Commit Graph

455 Commits

Author SHA1 Message Date
Martchus 836b7da8a3 Invoke `paccache` as part of the build service cleanup 2023-04-07 19:15:16 +02:00
Martchus 08af21ddb5 Fix warnings about unqualified calls in `buildaction.cpp` 2023-04-07 17:55:13 +02:00
Martchus 9702d4f207 Add paths for pacman/paccache to server setup 2023-04-07 17:52:52 +02:00
Martchus 2b0b495715 Add missing <cstdint> include 2023-04-07 17:52:21 +02:00
Martchus e02d4d449c Use `pubsetbuf` only with `libstdc++`
This usage of the function seems only to work as intended with that
standard lib. With `libc++` and the MSVC standard lib the call has no
effect.
2023-02-28 21:21:04 +01:00
Martchus 2e448b427b Consider libs under `…/lib/linux/…` Android-specific as well 2023-02-18 20:29:44 +01:00
Martchus e477613a8b Implement preserving chroot for containerized builds as well
This keeps the container around by passing the `DEBUG´ environment variable
recognized by `makechrootpkg`.
2023-02-03 23:06:43 +01:00
Martchus e5f4dc156c Avoid unqualified call to `std::move` 2023-02-03 21:30:42 +01:00
Martchus cc9f90acfc Make it easier to select build action when pre-defined task is selected 2023-01-31 14:10:02 +01:00
Martchus 79eb9e849c Fix about dialog not closable when vieport height is not sufficient 2023-01-31 13:45:40 +01:00
Martchus e14eb17c60 Apply clang-format 2023-01-23 22:42:45 +01:00
Martchus 2fd30f5a0f Adapt tests to boost 1.81 2023-01-23 22:41:01 +01:00
Martchus 45d97a1c63 Support version 3 of Catch2 in test cases of lmdb-safe 2023-01-22 23:08:07 +01:00
Martchus 31d1025b85 Fix compilation against boost 1.81.0 2023-01-22 22:31:20 +01:00
Martchus 5f25e6e8b7 Avoid unqualified calls to `std::move` 2023-01-22 22:30:07 +01:00
Martchus 599185d3ae Use async locks when invoking custom command 2023-01-17 23:27:36 +01:00
Martchus 80b5094659 Use async locks in repo actions 2023-01-17 22:20:10 +01:00
Martchus bb9da06950 Use async lock to lock repo when adding package 2023-01-17 22:07:00 +01:00
Martchus 4f413e86ba Allow to abort build action immediately while waiting for chroot locks
* Avoid aborted build actions from being stuck in running state while
  waiting until the chroot locks can be acquired; allow aborting action
  immediately instead
* Use async locks when invoking makechrootpkg and split affected function
  accordingly
2023-01-17 18:40:05 +01:00
Martchus b8f211e1d1 Make functions to invoke build async 2023-01-17 18:40:05 +01:00
Martchus 8dfa948e03 Implement helper functions for async global locks 2023-01-17 18:40:05 +01:00
Martchus e74f80a089 Update copyright notice 2023-01-17 18:39:46 +01:00
Martchus 036aa2c090 Fix "invalid escape" in regular expression in test suite 2022-12-29 17:33:01 +01:00
Martchus 874152a2cb Update xtermjs to 5.1.0 2022-12-20 22:09:26 +01:00
Martchus c404a092cc Add async locks
This might be useful to avoid blocking threads in the thread pool just for
waiting on a global lock. It might also be useful to allow stopping build
actions while they're waiting for a lock.
2022-12-04 00:28:47 +01:00
Martchus b1acbee127 Add very basic test for build service cleanup 2022-11-24 23:12:01 +01:00
Martchus 218e1f6b17 Add simple cleanup of old build actions 2022-11-24 21:33:42 +01:00
Martchus 9cf0fed450 Avoid duplicating "Clone of" in task name 2022-11-13 22:44:41 +01:00
Martchus 9c219288c9 Render name and version of packages in build preparation correctly 2022-11-13 22:37:32 +01:00
Martchus aff7853f94 Set task name of clones 2022-11-13 22:14:29 +01:00
Martchus 962dd0088e Fix computing source package name
The `packageName` (key in build preparation) might not actually be
`pkgbase` when rebuilding a binary package and `pkgbase` changes compared
to what it was in the before. Then `packageName` is still set to the old
`pkgbase` and we need to use the name from the actual source info (which is
the name `pkgbase` value).
2022-11-13 22:09:44 +01:00
Martchus 6e7e0c01e3 Avoid using deprecated OpenSSL functions 2022-11-03 22:34:31 +01:00
Martchus 407e3159e0 Update/remove packages from database in a whole transaction 2022-11-01 15:46:10 +01:00
Martchus 84ef92aaa2 Use one transaction when updating packages via `PackageUpdater`
This should likely be done in the other updating functions of the
`Database` class as well to avoid indexes and actual data appearing
inconsistent during the write operations.
2022-11-01 15:11:49 +01:00
Martchus c6a8c81784 Update lmdb-safe 2022-11-01 15:08:34 +01:00
Martchus 809bafa6ee Log "Loading …" message when reloading DBs also without force-flag 2022-11-01 14:35:00 +01:00
Martchus a205ffae38 Fix adding last package of current batch already to staging repository 2022-09-20 23:00:36 +02:00
Martchus 833550197f Remove unused `@mdi/font` NPM package 2022-09-15 23:16:11 +02:00
Martchus aa6e78f838 Update xterm.js to 5.0.0 2022-09-15 23:13:32 +02:00
Martchus c7d8e71978 Add staging test with multiple batches 2022-09-15 22:59:18 +02:00
Martchus 598b931e9f Move staging tests into their own block 2022-09-15 22:24:12 +02:00
Martchus 69ee493b8f Fix out-commented check in tests 2022-09-15 22:06:48 +02:00
Martchus 5feb95039e Parse conflicts and replaces of AUR packages retrieved via AUR RPC 2022-09-01 21:45:31 +02:00
Martchus ccf232a7a7 Parse provides of AUR packages retrieved via AUR RPC 2022-08-29 20:55:28 +02:00
Martchus bde385ba6b Allow auth without access to secrets (and then just don't access secrets) 2022-07-29 22:07:24 +02:00
Martchus 662c924321 Use `flagenumclass.h` for auth flags 2022-07-29 22:06:40 +02:00
Martchus aece080986 Pass sudo password and GPG passphrase from encrypted file
Not tested yet; so far just an idea to make everything at least a little
more secure
2022-07-25 21:48:24 +02:00
Martchus 255da5b091 Allow passing secrets to build action 2022-07-11 23:33:28 +02:00
Martchus df2b5ba9f6 Allow secrets stored in encrypted files to be loaded from route handlers 2022-07-10 19:47:41 +02:00
Martchus 05176d70ef Increment patch version 2022-07-06 22:49:36 +02:00