author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20
values | license stringclasses 3
values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
254,875 | 03.11.2021 17:29:48 | -28,800 | a6aad76f10526d21fdcac77e1510e0362612c5c6 | fix minio annotation | [
{
"change_type": "MODIFY",
"old_path": "pkg/cluster/controllers/storage/ingress.go",
"new_path": "pkg/cluster/controllers/storage/ingress.go",
"diff": "@@ -4,7 +4,7 @@ import (\n\"context\"\ngoharborv1 \"github.com/goharbor/harbor-operator/apis/goharbor.io/v1beta1\"\n- \"github.com/goharbor/harbor-o... | Go | Apache License 2.0 | goharbor/harbor-operator | fix minio annotation
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,890 | 18.11.2021 11:01:29 | -28,800 | 8fd9f5432173fbc24a18e41440675d220fa0d7cd | chore: build controller-gen and stringer in temp dir
Build the controller-gen and stringer in temp dir to avoid the version of harbor pkg always changing in github actions. | [
{
"change_type": "MODIFY",
"old_path": "Makefile",
"new_path": "Makefile",
"diff": "@@ -520,9 +520,15 @@ controller-gen:\n$(CONTROLLER_GEN):\n$(MAKE) $(BIN)\n# https://github.com/kubernetes-sigs/controller-tools/tree/master/cmd/controller-gen\n- go get 'sigs.k8s.io/controller-tools/cmd/controller-ge... | Go | Apache License 2.0 | goharbor/harbor-operator | chore: build controller-gen and stringer in temp dir (#817)
Build the controller-gen and stringer in temp dir to avoid the version of harbor pkg always changing in github actions.
Signed-off-by: He Weiwei <hweiwei@vmware.com> |
254,889 | 15.11.2021 13:24:27 | 0 | f61ba2167bed2d1e8b41afa012e538b0c7a8bc47 | fix: Allow for empty S3 SecretKeyRef | [
{
"change_type": "MODIFY",
"old_path": "controllers/goharbor/registry/deployments.go",
"new_path": "controllers/goharbor/registry/deployments.go",
"diff": "@@ -464,6 +464,7 @@ func (r *Reconciler) ApplyFilesystemStorageEnvs(ctx context.Context, registry *g\nfunc (r *Reconciler) ApplyS3StorageEnvs(ct... | Go | Apache License 2.0 | goharbor/harbor-operator | fix: Allow for empty S3 SecretKeyRef
Signed-off-by: David Griffiths <dave.griffiths@sainsburys.co.uk> |
254,865 | 23.11.2021 19:25:35 | -28,800 | c4208eb8177e22f58c926e6d3ffb8d4a13a00ab3 | fix(expose): remove generate code | [
{
"change_type": "MODIFY",
"old_path": "apis/goharbor.io/v1beta1/zz_generated.deepcopy.go",
"new_path": "apis/goharbor.io/v1beta1/zz_generated.deepcopy.go",
"diff": "-//go:build !ignore_autogenerated\n// +build !ignore_autogenerated\n// Code generated by controller-gen. DO NOT EDIT.\n"
},
{
... | Go | Apache License 2.0 | goharbor/harbor-operator | fix(expose): remove generate code |
254,865 | 07.12.2021 11:20:20 | -28,800 | afac1eff8461b25f03e5fcbb97e3a461c6805c36 | fix(expose): fix go-lint | [
{
"change_type": "MODIFY",
"old_path": "controllers/goharbor/harbor/ingresses.go",
"new_path": "controllers/goharbor/harbor/ingresses.go",
"diff": "@@ -32,7 +32,6 @@ func (r *Reconciler) AddCoreIngress(ctx context.Context, harbor *goharborv1.Harb\n}\nfunc (r *Reconciler) GetCoreIngress(ctx context.C... | Go | Apache License 2.0 | goharbor/harbor-operator | fix(expose): fix go-lint
Signed-off-by: wangcanfeng <wangcanfeng@corp.netease.com> |
254,865 | 07.12.2021 14:05:54 | -28,800 | 29d71db0d47fee2695ae99bc0821ea706c97d996 | fix zz_generated.deepcopy.go | [
{
"change_type": "MODIFY",
"old_path": "apis/goharbor.io/v1alpha3/zz_generated.deepcopy.go",
"new_path": "apis/goharbor.io/v1alpha3/zz_generated.deepcopy.go",
"diff": "-//go:build !ignore_autogenerated\n// +build !ignore_autogenerated\n// Code generated by controller-gen. DO NOT EDIT.\n"
},
{
... | Go | Apache License 2.0 | goharbor/harbor-operator | fix zz_generated.deepcopy.go |
254,862 | 03.01.2022 21:39:51 | 28,800 | e4f467abd8e288803ab001140bd7b42a4607650f | Fix readme
ServerURL must begin with http or https | [
{
"change_type": "MODIFY",
"old_path": "apis/goharbor.io/v1beta1/harborserverconfiguration_types.go",
"new_path": "apis/goharbor.io/v1beta1/harborserverconfiguration_types.go",
"diff": "@@ -13,7 +13,7 @@ type HarborServerConfigurationSpec struct {\n// Important: Run \"make\" to regenerate code after... | Go | Apache License 2.0 | goharbor/harbor-operator | Fix readme (#831)
ServerURL must begin with http or https
Signed-off-by: lubronzhan <lzhan@vmware.com> |
254,875 | 06.01.2022 23:32:34 | -28,800 | 90b16b1e81faa46b335845aa745c79d8cf949f29 | update monitor logs | [
{
"change_type": "MODIFY",
"old_path": "docs/LCM/monitor-logs-with-grafana.md",
"new_path": "docs/LCM/monitor-logs-with-grafana.md",
"diff": "# Monitor logs with grafana\n-TBD\n+Quickly setup the grafana+loki+fluentbit for harbor logs in KIND k8s\n+- change the host `grafana.harbor.domain` and grafa... | Go | Apache License 2.0 | goharbor/harbor-operator | update monitor logs
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,875 | 10.01.2022 19:18:54 | -28,800 | 7069994694d5067a3a2751b60c75ed2e56801c9d | fix md lint | [
{
"change_type": "MODIFY",
"old_path": "docs/LCM/monitor-logs-with-grafana.md",
"new_path": "docs/LCM/monitor-logs-with-grafana.md",
"diff": "# Monitor logs with grafana\nQuickly setup the grafana+loki+fluentbit for harbor logs in KIND k8s\n+\n- change the host `grafana.harbor.domain` and grafana pa... | Go | Apache License 2.0 | goharbor/harbor-operator | fix md lint
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,881 | 12.01.2022 15:07:44 | -28,800 | 35056b427665e9ee6331e7b3ddede8c26b86dbc5 | fix: adjust the update logic of deprecated configmap day2 configuration | [
{
"change_type": "MODIFY",
"old_path": "controllers/goharbor/configuration/cm_reconciler.go",
"new_path": "controllers/goharbor/configuration/cm_reconciler.go",
"diff": "@@ -148,10 +148,17 @@ func (r *CmReconciler) createOrUpdateHarborConfiguration(ctx context.Context, hc\nif err != nil {\nif apierr... | Go | Apache License 2.0 | goharbor/harbor-operator | fix: adjust the update logic of deprecated configmap day2 configuration (#835)
Signed-off-by: chlins <chenyuzh@vmware.com> |
254,893 | 18.01.2022 18:05:42 | -28,800 | d65f2758a54763e08b8ee1016747b7cb386160fc | doc(tutorial): update the out-of-date info | [
{
"change_type": "MODIFY",
"old_path": "docs/tutorial.md",
"new_path": "docs/tutorial.md",
"diff": "@@ -15,27 +15,28 @@ Before moving on, make sure the harbor operator is successfully deployed in the\n```shell\n~/harbor-operator$ kubectl get all -n harbor-operator-ns\nNAME READY STATUS RESTARTS AGE\... | Go | Apache License 2.0 | goharbor/harbor-operator | doc(tutorial): update the out-of-date info |
254,893 | 02.03.2022 19:46:26 | -28,800 | 021bb300703fad4f48713ba359c20936ee008214 | doc(README): update for 1.2 GA
Update the Redis version
Update the feature list to move some Day2 functions to the future list
Update the release plans
- remove 1.2
- add 1.4 | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -34,21 +34,27 @@ Harbor deployment stack is controlled by a custom Harbor resource `HarborCluster\n* Support services exposed with [ingress](https://kubernetes.io/fr/docs/concepts/services-networking/ingress/): ... | Go | Apache License 2.0 | goharbor/harbor-operator | doc(README): update for 1.2 GA (#851)
- Update the Redis version
- Update the feature list to move some Day2 functions to the future list
- Update the release plans
- remove 1.2
- add 1.4 |
254,893 | 02.03.2022 20:11:46 | -28,800 | ae550eb9d21ca4ed174c6a1c63d82e25419ac0aa | doc(day2 config): remove day2 realted content out | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -115,7 +115,7 @@ Harbor operator exposes the frontend service with ingress (CRD version: `v1beta1\n* [Manifests references](./docs/manifests-reference.md)\n* [Customize storage, database and cache services](./do... | Go | Apache License 2.0 | goharbor/harbor-operator | doc(day2 config): remove day2 realted content out (#852)
Signed-off-by: Steven Zou <szou@vmware.com> |
254,893 | 05.03.2022 16:07:36 | -28,800 | 563fdc1d5ac376f248a2d8efecd010aeee20069c | doc(day2 doc): fix doc lint error | [
{
"change_type": "MODIFY",
"old_path": "docs/day2/day2-configurations.md",
"new_path": "docs/day2/day2-configurations.md",
"diff": "Initially, we configure harbor by means of configmap, but currently we recommend using `HarborConfiguration` CRD to configure harbor, for the configmap method will be d... | Go | Apache License 2.0 | goharbor/harbor-operator | doc(day2 doc): fix doc lint error |
