What is Taiga?

On the first view Taiga (taiga.io) is a open source Trello replacement. On the second it is way more than that. Taiga does offer a lot more integration into Scrum and Kanban Workflow than Trello could ever do (even if you would pay for all those neat power-ups). Taiga is offered as hosted and self-hosted (as it is completely open source) and does offer all features in payed and free accounts on the hosted solution. Unlike tools like Gitlab where there are premium features that are held back for the enterprise offering this tool is developed in the open (https://github.com/taigaio).

Taiga does offer proper Backlogs and Sprints that are connected with each other. In Trello you loose the connection between your Backlog and Sprintboard at some point and tracking does get harder.

On top of that Taiga offers importers for Trello, Github Issues, Jira and Asana. These would be very helpful for teams to migrate away from current tools and organize everything in one place that was developed with Scrum and Kanban in mind.

Why do we need a Bugzilla Sync?

Automatic downsyncing of Bugzilla Bugs into Taiga would ease the job of POs, TPMs and SMs. You won't have to enter Bugzilla bugs in your teams Scrum Board anymore as you do now in Trello. To make it easier, it would be a good idea to support downsyncing first as this doesn't harm the Bugzilla database.

How could it work?

A user creates a custom search query on Bugzilla which results in a list of bugs that are relevant for the Backlog of the Scrum Team. This list will be checked against the current backlog and updated in Taiga (minimum including the title, bug number, bug description and severity). It should also check against current sprints to make sure that it is not added as a duplicate to the backlog.

Taiga does offer some APIs to achieve that. On Bugzilla side I am not sure, but as a last resort we could use a site crawler (EDIT:There is an API for Bugzilla: https://github.com/dmacvicar/bicho).

Looking for hackers with the skills:

python angular angularjs angular.js django taiga bugzilla

This project is part of:

Hack Week 17

Activity

  • over 6 years ago: okurz liked this project.
  • over 6 years ago: aspiers liked this project.
  • over 6 years ago: suntorytimed left this project.
  • over 6 years ago: suntorytimed liked this project.
  • over 6 years ago: suntorytimed added keyword "taiga" to this project.
  • over 6 years ago: suntorytimed added keyword "bugzilla" to this project.
  • over 6 years ago: suntorytimed added keyword "python" to this project.
  • over 6 years ago: suntorytimed added keyword "angular" to this project.
  • over 6 years ago: suntorytimed added keyword "angularjs" to this project.
  • over 6 years ago: suntorytimed added keyword "angular.js" to this project.
  • over 6 years ago: suntorytimed added keyword "django" to this project.
  • over 6 years ago: suntorytimed started this project.
  • over 6 years ago: suntorytimed originated this project.

  • Comments

    • vitoravelino
      over 6 years ago by vitoravelino | Reply

      I had a similar idea but for trello and a deeper sync (comments and status changes). I still need to think how it would work.

    • suntorytimed
      over 6 years ago by suntorytimed | Reply

      There is an API for Bugzilla: https://github.com/dmacvicar/bicho

    Similar Projects

    Team Hedgehogs' Data Observability Dashboard by gsamardzhiev

    Description

    This project aims to develop a comprehensive Data Observability Dashboard that provides r insights into key aspects of data quality and reliability. The dashboard will track:

    Data Freshness: Monitor when data was last updated and flag potential delays.

    Data Volume: Track table row counts to detect unexpected surges or drops in data.

    Data Distribution: Analyze data for null values, outliers, and anomalies to ensure accuracy.

    Data Schema: Track schema changes over time to prevent breaking changes.

    The dashboard's aim is to support historical tracking to support proactive data management and enhance data trust across the data function.

    Goals

    Although the final goal is to create a power bi dashboard that we are able to monitor, our goals is to 1. Create the necessary tables that track the relevant metadata about our current data 2. Automate the process so it runs in a timely manner

    Resources

    AWS Redshift; AWS Glue, Airflow, Python, SQL

    Why Hedgehogs?

    Because we like them.


    Saline (state deployment control and monitoring tool for SUSE Manager/Uyuni) by vizhestkov

    Project Description

    Saline is an addition for salt used in SUSE Manager/Uyuni aimed to provide better control and visibility for states deploymend in the large scale environments.

    In current state the published version can be used only as a Prometheus exporter and missing some of the key features implemented in PoC (not published). Now it can provide metrics related to salt events and state apply process on the minions. But there is no control on this process implemented yet.

    Continue with implementation of the missing features and improve the existing implementation:

    • authentication (need to decide how it should be/or not related to salt auth)

    • web service providing the control of states deployment

    Goal for this Hackweek

    • Implement missing key features

    • Implement the tool for state deployment control with CLI

    Resources

    https://github.com/openSUSE/saline


    Run local LLMs with Ollama and explore possible integrations with Uyuni by PSuarezHernandez

    Description

    Using Ollama you can easily run different LLM models in your local computer. This project is about exploring Ollama, testing different LLMs and try to fine tune them. Also, explore potential ways of integration with Uyuni.

