Fabrizio Ferrai

Results 49 issues of Fabrizio Ferrai

Thanks for the great talk today :slightly_smiling_face: I found that when calling `the`/`typed` on a type that is missing the `HasType` constraint - e.g. when wiring up some code using...

Usecase/context: we're designing a [Package Registry for PureScript](https://github.com/purescript/registry) in Dhall, and in the current iteration we're storing things like "dependencies" and "build targets" in a Dhall `Map`, because they are...

As @Gabriel439 explained in https://github.com/dhall-lang/dhall-haskell/issues/1096#issuecomment-510963407: > the main issue we're running into is that the dhall package is actually doing two separate things: > - Providing a native Haskell binding...

build

As noted in #9, we should probably write down a comparison with other solutions in the readme. So far on the list: - Helm - Jinja

help wanted

There is some cases in which we mark some fields as required, but they are not. We should somehow figure out if they are actually required only in some situations,...

discussion

Since we have a bunch of things enforced by the CI, it might be a good idea to add a PR template containing a checklist like: - Run the tests...

enhancement

We should have a view that displays the build status for the `master` branch of every repo that has CI enabled (a bit like it's possible to do with [this...

enhancement

Running times for stages are usually displayed as `23:56:44`, which are obviously wrong.

bug
good first issue

Some pipelines contain jobs which belong to different environments. We should group the job icons in the `stages` section, by environment.

enhancement
good first issue

We're getting this exception since some time (we're getting ~2k of them a day): ``` in.tazj.k8s.letsencrypt.util.LetsencryptException: No matching zone found. at in.tazj.k8s.letsencrypt.acme.CloudDnsResponder.updateCloudDnsRecord(CloudDnsResponder.kt:59) at in.tazj.k8s.letsencrypt.acme.CloudDnsResponder.addChallengeRecord(CloudDnsResponder.kt:26) at in.tazj.k8s.letsencrypt.acme.CertificateRequestHandler.prepareDnsChallenge(CertificateRequestHandler.kt:177) at in.tazj.k8s.letsencrypt.acme.CertificateRequestHandler.authorizeDomain(CertificateRequestHandler.kt:77) at in.tazj.k8s.letsencrypt.acme.CertificateRequestHandler.access$authorizeDomain(CertificateRequestHandler.kt:27)...