Skip to content

Conversation

@cewood
Copy link
Contributor

@cewood cewood commented Oct 31, 2025

Summary

Add cewood to Shipyard maintainers group after access was incorrectly dropped during nucleation.

Why do you need this?

Require access for interacting with the IPFS repos, which has been a hindrance to work around without it.

DRI: @aschmahmann

Reviewer's Checklist

  • It is clear where the request is coming from (if unsure, ask)
  • All the automated checks passed
  • The YAML changes reflect the summary of the request
  • The Terraform plan posted as a comment reflects the summary of the request

Adding cewood to Shipyard maintainers group after access was incorrectly dropped during nucleation.
@cewood cewood requested a review from a team as a code owner October 31, 2025 15:52
@github-actions
Copy link
Contributor

The following access changes will be introduced as a result of applying the plan:

Access Changes
User cewood:
  - will gain admin permission to 2019.ipfs.camp
  - will gain admin permission to aegir
  - will gain admin permission to aegir-typedoc-theme
  - will gain admin permission to apps
  - will gain admin permission to artwork
  - will gain admin permission to awesome-ipfs
  - will gain admin permission to bbloom
  - will gain admin permission to benchmarks
  - will gain maintain permission to boxo
  - will gain admin permission to browser-design-guidelines
  - will gain admin permission to camp
  - will gain admin permission to ci-helpers
  - will gain admin permission to community
  - will gain admin permission to devgrants
  - will gain admin permission to distributed-wikipedia-mirror
  - will gain admin permission to distributions
  - will gain admin permission to download-ipfs-distribution-action
  - will gain admin permission to ecosystem-directory
  - will gain admin permission to eslint-config-ipfs
  - will gain admin permission to fs-repo-migrations
  - will gain admin permission to gateway-conformance
  - will gain admin permission to gh-issue-form-test
  - will gain admin permission to go-bitfield
  - will gain admin permission to go-block-format
  - will gain admin permission to go-bs-sqlite3
  - will gain admin permission to go-cid
  - will gain admin permission to go-cidutil
  - will gain admin permission to go-dag-store
  - will gain admin permission to go-datastore
  - will gain admin permission to go-detect-race
  - will gain admin permission to go-dnslink
  - will gain admin permission to go-ds-badger
  - will gain admin permission to go-ds-badger3
  - will gain admin permission to go-ds-badger4
  - will gain admin permission to go-ds-crdt
  - will gain maintain permission to go-ds-dynamodb
  - will gain admin permission to go-ds-flatfs
  - will gain admin permission to go-ds-leveldb
  - will gain admin permission to go-ds-measure
  - will gain admin permission to go-ds-pebble
  - will gain admin permission to go-ds-redis
  - will gain admin permission to go-ds-s3
  - will gain admin permission to go-ds-sql
  - will gain admin permission to go-ds-swift
  - will gain push permission to go-dsqueue
  - will gain admin permission to go-fs-lock
  - will gain admin permission to go-graphsync
  - will gain admin permission to go-ipfs-archived
  - will gain admin permission to go-ipfs-blocksutil
  - will gain admin permission to go-ipfs-cmds
  - will gain admin permission to go-ipfs-delay
  - will gain admin permission to go-ipfs-example-plugin
  - will gain admin permission to go-ipfs-pq
  - will gain maintain permission to go-ipfs-redirects-file
  - will gain admin permission to go-ipld-cbor
  - will gain admin permission to go-ipld-eth-import
  - will gain admin permission to go-ipld-format
  - will gain admin permission to go-ipld-git
  - will gain admin permission to go-ipld-legacy
  - will gain admin permission to go-ipld-zcash
  - will gain admin permission to go-libipfs-rapide
  - will gain admin permission to go-libp2p-dns-router
  - will gain admin permission to go-log
  - will gain admin permission to go-merkledag
  - will gain admin permission to go-metrics-interface
  - will gain admin permission to go-metrics-prometheus
  - will gain admin permission to go-peertaskqueue
  - will gain admin permission to go-qringbuf
  - will gain maintain permission to go-test
  - will gain admin permission to go-todocounter
  - will gain admin permission to go-unixfsnode
  - will gain admin permission to gomod
  - will gain admin permission to hang-fds
  - will gain maintain permission to helia
  - will gain maintain permission to helia-cli
  - will gain maintain permission to helia-delegated-routing-v1-http-api
  - will gain maintain permission to helia-http-gateway
  - will gain maintain permission to helia-remote-pinning
  - will gain maintain permission to helia-verified-fetch
  - will gain admin permission to in-web-browsers
  - will gain admin permission to ipfs
  - will gain admin permission to ipfs-blog
  - will gain maintain permission to ipfs-check
  - will gain admin permission to ipfs-companion
  - will gain admin permission to ipfs-desktop
  - will gain push permission to ipfs-docs
  - will gain admin permission to ipfs-ds-postgres
  - will gain admin permission to ipfs-gui
  - will gain admin permission to ipfs-repository-template
  - will gain admin permission to ipfs-update
  - will gain admin permission to ipfs-website
  - will gain admin permission to ipfs-webui
  - will gain admin permission to ipget
  - will gain admin permission to ipld-explorer-components
  - will gain admin permission to iptb
  - will gain admin permission to iptb-plugins
  - will gain admin permission to js-blockstore-datastore-adapter
  - will gain admin permission to js-dag-service
  - will gain admin permission to js-datastore-pubsub
  - will gain admin permission to js-fs-pull-blob-store
  - will gain admin permission to js-hamt-sharding
  - will gain admin permission to js-idb-pull-blob-store
  - will gain admin permission to js-ipfs-bitswap
  - will gain admin permission to js-ipfs-merkle-dag
  - will gain admin permission to js-ipfs-repo
  - will gain admin permission to js-ipfs-unixfs
  - will gain admin permission to js-ipfs-utils
  - will gain admin permission to js-ipfsd-ctl
  - will gain admin permission to js-ipns
  - will gain admin permission to js-kubo-rpc-client
  - will gain admin permission to js-level-pull-blob-store
  - will gain admin permission to js-stores
  - will gain maintain permission to kubo
  - will gain admin permission to local-offline-collab
  - will gain admin permission to metrics
  - will gain admin permission to mobile-design-guidelines
  - will gain admin permission to newsletter
  - will gain admin permission to npm-kubo
  - will gain admin permission to pinbot-irc
  - will gain admin permission to pinning-services-api-spec
  - will gain admin permission to protons
  - will gain admin permission to public-gateway-checker
  - will gain maintain permission to rainbow
  - will gain admin permission to roadmap
  - will gain admin permission to service-worker-gateway
  - will gain pull permission to sharness
  - will gain maintain permission to someguy
  - will gain admin permission to spec-generator
  - will gain admin permission to specs
  - will gain admin permission to start-ipfs-daemon-action

@github-actions
Copy link
Contributor

Before merge, verify that all the following plans are correct. They will be applied as-is after the merge.

Terraform plans

ipfs

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # github_team_membership.this["shipyard:cewood"] will be created
  + resource "github_team_membership" "this" {
      + etag     = (known after apply)
      + id       = (known after apply)
      + role     = "maintainer"
      + team_id  = "11478581"
      + username = "cewood"
    }

Plan: 1 to add, 0 to change, 0 to destroy.

@aschmahmann aschmahmann merged commit 93aad88 into ipfs:master Oct 31, 2025
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants