Unknown, 10WikiEditor, 5Patch-For-Review: WikiEditor causing errors (due to "Auto Minify" option of CloudFlare?) - https://phabricator.wikimedia.org/T118942#1827988 (10Aklapper) [15:05:27] MatmaRex: Is there a way in oojsui now to use icons that aren't already in the library? [15:28:36] 6Multimedia, 10UploadWizard, 5Patch-For-Review: Add support for installation with Composer - https://phabricator.wikimedia.org/T119248#1828131 (10MarkTraceur) 5Open>3declined a:3MarkTraceur Patch -2'd, reopen this bug if the consensus on Composer shifts [15:30:58] 6Multimedia, 6Commons, 10MediaWiki-File-management, 10UploadWizard: Accidental/automatical logout during upload process requires to start from scratch. - https://phabricator.wikimedia.org/T113043#1828140 (10MarkTraceur) p:5Triage>3Normal Changing priority - this is not a new bug [15:32:01] 6Multimedia, 10UploadWizard, 10Wikimedia-Video: UW intermittently gets stuck at 'assembling' state on large videos - https://phabricator.wikimedia.org/T116516#1828151 (10MarkTraceur) p:5Triage>3Normal [15:35:17] 6Multimedia, 10UploadWizard, 7Easy: Clarify wording in dialog about unsupported file types which mentions Firefox and Firefogg - https://phabricator.wikimedia.org/T116003#1828154 (10MarkTraceur) p:5Triage>3Low I have to say, I think it's almost as clear as it needs to be. The only thing I think is actua... [15:36:08] 6Multimedia, 10UploadWizard: Wikimedia Commons upload wizard gives "" - https://phabricator.wikimedia.org/T119293#1828169 (10MarkTraceur) I imagine we could try uploading to Commons from Tor to reproduce the error. [15:42:34] Hm, this is not as simple as I thought [15:43:13] _:(´□`」 ∠):_ it never is [15:45:22] OK, found it! [15:45:32] Seems like the API doesn't even know wtf "torblocked" means [15:46:08] But I'm perfectly welcome, apparently, to stash files as much as I want [15:46:56] marktraceur: Oh dear. [15:47:30] prtksxna: BTW, yes, there is a way to make an OOUI icon. You just load it in CSS with the right classes. [15:48:15] prtksxna: This is how VE-MW does it: https://git.wikimedia.org/blob/mediawiki%2Fextensions%2FVisualEditor.git/master/modules%2Fve-mw%2Fui%2Fstyles%2Fve.ui.Icons.css [15:49:10] 6Multimedia, 10UploadWizard: Wikimedia Commons upload wizard gives "" - https://phabricator.wikimedia.org/T119293#1828206 (10MarkTraceur) I have confirmed this, after some experimentation. UploadWizard receives the API error code "unknown-error" with additional information "Unknown erro... [15:49:16] prtksxna: Please have icons that don't need contextual RTL variants in the toolbar to be different from the context of the cursor to be different from the context of the wiki to be different from the context of the page, otherwise you'll have a bad time (read: ignore the bits in that file that say 'hack'). [15:49:26] 6Multimedia, 10UploadWizard: Wikimedia Commons upload wizard gives "" - https://phabricator.wikimedia.org/T119293#1828207 (10MarkTraceur) p:5Triage>3Normal [15:49:31] 6Multimedia, 10UploadWizard: Wikimedia Commons upload wizard gives "" - https://phabricator.wikimedia.org/T119293#1828208 (10MarkTraceur) a:3MarkTraceur [15:51:29] marktraceur: Also, on T119293, I'd say not to make UW Commons-specific, but to give UW a way for extensions, like TorBlock, to give it additional information, like extra block information. [15:51:56] marktraceur: Ideally ideally, to give /MW/ such a way. But that's just crazy talk. [15:56:03] James_F: Well, honestly, I think the way to accomplish that is to not give a client an edit token if they're not allowed to edit [15:56:05] Just a thought [15:56:25] marktraceur: Allowed to edit what, though? [15:56:33] And I'm *fairly* certain we get an edit token in the first step [15:57:15] Yeah, we have to for the