254,875 | 05.03.2022 17:41:41 | -28,800 | bc628754ae1572ec953dd54aad8a35c41452b9d2 | use fix postgresql/redis image in go tests | [
{
"change_type": "MODIFY",
"old_path": "controllers/goharbor/internal/test/postgresql/postgres.go",
"new_path": "controllers/goharbor/internal/test/postgresql/postgres.go",
"diff": "@@ -103,7 +103,7 @@ func New(ctx context.Context, ns string, databases ...string) harbormetav1.Postg\n},\nContainers: ... | Go | Apache License 2.0 | goharbor/harbor-operator | use fix postgresql/redis image in go tests
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,875 | 05.03.2022 10:29:19 | -28,800 | cb123f68de4c6a70d2eb6f50f8fac84f01f17dae | bump up redis-operator v1.1.1 | [
{
"change_type": "MODIFY",
"old_path": "charts/harbor-operator/README.md",
"new_path": "charts/harbor-operator/README.md",
"diff": "@@ -53,7 +53,7 @@ Deploy Harbor Operator\n| priorityClassName | string | `\"\"` | priority class to be used for the harbor-operator pods |\n| rbac.create | bool | `true... | Go | Apache License 2.0 | goharbor/harbor-operator | bump up redis-operator v1.1.1
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,878 | 10.03.2022 21:03:28 | -28,800 | 96639f91a270de1cc068a261a42f2f9c939633f3 | upgrade minio operator to v4.4.9 | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -66,7 +66,7 @@ Versions of the underlying components are listed below:\n| Components | Harbor | MinIO operator | PostgreSQL operator | Redis operator |\n|---------------|-------------------|----------------|----... | Go | Apache License 2.0 | goharbor/harbor-operator | upgrade minio operator to v4.4.9 (#841)
Signed-off-by: soulseen <zhuxiaoyang1996@gmail.com> |
254,875 | 08.03.2022 19:59:52 | -28,800 | 1a3f4a0b65f66f9c999406d0e804ef0f3941634a | add prefix folder for chartmuseum | [
{
"change_type": "MODIFY",
"old_path": "controllers/goharbor/chartmuseum/deployments.go",
"new_path": "controllers/goharbor/chartmuseum/deployments.go",
"diff": "@@ -136,7 +136,7 @@ func (r *Reconciler) GetDeployment(ctx context.Context, chartMuseum *goharborv1.\nValue: GcsJSONKeyFilePath,\n}, corev... | Go | Apache License 2.0 | goharbor/harbor-operator | add prefix folder for chartmuseum
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,875 | 05.03.2022 10:38:31 | -28,800 | c664c8fdd34436ec38aa40abd350413c4846dede | use harbor v2.4.1 as default sample | [
{
"change_type": "MODIFY",
"old_path": "config/samples/harborcluster-minimal/goharbor_v1alpha3_harbor.yaml",
"new_path": "config/samples/harborcluster-minimal/goharbor_v1alpha3_harbor.yaml",
"diff": "@@ -3,7 +3,7 @@ kind: HarborCluster\nmetadata:\nname: sample\nspec:\n- version: 2.4.0\n+ version: 2.... | Go | Apache License 2.0 | goharbor/harbor-operator | use harbor v2.4.1 as default sample
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,875 | 17.03.2022 21:04:02 | -28,800 | aa495a256eb0702d23d6d54624c8e6ffee5ffe3d | fix release docker build go version | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/release.yml",
"new_path": ".github/workflows/release.yml",
"diff": "@@ -43,6 +43,9 @@ jobs:\ndocker:\nruns-on: ubuntu-latest\nsteps:\n+ - uses: actions/setup-go@v2\n+ with:\n+ go-version: 1.17\n- uses: actions/checkout@v2\n- name: Build manag... | Go | Apache License 2.0 | goharbor/harbor-operator | fix release docker build go version
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,881 | 24.03.2022 18:03:56 | -28,800 | e0d983b29a3923229c35ae4e3a3163c27f0b4e16 | docs: fix day2 configuration sample cr | [
{
"change_type": "MODIFY",
"old_path": "docs/day2/day2-configurations.md",
"new_path": "docs/day2/day2-configurations.md",
"diff": "@@ -46,18 +46,6 @@ data:\n**Example of HarborConfiguration**:\n-```yaml\n-apiVersion: v1\n-kind: Secret\n-metadata:\n- name: secret-sample\n- namespace: cluster-sample-... | Go | Apache License 2.0 | goharbor/harbor-operator | docs: fix day2 configuration sample cr
Signed-off-by: chlins <chenyuzh@vmware.com> |
254,875 | 22.03.2022 10:07:14 | -28,800 | 95a56f37f943c9c67261ab542776c7a5cc8e855b | update minio-operator 4.4.9 | [
{
"change_type": "MODIFY",
"old_path": "charts/harbor-operator/Chart.lock",
"new_path": "charts/harbor-operator/Chart.lock",
"diff": "dependencies:\n-- name: minio-operator\n+- name: operator\nrepository: https://operator.min.io/\n- version: 4.3.2\n+ version: 4.4.9\n- name: redis-operator\nrepositor... | Go | Apache License 2.0 | goharbor/harbor-operator | update minio-operator 4.4.9
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,875 | 27.05.2022 20:44:58 | -28,800 | df98067504e07a8dffd47517f374981c9f929b0d | update version 1.3.0-rc1 | [
{
"change_type": "MODIFY",
"old_path": "charts/harbor-operator/README.md",
"new_path": "charts/harbor-operator/README.md",
"diff": "@@ -37,7 +37,7 @@ Deploy Harbor Operator\n| harborClass | string | `\"\"` | Class name of the Harbor operator |\n| image.pullPolicy | string | `\"IfNotPresent\"` | The ... | Go | Apache License 2.0 | goharbor/harbor-operator | update version 1.3.0-rc1
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,875 | 09.06.2022 23:43:17 | -28,800 | dd2d1e41e32087a45d2d6b9255cf1d96a77d0974 | update minio 4.4.22 | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -66,7 +66,7 @@ Versions of the underlying components are listed below:\n| Components | Harbor | MinIO operator | PostgreSQL operator | Redis operator |\n|---------------|-------------|----------------|----------... | Go | Apache License 2.0 | goharbor/harbor-operator | update minio 4.4.22
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,875 | 15.06.2022 08:50:22 | -28,800 | bfe5f35aa1008a5d6b9a5642a961f35f74a667cc | release v1.3.0-rc3 | [
{
"change_type": "MODIFY",
"old_path": "charts/harbor-operator/README.md",
"new_path": "charts/harbor-operator/README.md",
"diff": "@@ -37,7 +37,7 @@ Deploy Harbor Operator\n| harborClass | string | `\"\"` | Class name of the Harbor operator |\n| image.pullPolicy | string | `\"IfNotPresent\"` | The ... | Go | Apache License 2.0 | goharbor/harbor-operator | release v1.3.0-rc3
Signed-off-by: Ziming Zhang <zziming@vmware.com> |
254,890 | 22.06.2022 20:16:36 | -28,800 | 9164d7f24b6e9cd142847de88be6f50cb5172f57 | fix: Ignore the status check for the registryctl cr in harbor controller | [
{
"change_type": "MODIFY",
"old_path": "controllers/goharbor/harbor/registryctl.go",
"new_path": "controllers/goharbor/harbor/registryctl.go",
"diff": "@@ -25,7 +25,7 @@ func (r *Reconciler) AddRegistryController(ctx context.Context, harbor *goharbor\nreturn nil, nil, errors.Wrap(err, \"cannot get r... | Go | Apache License 2.0 | goharbor/harbor-operator | fix: Ignore the status check for the registryctl cr in harbor controller (#918)
Signed-off-by: He Weiwei <hweiwei@vmware.com> |
254,868 | 27.06.2022 21:09:42 | -28,800 | 388203f49e9dab6b5c2ac276f519ab418dd8659a | fix: service template do not have namespace | [
{
"change_type": "MODIFY",
"old_path": "charts/harbor-operator/templates/service.yaml",
"new_path": "charts/harbor-operator/templates/service.yaml",
"diff": "@@ -2,6 +2,7 @@ apiVersion: v1\nkind: Service\nmetadata:\nname: {{ include \"chart.fullname\" . }}\n+ namespace: {{ .Release.Namespace | quote... | Go | Apache License 2.0 | goharbor/harbor-operator | fix: service template do not have namespace (#916)
Signed-off-by: colin <kunyao.li@matrixport.com>
Co-authored-by: colin <kunyao.li@matrixport.com> |
254,893 | 27.06.2022 20:58:11 | -28,800 | 765bf5860aa72a632bd907d9156fe005a738399e | doc(tutorial): add warnings for ingress class | [
{
"change_type": "MODIFY",
"old_path": "docs/tutorial.md",
"new_path": "docs/tutorial.md",
"diff": "# Tutorial\n-This tutorial will guides you to have a quick first try of the Harbor operator and the Harbor cluster deployed and managed by the operator.\n+This tutorial will guide you to have a quick ... | Go | Apache License 2.0 | goharbor/harbor-operator | doc(tutorial): add warnings for ingress class
Signed-off-by: Steven Zou <szou@vmware.com> |
254,891 | 07.09.2022 17:44:56 | -28,800 | 72f3363975c108fbaf602119fc54d76ac0ebe33f | change kubectl apply | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/tests.yml",
"new_path": ".github/workflows/tests.yml",
