profile
viewpoint

mirage/qubes-mirage-firewall 138

A Mirage firewall VM for QubesOS

capnproto/capnp-ocaml 71

OCaml code generator plugin for the Cap'n Proto serialization framework

ocurrent/ocurrent 59

Keeps things up-to-date (a CI/CD pipeline OCaml eDSL)

ocurrent/ocaml-ci 49

A CI for OCaml projects

mirage/mirage-qubes 48

Mirage support for writing QubesOS AppVM unikernels

ocaml-community/obus 23

Pure OCaml implementation of the D-Bus protocol

ocaml-opam/opam-0install-solver 13

a solver for opam packages using 0install's solver engine

ocurrent/citty 13

CI in tty

ocurrent/docker-base-images 10

Generate various Docker ocaml images

ocsigen/lwt_glib 9

GLib/GTK event loop for Lwt

push eventocurrent/build-scheduler

Thomas Leonard

commit sha 48dd6305317bb28cf5d1f4c499118a3437a50514

Workers forward prometheus-node-exporter metrics to scheduler This allows a prometheus service to collect host metrics from workers without workers needing to accept incoming network connections.

view details

push time in 13 hours

PR opened ocurrent/build-scheduler

Workers forward prometheus-node-exporter metrics to scheduler

This allows a prometheus service to collect host metrics from workers without workers needing to accept incoming network connections.

+82 -31

0 comment

7 changed files

pr created time in 14 hours

push eventtalex5/build-scheduler

Thomas Leonard

commit sha 48dd6305317bb28cf5d1f4c499118a3437a50514

Workers forward prometheus-node-exporter metrics to scheduler This allows a prometheus service to collect host metrics from workers without workers needing to accept incoming network connections.

view details

push time in 14 hours

create barnchtalex5/build-scheduler

branch : host-metrics

created branch time in 14 hours

push eventocurrent/docker-base-images

Thomas Leonard

commit sha 29f4496cc066672b7b3a0641c44aea2f3ddb9ac0

Image is now hosted on Hub

view details

Thomas Leonard

commit sha 1a9d9283d99d7e1a087b091c364511a9af43f7fe

Merge pull request #45 from talex5/hub Image is now hosted on Hub

view details

Thomas Leonard

commit sha 1ebe2b4b6d6a2bd4fa2a7b6d7a973ce344989ba0

Merge pull request #44 from avsm/build-386 add i386 container images to the build matrix

view details

Thomas Leonard

commit sha 50bcbbaa41850d2a755bb033916ec6d0f96adea1

Remove all hidden files from docker context When building with `-f -`, docker seems to ignore its cache if hidden files are permitted. Possibly it's using a hidden file to pass the data from stdin and this causes a problem somehow?

view details

Thomas Leonard

commit sha 246ed4a883ad1439ce3f1902b8a47bb297eb583c

Merge pull request #46 from talex5/dockerignore Remove all hidden files from docker context

view details

push time in 16 hours

push eventocurrent/docker-base-images

Thomas Leonard

commit sha 50bcbbaa41850d2a755bb033916ec6d0f96adea1

Remove all hidden files from docker context When building with `-f -`, docker seems to ignore its cache if hidden files are permitted. Possibly it's using a hidden file to pass the data from stdin and this causes a problem somehow?

view details

Thomas Leonard

commit sha 246ed4a883ad1439ce3f1902b8a47bb297eb583c

Merge pull request #46 from talex5/dockerignore Remove all hidden files from docker context

view details

push time in 16 hours

delete branch talex5/ocaml-base-images

delete branch : dockerignore

delete time in 16 hours

PR merged ocurrent/docker-base-images

Remove all hidden files from docker context

When building with -f -, docker seems to ignore its cache if hidden files are permitted. Possibly it's using a hidden file to pass the data from stdin and this causes a problem somehow?

+1 -1

0 comment

1 changed file

talex5

pr closed time in 16 hours

PR opened ocurrent/docker-base-images

Remove all hidden files from docker context

When building with -f -, docker seems to ignore its cache if hidden files are permitted. Possibly it's using a hidden file to pass the data from stdin and this causes a problem somehow?

+1 -1

0 comment

1 changed file

pr created time in 16 hours

create barnchtalex5/ocaml-base-images

branch : dockerignore

created branch time in 16 hours

PR merged ocurrent/docker-base-images

add i386 container images to the build matrix

This adds an i386 32-bit container image to the build matrix (which is the "386" platform in Docker parlance).

The i386 images are slightly tricker than others since it is the first cross target in the image matrix. The i386 base images are held in a separate base image repository. They also requires the SHELL and ENTRYPOINT to be set to linux32 in order to have a i686 personality for the image.

All of this is handled in ocaml-dockerfile and ocaml-version, so this PR updates the git submodules.

After this PR, the 386 images will exist, but their use in a multiarch model isnt entirely straightforward, since the documented "FROM --platform=386 ocurrent/opam" doesnt actually seem to work. The client picks the last cached version from the manifest, which is usually the amd64 version. However, explicitly using the i386 image (either via directly using its image label, or docker manifest inspect to pull out the right sha256 hash, works fine.

+19 -8

3 comments

6 changed files

avsm

pr closed time in 16 hours

push eventocurrent/docker-base-images

Anil Madhavapeddy

commit sha cd5a6783d986f65932de5748425b7267f72da7d9

add i386 container images to the build matrix This adds an `i386` 32-bit container image to the build matrix (which is the "386" platform in Docker parlance). The i386 images are slightly tricker than others since it is the first cross target in the image matrix. The i386 base images are held in a separate base image repository. They also requires the SHELL and ENTRYPOINT to be set to linux32 in order to have a i686 personality for the image. All of this is handled in ocaml-dockerfile and ocaml-version, so this PR updates the git submodules. After this PR, the 386 images will exist, but their use in a multiarch model isnt entirely straightforward, since the documented "FROM --platform=386 ocurrent/opam" doesnt actually seem to work. The client picks the last cached version from the manifest, which is usually the amd64 version. However, explicitly using the i386 image (either via directly using its image label, or `docker manifest inspect` to pull out the right sha256 hash, works fine.

view details

Anil Madhavapeddy

commit sha 4e35197053b6f1d2a50b6975195a45e5a803050e

ocaml-dockerfile: update to latest version for opam build fix

view details

Thomas Leonard

commit sha e11dc461d27a86722f518750d1ddf9cba869bae7

Pass missing arch argument to Dockerfile_opam.gen_opam2_distro Otherwise, the `I386` build is just the same as the `X86_64` one.

view details

Anil Madhavapeddy

commit sha b50742b7508776180f105ca85ff34fd663dd0a5c

ensure that we set the i386 personality correctly in compiler Dockerfile This is necessary since Docker does not inherit SHELL or ENTRYPOINT instructions from upper layers, so every layer will unfortunately need to have this logic. We can move it into dockerfile-opam once this PR is working and live.

view details

Thomas Leonard

commit sha 1ebe2b4b6d6a2bd4fa2a7b6d7a973ce344989ba0

Merge pull request #44 from avsm/build-386 add i386 container images to the build matrix

view details

push time in 16 hours

push eventocurrent/ocurrent-deployer

Thomas Leonard

commit sha fe33749d562467fbe65aa55151a06ac70790ccea

Allow deploying services built with cluster

view details

push time in 16 hours

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha fe33749d562467fbe65aa55151a06ac70790ccea

