author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20
values | license stringclasses 3
values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
603,652 | 03.08.2020 10:38:35 | -10,800 | 35724dda3ce95f899b31952450cd3b8ef2d08cd5 | Mention systemd stuff in README
Problem: Now we have systemd units, we should tell the users how to use
them.
Solution: Update root README in order to mention that ubuntu packages
now have systemd unit included and explain how to configure and use
them. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -36,6 +36,32 @@ sudo apt-get install tezos-baker-006-pscartha\n```\nOnce you install such packages the commands `tezos-*` will be available.\n+### Systemd units for `tezos-node` and daemons\n+\n+`tezos-node`, `t... | Python | MIT License | serokell/tezos-packaging | Mention systemd stuff in README
Problem: Now we have systemd units, we should tell the users how to use
them.
Solution: Update root README in order to mention that ubuntu packages
now have systemd unit included and explain how to configure and use
them. |
603,652 | 03.08.2020 11:08:16 | -10,800 | 5a3efb101d590caee85d50a2e3c159556860b627 | Don't hardcode container name for package building
Problem: It's impossible to have two containers with the same names
in docker, this can potentially make CI stuck.
Solution: Don't hardcode container name and prefetch its id using
`docker create` instead. | [
{
"change_type": "MODIFY",
"old_path": "docker/docker-ubuntu-packages.sh",
"new_path": "docker/docker-ubuntu-packages.sh",
"diff": "@@ -11,7 +11,8 @@ set -euo pipefail\ndocker build -t tezos-ubuntu -f docker/package/Dockerfile .\nset +e\n-docker run -t --name package_builder tezos-ubuntu \"$@\"\n-do... | Python | MIT License | serokell/tezos-packaging | Don't hardcode container name for package building
Problem: It's impossible to have two containers with the same names
in docker, this can potentially make CI stuck.
Solution: Don't hardcode container name and prefetch its id using
`docker create` instead. |
603,652 | 03.08.2020 15:19:50 | -10,800 | f59d6a9ad9f6fe56fb80e231d0924de65f734077 | Update 'dep5' for nix-related files | [
{
"change_type": "MODIFY",
"old_path": ".reuse/dep5",
"new_path": ".reuse/dep5",
"diff": "Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/\n-Files: .github/* nix/* protocols.json meta.json\n+Files: .github/* nix/nix/* protocols.json meta.json\nCopyright: TQ Tezos <https://t... | Python | MIT License | serokell/tezos-packaging | Update 'dep5' for nix-related files |
603,652 | 05.08.2020 16:30:31 | -10,800 | bbd9f3459885bb1c751e8ef9760c1d1bf1f49fa6 | Don't build deb packages in master
Problem: It doesn't make much sense to build debian packages in the
master branch, moreover, building binary packages takes substantial
amount of time.
Solution: Don't build debian packages in master branch. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -48,12 +48,14 @@ steps:\n- nix run -f. pkgs.docker -c ./docker/docker-ubuntu-packages.sh source\nartifact_paths:\n- ./out/*\n+ branches: \"!master\"\n- label: test deb binary packages... | Python | MIT License | serokell/tezos-packaging | Don't build deb packages in master
Problem: It doesn't make much sense to build debian packages in the
master branch, moreover, building binary packages takes substantial
amount of time.
Solution: Don't build debian packages in master branch. |
603,652 | 13.08.2020 10:10:02 | -10,800 | eea8c5486905b674953334eb9b42a6caa358e875 | Update CONTRIBUTING.md
Problem: Our contributing doc has outdated instructions for updating
tezos via 'niv.'
Solution: Update these instructions. | [
{
"change_type": "MODIFY",
"old_path": ".github/CONTRIBUTING.md",
"new_path": ".github/CONTRIBUTING.md",
"diff": "@@ -19,8 +19,10 @@ otherwise improve our project, pull requests are most welcome.\n- Tezos revision is located in the [`sources.json`](../nix/nix/sources.json) file.\nYou can either upda... | Python | MIT License | serokell/tezos-packaging | [#66] Update CONTRIBUTING.md
Problem: Our contributing doc has outdated instructions for updating
tezos via 'niv.'
Solution: Update these instructions. |
603,652 | 14.08.2020 13:36:43 | -10,800 | 4d9817294a950dd9de487c2350df163b9f831264 | Fetch tezos version from env for docker
Problem: Currently tezos sources version is hardcoded in
`docker/build/Dockerfile` for static binaries. Package building
uses version from nix/nix/sources.json. It's not really convenient.
Solution: Fetch tezos version from `TEZOS_VERSION` env variable that
needs to be set before building binaries or packages via docker. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "env:\nNIX_PATH: nixpkgs=https://github.com/serokell/nixpkgs/archive/master.tar.gz\n+ SET_VERSION: \"export TEZOS_VERSION=\\\"$(cat nix/nix/sources.json | jq -r '.tezos.ref')\\\"\"\nsteps... | Python | MIT License | serokell/tezos-packaging | [#66] Fetch tezos version from env for docker
Problem: Currently tezos sources version is hardcoded in
`docker/build/Dockerfile` for static binaries. Package building
uses version from nix/nix/sources.json. It's not really convenient.
Solution: Fetch tezos version from `TEZOS_VERSION` env variable that
needs to be set before building binaries or packages via docker. |
603,652 | 26.08.2020 13:23:56 | -10,800 | aacc5cab9fbe3114373ec50957d331c62c54458b | Allow all old protocols in protocols.json
Problem: We doesn't compile all protocols for nix binaries, this lead to
a problem when bootstrapping mainnet node, it says that old protocols
are missing during block validation.
Solution: Allow all old protocols. | [
{
"change_type": "MODIFY",
"old_path": "protocols.json",
"new_path": "protocols.json",
"diff": "{\n\"ignored\": [\n\"alpha\",\n- \"demo-counter\",\n+ \"demo-counter\"\n+ ],\n+ \"allowed\": [\n+ \"genesis\",\n+ \"genesis-carthagenet\",\n+ \"000-Ps9mPmXa\",\n\"001-PtCJ7pwo\",\n\"002-PsYLVpVv\",\n\"003... | Python | MIT License | serokell/tezos-packaging | Allow all old protocols in protocols.json
Problem: We doesn't compile all protocols for nix binaries, this lead to
a problem when bootstrapping mainnet node, it says that old protocols
are missing during block validation.
Solution: Allow all old protocols. |
603,652 | 26.08.2020 14:57:05 | -10,800 | 6bb6b4d60ef0fce3e5c9cf34bc4dc4d7a17705b8 | Don't use `NIX_PATH`
Problem: We have `NIX_PATH` in the pipeline setting which is used in
tests and points to the nixpkgs master, which is bad because using
non-pinned nixpkgs can cause unexpected massive rebuilds.
Solution: Use nixpkgs from sources in the tests. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "# SPDX-License-Identifier: MPL-2.0\nenv:\n- NIX_PATH: nixpkgs=https://github.com/serokell/nixpkgs/archive/master.tar.gz\nSET_VERSION: \"export TEZOS_VERSION=\\\"$(cat nix/nix/sources.jso... | Python | MIT License | serokell/tezos-packaging | Don't use `NIX_PATH`
Problem: We have `NIX_PATH` in the pipeline setting which is used in
tests and points to the nixpkgs master, which is bad because using
non-pinned nixpkgs can cause unexpected massive rebuilds.
Solution: Use nixpkgs from sources in the tests. |
603,652 | 27.08.2020 10:42:54 | -10,800 | 5eca09a365fb0fa6c6fe9308d8d3b755cc9523a3 | Use custom shell.nix for autorelease.sh
Problem: `nix-shell -p` requires nixpkgs to be in
`NIX_PATH`, which we removed earlier.
Solution: Use shell.nix file instead of using `-p` option. | [
{
"change_type": "MODIFY",
"old_path": "scripts/autorelease.sh",
"new_path": "scripts/autorelease.sh",
"diff": "#!/usr/bin/env nix-shell\n-#!nix-shell -p gitAndTools.hub git rename -i bash\n+#!nix-shell shell.nix -i bash\n# SPDX-FileCopyrightText: 2019 TQ Tezos <https://tqtezos.com/>\n#\n# SPDX-Lice... | Python | MIT License | serokell/tezos-packaging | Use custom shell.nix for autorelease.sh
Problem: `nix-shell -p` requires nixpkgs to be in
`NIX_PATH`, which we removed earlier.
Solution: Use shell.nix file instead of using `-p` option. |
603,652 | 07.09.2020 10:32:54 | -10,800 | 9290e7f93815271291bb2b8da45b3afdeb538b7b | Bump tezos to v7.4 | [
{
"change_type": "MODIFY",
"old_path": "docker/build/static_libs.patch",
"new_path": "docker/build/static_libs.patch",
"diff": "#\n# SPDX-License-Identifier: MPL-2.0\ndiff --git a/src/bin_client/dune b/src/bin_client/dune\n-index cd22cd7..dc732e2 100644\n+index 28822fb9f..27c6b81ca 100644\n--- a/src... | Python | MIT License | serokell/tezos-packaging | [#26] Bump tezos to v7.4 |
603,652 | 01.09.2020 11:44:18 | -10,800 | acad6cfac98681ed40b392a320bc9bde1658801d | Build arm binaries in CI
Problem: We want to have automated way for building static arm binaries.
Solution: Use dedicated buildkite-agent which is run on arm64 machine
for building statis arm binaries. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -37,6 +37,21 @@ steps:\n- nix run -f.. pkgs.upx -c upx tezos-*\nartifact_paths:\n- ./docker/tezos-*\n+ # arm builer is an ubuntu machine without nix\n+ - label: build arm via docker\n... | Python | MIT License | serokell/tezos-packaging | [#64] Build arm binaries in CI
Problem: We want to have automated way for building static arm binaries.
Solution: Use dedicated buildkite-agent which is run on arm64 machine
for building statis arm binaries. |
603,652 | 23.09.2020 14:40:51 | -10,800 | 1d58bab793e2cbd2da1ebf4b88dc05f29f75bc4c | Hotfix autoreleasing
Problem: Step name was changed, but autoreleasing step wasn't updated
accordingly.
Solution: Update autorelease step. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -82,7 +82,7 @@ steps:\ncommands:\n- mkdir binaries\n- mkdir arm-binaries\n- - buildkite-agent artifact download \"docker/*\" binaries --step \"build via docker\"\n+ - buildkite-agent ... | Python | MIT License | serokell/tezos-packaging | Hotfix autoreleasing
Problem: Step name was changed, but autoreleasing step wasn't updated
accordingly.
