1. 05 Sep, 2019 1 commit
  2. 31 Jul, 2019 1 commit
  3. 29 Jul, 2019 1 commit
  4. 18 Jul, 2019 1 commit
    • Emanuele Aina's avatar
      arcrc: Stub data to avoid crash on startup · ccf4e1f6
      Emanuele Aina authored
      On a fresh checkout, `docker-compose up` fails with:
          Starting QA Report App
          Traceback (most recent call last):
            File "./webhook.py", line 350, in <module>
            File "./webhook.py", line 334, in main
            File "/app/taskmanager.py", line 50, in connect_to_phab
            File "/usr/lib/python3.7/json/__init__.py", line 296, in load
              parse_constant=parse_constant, object_pairs_hook=object_pairs_hook, **kw)
            File "/usr/lib/python3.7/json/__init__.py", line 348, in loads
              return _default_decoder.decode(s)
            File "/usr/lib/python3.7/json/decoder.py", line 337, in decode
              obj, end = self.raw_decode(s, idx=_w(s, 0).end())
            File "/usr/lib/python3.7/json/decoder.py", line 355, in raw_decode
              raise JSONDecodeError("Expecting value", s, err.value) from None
          json.decoder.JSONDecodeError: Expecting value: line 1 column 1 (char 0)
      By making the default `arcrc` valid enough the service now starts up
      just fine and it simply disables the Phabricator connection:
          Phab API connection failed: ERR-INVALID-AUTH: API token "replace-me-with-an-actual-token!" has the wrong format. API tokens should be 32 characters long and begin with one of these prefixes: api, cli, clr.
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
  5. 12 Jul, 2019 4 commits
  6. 11 Jul, 2019 5 commits
  7. 09 Jul, 2019 2 commits
  8. 08 Jul, 2019 1 commit
    • Emanuele Aina's avatar
      Fix HTTPS detection when running behind a proxy · 75b6f9ca
      Emanuele Aina authored
      In production the application is currently run behind a TLS-terminating nginx
      proxy which forces the `Host` header and sets the `X-Forwarded-For` and
      `X-Forwarded-Proto` headers.
      However, nothing on the application side handles the `X-Forwarded-*` headers,
      causing authentication against GitLab through OAUth2 to fail since the
      generated callback URL uses plain `http://` while OAuth2 requires it to
      be `https://`, yielding the `The redirect URI included is not valid`
      error message.
      This adds a `PROXY_COUNT` environment variable to be set to the number of
      trusted proxies in front of the application. It defaults to zero to to avoid
      issues if malicious actors set the headers above in a non-proxied setup.
      Signed-off-by: Emanuele Aina's avatarEmanuele Aina <emanuele.aina@collabora.com>
  9. 05 Jul, 2019 1 commit
  10. 02 Jul, 2019 1 commit
  11. 01 Jul, 2019 1 commit
    • Luis Araujo's avatar
      Add page to submit manual tests results for image type · af728d53
      Luis Araujo authored
      Add the page to submit the manual tests results for specific images types.
      It renames some routes and methods to clearly state the function of the
      pages and also adds a 'submitted' page to show a message after the tests
      results submission.
      The commit only includes the pages and forms but it doesn't enable the
      functionality to submit tests results yet.
      Signed-off-by: Luis Araujo's avatarLuis Araujo <luis.araujo@collabora.co.uk>
  12. 26 Jun, 2019 2 commits
  13. 25 Jun, 2019 2 commits
  14. 24 Jun, 2019 4 commits
  15. 20 Jun, 2019 1 commit
  16. 14 Jun, 2019 5 commits
  17. 13 Jun, 2019 6 commits
  18. 08 Jun, 2019 1 commit