Allow deploying services built with cluster

view details

push time in 16 hours

delete branch talex5/ocaml-base-images

delete branch : hub

delete time in 16 hours

push eventocurrent/docker-base-images

Thomas Leonard

commit sha 29f4496cc066672b7b3a0641c44aea2f3ddb9ac0

Image is now hosted on Hub

view details

Thomas Leonard

commit sha 1a9d9283d99d7e1a087b091c364511a9af43f7fe

Merge pull request #45 from talex5/hub Image is now hosted on Hub

view details

push time in 16 hours

delete branch talex5/ocaml-ci

delete branch : hub

delete time in 16 hours

push eventocurrent/ocaml-ci

Thomas Leonard

commit sha 1e6ee6952400769698344374552e87c0ce0f2730

Images are now hosted on Hub

view details

Thomas Leonard

commit sha 12833f711797e1f347755155b232d3ab12c4d51c

Fix cap ref-leak in unit-tests

view details

Thomas Leonard

commit sha 0117849b902d0998fa488749269639fb5b9f7eab

Merge pull request #213 from talex5/hub Images are now hosted on Hub

view details

push time in 16 hours

PR merged ocurrent/ocaml-ci

Images are now hosted on Hub
+15 -6

0 comment

2 changed files

talex5

pr closed time in 16 hours

push eventtalex5/ocaml-ci

Thomas Leonard

commit sha 12833f711797e1f347755155b232d3ab12c4d51c

Fix cap ref-leak in unit-tests

view details

push time in 16 hours

PR opened ocurrent/docker-base-images

Image is now hosted on Hub
+1 -1

0 comment

1 changed file

pr created time in 16 hours

create barnchtalex5/ocaml-base-images

branch : hub

created branch time in 16 hours

create barnchtalex5/ocaml-ci

branch : hub

created branch time in 17 hours

PR opened ocurrent/ocaml-ci

Images are now hosted on Hub
+2 -2

0 comment

1 changed file

pr created time in 17 hours

push eventocurrent/ocurrent-deployer

Thomas Leonard

commit sha 86c6b6bffbaa2a0c61cbc6f8b60c69377e48c46e

Allow deploying services built with cluster

view details

push time in 17 hours

delete branch talex5/ocurrent

delete branch : manifest-repo-id

delete time in 17 hours

push eventocurrent/ocurrent

Thomas Leonard

commit sha 59626a172fd404247eb293c973bfe2fbc742f98f

Docker: return the RepoId after pushing a manifest

view details

Thomas Leonard

commit sha cdb56987c4f2b3bfe537d038338f9f10ec516831

Merge pull request #207 from talex5/manifest-repo-id Docker: return the RepoId after pushing a manifest

view details

push time in 17 hours

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 86c6b6bffbaa2a0c61cbc6f8b60c69377e48c46e

Allow deploying services built with cluster

view details

push time in 17 hours

push eventocurrent/ocurrent-deployer

Thomas Leonard

commit sha 683cedb33ce399764e0cf46e5186d80c25636f93

Allow deploying services built with cluster

view details

push time in 17 hours

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 683cedb33ce399764e0cf46e5186d80c25636f93

Allow deploying services built with cluster

view details

push time in 17 hours

push eventocurrent/ocurrent-deployer

Thomas Leonard

commit sha b30a0dfb10a5f3af1408afc8a126e04ca6dd5464

Allow deploying services built with cluster

view details

push time in 18 hours

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha b30a0dfb10a5f3af1408afc8a126e04ca6dd5464

Allow deploying services built with cluster

view details

push time in 18 hours

push eventtalex5/ocurrent

Thomas Leonard

commit sha 59626a172fd404247eb293c973bfe2fbc742f98f

Docker: return the RepoId after pushing a manifest

view details

push time in 18 hours

push eventocurrent/ocurrent-deployer

Thomas Leonard

commit sha f2fa65d3a9a5f9c7dd15ec4d67a9449e82549011

Build build-scheduler using a build-scheduler build

view details

Thomas Leonard

commit sha 1fed9e52adfdc4542f32253d71b56481e8f9799c

Update to latest OCurrent for flexible pools

view details

Thomas Leonard

commit sha 8572f2735c74f2cd362e898da6bdf54b928437b6

Allow deploying services built with cluster

view details

push time in 18 hours

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 8572f2735c74f2cd362e898da6bdf54b928437b6

Allow deploying services built with cluster

view details

push time in 18 hours

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 50aadb7f90a6ec49fd505c56562a6c3a7ab48fd9

Allow deploying services built with cluster

view details

push time in 18 hours

push eventtalex5/ocurrent

Thomas Leonard

commit sha df3d13de99b9e03b5fa692de75abec067d89c5c7

Docker: return the RepoId after pushing a manifest

view details

push time in 18 hours

create barnchtalex5/ocurrent

branch : manifest-repo-id

created branch time in 18 hours

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 1fed9e52adfdc4542f32253d71b56481e8f9799c

Update to latest OCurrent for flexible pools

view details

push time in 20 hours

delete branch talex5/ocurrent

delete branch : flexible-pools

delete time in 20 hours

push eventocurrent/ocurrent

Thomas Leonard

commit sha 31ee63d56ca83af86303af75e6502d78bbfe0b49

Allow user-defined pools Add `Pool.of_fn` so that users can provide their own pools. This allows waiting for resources from an external service before marking a job as started.

view details

Thomas Leonard

commit sha 2d94a418be5758e207ce92eb30120fe7545b2dae

Merge pull request #206 from talex5/flexible-pools Allow user-defined pools

view details

push time in 20 hours

PR merged ocurrent/ocurrent

Allow user-defined pools

This allows waiting for resources from an external service before marking a job as started.