Solution: Update autorelease step. |
603,652 | 16.09.2020 13:50:44 | -10,800 | 421eecbeb58df6106da8b6374d96ca6363259186 | Mention `.service` file generation
Problem: One may want to have systemd service with tezos-binary on
another OS (not ubuntu).
Solution: Mention how to generate `.service` file in the README and
mention the place where startup scripts and default config files are
located. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -92,6 +92,24 @@ chmod +x tezos-client\nRun `./tezos-client` or add it to your PATH to be able to run it anywhere.\n+### Systemd units for `tezos-node` and daemons\n+\n+You can set up `tezos-node` and `baker/endo... | Python | MIT License | serokell/tezos-packaging | [#77] Mention `.service` file generation
Problem: One may want to have systemd service with tezos-binary on
another OS (not ubuntu).
Solution: Mention how to generate `.service` file in the README and
mention the place where startup scripts and default config files are
located. |
603,652 | 23.09.2020 15:11:55 | -10,800 | 25851b22a2f12c19d942d084a2126bcfc26646f8 | Add fedora package building to CI
Problem: We want to be sure that our packaging procedure is sane.
Solution: Build fedora source packages and one binary fedora package in
CI. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -64,7 +64,7 @@ steps:\n- label: test deb source packages via podman\ncommands:\n- eval \"$SET_VERSION\"\n- - ./docker/docker-ubuntu-packages.sh source\n+ - ./docker/docker-tezos-packa... | Python | MIT License | serokell/tezos-packaging | [#62] Add fedora package building to CI
Problem: We want to be sure that our packaging procedure is sane.
Solution: Build fedora source packages and one binary fedora package in
CI. |
603,652 | 23.09.2020 15:44:40 | -10,800 | 6ed74b7e6a2d99e30ee9f3962ac65fdec78e155f | Prune nix-based fedora packaging
Problem: Now we have nix-less way for creating fedora packages.
Nix-based way is redundant now.
Solution: Remove nix-based way for fedora packaging. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -15,17 +15,15 @@ steps:\ncommand: \"nix run -f https://github.com/serokell/crossref-verifier/archive/68a1f9d25b6e7835fea8299b18a3e6c61dbb2a5c.tar.gz -c crossref-verify\"\nsoft_fail: t... | Python | MIT License | serokell/tezos-packaging | [#62] Prune nix-based fedora packaging
Problem: Now we have nix-less way for creating fedora packages.
Nix-based way is redundant now.
Solution: Remove nix-based way for fedora packaging. |
603,652 | 23.09.2020 15:56:34 | -10,800 | f2f8894df97ad677047e72126cc400d60099f57f | Update READMEs
Problem: Now we have docker-based way for Fedora packaging.
Also, our Fedora packages now have systemd packages.
Solution: Update README about docker-based building.
Restructure root README in order to explain multiple ways
for running systemd units with tezos binaries. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -36,32 +36,6 @@ sudo apt-get install tezos-baker-006-pscartha\n```\nOnce you install such packages the commands `tezos-*` will be available.\n-### Systemd units for `tezos-node` and daemons\n-\n-`tezos-node`, `t... | Python | MIT License | serokell/tezos-packaging | [#62] Update READMEs
Problem: Now we have docker-based way for Fedora packaging.
Also, our Fedora packages now have systemd packages.
Solution: Update README about docker-based building.
Restructure root README in order to explain multiple ways
for running systemd units with tezos binaries. |
603,652 | 13.10.2020 11:50:19 | -10,800 | a63a65f19e554f930b802a9a20a05a30aa9fb6c7 | Fix version fetching in autoreleases
Problem: In tezos sources ref was changed, however, meta builder
wasn't updated, thus autoreleasing was broken.
Solution: Fix meta building. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -8,7 +8,7 @@ let\nsource = (import ./nix/nix/sources.nix).tezos;\nmeta = builtins.fromJSON (builtins.readFile ./meta.json);\ncommonMeta = {\n- version = builtins.replaceStrings [ \"v\" ] [ \"\" ] source.ref;... | Python | MIT License | serokell/tezos-packaging | Fix version fetching in autoreleases
Problem: In #92 tezos sources ref was changed, however, meta builder
wasn't updated, thus autoreleasing was broken.
Solution: Fix meta building. |
603,652 | 29.09.2020 10:37:03 | -10,800 | 66d964ee5901f8fd0128f3d5cb4047e7cec2d76a | Fix default sources in ocaml-overlay.nix
Problem: There is invalid default path in ocaml-overlay.nix.
However, we want to use this overlay in on of our projects.
Solution: Fix default path. | [
{
"change_type": "MODIFY",
"old_path": "nix/build/ocaml-overlay.nix",
"new_path": "nix/build/ocaml-overlay.nix",
"diff": "#\n# SPDX-License-Identifier: MPL-2.0\n-{ sources ? import ./nix/sources.nix\n+{ sources ? import ../nix/sources.nix\n, protocols ? builtins.fromJSON (builtins.readFile ../../pro... | Python | MIT License | serokell/tezos-packaging | Fix default sources in ocaml-overlay.nix
Problem: There is invalid default path in ocaml-overlay.nix.
However, we want to use this overlay in on of our projects.
Solution: Fix default path. |
603,652 | 15.10.2020 10:44:45 | -10,800 | 38ee94917d0ed4220ae8f048b0894799a7f28cf2 | Handle fedora and ubuntu epoches separately
Problem: We want to bump only ubuntu packages epoch.
Solution: No longer keep epoch common for both fedora and ubuntu
packages. Remove epch from meta.json and hardcode it in the python
script separately for ubuntu and fedora. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/package_generator.py",
"new_path": "docker/package/package_generator.py",
"diff": "@@ -56,7 +56,11 @@ active_protocols = json.load(open(\"../protocols.json\", \"r\"))[\"active\"]\nversion = os.environ[\"TEZOS_VERSION\"][1:]\nrelease = f\"{meta['... | Python | MIT License | serokell/tezos-packaging | [#95] Handle fedora and ubuntu epoches separately
Problem: We want to bump only ubuntu packages epoch.
Solution: No longer keep epoch common for both fedora and ubuntu
packages. Remove epch from meta.json and hardcode it in the python
script separately for ubuntu and fedora. |
603,652 | 15.10.2020 10:46:29 | -10,800 | 3c850d4b378a40506cc2657d5e85f1c7fbfeca9e | Change ubuntu versioning
Problem: Current ubuntu versioning scheme is incorrect and may
confuse users.
Solution: Use proper versioning scheme:
<package-name>_<upstream-version>-0ubuntu<release-number>. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/package_generator.py",
"new_path": "docker/package/package_generator.py",
"diff": "@@ -60,8 +60,6 @@ release = f\"{meta['release']}\"\nubuntu_epoch = 2\nfedora_epoch = 1\n-package_version = f\"{ubuntu_epoch}:0ubuntu{version}-{release}\"\n-\npwd ... | Python | MIT License | serokell/tezos-packaging | [#95] Change ubuntu versioning
Problem: Current ubuntu versioning scheme is incorrect and may
confuse users.
Solution: Use proper versioning scheme:
<package-name>_<upstream-version>-0ubuntu<release-number>. |
603,652 | 21.10.2020 12:39:43 | -10,800 | e234822f3969e29c65f9423abd33fb22d3179f1f | Add timeout for packages building
Problem: Sometimes packages building can stuck due to some
weird opam errors. Such behaviour can silently block CI.
Solution: Normally, each step should take more than 10-15 minutes, and
we double the timemout just in case. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -66,6 +66,7 @@ steps:\nartifact_paths:\n- ./out/*\nbranches: \"!master\"\n+ timeout_in_minutes: 30\n- label: test deb binary packages via podman\ncommands:\n- eval \"$SET_VERSION\"\n@... | Python | MIT License | serokell/tezos-packaging | Add timeout for packages building
Problem: Sometimes packages building can stuck due to some
weird opam errors. Such behaviour can silently block CI.
Solution: Normally, each step should take more than 10-15 minutes, and
we double the timemout just in case. |
603,652 | 06.10.2020 12:15:01 | -10,800 | 3462b9f278e37e4a96102bd42ff264671bf8a709 | Make node data dir configurable
Problem: Currently it's impossible to run multiple services with
tezos-nodes simultaneously, because node data dir is hardcoded in the
startup script.
Solution: Make data dir configurable in the config file and use this
data directory in a startup script. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/defaults/tezos-node.conf",
"new_path": "docker/package/defaults/tezos-node.conf",
"diff": "# SPDX-License-Identifier: MPL-2.0\n# shellcheck disable=SC2034\n+DATA_DIR=\"/var/lib/tezos/node\"\nNODE_RPC_PORT=\"8732\"\nNETWORK=\"carthagenet\"\nCERT_... | Python | MIT License | serokell/tezos-packaging | [#79] Make node data dir configurable
Problem: Currently it's impossible to run multiple services with
tezos-nodes simultaneously, because node data dir is hardcoded in the
startup script.
Solution: Make data dir configurable in the config file and use this
data directory in a startup script. |
603,652 | 06.10.2020 12:20:07 | -10,800 | 15f1c0370138ce2fdbde447e05c37d727c19802a | Make node data dir configurable for baker
Problem: Node data dir is also hardcoded in the baker startup script,
thus it's impossible to run baker on different nodes.
Solution: Make node data dir configurable there as well. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/scripts/tezos-baker-start",
"new_path": "docker/package/scripts/tezos-baker-start",
"diff": "@@ -10,7 +10,6 @@ set -euo pipefail\nbaker=\"/usr/bin/tezos-baker-$PROTOCOL\"\nbaker_dir=\"$DATA_DIR\"\n-node_data_dir=\"/var/lib/tezos/node/data\"\nbak... | Python | MIT License | serokell/tezos-packaging | [#79] Make node data dir configurable for baker
Problem: Node data dir is also hardcoded in the baker startup script,
thus it's impossible to run baker on different nodes.
Solution: Make node data dir configurable there as well. |
603,652 | 06.10.2020 12:44:02 | -10,800 | 458017a78ed3f11d108ce35b7817a3544ab931e1 | Update README
Describe how to adjust systemd related files to run multiple similar
services with tezos binaries. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -12,6 +12,13 @@ This repo provides various form of distribution for tezos-related executables\n(`tezos-client`, `tezos-client-admin`, `tezos-node`, `tezos-baker`,\n`tezos-accuser`, `tezos-endorser`, `tezos-signe... | Python | MIT License | serokell/tezos-packaging | [#79] Update README
Describe how to adjust systemd related files to run multiple similar
services with tezos binaries. |
603,652 | 23.10.2020 17:11:02 | -10,800 | ac72fa57440c5470038d36895869c6bbb4e429d3 | Bump nixpkgs
Problem: Current nixpkgs version is quite old and doesn't use our fork.