"diff": "@@ -205,7 +205,7 @@ jobs:\nkustomize edit add secret github-token --disableNameSuffixHash --from-literal=GITHUB_TOKEN=${{ secrets.GITHUB_TOKEN }}\nkustomize edit add patch --path... | Go | Apache License 2.0 | goharbor/harbor-operator | change kubectl apply (#960)
Signed-off-by: rongfu.leng <1275177125@qq.com> |
254,867 | 15.11.2022 11:13:58 | 0 | 96bd0ef025dad8eccd4f23e62eba4c233db1561b | Update values for postgres authentication | [
{
"change_type": "MODIFY",
"old_path": "pkg/cluster/controllers/database/generate.go",
"new_path": "pkg/cluster/controllers/database/generate.go",
"diff": "@@ -95,6 +95,13 @@ func GetPgHba() []string {\nreturn []string{\n\"hostssl all all 0.0.0.0/0 md5\",\n\"host all all 0.0.0.0/0 md5\",\n+ \"local ... | Go | Apache License 2.0 | goharbor/harbor-operator | Update values for postgres authentication
Signed-off-by: William Young <will.young@engineerbetter.com> |
254,866 | 25.10.2022 15:14:14 | -7,200 | ed9b4f6f1c60ade1fcc7092c2ab475d856a7f28c | Fix go-dependencies-test | [
{
"change_type": "MODIFY",
"old_path": "go.mod",
"new_path": "go.mod",
"diff": "@@ -34,7 +34,6 @@ require (\ngithub.com/zalando/postgres-operator v1.6.1\ngo.uber.org/zap v1.19.1\ngolang.org/x/crypto v0.0.0-20210921155107-089bfa567519\n- golang.org/x/exp v0.0.0-20221012211006-4de253d81b95\ngolang.org... | Go | Apache License 2.0 | goharbor/harbor-operator | GH-969: Fix go-dependencies-test
Signed-off-by: Joan Miquel Luque Oliver <joan.luque@dynatrace.com> |
254,873 | 04.11.2022 06:16:23 | 0 | 30d6d29adf270135fd423a1b1841b644909ea46a | fix: make expose core ingress optional | [
{
"change_type": "MODIFY",
"old_path": "apis/goharbor.io/v1alpha3/harborcluster_conversion.go",
"new_path": "apis/goharbor.io/v1alpha3/harborcluster_conversion.go",
"diff": "@@ -356,7 +356,8 @@ func Convert_v1alpha3_HarborExposeSpec_To_v1beta1_HarborExposeSpec(src *HarborEx\nfunc Convert_v1alpha3_Ha... | Go | Apache License 2.0 | goharbor/harbor-operator | fix: make expose core ingress optional
https://github.com/goharbor/harbor-operator/issues/955
Signed-off-by: Shou-En Hsiao <shouenhsiao@google.com> |
254,867 | 16.11.2022 09:52:13 | 0 | ba52662f1ff63df3be9d665e0fbbf6713cc9ffdf | Update spilo version | [
{
"change_type": "MODIFY",
"old_path": "pkg/image/components.go",
"new_path": "pkg/image/components.go",
"diff": "@@ -128,8 +128,8 @@ func init() { //nolint:gochecknoinits\nRegisterTag(\"cluster-redis\", \"5.0-alpine\", \"~2.2.0\", \"~2.3.0\", \"~2.4.0\", \"~2.5.0\", \"~2.6.0\")\nRegisterRepository(... | Go | Apache License 2.0 | goharbor/harbor-operator | Update spilo version
Signed-off-by: William Young <will.young@engineerbetter.com> |
254,867 | 17.11.2022 09:06:21 | 0 | ab22239f8872b31aab56d2d56dd6712a3e95dddd | Update Spilo tests and deployment | [
{
"change_type": "MODIFY",
"old_path": "manifests/cluster/deployment.yaml",
"new_path": "manifests/cluster/deployment.yaml",
"diff": "@@ -63761,7 +63761,7 @@ data:\ndebug_logging: \"true\"\ndefault_cpu_request: 250m\ndefault_memory_request: 500Mi\n- docker_image: registry.opensource.zalan.do/acid/sp... | Go | Apache License 2.0 | goharbor/harbor-operator | Update Spilo tests and deployment
Signed-off-by: William Young <will.young@engineerbetter.com> |
603,652 | 11.11.2019 13:41:04 | -10,800 | b396d42cd2b9e5fb5a373e9d357dc2c9c751b419 | Add CI setup
Add CI that does `reuse lint` and build `tezos-client` along with its
`.rpm` and `.deb` packages | [
{
"change_type": "ADD",
"old_path": null,
"new_path": ".buildkite/check-trailing-whitespace.sh",
"diff": "+#!/usr/bin/env bash\n+# SPDX-FileCopyrightText: 2019 TQ Tezos <https://tqtezos.com/>\n+#\n+# SPDX-License-Identifier: MPL-2.0\n+\n+files=$(git ls-files -- . ':!:*.patch' | xargs grep --files-wi... | Python | MIT License | serokell/tezos-packaging | [TM-359] Add CI setup
Add CI that does `reuse lint` and build `tezos-client` along with its
`.rpm` and `.deb` packages |
603,652 | 13.11.2019 12:08:05 | -10,800 | d48d003b83e46e20fb914320ee78accebdea0c08 | Update README
Problem: Obtain binary or packages from CI section in the README.md
isn't quite clear. Also there are some inaccuracies in this file.
Solution: Update README, also update `packageRpm.nix` because it
contained some incorrect stuff. | [
{
"change_type": "MODIFY",
"old_path": "packageRpm.nix",
"new_path": "packageRpm.nix",
"diff": "@@ -24,7 +24,7 @@ let\nVersion: ${majorVersion}.${minorVersion}\n%description\n- CLI executable that can be used for managing deployed TZBTC contract\n+ ${pkgDesc.description}\n%files\n/usr/local/bin/${pr... | Python | MIT License | serokell/tezos-packaging | [TM-359] Update README
Problem: Obtain binary or packages from CI section in the README.md
isn't quite clear. Also there are some inaccuracies in this file.
Solution: Update README, also update `packageRpm.nix` because it
contained some incorrect stuff. |
603,652 | 22.11.2019 11:52:54 | -10,800 | 0038905d9c3daa1812a01f01d7ed5fb3e59d1328 | Change link to CI
Problem: Both repo and CI pipeline were renamed, however, README has
link to old pipeline (it still works, btw).
Solution: Update link to renamed buildkite pipeline. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -24,7 +24,7 @@ to build native `.rpm` or `.deb` package for Red Hat and Debian-based distros.\n## Obtain binary or packages from CI\nIf you don't want to build these files from scratch, you can download artifact... | Python | MIT License | serokell/tezos-packaging | [#3] Change link to CI
Problem: Both repo and CI pipeline were renamed, however, README has
link to old pipeline (it still works, btw).
Solution: Update link to renamed buildkite pipeline. |
603,652 | 15.11.2019 12:26:29 | -10,800 | 1d545e7dd72f49838037208f99e0ae56350c7c8b | Update package and binary names
Problem:
1) There is no actual versioning for tezos-client
2) We want to have binaries and packages for both mainnet and babylonnet
Solution:
1) Use timestamp in ISO 8601 and short git hash as a version
2) Produce required files in CI as well | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "env:\nNIX_PATH: nixpkgs=channel:nixos-unstable\n+ cur_date: \"$(date +\\\"%Y%m%d%H%M\\\")\"\nsteps:\n- command: nix run nixpkgs.reuse -c reuse lint\n@@ -14,11 +15,17 @@ steps:\nlabel: cr... | Python | MIT License | serokell/tezos-packaging | [#4] Update package and binary names
Problem:
1) There is no actual versioning for tezos-client
2) We want to have binaries and packages for both mainnet and babylonnet
Solution:
1) Use timestamp in ISO 8601 and short git hash as a version
2) Produce required files in CI as well |
603,652 | 15.11.2019 13:21:30 | -10,800 | c2401cdb3aa1ac822e5737de1107728ef261e71a | Update README
Problem: `default.nix` has changed, also PPA will be updated.
Solution: Update instructions in README.md. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -15,11 +15,36 @@ using `babylonnet.sh` or `mainnet.sh` scripts.\n## Build Instructions\n-Run `nix-build -A tezos-client-static -o tezos-static`\n-to build staticically linked `tezos-client` executable.\n+### Sta... | Python | MIT License | serokell/tezos-packaging | [#4] Update README
Problem: `default.nix` has changed, also PPA will be updated.
Solution: Update instructions in README.md. |
603,652 | 25.11.2019 19:04:48 | -10,800 | 476273d550b63e184b8771eb447bd0281a7ae39c | Add Makefile
Add Makefile so that it is possible to do e.g. `make rpm` instead of
`nix-build -A mainnet-rpm-package -o tezos-client-package --arg
timestamp $(date +"%Y%m%d%H%M")` | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "Makefile",
"diff": "+# SPDX-FileCopyrightText: 2019 TQ Tezos <https://tqtezos.com/>\n+#\n+# SPDX-License-Identifier: MPL-2.0\n+ts := $(shell date +\"%Y%m%d%H%M\")\n+\n+binary:\n+ nix-build -A tezos-client-babylonnet -o tezos-client\n+ cp tezos-c... | Python | MIT License | serokell/tezos-packaging | [#4] Add Makefile
Add Makefile so that it is possible to do e.g. `make rpm` instead of
`nix-build -A mainnet-rpm-package -o tezos-client-package --arg
timestamp $(date +"%Y%m%d%H%M")` |
603,652 | 10.12.2019 16:06:55 | -10,800 | 0b7d07cfebe68f013d0bc6566e327bf6aea434c5 | Rename repo
Problem: We are going to package other tezos-related binaries as well,
thus `tezos-client-packaging` is not the best name for repo.