+133 -91

0 comment

10 changed files

talex5

pr closed time in 20 hours

push eventtalex5/ocurrent

Thomas Leonard

commit sha 31ee63d56ca83af86303af75e6502d78bbfe0b49

Allow user-defined pools Add `Pool.of_fn` so that users can provide their own pools. This allows waiting for resources from an external service before marking a job as started.

view details

push time in 20 hours

push eventtalex5/ocurrent

Thomas Leonard

commit sha 85ce1da186c013c301621707f092b1bbdee584bb

Simplify pool cancellation API Instead of passing in an `on_cancel` function to all the pool to register a cancel function, just return the cancel function directly.

view details

push time in 20 hours

push eventtalex5/ocurrent

Thomas Leonard

commit sha 1964bdb367d56c51c97f8bf5f909bfb559da3420

Allow user-defined pools

view details

push time in 21 hours

PR opened ocurrent/ocurrent

Allow user-defined pools

This allows waiting for resources from an external service before marking a job as started.

+133 -92

0 comment

10 changed files

pr created time in 21 hours

push eventtalex5/ocurrent

Thomas Leonard

commit sha d924208a968a5710b99cb7919c55e29eb2e5a54c

Allow user-defined pools

view details

push time in a day

create barnchtalex5/ocurrent

branch : flexible-pools

created branch time in a day

issue commentjanestreet/base

Enable ocaml-ci for this repository?

The default is to apply a GitHub App to all repositories, but I suggest limiting it to just this one to start with. First, to check that it works, and secondly to avoid overloading the CI (we're still scaling it up). But in the UI it's just a matter of choosing either All repositories, or choosing Only select repositories and then selecting the ones you want.

There is a per-organisation dashboard that shows the state of the master branch of each repository. e.g. for mirage: https://ci.ocamllabs.io/github/mirage

talex5

comment created time in a day

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha f2fa65d3a9a5f9c7dd15ec4d67a9449e82549011

Build build-scheduler using a build-scheduler build

view details

push time in a day

delete branch talex5/ocaml-ci

delete branch : whitelist

delete time in 2 days

push eventocurrent/ocaml-ci

Thomas Leonard

commit sha 717ded9aeabfcb07cf0c4c30e0fdcd909494aaac

Add ocaml-opam to whitelist

view details

Thomas Leonard

commit sha 012ef0b5f75c76c5efd825a0a624bfb01aa7955e

Merge pull request #212 from talex5/whitelist Add ocaml-opam to whitelist

view details

push time in 2 days

PR merged ocurrent/ocaml-ci

Add ocaml-opam to whitelist
+1 -1

0 comment

1 changed file

talex5

pr closed time in 2 days

delete branch ocaml-opam/opam-0install-solver

delete branch : wip

delete time in 2 days

PR opened ocurrent/ocaml-ci

Add ocaml-opam to whitelist
+1 -1

0 comment

1 changed file

pr created time in 2 days

create barnchtalex5/ocaml-ci

branch : whitelist

created branch time in 2 days

delete branch talex5/mirage-qubes

delete branch : prune-deps

delete time in 2 days

push eventmirage/mirage-qubes

Thomas Leonard

commit sha eda7e8745b988e97b107b6131727f090c5f35dd6

Remove unused xen-gnt dependency `xen-gnt`'s functionality now comes directly from `mirage-xen`. Also, remove `xen-evtchn`, which we don't use directly. These were added in cae1fd1e912535373db96f682cd703b773314b4c to force vchan to build for Xen, back when it used depopts.

view details

Thomas Leonard

commit sha 94b76dc9049cec3e9eaf1f488cb8738ccf4a0311

Merge pull request #54 from talex5/prune-deps Remove unused xen-gnt dependency

view details

push time in 2 days

PR merged mirage/mirage-qubes

Remove unused xen-gnt dependency

xen-gnt's functionality now comes directly from mirage-xen. Also, remove xen-evtchn, which we don't use directly.