Solution: Use revision from our fork that uses most of our repos. | [
{
"change_type": "MODIFY",
"old_path": "nix/nix/sources.json",
"new_path": "nix/nix/sources.json",
"diff": "{\n\"nixpkgs\": {\n- \"branch\": \"nixos-unstable\",\n+ \"branch\": \"master\",\n\"description\": \"Pinned Nixpkgs tree (master follows nixos-unstable-small, only tags have stable history)\",\... | Python | MIT License | serokell/tezos-packaging | [#84] Bump nixpkgs
Problem: Current nixpkgs version is quite old and doesn't use our fork.
Solution: Use revision from our fork that uses most of our repos. |
603,652 | 23.10.2020 17:13:12 | -10,800 | da5a3e608cf7417ec0021d603fc8cc4bf602de83 | Adjust hacks.nix and static overlay. | [
{
"change_type": "MODIFY",
"old_path": "nix/build/hacks.nix",
"new_path": "nix/build/hacks.nix",
"diff": "# This file needs to become empty.\nself: super: oself: osuper:\n-with oself; {\n+with oself; rec {\n+ ocaml = self.ocaml-ng.ocamlPackages_4_09.ocaml.overrideAttrs (o: o // {\n+ hardeningDisable... | Python | MIT License | serokell/tezos-packaging | [#84] Adjust hacks.nix and static overlay. |
603,652 | 04.11.2020 14:55:58 | -10,800 | f766cc007d14b3d0361f58363ce115ab1c07cd2f | Switch to gh
Problem: There is an official CLI from github, now it can handle
releases.
Solution: Switch to it from hub tool. | [
{
"change_type": "MODIFY",
"old_path": "scripts/autorelease.sh",
"new_path": "scripts/autorelease.sh",
"diff": "@@ -27,19 +27,15 @@ shopt -s extglob\ncp -L \"$TEMPDIR\"/\"$project\"/!(*.md) \"$assets_dir\"\n# Delete release if it exists\n-hub release delete auto-release || true\n+gh release delete a... | Python | MIT License | serokell/tezos-packaging | [#97] Switch to gh
Problem: There is an official CLI from github, now it can handle
releases.
Solution: Switch to it from hub tool. |
603,652 | 18.11.2020 11:12:27 | -10,800 | ac4c097ee8ebf14e154bfb621ebe996f547fce1f | Switch back to docker
Problem: Podman turned out to be quite unreliable.
Solution: Switch back to docker, since we now have a dedicated agent
with access to the docker. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "env:\nSET_VERSION: \"export TEZOS_VERSION=\\\"$(cat nix/nix/sources.json | jq -r '.tezos.ref' | cut -d'/' -f3)\\\"\"\n- USE_PODMAN: \"True\"\nsteps:\n- label: reuse lint\n@@ -28,7 +27,7 ... | Python | MIT License | serokell/tezos-packaging | Switch back to docker
Problem: Podman turned out to be quite unreliable.
Solution: Switch back to docker, since we now have a dedicated agent
with access to the docker. |
603,652 | 18.11.2020 10:55:42 | -10,800 | 13dfdb8cf77f3bd4ecd13de96f4b8f430753a1aa | Deactivate 006 protocol
Problem: 007 protocol was activated on mainnet and carthagenet will die
soon, so it doesn't make much sense to maintain 006 protocol specific
binaries.
Solution: Move 006 from active to allowed in protocols.json. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -78,7 +78,7 @@ steps:\n- eval \"$SET_VERSION\"\n# Building all binary packages will take significant amount of time, so we build only one\n# in order to ensure package generation sani... | Python | MIT License | serokell/tezos-packaging | Deactivate 006 protocol
Problem: 007 protocol was activated on mainnet and carthagenet will die
soon, so it doesn't make much sense to maintain 006 protocol specific
binaries.
Solution: Move 006 from active to allowed in protocols.json. |
603,652 | 18.11.2020 14:32:59 | -10,800 | 0893145edaabfc161d6e74c092c2b6ed674469a4 | Fetch token from vault
Problem: Buildkite agent was moved to another server and the file with
token now isn't presented in the filesystem.
Solution: Don't rely on file and fetch token directly from vault. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -114,5 +114,5 @@ steps:\n- buildkite-agent artifact download \"docker/*\" binaries --step \"build via docker\"\n- buildkite-agent artifact download \"docker/*\" arm-binaries --step \"... | Python | MIT License | serokell/tezos-packaging | Fetch token from vault
Problem: Buildkite agent was moved to another server and the file with
token now isn't presented in the filesystem.
Solution: Don't rely on file and fetch token directly from vault. |
603,652 | 18.11.2020 16:05:32 | -10,800 | 33ff4bae7879ac32e97819aeda08c90fe6b9ef9b | Fix source version reference in the release notes
Problem: Release notes were pointing to an invalid reference.
Solution: Fix it by removin 'refs/tags/' part. | [
{
"change_type": "MODIFY",
"old_path": "default.nix",
"new_path": "default.nix",
"diff": "@@ -15,6 +15,6 @@ let\nlicenseFile = \"${source}/LICENSE\";\n} // meta;\nrelease = pkgs.callPackage ./release.nix\n- { binaries = docker-binaries; arm-binaries = docker-arm-binaries; inherit commonMeta; };\n+ {... | Python | MIT License | serokell/tezos-packaging | Fix source version reference in the release notes
Problem: Release notes were pointing to an invalid reference.
Solution: Fix it by removin 'refs/tags/' part. |
603,652 | 18.11.2020 16:06:25 | -10,800 | 71267dbea95fac5d4fee5f69a64bac2eb8b679f7 | Pin auto-release title | [
{
"change_type": "MODIFY",
"old_path": "release.nix",
"new_path": "release.nix",
"diff": "@@ -7,8 +7,6 @@ let\nrelease-binaries = import ./nix/build/release-binaries.nix;\nversion = replaceStrings [\"refs/tags/\"] [\"\"] commonMeta.branchName;\nrelease-notes = writeTextDir \"release-notes.md\" ''\n-... | Python | MIT License | serokell/tezos-packaging | Pin auto-release title |
603,652 | 12.11.2020 15:57:29 | -10,800 | 9747947ac142e5675c9ea228f1ee920aa3fbeb95 | Fix package build dependencies
Apparently, they were lost during some rebase:( | [
{
"change_type": "MODIFY",
"old_path": "docker/package/package_generator.py",
"new_path": "docker/package/package_generator.py",
"diff": "@@ -47,8 +47,9 @@ fedora_epoch = 1\npwd = os.getcwd()\nhome = os.environ[\"HOME\"]\n+\ndef gen_control_file(pkg: Package, out):\n- str_build_deps = \", \".join(bu... | Python | MIT License | serokell/tezos-packaging | Fix package build dependencies
Apparently, they were lost during some rebase:( |
603,652 | 12.11.2020 15:58:38 | -10,800 | 59a49a071773b36dcf5e222cef068a1e67170516 | Add systemd units for tezos-signer
Problem: tezos-signer can be run as a signing daemon in one of four
modes.
Solution: Add services for each signer daemon mode: over TCP socket,
over Unix socket, over HTTP, and over HTTPS. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "docker/package/defaults/tezos-signer.conf",
"diff": "+# vim: ft=sh\n+# SPDX-FileCopyrightText: 2020 TQ Tezos <https://tqtezos.com/>\n+#\n+# SPDX-License-Identifier: LicenseRef-MIT-TQ\n+\n+# shellcheck disable=SC2034\n+DATA_DIR=\"/var/lib/tezos/s... | Python | MIT License | serokell/tezos-packaging | [#100] Add systemd units for tezos-signer
Problem: tezos-signer can be run as a signing daemon in one of four
modes.
Solution: Add services for each signer daemon mode: over TCP socket,
over Unix socket, over HTTP, and over HTTPS. |
603,652 | 19.11.2020 12:05:17 | -10,800 | db74b738ed6199d62cce1fe952c835421ff45943 | Use dedicated default configs for services
Problem: There are four services for tezos-signer, which rely
on the same default config file, however, it's possible for them
to use different config at the same time.
Solution: Make it possible to have multiple default configs:
one per systemd unit in package. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/package_generator.py",
"new_path": "docker/package/package_generator.py",
"diff": "@@ -80,12 +80,11 @@ def gen_spec_file(pkg: Package, out):\nsystemd_units_post = \"\"\nsystemd_units_preun = \"\"\nsystemd_units_postun = \"\"\n- if len(config_fil... | Python | MIT License | serokell/tezos-packaging | [#100] Use dedicated default configs for services
Problem: There are four services for tezos-signer, which rely
on the same default config file, however, it's possible for them
to use different config at the same time.
Solution: Make it possible to have multiple default configs:
one per systemd unit in package. |
603,652 | 25.11.2020 16:48:39 | -10,800 | 66146d289f61cea7f77a19d7ea8849103f028376 | Strip tezos-sandbox from nix part
Problem: tezos-sandbox isn't an opam package, thus it's quite
nontrivial to build it using opam-nix.
Solution: Strip it from the nix part for now. | [
{
"change_type": "MODIFY",
"old_path": "nix/build/release-binaries.nix",
"new_path": "nix/build/release-binaries.nix",
"diff": "@@ -33,6 +33,11 @@ in [\ndescription = \"A client to decode and encode JSON\";\nsupports = protocolsFormatted;\n}\n+ {\n+ name = \"tezos-sandbox\";\n+ description = \"A too... | Python | MIT License | serokell/tezos-packaging | [#109] Strip tezos-sandbox from nix part
Problem: tezos-sandbox isn't an opam package, thus it's quite
nontrivial to build it using opam-nix.