Solution: Rename it once again, now to `tezos-packaging` | [
{
"change_type": "MODIFY",
"old_path": ".github/CONTRIBUTING.md",
"new_path": ".github/CONTRIBUTING.md",
"diff": "## Reporting Issues\n-Please [open an issue](https://github.com/serokell/tezos-client/issues/new/choose)\n+Please [open an issue](https://github.com/serokell/tezos-packaging/issues/new/c... | Python | MIT License | serokell/tezos-packaging | [#14] Rename repo
Problem: We are going to package other tezos-related binaries as well,
thus `tezos-client-packaging` is not the best name for repo.
Solution: Rename it once again, now to `tezos-packaging` |
603,652 | 03.12.2019 16:29:51 | -10,800 | 5da6bdfd1198b9623a16020829b06d6babd91957 | Do not use VM during packaging
Problem: Currently we run linux VM in order to generate .deb or .rpm
package. However, this is slow and consumes a lot of resoures.
Solution: Run `dpkg-deb` and `rpm-build` directly in nix. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -39,32 +39,18 @@ let\ngitRevision = babylonnet.rev;\n};\n- buildDeb = import ./packageDeb.nix { inherit stdenv writeTextFile; };\n+ buildDeb = import ./packageDeb.nix { inherit stdenv writeTextFile dpkg; };\... | Python | MIT License | serokell/tezos-packaging | [#10] Do not use VM during packaging
Problem: Currently we run linux VM in order to generate .deb or .rpm
package. However, this is slow and consumes a lot of resoures.
Solution: Run `dpkg-deb` and `rpm-build` directly in nix. |
603,652 | 22.11.2019 11:49:58 | -10,800 | af942bf369ed5428f6d09a56d6403360edc07102 | Add `.src.rpm` generating
Problem: We want to upload our rpm package to copr, we need `.src.rpm`
package for this.
Solution: Generate it along with `.rpm` package. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -31,17 +31,19 @@ let\nlicenseFile = \"${root}/LICENSES/MPL-2.0.txt\";\ndescription = \"CLI client for interacting with tezos blockchain\";\ngitRevision = mainnet.rev;\n+ branchName = \"mainnet\";\n};\npackag... | Python | MIT License | serokell/tezos-packaging | [#12] Add `.src.rpm` generating
Problem: We want to upload our rpm package to copr, we need `.src.rpm`
package for this.
Solution: Generate it along with `.rpm` package. |
603,652 | 04.12.2019 17:37:30 | -10,800 | 489471f6f27abcb980313d64cdbd470b419b7dd9 | Mention Copr in README
Problem: Now it is possible to install tezos-client on fedora using yum
and our copr repo.
Solution: Mention this in README. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -95,14 +95,32 @@ sudo apt-get install tezos-client-babylonnet\n## Fedora (Red Hat) usage\n+\n+### Install `.rpm` package\n+\nBuild or download `.rpm` file from the CI and double-click on it or run:\n```\nsudo yu... | Python | MIT License | serokell/tezos-packaging | [#12] Mention Copr in README
Problem: Now it is possible to install tezos-client on fedora using yum
and our copr repo.
Solution: Mention this in README. |
603,652 | 09.12.2019 12:23:08 | -10,800 | ddfd10d5cfe73516cd07b323022fa7556fa02ccb | Pin crossref-verifier revision
Problem: crossref-verifier `master` branch changes over time. We don't
want CI to fail because of these changes.
Solution: Use a specific revision (the latest one). | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -11,7 +11,7 @@ steps:\nlabel: reuse lint\n- command: .buildkite/check-trailing-whitespace.sh\nlabel: check trailing whitespace\n- - command: \"nix run -f https://github.com/serokell/c... | Python | MIT License | serokell/tezos-packaging | Pin crossref-verifier revision
Problem: crossref-verifier `master` branch changes over time. We don't
want CI to fail because of these changes.
Solution: Use a specific revision (the latest one). |
603,652 | 20.12.2019 17:58:32 | -10,800 | 64850e86769c09543b1cc986a9deb9dccad3c2bd | Update license in packages
Problem: All packages have MPL-2.0 license, however it is a bit
incorrect.
Solution: Use license from tezos repo instead. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -25,10 +25,10 @@ let\nversion = toString timestamp;\nbin = binary-mainnet;\narch = \"amd64\";\n- license = \"MPL-2.0\";\n+ license = \"MIT\";\ndependencies = \"\";\nmaintainer = \"Serokell https://serokell.i... | Python | MIT License | serokell/tezos-packaging | [#16] Update license in packages
Problem: All packages have MPL-2.0 license, however it is a bit
incorrect.
Solution: Use license from tezos repo instead. |
603,652 | 10.01.2020 15:16:55 | -10,800 | fb1c97020adda33004e516b27f222223fbc296d7 | Compress binaries with upx
Motivation: Produced static binaries appear to be well amenable to
packing with upx tool. So we compress them to reduce size of the
resulted binaries and packages. | [
{
"change_type": "MODIFY",
"old_path": "nix/default.nix",
"new_path": "nix/default.nix",
"diff": "@@ -235,7 +235,7 @@ let\n, js_of_ocaml, cmdliner, easy-format, ocp-ocamlres, tls, lwt4, lwt_log\n, mtime, ocplib-endian, ptime, re, rresult, stdio, uri, uutf, zarith\n, libusb1, hidapi, gmp, irmin, alco... | Python | MIT License | serokell/tezos-packaging | [#23] Compress binaries with upx
Motivation: Produced static binaries appear to be well amenable to
packing with upx tool. So we compress them to reduce size of the
resulted binaries and packages. |
603,652 | 09.01.2020 15:50:07 | -10,800 | 97dcafff52eb0fa123c87e2de904fa2def056cde | Add autorelease script
Problem: We want easier and more convenient way to get static binaries
(also packages, but this is secondarily).
Solution: Add autorelease script that produces github prerelease with
all closures (binaries and packages). | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -29,3 +29,9 @@ steps:\n- ./mainnet-deb-package/*\n- ./babylonnet-rpm-package/*\n- ./babylonnet-deb-package/*\n+ branches: !master\n+ - commands:\n+ - GITHUB_TOKEN=$(cat ~/niv-bot-toke... | Python | MIT License | serokell/tezos-packaging | [#11] Add autorelease script
Problem: We want easier and more convenient way to get static binaries
(also packages, but this is secondarily).
Solution: Add autorelease script that produces github prerelease with
all closures (binaries and packages). |
603,652 | 09.01.2020 17:20:48 | -10,800 | 3d0683f310d13b14269c6a80489f9d35a990ca2e | Update README
Motivation: Now we have more convenient way to obtain binaries or
packages using github releases (instead of going to buildkite
artifacts), so we will use it as a preferable way to get these artifacts. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -68,11 +68,11 @@ make rpm-mainnet #build rpm package with tezos-client-mainnet\nTo build `.rpm` package with `mainnet` or `babylonnet` `tezos-client` executable. Once you install\nsuch package the command `tezos... | Python | MIT License | serokell/tezos-packaging | [#11] Update README
Motivation: Now we have more convenient way to obtain binaries or
packages using github releases (instead of going to buildkite
artifacts), so we will use it as a preferable way to get these artifacts. |
603,657 | 14.01.2020 15:30:26 | -3,600 | 70dca02118a20f09b9bb30e51683961ae40bb9ec | pipeline.yml: prepare for merge | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -33,5 +33,4 @@ steps:\n- commands:\n- GITHUB_TOKEN=$(cat ~/niv-bot-token) ./scripts/autorelease.sh\nlabel: create auto pre-release\n- # TODO: uncomment me before merging\n- # branches... | Python | MIT License | serokell/tezos-packaging | pipeline.yml: prepare for merge |
603,652 | 10.12.2019 13:10:47 | -10,800 | 82eb1a8a8400209a800f5073e8b947d1388c57f9 | Build `tezos-node` | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -10,18 +10,19 @@ let\nrev = \"94f779a7\";\nsha256 = \"16lxilng5q8fr2ll6h4hf7wlvac6nmw4cx10cbgzj5ks090bl97r\";\npatchFile = ./nix/fix-mainnet.patch;\n+ protoName = \"proto_005_PsBabyM1\";\n};\nbabylonnet = {\... | Python | MIT License | serokell/tezos-packaging | [#14] Build `tezos-node` |
603,652 | 10.12.2019 13:11:19 | -10,800 | 47ea2837c8459db77555d8eb419304ba9bfd9909 | Build `tezos-baker` | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -6,17 +6,19 @@ with pkgs;\nlet\nroot = ./.;\n- mainnet = {\n+ mainnet = rec {\nrev = \"94f779a7\";\nsha256 = \"16lxilng5q8fr2ll6h4hf7wlvac6nmw4cx10cbgzj5ks090bl97r\";\npatchFile = ./nix/fix-mainnet.patch;\n-... | Python | MIT License | serokell/tezos-packaging | [#14] Build `tezos-baker` |
603,652 | 10.12.2019 13:09:34 | -10,800 | a1bb4b8bc004fd100b5af6fd01d0673fd4848cdf | Build `tezos-accuser` | [
{
"change_type": "MODIFY",
"old_path": "nix/default.nix",
"new_path": "nix/default.nix",
"diff": "@@ -334,6 +334,7 @@ let\ndune build src/bin_client/tezos-client.install\ndune build src/bin_node/tezos-node.install\ndune build src/proto_${branchInfo.protoName}/bin_baker/tezos-baker-${branchInfo.binar... | Python | MIT License | serokell/tezos-packaging | [#14] Build `tezos-accuser` |
603,652 | 10.12.2019 14:36:16 | -10,800 | 71a6fb2b837172a3ac297ca72d7674dcb00b4f3a | Build `tezos-endorser` | [
{
"change_type": "MODIFY",
"old_path": "nix/default.nix",
"new_path": "nix/default.nix",
"diff": "@@ -335,6 +335,7 @@ let\ndune build src/bin_node/tezos-node.install\ndune build src/proto_${branchInfo.protoName}/bin_baker/tezos-baker-${branchInfo.binarySuffix}.install\ndune build src/proto_${branchI... | Python | MIT License | serokell/tezos-packaging | [#14] Build `tezos-endorser` |
603,652 | 10.12.2019 15:05:36 | -10,800 | 39f9018f8888fb08ed910a8f50d316cb21e1129a | Build `tezos-signer` | [
{
"change_type": "MODIFY",
"old_path": "nix/default.nix",
"new_path": "nix/default.nix",
"diff": "@@ -336,6 +336,7 @@ let\ndune build src/proto_${branchInfo.protoName}/bin_baker/tezos-baker-${branchInfo.binarySuffix}.install\ndune build src/proto_${branchInfo.protoName}/bin_accuser/tezos-accuser-${b... | Python | MIT License | serokell/tezos-packaging | [#14] Build `tezos-signer` |
603,652 | 10.12.2019 15:23:48 | -10,800 | e2ef2c1f59fd45633975cce86b23091585b3cbf2 | Build `tezos-protocol-compiler` | [
{
"change_type": "MODIFY",
"old_path": "nix/default.nix",
"new_path": "nix/default.nix",
"diff": "@@ -337,6 +337,7 @@ let\ndune build src/proto_${branchInfo.protoName}/bin_accuser/tezos-accuser-${branchInfo.binarySuffix}.install\ndune build src/proto_${branchInfo.protoName}/bin_endorser/tezos-endors... | Python | MIT License | serokell/tezos-packaging | [#14] Build `tezos-protocol-compiler` |
603,652 | 10.12.2019 15:56:36 | -10,800 | 84f4c1ab88ce194093cbb3559c3f5bb5ff47d830 | Pack static binaries in archive
Problem: There are a lot of tezos-related binaries, it is a bit
inconvenient to provide every binary as a single build artifact.