    Goals

    • Explore Ollama
    • Test different models
    • Fine tuning
    • Explore possible integration in Uyuni

    Resources

    • https://ollama.com/
    • https://huggingface.co/
    • https://apeatling.com/articles/part-2-building-your-training-data-for-fine-tuning/


    Ansible for add-on management by lmanfredi

    Description

    Machines can contains various combinations of add-ons and are often modified during the time.

    The list of repos can change so I would like to create an automation able to reset the status to a given state, based on metadata available for these machines

    Goals

    Create an Ansible automation able to take care of add-on (repo list) configuration using metadata as reference

    Resources

    Results

    Created WIP project Ansible-add-on-openSUSE


    Testing and adding GNU/Linux distributions on Uyuni by juliogonzalezgil

    Join the Gitter channel! https://gitter.im/uyuni-project/hackweek

    Uyuni is a configuration and infrastructure management tool that saves you time and headaches when you have to manage and update tens, hundreds or even thousands of machines. It also manages configuration, can run audits, build image containers, monitor and much more!

    Currently there are a few distributions that are completely untested on Uyuni or SUSE Manager (AFAIK) or just not tested since a long time, and could be interesting knowing how hard would be working with them and, if possible, fix whatever is broken.

    For newcomers, the easiest distributions are those based on DEB or RPM packages. Distributions with other package formats are doable, but will require adapting the Python and Java code to be able to sync and analyze such packages (and if salt does not support those packages, it will need changes as well). So if you want a distribution with other packages, make sure you are comfortable handling such changes.

    No developer experience? No worries! We had non-developers contributors in the past, and we are ready to help as long as you are willing to learn. If you don't want to code at all, you can also help us preparing the documentation after someone else has the initial code ready, or you could also help with testing :-)

    The idea is testing Salt and Salt-ssh clients, but NOT traditional clients, which are deprecated.

    To consider that a distribution has basic support, we should cover at least (points 3-6 are to be tested for both salt minions and salt ssh minions):

    1. Reposync (this will require using spacewalk-common-channels and adding channels to the .ini file)
    2. Onboarding (salt minion from UI, salt minion from bootstrap scritp, and salt-ssh minion) (this will probably require adding OS to the bootstrap repository creator)
    3. Package management (install, remove, update...)
    4. Patching
    5. Applying any basic salt state (including a formula)
    6. Salt remote commands
    7. Bonus point: Java part for product identification, and monitoring enablement
    8. Bonus point: sumaform enablement (https://github.com/uyuni-project/sumaform)
    9. Bonus point: Documentation (https://github.com/uyuni-project/uyuni-docs)
    10. Bonus point: testsuite enablement (https://github.com/uyuni-project/uyuni/tree/master/testsuite)

    If something is breaking: we can try to fix it, but the main idea is research how supported it is right now. Beyond that it's up to each project member how much to hack :-)

    • If you don't have knowledge about some of the steps: ask the team
    • If you still don't know what to do: switch to another distribution and keep testing.

    This card is for EVERYONE, not just developers. Seriously! We had people from other teams helping that were not developers, and added support for Debian and new SUSE Linux Enterprise and openSUSE Leap versions :-)

    Pending

    FUSS

    FUSS is a complete GNU/Linux solution (server, client and desktop/standalone) based on Debian for managing an educational network.

    https://fuss.bz.it/

    Seems to be a Debian 12 derivative, so adding it could be quite easy.

    • [W] Reposync (this will require using spacewalk-common-channels and adding channels to the .ini file)
    • [W] Onboarding (salt minion from UI, salt minion from bootstrap script, and salt-ssh minion) (this will probably require adding OS to the bootstrap repository creator) --> Working for all 3 options (salt minion UI, salt minion bootstrap script and salt-ssh minion from the UI).
    • [W] Package management (install, remove, update...) --> Installing a new package works, needs to test the rest.
    • [I] Patching (if patch information is available, could require writing some code to parse it, but IIRC we have support for Ubuntu already). No patches detected. Do we support patches for Debian at all?
    • [W] Applying any basic salt state (including a formula)
    • [W] Salt remote commands
    • [ ] Bonus point: Java part for product identification, and monitoring enablement


    Cobbler Angular Web Interface by SchoolGuy

    Project Description

    The old Cobbler webinterface was built into the server, leading to a huge dependency stack only required for a few people.

    Goal for this Hackweek

    The project should aim to finalize the first prototype of the new Angular based web interface.

    A secondary goal of this hackweek is to learn a lot of Angular.

    Update for Hackweek 24

    The GH project received some traction since I have some vacation. As such it is my aim to get a first alpha released to close the milestone 0.0.1 (or whatever version I can release with semantic release).

    Resources