Solution: Strip it from the nix part for now. |
603,652 | 19.11.2020 18:39:17 | -10,800 | e5cba63d1f83b6436ada21516186c223818d7073 | Add proper argument parser for package gen
Problem: We're going to add one more option for path to sources archive
and it will be a bit messy to have that much positional arguments
Solution: Add proper option parser using getopt. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -66,7 +66,7 @@ steps:\n- label: test deb source packages via docker\ncommands:\n- eval \"$SET_VERSION\"\n- - ./docker/docker-tezos-packages.sh ubuntu source\n+ - ./docker/docker-tezos... | Python | MIT License | serokell/tezos-packaging | [#118] Add proper argument parser for package gen
Problem: We're going to add one more option for path to sources archive
and it will be a bit messy to have that much positional arguments
Solution: Add proper option parser using getopt. |
603,652 | 20.11.2020 16:51:49 | -10,800 | c5daaabbe3bc6f4a760776092358670b6d535f3e | Allow using existing source archive
Problem: Launchpad requires the source archive to be the same for
the same package version.
Solution: Allow using existing source archive when building ubuntu
packages. | [
{
"change_type": "MODIFY",
"old_path": "docker/docker-tezos-packages.sh",
"new_path": "docker/docker-tezos-packages.sh",
"diff": "@@ -27,18 +27,31 @@ do\nfi\ncase $arg in\n--os )\n+ args+=(\"$arg\" \"$2\")\ntarget_os=\"$2\"\nshift 2\n;;\n+ --sources )\n+ source_archive=\"$2\"\n+ source_archive_name=... | Python | MIT License | serokell/tezos-packaging | [#118] Allow using existing source archive
Problem: Launchpad requires the source archive to be the same for
the same package version.
Solution: Allow using existing source archive when building ubuntu
packages. |
603,652 | 25.11.2020 11:20:01 | -10,800 | a687f50053292c4f0ce092c04a7d513686a1e350 | Calculate sha256sum for release assets
And include .sha256 files to the assets as well | [
{
"change_type": "MODIFY",
"old_path": "scripts/autorelease.sh",
"new_path": "scripts/autorelease.sh",
"diff": "@@ -22,6 +22,9 @@ assets_dir=$TEMPDIR/assets\nnix-build -A release -o \"$TEMPDIR\"/\"$project\" --arg timestamp \"$(date +\\\"%Y%m%d%H%M\\\")\" \\\n--arg docker-binaries ./binaries/docker ... | Python | MIT License | serokell/tezos-packaging | [#114] Calculate sha256sum for release assets
And include .sha256 files to the assets as well |
603,652 | 25.11.2020 12:24:52 | -10,800 | 09406b1834f6c107bf2311c836b7b6c5b2859e41 | Add note about Fedora packages signing
Problem: We're already signing Ubuntu packages because it's mandatory,
however, we're not signing Fedora packages.
Solution: Mention in README that one should sign source packages before
publishing them on Copr. | [
{
"change_type": "MODIFY",
"old_path": "docker/README.md",
"new_path": "docker/README.md",
"diff": "@@ -181,4 +181,10 @@ cd .. && ./docker/docker-tezos-packages.sh --os fedora --type source\ncd .. && ./docker/docker-tezos-packages.sh --os fedora --type source --package tezos-baker-007-PsDELPH1\n```\... | Python | MIT License | serokell/tezos-packaging | [#114] Add note about Fedora packages signing
Problem: We're already signing Ubuntu packages because it's mandatory,
however, we're not signing Fedora packages.
Solution: Mention in README that one should sign source packages before
publishing them on Copr. |
603,652 | 26.11.2020 20:09:22 | -10,800 | cba3faf54dae3d783780f5244a0d4f496225896a | Sign artifacts with PGP key
Problem: We want to provide some proof that our artifacts can be
trusted.
Solution: Sign them with PGP key and provide public key, so that
users can check that signature is valid. | [
{
"change_type": "MODIFY",
"old_path": "release.nix",
"new_path": "release.nix",
"diff": "@@ -12,6 +12,9 @@ let\nBinaries that target arm64 architecture has `-arm64` suffix in the name.\nOther binaries target x86_64.\n+ Release artifacts are signed with the following key: 0x7EAF9B150ACE940CF8C008A0B... | Python | MIT License | serokell/tezos-packaging | [#114] Sign artifacts with PGP key
Problem: We want to provide some proof that our artifacts can be
trusted.
Solution: Sign them with PGP key and provide public key, so that
users can check that signature is valid. |
603,652 | 04.12.2020 15:06:07 | -10,800 | 970ea78dddff0302c182beff3ddd3a587784be05 | Suspend native packaging
Problem: Our native packaging relies on tezos packages in opam
repository, which wasn't update to 7.5 yet. However, we should create
7.5 release at least with static binaries.
Solution: Susped native packaging in the CI for now. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -63,48 +63,49 @@ steps:\n- nix-build tests/tezos-binaries.nix --no-out-link --arg path-to-binaries ./docker\nbranches: \"!master\"\n- - label: test deb source packages via docker\n- c... | Python | MIT License | serokell/tezos-packaging | Suspend native packaging
Problem: Our native packaging relies on tezos packages in opam
repository, which wasn't update to 7.5 yet. However, we should create
7.5 release at least with static binaries.
Solution: Susped native packaging in the CI for now. |
603,652 | 09.11.2020 15:06:11 | -10,800 | 64bf6f4e092bc5440cd464c71c8c26acc3cc79be | Bump tezos and opam repository | [
{
"change_type": "MODIFY",
"old_path": "nix/nix/sources.json",
"new_path": "nix/nix/sources.json",
"diff": "\"homepage\": \"https://opam.ocaml.org\",\n\"owner\": \"ocaml\",\n\"repo\": \"opam-repository\",\n- \"rev\": \"d67e70b40203a6a1c77ccb2edbe136c1509a73a3\",\n- \"sha256\": \"1yphw9xcss284p51qnml... | Python | MIT License | serokell/tezos-packaging | Bump tezos and opam repository |
603,652 | 09.11.2020 15:16:04 | -10,800 | 0d78be8674ebf756d783fefe962281f9644d02a9 | Adjust static patch | [
{
"change_type": "MODIFY",
"old_path": "docker/build/static_libs.patch",
"new_path": "docker/build/static_libs.patch",
"diff": "@@ -155,16 +155,6 @@ index 074b4e006..cf801b59c 100644\n(alias\n(name runtest_lint)\n-diff --git a/vendors/index/src/unix/dune b/vendors/index/src/unix/dune\n-index 49e819d... | Python | MIT License | serokell/tezos-packaging | Adjust static patch |
603,652 | 10.11.2020 11:56:05 | -10,800 | 9e6c756b63abf89a64cab354265ffaada08e987d | Update dependencies in docker images | [
{
"change_type": "MODIFY",
"old_path": "docker/build/Dockerfile",
"new_path": "docker/build/Dockerfile",
"diff": "@@ -5,7 +5,7 @@ FROM alpine:3.11\nRUN apk update\nRUN apk --no-cache --virtual add rsync git m4 build-base patch unzip \\\nbubblewrap wget pkgconfig gmp-dev libev-dev hidapi-dev eudev-de... | Python | MIT License | serokell/tezos-packaging | Update dependencies in docker images |
603,652 | 10.11.2020 14:24:56 | -10,800 | b0c22c02c36a65ab875b5f9c55ab5a8befcd2cf2 | Use '--endpoint' in tests
Problem: '-A', '-P', '-S' options are now deprecated in favour of
'--endpoint'.
Solution: Use '--endpoint' in tests where needed. | [
{
"change_type": "MODIFY",
"old_path": "tests/test_script.py",
"new_path": "tests/test_script.py",
"diff": "@@ -37,22 +37,22 @@ def run_node(network, use_tls):\n+ network\n+ \" &\"\n)\n- tls_flag = \" -S \" if use_tls else \" \"\n+ tls_endpoint = \" --endpoint https://localhost:8732/ \" if use_tls e... | Python | MIT License | serokell/tezos-packaging | Use '--endpoint' in tests
Problem: '-A', '-P', '-S' options are now deprecated in favour of
'--endpoint'.
Solution: Use '--endpoint' in tests where needed. |
603,652 | 03.12.2020 14:05:19 | -10,800 | 86ee8ec704649880b777ac35b7ac6075fc1661cc | Update static_libs.patch | [
{
"change_type": "MODIFY",
"old_path": "docker/build/static_libs.patch",
"new_path": "docker/build/static_libs.patch",
"diff": "#\n# SPDX-License-Identifier: LicenseRef-MIT-TQ\ndiff --git a/src/bin_client/dune b/src/bin_client/dune\n-index 28822fb9f..27c6b81ca 100644\n+index 862096adb..3c2dec974 100... | Python | MIT License | serokell/tezos-packaging | Update static_libs.patch |
603,652 | 09.11.2020 15:06:34 | -10,800 | 2cac17a13e5cc51ea89437d3a082bb0aaeebff5d | Adjuct hacks.nix | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "nix/build/bls12-381-add-Cargo.lock.patch",
"diff": "+# SPDX-FileCopyrightText: 2020 TQ Tezos <https://tqtezos.com/>\n+#\n+# SPDX-License-Identifier: LicenseRef-MIT-TQ\n+diff --git a/Cargo.lock b/Cargo.lock\n+new file mode 100644\n+index 0000000.... | Python | MIT License | serokell/tezos-packaging | Adjuct hacks.nix |
603,652 | 07.12.2020 16:07:49 | -10,800 | 02b9f1f4089aaac69d4b3a5c2274e284a344741b | Bump opam-nix | [
{
"change_type": "MODIFY",
"old_path": "nix/nix/sources.json",
"new_path": "nix/nix/sources.json",
"diff": "\"homepage\": null,\n\"owner\": \"balsoft\",\n\"repo\": \"opam-nix\",\n- \"rev\": \"a7b8e16ab28c840eab2c3be2f5069524dc87fd58\",\n- \"sha256\": \"0ydbwbirz1ag1lprl2mxz3cvzqxn945yfnakhzm19q2qm78... | Python | MIT License | serokell/tezos-packaging | Bump opam-nix |
603,652 | 07.12.2020 16:08:00 | -10,800 | 081584b45c97a8fd2565d3140034ef852cc32add | Build dynamic binaries via nix
Problem: Rust doesn't work well with musl, see
Solution: Provide dynamically linked binaries instead. This should be
fine since we don't use them in the releases and they're mostly used in
our internal infrastructure. | [
{
"change_type": "MODIFY",
"old_path": "nix/README.md",
"new_path": "nix/README.md",
"diff": "# Building and packaging tezos using nix\n-## Statically built binaries\n+## Dynamically built binaries\nIn order to build all binaries run:\n```bash\n"
},
{
"change_type": "MODIFY",
"old_path":... | Python | MIT License | serokell/tezos-packaging | Build dynamic binaries via nix
Problem: Rust doesn't work well with musl, see
https://github.com/NixOS/nixpkgs/issues/71195.