Solution: Pack binaries in `.tar.gz` archive and expose it as a build
artifact. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -15,16 +15,16 @@ steps:\nlabel: crossref-verify\nsoft_fail: true\n- commands:\n- - nix-build -A tezos-client-mainnet -o tezos-client-mainnet\n- - nix-build -A tezos-client-babylonnet ... | Python | MIT License | serokell/tezos-packaging | [#14] Pack static binaries in archive
Problem: There are a lot of tezos-related binaries, it is a bit
inconvenient to provide every binary as a single build artifact.
Solution: Pack binaries in `.tar.gz` archive and expose it as a build
artifact. |
603,652 | 13.12.2019 15:22:01 | -10,800 | 211dec253debc7923f7e419b6c0c47142b5ec133 | Package all new binaries
Problem: Now we build not only `tezos-client` but also other
tezos-related executables.
Solution: Pack them all in both `.rpm` and `.deb` packages. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -17,10 +17,8 @@ steps:\n- commands:\n- nix-build -A mainnet-binaries -o mainnet-binaries\n- nix-build -A babylonnet-binaries -o babylonnet-binaries\n- - nix-build -A mainnet-rpm-packa... | Python | MIT License | serokell/tezos-packaging | [#14] Package all new binaries
Problem: Now we build not only `tezos-client` but also other
tezos-related executables.
Solution: Pack them all in both `.rpm` and `.deb` packages. |
603,652 | 19.12.2019 13:37:13 | -10,800 | 7505c0c08e1d725cc750c908629556bd03dbe6c5 | Optional build `.src.rpm`
Problem: `.src.rpm` are used for uploading to Copr repository.
It doesn't make much sense to distribute them along with `.rpm`
packages.
Solution: Optionally build them using buildSourcePackage attribute
in `packageRpm.nix`. | [
{
"change_type": "MODIFY",
"old_path": "packageRpm.nix",
"new_path": "packageRpm.nix",
"diff": "# SPDX-FileCopyrightText: 2019 TQ Tezos <https://tqtezos.com/>\n#\n# SPDX-License-Identifier: MPL-2.0\n-{ stdenv, writeTextFile, gnutar, rpm, buildFHSUserEnv }:\n+{ stdenv, writeTextFile, gnutar, rpm, bui... | Python | MIT License | serokell/tezos-packaging | [#14] Optional build `.src.rpm`
Problem: `.src.rpm` are used for uploading to Copr repository.
It doesn't make much sense to distribute them along with `.rpm`
packages.
Solution: Optionally build them using buildSourcePackage attribute
in `packageRpm.nix`. |
603,652 | 15.01.2020 12:52:37 | -10,800 | 6663aa15b88f442db00c160b80989a8804f5f0f4 | Update autorelease script
Problem: Now we have more binaries to release, they are store in tar
archive.
Solution: Update autorelease script, so that it unarchive binaries add
babylonnet/mainnet suffix to their names and add them to the release
assets. Also now binaries won't have commit hash in the name. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -36,10 +36,10 @@ let\ntar -cvzf $out/${name} --mode='u+rwX' -C ${pathToPack} $(ls ${pathToPack})\n'';\n};\n- mainnet-binaries = packDirectory \"mainnet-binaries-${mainnet.rev}\"\n+ mainnet-binaries = packDir... | Python | MIT License | serokell/tezos-packaging | [#14] Update autorelease script
Problem: Now we have more binaries to release, they are store in tar
archive.
Solution: Update autorelease script, so that it unarchive binaries add
babylonnet/mainnet suffix to their names and add them to the release
assets. Also now binaries won't have commit hash in the name. |
603,652 | 28.01.2020 15:51:02 | -10,800 | 2d5b6f36977c85ba43d42cf88b9f3f844ea7f7a5 | Add release notes for autorelease
Problem: One can be confused by huge amount of release assets.
Solution: Add some assets description in the README and refer to
this section in release notes. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -18,8 +18,37 @@ Recomended way to get these binaries is to download them from assets from github\nGo to the [latest release](https://github.com/serokell/tezos-packaging/releases/latest)\nand download desired ass... | Python | MIT License | serokell/tezos-packaging | [#27] Add release notes for autorelease
Problem: One can be confused by huge amount of release assets.
Solution: Add some assets description in the README and refer to
this section in release notes. |
603,652 | 29.01.2020 15:37:31 | -10,800 | 5f74807f5e3635b3cc12c863a45b974ee70dc5d7 | Bump tezos branch revisions
Problem: Current revision that are built and packed are quiet old.
Solution: Update them to the newest existing ones. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -11,14 +11,14 @@ let\nbinarySuffix = builtins.replaceStrings [ \"_\" ] [ \"-\" ] protocolName;\n};\nmainnet = {\n- rev = \"94f779a7\";\n- sha256 = \"16lxilng5q8fr2ll6h4hf7wlvac6nmw4cx10cbgzj5ks090bl97r\";\n+... | Python | MIT License | serokell/tezos-packaging | [#26] Bump tezos branch revisions
Problem: Current revision that are built and packed are quiet old.
Solution: Update them to the newest existing ones. |
603,652 | 07.02.2020 11:22:44 | -10,800 | 9eb4fc01fd6d1656262f3aaea15a97e626a629ef | Update autorelease script | [
{
"change_type": "MODIFY",
"old_path": "scripts/autorelease.sh",
"new_path": "scripts/autorelease.sh",
"diff": "# SPDX-License-Identifier: MPL-2.0\n# Project name, inferred from repository name\n-project=$(basename $(pwd))\n+project=$(basename \"$(pwd)\")\n# The directory in which artifacts will be ... | Python | MIT License | serokell/tezos-packaging | [#30] Update autorelease script |
603,652 | 13.02.2020 11:25:37 | -10,800 | 20c6fb4158a21add118c221f142a35a5251efb18 | Update README
Problem: After recent update README has some amount on nonsense.
Solution: Rereade it and update. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -40,13 +40,12 @@ see [PPA](#ppa) and [Copr](#copr) for more information about remote package repo\nContents of release:\n* `tezos-*-005-PsBabyM1` static binaries for 005 protocol.\n* `tezos-*-006-PsCARTHA` stati... | Python | MIT License | serokell/tezos-packaging | [#30] Update README
Problem: After recent update README has some amount on nonsense.
Solution: Rereade it and update. |
603,652 | 17.02.2020 19:14:10 | -10,800 | 31c7c200cf1c640d8949d85c0cc6906f37e2112f | Bump master revision | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -16,8 +16,8 @@ let\n};\nprotocols = [ protocol005 protocol006 ];\nmaster = {\n- rev = \"767de2b6\";\n- sha256 = \"1mvgyzb2w5p7r92y2zvq7awshz7xi9x5g5ncjyxzd3z7rkxpj5vb\";\n+ rev = \"60b977cd\";\n+ sha256 = \"... | Python | MIT License | serokell/tezos-packaging | [#30] Bump master revision |
603,652 | 20.02.2020 17:38:25 | -10,800 | a13b9b262391eacdfaca909e8aa61070b4ecd5aa | Make tezos patches configurable
Problem: In one of our projects we want to provide batched static
tezos-binaries.
Solution: Make patches configurable. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "# SPDX-FileCopyrightText: 2019 TQ Tezos <https://tqtezos.com/>\n#\n# SPDX-License-Identifier: MPL-2.0\n-{ pkgs ? import <nixpkgs> { }, timestamp ? \"19700101\" }:\n+{ pkgs ? import <nixpkgs> { }, timestamp ? \"... | Python | MIT License | serokell/tezos-packaging | Make tezos patches configurable
Problem: In one of our projects we want to provide batched static
tezos-binaries.