stash [15:57:42] James_F: I guess if they're not allowed to edit at all, then no edit token [15:57:57] marktraceur: What about admin actions? [15:58:07] What about them? [15:58:27] E.g. over-writing a file via UW. [15:58:33] Is that meant to be blocked via Tor? [15:58:40] We don't support that [15:58:42] (Oh, wait, you can't do that in UW, ignore me.) [15:58:50] We *could* [15:58:52] But we don't. [15:58:54] hi. [15:59:00] Ohai MatmaRex [15:59:06] Ooh, we could just talk about this on video [15:59:10] There's definitely no conceivable action to take in UW as a Tor-blocked user. [15:59:31] Except for setting your preference in the tutorial step. ;) [15:59:36] But you can only do that once. [15:59:42] But there might be in other situations, so TorBlock can't know whether to deny the edit token, right? [16:01:34] I guess that's the problem [16:01:47] Thanks James_F [16:09:37] Aha, let's just check for ability to upload before loading the special page [16:10:08] Er, shit, we do that, what the hell [16:10:13] Ha. [16:15:02] marktraceur: i think the problem is also that there aren't any permission checks on uploads to stash [16:15:24] I'm not totally convinced there's a permission check on uploads period [16:15:36] I think the error only happens when the user tries to create the description page [16:15:38] if you can't upload a file, you shouldn't be able to upload them to stash. but you can do it, currently. [16:15:55] yep [16:16:14] MediaWiki doesn't (currently) have any distinction between "upload" and "create description page", but if it did we'd be in trub trub [16:26:22] OK, so, James_F, MatmaRex, what do you think - special-case TorBlock and check it on uploads somehow, or figure out a way to do an upload permission check that sucks less and use that instead [16:26:52] The latter? [16:27:08] How do anons get stopped from using Special:Upload? Just a hack? [16:27:13] Etc. [16:27:20] marktraceur: yeah, the latter. if we somehow use the same permission checks for upload-to-stash as for regular upload, we'd fix this and like two or three other bugs [16:27:59] James_F: Special:Upload is accessible from Tor, I bet it will give me a confusing error if I try to upload something [16:28:13] Anons are different, they *actually* don't have the permission [16:28:17] marktraceur: Sure, but I meant about non-Tor blocks. [16:28:26] marktraceur: You mean it's a hard-coded hack? [16:28:30] The permission checks that UW and S:U actually run only look at the permissions [16:28:37] We need to look at a hook too [16:28:41] anon users have permissions. [16:29:26] They do, but they don't have upload permissions on Commons [16:30:54] 6Multimedia, 10Ops-Access-Requests, 6operations: Give Bartosz access to stat1003 ("researchers" and "statistics-users") - https://phabricator.wikimedia.org/T119404#1828344 (10ArielGlenn) p:5Triage>3Normal a:3ArielGlenn [16:31:06] foreach ( array( 'upload', 'edit' ) as $permission ) { [16:31:21] That looks like we have 'upload' as a permission to me. [16:31:28] (UploadBase::isAllowed) [16:32:24] James_F: this is a very "general" check, though [16:32:37] !$user->isAllowed( $permission ) [16:33:37] UploadBase only checks if uploads are enabled on the wiki, I think, not if the user can upload [16:33:47] That's not what the code says. [16:33:52] Unless I'm totally mis-reading it. [16:33:57] Oh, then I mis-read it [16:34:00] Let me check [16:34:00] James_F: i think that doesn't consider blocking, it doesn't consider page protection, and it doesn't consider any of the dozen extensions that can prevent user actions [16:34:16] like TitleBlacklist or GlobalBlocking [16:34:21] or AbuseFilter [16:34:25] Ah, it's still only using $user->isAllowed [16:34:44] Which, yeah, not as good as $title->getUserPermissionsErrors [16:34:51] James_F: the real checks should use Title::getUserPermissionsErrors or Title:userCan [16:34:53] Not that I could tell you why Title has that method [16:34:55] MatmaRex: OK, sure, but what I'm saying is /if/ MW has 'upload' as a right, either UW is not reading that right, or TorBlock is not disabling that right (or both), and that's what we should fix. [16:35:11] MatmaRex: Title? For a non-Title operation? [16:35:13] The latter [16:35:22] well yeah, it's probably not disabling it. why would it? [16:35:43] Because TorBlock is meant to block Tor users from doing anything contribution-like. [16:35:43] if all autoconfirmed users can upload, and you're autoconfirmed, an extension can't take that away. [16:35:48] but it can block the action when it happens. [16:35:51] prevent* [16:36:00] James_F: everything is a Title. [16:36:07] :> [16:36:25] MatmaRex: And thus we find the root of all the brokenness in MediaWiki. [16:36:42] okay, that wasn't true. [16:37:00] ;-) [16:37:05] for the few actions you can make that do not involve a title, you probably need to use User::isAllowed or something. [16:37:13] Oh, I love doxygen. Search for a class name, get thirteen unrelated classes with that class name in it, then four methods on the class you were looking for that take you to the source code for the class [16:37:24] for the remaining vast majority, Title::userCan is the way to go. [16:38:05] I'm not sure if I should just pick a random title in the file namespace and test that, or if I should use Special:Upload or something [16:39:00] what, where [16:39:13] a title might be TitleBlacklisted. or protected against creation. [16:40:10] 6Multimedia, 10Ops-Access-Requests, 6operations: Give Bartosz access to stat1003 ("researchers" and "statistics-users") - https://phabricator.wikimedia.org/T119404#1828364 (10ArielGlenn) It looks like this is the first access request for Bartosz. Please have him go through the steps here https://wikitech.wi... [16:40:14] I need a Title object, it's not a static function [16:40:51] i think i'm lost. what are we implementing? [16:41:29] I'm putting a call to Title#getUserPermissionsErrors into Special:UploadWizard [16:41:52] But I need a Title, and it probably can't be Special:UploadWizard [16:42:11] And you're right, a random File: title would possibly be blacklisted or something else [16:46:39] i don't see how that would help [16:46:51] we check for $user->isAllowed( 'upload' ), and we check for blocks [16:47:07] we can't do more without knowing the file name the user is trying to upload [16:47:57] if you want to support the TorWhatever, you'll need an explicit check, like we do for GlobalBlocking [16:48:59] So check for TorBlock and run one of its hooks? [16:49:25] That would actually work [16:49:49] As long as...no, never mind [16:50:24] I guess at the very least I could make the error not be "api-unknown-error" [16:50:29] Or whatever [16:50:48] Can UW re-use a bit of Special:Upload that has a hook that extensions use? [16:51:23] James_F: Only for checking the upload once we have a target filename [16:51:28] Which is to say, at the last step [16:51:45] Can't we have a GestaltUploadPermission hook? [16:51:50] Maybe not called that. ;-) [16:52:28] We could, but we'd have to add callbacks to TorBlock and whatever else has a getUserPermissionsErrors hook [16:52:49] Sure. [16:53:05] But that's the "right" (horrible evil hacky ghastly MW) answer, no? [16:53:19] 6Multimedia, 10UploadWizard: Wikimedia Commons upload wizard gives "" - https://phabricator.wikimedia.org/T119293#1828387 (10MarkTraceur) FYI I've uncovered the issue(s): * TorBlock is using the hook getUserPermissionsErrorsExpensive, which runs from Title#getUserPermissionsErrors. * U... [16:53:29] James_F: I don't know about "right" [16:53:41] We definitely have the information we want, at least we have it from TorBlock [16:54:14] But, I could add a User#canUploadAtAll function and a matching hook [16:54:31] Or User#canAtAll so it can be used for other stuff later [16:55:09] Yeah. [16:55:22] getUserPermissionsErrorsAnyPage [16:55:24] "I guess at the very least I could make the error not be "api-unknown-error"" this can probably be done, i implemented the necessary thingies for TitleBlacklist recently [16:56:04] https://github.com/wikimedia/mediawiki-extensions-TitleBlacklist/commit/97b433286dc086ea5261b1b88736600b5454887f [16:58:15] I'm going to go down the hook path first, I think [16:59:33] Actually hm [16:59:40] This should probably just get added to isAllowed [17:08:24] Ugh [17:08:35] Tested it with a return false; hook, got...not a helpful error [17:08:52] The action you have requested is limited to users in one of the groups: Users, Administrators. [17:09:13] The message is "badaccess-groups" and it's not what I need to say. [17:13:58] Indeed. [17:20:49] 6Multimedia, 10UploadWizard: Wikimedia Commons upload wizard gives "" - https://phabricator.wikimedia.org/T119293#1828451 (10MarkTraceur) I tried adding a hook "isUserEverAllowed" to the User#isAllowed function, but if I returned false from one of those hooks, I wound up getting an erro... [17:32:07] (03PS1) 10Chad: Use mediawiki.widgets.CategorySelector module for CategorySelector [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255142 (https://phabricator.wikimedia.org/T108733) [17:33:58] (03CR) 10jenkins-bot: [V: 04-1] Use mediawiki.widgets.CategorySelector module for CategorySelector [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255142 (https://phabricator.wikimedia.org/T108733) (owner: 10Chad) [17:34:24] MatmaRex: Where do you fetch the messages from for TitleBlacklist errors in UploadWizard? [17:34:39] I guess you have titleblacklist as a dependency, maybe they're in there [17:36:11] marktraceur: i don't. they're in UW [17:36:22] somewhat hardcoded, it only recognized a few specific error [17:36:22] s [17:36:29] recognizes* errors* [17:36:32] Ugh. [17:38:03] Eww. [17:38:07] VE has this too, FWIW. [17:38:51] James_F: Has what now? [17:39:13] (03PS2) 10Chad: Use mediawiki.widgets.CategorySelector module for CategorySelector [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255142 (https://phabricator.wikimedia.org/T108733) [17:39:15] (03PS1) 10Chad: Copy composer.json from master for great tests [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255144 [17:39:27] marktraceur: Hard-coded handling of a few extensions' abort hooks. [17:39:47] https://github.com/wikimedia/mediawiki-extensions-VisualEditor/blob/master/ApiVisualEditorEdit.php#L122 [17:39:55] if ( isset( $saveresult['edit']['spamblacklist'] ) ) { [17:39:57] (Eww.) [17:41:06] (03CR) 10jenkins-bot: [V: 04-1] Use mediawiki.widgets.CategorySelector module for CategorySelector [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255142 (https://phabricator.wikimedia.org/T108733) (owner: 10Chad) [17:41:16] (03CR) 10Jforrester: [C: 032] Use mediawiki.widgets.CategorySelector module for CategorySelector [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255142 (https://phabricator.wikimedia.org/T108733) (owner: 10Chad) [17:41:26] (03CR) 10Jforrester: [C: 032] Copy composer.json from master for great tests [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255144 (owner: 10Chad) [17:41:28] (03CR) 10jenkins-bot: [V: 04-1] Copy composer.json from master for great tests [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255144 (owner: 10Chad) [17:41:55] Meh. [17:43:51] (03Restored) 10Jforrester: Added Rakefile [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/252193 (https://phabricator.wikimedia.org/T117993) (owner: 10Hashar) [17:43:59] (03CR) 10Jforrester: [C: 032 V: 032] Added Rakefile [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/252193 (https://phabricator.wikimedia.org/T117993) (owner: 10Hashar) [17:45:42] (03CR) 10Bartosz Dziewoński: [C: 032] Optimize SVGs [extensions/MultimediaViewer] - 10https://gerrit.wikimedia.org/r/254922 (owner: 10Ori.livneh) [17:46:05] (03CR) 10Legoktm: "Remove phpcs from composer.json and just run phplint? Also needs the rake thing backported..." [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255144 (owner: 10Chad) [17:48:19] (03PS2) 10Jforrester: Copy composer.json from master for great tests [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255144 (owner: 10Chad) [17:48:26] (03PS3) 10Chad: Copy composer.json from master for great tests [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255144 [17:48:28] (03PS3) 10Chad: Use mediawiki.widgets.CategorySelector module for CategorySelector [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255142 (https://phabricator.wikimedia.org/T108733) [17:48:35] (03CR) 10jenkins-bot: [V: 04-1] Use mediawiki.widgets.CategorySelector module for CategorySelector [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255142 (https://phabricator.wikimedia.org/T108733) (owner: 10Chad) [17:49:20] (03CR) 10Jforrester: [C: 032] Copy composer.json from master for great tests [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255144 (owner: 10Chad) [17:56:18] (03CR) 10jenkins-bot: [V: 04-1] Optimize SVGs [extensions/MultimediaViewer] - 10https://gerrit.wikimedia.org/r/254922 (owner: 10Ori.livneh) [17:57:21] (03Merged) 10jenkins-bot: Copy composer.json from master for great tests [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255144 (owner: 10Chad) [17:57:24] (03Merged) 10jenkins-bot: Use mediawiki.widgets.CategorySelector module for CategorySelector [extensions/UploadWizard] (REL1_26) - 10https://gerrit.wikimedia.org/r/255142 (https://phabricator.wikimedia.org/T108733) (owner: 10Chad) [18:33:34] MatmaRex: Did that titleblacklist patch affect non-API messages at all? I'm seeing I need to use api-error-X if I want to get a sane message out of the ApiMessage::create call [18:35:26] marktraceur: it shouldn't have affected anything else [18:42:13] 6Multimedia, 6Commons, 10MediaWiki-File-management, 7Tracking: Image rotation issues (tracking) - https://phabricator.wikimedia.org/T33504#1828984 (10matmarex) [18:42:16] 6Multimedia, 10UploadWizard: UploadWizard previews don't respect final rotation - https://phabricator.wikimedia.org/T110788#1828981 (10matmarex) 5Open>3Resolved a:3matmarex Presumed fixed, reopen if not. [18:46:16] 6Multimedia, 10UploadWizard, 7Easy, 3Google-Code-In-2015, 7I18n: mwe-upwiz-multi-file-select should guess the key name according to the OS automatically - https://phabricator.wikimedia.org/T113697#1829052 (10matmarex) This can be done with 'jquery.client', `$.client.profile().platform` will give the info... [18:47:35] marktraceur: by the way, the "two or three bugs" i mentioned earlier would be https://phabricator.wikimedia.org/T111227 and https://phabricator.wikimedia.org/T111228 [18:48:46] MatmaRex: Two or three bugs in what? [18:49:16] marktraceur: related to allowing just about everyone to upload files to stash, without checking any permissions [18:49:42] Oh. [18:49:53] marktraceur: the tor bug is the same thing. trying to upload the files (to stash) should give you an error, and not just trying to publish them. [18:50:20] I'll look at them when I get back upstairs [18:51:15] (03CR) 10Jforrester: [C: 032] "…" [extensions/MultimediaViewer] - 10https://gerrit.wikimedia.org/r/254922 (owner: 