Solution: Provide dynamically linked binaries instead. This should be
fine since we don't use them in the releases and they're mostly used in
our internal infrastructure. |
603,652 | 07.12.2020 16:17:11 | -10,800 | 6f41e11b2613711d8592fdd7d32eba21375468a8 | Fix tests
Now we have dynamic and static binaries, we should tests them in
different environment.
Also, nix binaries are now wrapped with a script that adds zcash to
`XGD_DATA_DIRS`, so we should test nix derivations directly instead of
downloading binaries from the previous job. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -17,14 +17,10 @@ steps:\n- label: build via nix\ncommands:\n- nix-build ./nix -A binaries -o binaries\n- artifact_paths:\n- - ./binaries/bin/*\nbranches: \"!master\"\n- label: test ni... | Python | MIT License | serokell/tezos-packaging | Fix tests
Now we have dynamic and static binaries, we should tests them in
different environment.
Also, nix binaries are now wrapped with a script that adds zcash to
`XGD_DATA_DIRS`, so we should test nix derivations directly instead of
downloading binaries from the previous job. |
603,652 | 22.12.2020 17:08:10 | -10,800 | 97cc99d36ec09bf92bb7e9d26f8e23aff959d6bc | Update dockerfiles
Problem: Now it's required to use specific rust compiler version
(1.44.0).
Solution: Use alpine 3.12, in which this rust version is default for
the rust package. | [
{
"change_type": "MODIFY",
"old_path": "docker/build/Dockerfile",
"new_path": "docker/build/Dockerfile",
"diff": "# SPDX-FileCopyrightText: 2020 TQ Tezos <https://tqtezos.com/>\n#\n# SPDX-License-Identifier: LicenseRef-MIT-TQ\n-FROM alpine:3.11\n+FROM alpine:3.12\nRUN apk update\nRUN apk --no-cache ... | Python | MIT License | serokell/tezos-packaging | Update dockerfiles
Problem: Now it's required to use specific rust compiler version
(1.44.0).
Solution: Use alpine 3.12, in which this rust version is default for
the rust package. |
603,652 | 11.01.2021 15:38:05 | -10,800 | a0de90f36458514e30102aa26347d01727e8cba9 | Prune sprout-groth-16-params
They seem to be unused by the tezos binaries and only sapling related
params are actually used. | [
{
"change_type": "MODIFY",
"old_path": "nix/build/zcash.nix",
"new_path": "nix/build/zcash.nix",
"diff": "@@ -15,10 +15,6 @@ let\nurl = \"https://download.z.cash/downloads/sapling-output.params\";\nsha256 = \"1r5h7wzhwmw8vcww74b1vr6ynacwm3myg5x3jpzcy2xvp75vn3ig\";\n};\n- sprout-groth-16-params = fet... | Python | MIT License | serokell/tezos-packaging | Prune sprout-groth-16-params
They seem to be unused by the tezos binaries and only sapling related
params are actually used. |
603,652 | 11.01.2021 16:25:10 | -10,800 | e7998df7024d3de27a8f5ef41551fb57e829236b | Add formulas for tezos binaries.
Problem: We want to provide a way to obtain Tezos binaries on macOS.
Solution: The most convenient way is to use 'brew'. Create formulas for
all Tezos binaires (dedicated formula for each binary) | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"diff": "+# SPDX-FileCopyrightText: 2021 TQ Tezos <https://tqtezos.com/>\n+#\n+# SPDX-License-Identifier: LicenseRef-MIT-TQ\n+\n+require File.join(File.dirname(__FILE__), \"tezos\")\n+\n+class TezosAccuser... | Python | MIT License | serokell/tezos-packaging | [#103] Add formulas for tezos binaries.
Problem: We want to provide a way to obtain Tezos binaries on macOS.
Solution: The most convenient way is to use 'brew'. Create formulas for
all Tezos binaires (dedicated formula for each binary) |
603,652 | 21.01.2021 13:34:30 | -10,800 | 45fb4d67692bc57db69e087c8ab2afcedc53aa5e | Add Mojave bottles | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"new_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"diff": "@@ -8,6 +8,12 @@ class TezosAccuser007Psdelph1 < Tezos\ninit\ndesc \"Daemon for accusing\"\n+ bottle do\n+ root_url \"https://github.com/serokell/tezos-packag... | Python | MIT License | serokell/tezos-packaging | [#103] Add Mojave bottles |
603,652 | 21.01.2021 15:38:04 | -10,800 | a411efc2a4b19f791fcdf3a8559350746b6c1c88 | Add Catalina bottles | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"new_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"diff": "@@ -9,9 +9,10 @@ class TezosAccuser007Psdelph1 < Tezos\ndesc \"Daemon for accusing\"\nbottle do\n- root_url \"https://github.com/serokell/tezos-packaging/rele... | Python | MIT License | serokell/tezos-packaging | [#103] Add Catalina bottles |
603,652 | 21.01.2021 18:24:41 | -10,800 | c1ec0261d389cd9e3da3a3580cdcb71472ebbedb | Add ToC to the main README
Problem: Main README is already quite big and it's hard to navigate
through it.
Solution: Add table of contents to the beginning of the README. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -26,6 +26,17 @@ Other binaries can be used with all protocols if they're new enough. E.g.\n007 protocol is supported only from `v7.4`. `tezos-node` can be set up to run\ndifferent networks, you can read more abo... | Python | MIT License | serokell/tezos-packaging | Add ToC to the main README
Problem: Main README is already quite big and it's hard to navigate
through it.
Solution: Add table of contents to the beginning of the README. |
603,652 | 20.01.2021 16:18:50 | -10,800 | 08a21e36085f051d6bd7ddd7f4781f0c29fb4886 | Update dependencies
It's time to resurrect native packaging because opam repository was
finally updated. Luckily, existing packaging approach works nearly out
of the box, only the dependency set should be updated a bit. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/Dockerfile-fedora",
"new_path": "docker/package/Dockerfile-fedora",
"diff": "FROM fedora:32\nRUN dnf update -y\n-RUN dnf install -y libev-devel gmp-devel hidapi-devel m4 perl pkg-config \\\n- rpmdevtools python3 wget opam rsync\n+RUN dnf install... | Python | MIT License | serokell/tezos-packaging | Update dependencies
It's time to resurrect native packaging because opam repository was
finally updated. Luckily, existing packaging approach works nearly out
of the box, only the dependency set should be updated a bit. |
603,652 | 20.01.2021 16:20:24 | -10,800 | 377ab4911ac792aee82531b761d37ad6e7f6687e | Uncomment native packaging related CI stages | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -69,49 +69,48 @@ steps:\n- nix-build tests/tezos-binaries.nix --no-out-link --arg path-to-binaries ./docker\nbranches: \"!master\"\n- # Native packaging is suspended for now, because ... | Python | MIT License | serokell/tezos-packaging | Uncomment native packaging related CI stages |
603,652 | 22.01.2021 14:44:56 | -10,800 | 8587608be815125cbea45ba09dbd7914d7a4302b | Update systemd service
1) Use combined --endpoint option
2) Make endorser alias configurable
3) Make node data dir for baker configurable | [
{
"change_type": "MODIFY",
"old_path": "docker/package/defaults/tezos-accuser.conf",
"new_path": "docker/package/defaults/tezos-accuser.conf",
"diff": "# SPDX-License-Identifier: LicenseRef-MIT-TQ\n# shellcheck disable=SC2034\n-NODE_HOST=\"localhost\"\n-NODE_RPC_PORT=\"8732\"\n+NODE_RPC_ENDPOINT=\"h... | Python | MIT License | serokell/tezos-packaging | Update systemd service
1) Use combined --endpoint option
2) Make endorser alias configurable
3) Make node data dir for baker configurable |
603,652 | 11.02.2021 14:28:53 | -10,800 | c772b9397d9d460b26d8b470a0f0dc05774bf8dc | Bump Tezos version | [
{
"change_type": "MODIFY",
"old_path": "FormulaAbstract/tezos.rb",
"new_path": "FormulaAbstract/tezos.rb",
"diff": "@@ -13,9 +13,9 @@ class Tezos < Formula\nend\nhomepage \"https://gitlab.com/tezos/tezos\"\n- url \"https://gitlab.com/tezos/tezos.git\", :tag => \"v8.1\", :shallow => false\n+ url \"ht... | Python | MIT License | serokell/tezos-packaging | Bump Tezos version |
603,652 | 11.02.2021 14:31:26 | -10,800 | 3ccfda6d36f6a854b4d5c4a8a5450bca38e6fdaf | Update 008 protocol name
Problem: PtEdoTez was deprecated due to a bug in ticket implementation.
Solution: Allow it for backward compatibility and activate new version
of edo protocol called '008-PtEdo2Zk'. | [
{
"change_type": "RENAME",
"old_path": "Formula/tezos-accuser-008-PtEdoTez.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "require File.join(File.dirname(__FILE__), \"..\", \"FormulaAbstract\", \"tezos\")\n-class TezosAccuser008Ptedotez < Tezos\n+class TezosAccuser008Ptedo2zk < Te... | Python | MIT License | serokell/tezos-packaging | Update 008 protocol name
Problem: PtEdoTez was deprecated due to a bug in ticket implementation.
Solution: Allow it for backward compatibility and activate new version
of edo protocol called '008-PtEdo2Zk'. |
603,652 | 11.02.2021 14:38:40 | -10,800 | 16d4569f3691804e725e52e0768f2ed749db6245 | Bundle all protocols with native tezos-node
Problem: Native tezos-node doesn't have embedded old protocols. Thus,
it's harder to bootstrap mainnet node from scratch.
Solution: Bundle all old 'tezos-embedded-protocol-*' | [
{
"change_type": "MODIFY",
"old_path": "docker/package/packages.py",
"new_path": "docker/package/packages.py",
"diff": "@@ -84,7 +84,15 @@ for network in networks:\nstartup_script=\"tezos-node-start\"))\npackages.append(Package(\"tezos-node\",\n\"Entry point for initializing, configuring and running... | Python | MIT License | serokell/tezos-packaging | Bundle all protocols with native tezos-node
Problem: Native tezos-node doesn't have embedded old protocols. Thus,
it's harder to bootstrap mainnet node from scratch.
Solution: Bundle all old 'tezos-embedded-protocol-*' |
603,652 | 11.02.2021 14:59:18 | -10,800 | ba0b6cd99ef9440c0a44ce8501746f411c2c8e41 | Remove outdated brew bottles
Problem: New version of Tezos arrived. However, brew formulas still
point to old bottles.