Solution: Make patches configurable. |
603,652 | 25.02.2020 11:10:08 | -10,800 | 5ed8c7066e9f8923e32aaaa164d0111d771c14ed | Exclude deb and rpm packages from releases
Problem: Each release contains packages-deb.tar.gz and
packages-rpm.tar.gz which occupy more than 150 MB in total and are not
really useful because they are accessible from ppa and copr.
Solution: Exclude them from releases. | [
{
"change_type": "MODIFY",
"old_path": "release.nix",
"new_path": "release.nix",
"diff": "#\n# SPDX-License-Identifier: MPL-2.0\n{ pkgs ? import <nixpkgs> { }, timestamp ? \"19700101\" }:\n-let closures = builtins.attrValues (import ./. { inherit pkgs timestamp; });\n+let\n+ ignored_closures = [ \"d... | Python | MIT License | serokell/tezos-packaging | [#34] Exclude deb and rpm packages from releases
Problem: Each release contains packages-deb.tar.gz and
packages-rpm.tar.gz which occupy more than 150 MB in total and are not
really useful because they are accessible from ppa and copr.
Solution: Exclude them from releases. |
603,652 | 20.12.2019 17:17:43 | -10,800 | bf796c545a18bd40ccb417da0c2d3e01088d5e06 | Update README
Problem: It is possible to generate source packages now.
Solution: Explain how to build them an use in order to publish on
Launchpad or Copr. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -119,6 +119,26 @@ To build `.deb` packages with tezos binaries.\nOnce you built them, you can install `.deb` packages using the following command:\n```\nsudo apt install <path to deb file>\n+\n+### Publish packa... | Python | MIT License | serokell/tezos-packaging | [#19] Update README
Problem: It is possible to generate source packages now.
Solution: Explain how to build them an use in order to publish on
Launchpad or Copr. |
603,652 | 24.01.2020 13:39:52 | -10,800 | 4c9dd2006a82a2fd79b66646135e569218976ef0 | Filter attributes for release
Problem: We don't really want to include source packages in the
releases. However, current `release.nix` takes all `default.nix`
attributes.
Solution: Filter attributes to drop source packages. | [
{
"change_type": "MODIFY",
"old_path": "release.nix",
"new_path": "release.nix",
"diff": "# SPDX-License-Identifier: MPL-2.0\n{ pkgs ? import <nixpkgs> { }, timestamp ? \"19700101\" }:\nlet\n- ignored_closures = [ \"deb-packages\" \"rpm-packages\" ];\n+ ignored_closures = [\n+ \"deb-packages\"\n+ \"... | Python | MIT License | serokell/tezos-packaging | [#19] Filter attributes for release
Problem: We don't really want to include source packages in the
releases. However, current `release.nix` takes all `default.nix`
attributes.
Solution: Filter attributes to drop source packages. |
603,652 | 12.02.2020 16:25:03 | -10,800 | 1bb436f27e527b7fb5a552efb7f5ea06ac733979 | Configurable ubuntu version
Problem: Previously, we were building packages only for xenial and
later copy them to bionic via launchpad.
Solution: Make ubuntu version configurable, set "bionic" (18.04 LTS) as
default version to build source packages for. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -127,9 +127,13 @@ you can do this by running the following commands:\n```\nnix-build -A deb-source-packages -o deb-source-packages \\\n--arg builderInfo \"\\\"Roman Melnikov <roman.melnikov@serokell.io>\\\"\" \\... | Python | MIT License | serokell/tezos-packaging | [#19] Configurable ubuntu version
Problem: Previously, we were building packages only for xenial and
later copy them to bionic via launchpad.
Solution: Make ubuntu version configurable, set "bionic" (18.04 LTS) as
default version to build source packages for. |
603,652 | 02.03.2020 18:14:11 | -10,800 | 262413647ca8a1555df95eb962289e13b09e066e | Hotfix README | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -119,6 +119,7 @@ To build `.deb` packages with tezos binaries.\nOnce you built them, you can install `.deb` packages using the following command:\n```\nsudo apt install <path to deb file>\n+```\n### Publish pack... | Python | MIT License | serokell/tezos-packaging | [#19] Hotfix README |
603,652 | 03.03.2020 19:05:21 | -10,800 | dd27199aeebed1c4e9326619e76c561ab84aabb7 | Fix carthagenet specific binaries
Problem: Dune files for `tezos-{accuser, baker, endorser}-006-PsCARTHA`
were lacking flags required for static building. This caused errors
when trying to run built executables.
Solution: Add flags. | [
{
"change_type": "MODIFY",
"old_path": "nix/fix-master.patch",
"new_path": "nix/fix-master.patch",
"diff": "@@ -78,6 +78,51 @@ index d1b60c7..a738ef2 100644\n+ -cclib \"-lusb-1.0 -lhidapi-libusb -ludev\"\n+ )))\n+ (alias\n+ (name runtest_lint)\n+diff --git a/src/proto_006_PsCARTHA/bin_accuser/dune b... | Python | MIT License | serokell/tezos-packaging | [#38] Fix carthagenet specific binaries
Problem: Dune files for `tezos-{accuser, baker, endorser}-006-PsCARTHA`
were lacking flags required for static building. This caused errors
when trying to run built executables.
Solution: Add flags. |
603,652 | 04.03.2020 17:07:11 | -10,800 | f8304b514fc7913133325649e4a7d9d7b373e049 | Test static binaries in CI
Problem: It would be nice to somehow test that our binaries work.
Solution: Run them with `--help` and ensure they return 0 exit code. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -23,7 +23,11 @@ steps:\n- ./binaries/*\n- ./deb-packages/*\n- ./rpm-packages/*\n- branches: !master\n+ branches: \"!master\"\n+ - commands:\n+ - nix-build -A test-binaries --no-out-li... | Python | MIT License | serokell/tezos-packaging | [#38] Test static binaries in CI
Problem: It would be nice to somehow test that our binaries work.
Solution: Run them with `--help` and ensure they return 0 exit code. |
603,664 | 09.03.2020 09:50:52 | -10,800 | 80242f82a75c813afe81226c2f100d024c99ba29 | autorelease.sh: add `set -euo pipefail`, clean up on failure | [
{
"change_type": "MODIFY",
"old_path": "scripts/autorelease.sh",
"new_path": "scripts/autorelease.sh",
"diff": "#\n# SPDX-License-Identifier: MPL-2.0\n+set -euo pipefail\n+\n# Project name, inferred from repository name\nproject=$(basename \"$(pwd)\")\n# The directory in which artifacts will be crea... | Python | MIT License | serokell/tezos-packaging | autorelease.sh: add `set -euo pipefail`, clean up on failure |
603,652 | 24.03.2020 11:19:47 | -10,800 | baecb72980d2a9bf9adca51cda73410d988fc812 | Bump master branch revision.
Problem: was
merged, changes from this MR is required for some other projects and
it's convenient to use static binaries from this repo in it.
Also, OCaml compiler version for tezos was updated to 4.09.
Solution: Update compiler version, bump various libraries.
Bump master branch revision. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -18,8 +18,8 @@ let\n};\nprotocols = [ protocol005 protocol006 ];\nmaster = {\n- rev = \"60b977cd\";\n- sha256 = \"1v9v5z5i3cs9jw48m3xx9w4fqkns37nn464fr7hds7wgmwfmf1sp\";\n+ rev = \"0737ae7a\";\n+ sha256 = \"... | Python | MIT License | serokell/tezos-packaging | [#26] Bump master branch revision.
Problem: https://gitlab.com/tezos/tezos/-/merge_requests/1624 was
merged, changes from this MR is required for some other projects and
it's convenient to use static binaries from this repo in it.
Also, OCaml compiler version for tezos was updated to 4.09.
Solution: Update compiler version, bump various libraries.
Bump master branch revision. |
603,652 | 06.05.2020 12:59:51 | -10,800 | b4a7d8f7de8aaf14f39ad94da998bf96aa664569 | Unignore base protocols
Problem: When starting from scratch `tezos-node` required information
about base chain protocols. Currently, we ignore all protocols except
006, hthis cause `tezos-node run` to fail.
Solution: Unignore `genesis`, `genesis-carthagenet`, `000-Ps9mPmXa`. | [
{
"change_type": "MODIFY",
"old_path": "protocols.json",
"new_path": "protocols.json",
"diff": "{\n\"ignored\": [\n\"alpha\",\n- \"genesis\",\n- \"genesis-carthagenet\",\n\"demo-counter\",\n- \"000-Ps9mPmXa\",\n\"001-PtCJ7pwo\",\n\"002-PsYLVpVv\",\n\"003-PsddFKi3\",\n\"005-PsBABY5H\",\n\"005-PsBabyM... | Python | MIT License | serokell/tezos-packaging | [#48] Unignore base protocols
Problem: When starting from scratch `tezos-node` required information
about base chain protocols. Currently, we ignore all protocols except
006, hthis cause `tezos-node run` to fail.
Solution: Unignore `genesis`, `genesis-carthagenet`, `000-Ps9mPmXa`. |
603,652 | 06.05.2020 15:39:33 | -10,800 | e96dc8bce22f6cf2ec708ef9a0589b494dfae612 | Add testing tezos-node run
Motivation: Let's check that tezos-node is capable of runnint mainnet and
carthagenet in CI. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -59,6 +59,15 @@ let\necho \"$f\"\n\"$f\" --help &> /dev/null\ndone\n+ # Test that tezos-node run works for carthagenet\n+ ${bundled.binaries}/bin/tezos-node config init --data-dir node-dir --network carthage... | Python | MIT License | serokell/tezos-packaging | [#48] Add testing tezos-node run
Motivation: Let's check that tezos-node is capable of runnint mainnet and
carthagenet in CI. |
603,652 | 06.05.2020 14:04:52 | -10,800 | 81a382433bb5ea17e3eaffb8f6826a22f6371301 | Bump tezos revision to v7.0 release. | [
{
"change_type": "MODIFY",
"old_path": "nix/sources.json",
"new_path": "nix/sources.json",
"diff": "\"url_template\": \"https://github.com/<owner>/<repo>/archive/<rev>.tar.gz\"\n},\n\"tezos\": {\n- \"ref\": \"master\",\n+ \"ref\": \"v7.0\",\n\"repo\": \"https://gitlab.com/tezos/tezos\",\n- \"rev\": ... | Python | MIT License | serokell/tezos-packaging | [#47] Bump tezos revision to v7.0 release. |
603,652 | 06.05.2020 14:05:41 | -10,800 | 241e0910db76c3005e43779f34ea85dffffa1b55 | Use tezos/tezos tag in the package versioning
Problem: Tezos now uses some versioning. `v7.0` recently was
released. We should use this versioning.