These were added in cae1fd1e912535373db96f682cd703b773314b4c to force vchan to build for Xen, back when it used depopts.

+1 -4

0 comment

2 changed files

talex5

pr closed time in 2 days

pull request commentmirage/awa-ssh

Chacha20/poly1305 support

The build machine was running a docker prune at the time. I guess docker got confused by that somehow. I restarted the jobs and they passed.

hannesm

comment created time in 2 days

delete branch talex5/mirage-qubes

delete branch : xen-gnt

delete time in 3 days

PR opened mirage/mirage-qubes

Remove unused xen-gnt dependency

xen-gnt's functionality now comes directly from mirage-xen. Also, remove xen-evtchn, which we don't use directly.

These were added in cae1fd1e912535373db96f682cd703b773314b4c to force vchan to build for Xen, back when it used depopts.

+1 -4

0 comment

2 changed files

pr created time in 3 days

create barnchtalex5/mirage-qubes

branch : prune-deps

created branch time in 3 days

create barnchtalex5/mirage-qubes

branch : xen-gnt

created branch time in 3 days

push eventmirage/qubes-mirage-firewall

Hannes Mehnert

commit sha de0eb9d9703b2a68609a835e407fdf5a2c838b1f

adapt to mirage 3.8.0 changes (ipaddr5, tcpip5); bump opam-repository hash (to get netchannel+mirage-net-xen 0.13.1)

view details

Hannes Mehnert

commit sha aebaa2cafcde70552a46e720dcb672acd24a5658

update sha256 from travis run

view details

Thomas Leonard

commit sha 006801c03e48a47f9e0dd4023202d32e72dad47f

Merge pull request #112 from roburio/mirage38 adapt to mirage 3.8.0 changes (ipaddr5, tcpip5); bump opam-repository hash (to get netchannel+mirage-net-xen 0.13.1)

view details

push time in 3 days

PR merged mirage/qubes-mirage-firewall

adapt to mirage 3.8.0 changes (ipaddr5, tcpip5); bump opam-repository hash (to get netchannel+mirage-net-xen 0.13.1)

note: the sha256 hash of the image should be adapted. this will fix #111 (so a 0.7.2 release would be welcome (I don't have infrastructure to run the release process atm, in case someone else can do this, that'd be appreciated))

+6 -6

0 comment

4 changed files

hannesm

pr closed time in 3 days

issue closedmirage/qubes-mirage-firewall

VOIP call initiation fails

Hello thank you for the great little firewall. I have been using qubes mirage firewall 0.7.1 for several days and everything seems to be working great. Today I found something. I use voip software over a udp vpn. The vpn has been working fine with no problems. The client is able to log into the voip server without problem as indicated with a green circle (online). However, when I try to initiate a call, it tries for about 10 seconds then fails. On sys-firewall it works normally. I have gone back and forth several times to verify that it works on sys-firewall, but does not work on qmf071. I also tried a different voip client and it is the same. It is strange because since it is over a vpn the firewall should not treat the packets differently. But the problem is real. It is the only problem I have found.

closed time in 3 days

jorgejones7711

issue openedjanestreet/base

Enable ocaml-ci for this repository?

I'm trying to find out why capnp master's tests don't work on OCaml 4.07, and the Required module `Bigarray' is unavailable error seems to be connected to Base_quickcheck. I thought it would be good to enable CI on this repository to see if it shows up here too.

If you'd like to enable ocaml-ci here, go to https://github.com/apps/ocaml-ci and add the GitHub app to this organisation (making sure to limit it to just the base repository when prompted). I've already added janestreet to the whitelist, so no other configuration should be needed.

created time in 4 days

push eventmirage/capnp-rpc

Thomas Leonard

commit sha 334aaa212fb6cd729394337e899323e144269b95

Unix: don't leak FDs if `Network.connect` fails Also, use `Lwt` to open connections so we don't block the whole process.

view details

Thomas Leonard

commit sha 756ad5728b50218d6fd565ed9b553cb9e3431a16

Merge pull request #206 from talex5/close-sockets Unix: don't leak FDs if `Network.connect` fails

view details

push time in 4 days

delete branch talex5/capnp-rpc

delete branch : close-sockets

delete time in 4 days

PR merged mirage/capnp-rpc

Unix: don't leak FDs if `Network.connect` fails

Also, use Lwt to open connections so we don't block the whole process.