Solution: Remove all bottles for now, they'll be added to a
corresponding github release later. Once the bottles are uploaded,
formulas will be updated as well. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"new_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"diff": "@@ -11,8 +11,6 @@ class TezosAccuser007Psdelph1 < Tezos\nbottle do\nroot_url \"https://github.com/serokell/tezos-packaging/releases/download/#{TezosAccuser007... | Python | MIT License | serokell/tezos-packaging | Remove outdated brew bottles
Problem: New version of Tezos arrived. However, brew formulas still
point to old bottles.
Solution: Remove all bottles for now, they'll be added to a
corresponding github release later. Once the bottles are uploaded,
formulas will be updated as well. |
603,652 | 11.02.2021 19:08:57 | -10,800 | d26acea916ee12d2d155998fcc4f3f5cd5929588 | Suspend native packaging for now
Problem: We need to release static binaries ASAP.
Solution: Don't wait for opam-repository PR to be merged and disable
native packaging checks in CI for now. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -69,50 +69,51 @@ steps:\n- nix-build tests/tezos-binaries.nix --no-out-link --arg path-to-binaries ./docker\nbranches: \"!master\"\n- - label: test deb source packages via docker\n- c... | Python | MIT License | serokell/tezos-packaging | Suspend native packaging for now
Problem: We need to release static binaries ASAP.
Solution: Don't wait for opam-repository PR to be merged and disable
native packaging checks in CI for now. |
603,652 | 12.02.2021 10:52:38 | -10,800 | 8094ce4aad6a33995038599350cad34a90660296 | Add catalina bottles hashes
Problem: MacOS users don't want to build Tezos from scratch.
Solution: Provide bottles with Tezos binaries for MacOS Catalina. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"new_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"diff": "@@ -11,6 +11,7 @@ class TezosAccuser007Psdelph1 < Tezos\nbottle do\nroot_url \"https://github.com/serokell/tezos-packaging/releases/download/#{TezosAccuser007... | Python | MIT License | serokell/tezos-packaging | Add catalina bottles hashes
Problem: MacOS users don't want to build Tezos from scratch.
Solution: Provide bottles with Tezos binaries for MacOS Catalina. |
603,652 | 12.02.2021 11:01:43 | -10,800 | d192e5c1cb14f089a2e11dfca6b6459555286e9b | Resurrect v8.2 native packaging
Problem: PR to opam-repository was merged. CI now should be capable of
checking native packaging.
Solution: Uncomment CI steps related to native packaging. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -69,51 +69,50 @@ steps:\n- nix-build tests/tezos-binaries.nix --no-out-link --arg path-to-binaries ./docker\nbranches: \"!master\"\n- # TODO: Uncomment once https://github.com/ocaml/o... | Python | MIT License | serokell/tezos-packaging | Resurrect v8.2 native packaging
Problem: PR to opam-repository was merged. CI now should be capable of
checking native packaging.
Solution: Uncomment CI steps related to native packaging. |
603,652 | 12.02.2021 17:52:34 | -10,800 | 059f57bf1dcb462640bed60796bca1264319d3c2 | Add mojave bottles hashes
Problem: MacOS users don't want to build Tezos from scratch.
Solution: Provide bottles with Tezos binaries for MacOS Mojave. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"new_path": "Formula/tezos-accuser-007-PsDELPH1.rb",
"diff": "@@ -12,6 +12,7 @@ class TezosAccuser007Psdelph1 < Tezos\nroot_url \"https://github.com/serokell/tezos-packaging/releases/download/#{TezosAccuser007Psdelph1.ve... | Python | MIT License | serokell/tezos-packaging | Add mojave bottles hashes
Problem: MacOS users don't want to build Tezos from scratch.
Solution: Provide bottles with Tezos binaries for MacOS Mojave. |
603,666 | 11.11.2020 05:55:05 | 28,800 | 9eefc36263f2d6762f0565fbae2b85438d5d81a3 | Support custom networks within the node service
Problem: We want to run node in some custom network. A custom network
can be defined via a custom node config file.
Solution: Using a variable CUSTOM_NODE_CONFIG, you can specify the path
to the node configuration file. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/packages.py",
"new_path": "docker/package/packages.py",
"diff": "@@ -69,19 +69,27 @@ packages = [\n\"A client to decode and encode JSON\")\n]\n-node_units = []\n-for network in networks:\n- env = [f\"DATA_DIR=/var/lib/tezos/node-{network}\", f\"... | Python | MIT License | serokell/tezos-packaging | [#99] Support custom networks within the node service
Problem: We want to run node in some custom network. A custom network
can be defined via a custom node config file.
Solution: Using a variable CUSTOM_NODE_CONFIG, you can specify the path
to the node configuration file. |
603,652 | 16.02.2021 14:44:26 | -10,800 | e40e6e79cb0ab0eed2e235c1138cbfb80926f4fd | Use new package as a dependency
Problem: Sapling params are requied for `tezos-client`, `tezos-node`,
and `tezos-baker-008` usage.
Solution: Use `tezos-sapling-params` as a dependency for the
aformentioned packages. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/model.py",
"new_path": "docker/package/model.py",
"diff": "@@ -74,12 +74,14 @@ fedora_epoch = 1\nclass OpamBasedPackage(AbstractPackage):\ndef __init__(self, name: str, desc: str, systemd_units: List[SystemdUnit]=[],\n- target_proto: str=None, o... | Python | MIT License | serokell/tezos-packaging | [#132] Use new package as a dependency
Problem: Sapling params are requied for `tezos-client`, `tezos-node`,
and `tezos-baker-008` usage.
Solution: Use `tezos-sapling-params` as a dependency for the
aformentioned packages. |
603,652 | 17.02.2021 11:31:59 | -10,800 | 8fad125271800b984991daff12582e4530a29ea6 | Add postinstallation scripts
Problem: We want users and default data directories to be created
automatically along with the package installation.
Solution: Add scripts that do that in the package postinstallation
stage. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/model.py",
"new_path": "docker/package/model.py",
"diff": "@@ -64,6 +64,10 @@ class AbstractPackage:\ndef gen_install(self, out):\npass\n+ @abstractmethod\n+ def gen_postinst(self, out):\n+ pass\n+\nmeta = json.load(open(f\"{os.path.dirname(__fi... | Python | MIT License | serokell/tezos-packaging | [#133] Add postinstallation scripts
Problem: We want users and default data directories to be created
automatically along with the package installation.
Solution: Add scripts that do that in the package postinstallation
stage. |
603,652 | 19.02.2021 10:09:18 | -10,800 | 3015133aa0b69ef330fcf4f55f8d009106b6ba44 | Increase OPAMSOLVERTIMEOUT
Problem: opam solver tends to fail with timeout when resolving the
package set for tezos-node opam package.
Solution: Increase timeout once again. | [
{
"change_type": "MODIFY",
"old_path": "docker/docker-tezos-packages.sh",
"new_path": "docker/docker-tezos-packages.sh",
"diff": "@@ -47,10 +47,10 @@ done\n\"$virtualisation_engine\" build -t tezos-\"$target_os\" -f docker/package/Dockerfile-\"$target_os\" .\nset +e\nif [[ -z ${source_archive-} ]]; ... | Python | MIT License | serokell/tezos-packaging | Increase OPAMSOLVERTIMEOUT
Problem: opam solver tends to fail with timeout when resolving the
package set for tezos-node opam package.
Solution: Increase timeout once again. |
603,652 | 17.02.2021 18:00:11 | -10,800 | 458f3eb4e0563b2877e0068f6aeb59f1b49b4521 | Add edo2net node service
Problem: v8.2 tezos-node doesn't have predefined network for edo2net,
which makes it really inconvenient to run a node that uses this new
testnet.
Solution: Add a tezos-node-edo2net service, which uses edo2net config
created during the package installation. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/packages.py",
"new_path": "docker/package/packages.py",
"diff": "@@ -85,19 +85,53 @@ def mk_node_unit(suffix, env, desc):\nreturn SystemdUnit(suffix=suffix, service_file=service_file, startup_script=\"tezos-node-start\")\n+# v8.2 tezos-node does... | Python | MIT License | serokell/tezos-packaging | [#144] Add edo2net node service
Problem: v8.2 tezos-node doesn't have predefined network for edo2net,
which makes it really inconvenient to run a node that uses this new
testnet.
Solution: Add a tezos-node-edo2net service, which uses edo2net config
created during the package installation. |
603,652 | 19.02.2021 10:58:46 | -10,800 | 260737394f4ad270909d0caa2ebebfe85ca2833f | Drop obsolete testnets
Problem: delphinet and edonet are now obsolete.
Solution: Remove their support from the tezos-node package. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/packages.py",
"new_path": "docker/package/packages.py",
"diff": "@@ -5,7 +5,7 @@ import os, shutil, sys, subprocess, json\nfrom .model import Service, ServiceFile, SystemdUnit, Unit, OpamBasedPackage, TezosSaplingParamsPackage\n-networks = [\"ma... | Python | MIT License | serokell/tezos-packaging | Drop obsolete testnets
Problem: delphinet and edonet are now obsolete.
Solution: Remove their support from the tezos-node package. |
603,652 | 19.02.2021 10:59:46 | -10,800 | 587faa7230a0b63ca34cee6d761ba9a9b3bdfead | Deactivate 007 protocol
Problem: 008 was activated on mainnet and it doesn't make much sense to
support 007 anymore.
Solution: Drop 007 protocol support from the tezos-packaging. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -84,7 +84,7 @@ steps:\n- eval \"$SET_VERSION\"\n# Building all binary packages will take significant amount of time, so we build only one\n# in order to ensure package generation sani... | Python | MIT License | serokell/tezos-packaging | Deactivate 007 protocol
Problem: 008 was activated on mainnet and it doesn't make much sense to
support 007 anymore.
Solution: Drop 007 protocol support from the tezos-packaging. |
603,652 | 19.02.2021 16:38:11 | -10,800 | 93f5d0ac106ed13c2cb6ace552ca93cbb99ecf91 | Add node config init to postinstall
Problem: Node snapshot import by default assumes that the node directory
targets mainnet, thus it's not possible to import testnet snapshot to
the empty node data directory.
