Skip to content
Snippets Groups Projects
  1. Mar 10, 2021
  2. Feb 26, 2021
  3. Feb 02, 2021
    • Andrej Shadura's avatar
      Add a basic test of apertis-pkg-pull-updates functionality · 42f100b1
      Andrej Shadura authored
      
      Try to download an update for dash from Buster, given a repository
      with a version from Lenny. Don’t try to check when exactly is in the
      update, as versions may change, but verify a tarball has been imported.
      
      Signed-off-by: default avatarAndrej Shadura <andrew.shadura@collabora.co.uk>
      42f100b1
    • Andrej Shadura's avatar
      Add a basic test of apertis-pkg-merge-updates functionality · 02ea4c05
      Andrej Shadura authored
      
      This will try to merge an "update" of dash on a completely made-up
      package history. There are two fixtures, sharing common parts. They
      both:
      
      * Start with an ancient dash version from Lenny, 0.5.4-12.
      * This version is imported as 0.5.4-12co0 into an imaginary
        Apertis version.
      * A "new" version of dash, 0.5.10.2-1 is imported from a 2018
        cut of Buster.
      * This new version is merged into Apertis as 0.5.10.2-1co0
      
      From this point, the "modified" fixture differs:
      * An imaginary Apertis developer changes the compat level in
        the imported version from 10 to 11, thus introducing a delta
        which however is not going to conflict with any further version
        of dash in Buster.
      
      apertis-pkg-merge-updates is expected to merge the update into the
      "unmodified" repository as 0.5.10.2-5co0 and finalise the changelog.
      
      For the "modified" repository, it should import the update as
      0.5.10.2-5co1, add "PLEASE SUMMARIZE remaining Apertis changes" note
      to the top entry and leave it UNRELEASED.
      
      Signed-off-by: default avatarAndrej Shadura <andrew.shadura@collabora.co.uk>
      02ea4c05
  4. Jan 15, 2021
    • Emanuele Aina's avatar
      gilab-ci: Apply all `latest` tags once everything else succeeded · 2dc096d6
      Emanuele Aina authored
      
      By applying `latest` tags as soon as the relevant image has been built
      we end up with a quite large time window where they are all quite out
      of sync: in particular, the tag is applied to the `base` image as soon
      as it is ready, before all the depending images get built.
      
      On top of that, if depending images fail, the `latest` tags will stay
      out of sync.
      
      This can be quite confusing for users, so let's apply the `latest` tag
      only after all the previous stages have completed.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      2dc096d6
    • Emanuele Aina's avatar
      gitlab-ci: Ensure that `latest` tag comes from the latest pipeline · aa6fd73d
      Emanuele Aina authored
      
      We want to ensure that the jobs updating the `latest` tags always reflect
      the actual latest pipeline.
      
      When two pipelines are started at the same time on the same branch
      sometimes the earlier one can complete last due to scheduling or any
      other reason, thus breaking the previous assumption.
      
      To avoid that, make the whole pipeline interruptible up to the tagging jobs
      so that earlier pipelines get killed when a new one is started.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      aa6fd73d
  5. Dec 10, 2020
  6. Dec 02, 2020
  7. Nov 13, 2020
  8. Nov 10, 2020
    • Emanuele Aina's avatar
      gitlab-ci: Fix job dependencies · eb5e9b8a
      Emanuele Aina authored
      
      The `.build-docker-image` template had an explicit `needs:` pointing to
      `build-base-rootfs` which was only correct for `build-base-docker-image`
      as other build jobs actually depend on `build-base-docker-image`.
      
      Most of the build jobs did indeed overrid `needs:` except
      `build-image-builder-docker-image` and
      `build-flatdeb-builder-docker-image` which ended up having a race
      condition which caused them to fail if they got executed after
      `build-base-rootfs` was done but before `build-base-docker-image` pushed
      the base image.
      
      Fix that by getting rid of the `needs:` and simply relying on stages
      for sequencing the build jobs.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      eb5e9b8a
    • Emanuele Aina's avatar
      gitlab-ci: Accept $BUILD_ID CI var to create additional tags · 882bbd76
      Emanuele Aina authored and Martyn Welch's avatar Martyn Welch committed
      
      When triggering a pipeline, by setting the `BUILD_ID` CI variable it is
      now possible to tell the pipeline to create `$IMAGE:$BUILD_ID` tags
      like `v2022dev0-image-builder:20201225.000`.
      
      With this it is possible to have an external orchestrator trigger all
      the nightly pipelines with a shared build id, rather than have each
      pipeline compute one at different times.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      882bbd76
  9. Nov 07, 2020
  10. Oct 01, 2020
    • Emanuele Aina's avatar
      gitlab-ci: Preserve images built from the same commit · 99c9126c
      Emanuele Aina authored
      
      Untagged images are cleaned immediately from the GitLab container
      registry, so to preserve them for reproducibility purposes we tag every
      build with an unique name and have set a cleanup policy to drop these
      tags (currently once a week).
      
      Unfortunately the unique ID I choose is not much unique: I reused code
      from another project that only builds images when new commits are
      pushed, so I used the `$CI_COMMIT_SHA` value which is far from unique
      when multiple images are built for the same commit due to the regularly
      scheduled daily builds.
      