+23 -13

0 comment

1 changed file

talex5

pr closed time in 4 days

delete branch talex5/ocaml-ci

delete branch : capnproto

delete time in 4 days

push eventocurrent/ocaml-ci

Thomas Leonard

commit sha e076f3e7c53827d3155d14832155872c6b534c07

Add capnproto to whitelist

view details

Thomas Leonard

commit sha 8abc8ffe88ef3dc8fea355046a689fc84160233f

Merge pull request #211 from talex5/capnproto Add capnproto to whitelist

view details

push time in 4 days

PR merged ocurrent/ocaml-ci

Add capnproto to whitelist
+1 -1

0 comment

1 changed file

talex5

pr closed time in 4 days

PR opened ocurrent/ocaml-ci

Add capnproto to whitelist
+1 -1

0 comment

1 changed file

pr created time in 4 days

create barnchtalex5/ocaml-ci

branch : capnproto

created branch time in 4 days

PR opened mirage/capnp-rpc

Unix: don't leak FDs if `Network.connect` fails

Also, use Lwt to open connections so we don't block the whole process.

+23 -13

0 comment

1 changed file

pr created time in 4 days

create barnchtalex5/capnp-rpc

branch : close-sockets

created branch time in 4 days

push eventocurrent/build-scheduler

Thomas Leonard

commit sha bd531fbee7af476b7f8110cce608c9d357dc295b

Merge pull request #16 from talex5/push-to Allow pushing images to a Docker registry after building

view details

Thomas Leonard

commit sha 9dea23ee7b95cd35e571d6aa57983beeb30a85b6

Cope with iid file being deleted Looks like docker removes it if the job is cancelled.

view details

Thomas Leonard

commit sha 803b3b44f639c490d9ae0ceb4bf71cf009f04e98

Add an explicit cancel method on jobs This simplifies ref-counting for clients that want to cancel explicitly and allows them to wait for the cancellation to take effect if they want.

view details

Thomas Leonard

commit sha 68974715bfcfc48b4cb92413a187fc7a8cf8e729

Merge pull request #17 from talex5/cancel Add an explicit cancel method on jobs

view details

Thomas Leonard

commit sha e69d9f6d330077fddf0b9ce6057da64c2664c98a

Make the API module public Moved Docker stuff from `Submission` to a new module.

view details

Thomas Leonard

commit sha 5cc48362e43dced1dad8ed25ffc9a537a62f4a5f

Merge pull request #18 from talex5/public-api Make the API module public

view details

Thomas Leonard

commit sha e9c7612973958fe3dc71fe0e48f47a54b7009424

Filter RepoIDs from Docker to just the repository we expected If the image we just built happens to be included in a multi-arch image that we have locally, it seems that Docker can return that ID too. But that doesn't work, because we need to return the arch-specific hash to the user, so they can use it in `docker manifest`.

view details

Thomas Leonard

commit sha fae3cfea388df61c702017ae4e8fa4474e4a2678

Merge pull request #19 from talex5/filter-repo-ids Filter RepoIDs from Docker to just the repository we expected

view details

push time in 4 days

delete branch talex5/build-scheduler

delete branch : filter-repo-ids

delete time in 4 days

push eventocurrent/build-scheduler

Thomas Leonard

commit sha e9c7612973958fe3dc71fe0e48f47a54b7009424

Filter RepoIDs from Docker to just the repository we expected If the image we just built happens to be included in a multi-arch image that we have locally, it seems that Docker can return that ID too. But that doesn't work, because we need to return the arch-specific hash to the user, so they can use it in `docker manifest`.

view details

Thomas Leonard

commit sha fae3cfea388df61c702017ae4e8fa4474e4a2678

Merge pull request #19 from talex5/filter-repo-ids Filter RepoIDs from Docker to just the repository we expected

view details

push time in 4 days

PR merged ocurrent/build-scheduler

Filter RepoIDs from Docker to just the repository we expected

If the image we just built happens to be included in a multi-arch image that we have locally, it seems that Docker can return that ID too. But that doesn't work, because we need to return the arch-specific hash to the user, so they can use it in docker manifest.