Solution: Add `tezos-node config init` calls for all non-custom network
services to the postinstallation stage. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/packages.py",
"new_path": "docker/package/packages.py",
"diff": "@@ -112,7 +112,10 @@ common_node_env = [\"NODE_RPC_ADDR=127.0.0.1:8732\", \"CERT_PATH=\", \"KEY_PATH=\"]\nfor network in networks:\nenv = [f\"DATA_DIR=/var/lib/tezos/node-{network}... | Python | MIT License | serokell/tezos-packaging | [#133] Add node config init to postinstall
Problem: Node snapshot import by default assumes that the node directory
targets mainnet, thus it's not possible to import testnet snapshot to
the empty node data directory.
Solution: Add `tezos-node config init` calls for all non-custom network
services to the postinstallation stage. |
603,652 | 19.02.2021 16:43:27 | -10,800 | f028fe97cbdbb430593a3c7a9a9ef33582380f42 | Prepare new release
Problem: We added some additional functionality to the node and daemons
systemd services. Also, we've dropped delphi support.
Solution: Bump release number to provide the update to the users.
Remove bottles brew hashes for now, they'll be updated later after the
release. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "@@ -11,8 +11,6 @@ class TezosAccuser008Ptedo2zk < Tezos\nbottle do\nroot_url \"https://github.com/serokell/tezos-packaging/releases/download/#{TezosAccuser008... | Python | MIT License | serokell/tezos-packaging | Prepare new release
Problem: We added some additional functionality to the node and daemons
systemd services. Also, we've dropped delphi support.
Solution: Bump release number to provide the update to the users.
Remove bottles brew hashes for now, they'll be updated later after the
release. |
603,652 | 22.02.2021 13:13:34 | -10,800 | 04b74ef50f613cca47c2b8150c353f9aa9645ce4 | Add mojave bottles hashes
Problem: We created a new v8.2-2 release.
Solution: Provide mojave bottles hashes. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "@@ -11,6 +11,7 @@ class TezosAccuser008Ptedo2zk < Tezos\nbottle do\nroot_url \"https://github.com/serokell/tezos-packaging/releases/download/#{TezosAccuser008... | Python | MIT License | serokell/tezos-packaging | Add mojave bottles hashes
Problem: We created a new v8.2-2 release.
Solution: Provide mojave bottles hashes. |
603,652 | 23.02.2021 14:08:05 | -10,800 | 065ed6c6679e447264ebdb7eb872404ff8ce2860 | Add cataline bottles hashes
Problem: We created a new v8.2-2 release.
Solution: Provide catalina bottles hashes. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "@@ -12,6 +12,7 @@ class TezosAccuser008Ptedo2zk < Tezos\nroot_url \"https://github.com/serokell/tezos-packaging/releases/download/#{TezosAccuser008Ptedo2zk.ve... | Python | MIT License | serokell/tezos-packaging | Add cataline bottles hashes
Problem: We created a new v8.2-2 release.
Solution: Provide catalina bottles hashes. |
603,652 | 23.02.2021 18:05:03 | -10,800 | 26f1b0095267130e9b131df034dc89ca7857b881 | Grant tezos user permissions to data dirs
Problem: Data directories created during the post-installation belong to
the root, thus tezos user doesn't have write access to them.
Solution: chown default data directories during postinst. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/packages.py",
"new_path": "docker/package/packages.py",
"diff": "@@ -132,7 +132,7 @@ rm -f /var/lib/tezos/node-edo2net/config.json\ncat > /var/lib/tezos/node-edo2net/config.json <<- EOM\n{edo2net_config}\nEOM\n-chown tezos:tezos /var/lib/tezos/n... | Python | MIT License | serokell/tezos-packaging | [#133] Grant tezos user permissions to data dirs
Problem: Data directories created during the post-installation belong to
the root, thus tezos user doesn't have write access to them.
Solution: chown default data directories during postinst. |
603,652 | 01.03.2021 11:45:09 | -10,800 | 7c320a898e400e60a77ce3f1897ad055ba56424f | Increase OPAMSOLVERTIMEOUT once again | [
{
"change_type": "MODIFY",
"old_path": "docker/docker-tezos-packages.sh",
"new_path": "docker/docker-tezos-packages.sh",
"diff": "@@ -47,10 +47,10 @@ done\n\"$virtualisation_engine\" build -t tezos-\"$target_os\" -f docker/package/Dockerfile-\"$target_os\" .\nset +e\nif [[ -z ${source_archive-} ]]; ... | Python | MIT License | serokell/tezos-packaging | Increase OPAMSOLVERTIMEOUT once again |
603,652 | 25.02.2021 17:04:14 | -10,800 | f09966b95e8bf8bb88722bd0c5fc6c4b97501162 | Add formula with sapling-params
Problem: sapling-params is a runtime dependency for some of the Tezos
binaries. It's inconvinient to download them manually.
Solution: Add formula that downloads them and use it as a dependency in
other formulas. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-baker-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-baker-008-PtEdo2Zk.rb",
"diff": "@@ -6,6 +6,7 @@ require File.join(File.dirname(__FILE__), \"..\", \"FormulaAbstract\", \"tezos\")\nclass TezosBaker008Ptedo2zk < Tezos\ninit\n+ depends_on \"tezos... | Python | MIT License | serokell/tezos-packaging | [#130] Add formula with sapling-params
Problem: sapling-params is a runtime dependency for some of the Tezos
binaries. It's inconvinient to download them manually.
Solution: Add formula that downloads them and use it as a dependency in
other formulas. |
603,652 | 25.02.2021 17:18:57 | -10,800 | 1fe1d20173b8d5050b05524cbf367f60e0dc62d3 | Add Tezos daemons services
Problem: It's convenient to run Tezos daemons in the background.
Solution: Provide launchd services for them. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "@@ -49,9 +49,67 @@ class TezosAccuser008Ptedo2zk < Formula\nend\ndef install\n+ startup_contents =\n+ <<~EOS\n+ #!/usr/bin/env bash\n+\n+ set -euo pipefail\n+... | Python | MIT License | serokell/tezos-packaging | [#130] Add Tezos daemons services
Problem: It's convenient to run Tezos daemons in the background.
Solution: Provide launchd services for them. |
603,652 | 25.02.2021 17:20:15 | -10,800 | 221cb961a96a1bda0c4f22073f3bff3854467a79 | Provide background service for tezos-node
Problem: One formula can provide only one service. However, tezos-node
is supposed to provide multiple services: at least one for each network.
Solution: Add formulas for tezos-node-<network> services that depend on
the tezos-node formula. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "Formula/tezos-node-edo2net.rb",
"diff": "+# SPDX-FileCopyrightText: 2021 TQ Tezos <https://tqtezos.com/>\n+#\n+# SPDX-License-Identifier: LicenseRef-MIT-TQ\n+\n+class TezosNodeEdo2net < Formula\n+ url \"file:///dev/null\"\n+ version \"v8.2-3\"\n... | Python | MIT License | serokell/tezos-packaging | [#130] Provide background service for tezos-node
Problem: One formula can provide only one service. However, tezos-node
is supposed to provide multiple services: at least one for each network.
Solution: Add formulas for tezos-node-<network> services that depend on
the tezos-node formula. |
603,652 | 25.02.2021 17:29:05 | -10,800 | 5bb347e34a4c0b5950ce7e9d55aecb2895b51937 | Remove bottles hashes
Problem: We'll make new release with formulas that include services.
Solution: Remove v8.2-2 bottles hashes. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "@@ -28,8 +28,6 @@ class TezosAccuser008Ptedo2zk < Formula\nbottle do\nroot_url \"https://github.com/serokell/tezos-packaging/releases/download/#{TezosAccuser0... | Python | MIT License | serokell/tezos-packaging | [#130] Remove bottles hashes
Problem: We'll make new release with formulas that include services.
Solution: Remove v8.2-2 bottles hashes. |
603,652 | 26.02.2021 14:56:54 | -10,800 | f723115f796ff5966820c4e14ed7b2180fd28eec | Add signer background services
Problem: One formula can provide only one service. However, tezos-signer
is supposed to provide multiple services using different ways to
communicate with the caller: http, https, tcp and unix socket.
Solution: Add formulas for tezos-signer-* services that depend on
the tezos-signer formula. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "Formula/tezos-signer-http.rb",
"diff": "+# SPDX-FileCopyrightText: 2021 TQ Tezos <https://tqtezos.com/>\n+#\n+# SPDX-License-Identifier: LicenseRef-MIT-TQ\n+\n+class TezosSignerHttp < Formula\n+ url \"file:///dev/null\"\n+ version \"v8.2-3\"\n+\... | Python | MIT License | serokell/tezos-packaging | [#130] Add signer background services
Problem: One formula can provide only one service. However, tezos-signer
is supposed to provide multiple services using different ways to
communicate with the caller: http, https, tcp and unix socket.
Solution: Add formulas for tezos-signer-* services that depend on
the tezos-signer formula. |
603,652 | 26.02.2021 15:13:21 | -10,800 | 8708f2d8f2ff0e9d8e98479a5738e04dc9d2a228 | Update README
Problem: Now we provide backround brew services for macOS. Users should
know how to use them.
Solution: Add section about brew services to the README. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -118,7 +118,7 @@ dependencies are compiled from scratch. Once the bottles are built, the correspo\nformulas should be updated. Also, bottles should be uploaded to the release artifacts.\n<a name=\"systemd\"></a>... | Python | MIT License | serokell/tezos-packaging | [#130] Update README
Problem: Now we provide backround brew services for macOS. Users should
know how to use them.
Solution: Add section about brew services to the README. |
603,652 | 01.03.2021 15:58:58 | -10,800 | 0d1be7b587cacb40b36b28fbe25d494d125f3346 | Rework formula validation
Problem: Now some formulas depend on the others and approach with
running `brew info` doesn't work anymore.
Solution: Check that formulas at least have valid ruby code instead. | [
{
"change_type": "MODIFY",
"old_path": ".buildkite/pipeline.yml",
"new_path": ".buildkite/pipeline.yml",
"diff": "@@ -52,7 +52,7 @@ steps:\n- label: check brew formulas\ncommands:\n# Check all formulas except 'tezos.rb' because it's a base class for all other formulas\n- - find ./Formula -type f ! -... | Python | MIT License | serokell/tezos-packaging | [#130] Rework formula validation
Problem: Now some formulas depend on the others and approach with
running `brew info` doesn't work anymore.
Solution: Check that formulas at least have valid ruby code instead. |
603,652 | 02.03.2021 10:22:51 | -10,800 | 4115ebdc924bdf0ba84ad06462e466ebf9da3e29 | Change default data dirs
Problem: brew is incapable of creating and updating directories that are
not in the `HOMEBREW_PREFIX` during install and post-install.
