Martchus
836b7da8a3
Invoke `paccache` as part of the build service cleanup
2023-04-07 19:15:16 +02:00
Martchus
08af21ddb5
Fix warnings about unqualified calls in `buildaction.cpp`
2023-04-07 17:55:13 +02:00
Martchus
9702d4f207
Add paths for pacman/paccache to server setup
2023-04-07 17:52:52 +02:00
Martchus
2b0b495715
Add missing <cstdint> include
2023-04-07 17:52:21 +02:00
Martchus
e02d4d449c
Use `pubsetbuf` only with `libstdc++`
...
This usage of the function seems only to work as intended with that
standard lib. With `libc++` and the MSVC standard lib the call has no
effect.
2023-02-28 21:21:04 +01:00
Martchus
2e448b427b
Consider libs under `…/lib/linux/…` Android-specific as well
2023-02-18 20:29:44 +01:00
Martchus
e477613a8b
Implement preserving chroot for containerized builds as well
...
This keeps the container around by passing the `DEBUG´ environment variable
recognized by `makechrootpkg`.
2023-02-03 23:06:43 +01:00
Martchus
e5f4dc156c
Avoid unqualified call to `std::move`
2023-02-03 21:30:42 +01:00
Martchus
cc9f90acfc
Make it easier to select build action when pre-defined task is selected
2023-01-31 14:10:02 +01:00
Martchus
79eb9e849c
Fix about dialog not closable when vieport height is not sufficient
2023-01-31 13:45:40 +01:00
Martchus
e14eb17c60
Apply clang-format
2023-01-23 22:42:45 +01:00
Martchus
2fd30f5a0f
Adapt tests to boost 1.81
2023-01-23 22:41:01 +01:00
Martchus
45d97a1c63
Support version 3 of Catch2 in test cases of lmdb-safe
2023-01-22 23:08:07 +01:00
Martchus
31d1025b85
Fix compilation against boost 1.81.0
2023-01-22 22:31:20 +01:00
Martchus
5f25e6e8b7
Avoid unqualified calls to `std::move`
2023-01-22 22:30:07 +01:00
Martchus
599185d3ae
Use async locks when invoking custom command
2023-01-17 23:27:36 +01:00
Martchus
80b5094659
Use async locks in repo actions
2023-01-17 22:20:10 +01:00
Martchus
bb9da06950
Use async lock to lock repo when adding package
2023-01-17 22:07:00 +01:00
Martchus
4f413e86ba
Allow to abort build action immediately while waiting for chroot locks
...
* Avoid aborted build actions from being stuck in running state while
waiting until the chroot locks can be acquired; allow aborting action
immediately instead
* Use async locks when invoking makechrootpkg and split affected function
accordingly
2023-01-17 18:40:05 +01:00
Martchus
b8f211e1d1
Make functions to invoke build async
2023-01-17 18:40:05 +01:00
Martchus
8dfa948e03
Implement helper functions for async global locks
2023-01-17 18:40:05 +01:00
Martchus
e74f80a089
Update copyright notice
2023-01-17 18:39:46 +01:00
Martchus
036aa2c090
Fix "invalid escape" in regular expression in test suite
2022-12-29 17:33:01 +01:00
Martchus
874152a2cb
Update xtermjs to 5.1.0
2022-12-20 22:09:26 +01:00
Martchus
c404a092cc
Add async locks
...
This might be useful to avoid blocking threads in the thread pool just for
waiting on a global lock. It might also be useful to allow stopping build
actions while they're waiting for a lock.
2022-12-04 00:28:47 +01:00
Martchus
b1acbee127
Add very basic test for build service cleanup
2022-11-24 23:12:01 +01:00
Martchus
218e1f6b17
Add simple cleanup of old build actions
2022-11-24 21:33:42 +01:00
Martchus
9cf0fed450
Avoid duplicating "Clone of" in task name
2022-11-13 22:44:41 +01:00
Martchus
9c219288c9
Render name and version of packages in build preparation correctly
2022-11-13 22:37:32 +01:00
Martchus
aff7853f94
Set task name of clones
2022-11-13 22:14:29 +01:00
Martchus
962dd0088e
Fix computing source package name
...
The `packageName` (key in build preparation) might not actually be
`pkgbase` when rebuilding a binary package and `pkgbase` changes compared
to what it was in the before. Then `packageName` is still set to the old
`pkgbase` and we need to use the name from the actual source info (which is
the name `pkgbase` value).
2022-11-13 22:09:44 +01:00
Martchus
6e7e0c01e3
Avoid using deprecated OpenSSL functions
2022-11-03 22:34:31 +01:00
Martchus
407e3159e0
Update/remove packages from database in a whole transaction
2022-11-01 15:46:10 +01:00
Martchus
84ef92aaa2
Use one transaction when updating packages via `PackageUpdater`
...
This should likely be done in the other updating functions of the
`Database` class as well to avoid indexes and actual data appearing
inconsistent during the write operations.
2022-11-01 15:11:49 +01:00
Martchus
c6a8c81784
Update lmdb-safe
2022-11-01 15:08:34 +01:00
Martchus
809bafa6ee
Log "Loading …" message when reloading DBs also without force-flag
2022-11-01 14:35:00 +01:00
Martchus
a205ffae38
Fix adding last package of current batch already to staging repository
2022-09-20 23:00:36 +02:00
Martchus
833550197f
Remove unused `@mdi/font` NPM package
2022-09-15 23:16:11 +02:00
Martchus
aa6e78f838
Update xterm.js to 5.0.0
2022-09-15 23:13:32 +02:00
Martchus
c7d8e71978
Add staging test with multiple batches
2022-09-15 22:59:18 +02:00
Martchus
598b931e9f
Move staging tests into their own block
2022-09-15 22:24:12 +02:00
Martchus
69ee493b8f
Fix out-commented check in tests
2022-09-15 22:06:48 +02:00
Martchus
5feb95039e
Parse conflicts and replaces of AUR packages retrieved via AUR RPC
2022-09-01 21:45:31 +02:00
Martchus
ccf232a7a7
Parse provides of AUR packages retrieved via AUR RPC
2022-08-29 20:55:28 +02:00
Martchus
bde385ba6b
Allow auth without access to secrets (and then just don't access secrets)
2022-07-29 22:07:24 +02:00
Martchus
662c924321
Use `flagenumclass.h` for auth flags
2022-07-29 22:06:40 +02:00
Martchus
aece080986
Pass sudo password and GPG passphrase from encrypted file
...
Not tested yet; so far just an idea to make everything at least a little
more secure
2022-07-25 21:48:24 +02:00
Martchus
255da5b091
Allow passing secrets to build action
2022-07-11 23:33:28 +02:00
Martchus
df2b5ba9f6
Allow secrets stored in encrypted files to be loaded from route handlers
2022-07-10 19:47:41 +02:00
Martchus
05176d70ef
Increment patch version
2022-07-06 22:49:36 +02:00