10Ori.livneh) [18:54:24] (03Merged) 10jenkins-bot: Optimize SVGs [extensions/MultimediaViewer] - 10https://gerrit.wikimedia.org/r/254922 (owner: 10Ori.livneh) [20:07:41] 6Multimedia, 10UploadWizard: Parse wikicode-categories in the Categories-field - https://phabricator.wikimedia.org/T119246#1829331 (10MarkTraceur) As a current workaround, you could probably drop that text into the other information field - it doesn't go into a template, I think, it just gets appended to the d... [20:08:00] 6Multimedia, 10UploadWizard: Parse wikicode-categories in the Categories-field - https://phabricator.wikimedia.org/T119246#1829332 (10MarkTraceur) p:5Triage>3Normal [20:10:03] 6Multimedia, 10UploadWizard, 7I18n: Messages mwe-upwiz-error-too-short and mwe-upwiz-error-too-long are reused, sometimes passed wrong parameters - https://phabricator.wikimedia.org/T118902#1829354 (10MarkTraceur) p:5Triage>3Normal [20:10:26] 6Multimedia, 10UploadWizard: It should be possible to set the position of a custom field(s) in Upload Wizard Campaigns - https://phabricator.wikimedia.org/T114366#1829363 (10MarkTraceur) p:5Triage>3Normal [20:10:53] 6Multimedia, 10UploadWizard: Upload Wizard Campaign custom field length should be adequate - https://phabricator.wikimedia.org/T114364#1829372 (10MarkTraceur) p:5Triage>3Normal [20:11:09] 6Multimedia, 10UploadWizard: It should be possible to limitate Upload Wizard Campaign custom field input not just by length but by any regexp - https://phabricator.wikimedia.org/T114309#1829377 (10MarkTraceur) p:5Triage>3Normal [20:11:37] 6Multimedia, 10UploadWizard: Upload Wizard Campaigns should support making description in a specified language mandatory - https://phabricator.wikimedia.org/T114299#1829386 (10MarkTraceur) p:5Triage>3Normal [20:14:07] 6Multimedia, 6Commons, 10UploadWizard: Trying to upload causes wikimedia to return a - https://phabricator.wikimedia.org/T90233#1829422 (10MarkTraceur) p:5High>3Low Marked as low priority until someone picks this up again - we may have inadvertently fixed something [20:20:55] 6Multimedia, 10VisualEditor, 10VisualEditor-Media: MWMediaDialog: exception "Local uploads are disabled" - https://phabricator.wikimedia.org/T119314#1829482 (10Jdforrester-WMF) p:5Triage>3Low [21:31:09] 6Multimedia, 10Ops-Access-Requests, 6operations: Give Bartosz access to stat1003 ("researchers" and "statistics-users") - https://phabricator.wikimedia.org/T119404#1829716 (10matmarex) Full name: Bartosz Dziewoński Wikitech page: https://wikitech.wikimedia.org/wiki/User:Bartosz_Dziewoński Labs username: Bart... [21:42:37] 6Multimedia, 6Commons, 10MediaWiki-File-management, 10Traffic, 6operations: Image cache issue when 'over-writing' an image on commons - https://phabricator.wikimedia.org/T119038#1829751 (10Yann) Bug again reported here: https://commons.wikimedia.org/wiki/Commons:Bistro#File:La_derni.C3.A8re_charrette_de_... [21:48:45] 6Multimedia, 10Ops-Access-Requests, 6operations: Give Bartosz access to stat1003 ("researchers" and "statistics-users") - https://phabricator.wikimedia.org/T119404#1829770 (10Krenair) The labs username stuff needed is just your shell name (uid, not cn which is used for wikitech usernames). Which you've given... [21:50:18] Krenair: okay, but there are still things which need me to input the actual username to log in (like, say, Gerrit) [21:50:37] Krenair: and every time i pray that nothing messes up the encoding or breaks the spaces on the way [21:54:37] 6Multimedia, 10MediaWiki-Uploading: MediaWiki api doesn't serve EXIF GPSAltitude (and other tags) as decimals - https://phabricator.wikimedia.org/T34410#1829789 (10Bawolff) a:5Bawolff>3None unasigning from self. I don't have plans to work on this in the near or medium term future. I have mixed opinions on...