Solution: Move data directories to `/usr/local/var/lib/tezos`. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "@@ -97,7 +97,7 @@ class TezosAccuser008Ptedo2zk < Formula\n<key>EnvironmentVariables</key>\n<dict>\n<key>DATA_DIR</key>\n- <string>#{ENV[\"HOME\"]}/tezos/clie... | Python | MIT License | serokell/tezos-packaging | [#130] Change default data dirs
Problem: brew is incapable of creating and updating directories that are
not in the `HOMEBREW_PREFIX` during install and post-install.
Solution: Move data directories to `/usr/local/var/lib/tezos`. |
603,652 | 02.03.2021 10:30:37 | -10,800 | 20642286b350ab61b660b4f37f6ac57055582c43 | Add formulas post-installs
Problem: We want to create default data directories and init node
configs during the postinstall stage.
Solution: Add corresponding post_install to the formulas that provide
brew services. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "@@ -110,4 +110,7 @@ class TezosAccuser008Ptedo2zk < Formula\n</plist>\nEOS\nend\n+ def post_install\n+ mkdir \"#{var}/lib/tezos/client\"\n+ end\nend\n"
},
... | Python | MIT License | serokell/tezos-packaging | [#130] Add formulas post-installs
Problem: We want to create default data directories and init node
configs during the postinstall stage.
Solution: Add corresponding post_install to the formulas that provide
brew services. |
603,652 | 03.03.2021 11:40:09 | -10,800 | a507300a992070611169e86653e5852f678beec8 | Update README
Problem: Currently it's quite hard to find the article.
Though, we have a plan to publish link to this article somewhere.
Solution: Add one more section to the main README that links to the
article. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -35,6 +35,7 @@ different networks, you can read more about this in [this article](https://tezos\n* [Brew tap for macOS](#macos)\n* [Systemd services for Tezos binaries](#systemd)\n* [Building instructions](#buil... | Python | MIT License | serokell/tezos-packaging | [#125] Update README
Problem: Currently it's quite hard to find the article.
Though, we have a plan to publish link to this article somewhere.
Solution: Add one more section to the main README that links to the
article. |
603,652 | 11.03.2021 19:42:42 | -10,800 | 2ba6bc6f350527500cbe78ff02ce45e04c1c379a | Update bottles hashes
Problem: New release was created, brew formulas now have
tezos-sapling-params dependency and also provide background services.
We should provide an easy way to obtain updated packages without
building them from scratch.
Solution: Provide hashes for the new bottles. | [
{
"change_type": "MODIFY",
"old_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"new_path": "Formula/tezos-accuser-008-PtEdo2Zk.rb",
"diff": "@@ -28,6 +28,8 @@ class TezosAccuser008Ptedo2zk < Formula\nbottle do\nroot_url \"https://github.com/serokell/tezos-packaging/releases/download/#{TezosAccuser0... | Python | MIT License | serokell/tezos-packaging | Update bottles hashes
Problem: New release was created, brew formulas now have
tezos-sapling-params dependency and also provide background services.
We should provide an easy way to obtain updated packages without
building them from scratch.
Solution: Provide hashes for the new bottles. |
603,652 | 15.03.2021 11:08:42 | -10,800 | 3c1c1b2556fe3c0010af8b8c8979f25a8a1a30f4 | Do native packaging for arm64
Problem: Currently both Ubuntu and Fedora native packages target only
amd64, thus it's not possible to use our package repos on the other
architectures.
Solution: Add arm64 to the list of target architectures. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/model.py",
"new_path": "docker/package/model.py",
"diff": "@@ -108,7 +108,7 @@ Standards-Version: 3.9.6\nHomepage: https://gitlab.com/tezos/tezos/\nPackage: {self.name.lower()}\n-Architecture: amd64\n+Architecture: amd64 arm64\nDepends: ${{shlib... | Python | MIT License | serokell/tezos-packaging | [#157] Do native packaging for arm64
Problem: Currently both Ubuntu and Fedora native packages target only
amd64, thus it's not possible to use our package repos on the other
architectures.
Solution: Add arm64 to the list of target architectures. |
603,652 | 11.03.2021 12:55:38 | -10,800 | 3eb993dd9b513d6e937b2fe6681358ab509a3fa8 | tezos-node-<network> aliases
Problem: It would be convenient to have such aliases when it's required
to run node with the data directory specified in the systemd service
environment.
Solution: Add tezos-node-<network> scripts that are generated during
postinst stage. They're also cleaned up during the postrm. | [
{
"change_type": "MODIFY",
"old_path": "docker/package/model.py",
"new_path": "docker/package/model.py",
"diff": "@@ -68,6 +68,10 @@ class AbstractPackage:\ndef gen_postinst(self, out):\npass\n+ @abstractmethod\n+ def gen_postrm(self, out):\n+ pass\n+\nmeta = json.load(open(f\"{os.path.dirname(__fil... | Python | MIT License | serokell/tezos-packaging | [#148] tezos-node-<network> aliases
Problem: It would be convenient to have such aliases when it's required
to run node with the data directory specified in the systemd service
environment.
Solution: Add tezos-node-<network> scripts that are generated during
postinst stage. They're also cleaned up during the postrm. |
603,652 | 11.03.2021 17:16:21 | -10,800 | 90eb944e15660bcaeab91121655533cf7e005b17 | Update README
Problem: Users need to know that new aliases exist.
Solution: Mention them in README, also update testnet name in it. | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -205,17 +205,22 @@ file, they can be found in [`scripts`](./docker/package/scripts) and\nIt's possible to run multiple same services, e.g. two `tezos-node`s that run different\nnetworks.\n-`tezos-node` packages ... | Python | MIT License | serokell/tezos-packaging | [#148] Update README
Problem: Users need to know that new aliases exist.
Solution: Mention them in README, also update testnet name in it. |
603,652 | 19.03.2021 13:22:08 | -10,800 | 75dfc5be360de05d09ca38e6f5f8ab170841eb74 | Bump Tezos sources
Problem: v9.0-rc1 arrived, we should create pre-release for it.
Solution: Bump Tezos sources. | [
{
"change_type": "MODIFY",
"old_path": "nix/nix/sources.json",
"new_path": "nix/nix/sources.json",
"diff": "\"url_template\": \"https://github.com/<owner>/<repo>/archive/<rev>.tar.gz\"\n},\n\"tezos\": {\n- \"ref\": \"refs/tags/v8.2\",\n+ \"ref\": \"refs/tags/v9.0-rc1\",\n\"repo\": \"https://gitlab.c... | Python | MIT License | serokell/tezos-packaging | Bump Tezos sources
Problem: v9.0-rc1 arrived, we should create pre-release for it.
Solution: Bump Tezos sources. |
603,652 | 19.03.2021 13:22:46 | -10,800 | 38bfd9f384213a72a86c3894050edabf44cbb334 | Add new protocol support
Problem: New release candidate adds support for the new 009 protocol.
Solution: Update static_libs.patch and activate 009 protocol in
protocols.json | [
{
"change_type": "MODIFY",
"old_path": "docker/build/static_libs.patch",
"new_path": "docker/build/static_libs.patch",
"diff": "@@ -96,96 +96,6 @@ index 7f2ec8a63..51ffdcc8b 100644\n(modules Main_native))\n(executable\n-diff --git a/src/proto_006_PsCARTHA/bin_accuser/dune b/src/proto_006_PsCARTHA/bi... | Python | MIT License | serokell/tezos-packaging | Add new protocol support
Problem: New release candidate adds support for the new 009 protocol.
Solution: Update static_libs.patch and activate 009 protocol in
protocols.json |
603,652 | 22.03.2021 14:40:09 | -10,800 | 3b5de471952afe62744b0453292ef20925dac5c2 | Update nix dependencies
Problem: There are new ocaml dependencies require newer dune version.
Also, some of the required deps aren't presented in the old
opam-repository revision.
Solution: Bump nixpkgs and opam-repository. Also use nixpkgs-unstable,
because revision in our fork has bug with cycle references. | [
{
"change_type": "MODIFY",
"old_path": "nix/nix/sources.json",
"new_path": "nix/nix/sources.json",
"diff": "\"branch\": \"master\",\n\"description\": \"Pinned Nixpkgs tree (master follows nixos-unstable-small, only tags have stable history)\",\n\"homepage\": \"\",\n- \"owner\": \"serokell\",\n+ \"ow... | Python | MIT License | serokell/tezos-packaging | Update nix dependencies
Problem: There are new ocaml dependencies require newer dune version.
Also, some of the required deps aren't presented in the old
opam-repository revision.
Solution: Bump nixpkgs and opam-repository. Also use nixpkgs-unstable,
because revision in our fork has bug with cycle references. |
603,652 | 22.03.2021 15:14:08 | -10,800 | 003488d8b543a879c2ed5ff0f1dc0ad70aae8bf2 | Adjust hacks.nix
Problem: Nixpkgs and opam-repository updates brought some new errors
that need to be workaround.
Solution: Adjust hacks.nix so that Tezos binaries compile. | [
{
"change_type": "MODIFY",
"old_path": "nix/build/hacks.nix",
"new_path": "nix/build/hacks.nix",
"diff": "@@ -20,15 +20,27 @@ let\n./bls12-381-add-Cargo.lock.patch\n];\n};\n- librustzcash = self.rustPlatform.buildRustPackage rec {\n- pname = \"librustzcash\";\n- version = \"0.1.0\";\n- RUSTFLAGS = \... | Python | MIT License | serokell/tezos-packaging | Adjust hacks.nix
Problem: Nixpkgs and opam-repository updates brought some new errors
that need to be workaround.
Solution: Adjust hacks.nix so that Tezos binaries compile. |
603,652 | 22.03.2021 15:27:05 | -10,800 | 5c0b3c7cfaf9b031c5d65cd13aecbc93c7e63f74 | Adjust tests
Problem: Turned out that nix-binaries-tests use old 007 binaries, which
now aren't supported.
Solution: Use 008 binaries in tests. | [
{
"change_type": "MODIFY",
"old_path": "tests/test_script.py",
"new_path": "tests/test_script.py",
"diff": "@@ -83,14 +83,14 @@ def test_node_with_daemons_scenario(network, use_tls=False):\nkill_node_with_daemons()\n-with subtest(\"run node with daemons on delphinet\"):\n- test_node_with_daemons_sce... | Python | MIT License | serokell/tezos-packaging | Adjust tests
Problem: Turned out that nix-binaries-tests use old 007 binaries, which
now aren't supported.
Solution: Use 008 binaries in tests. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.