+9 -2

0 comment

1 changed file

talex5

pr closed time in 4 days

push eventtalex5/build-scheduler

Thomas Leonard

commit sha e9c7612973958fe3dc71fe0e48f47a54b7009424

Filter RepoIDs from Docker to just the repository we expected If the image we just built happens to be included in a multi-arch image that we have locally, it seems that Docker can return that ID too. But that doesn't work, because we need to return the arch-specific hash to the user, so they can use it in `docker manifest`.

view details

push time in 4 days

PR opened ocurrent/build-scheduler

Filter RepoIDs from Docker to just the repository we expected

If the image we just built happens to be included in a multi-arch image that we have locally, it seems that Docker can return that ID too. But that doesn't work, because we need to return the arch-specific hash to the user, so they can use it in docker manifest.

+9 -2

0 comment

1 changed file

pr created time in 4 days

create barnchtalex5/build-scheduler

branch : filter-repo-ids

created branch time in 4 days

push eventocurrent/ocurrent-deployer

Thomas Leonard

commit sha 15b9fff24ebfa78054a1856f5ec9b84fa95de19e

Merge pull request #30 from talex5/push-to-hub Allow pushing images to Docker Hub

view details

Thomas Leonard

commit sha 87441974af8bcc5ed0d0677213237fabf6f10b1d

Make deployment system more flexible Instead of passing the result of the build step to the deploy, give the source and build info to the deploy function directly. It can just call the build step itself if it wants to, but it can also behave differently. This will be useful with the new build scheduler, because we need to know whether we're deploying to decide whether to save the resulting image.

view details

Thomas Leonard

commit sha 379a4cfa1a9629f77bb647e9f36f8011cc8c4498

Merge pull request #31 from talex5/flexible-deploy Make deployment system more flexible

view details

Thomas Leonard

commit sha 5dfed16bb08b8ae6e001296c266f018de100e676

Group deployments together in diagram

view details

Thomas Leonard

commit sha 796a0b5bd73463313fc22f1af39ea1393923e792

Merge pull request #32 from talex5/group-deployments Group deployments together in diagram

view details

Thomas Leonard

commit sha 87de476278826f478f0086e5e220580157ea3f13

Build build-scheduler using a build-scheduler build

view details

push time in 4 days

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 87de476278826f478f0086e5e220580157ea3f13

Build build-scheduler using a build-scheduler build

view details

push time in 4 days

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 31b67cdd3af61ffae3b5b50c927bd98f63cdb4e0

Build build-scheduler using a build-scheduler build

view details

push time in 4 days

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 302854b561073d6f62a9f2d8464bf4dbf1add983

Build build-scheduler using a build-scheduler build

view details

push time in 4 days

push eventtalex5/ocurrent-deployer

Thomas Leonard

commit sha 6f7aa595529b42a2b3c33151fe39df67566e556c

Build build-scheduler using a build-scheduler build

view details

push time in 4 days

PR opened ocurrent/ocurrent-deployer

Build build-scheduler using a build-scheduler build

This watches the live branch of build-scheduler, builds it using the new build cluster, then pushes the images to Docker Hub. The worker image is a multi-arch image supporting 64-bit ARM and x86.

TODO:

  • The OCurrent cluster plugin should be moved to a separate repository (probably build-scheduler).
+283 -11

0 comment

10 changed files

pr created time in 4 days

create barnchtalex5/ocurrent-deployer

branch : build-scheduler

created branch time in 4 days

push eventocurrent/ocurrent-deployer

Thomas Leonard

commit sha 5dfed16bb08b8ae6e001296c266f018de100e676

Group deployments together in diagram

view details

Thomas Leonard

commit sha 796a0b5bd73463313fc22f1af39ea1393923e792

Merge pull request #32 from talex5/group-deployments Group deployments together in diagram

view details

push time in 4 days

delete branch talex5/ocurrent-deployer

delete branch : group-deployments

delete time in 4 days

more