      Using the `$CI_PIPELINE_ID` should provide an actual unique ID and let
      people retrieve the originating pipeline more easily.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      99c9126c
  11. Sep 22, 2020
  12. Sep 17, 2020
    • Sjoerd Simons's avatar
      Use upstream debos container for the base rootfs · 9c3769e0
      Sjoerd Simons authored and Ritesh Raj Sarraf's avatar Ritesh Raj Sarraf committed
      
      Using the docker container for the *current* apertis release to build
      the base rootfs for all docker images leads to a bootstrapping issue. So
      that should be avoided.
      
      The options for that are:
      * Use a docker image from a previous Apertis release
      * Use a non-apertis image
      
      Using a docker image from Apertis (e.g. previous stable) is workable but
      just pushes the bootstrapping issue down the line. So not really that
      helpful (at some point you'll reach a stable release that's not longer
      supported and might be dropped).
      
      So avoiding Apertis in the bootstrapping chain seems recommendable. For
      that simply pick the upstream debos images so we can keep using debos;
      That still requires a kvm based worker, but so would previous stable
      apertis releases at this point.
      
      Signed-off-by: default avatarSjoerd Simons <sjoerd@collabora.com>
      9c3769e0
  13. Sep 16, 2020
  14. Sep 08, 2020
  15. Sep 07, 2020
  16. Aug 19, 2020
  17. Jun 21, 2020
  18. May 25, 2020
  19. May 05, 2020
  20. Apr 06, 2020
    • Sjoerd Simons's avatar
      image-builder: Add a test job buidling a simple Debos recipe · e98e402c
      Sjoerd Simons authored and Emanuele Aina's avatar Emanuele Aina committed
      
      Building the Docker images but not testing them can lead to issues, so
      add a test job with a trivial debos recipe to at least smoke test the
      image-builder Docker image.
      
      As the Docker image tag which gets pushed is dynamically determined it
      can't be defined in the main gitlab-ci.yml. To work around that generate
      a child pipeline to trigger afterwards with the dynamic variables
      substituted (dotenv artifacts are unfortunately not yet useful here,
      as for 12.9 they only work for `environment:url:` keys). Note that the
      trigger job uses the depend strategy to ensure it blocks and inherits
      the state of the child pipeline, otherwise the main pipeline will
      succeed even if the child fails.
      
      In a perfect world the image builder docker image would only be tagged
      after a successful test. But that's for later, for now this is useful in
      merge requests.
      
      Signed-off-by: default avatarSjoerd Simons <sjoerd@collabora.com>
      e98e402c
    • Sjoerd Simons's avatar
      gitlab-ci: Tag build-base-rootfs job with kvm · 5cb9551f
      Sjoerd Simons authored and Emanuele Aina's avatar Emanuele Aina committed
      
      The build-base-rootfs job uses the apertis v2020 image builder docker
      image which needs kvm to run, so tag the job as such.
      
      Signed-off-by: default avatarSjoerd Simons <sjoerd@collabora.com>
      5cb9551f
    • Sjoerd Simons's avatar
      gitlab-ci: Convert calculate-release to before_script · 27466691
      Sjoerd Simons authored and Emanuele Aina's avatar Emanuele Aina committed
      
      Turn the `calculate-release` snippet to a `before_script:` entry;
      it's ran on every job anyway and avoids using a YAML anchor inside an
      `extends:` entry. This will be helpful later as GitLab CI only supports
      one level of expanding script arrays.
      
      Signed-off-by: default avatarSjoerd Simons <sjoerd@collabora.com>
      27466691
  21. Mar 18, 2020
  22. Mar 12, 2020
  23. Feb 21, 2020
  24. Jan 17, 2020
    • Andrej Shadura's avatar
      Move Docker image building from Jenkins to GitLab CI · 2900db0f
      Andrej Shadura authored
      
      Instead of building all images individually, try and build Apertis-based
      ones from the same common ground. First create a fairly basic Apertis
      ospack with a few development tools in, then create a Docker image out of
      it and layer things on top of it.
      
      This unifies the previously separate overlays for the package builder and
      the package source builder, only keeping the real differences in their
      respective overlays.
      
      We opt to not use Docker proper since it requires non-trivial
      Docker-in-Docker setup. Makisu, which could be used as an alternative,
      unfortunately, has buggy implementation of the ADD command, leaving us
      the only option to use Kaniko.
      
      The docker building step is templated in .gitlab-ci.yml to avoid
      repetition. The Debian-based images don’t normally have to depend on the
      rootfs building step, but to be able to run them asynchronously in the
      same pipeline stage we need to declare the dependency anyway, as GitLab CI
      does not currently support empty "needs" lists.
      
      The branches named apertis/* build their respective Apertis releases,
      everything else builds the default defined in the CI YAML file.
      
      The jobs for apertis/* branches tag their build images as "latest", every
      other job uses the branch name.
      
      For robustness, the debos rootfs step uses a stable v2020 image builder
      step instead of the currently built one.
      
      Signed-off-by: default avatarAndrej Shadura <andrew.shadura@collabora.co.uk>
      2900db0f
Loading