See the Deploy documentation for access to self-hosted services.
If a service is down, check its status page:
Amazon Web Services¶
There should be a minimum of two Super Admin users from OCP only.
Less secure apps is set to “Allow users to manage their access to less secure apps” for the open-contracting.org domain, and Allow less secure apps is set to “ON” for the firstname.lastname@example.org user, so that Redmine can fetch mail.
There should be a minimum of two Organization Administrator roles from OCP only.
ocds project, IAM should only include Google-managed service accounts,
email@example.com. Service accounts should only include default service accounts and
ods-crm-redmine-backup. It should only use two storage buckets (
firstname.lastname@example.org must have the “Storage Admin” role (
roles/storage.admin), to get the
- Library (two storage buckets)
- Website Search (API key)
In case a new user needs to be given admin access to the
ocds project, you can run, for example:
gcloud projects add-iam-policy-binding ocds-172716 --member user:email@example.com --role roles/owner
All users with access to this folder should belong to OCP, Centro de Desarrollo Sostenible (CDS) and Open Data Services Co-operative Limited (ODS).
Only users who are reasonably expected to upload releases should have the Maintainer role. If a third-party organization maintains a package, there can be one user from that organization with the Owner role to add maintainers (e.g.
There should be a minimum of two users with the Maintainer role from OCP.
Third-party maintainers of PyPI packages can be added to the package’s associated ReadTheDocs project, including organizational accounts (e.g.
There should be a minimum of two members with the Owner role and one member with the Billing role from OCP.
Third-party developers can be added with the Admin or Member role to organization-specific teams for specific projects.