Solution: Use release version instead of timestamp for packages
versions. We will use releases numbers in case we need to change
something in the packaging code instead of revision hashes. | [
{
"change_type": "MODIFY",
"old_path": "deb.nix",
"new_path": "deb.nix",
"diff": "@@ -6,15 +6,16 @@ pkg:\nlet\nproject = pkg.meta.name;\nversion = meta.version;\n- revision = meta.gitRevision;\n+ release = meta.release;\n+ epoch = meta.epoch;\npkgArch = meta.arch;\n- pkgName = \"${project}_0ubuntu${... | Python | MIT License | serokell/tezos-packaging | [#47] Use tezos/tezos tag in the package versioning
Problem: Tezos now uses some versioning. `v7.0` recently was
released. We should use this versioning.
Solution: Use release version instead of timestamp for packages
versions. We will use releases numbers in case we need to change
something in the packaging code instead of revision hashes. |
603,652 | 21.05.2020 14:56:38 | -10,800 | 268ffc8fba9cf32e685660935db5d84d16afe974 | Fix debian source package generation
It was accidentally broken previosly, which causes problem during
package publishing. | [
{
"change_type": "MODIFY",
"old_path": "debSource.nix",
"new_path": "debSource.nix",
"diff": "@@ -43,7 +43,7 @@ let\ntext = ''\n${project} (${epoch}:0ubuntu${version}-${release}) ${meta.ubuntuVersion}; urgency=medium\n- * Publish ${version}-${release} version of ${project}.\n+ * Publish ${version}-$... | Python | MIT License | serokell/tezos-packaging | [#26] Fix debian source package generation
It was accidentally broken previosly, which causes problem during
package publishing. |
603,652 | 21.05.2020 15:00:33 | -10,800 | cc900a26c80dfcea3fddbb620bf9283d711f4da7 | Bump tezos sources to v7.1 | [
{
"change_type": "MODIFY",
"old_path": "nix/sources.json",
"new_path": "nix/sources.json",
"diff": "\"url_template\": \"https://github.com/<owner>/<repo>/archive/<rev>.tar.gz\"\n},\n\"tezos\": {\n- \"ref\": \"v7.0\",\n+ \"ref\": \"v7.1\",\n\"repo\": \"https://gitlab.com/tezos/tezos\",\n- \"rev\": \"... | Python | MIT License | serokell/tezos-packaging | [#26] Bump tezos sources to v7.1 |
603,652 | 26.05.2020 17:41:32 | -10,800 | 875fc3c17584258df6d5b805ed0b01c09ff19c74 | Update README
Problem: Now it's possible to build static binaries without nix.
Solution: Mention this in README. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -74,6 +74,8 @@ If you find it more convinient to use `make`, there are some targets provided fo\n### Statically built binaries\n+#### Using nix\n+\nRun the following command:\n```bash\nnix build -f. binaries\n@@... | Python | MIT License | serokell/tezos-packaging | [#9] Update README
Problem: Now it's possible to build static binaries without nix.
Solution: Mention this in README. |
603,652 | 09.06.2020 12:02:01 | -10,800 | f83d0d74f94676216d461a434b914c7990e12e48 | Extract test-binaries from nix
Problem: Now we have two ways to get static tezos-binaries: nix and
docker, we want to test all these binaries using some simple
shell-script scenario.
Solution: Move test-binaries derivation from default.nix to separate
shell script and use it for nix built binaries. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -25,7 +25,8 @@ steps:\n- ./rpm-packages/*\nbranches: \"!master\"\n- commands:\n- - nix-build -A test-binaries --no-out-link\n+ - nix-build -A binaries -o binaries\n+ - ./scripts/test-... | Python | MIT License | serokell/tezos-packaging | [#9] Extract test-binaries from nix
Problem: Now we have two ways to get static tezos-binaries: nix and
docker, we want to test all these binaries using some simple
shell-script scenario.
Solution: Move test-binaries derivation from default.nix to separate
shell script and use it for nix built binaries. |
603,652 | 10.06.2020 10:24:19 | -10,800 | 4b3d3ed40065b925f460b69f77f59b1d11e0d8bf | Build docker binaries in CI
Problem: Now we have a way to build binaries using docker, we should
also have to automate this building in CI in order to test docker based
binaries.
Solution: Add step for building binaries using docker. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -29,6 +29,12 @@ steps:\n- ./scripts/test-binaries.sh binaries/bin\nlabel: test binaries\nbranches: \"!master\"\n+ - commands:\n+ - cd docker\n+ - nix run nixpkgs.docker -c ./docker-st... | Python | MIT License | serokell/tezos-packaging | [#9] Build docker binaries in CI
Problem: Now we have a way to build binaries using docker, we should
also have to automate this building in CI in order to test docker based
binaries.
Solution: Add step for building binaries using docker. |
603,652 | 10.06.2020 11:22:57 | -10,800 | 8a890be8a96f0eef22bc896f6bdf48cf2a9cda47 | Inherit commonMeta in release.nix
Problem: release.nix has hardcoded release number which is really easy
forget to change, it's safer to use the meta as in default.nix
Solution: Reuse commonMeta from default.nix in release.nix. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -56,6 +56,6 @@ let\nbundled = builtins.mapAttrs bundle artifacts;\nrelease =\n- pkgs.callPackage ./release.nix { inherit source bundled timestamp; };\n+ pkgs.callPackage ./release.nix { inherit bundled times... | Python | MIT License | serokell/tezos-packaging | Inherit commonMeta in release.nix
Problem: release.nix has hardcoded release number which is really easy
forget to change, it's safer to use the meta as in default.nix
Solution: Reuse commonMeta from default.nix in release.nix. |
603,652 | 10.06.2020 11:10:06 | -10,800 | 6420c79b9a00e6c2f155f0f8203c19142e7c746b | Test binaries build by docker
Problem: Now we also produce tezos binaries using docker, we should test
produced binaries as well.
Solution: Test them using `test-binaries.sh` script. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -32,9 +32,10 @@ steps:\n- commands:\n- cd docker\n- nix run nixpkgs.docker -c ./docker-static-build.sh\n+ - cd .. && ./scripts/test-binaries.sh docker\nartifact_paths:\n- - ./tezos-*\... | Python | MIT License | serokell/tezos-packaging | [#9] Test binaries build by docker
Problem: Now we also produce tezos binaries using docker, we should test
produced binaries as well.
Solution: Test them using `test-binaries.sh` script. |
603,652 | 15.06.2020 16:43:40 | -10,800 | 599a567db8f70bb42dd929869aaf48c9fffaeeda | Compress binaries built by docker
Problem: Binaries built by docker are much larger that binaries built by
nix.
Solution: Compress them using UPX. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -32,6 +32,7 @@ steps:\n- commands:\n- cd docker\n- nix run nixpkgs.docker -c ./docker-static-build.sh\n+ - nix run nixpkgs.upx -c upx tezos-*\n- cd .. && ./scripts/test-binaries.sh do... | Python | MIT License | serokell/tezos-packaging | [#9] Compress binaries built by docker
Problem: Binaries built by docker are much larger that binaries built by
nix.
Solution: Compress them using UPX. |
603,652 | 15.06.2020 16:46:58 | -10,800 | c50a2b69876936bda678ece7f318d0f47c369842 | Use docker binaries in releases
Problem: Now we have a way to build binaries using docker, we want to
use these binaries in releases.
Solution: Rework existing release mechanism a bit. Now instead of
building nix derivation, it uses path to the directory with tezos
binaries. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -38,6 +38,9 @@ steps:\n- ./docker/tezos-*\nlabel: build using docker and test binaries\n- commands:\n+ - mkdir binaries\n+ - buildkite-agent artifact download \"docker/*\" binaries --... | Python | MIT License | serokell/tezos-packaging | [#9] Use docker binaries in releases
Problem: Now we have a way to build binaries using docker, we want to
use these binaries in releases.
Solution: Rework existing release mechanism a bit. Now instead of
building nix derivation, it uses path to the directory with tezos
binaries. |
603,652 | 18.06.2020 15:46:19 | -10,800 | 8deef1083be14c27b5fa9dc1f131011a55b4d542 | Reorganize repo structure more
Problem: Currently `nix/` is a bit messy, files for building and
packaging are located together.
Solution: Move all building related nix files to `nix/build`, all
packaging related files to `nix/package`, leave high-level files in the
`nix/`. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "{ timestamp ? \"19700101\", docker-binaries ? null }:\nlet\n- pkgs = import ./nix/pkgs.nix { };\n+ pkgs = import ./nix/build/pkgs.nix { };\nsource = (import ./nix/nix/sources.nix).tezos;\ncommonMeta = {\n# rele... | Python | MIT License | serokell/tezos-packaging | [#9] Reorganize repo structure more
Problem: Currently `nix/` is a bit messy, files for building and
packaging are located together.
