Skip to content
Snippets Groups Projects
  1. Jan 12, 2021
  2. Dec 18, 2020
    • Frederic Danis's avatar
      Add FOSSology to ci-license-scan · d47d105a
      Frederic Danis authored
      
      To improve license scan process we add license scan using a `FOSSology`
      server.
      
      The `fossology.py` adds an `ApertisFossolgy` class which is able to:
      - request upload of source code from Git server to FOSSology server,
      - retrieve references of previous scan for this source code,
      - request scan of the source code,
      - download analysis report.
      - remove FOSSology header, project's name in file path and sort files
      
      This class is used in `ci-licence-scan` to generate the
      `debian/apertis/copyright.fossology` file.
      
      Signed-off-by: default avatarFrédéric Danis <frederic.danis@collabora.com>
      d47d105a
  3. Dec 14, 2020
  4. Dec 10, 2020
  5. Dec 04, 2020
  6. Dec 02, 2020
  7. Nov 13, 2020
  8. Nov 10, 2020
    • Emanuele Aina's avatar
      gitlab-ci: Fix job dependencies · eb5e9b8a
      Emanuele Aina authored
      
      The `.build-docker-image` template had an explicit `needs:` pointing to
      `build-base-rootfs` which was only correct for `build-base-docker-image`
      as other build jobs actually depend on `build-base-docker-image`.
      
      Most of the build jobs did indeed overrid `needs:` except
      `build-image-builder-docker-image` and
      `build-flatdeb-builder-docker-image` which ended up having a race
      condition which caused them to fail if they got executed after
      `build-base-rootfs` was done but before `build-base-docker-image` pushed
      the base image.
      
      Fix that by getting rid of the `needs:` and simply relying on stages
      for sequencing the build jobs.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      eb5e9b8a
    • Emanuele Aina's avatar
      gitlab-ci: Accept $BUILD_ID CI var to create additional tags · 882bbd76
      Emanuele Aina authored and Martyn Welch's avatar Martyn Welch committed
      
      When triggering a pipeline, by setting the `BUILD_ID` CI variable it is
      now possible to tell the pipeline to create `$IMAGE:$BUILD_ID` tags
      like `v2022dev0-image-builder:20201225.000`.
      
      With this it is possible to have an external orchestrator trigger all
      the nightly pipelines with a shared build id, rather than have each
      pipeline compute one at different times.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      882bbd76
  9. Nov 07, 2020
  10. Oct 20, 2020
  11. Oct 02, 2020
  12. Oct 01, 2020
    • Emanuele Aina's avatar
      gitlab-ci: Preserve images built from the same commit · 99c9126c
      Emanuele Aina authored
      
      Untagged images are cleaned immediately from the GitLab container
      registry, so to preserve them for reproducibility purposes we tag every
      build with an unique name and have set a cleanup policy to drop these
      tags (currently once a week).
      
      Unfortunately the unique ID I choose is not much unique: I reused code
      from another project that only builds images when new commits are
      pushed, so I used the `$CI_COMMIT_SHA` value which is far from unique
      when multiple images are built for the same commit due to the regularly
      scheduled daily builds.
      
      Using the `$CI_PIPELINE_ID` should provide an actual unique ID and let
      people retrieve the originating pipeline more easily.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      99c9126c
  13. Sep 22, 2020
  14. Sep 17, 2020
    • Ritesh Raj Sarraf's avatar
    • Sjoerd Simons's avatar
      Use upstream debos container for the base rootfs · 9c3769e0
      Sjoerd Simons authored and Ritesh Raj Sarraf's avatar Ritesh Raj Sarraf committed
      
      Using the docker container for the *current* apertis release to build
      the base rootfs for all docker images leads to a bootstrapping issue. So
      that should be avoided.
      
      The options for that are:
      * Use a docker image from a previous Apertis release
      * Use a non-apertis image
      
      Using a docker image from Apertis (e.g. previous stable) is workable but
      just pushes the bootstrapping issue down the line. So not really that
      helpful (at some point you'll reach a stable release that's not longer
      supported and might be dropped).
      
      So avoiding Apertis in the bootstrapping chain seems recommendable. For
      that simply pick the upstream debos images so we can keep using debos;
      That still requires a kvm based worker, but so would previous stable
      apertis releases at this point.
      
      Signed-off-by: default avatarSjoerd Simons <sjoerd@collabora.com>
      9c3769e0
  15. Sep 16, 2020
  16. Sep 10, 2020
  17. Sep 09, 2020
  18. Sep 08, 2020
  19. Sep 07, 2020
  20. Aug 19, 2020
  21. Jul 29, 2020
    • Emanuele Aina's avatar
      ci-license-scan: A control char is gibberish enough · 0c2ab442
      Emanuele Aina authored
      
      Assume that any string containing a control character is gibberish.
      
      Rely on the `unicodedata` module to know which character is a control
      character and what is not.
      
      This addresses some bad interactions with control characters ending up
      in the diff output, like u+0098 aka Start-Of-String (SOS) preventing the
      output to be displayed on terminal emulators like xterm.
      
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
      0c2ab442
  22. Jul 28, 2020
Loading