Solution: Move all building related nix files to `nix/build`, all
packaging related files to `nix/package`, leave high-level files in the
`nix/`. |
603,652 | 18.06.2020 15:50:16 | -10,800 | e3398f7e758ffa155b93695f00933de0eade539c | Remove timestamp usage
Problem: We no longer use timestamp based versioning, the only place
where timestamp is used is generated autorelease header. It doesn't make
much sense to use timestamp anymore.
Solution: Remove timestamp usage. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "#\n# SPDX-License-Identifier: MPL-2.0\n-{ timestamp ? \"19700101\", docker-binaries ? null }:\n+{ docker-binaries ? null }:\nlet\npkgs = import ./nix/build/pkgs.nix { };\nsource = (import ./nix/nix/sources.nix)... | Python | MIT License | serokell/tezos-packaging | [#9] Remove timestamp usage
Problem: We no longer use timestamp based versioning, the only place
where timestamp is used is generated autorelease header. It doesn't make
much sense to use timestamp anymore.
Solution: Remove timestamp usage. |
603,652 | 18.06.2020 12:49:21 | -10,800 | 37820697352dc12048d8be6b693bcb11e4b73813 | Extend binaries testing
Problem: We want to extend binary testing to prevent unexpected bug
appearance in the future.
Solution: Use nixos tests framework for testing tezos binaries, port
and extend existing testing scenario to it, add scenario for testing
daemons and tezos-admin-client. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -25,15 +25,16 @@ steps:\n- ./rpm-packages/*\nbranches: \"!master\"\n- commands:\n- - nix-build ./nix -A binaries -o binaries\n- - ./scripts/test-binaries.sh binaries/bin\n+ - buildkit... | Python | MIT License | serokell/tezos-packaging | [#55] Extend binaries testing
Problem: We want to extend binary testing to prevent unexpected bug
appearance in the future.
Solution: Use nixos tests framework for testing tezos binaries, port
and extend existing testing scenario to it, add scenario for testing
daemons and tezos-admin-client. |
603,652 | 23.06.2020 14:23:58 | -10,800 | 5fae5e436385c703c93dd569915b1b6d424151f3 | Clean up pipeline.yml
Problem: Labels now are a bit outdated in the pipeline configuration.
Solution: Move them to be before actual command sequence and update.
Also update copyright year info. Also split building and testing docker
binaries into two different steps, IMO, this looks a bit better. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "-# SPDX-FileCopyrightText: 2019 TQ Tezos <https://tqtezos.com/>\n+# SPDX-FileCopyrightText: 2019-2020 TQ Tezos <https://tqtezos.com/>\n#\n# SPDX-License-Identifier: MPL-2.0\nenv:\nNIX_PA... | Python | MIT License | serokell/tezos-packaging | Clean up pipeline.yml
Problem: Labels now are a bit outdated in the pipeline configuration.
Solution: Move them to be before actual command sequence and update.
Also update copyright year info. Also split building and testing docker
binaries into two different steps, IMO, this looks a bit better. |
603,652 | 25.06.2020 10:54:05 | -10,800 | 9839b5b75769dad8327d09be5f84a6b332d9e871 | Bump tezos to v7.2
Problem: Tezos recently had new v7.2 release, we should update our
packaging as well.
Solution: Bump tezos to v7.2 :shrug:. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -8,7 +8,7 @@ let\nsource = (import ./nix/nix/sources.nix).tezos;\ncommonMeta = {\n# release should be updated in case we change something\n- release = \"2\";\n+ release = \"1\";\n# we switched from time-base... | Python | MIT License | serokell/tezos-packaging | [#26] Bump tezos to v7.2
Problem: Tezos recently had new v7.2 release, we should update our
packaging as well.
Solution: Bump tezos to v7.2 :shrug:. |
603,652 | 29.06.2020 15:35:51 | -10,800 | 94753fe6220f5d6e7f6436c85a3b470c42585629 | Extract meta for packaging to json
Problem: We want to package tezos for ubuntu in a nix-less way. All meta
information for this in currently stored in the .nix files.
Solution: Put it to json and use in both nix and nix-less ways. | [
{
"change_type": "MODIFY",
"old_path": ".reuse/dep5",
"new_path": ".reuse/dep5",
"diff": "Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/\n-Files: .github/* nix/* protocols.json\n+Files: .github/* nix/* protocols.json meta.json\nCopyright: TQ Tezos <https://tqtezos.com>\nL... | Python | MIT License | serokell/tezos-packaging | [#56] Extract meta for packaging to json
Problem: We want to package tezos for ubuntu in a nix-less way. All meta
information for this in currently stored in the .nix files.
Solution: Put it to json and use in both nix and nix-less ways. |
603,652 | 29.06.2020 16:37:35 | -10,800 | d3afe4c07de12603ad656a475b239920431165d4 | Move static docker stuff to docker/build
Problem: We are going to have two images for building static binaries
and ubuntu packages. It's make sense to use same directory structure as
in nix directory.
Solution: Move all static building related files to `docker/build`. | [
{
"change_type": "MODIFY",
"old_path": "docker/README.md",
"new_path": "docker/README.md",
"diff": "## Statically built binaries\n-Currently, we support only static binaries building using custom alpine image.\n+Static binaries building using custom alpine image.\n[`docker-static-build.sh`](docker-s... | Python | MIT License | serokell/tezos-packaging | [#56] Move static docker stuff to docker/build
Problem: We are going to have two images for building static binaries
and ubuntu packages. It's make sense to use same directory structure as
in nix directory.
Solution: Move all static building related files to `docker/build`. |
603,652 | 08.07.2020 17:45:41 | -10,800 | 50896c6b0261dc372c159107be1909381f8d54a3 | Update docker part README | [
{
"change_type": "MODIFY",
"old_path": "docker/README.md",
"new_path": "docker/README.md",
"diff": "@@ -16,3 +16,76 @@ image defined in [Dockerfile](build/Dockerfile). In order to build them, just ru\n./docker-static-build.sh\n```\nAfter that, directory will contain built static binaries.\n+\n+## Ub... | Python | MIT License | serokell/tezos-packaging | [#56] Update docker part README |
603,652 | 13.07.2020 12:22:41 | -10,800 | 64c35724e29e462cbecc72a8486b189b320f5b97 | Move protocols.json from nix/
Problem: Now we use information about active protocols in both nix and
nix-less parts of our code, so it doesn't make much sense to store it in
nix/ directory anymore.
Solution: Move protocols.json to the repository root. | [
{
"change_type": "MODIFY",
"old_path": ".github/CONTRIBUTING.md",
"new_path": ".github/CONTRIBUTING.md",
"diff": "@@ -15,16 +15,26 @@ If you report a bug, please provide steps to reproduce this bug and revision of\nIf you would like to contribute code to fix a bug, add a new feature, or\notherwise i... | Python | MIT License | serokell/tezos-packaging | [#56] Move protocols.json from nix/
Problem: Now we use information about active protocols in both nix and
nix-less parts of our code, so it doesn't make much sense to store it in
nix/ directory anymore.
Solution: Move protocols.json to the repository root. |
603,653 | 28.07.2020 00:01:45 | -10,800 | e340d2a0ce03c9e16f7b761744eba1caf417d04f | Update tezos version to 7.3
Problem: a new tezos version is released. We want
to keep up with upstream updates.
Solution: update revision of tezos to the v7.3 tag. | [
{
"change_type": "MODIFY",
"old_path": "docker/build/Dockerfile",
"new_path": "docker/build/Dockerfile",
"diff": "@@ -13,7 +13,7 @@ RUN git clone --single-branch --branch hidapi-0.9.0 https://github.com/libusb/hi\nRUN cd hidapi && autoreconf -fvi && ./bootstrap && ./configure && make && make install... | Python | MIT License | serokell/tezos-packaging | [#26] Update tezos version to 7.3
Problem: a new tezos version is released. We want
to keep up with upstream updates.
Solution: update revision of tezos to the v7.3 tag. |
603,652 | 03.08.2020 10:08:45 | -10,800 | b24888765614c156f77f45b22c60ee1443bad4ac | Add systemd unit for tezos-node and daemons
Since we want to include systemd units to our packages, we should define
them for all required binaries.
This commit defines these units in 'systemd/tezos-*.service',
their default configs in 'defaults/tezos-*.conf' and startup scripts
for these binaries in 'scripts/tezos-*-start'. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "docker/package/defaults/tezos-accuser.conf",
"diff": "+# vim: ft=sh\n+# SPDX-FileCopyrightText: 2020 TQ Tezos <https://tqtezos.com/>\n+#\n+# SPDX-License-Identifier: MPL-2.0\n+\n+# shellcheck disable=SC2034\n+NODE_HOST=\"localhost\"\n+NODE_RPC_P... | Python | MIT License | serokell/tezos-packaging | Add systemd unit for tezos-node and daemons
Since we want to include systemd units to our packages, we should define
them for all required binaries.
This commit defines these units in 'systemd/tezos-*.service',
their default configs in 'defaults/tezos-*.conf' and startup scripts
for these binaries in 'scripts/tezos-*-start'. |
603,652 | 03.08.2020 10:24:26 | -10,800 | 6626260f2664d03b427da9f7212684b8d9dda9b6 | Update protocol version in README
Problem: 005-PsBabyM1 is already dead for quite a long time and we don't
update packages for it, however, it's mentioned in the readme.
Solution: Mention 006-PsCARTHA in README instead. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -32,7 +32,7 @@ sudo add-apt-repository ppa:serokell/tezos && sudo apt-get update\nsudo apt-get install tezos-client\n# dpkg-source prohibits uppercase in the packages names so the protocol\n# name is in lowercas... | Python | MIT License | serokell/tezos-packaging | [#68] Update protocol version in README
Problem: 005-PsBabyM1 is already dead for quite a long time and we don't
update packages for it, however, it's mentioned in the readme.
Solution: Mention 006-PsCARTHA in README instead. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.